WO2016095417A1 - 接入控制方法及装置 - Google Patents

接入控制方法及装置 Download PDF

Info

Publication number
WO2016095417A1
WO2016095417A1 PCT/CN2015/078982 CN2015078982W WO2016095417A1 WO 2016095417 A1 WO2016095417 A1 WO 2016095417A1 CN 2015078982 W CN2015078982 W CN 2015078982W WO 2016095417 A1 WO2016095417 A1 WO 2016095417A1
Authority
WO
WIPO (PCT)
Prior art keywords
packet
bucket
deficit
access control
long
Prior art date
Application number
PCT/CN2015/078982
Other languages
English (en)
French (fr)
Inventor
马明杰
李争齐
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2016095417A1 publication Critical patent/WO2016095417A1/zh

Links

Images

Definitions

  • the present invention relates to the field of communications, and in particular to an access control method and apparatus.
  • the quality of service (QoS of Service, QOS for short) is proposed.
  • QoS of Service QoS of Service
  • the purpose of development is to improve the end-to-end service guarantee for users' different business needs.
  • the most widely used is the differential service model, namely Diff-Serv model, which includes packet classification, traffic policing, congestion management, and congestion avoidance.
  • Traffic shaping, traffic policing is the monitoring and control of the traffic rate of a service entering the network, limiting it to a certain allowable range. If the traffic of a connected packet is too large, it exceeds the rate specified by the service. The maximum value is discarded, so that the resources of the network bandwidth are properly allocated and utilized.
  • FIG 1 is a schematic diagram of a traffic policing deficit bucket in the related art.
  • a Commit Access Rate (CAR) is a technology used for traffic policing. It is used to monitor traffic entering the ISP network.
  • the method includes a traffic classification service for the traffic to be supervised.
  • the method adopted is a deficit bucket algorithm. Each service has a corresponding number of tokens. The token is put into the deficit bucket at a specified rate, and the service packet is sent.
  • the above-mentioned traditional traffic policing implementation method has a problem that when the token in the deficit bucket is not enough for the short packet service, it directly causes the interruption of the long packet service, because the relationship with the implementation principle is short. Because the packet length is short, the short packet has the token corresponding to the length of the token. If the short packet does not take the corresponding token number, then the length does not have the token corresponding to the long packet. Because the long package requires more tokens, the long package service is interrupted because it does not get enough tokens.
  • the embodiment of the present invention provides an access control method and apparatus, so as to solve at least the problem that the long packet service is interrupted in the case that the token in the deficit bucket is not enough for the short packet service in the related art.
  • an access control method including: in the case that a short packet loss is detected, delivering a deficit bucket that provides a token only for a long packet, wherein the short packet is a data packet whose packet size is smaller than a first predetermined threshold, where the long packet is a data packet whose packet size is not less than the first predetermined threshold; and the long packet is subjected to access control according to the delivered deficit bucket.
  • the method further includes: acquiring the traffic of the service; and the obtained traffic of the network service is greater than the second threshold. Next, the delivery of the deficit bucket is turned on.
  • the method further includes: closing the delivered deficit bucket if the acquired network traffic volume is less than a second threshold.
  • the method further includes: filling the deficit bucket with the token at a predetermined rate for the long packet acquisition.
  • the method before performing the access control on the long packet according to the delivered deficit bucket, the method further includes: determining whether the packet corresponding to the long packet meets an access control list (ACL) rule In the case where the determination result is yes, the long packet is subjected to access control according to the delivered deficit bucket.
  • ACL access control list
  • an access control apparatus including: a delivery module, configured to deliver a deficit bucket that only provides a token for a long packet, in the case that a packet loss is detected, wherein The short packet is a data packet whose data packet size is smaller than a first predetermined threshold, and the long packet is a data packet whose data packet size is not less than the first predetermined threshold; and the access control module is configured to be according to the delivery.
  • the deficit bucket performs access control on the long packet.
  • the device further includes: an obtaining module, configured to acquire traffic of the service; and an opening module, configured to enable the delivered deficit bucket if the acquired traffic of the network service is greater than a second threshold.
  • the device further includes: a closing module, configured to close the delivered deficit bucket if the acquired network traffic volume is less than a second threshold.
  • the apparatus further includes: a filling module configured to fill the submitted deficit bucket with a token for the long packet acquisition at a predetermined rate.
  • the device further includes: a determining module, configured to determine whether the packet corresponding to the long packet meets an access control list ACL rule; and if the judgment result is yes, according to the delivered deficit bucket Performing access control on the long packet.
  • a deficit bucket that provides a token only for a long packet is used, wherein the short packet is a data packet whose data packet size is smaller than a first predetermined threshold.
  • the long packet is a data packet whose packet size is not less than the first predetermined threshold; the access control is performed according to the delivered deficit bucket, and the short token of the token in the deficit bucket in the related art is solved.
  • FIG. 1 is a schematic diagram of a traffic policing deficit bucket in the related art
  • FIG. 2 is a flowchart of an access control method according to an embodiment of the present invention.
  • FIG. 3 is a block diagram of an access control apparatus according to an embodiment of the present invention.
  • FIG. 4 is a block diagram of an access control apparatus according to Embodiment 1 of the present invention.
  • Figure 5 is a block diagram of an access control apparatus according to a second embodiment of the present invention.
  • FIG. 6 is a block diagram of an access control apparatus according to a third embodiment of the present invention.
  • FIG. 7 is a block diagram of an access control apparatus according to Embodiment 4 of the present invention.
  • FIG. 8 is a schematic diagram of a working principle of a traffic policing token bucket according to an embodiment of the present invention.
  • FIG. 9 is a flow diagram of processing a service message in accordance with an implementation of the present invention.
  • FIG. 2 is a flowchart of an access control method according to an embodiment of the present invention. As shown in FIG. 2, the process includes the following steps:
  • Step S202 in the case that a short packet loss is detected, delivering a deficit bucket that only provides a token for the long packet, wherein the short packet is a data packet whose data packet size is smaller than a first predetermined threshold, and the long packet is a data packet. a data packet having a size not less than the first predetermined threshold;
  • Step S204 performing access control on the long packet according to the delivered deficit bucket.
  • the delivery only provides a token bucket for the long packet, wherein the short packet is a data packet whose packet size is smaller than the first predetermined threshold, according to the delivered deficit.
  • the bucket controls access to the long packet, and solves the problem that the token in the deficit bucket is not enough for the short packet service in the related art, which causes the long packet service to be interrupted, thereby ensuring that the long packet can obtain the token. Avoid interruption of long-package business.
  • the traffic of the service is obtained; if the obtained traffic of the network service is greater than the second threshold, the delivery may be started.
  • the deficit bucket ensures that the long packet can retrieve the token if the packet traffic is large.
  • the delivered deficit bucket After the access control of the long packet is performed according to the delivered deficit bucket, if the acquired traffic of the network is less than the second threshold, that is, the traffic of the packet returns to normal, and the delivered deficit bucket may be closed, thereby reducing Waste of resources.
  • the token After delivering the deficit bucket that only provides the token for the long packet, the token is filled with the token at the predetermined rate for the long packet to be acquired, and the long packet is prepared for the token.
  • the access control list ACL rule Before performing the access control on the long packet according to the delivered deficit bucket, it is also possible to determine whether the packet corresponding to the long packet meets the access control list ACL rule, and if the judgment result is yes, that is, only the long packet is ensured.
  • the token can be obtained from the delivered deficit bucket, and the long packet is controlled according to the delivered deficit bucket.
  • the embodiment of the present invention further provides an access control device, which is configured to implement the foregoing embodiments and preferred embodiments, and has not been described again.
  • the term "module” may implement a combination of software and/or hardware of a predetermined function.
  • the apparatus described in the following embodiments is preferably implemented in software, hardware, or a combination of software and hardware, is also possible and contemplated.
  • FIG. 3 is a block diagram of an access control apparatus according to an embodiment of the present invention. As shown in FIG. 3, the method includes: a delivery module 32 and an access control module 34. The following briefly describes each module.
  • the delivery module 32 is configured to deliver a deficit bucket that only provides a token for the long packet when the packet loss is detected, wherein the short packet is a data packet whose packet size is smaller than a first predetermined threshold, the long packet a data packet whose packet size is not less than the first predetermined threshold;
  • the access control module 34 is configured to perform access control on the long packet according to the delivered deficit bucket.
  • FIG. 4 is a block diagram of an access control apparatus according to a first embodiment of the present invention. As shown in FIG. 4, the apparatus further includes:
  • the obtaining module 42 is configured to obtain traffic of the service
  • the opening module 44 is configured to enable the delivered deficit bucket if the acquired traffic of the network service is greater than a second threshold.
  • FIG. 5 is a block diagram of an access control apparatus according to Embodiment 2 of the present invention. As shown in FIG. 5, the apparatus further includes:
  • the closing module 52 is configured to close the delivered deficit bucket if the acquired network traffic is less than a second threshold.
  • FIG. 6 is a block diagram of an access control apparatus according to Embodiment 3 of the present invention. As shown in FIG. 6, the apparatus further includes:
  • the padding module 62 is configured to populate the delivered deficit bucket with a token for the long packet acquisition at a predetermined rate.
  • FIG. 7 is a block diagram of an access control apparatus according to Embodiment 4 of the present invention. As shown in FIG. 7, the apparatus further includes:
  • the determining module 72 is configured to determine whether the packet corresponding to the long packet meets the access control list ACL rule, and is configured to perform access control on the long packet according to the delivered deficit bucket if the determination result is yes.
  • the optional embodiment relates to a Packet Transport Network (PTN).
  • PTN Packet Transport Network
  • QOS and CAR traffic control of the network how to ensure that the short packet service traffic is judged by the packet length is reasonable. Control the bucket depth of the token bucket and allocate the tokens in the token bucket reasonably to ensure that the long packet service can also obtain a certain number of tokens.
  • multi-service access if the customer service has exhausted the token in the upstream traffic policing token bucket, how to ensure that the long-packet traffic can also be guaranteed if the subsequent network has long-packet traffic. A certain number of service packages get the corresponding number of tokens.
  • FIG. 8 A schematic diagram of the working principle of the traffic policing token bucket according to the embodiment of the present invention, as shown in FIG. 8, includes the following contents:
  • the multi-service configuration is established and saved for the access NE, and the association table of the included service entries is configured and saved.
  • the access network element is in a normal service, the access service data packet is classified according to the related field of the data packet, and the access control list (ACL) is classified and processed.
  • the classification usually refers to the data packet quintuple field. Of course, it is different according to the product, and the service packet is distinguished to implement the QOS differential service.
  • the access network element allocates a bandwidth service of a specified size to each matching rule, that is, traffic policing, and the reasonable allocation of the network bandwidth resources of the user, which is mainly based on the service requirement of the user. And the operator's control over the access bandwidth of different services.
  • the client will allocate the bandwidth resources of the network in advance, that is, configure traffic policing parameters, Cir (committed access rate), CBS (C bucket burst traffic size), Pir (peak access rate), PBS (P bucket burst). Flow size).
  • the packet length identification process is sent, that is, the length of the packet of the current service is judged; when the short packet service is lost in the network traffic supervision, the deficit bucket switch can be opened, so that the long packet traffic can also be correspondingly obtained.
  • the network element may be configured with a deficit bucket, and the specific implementation scheme of the bucket may be at the source P. On the basis of the bucket, adjust the size of the P bucket accordingly.
  • a PTN access network element is connected to the access NE of the user.
  • the virtual local area network (Vlan) is used as a means for user isolation. Or the service is assigned a separate Virtual Local Area Network Identification (Vlan ID).
  • Vlan ID Virtual Local Area Network Identification
  • the ACL entry needs to be sent.
  • the field and ACL are parsed.
  • the issued Rule rule entries are compared to see if the packet is in compliance with the ACL control. If the above-mentioned packet matches the above ACL rule, the specified packet is matched with the specified rule.
  • the CIR, CBS, PIR, and PBS parameters are delivered.
  • the traffic matching the rule will be allocated according to the traffic policing parameters. If the packets do not match when the ACL matches, Not performed in accordance with the specified traffic policing process. On the traffic matching the traffic policing, there will be a judgment here to determine the length of the packet, and then the deficit bucket switch is enabled. The deficit bucket will fill the token at a certain rate, and this part of the token is judged by the previous length. Package the business to get its token.
  • FIG. 9 is a flowchart of processing a service packet according to an implementation of the present invention. As shown in FIG. 9, the method includes the following steps:
  • Step S902 receiving a data frame
  • Step S904 determining whether the message belongs to the message of the service, if the determination result is no, step S906 is performed, and if the determination result is yes, step S908 and step S910 are performed;
  • Step S906 discarding the message
  • Step S908 parsing the message field
  • Step S910 determining a service packet length
  • Step S912 it is determined whether the parsed field matches the upper ACL rule, if the determination result is no, step S914 is performed, and if the determination result is yes, step S916 is performed;
  • Step S914 normal forwarding, no traffic supervision
  • Step S916 Perform traffic supervision on the packet according to the behavior of the matching rule.
  • Step S918, determining whether the current network traffic needs to open the deficit bucket, if the determination result is no, step S920 is performed, and if the determination result is yes, step S922 is performed;
  • Step S920 not opening the delivered deficit bucket
  • Step S922 in the case of a long-package service, turning on the delivered deficit bucket
  • step S924 the long packet service can take the token.
  • modules or steps of the present invention described above can be implemented by a general-purpose computing device that can be centralized on a single computing device or distributed across a network of multiple computing devices. Alternatively, they may be implemented by program code executable by the computing device such that they may be stored in the storage device by the computing device and, in some cases, may be different from the order herein. Perform the steps shown or described, or separate them into individual integrated circuit modules, or Multiple of these modules or steps are fabricated as a single integrated circuit module. Thus, the invention is not limited to any specific combination of hardware and software.
  • an access control method and apparatus provided by an embodiment of the present invention have the following beneficial effects: by ensuring that a long packet can acquire a token, thereby avoiding interruption of a long packet service.

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

本发明公开了一种接入控制方法及装置,其中,该方法包括:在检测到短包丢包的情况下,投递只为长包提供令牌的赤字桶,其中,该短包为数据包大小小于第一预定阈值的数据包,该长包为数据包大小不小于该第一预定阈值的数据包;依据投递的该赤字桶对该长包进行接入控制。通过本发明,解决了相关技术中赤字桶中的令牌不够短包业务取到的情况下,导致了长包业务中断的问题,从而保证长包能够取到令牌,避免了长包业务的中断。

Description

接入控制方法及装置 技术领域
本发明涉及通信领域,具体而言,涉及一种接入控制方法及装置。
背景技术
随着当前网络发展的迅猛发展,人们对网络的服务质量也提出了新的需求,提高信息在IP网络上传输的质量显得尤为重要,IP服务质量(Quality of Service,简称为QOS)的提出和开发,目的就是为了提高用户对不同业务需求的端到端服务保证,其中应用最广的就是差分服务模型,即Diff-Serv模型,该服务模型包括数据包分类、流量监管、拥塞管理、拥塞避免、流量整形等技术,流量监管,就是对进入网络的某业务的流量速率的监督和控制,限制它在某个允许的范围,若某个连接的报文流量过大,超出业务所指定的速率最大值,就丢弃该报文,以保护网络带宽的资源合理的分配和利用。
图1是相关技术中流量监管赤字桶的示意图,如图1所示,承诺访问速率(Commit Access Rate,简称为CAR),就是用于流量监管的一项技术,它用于监管进入ISP网络流量,包括对所监管流量的流分类服务,采用的方法就是赤字桶的算法,每种业务都拥有相应数量的令牌(Token),令牌按照指定的速率投入到赤字桶中,而业务报文要想通过,则必须取到对应包长的令牌数量,赤字桶的特点,其可以被看成是一个存放令牌的容器,所有其有相对应的容量,当桶中的令牌满的情况下,多出的令牌将会被溢出,桶中可以被取的令牌数就不再增加。
上述传统的流量监管实现方式,存在一个问题,就是当赤字桶中的令牌不够短包业务取到的情况下,就直接导致了长包业务的中断,因为这里与实现原理有关系,就是短包因为包长较短的原因,短包有优先取到对应令牌长度的令牌,如果短包都取不到对应的令牌数,那么长度就没有可能会取到长包对应的令牌数,因为长包需要的令牌数更多,所以,长包业务就因为取不到足够令牌而中断。
针对相关技术中赤字桶中的令牌不够短包业务取到的情况下,导致了长包业务中断的问题,目前尚未提出有效的解决方案。
发明内容
本发明实施例提供了一种接入控制方法及装置,以至少解决相关技术中赤字桶中的令牌不够短包业务取到的情况下,导致了长包业务中断的问题。
根据本发明实施例的一个方面,提供了一种接入控制方法,包括:在检测到短包丢包的情况下,投递只为长包提供令牌的赤字桶,其中,所述短包为数据包大小小于第一预定阈值的数据包,所述长包为数据包大小不小于所述第一预定阈值的数据包;依据投递的所述赤字桶对所述长包进行接入控制。
进一步地,在检测到短包丢包的情况下,投递只为长包提供令牌的赤字桶之后,还包括:获取业务的流量;在获取的所述网络业务的流量大于第二阈值的情况下,开启投递的所述赤字桶。
进一步地,在依据投递的所述赤字桶对所述长包进行接入控制之后,还包括:在获取的所述网络业务流量小于第二阈值的情况下,关闭投递的所述赤字桶。
进一步地,在投递只为所述长包提供令牌的赤字桶之后,还包括:以预定速率向投递的所述赤字桶填充令牌供所述长包获取。
进一步地,在依据投递的所述赤字桶对所述长包进行接入控制之前,还包括:判断所述长包对应的报文是否符合接入控制列表(Access Control List,简称为ACL)规则;在判断结果为是的情况下,依据投递的所述赤字桶对所述长包进行接入控制。
根据本发明实施例的另一方面,提供了一种接入控制装置,包括:投递模块,设置为在检测到短包丢包的情况下,投递只为长包提供令牌的赤字桶,其中,所述短包为数据包大小小于第一预定阈值的数据包,所述长包为数据包大小不小于所述第一预定阈值的数据包;接入控制模块,设置为依据投递的所述赤字桶对所述长包进行接入控制。
进一步地,所述装置还包括:获取模块,设置为获取业务的流量;开启模块,设置为在获取的所述网络业务的流量大于第二阈值的情况下,开启投递的所述赤字桶。
进一步地,所述装置还包括:关闭模块,设置为在获取的所述网络业务流量小于第二阈值的情况下,关闭投递的所述赤字桶。
进一步地,所述装置还包括:填充模块,设置为以预定速率向投递的所述赤字桶填充令牌供所述长包获取。
进一步地,所述装置还包括:判断模块,设置为判断所述长包对应的报文是否符合接入控制列表ACL规则;用于在判断结果为是的情况下,依据投递的所述赤字桶对所述长包进行接入控制。
通过本发明实施例,采用在检测到短包丢包的情况下,投递只为长包提供令牌的赤字桶,其中,所述短包为数据包大小小于第一预定阈值的数据包,所述长包为数据包大小不小于所述第一预定阈值的数据包;依据投递的所述赤字桶对所述长包进行接入控制,解决了相关技术中赤字桶中的令牌不够短包业务取到的情况下,导致了长包业务中断的问题,从而保证长包能够取到令牌,避免了长包业务的中断。
附图说明
此处所说明的附图用来提供对本发明的进一步理解,构成本申请的一部分,本发明的示意性实施例及其说明用于解释本发明,并不构成对本发明的不当限定。在附图中:
图1是相关技术中流量监管赤字桶的示意图;
图2是根据本发明实施例的接入控制方法的流程图;
图3是根据本发明实施例的接入控制装置的框图;
图4是根据本发明实施例一的接入控制装置的框图;
图5是根据本发明实施例二的接入控制装置的框图;
图6是根据本发明实施例三的接入控制装置的框图;
图7是根据本发明实施例四的接入控制装置的框图;
图8是根据本发明实施例的流量监管令牌桶的工作原理示意图;
图9是根据本发明实施的对业务报文的处理流程图。
具体实施方式
下文中将参考附图并结合实施例来详细说明本发明。需要说明的是,在不冲突的情况下,本申请中的实施例及实施例中的特征可以相互组合。
在本实施例中提供了一种接入控制方法,图2是根据本发明实施例的接入控制方法的流程图,如图2所示,该流程包括如下步骤:
步骤S202,在检测到短包丢包的情况下,投递只为长包提供令牌的赤字桶,其中,该短包为数据包大小小于第一预定阈值的数据包,该长包为数据包大小不小于该第一预定阈值的数据包;
步骤S204,依据投递的该赤字桶对该长包进行接入控制。
通过上述步骤,在检测到短包丢包的情况下,投递只为长包提供令牌的赤字桶,其中,该短包为数据包大小小于第一预定阈值的数据包,依据投递的该赤字桶对该长包进行接入控制,解决了相关技术中赤字桶中的令牌不够短包业务取到的情况下,导致了长包业务中断的问题,从而保证长包能够取到令牌,避免了长包业务的中断。
在检测到短包丢包的情况下,投递只为长包提供令牌的赤字桶之后,获取业务的流量;在获取的该网络业务的流量大于第二阈值的情况下,可以开启投递的该赤字桶,确保在报文流量较大的情况下,长包能够取到令牌。
在依据投递的该赤字桶对该长包进行接入控制之后,在获取的该网络业务流量小于第二阈值的情况下,即报文的流量恢复正常,还可以关闭投递的该赤字桶,减少资源的浪费。
在投递只为该长包提供令牌的赤字桶之后,以预定速率向投递的该赤字桶填充令牌供该长包获取,为长包取到令牌做好准备。
在依据投递的该赤字桶对该长包进行接入控制之前,还可以判断该长包对应的报文是否符合接入控制列表ACL规则,在判断结果为是的情况下,即确保只有长包才能从投递的赤字桶获取令牌,依据投递的该赤字桶对该长包进行接入控制。
本发明实施例还供了一种接入控制装置,该装置设置为实现上述实施例及优选实施方式,已经进行过说明的不再赘述。如以下所使用的,术语“模块”可以实现预定功能的软件和/或硬件的组合。尽管以下实施例所描述的装置较佳地以软件来实现,但是硬件,或者软件和硬件的组合的实现也是可能并被构想的。
图3是根据本发明实施例的接入控制装置的框图,如图3所示,包括:投递模块32和接入控制模块34,下面对各个模块进行简要说明。
投递模块32,设置为在检测到短包丢包的情况下,投递只为长包提供令牌的赤字桶,其中,该短包为数据包大小小于第一预定阈值的数据包,该长包为数据包大小不小于该第一预定阈值的数据包;
接入控制模块34,设置为依据投递的该赤字桶对该长包进行接入控制。
图4是根据本发明实施例一的接入控制装置的框图,如图4所示,该装置还包括:
获取模块42,设置为获取业务的流量;
开启模块44,设置为在获取的该网络业务的流量大于第二阈值的情况下,开启投递的该赤字桶。
图5是根据本发明实施例二的接入控制装置的框图,如图5所示,该装置还包括:
关闭模块52,设置为在获取的该网络业务流量小于第二阈值的情况下,关闭投递的该赤字桶。
图6是根据本发明实施例三的接入控制装置的框图,如图6所示,该装置还包括:
填充模块62,设置为以预定速率向投递的该赤字桶填充令牌供该长包获取。
图7是根据本发明实施例四的接入控制装置的框图,如图7所示,该装置还包括:
判断模块72,设置为判断该长包对应的报文是否符合接入控制列表ACL规则;设置为在判断结果为是的情况下,依据投递的该赤字桶对该长包进行接入控制。
下面结合可选实施例对本发明实施例进行进一步说明。
本可选实施例涉及传输网(Packet Transport Network,简称为PTN),在该网络中QOS,CAR流量控制中,如何保证短包业务流量在有丢包的情况下,通过判断报文长度,合理控制令牌桶的桶深大小,合理分配令牌桶中的令牌,来保证长包业务也能取到一定数目的令牌。在多业务接入的情况下,客户业务在上行流量监管令牌桶中令牌已经消耗尽的情况下,如何保证后续网络有长包流量业务的情况下,也能保证长包流量也能有一定数量的业务包取到对应的令牌数量,
先判断包长,然后利用可伸缩令牌桶算法的控制方法,由当前固定大小的令牌桶改为可伸缩的令牌桶,而这里伸缩桶的概念就是在原有令牌桶的基础上再投递一个新的令牌桶,即后面描述的赤字桶,当新的赤字桶深大小被投放,且这里我们要加入一 个流程,就是判断报文的长度,即新投入的赤字桶的令牌只提供给长包业务来取其中的令牌,那么这里新桶就有新的大量的令牌可以在短时间被长包业务报文所取,赤字的桶深大小可以在一定的参数范围内,这个需要产品的实际需求决定,上述的方法将有效的控制网络中持续的突发流量丢包的问题,图8是根据本发明实施例的流量监管令牌桶的工作原理示意图,如图8所示,包括以下内容:
在PTN网络上,对接入网元建立和保存多业务相关配置,对包含的业务表项的关联表进行配置并保存。首先,所述的接入网元在业务正常的情况下,对接入的业务数据包,会根据其数据包的相关字段进行控制接入列表(Access Control List,简称为ACL)分类处理,这里的分类通常是指数据包五元组字段,当然根据产品不同有所不同,对业务报文进行区分,实现QOS的差分服务。根据上述ACL的规则匹配,接入网元会对每个匹配上的规则分配指定大小的带宽服务,即流量监管,客户对自己的网络带宽资源的合理分配,这个主要是基于用户的业务需求,以及运营商对不同业务在接入带宽的控制。
客户这时会提前对网络的带宽资源进行分配,即配置流量监管的参数,Cir(承诺访问速率),CBS(C桶突发流量尺寸),Pir(峰值访问速率),PBS(P桶突发流量尺寸)。
下发报文包长识别流程,即判断当前业务的报文长度;当网络流量监管出现短包业务丢包,这时可打开赤字桶开关,让长包流量也能相应的取到相应的令牌数,当网络流量稳定的时候,可选择关闭赤字桶。
进一步地,网元如果在当前网络出现流量监管短包业务丢包,且对长包的业务流量允许其传送的情况,网元可配置一个赤字桶,这个桶的具体实现方案可以是在源P桶的基础上,对P桶大小做相应的调整,这里,需要在软件层面做一个开关的功能,即只有当客户场景需要解决上述业务场景的情况下,则打开这个开关,不需要的时候,客户可选择关闭,弹性的控制可取用的令牌数量。
在一个PTN网络中,一个PTN接入网元与用户的接入网元连接,这些所带的用户之间采用虚拟局域网(Virtual Local Area Network,简称为Vlan)作为用户隔离的手段,每个用户或者说业务被分配1个独立的虚拟局域网标志(Virtual Local Area Network Identification,简称为Vlan ID)。在接入网元配置访问控制列表,且指定匹配的Rule规则,这里需要下发ACL表项,对从接入端口进来的报文,解析其对应的字段后,根据解析出的字段和ACL所下发的Rule规则表项来比对,看报文是否是符合ACL控制的范围。如果上述的报文匹配了上述的ACL规则,且对指定的匹配上规则的报文下发 了流量监管的表项,即下发了CIR,CBS,PIR和PBS参数,那么匹配上规则的流量将按照流量监管的参数进行带宽分配;如果上述报文在ACL匹配的时候没有匹配上,则不按照指定的流量监管流程执行。在匹配流量监管的业务流量上,这里会有一个判断,判断报文的长度,然后开启赤字桶开关,赤字桶将以一定的速率填充令牌,而这部分令牌讲由之前判断出的长包业务来取其令牌。
图9是根据本发明实施的对业务报文的处理流程图,如图9所示,包括以下步骤:
步骤S902,接收数据帧;
步骤S904,判断报文是否属于该业务的报文,在判断结果为否的情况下,执行步骤S906,在判断结果为是的情况下,执行步骤S908和步骤S910;
步骤S906,丢弃该报文;
步骤S908,解析报文字段;
步骤S910,判断业务包长;
步骤S912,判断解析出的字段是否匹配上ACL规则,在判断结果为否的情况下,执行步骤S914,在判断结果为是的情况下,执行步骤S916;
步骤S914,正常转发,不进行流量监管;
步骤S916,按照匹配规则的行为,对报文进行流量监管;
步骤S918,判断当前网络流量是否需要开启赤字桶,在判断结果为否的情况下,执行步骤S920,在判断结果为是的情况下,执行步骤S922;
步骤S920,不开启投递的赤字桶;
步骤S922,在为长包业务的情况下,开启投递的赤字桶;
步骤S924,长包业务可取到令牌。
显然,本领域的技术人员应该明白,上述的本发明的各模块或各步骤可以用通用的计算装置来实现,它们可以集中在单个的计算装置上,或者分布在多个计算装置所组成的网络上,可选地,它们可以用计算装置可执行的程序代码来实现,从而,可以将它们存储在存储装置中由计算装置来执行,并且在某些情况下,可以以不同于此处的顺序执行所示出或描述的步骤,或者将它们分别制作成各个集成电路模块,或者将 它们中的多个模块或步骤制作成单个集成电路模块来实现。这样,本发明不限制于任何特定的硬件和软件结合。
以上所述仅为本发明的优选实施例而已,并不用于限制本发明,对于本领域的技术人员来说,本发明可以有各种更改和变化。凡在本发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。
工业实用性
如上所述,本发明实施例提供的一种接入控制方法及装置具有以下有益效果:通过确保长包能够取到令牌,进而避免了长包业务的中断。

Claims (10)

  1. 一种接入控制方法,包括:
    在检测到短包丢包的情况下,投递只为长包提供令牌的赤字桶,其中,所述短包为数据包大小小于第一预定阈值的数据包,所述长包为数据包大小不小于所述第一预定阈值的数据包;
    依据投递的所述赤字桶对所述长包进行接入控制。
  2. 根据权利要求1所述的方法,其中,在检测到短包丢包的情况下,投递只为长包提供令牌的赤字桶之后,还包括:
    获取业务的流量;
    在获取的所述网络业务的流量大于第二阈值的情况下,开启投递的所述赤字桶。
  3. 根据权利要求2所述的方法,其中,在依据投递的所述赤字桶对所述长包进行接入控制之后,还包括:
    在获取的所述网络业务流量小于第二阈值的情况下,关闭投递的所述赤字桶。
  4. 根据权利要求1所述的方法,其中,在投递只为所述长包提供令牌的赤字桶之后,还包括:
    以预定速率向投递的所述赤字桶填充令牌供所述长包获取。
  5. 根据权利要求1所述的方法,其中,在依据投递的所述赤字桶对所述长包进行接入控制之前,还包括:
    判断所述长包对应的报文是否符合接入控制列表ACL规则;
    在判断结果为是的情况下,依据投递的所述赤字桶对所述长包进行接入控制。
  6. 一种接入控制装置,包括:
    投递模块,设置为在检测到短包丢包的情况下,投递只为长包提供令牌的赤字桶,其中,所述短包为数据包大小小于第一预定阈值的数据包,所述长包为数据包大小不小于所述第一预定阈值的数据包;
    接入控制模块,设置为依据投递的所述赤字桶对所述长包进行接入控制。
  7. 根据权利要求6所述的装置,其中,所述装置还包括:
    获取模块,设置为获取业务的流量;
    开启模块,设置为在获取的所述网络业务的流量大于第二阈值的情况下,开启投递的所述赤字桶。
  8. 根据权利要求7所述的装置,其中,所述装置还包括:
    关闭模块,设置为在获取的所述网络业务流量小于第二阈值的情况下,关闭投递的所述赤字桶。
  9. 根据权利要求6所述的装置,其中,所述装置还包括:
    填充模块,设置为以预定速率向投递的所述赤字桶填充令牌供所述长包获取。
  10. 根据权利要求6所述的装置,其中,所述装置还包括:
    判断模块,设置为判断所述长包对应的报文是否符合接入控制列表ACL规则;设置为在判断结果为是的情况下,依据投递的所述赤字桶对所述长包进行接入控制。
PCT/CN2015/078982 2014-12-15 2015-05-14 接入控制方法及装置 WO2016095417A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410779526.4A CN105763475B (zh) 2014-12-15 2014-12-15 接入控制方法及装置
CN201410779526.4 2014-12-15

Publications (1)

Publication Number Publication Date
WO2016095417A1 true WO2016095417A1 (zh) 2016-06-23

Family

ID=56125766

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/078982 WO2016095417A1 (zh) 2014-12-15 2015-05-14 接入控制方法及装置

Country Status (2)

Country Link
CN (1) CN105763475B (zh)
WO (1) WO2016095417A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106713168A (zh) * 2016-12-21 2017-05-24 上海艾融软件股份有限公司 一种流量控制方法及系统

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1835447A (zh) * 2005-03-16 2006-09-20 华为技术有限公司 一种数据流量约束控制的实现方法
CN101267382A (zh) * 2007-03-13 2008-09-17 大唐移动通信设备有限公司 确定数据传输通道拥塞状态的方法及装置
US20110075558A1 (en) * 2009-09-25 2011-03-31 Telefonaktiebolaget Lm Ericsson (Publ) Rate shaping triggered discontinuous transmission in wireless communications

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101094180B (zh) * 2007-07-20 2012-05-23 杭州华三通信技术有限公司 一种对压缩后流量进行监管的方法及装置
CN101272346B (zh) * 2008-04-29 2010-12-08 华为技术有限公司 一种对报文进行流量监管的方法和装置
CN101478491B (zh) * 2009-02-10 2012-07-04 中兴通讯股份有限公司 一种实现分组业务区分服务的方法及装置
CN101667940B (zh) * 2009-09-25 2011-11-30 中兴通讯股份有限公司 一种对报文进行流量监管的系统及方法
CN102014075B (zh) * 2010-12-21 2013-07-24 杭州华三通信技术有限公司 流量监管方法和装置
CN102710514B (zh) * 2012-05-25 2015-01-21 华为技术有限公司 一种报文流量控制方法及系统
CN104111800B (zh) * 2013-04-18 2018-02-23 阿里巴巴集团控股有限公司 一种虚拟磁盘的io口调度方法及其调度装置

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1835447A (zh) * 2005-03-16 2006-09-20 华为技术有限公司 一种数据流量约束控制的实现方法
CN101267382A (zh) * 2007-03-13 2008-09-17 大唐移动通信设备有限公司 确定数据传输通道拥塞状态的方法及装置
US20110075558A1 (en) * 2009-09-25 2011-03-31 Telefonaktiebolaget Lm Ericsson (Publ) Rate shaping triggered discontinuous transmission in wireless communications

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106713168A (zh) * 2016-12-21 2017-05-24 上海艾融软件股份有限公司 一种流量控制方法及系统
CN106713168B (zh) * 2016-12-21 2020-03-31 上海艾融软件股份有限公司 一种流量控制方法及系统

Also Published As

Publication number Publication date
CN105763475A (zh) 2016-07-13
CN105763475B (zh) 2019-10-25

Similar Documents

Publication Publication Date Title
US9998357B2 (en) Multipath transmission based packet traffic control method and apparatus
US9413611B2 (en) Generating and enforcing a holistic quality of service policy in a network
US10135740B2 (en) Method and apparatus for limiting rate by means of token bucket, and computer storage medium
US11616729B2 (en) Method and apparatus for processing low-latency service flow
US10079805B2 (en) Bypassing a firewall for authorized flows using software defined networking
WO2014173367A2 (zh) 实现QoS的方法、系统、设备及计算机存储介质
US9882817B2 (en) Inter-device policing on network interface devices in LAG configuration
CN103999414B (zh) 一种归因针对相应用户寄存器的共享资源的拥塞贡献的方法和装置
WO2015074586A1 (zh) 服务质量控制方法、装置和系统
US11483247B2 (en) Quality of service management system for a communication network
CN112600684B (zh) 云业务的带宽管理及配置方法及相关装置
Pana et al. A Survey on the Evolution of RSVP
WO2016150020A1 (zh) 基于调度流标识的报文调度方法和装置
US20150195209A1 (en) Congestion Notification in a Network
WO2016095417A1 (zh) 接入控制方法及装置
US20210119909A1 (en) Service function chaining network services
CN115632925B (zh) 一种时间内生确定性融合网络架构及数据通信方法
US11870707B2 (en) Bandwidth management and configuration method for cloud service, and related apparatus
EP4262313A1 (en) Method, apparatus and system for scheduling service flow
FR2961367A1 (fr) Systeme et methode de gestion de flux securises entre plusieurs sites distants
Domżał et al. Guide to Flow-Aware Networking: Quality-of-Service Architectures and Techniques for Traffic Management
CN105991713B (zh) 更新处理方法及装置
Addeo et al. On QoS mechanism profiling in MPLS-TP transport networks
Cahyono et al. Triple play quality of service analysis in IP network
Echagüe et al. Tight arrival curve at the output of a work-conserving blind multiplexing server

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15868929

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15868929

Country of ref document: EP

Kind code of ref document: A1