CN115913961A - Time-sensitive network verification method, device, equipment and storage medium - Google Patents

Time-sensitive network verification method, device, equipment and storage medium Download PDF

Info

Publication number
CN115913961A
CN115913961A CN202111016131.5A CN202111016131A CN115913961A CN 115913961 A CN115913961 A CN 115913961A CN 202111016131 A CN202111016131 A CN 202111016131A CN 115913961 A CN115913961 A CN 115913961A
Authority
CN
China
Prior art keywords
sub
verification
time
mode
time data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111016131.5A
Other languages
Chinese (zh)
Inventor
柳干
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing CHJ Automotive Information Technology Co Ltd
Original Assignee
Beijing CHJ Automotive Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing CHJ Automotive Information Technology Co Ltd filed Critical Beijing CHJ Automotive Information Technology Co Ltd
Publication of CN115913961A publication Critical patent/CN115913961A/en
Pending legal-status Critical Current

Links

Images

Abstract

The disclosure relates to a time-sensitive network verification method, a device, equipment and a storage medium, wherein the verification method comprises the following steps: the method comprises the steps of obtaining a target requirement of a time sensitive network to be verified, generating a control instruction according to the target requirement, determining a mode of verification equipment through the control instruction, and generating a verification instruction in the mode of the verification equipment, wherein the verification instruction is used for verifying the time sensitive network. According to the verification method, the mode of the verification device can be directly configured according to the target requirements in different scenes, the time sensitive network is verified by utilizing the different modes of the verification device, the method is suitable for multiple application scenes, the universality is high, related personnel do not need to investigate and select the type, only one verification device needs to be configured, the current application mode of the verification device is controlled, the time sensitive network can be verified, a large amount of manpower and material resources are saved, the operation is simple and convenient, and the verification speed is high.

Description

Time-sensitive network verification method, device, equipment and storage medium
Technical Field
The present disclosure relates to the field of communications technologies, and in particular, to a method, an apparatus, a device, and a storage medium for time-sensitive network authentication.
Background
At present, a Time Sensitive Network (TSN) based on a vehicle-mounted ethernet gradually becomes a research focus, and the Time Sensitive ethernet can also accurately transmit data while ensuring a transmission bandwidth, so a Time Sensitive Network verification method that can be quickly constructed and accurately verified is required.
At present, time-sensitive network verification needs multiple devices bearing different functions, and because requirements of protocols of a time-sensitive network are different and application scenes are different, related developers are required to conduct work such as product investigation and model selection on existing devices, so that the devices for verification under different requirements are determined, operation is complex, waste of human and material resources is easily caused, time consumption is long, and universality is poor.
Disclosure of Invention
In order to solve the technical problems or at least partially solve the technical problems, the disclosure provides a time-sensitive network verification method, a time-sensitive network verification device, time consumed for verifying a time-sensitive network, waste of human and material resources is further reduced, and universality is improved.
In a first aspect, an embodiment of the present disclosure provides a time-sensitive network verification method, including:
acquiring a target requirement of a time sensitive network to be verified;
generating a control instruction according to the target requirement;
determining the mode of the verification device through the control instruction;
and generating a verification instruction in a mode of the verification device, wherein the verification instruction is used for verifying the time-sensitive network.
In a second aspect, an embodiment of the present disclosure provides a time-sensitive network authentication apparatus, including:
the device comprises an acquisition unit, a verification unit and a verification unit, wherein the acquisition unit is used for acquiring the target requirement of the time sensitive network to be verified;
the generating unit is used for generating a control instruction according to the target requirement;
a determination unit for determining a mode of the authentication device by a control instruction;
and the verification unit is used for generating a verification instruction in a mode of verifying the equipment, and the verification instruction is used for verifying the time sensitive network.
In a third aspect, an embodiment of the present disclosure provides an electronic device, including:
a memory;
a processor; and
a computer program;
wherein the computer program is stored in the memory and configured to be executed by the processor to implement the time-sensitive network authentication method as described above.
In a fourth aspect, embodiments of the present disclosure provide a computer-readable storage medium, on which a computer program is stored, which, when executed by a processor, implements the steps of the time-sensitive network authentication method as described above.
The embodiment of the disclosure provides a time-sensitive network verification method, a time-sensitive network verification device, time-sensitive network verification equipment and a storage medium, wherein the verification method comprises the following steps: the method comprises the steps of obtaining a target requirement of a time sensitive network to be verified, generating a control instruction according to the target requirement, determining a mode of verification equipment through the control instruction, and verifying the time sensitive network in the mode of the verification equipment. According to the verification method, the mode of the verification device can be directly configured according to the target requirements in different scenes, the time sensitive network is verified by utilizing the different modes of the verification device, the method is suitable for multiple application scenes, the universality is high, related personnel do not need to investigate and select the type, only one verification device needs to be configured, the current application mode of the verification device is controlled, the time sensitive network can be verified, a large amount of manpower and material resources are saved, the operation is simple and convenient, and the verification speed is high.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure.
In order to more clearly illustrate the embodiments or technical solutions in the prior art of the present disclosure, the drawings used in the description of the embodiments or prior art will be briefly described below, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without inventive exercise.
Fig. 1 is a schematic structural diagram of a time-sensitive network authentication device according to an embodiment of the present disclosure;
fig. 2 is a schematic flowchart of a time-sensitive network authentication method according to an embodiment of the present disclosure;
fig. 3 is a schematic flowchart of a time-sensitive network authentication method according to an embodiment of the present disclosure;
fig. 4 is a schematic structural diagram of an authentication apparatus provided in an embodiment of the present disclosure;
fig. 5 is a flowchart illustrating a time-sensitive network authentication method according to an embodiment of the disclosure;
fig. 6 is a schematic structural diagram of an authentication apparatus provided in an embodiment of the present disclosure;
fig. 7 is a schematic structural diagram of an authentication apparatus provided in an embodiment of the present disclosure;
fig. 8 is a schematic structural diagram of a time-sensitive network authentication apparatus according to an embodiment of the present disclosure;
fig. 9 is a schematic structural diagram of an electronic device according to an embodiment of the present disclosure.
Detailed Description
In order that the above objects, features and advantages of the present disclosure may be more clearly understood, aspects of the present disclosure will be further described below. It should be noted that the embodiments and features of the embodiments of the present disclosure may be combined with each other without conflict.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present disclosure, but the present disclosure may be practiced in other ways than those described herein; it is to be understood that the embodiments disclosed in the specification are only a few embodiments of the present disclosure, and not all embodiments.
According to the embodiment of the disclosure, the target requirements of the time sensitive network to be verified in different scenes are obtained, the control instruction is generated according to the target requirements, the pre-constructed mode of the verification device can be directly configured by using the control instruction, and the verification of the time sensitive network is completed in the mode of the verification device. The verification equipment can be configured into equipment with different functions according to the target requirements of application scenes based on the verification equipment, can quickly and accurately complete the verification of the time sensitive network, and has the advantages of strong flexibility, high universality and simple and convenient operation.
Specifically, the Time-Sensitive ethernet in the embodiment of the present disclosure may be a standard defined by Institute of Electrical and Electronics Engineers (IEEE) Time-Sensitive Network (TSN), for example, an IEEE 802.1 protocol.
Specifically, in the field of automobiles, a time-sensitive Network based on a vehicle-mounted ethernet gradually becomes a research focus, and compared with a conventional Controller Area Network (CAN) as an ethernet bus, the time-sensitive Network serving as the ethernet bus not only ensures a Network bandwidth in data transmission, but also ensures the problems of time sequence, delay, reliability and the like of data transmission. Therefore, to support the planning of future body electronics and electrical architectures, the validation of time sensitive networks needs to be quickly built and completed. For the authentication of a time sensitive network, at least the following needs to be included: the flow generation module is used for generating and sending data messages according to requirements; the end node equipment with the time-sensitive network characteristic is used for participating in time synchronization and data scheduling of the time-sensitive network; the bridge node equipment with the time sensitive network characteristic is used for participating in time synchronization, data scheduling, data forwarding and the like of the time sensitive network; and the flow analysis module is used for capturing data messages, analyzing flow scheduling results and the like. Through the combination of the modules and the equipment, the verification of the functions of time synchronization, gating scheduling, frame preemption, frame copying and elimination, frame filtering and the like defined in the time sensitive network protocol is completed. However, because the functions to be implemented by the end node and the bridge node are different, two different devices are usually needed to implement the functions of the end node and the bridge node, that is, relevant personnel are needed to determine the type selection of the end node and the bridge node according to the scene requirements, which easily causes waste of manpower and material resources, consumes long time, and is not convenient for performing quick and accurate verification on time-sensitive networks under different scenes. Accordingly, the time-sensitive network authentication method provided by the present disclosure is explained by one or more embodiments below with respect to the above problems.
Specifically, time synchronization is mainly achieved according to a defined master clock and a defined slave clock, data of the master clock is transmitted through a master clock interface, data of the slave clock is transmitted through a slave clock interface, the master clock is used for generating time data and serves as a time source, and the slave clock is used for performing time synchronization with current time data generated by the master clock.
It can be understood that the verification device executing the time-sensitive network verification method specifically includes an integrated circuit or an integrated Chip (SoC) and an Ethernet Switch (Ethernet Switch), where the integrated circuit integrates all or most of components of a computer or other electronic systems, and these components include a Central Processing Unit (CPU), a memory, an input/output port, and a secondary storage, and generally further include other components such as a radio modem and a Graphics Processing Unit (GPU); among them, an Ethernet Switch (Ethernet Switch), also called a switching hub, a bridge, is a network hardware that receives and forwards data to a destination device through packet switching, thereby connecting devices on a computer network.
Illustratively, referring to fig. 1, the verification device 100 includes an integrated circuit 110 and an ethernet switch 120, the integrated circuit 110 includes a first processor 111 and an ethernet controller 112, the ethernet switch 120 includes 5 ethernet interfaces and a second processor 121, and data transmission is performed between the integrated circuit 110 and the ethernet switch 120 through the ethernet interfaces. The first processor and the second processor may be central processing units, and may perform data analysis, data forwarding, and the like.
Fig. 2 is a schematic flow chart of a time-sensitive network authentication method provided in an embodiment of the present disclosure, and on the basis of the above embodiment, the time-sensitive network authentication method is described based on the above authentication device 100, which includes the following steps S210 to S240 shown in fig. 2:
s210, obtaining the target requirement of the time sensitive network to be verified.
Understandably, target requirements of the time-sensitive network to be verified which is already constructed are obtained, the target requirements may include a protocol of the time-sensitive network application, the number of verification devices required for verification, and the like, and different target requirements may be obtained according to different scenarios.
And S220, generating a control command according to the target requirement.
Understandably, on the basis of the above S210, a control instruction is generated according to the obtained target requirement, where the control instruction may include information for determining a mode of the verification device, and further includes configuration information for configuring an integration module and an exchange module in the verification device, where the configuration information may specifically include whether the integration module and the exchange module are in a normal operating state, whether the integration module and the exchange module can participate in a networking of a time sensitive network for data transmission, a function to be implemented by each ethernet interface, and the like.
And S230, determining the mode of the verification device through the control instruction.
It can be understood that, on the basis of the above S220, the verification device is configured according to the control instruction, so as to determine the mode of the verification device, that is, the verification device can implement different functions in different modes. For example, a mode of the authentication device can be configured for realizing time synchronization and data scheduling, the authentication device in this mode corresponding to the above-described end node device; or another mode of configuring the verification device, which is used for implementing time synchronization, data scheduling, data forwarding and the like, and the verification device in this mode is equivalent to the above-mentioned bridge node device.
S240, generating a verification instruction in a mode of verifying the equipment, wherein the verification instruction is used for verifying the time-sensitive network.
It can be understood that, on the basis of the above S230, the configured authentication device is used to authenticate various functions defined in the time-sensitive network according to the above time-sensitive network authentication method, that is, in a certain mode of the authentication device, the functions of time synchronization, data scheduling, and the like are implemented through the time-sensitive network.
According to the time-sensitive network verification method provided by the embodiment of the disclosure, a target requirement of a time-sensitive network to be verified is obtained, a control instruction is generated according to the target requirement, the mode of a verification device is determined through the control instruction, and in the mode of the verification device, the verification instruction is generated and is used for verifying the time-sensitive network. According to the verification method, the mode of the verification device can be directly configured according to the target requirements in different scenes, the time sensitive network is verified by utilizing the different modes of the verification device, the method is suitable for multiple application scenes, the universality is high, related personnel do not need to investigate and select the type, only one verification device needs to be configured, the current application mode of the verification device is controlled, the time sensitive network can be verified, a large amount of manpower and material resources are saved, the operation is simple and convenient, and the verification speed is high.
On the basis of the foregoing embodiment, optionally, the verification device includes a plurality of sub-verification devices, and the determining the mode of the verification device through the control instruction specifically includes the following steps S310 to S330 as shown in fig. 3:
understandably, the verification device may refer to a general name of all devices completing time sensitive network verification, and the required number of the devices to be used is determined according to the verification requirement of the time sensitive network in the current scene, where the number of the multiple sub-verification devices included in the verification device is the same as the required number; the structure of the sub-authentication devices may be the same as the authentication device 100 described above, and referring to fig. 4, the authentication device 400 includes at least 3 sub-authentication devices, which are a first sub-authentication device 410, a second sub-authentication device 420, and a third sub-authentication device 430.
S310, determining that the mode of the first sub-authentication device is a sending mode through the control instruction.
It can be understood that the mode of the first sub-authentication device is determined to be the sending mode through the control instruction, wherein the sending mode can realize the function of the traffic generation module, and can also perform the functions of time synchronization, data scheduling, data forwarding and the like, that is, the functions of the end node and the bridge node are simultaneously assumed.
Optionally, the first sub-authentication device includes a first integration module and a first exchange module, and the determining of the sending mode of the first authentication device includes: and respectively configuring the first integration module and the first exchange module according to the control instruction.
Understandably, configuring a first integration module and a first exchange module in the first sub-verification module according to the control instruction; the first integration module is configured to be in a working state, and time data can be generated and transmitted to the first exchange module; meanwhile, the first exchange module is configured to be in a working state, time synchronization can be carried out, time data can be sent to other sub-verification devices, and the first sub-control module is enabled to be in a sending mode through the configuration rules.
For example, referring to fig. 4, in fig. 4, the first sub-authentication device 410 is in a sending mode, and the first integration module 411 is in an operating state, where the operating state refers to an application participating in a time-sensitive network, that is, the application transmits data through the time-sensitive network, the first processor 412 generates time data and transmits the time data to the ethernet controller 413, then the ethernet controller 413 transmits the time data to the first switching module 414, and then the first switching module 414 generates time data and transmits the time data to the second sub-authentication device 420.
And S320, determining the mode of the second sub-verification device as a forwarding mode through the control instruction.
It can be understood that the mode of the second sub-authentication device in the authentication device is determined to be the forwarding mode through the control instruction, and the second sub-authentication device in the forwarding mode can realize the functions of data receiving, data forwarding and the like, that is, undertake the work of the bridge node.
Optionally, the second sub-authentication device includes a second integration module and a second exchange module, and determining that the mode of the second sub-authentication device is the forwarding mode specifically may include: and configuring the second exchange module according to the control instruction.
It can be understood that, configuring the second switching module in the second sub-authentication device according to the control instruction, that is, configuring the second switching module in an operating state, may implement the functions of time synchronization and data forwarding, but may not configure the second integration module in the second sub-authentication device, that is, the second integration module is in an inactive state, where the configuration rule causes the second sub-authentication device to be in a forwarding mode.
For example, referring to fig. 4, the second sub authentication apparatus 420 receives time data transmitted by the first sub authentication apparatus 410, performs time synchronization according to the time data, and the second processor 422 generates the time data and transmits the generated time data to the third sub authentication apparatus 430.
S330, determining the mode of the third sub-verification device as a receiving mode through the control instruction.
It can be understood that the mode of the third sub-authentication device in the authentication devices is determined to be the receiving mode through the control instruction, and the receiving mode mainly refers to receiving time data and performing time synchronization according to the received time data, that is, undertaking the operation of the end node.
Optionally, the third sub-verification device includes a third integration module and a third exchange module, and determining that the mode of the third sub-verification device is the receiving mode specifically may include: configuring a third integrated module according to the control instruction; and the configured third integrated module controls the third switching module.
Understandably, the third integrated module in the third sub-verification device is directly configured through the control instruction, the third integrated module is configured to be in a working state, then the third integrated module configures the third switching module, that is, the third integrated module controls the third switching module to perform data transmission, the third switching module is regarded as an internal component of the third integrated module, and the third sub-verification device is in a receiving mode according to the configuration rule.
Illustratively, referring to fig. 4, the third integration module 431 in the third sub-authentication device 430 controls the third switching module 434 to receive the time data sent by the second sub-authentication device 420 and perform time synchronization, and the dotted line indicates that the first processor 432 sends configuration information to the second processor 435, where the configuration information may be transmitted by the ethernet interface.
It can be understood that the modes of the first sub-authentication device, the second sub-authentication device, and the third sub-authentication device may be configured to different modes according to application requirements, for example, the first sub-authentication device may also be configured to a forwarding mode, the second sub-authentication device may be configured to a receiving mode, the third sub-authentication device may be configured to a sending mode, and the like through a control instruction. The number of the sub-authentication devices included in the authentication device at least includes 3, and the 3 sub-authentication devices need to be configured as a sending mode, a forwarding mode and a receiving mode respectively, and the mode and the number which meet the above-defined configuration of each sub-authentication device can be determined according to the user requirements.
According to the time-sensitive network verification method provided by the embodiment of the disclosure, the first sub-verification device, the second sub-verification device and the third sub-verification device which are included in the verification device can be respectively determined through the control instruction, the verification of the time-sensitive network is completed in the mode corresponding to each sub-verification device, the verification speed is high, the structures of the sub-verification devices are the same, the mode of each sub-verification device only needs to be determined according to the control instruction, different functions are realized in different modes, the investigation, model selection and other work of the device are not needed for the time-sensitive network verification in various scenes, and the waste of manpower and material resources can be reduced.
On the basis of the foregoing embodiment, optionally, in the mode of the authentication device, the time-sensitive network is authenticated, which includes the following steps S510 to S530 as shown in fig. 5:
s510, in the sending mode of the first sub-verification device, the first sub-verification device generates first time data and sends the first time data to the second sub-verification device.
Understandably, after the first sub-verification device is determined to be in the sending mode, the first integration module and the first exchange module generate and send data according to the configuration rule in the sending mode, the first sub-verification device generates first time data to serve as a master clock, and the first time data is sent to the second sub-verification device.
Optionally, according to the configuration rule in the sending mode, the data transmission inside the first sub-verification device includes: the first configured integrated module generates first time data and sends the first time data to the first configured exchange module; and the first configured exchange module performs time synchronization according to the first time data and sends the updated first time data to the second sub-verification equipment.
Understandably, the first integrated module configured in the first sub-verification device generates time data, and specifically, the first processor in the first integrated module generates first time data and transmits the first time data to the first switching module through the ethernet interface of the ethernet controller; the first switching module receives the first time data through the Ethernet interface, performs time synchronization according to the first time data, generates updated first time data after the time synchronization is completed, and transmits the updated first time data to the second sub-verification device through the Ethernet interface.
Illustratively, referring to fig. 6, the mode of the first sub-authentication device 610 is a sending mode, in which the first processor 613 in the configured first integration module 611 generates first time data and transmits the first time data to the ethernet interface 616 in the first switching module 612 through the ethernet interface 615 in the ethernet controller 614; the ethernet interface 616 in the first switching module 612 receives the first time data, performs time synchronization according to the first time data, and after the time synchronization is completed, the second processor 617 generates updated first time data and transmits the updated first time data to the ethernet interface 623 in the second sub-authentication device 620 through the ethernet interface 618. The remaining ethernet interfaces in the first sub authentication device 610, the second sub authentication device 620 and the third sub authentication device 630 are not subjected to data transmission temporarily.
S520, under the forwarding mode of the second sub-verification device, the second sub-verification device performs time synchronization according to the first time data and sends the generated second time data to a third sub-verification device.
Understandably, on the basis of the above S510, after the second sub verification device is determined to be in the forwarding mode and the configuration of the second sub verification device is completed, the second sub verification device performs time synchronization according to the received first time data, and after the time synchronization is completed, the second sub verification device generates second time data and sends the second time data to the third sub verification device through the ethernet interface.
Optionally, according to the configuration rule of the forwarding mode, the data transmission inside the second sub-verification device includes: and the second configured exchange module performs time synchronization according to the updated first time data and sends the generated second time data to the third sub-verification device.
Understandably, on the basis of the above S510, the configured second switching module receives the updated first time data sent by the first sub-verification device through the ethernet interface, and performs time synchronization according to the updated first time data, and after the time synchronization is completed, the second switching module generates second time data and sends the second time data to the third sub-verification device through the ethernet interface.
For example, referring to fig. 6, the second sub-verification device 620 is in a forwarding mode, in the forwarding mode, the second switching module 621 receives, through the ethernet interface 623, the updated first time data transmitted by the ethernet interface 618 in the first sub-verification device 610, and performs time synchronization according to the updated first time data, and after the second switching module 621 completes the time synchronization, the second processor 622 generates second time data, and sends the second time data to the third sub-verification device 630 through the ethernet interface 624.
And S530, in the receiving mode of the third sub-authentication device, the third sub-authentication device performs time synchronization according to the second time data.
Understandably, on the basis of the above S520, after determining that the mode of the third sub authentication device is the receiving mode, the third sub authentication device receives the second time data through the ethernet interface, and performs time synchronization according to the second time data.
Optionally, according to the configuration rule of the receiving mode, the data transmission inside the third sub-authentication device includes: and the configured third integrated module controls the third exchange module to carry out time synchronization according to the second time data.
Understandably, on the basis of the above S520, in the forwarding mode of the third sub-authentication device, the third integration module in the third sub-authentication device controls the ethernet interface in the third switching module to receive the second time data transmitted by the second sub-authentication device, and the third integration module and the third switching module perform time synchronization according to the second time data.
For example, referring to fig. 6, the third integration module 631 in the third sub-authentication device 630 controls the ethernet interface 638 in the third switching module 635 to receive the second time data transmitted by the ethernet interface 624 in the second sub-authentication device 620, and the third integration module 631 and the third switching module 635 perform time synchronization according to the second time data, where the third integration module 631 transmits configuration information to the third switching module 635 through the ethernet interface 634 in the ethernet controller 633, the configuration information is used to control the third switching module 635 to perform time synchronization and data reception, the ethernet interface 636 in the third switching module 635 receives the configuration information transmitted by the ethernet interface 634, that is, the ethernet interface 636 and the ethernet interface 634 are used as internal interfaces, and do not have the characteristics of time-sensitive ethernet and are used only for internal data communication, and the ethernet interface included in the third switching module 635 has the characteristics of time-sensitive ethernet and is used in the group of time-sensitive networks.
The method for verifying the time-sensitive network provided by the embodiment of the disclosure includes determining modes of three sub-verification devices through a control instruction, completing verification of the time-sensitive network in the modes corresponding to the sub-verification devices, generating first time data by a first sub-verification device, sending the first time data to a second sub-verification device, then performing time synchronization by the second sub-verification device according to the first time data, generating second time data after time synchronization is completed, sending the second time data to a third sub-verification device, performing time synchronization by the third sub-verification device according to the second time data, completing verification of the time-sensitive network, configuring different modes for the sub-verification devices, enabling the sub-verification devices to bear different functions, achieving different functions in the modes corresponding to the sub-verification devices, being strong in flexibility, simple and convenient to operate, being applicable to multiple scenes, being strong in universality, guaranteeing ordered transmission of the time data, and being capable of achieving quick verification of the time-sensitive network.
On the basis of the foregoing embodiments, the present disclosure further includes a schematic structural diagram of an authentication apparatus as shown in fig. 7, where the authentication apparatus in fig. 7 includes 6 sub-authentication apparatuses, where 1 first sub-authentication apparatus 710,2 in a forwarding mode and 1 second sub-authentication apparatus 730 and 740,3 in a receiving mode are included, and the time data transmission process for authenticating (time synchronizing) a time sensitive network based on the sub-authentication apparatuses includes:
the transmission process of the time data in the first sub authentication device 710 includes: the first processor 713 in the first integration module 711 generates first time data and transmits the first time data to the first switching module 712 through an ethernet interface in the ethernet processor 714, the first switching module 712 performs time synchronization according to the first time data, and after the time synchronization is completed, the second processor 715 generates updated first time data and transmits the updated first time data to the second sub-verification device 730 through the ethernet interface 716; the ethernet interface of the ethernet processor 714 and the ethernet interface 716 correspond to a master clock interface, and the ethernet interface of the first switching module 712 and the ethernet interface of the ethernet processor 714 for data transmission corresponds to a slave clock interface.
The transmission process of the time data in the second sub-authentication device 730 includes: the ethernet interface 733 of the second switching module 731 receives the updated first time data, the second switching module 731 performs time synchronization according to the updated first time data, after the time synchronization is completed, the second processor 732 generates second time data, transmits the second time data to the third sub-verification device 750 through the ethernet interface 734, transmits the second time data to the third sub-verification device 760 through the time ethernet interface 735, and transmits the second time data to the second sub-verification device 740 through the time ethernet interface 736; the ethernet interface 733 corresponds to a slave clock interface, and the ethernet interface 734, the ethernet interface 735, and the ethernet interface 736 correspond to a master clock interface.
The third sub-verification device 750 receives the second time data through the ethernet interface 756 and performs data synchronization according to the second time data, wherein the first processor 753 in the third integration module 751 transmits the configuration information to the third switching module 752 through the ethernet interface in the ethernet controller 754 to configure the second processor 755; here, the ethernet interface 756 corresponds to a slave clock interface.
The third sub-authentication device 760 receives the second time data through the ethernet interface 766 and performs data synchronization according to the second time data, wherein the first processor 763 in the third integration module 761 transmits the configuration information to the third switching module 762 through the ethernet interface in the ethernet controller 764, so as to configure the second processor 765; the ethernet interface 766 corresponds to a slave clock interface.
The second sub-verification device 740 receives the second time data through the ethernet interface 743, the second switching module 741 performs time synchronization according to the second time data, and after the time synchronization is completed, the second processor 742 in the second switching module 741 generates third time data and transmits the third time data to the third sub-verification device 720 through the ethernet interface 744; here, the ethernet interface 743 corresponds to a slave clock interface, and the ethernet interface 744 corresponds to a master clock interface.
The third sub-verification device 720 receives the third time data through the ethernet interface 726, and performs data synchronization according to the third time data, where the first processor 723 in the third integration module 721 transmits the configuration information to the third switching module 722 through the ethernet interface in the ethernet controller 724 to configure the second processor 725; here, the ethernet interface 726 corresponds to a slave clock interface.
Fig. 8 is a schematic structural diagram of a time-sensitive network authentication apparatus according to an embodiment of the present disclosure. The time-sensitive network verification apparatus provided in the embodiment of the present disclosure may perform the processing procedure provided in the embodiment of the time-sensitive network verification method, as shown in fig. 8, the time-sensitive network verification apparatus 800 includes:
an obtaining unit 810, configured to obtain a target requirement of a time sensitive network to be verified;
a generating unit 820, configured to generate a control instruction according to a target requirement;
a determining unit 830 for determining a mode of the authentication device by the control instruction;
the verification unit 840 is configured to generate a verification instruction in the mode of the verification device, where the verification instruction is used to verify the time-sensitive network.
Optionally, the authentication device in the authentication apparatus 800 includes a plurality of sub-authentication devices.
Optionally, the determining unit 830 determines the mode of the verification device through the control instruction, and is specifically configured to:
determining that the mode of the first sub-verification device is a sending mode through the control instruction;
determining that the mode of the second sub-verification device is a forwarding mode through the control instruction;
and determining the mode of the third sub-authentication device as a receiving mode through the control instruction.
Optionally, in the verification unit 840, in the mode of the verification device, the time-sensitive network is verified, which is specifically configured to:
under the sending mode of the first sub-verification device, the first sub-verification device generates first time data and sends the first time data to the second sub-verification device;
under the forwarding mode of the second sub-verification device, the second sub-verification device performs time synchronization according to the first time data and sends the generated second time data to a third sub-verification device;
in a reception mode of the third sub authentication device, the third sub authentication device performs time synchronization according to the second time data.
Optionally, a first sub-authentication device in the authentication apparatus 800 includes a first integrated module and a first exchange module.
Optionally, the verification unit 840 determines, through the control instruction, that the mode of the first sub-verification device is the transmission mode, and specifically is configured to:
and respectively configuring the first integration module and the first exchange module according to the control instruction.
Optionally, in the verification unit 840, in the sending mode of the first sub-verification device, the first sub-verification device generates first time data, and sends the first time data to the second sub-verification device, which is specifically configured to:
the first configured integrated module generates first time data and sends the first time data to the first configured exchange module;
and the first configured exchange module performs time synchronization according to the first time data and sends the updated first time data to the second sub-verification equipment.
Optionally, a second sub-authentication device in the authentication devices in the authentication apparatus 800 includes a second switching module.
Optionally, the verification unit 840 determines, through the control instruction, that the mode of the second sub-verification device is the forwarding mode, and specifically is configured to:
and configuring the second exchange module according to the control instruction.
Optionally, in the verification unit 840, in a forwarding mode of the second sub-verification device, the second sub-verification device performs time synchronization according to the first time data, and sends the generated second time data to the third sub-verification device, where the second sub-verification device is specifically configured to:
and the second configured exchange module performs time synchronization according to the updated first time data and sends the generated second time data to the third sub-verification device.
Optionally, a third sub-authentication device in the authentication devices in the authentication apparatus 800 includes a third integrated module and a third exchange module.
Optionally, the verification unit 840 determines that the mode of the third sub-verification device is the receiving mode through the control instruction, and is specifically configured to:
configuring a third integrated module according to the control instruction;
and the configured third integrated module controls the third switching module.
Optionally, in the verification unit 840, in the receiving mode of the third sub-verification device, the third sub-verification device performs time synchronization according to the second time data, and is specifically configured to:
and the configured third integrated module controls the third exchange module to carry out time synchronization according to the second time data.
Optionally, the second switching module in the second sub-authentication device in the authentication unit 840 includes a plurality of interfaces.
Optionally, the second exchange module configured in the verification unit 840 performs time synchronization according to the updated first time data, and sends the generated second time data to the third sub-verification device, where the second exchange module is specifically configured to:
and the second configured exchange module receives the updated first time data through the first interface, performs time synchronization according to the updated first time data, and sends the generated second time data to the third sub-verification device through the second interface.
The time-sensitive network authentication apparatus in the embodiment shown in fig. 8 may be used to implement the technical solution of the time-sensitive network authentication method in the above embodiment, and the implementation principle and the technical effect are similar, which are not described herein again.
Fig. 9 is a schematic structural diagram of an electronic device according to an embodiment of the present disclosure. The electronic device provided in the embodiment of the present disclosure may execute the processing procedure provided in the above time-sensitive network verification method, as shown in fig. 9, the electronic device 900 includes: a processor 910, a communication interface 920, and a memory 930; wherein the computer program is stored in the memory 930 and configured to be executed by the processor 910 for the time-sensitive network authentication method as described above.
In addition, the embodiment of the present disclosure also provides a computer readable storage medium, on which a computer program is stored, where the computer program is executed by a processor to implement the time-sensitive network authentication method described in the foregoing embodiment.
Furthermore, the disclosed embodiments also provide a computer program product comprising a computer program or instructions which, when executed by a processor, implement the time-sensitive network authentication method as described above.
It is noted that, in this document, relational terms such as "first" and "second," and the like, may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising a … …" does not exclude the presence of another identical element in a process, method, article, or apparatus that comprises the element.
The foregoing are merely exemplary embodiments of the present disclosure, which enable those skilled in the art to understand or practice the present disclosure. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the disclosure. Thus, the present disclosure is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

1. A method of time-sensitive network authentication, comprising:
acquiring a target requirement of a time sensitive network to be verified;
generating a control instruction according to the target requirement;
determining the mode of the verification device through the control instruction;
and generating a verification instruction in the mode of the verification device, wherein the verification instruction is used for verifying the time-sensitive network.
2. The method of claim 1, wherein the authentication device comprises a plurality of sub-authentication devices, and wherein determining the mode of the authentication device via the control instruction comprises:
determining that the mode of the first sub-verification device is a sending mode through the control instruction;
determining that the mode of the second sub-verification device is a forwarding mode through the control instruction;
and determining the mode of the third sub-authentication device as a receiving mode through the control instruction.
3. The method of claim 2, wherein the authenticating the time-sensitive network in the authentication device mode comprises:
under a sending mode of the first sub-verification device, the first sub-verification device generates first time data and sends the first time data to the second sub-verification device;
in a forwarding mode of the second sub-verification device, the second sub-verification device performs time synchronization according to the first time data, and sends the generated second time data to the third sub-verification device;
and under the receiving mode of the third sub-verification device, the third sub-verification device performs time synchronization according to the second time data.
4. The method according to claim 3, wherein the first sub authentication device comprises a first integration module and a first switching module, and the determining, by the control instruction, that the mode of the first sub authentication device is the transmission mode comprises:
respectively configuring the first integration module and the first exchange module according to the control instruction;
in the sending mode of the first sub-verification device, the first sub-verification device generates first time data and sends the first time data to the second sub-verification device, and the method includes:
the first configured integrated module generates first time data and sends the first time data to the first configured switching module;
and the first exchange module which completes the configuration performs time synchronization according to the first time data and sends the updated first time data to the second sub-verification equipment.
5. The method according to claim 4, wherein the second sub-authentication device comprises a second switching module, and the determining, by the control instruction, that the mode of the second sub-authentication device is the forwarding mode comprises:
configuring the second exchange module according to the control instruction;
in the forwarding mode of the second sub-authentication device, the second sub-authentication device performs time synchronization according to the first time data, and sends the generated second time data to the third sub-authentication device, including:
and the second configured exchange module performs time synchronization according to the updated first time data and sends the generated second time data to the third sub-verification device.
6. The method according to claim 5, wherein the third sub authentication device comprises a third integrated module and a third switching module, and the determining, by the control instruction, that the mode of the third sub authentication device is the receiving mode comprises:
configuring the third integrated module according to the control instruction;
the configured third integrated module controls the third exchange module;
in a receiving mode of the third sub authentication device, the time synchronization performed by the third sub authentication device according to the second time data includes:
and the configured third integrated module controls the third exchange module to perform time synchronization according to the second time data.
7. The method according to claim 5, wherein the second switching module in the second sub authentication device includes a plurality of interfaces, and the configured second switching module performs time synchronization according to the updated first time data and sends the generated second time data to the third sub authentication device, including:
and the second exchange module after configuration receives the updated first time data through a first interface, performs time synchronization according to the updated first time data, and sends the generated second time data to the third sub-verification device through a second interface.
8. A time-sensitive network authentication apparatus, comprising:
the device comprises an acquisition unit, a verification unit and a verification unit, wherein the acquisition unit is used for acquiring the target requirement of the time sensitive network to be verified;
the generating unit is used for generating a control instruction according to the target requirement;
a determination unit configured to determine a mode of the authentication device by the control instruction;
and the verification unit is used for generating a verification instruction in the mode of the verification device, and the verification instruction is used for verifying the time-sensitive network.
9. An electronic device, comprising:
a memory;
a processor; and
a computer program;
wherein the computer program is stored in the memory and configured to be executed by the processor to implement the time-sensitive network authentication method of any of claims 1 to 7.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the time-sensitive network authentication method according to any one of claims 1 to 7.
CN202111016131.5A 2021-08-02 2021-08-31 Time-sensitive network verification method, device, equipment and storage medium Pending CN115913961A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110882809 2021-08-02
CN2021108828091 2021-08-02

Publications (1)

Publication Number Publication Date
CN115913961A true CN115913961A (en) 2023-04-04

Family

ID=85729441

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202111016131.5A Pending CN115913961A (en) 2021-08-02 2021-08-31 Time-sensitive network verification method, device, equipment and storage medium
CN202111013384.7A Pending CN115913960A (en) 2021-08-02 2021-08-31 Time-sensitive network verification equipment, method, device, system and medium

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN202111013384.7A Pending CN115913960A (en) 2021-08-02 2021-08-31 Time-sensitive network verification equipment, method, device, system and medium

Country Status (1)

Country Link
CN (2) CN115913961A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1462132A (en) * 2002-05-30 2003-12-17 安捷伦科技有限公司 Testing network communication
US20110317587A1 (en) * 2010-06-27 2011-12-29 Valens Semiconductor Ltd. Methods and systems for time sensitive networks
CN106161132A (en) * 2015-04-17 2016-11-23 伊姆西公司 For the apparatus and method that storage network is tested
CN109639493A (en) * 2018-12-20 2019-04-16 新华三技术有限公司 The network equipment, behavior control device and TSN configuration method
CN112769514A (en) * 2020-12-22 2021-05-07 国家电网有限公司 Time-sensitive based communication device

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2400770B (en) * 2003-04-17 2006-03-22 Agilent Technologies Inc Testing network communications
US10218628B2 (en) * 2017-04-12 2019-02-26 General Electric Company Time sensitive network (TSN) scheduler with verification
CN110380923B (en) * 2019-06-11 2021-06-29 国网浙江省电力有限公司杭州供电公司 In-situ component protection ring network testing device
CN112105080B (en) * 2020-11-18 2021-02-12 之江实验室 Time-sensitive network data transmission system and transmission method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1462132A (en) * 2002-05-30 2003-12-17 安捷伦科技有限公司 Testing network communication
US20110317587A1 (en) * 2010-06-27 2011-12-29 Valens Semiconductor Ltd. Methods and systems for time sensitive networks
CN106161132A (en) * 2015-04-17 2016-11-23 伊姆西公司 For the apparatus and method that storage network is tested
CN109639493A (en) * 2018-12-20 2019-04-16 新华三技术有限公司 The network equipment, behavior control device and TSN configuration method
CN112769514A (en) * 2020-12-22 2021-05-07 国家电网有限公司 Time-sensitive based communication device

Also Published As

Publication number Publication date
CN115913960A (en) 2023-04-04

Similar Documents

Publication Publication Date Title
CN111865830B (en) Processing method, device and system for time delay sensitive network service TSN
CN110121180B (en) Data analysis device, system and method
CN110740460B (en) Network access method and device of equipment, network equipment and storage medium
CN109151913B (en) Service quality control method and related device
CN103346974B (en) Controlling method of service process and network device
EP3836577B1 (en) Session management method and device for user groups
CN103974376A (en) Network connection assisting system and method
CN113810206B (en) Network automation arrangement management method, entity, controller and electronic equipment
JP6512725B2 (en) Method, apparatus, and system for connecting a node to a network
CN111865633A (en) Communication method, device and system
CN111698787B (en) Scheduling rule determining method and device
CN115913961A (en) Time-sensitive network verification method, device, equipment and storage medium
US10149139B2 (en) Connection control method by communication terminal
Senk et al. Open-source testbeds for integrating time-sensitive networking with 5g and beyond
WO2019100796A1 (en) Network performance guarantee method and apparatus
CN107466018B (en) Data transmission method of terminal equipment and terminal equipment
CN115733849A (en) Flash method, device, system, equipment and storage medium of electronic control unit
JP2023012870A (en) Communication device, communication method, and program
CN115994057A (en) Chip bus detection method and device, electronic equipment and storage medium
CN112512022A (en) TSN industrial application server, client, system, service method and storage medium
Habibi et al. Analyzing SDN-based vehicular network framework in 5G services: fog and Mobile edge computing
CN114980248B (en) Wireless networking method, device, equipment and storage medium
CN116599871B (en) Network time delay determining method and related device
CN113014648B (en) Small node group dynamic forwarding hybrid routing method and related equipment
CN116546112A (en) Hybrid networking protocol design method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination