WO2018161754A1 - Method and apparatus for recovering tunnel bandwidth resource - Google Patents

Method and apparatus for recovering tunnel bandwidth resource Download PDF

Info

Publication number
WO2018161754A1
WO2018161754A1 PCT/CN2018/075400 CN2018075400W WO2018161754A1 WO 2018161754 A1 WO2018161754 A1 WO 2018161754A1 CN 2018075400 W CN2018075400 W CN 2018075400W WO 2018161754 A1 WO2018161754 A1 WO 2018161754A1
Authority
WO
WIPO (PCT)
Prior art keywords
link
bandwidth
established
constraint
priority
Prior art date
Application number
PCT/CN2018/075400
Other languages
French (fr)
Chinese (zh)
Inventor
陈明春
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2018161754A1 publication Critical patent/WO2018161754A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • H04L5/003Arrangements for allocating sub-channels of the transmission path
    • H04L5/0058Allocation criteria
    • H04L5/0064Rate requirement of the data, e.g. scalable bandwidth, data priority
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/70Admission control; Resource allocation
    • H04L47/76Admission control; Resource allocation using dynamic resource allocation, e.g. in-call renegotiation requested by the user or requested by the network in response to changing network conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0896Bandwidth or capacity management, i.e. automatically increasing or decreasing capacities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/50Network service management, e.g. ensuring proper service fulfilment according to agreements
    • H04L41/5003Managing SLA; Interaction between SLA and QoS
    • H04L41/5019Ensuring fulfilment of SLA
    • H04L41/5022Ensuring fulfilment of SLA by giving priorities, e.g. assigning classes of service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/41Flow control; Congestion control by acting on aggregated flows or links
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/70Admission control; Resource allocation
    • H04L47/72Admission control; Resource allocation using reservation actions during connection setup
    • H04L47/726Reserving resources in multiple paths to be used simultaneously
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/70Admission control; Resource allocation
    • H04L47/74Admission control; Resource allocation measures in reaction to resource unavailability
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/70Admission control; Resource allocation
    • H04L47/80Actions related to the user profile or the type of traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/70Admission control; Resource allocation
    • H04L47/80Actions related to the user profile or the type of traffic
    • H04L47/805QOS or priority aware
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/70Admission control; Resource allocation
    • H04L47/82Miscellaneous aspects
    • H04L47/825Involving tunnels, e.g. MPLS

Definitions

  • the present disclosure relates to the field of communications, and in particular, to a tunnel bandwidth resource recovery method and apparatus.
  • Traffic engineering ensures that all links are guaranteed bandwidth when establishing tunnels. On the basis of a certain interface bandwidth, it is possible to meet the requirements of all links. In this case, a more common method is to remove other links and use the bandwidth released to satisfy the current link. Establish the required guaranteed bandwidth.
  • a set of resource recovery principles is defined, and on this basis, a data management center is established to provide different traffic engineering use. When resources are insufficient, the basis for quickly recovering and preempting resources is provided.
  • the present disclosure provides a tunnel bandwidth resource recovery method and apparatus for the problem of low efficiency of the current new link.
  • the present disclosure provides a tunnel bandwidth resource recovery method, including: when a new target link is created, when the remaining bandwidth resources are insufficient, the link with the lowest priority is selected from the established link, and the selection is started. On the basis of sufficient bandwidth for the target link, the link with the least amount of link data and the least redundant bandwidth of the link is removed, and the link is removed based on the bandwidth obtained by removing the link.
  • the method further includes: prior to creating the target link, associating each retention priority of the established link with an ordered linked list, where the ordered linked list includes at least one Information about the established link and the allocated bandwidth of the link; the selection is based on the bandwidth required for the target link, and the minimum amount of link data is removed and the redundant bandwidth of the link is minimized.
  • the link is removed, and the first chain of at least one to-be-removed link that meets the target link bandwidth requirement is searched for from the ordered list corresponding to the lowest priority priority in the established link.
  • Combining the path selecting a second link combination in which the number of links to be removed is the smallest in the first link combination, selecting a third link combination with the smallest redundant bandwidth in the second link combination, and removing the The link in the third link combination.
  • the ordered list is sorted in the order of the link establishment priorities of the established links.
  • the selection is sufficient to satisfy the target chain.
  • the link with the least amount of link data and the least redundant link bandwidth is removed, including: when a new link is to be established within a bandwidth constraint, the remaining bandwidth resources are insufficient.
  • the link with the lowest priority is maintained in the established link within the bandwidth constraint, and the minimum amount of link data is removed and the link redundancy is removed on the basis of sufficient bandwidth for the newly established link. The link with the smallest bandwidth is removed.
  • the selection is sufficient to satisfy the target chain.
  • the link with the least amount of link data and the least redundant link bandwidth is removed, including: when a new link of the first traffic class is to be established in the first bandwidth constraint, If the remaining bandwidth in the first bandwidth constraint is insufficient, and the sum of the borrowable bandwidth and the remaining bandwidth is still insufficient to meet the establishment requirement, determine whether the bandwidth in the first bandwidth constraint is borrowed by the second traffic category.
  • the level of the second traffic class is lower than the level of the first traffic class; in the case that the second traffic class borrows the bandwidth in the first broadband constraint, starting from the second broadband constraint, sequentially determining Whether the bandwidth in the remaining bandwidth constraints corresponding to the other traffic categories is borrowed, and the judgment result is obtained, and the rank of the other traffic category is lower than the level of the second traffic category. And removal of redundancy in the least principle of minimum bandwidth constraints recovering the remaining bandwidth of the borrowed amount of bandwidth for each link is dismantled bandwidth constraints occupied bandwidth.
  • the present disclosure further provides a tunnel bandwidth resource recovery apparatus, including: a teardown module, configured to maintain a priority from an established link when a new target link is created, if the remaining bandwidth resources are insufficient. The lowest link starts, and the link with the least amount of link data and the least redundant bandwidth of the link is removed for removal on the basis of sufficient bandwidth for the target link; the new module is set to be based on the removal chain. The bandwidth obtained by the road creates the target link.
  • a teardown module configured to maintain a priority from an established link when a new target link is created, if the remaining bandwidth resources are insufficient. The lowest link starts, and the link with the least amount of link data and the least redundant bandwidth of the link is removed for removal on the basis of sufficient bandwidth for the target link; the new module is set to be based on the removal chain. The bandwidth obtained by the road creates the target link.
  • the apparatus further includes: an establishing module, configured to: associate respective retention priorities of the established links with the ordered linked list before the new target link is created, the orderly
  • the linked list includes at least one established link and information about the allocated bandwidth of the link;
  • the teardown module is configured to: maintain the ordered order corresponding to the lowest priority from the established link
  • the first link combination of at least one link to be removed that meets the bandwidth requirement of the target link is searched in the linked list, and the second link combination in which the number of links to be removed is the smallest in the first link combination is selected.
  • the third link combination in which the redundant bandwidth is the smallest is selected in the second link combination, and the link in the third link combination is removed.
  • the ordered list is sorted in the order of the link establishment priorities of the established links.
  • the teardown module is configured to maintain in a link established within the bandwidth constraint when a new link is to be established within a bandwidth constraint, in case the remaining bandwidth resources are insufficient
  • the link with the lowest priority starts, and the link with the least amount of link data and the smallest redundant bandwidth of the link is removed for removal based on the bandwidth required for the new link.
  • the teardown module includes: a determining unit configured to: when a new link of the first traffic class is to be established in the first bandwidth constraint, the remaining bandwidth is insufficient in the first bandwidth constraint, and If the sum of the borrowable bandwidth and the remaining bandwidth is still insufficient to meet the establishment requirement, it is determined whether the bandwidth in the first bandwidth constraint is borrowed by the second traffic category, and the level of the second traffic category is lower than the a level of the first traffic class; a teardown unit configured to, when the second traffic class borrows the bandwidth in the first broadband constraint, start from the second broadband constraint, and sequentially determine the rest of the other traffic classes Whether the bandwidth in the bandwidth constraint is borrowed, and the judgment result is obtained.
  • the rank of the other traffic category is lower than the level of the second traffic category, and the number of links that are removed in each bandwidth constraint of the occupied bandwidth is the least and the chain is removed.
  • the principle of minimum road redundancy bandwidth recovers the borrowed bandwidth in the remaining bandwidth constraints.
  • Embodiments of the present disclosure also provide a computer readable storage medium storing computer executable instructions that, when executed by a processor, implement the methods described above.
  • the embodiment of the present disclosure uses a common resource recovery principle in the process of establishing a link.
  • bandwidth resource preemption occurs, data structure entries can be quickly searched according to different traffic models, and then the optimal available resources can be quickly located.
  • Bandwidth ensures the establishment of new links, and in the process, minimizes the impact on other services and minimizes waste of resources.
  • FIG. 1 is a schematic diagram of bandwidth resource management in a traffic model
  • FIG. 2 is a schematic diagram of a preemption process of link resources when only one link exists between devices
  • FIG. 3 is a schematic diagram of multiple links between devices in an embodiment of the method of the present disclosure.
  • FIG. 4 is a flowchart of a method for recovering a tunnel bandwidth resource in an embodiment of a method according to the present disclosure
  • FIG. 5 is a schematic diagram of an MPLS-TE traffic engineering model involved in an embodiment of the method of the present disclosure
  • FIG. 6 is a schematic diagram of an HP priority ordered list in an embodiment of the method of the present disclosure.
  • FIG. 7 is a schematic diagram of a bandwidth data management model provided in an embodiment of the method of the present disclosure.
  • FIG. 8 is a schematic diagram of a MAM allocation mode involved in an embodiment of the method of the present disclosure.
  • FIG. 9 is a schematic diagram of a correspondence between BC and CT in a MAM model involved in an embodiment of the method according to the present disclosure.
  • FIG. 10 is a schematic diagram of an internal data management model of a MAM constraint model involved in an embodiment of the method of the present disclosure
  • FIG. 11 is a schematic diagram of BC limitation of an RDM involved in an embodiment of the method of the present disclosure.
  • FIG. 12 is a structural block diagram of a tunnel bandwidth resource recovery apparatus provided in an embodiment of the present disclosure.
  • Figure 1 depicts the process of bandwidth resource management in a traffic model.
  • a resource management data initialization table is established to record the initial guaranteed bandwidth.
  • the data management table is updated.
  • the resource management table is queried whether there is a reclaimable bandwidth resource. If yes, the link is established. Otherwise, the link is established. The tunnel link failed.
  • MPLS-TE traffic engineering uses the available resources to establish an LSP (Label Switching Path) along the link to ensure that bandwidth is always guaranteed for specific traffic to avoid congestion in case of stability or failure.
  • LSP Label Switching Path
  • DS-TE enables MPLS-TE to sense the CoS (class of service), allows resources to be reserved according to the fine-grained CoS, and provides MPLS (Multi-Protocol Label Switching) fault tolerance at each CoS level. mechanism.
  • DiffServ differentiated service
  • TE traffic-engineering
  • QoS Quality of Service
  • SLA Service-Level Agreement
  • Level agreements such as voice, ATM (Asynchronous Transfer Mode) and frame relay.
  • preemption In the process of preemption, how to quickly locate the optimal available link becomes a crucial link. At present, the recycling principles of different manufacturers are different, and there is no unified processing method, resulting in new Link establishment is inefficient.
  • a tunnel tunnel (link or path) 1 is established between device A and device C.
  • the association between the establishment priority and the hold priority of the link is (3, 2).
  • the resource will be successful only if the priority of the tunnel is higher than that of the tunnel1 (the smaller the value is, the higher the priority is).
  • the maximum reserved bandwidth between device A and device C is 20M
  • the bandwidth of the established tunnel1 is 15M
  • the priority combination is (3, 2), so the current remaining available bandwidth is 5M.
  • Create tunnel 2 the priority combination is (1,0), and the bandwidth is 18M. The remaining bandwidth cannot meet the requirements for tunnel2. In this case, tunnel1 with lower priority is removed to ensure that tunnel2 is successfully established.
  • the link with the lowest priority is selected to be removed. Assume that it is removed from tunnel4. Since tunnel4 occupies 20M bandwidth, only the tunnel4 can be removed to meet the bandwidth requirement.
  • the second case the link with the lowest priority is selected to be removed. Assume that the tunnel 3 is removed from the tunnel. As the tunnel 3 occupies 10 Mbits of bandwidth, the bandwidth cannot be met. The tunnel 4 is removed and the bandwidth is met.
  • the third case randomly removes the link with a lower priority than the newly created link until the bandwidth requirement of the new link is met. Assuming that the tunnel2 is removed, it is possible to remove both tunnel2 and tunnel3.
  • the fourth case randomly removes the link with lower priority than the new link until the bandwidth requirement of the new link is met. Assuming that you are removing from tunnel2, you may remove tunnel2 and tunnel4 at the same time.
  • the lowest priority link was removed, and a total of 20M links were removed with a redundant bandwidth of 5M.
  • the lowest priority link was removed, and two 30M links were removed with a redundant bandwidth of 15M.
  • the lowest priority and lower priority links were removed, and two 20M links were removed with a redundant bandwidth of 5M.
  • the lowest and lower priority links were removed, and two 30M links were removed with a redundant bandwidth of 15M.
  • the removal link has the lowest priority, the number of removed links is the least, and the redundant bandwidth of the removed link is the smallest.
  • the present disclosure proposes the following three resource recovery principles from the perspective of minimizing the impact on existing services and rational utilization of resources:
  • the path with the lowest priority is the first choice for preemption
  • the total number of paths removed is the least
  • the removed path has the least redundant bandwidth.
  • FIG. 4 is a flowchart of the method. As shown in FIG. 4, the method includes the following processing:
  • Step 401 When a new target link is created, if the remaining bandwidth resources are insufficient, starting from the link with the lowest priority in the established link, and selecting the bandwidth required for the target link, Demolition of the link with the least amount of link data and the smallest redundant bandwidth of the removed link;
  • Step 402 Create a new target link based on the bandwidth obtained by removing the link.
  • the above steps 401 to 402 are a general tunnel bandwidth resource recovery method.
  • the following uses the different traffic engineering models to illustrate the use of the method.
  • the MPLS-TE traffic engineering model is shown in Figure 5.
  • a certain TE bandwidth is allocated on the interface.
  • Each new tunnel is allocated a certain amount of bandwidth.
  • Multiple LSPs can be set up on each tunnel.
  • SP priority and maintain priority combination
  • HP priority
  • the item management is performed according to the priority category, and in the case that the remaining bandwidth is insufficient, To ensure that a link with a lower priority can be found, a link with a higher priority cannot be used.
  • the HP priority ordered list priority HP1> HP2> HP3> HP4> HP5> HP6> HP7, if there is insufficient bandwidth in HP1, you can preempt the bandwidth from HP7 to HP2 priority list.
  • the present embodiment records a sorting situation of the bandwidth of the same priority on the basis of the priority entry shown in FIG. 6.
  • the management method of the ordered linked list is adopted, that is, each priority node is linked with an ordered list of bandwidths, and the bandwidth data management model obtained based on this is shown in FIG. 7 .
  • the MPLS-TE traffic engineering model tunnel bandwidth resource recovery method may be specifically processed as follows:
  • the respective retention priorities of the established links are associated with the ordered linked list, and the ordered linked list includes at least one established link and information about the allocated bandwidth of the link; Selecting the link with the least amount of link data and the minimum link redundancy bandwidth to be removed, including maintaining the lowest priority priority from the established link, based on the bandwidth required to meet the target link.
  • the corresponding ordered list is selected to filter out the minimum number of links to be removed in the first link combination.
  • a second link combination in which the third link combination with the smallest redundant bandwidth is selected, and the link in the third link combination is removed, wherein the ordered link is in accordance with the established link
  • the order of the build chain priorities is sorted.
  • the low-priority (ie, corresponding) bandwidth ordering list ie, the above-mentioned ordered list
  • the appropriate link is preempted according to the preemption principle.
  • the current preemption action occurs only when a dynamic TE tunnel is established.
  • performance problems should also be considered.
  • the complexity is O(n) when searching in a sequential order.
  • the search performance is low, which may cause the new link to fail, and the half-search (also called the binary point).
  • the complexity is found to be O(log 2 n), so a binary search algorithm is employed in this embodiment.
  • a binary search algorithm is employed in this embodiment.
  • the number of link paths to be removed is m (1 ⁇ m). ⁇ n), the worst case will traverse the combination C(n,m) times.
  • the search of the mth path uses a half-fold search to improve query performance and put the link combination that satisfies the condition.
  • the linked list is sorted according to the size of the redundant bandwidth. Finally, the group with the smallest redundant bandwidth is selected as the selection result. If the combination with the redundant bandwidth of 0 is found in the search process, the combination is directly returned. result.
  • the model in Figure 7 can meet the bandwidth resource recovery calculation of MPLS-TE traffic engineering.
  • MPLS-TE does not consider which services are carried on the link, and cannot distinguish the service class.
  • DS-TE engineering can distinguish between different types of traffic and impose different bandwidth limits on different types of traffic.
  • the traffic class CT ranges from CT0 to CT7.
  • CT7 is the traffic with the strictest QoS requirements
  • CT0 is the best-effort traffic.
  • the bandwidth constraint corresponding to traffic class CT0-CT7 is defined as BC0-BC7.
  • the bandwidth constraint (BC) relationship corresponding to the traffic class (CT) is different in different constraint models.
  • the MAM maps a BC into a CT.
  • the link bandwidth is simply allocated between different CTs. Take 3 CTs as an example.
  • the MAM allocation mode is shown in Figure 8.
  • the constraints of MAM are as follows:
  • the maximum reserved bandwidth is the sum of the individual bandwidth constraints BC;
  • the link with the lowest priority is maintained in the established link within the bandwidth constraint, and the selection is sufficient to satisfy the new link.
  • the link with the least amount of link data and the smallest redundant bandwidth of the link is removed for removal.
  • the RDM model allows shared bandwidth between CTs.
  • the direct constraints of BC are as follows:
  • BC i and BC j (i ⁇ j) Assuming that two bandwidth constraints, BC i and BC j (i ⁇ j), are set, they satisfy the following two conditions:
  • BC j bandwidth to be guaranteed, if BC j of unused bandwidth, BC i can use; that is to say, in BC i BC j using the bandwidth, while the remaining BC j insufficient bandwidth allocation, to the allocated BC i recycling, to ensure the bandwidth utilization of BC j .
  • BC j must not use the bandwidth of BC i .
  • the BC limit of RDM is shown in Figure 11.
  • the bandwidth of BC2 is only allowed to be used by CT2.
  • the traffic of CT2 is BC2.
  • the traffic of BC1 is allowed to be used by CT1 and CT2.
  • the maximum of CT1 can be BC2. When CT2 is used. When it is insufficient, the bandwidth of CT1 is recovered.
  • the bandwidth between BCs in this model can be shared, when the CT has insufficient bandwidth in the same BC, it is also considered whether the bandwidth of the BC has been low-level CT (low-level CT is lower than BC). Corresponding to CT).
  • Each BC has a guaranteed bandwidth when it is allocated. When the sum of the used bandwidth and the remaining available bandwidth in the BC is less than the guaranteed bandwidth, it indicates that the BC bandwidth has been occupied by the low-level CT at this time. On the other hand, if the sum of the used bandwidth and the remaining bandwidth in the BC is greater than the guaranteed bandwidth, it indicates that the CT in the BC occupies a bandwidth of a high-level CT (high-low-level CT, that is, a level higher than a CT corresponding to the BC). It can be seen that a bandwidth constraint management table between BCs is to be established to quickly calculate and search for occupants for bandwidth recovery when resource sharing occurs, as shown in Table 1 and Table 2 below.
  • Table 1 is a bandwidth management constraint table, which is an initialization table.
  • Table 2 shows the update of each entry data when the low-level CT occupies a high-level CT bandwidth. The meaning of each field in the entry is as follows:
  • Guaranneteed-bw i deducts the remaining value after the bandwidth occupied by CT i and CT j .
  • the first case if the remaining bandwidth of BC i can meet the bandwidth requirement of CT i , the used bandwidth and remaining bandwidth attribute of BC i , that is, the bandwidth of CT i is obtained from BC i .
  • the second case if the remaining bandwidth of BC i cannot meet the bandwidth requirement of CT i , then whether the remaining bandwidth of BC j (j>i) is satisfied, and when the remaining bandwidth can be satisfied, the remaining bandwidth of BC j is updated.
  • the bandwidth used by BC i that is, the bandwidth of CT i is borrowed from the guaranteed bandwidth of BC j . At this time, there is a case where high-level CT bandwidth is occupied.
  • BC j may also be a plurality of BCs, and then the bandwidth attributes from BC j to BC k to BC i are regression updated. Firstly, it is necessary to recover BC j borrowing resources to ensure that BC k can meet the requirements of its own CT chain building, and then release the bandwidth borrowed by BC k to BC i to meet the chain building of CT i . In this embodiment, it may not be necessary. The bandwidth borrowed by BC k is released to BC i . When recovering the borrowed resources of BC j , look up the resource management entries established by the corresponding BC, as shown in Figure 10, and find the lowest priority tunnel that meets the principle of resource recovery for recycling.
  • the method for implementing the tunnel bandwidth resource recovery in this embodiment based on the RDM model specifically includes the following process: when a new link of the first traffic class is to be established in the first bandwidth constraint, the remaining bandwidth in the first bandwidth constraint If the sum of the borrowable bandwidth and the remaining bandwidth is still insufficient to meet the establishment requirement, determine whether the bandwidth in the first bandwidth constraint is borrowed by the second traffic category, and the second traffic class has a lower level than the first traffic.
  • Level of the category in the case that the second traffic class borrows the bandwidth in the first broadband constraint, starting from the second broadband constraint, sequentially determining whether the bandwidth in the remaining bandwidth constraints corresponding to the other traffic classes is borrowed, and obtaining the judgment result, the other The level of the traffic class is lower than the level of the second traffic class, and the borrowed bandwidth in the remaining bandwidth constraints is recovered on the principle that the number of removed links in each bandwidth constraint of the occupied bandwidth is the smallest and the redundant bandwidth of the removed link is minimized.
  • the embodiment of the present disclosure establishes a set of general traffic bandwidth management model, which is composed of different data structure entries.
  • data structure entries are quickly searched according to different traffic models, which can quickly locate the optimal available resources, ensure the establishment of new links, and realize the impact on other services in the process. Minimization and minimization of resource waste.
  • FIG. 12 is a structural block diagram of the device 120, as shown in FIG. Device 120 includes the following components:
  • the module 121 is configured to set a link with the lowest priority from the established link when the remaining bandwidth resource is insufficient, and select a bandwidth sufficient to meet the required bandwidth of the target link. On the basis of the removal, the link with the least amount of link data and the least redundant link bandwidth is removed for removal;
  • the new module 122 is configured to create a new target link based on the bandwidth obtained by tearing down the link.
  • the apparatus 120 provided in this embodiment may further include:
  • the removal module is configured to: start to find the link to be removed from the ordered list corresponding to the lowest priority priority of the established link, and after the search is successful, The discovered link is removed; wherein the ordered list is sorted according to the link establishment priority of the established link.
  • the teardown module 121 is configured to maintain a priority in the established link within the bandwidth constraint when a new link is to be established within a bandwidth constraint, in the event that the remaining bandwidth resources are insufficient. The lowest link starts, and the link with the least amount of link data and the smallest redundant bandwidth of the link is removed for removal on the basis of sufficient bandwidth for the new link.
  • the removing module 121 includes:
  • the determining unit is configured to: when a new link of the first traffic class is to be established in the first bandwidth constraint, the remaining bandwidth is insufficient in the first bandwidth constraint, and the sum of the borrowable bandwidth and the remaining bandwidth is still insufficient to satisfy If the requirement is established, determining whether the bandwidth in the first bandwidth constraint is borrowed by the second traffic class, the level of the second traffic class is lower than the level of the first traffic class; and the removing unit is configured to borrow the first in the second traffic class.
  • the bandwidth in the broadband constraint starting from the second broadband constraint, it is sequentially determined whether the bandwidth in the remaining bandwidth constraints corresponding to the other traffic classes is borrowed, and the judgment result is obtained, and the rank of the other traffic class is lower than the level of the second traffic class.
  • the borrowed bandwidth in the remaining bandwidth constraints is recovered on the principle that the number of removed links in each bandwidth constraint of the occupied bandwidth is the smallest and the redundant bandwidth of the removed link is minimized.
  • Embodiments of the present disclosure also provide a computer readable storage medium storing computer executable instructions that, when executed by a processor, implement the methods described above.
  • computer storage medium includes volatile and nonvolatile, implemented in any method or technology for storing information, such as computer readable instructions, data structures, program modules or other data. Sex, removable and non-removable media.
  • Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disc (DVD) or other optical disc storage, magnetic cartridge, magnetic tape, magnetic disk storage or other magnetic storage device, or may Any other medium used to store the desired information and that can be accessed by the computer.
  • communication media typically includes computer readable instructions, data structures, program modules, or other data in a modulated data signal, such as a carrier wave or other transport mechanism, and can include any information delivery media. .
  • the embodiment of the present disclosure establishes a set of general traffic bandwidth management model, which is composed of different data structure entries.
  • data structure entries are quickly searched according to different traffic models, which can quickly locate the optimal available resources, ensure the establishment of new links, and realize the impact on other services in the process. Minimize and minimize waste of resources.

Abstract

Provided are a method and apparatus for recovering a tunnel bandwidth resource. The method comprises: when a new target link is to be created, if the remaining bandwidth resources are insufficient, starting from links maintaining the lowest priority among established links, choosing to dismantle a link with the least link data volume to be dismantled and the minimum link redundant bandwidth to be dismantled on the basis that a bandwidth required for the target link is sufficiently met; and newly creating the target link based on the bandwidth obtained by means of dismantling the link.

Description

一种隧道带宽资源回收方法及装置Tunnel bandwidth resource recovery method and device 技术领域Technical field
本公开涉及通讯领域,特别是涉及一种隧道带宽资源回收方法及装置。The present disclosure relates to the field of communications, and in particular, to a tunnel bandwidth resource recovery method and apparatus.
背景技术Background technique
流量工程在建立隧道时,要确保为所有链路提供有保证的带宽。而在接口带宽一定的基础上,有可能满足不了所有链路的需求,在这种情况下,目前采用的一种较为通用的方法就是拆除其他链路并利用其释放的带宽来满足当前链路建立所需要的保证带宽。承载网中,定义了一套资源回收原则,并在此基础上通过建立数据管理中心,来提供给不同的流量工程使用,当出现资源不足时,对快速回收抢占资源提供依据。Traffic engineering ensures that all links are guaranteed bandwidth when establishing tunnels. On the basis of a certain interface bandwidth, it is possible to meet the requirements of all links. In this case, a more common method is to remove other links and use the bandwidth released to satisfy the current link. Establish the required guaranteed bandwidth. In the bearer network, a set of resource recovery principles is defined, and on this basis, a data management center is established to provide different traffic engineering use. When resources are insufficient, the basis for quickly recovering and preempting resources is provided.
发明内容Summary of the invention
以下是对本文详细描述的主题的概述。本概述并非是为了限制权利要求的保护范围。The following is an overview of the topics detailed in this document. This Summary is not intended to limit the scope of the claims.
针对目前新链路的效率较低的问题,本公开提供一种隧道带宽资源回收方法及装置。The present disclosure provides a tunnel bandwidth resource recovery method and apparatus for the problem of low efficiency of the current new link.
一方面,本公开提供一种隧道带宽资源回收方法,包括:在新建一条目标链路时,在剩余带宽资源不足的情况下,从已建立的链路中保持优先级最低的链路开始,选择在足以满足所述目标链路所需带宽的基础上,拆除链路数据量最少且拆除链路冗余带宽最小的链路进行拆除;基于拆除链路得到的带宽新建所述目标链路。In one aspect, the present disclosure provides a tunnel bandwidth resource recovery method, including: when a new target link is created, when the remaining bandwidth resources are insufficient, the link with the lowest priority is selected from the established link, and the selection is started. On the basis of sufficient bandwidth for the target link, the link with the least amount of link data and the least redundant bandwidth of the link is removed, and the link is removed based on the bandwidth obtained by removing the link.
在示例性实施例中,所述方法还包括:在新建所述目标链路之前,将已建立的链路的各个保持优先级与有序链表建立对应关系,所述有序链表中包括至少一项已建立的链路与该链路已分配的带宽的信息;所述选择在足以满足所述目标链路所需带宽的基础上,拆除链路数据量最少且拆除链路冗余带 宽最小的链路进行拆除,包括:从已建的链路中保持优先级最低的优先级所对应的所述有序链表中开始查找满足目标链路带宽需求的至少一种待拆除链路的第一链路组合,筛选出所述第一链路组合中需拆除链路数量最小的第二链路组合,在所述第二链路组合中选择冗余带宽最小的第三链路组合,拆除所述第三链路组合中的链路。In an exemplary embodiment, the method further includes: prior to creating the target link, associating each retention priority of the established link with an ordered linked list, where the ordered linked list includes at least one Information about the established link and the allocated bandwidth of the link; the selection is based on the bandwidth required for the target link, and the minimum amount of link data is removed and the redundant bandwidth of the link is minimized. The link is removed, and the first chain of at least one to-be-removed link that meets the target link bandwidth requirement is searched for from the ordered list corresponding to the lowest priority priority in the established link. Combining the path, selecting a second link combination in which the number of links to be removed is the smallest in the first link combination, selecting a third link combination with the smallest redundant bandwidth in the second link combination, and removing the The link in the third link combination.
在示例性实施例中,所述有序链表中按照已建链路的建链优先级的顺序进行排序。In an exemplary embodiment, the ordered list is sorted in the order of the link establishment priorities of the established links.
在示例性实施例中,所述在新建一条目标链路时,在剩余带宽资源不足的情况下,从已建立的链路中保持优先级最低的链路开始,选择在足以满足所述目标链路所需带宽的基础上,拆除链路数据量最少且拆除链路冗余带宽最小的链路进行拆除,包括:当即将在一个带宽约束内建立一条新链路时,在剩余带宽资源不足的情况下,在所述带宽约束内已建立的链路中保持优先级最低的链路开始,选择在足以满足新建链路所需带宽的基础上,拆除链路数据量最少且拆除链路冗余带宽最小的链路进行拆除。In an exemplary embodiment, when a new target link is created, in the case that the remaining bandwidth resources are insufficient, starting from the link with the lowest priority among the established links, the selection is sufficient to satisfy the target chain. On the basis of the required bandwidth of the road, the link with the least amount of link data and the least redundant link bandwidth is removed, including: when a new link is to be established within a bandwidth constraint, the remaining bandwidth resources are insufficient. In this case, the link with the lowest priority is maintained in the established link within the bandwidth constraint, and the minimum amount of link data is removed and the link redundancy is removed on the basis of sufficient bandwidth for the newly established link. The link with the smallest bandwidth is removed.
在示例性实施例中,所述在新建一条目标链路时,在剩余带宽资源不足的情况下,从已建立的链路中保持优先级最低的链路开始,选择在足以满足所述目标链路所需带宽的基础上,拆除链路数据量最少且拆除链路冗余带宽最小的链路进行拆除,包括:当即将在第一带宽约束中建立第一流量类别的新链路时,在该第一带宽约束中剩余带宽不足,且可借用的带宽与该剩余带宽之和仍不足以满足建立需求的情况下,判断所述第一带宽约束中的带宽是否被第二流量类别借用,所述第二流量类别的等级低于所述第一流量类别的等级;在所述第二流量类别借用所述第一宽带约束中的带宽的情况下,从所述第二宽带约束开始,依次判断其他流量类别对应的其余带宽约束中的带宽是否被借用,得到判断结果,所述其他流量类别的等级低于所述第二流量类别的等级,以被占用带宽的各个带宽约束中被拆除的链路数量最少且拆除链路冗余带宽最小的原则回收所述其余带宽约束中被借用的带宽。In an exemplary embodiment, when a new target link is created, in the case that the remaining bandwidth resources are insufficient, starting from the link with the lowest priority among the established links, the selection is sufficient to satisfy the target chain. On the basis of the required bandwidth of the road, the link with the least amount of link data and the least redundant link bandwidth is removed, including: when a new link of the first traffic class is to be established in the first bandwidth constraint, If the remaining bandwidth in the first bandwidth constraint is insufficient, and the sum of the borrowable bandwidth and the remaining bandwidth is still insufficient to meet the establishment requirement, determine whether the bandwidth in the first bandwidth constraint is borrowed by the second traffic category. The level of the second traffic class is lower than the level of the first traffic class; in the case that the second traffic class borrows the bandwidth in the first broadband constraint, starting from the second broadband constraint, sequentially determining Whether the bandwidth in the remaining bandwidth constraints corresponding to the other traffic categories is borrowed, and the judgment result is obtained, and the rank of the other traffic category is lower than the level of the second traffic category. And removal of redundancy in the least principle of minimum bandwidth constraints recovering the remaining bandwidth of the borrowed amount of bandwidth for each link is dismantled bandwidth constraints occupied bandwidth.
另一方面,本公开还提供一种隧道带宽资源回收装置,包括:拆除模块,设置为在新建一条目标链路时,在剩余带宽资源不足的情况下,从已建立的链路中保持优先级最低的链路开始,选择在足以满足所述目标链路所需带宽 的基础上,拆除链路数据量最少且拆除链路冗余带宽最小的链路进行拆除;新建模块,设置为基于拆除链路得到的带宽新建所述目标链路。In another aspect, the present disclosure further provides a tunnel bandwidth resource recovery apparatus, including: a teardown module, configured to maintain a priority from an established link when a new target link is created, if the remaining bandwidth resources are insufficient. The lowest link starts, and the link with the least amount of link data and the least redundant bandwidth of the link is removed for removal on the basis of sufficient bandwidth for the target link; the new module is set to be based on the removal chain. The bandwidth obtained by the road creates the target link.
在示例性实施例中,所述装置还包括:建立模块,设置为在新建所述目标链路之前,将已建立的链路的各个保持优先级与有序链表建立对应关系,所述有序链表中包括至少一项已建立的链路与该链路已分配的带宽的信息;所述拆除模块设置为:从已建的链路中保持优先级最低的优先级所对应的所述有序链表中开始查找满足目标链路带宽需求的至少一种待拆除链路的第一链路组合,筛选出所述第一链路组合中需拆除链路数量最小的第二链路组合,在所述第二链路组合中选择冗余带宽最小的第三链路组合,拆除所述第三链路组合中的链路。In an exemplary embodiment, the apparatus further includes: an establishing module, configured to: associate respective retention priorities of the established links with the ordered linked list before the new target link is created, the orderly The linked list includes at least one established link and information about the allocated bandwidth of the link; the teardown module is configured to: maintain the ordered order corresponding to the lowest priority from the established link The first link combination of at least one link to be removed that meets the bandwidth requirement of the target link is searched in the linked list, and the second link combination in which the number of links to be removed is the smallest in the first link combination is selected. The third link combination in which the redundant bandwidth is the smallest is selected in the second link combination, and the link in the third link combination is removed.
在示例性实施例中,所述有序链表中按照已建链路的建链优先级的顺序进行排序。In an exemplary embodiment, the ordered list is sorted in the order of the link establishment priorities of the established links.
在示例性实施例中,所述拆除模块设置为:当即将在一个带宽约束内建立一条新链路时,在剩余带宽资源不足的情况下,在所述带宽约束内已建立的链路中保持优先级最低的链路开始,选择在足以满足新建链路所需带宽的基础上,拆除链路数据量最少且拆除链路冗余带宽最小的链路进行拆除。In an exemplary embodiment, the teardown module is configured to maintain in a link established within the bandwidth constraint when a new link is to be established within a bandwidth constraint, in case the remaining bandwidth resources are insufficient The link with the lowest priority starts, and the link with the least amount of link data and the smallest redundant bandwidth of the link is removed for removal based on the bandwidth required for the new link.
在示例性实施例中,所述拆除模块,包括:判断单元,设置为当即将在第一带宽约束中建立第一流量类别的新链路时,在该第一带宽约束中剩余带宽不足,且可借用的带宽与该剩余带宽之和仍不足以满足建立需求的情况下,判断所述第一带宽约束中的带宽是否被第二流量类别借用,所述第二流量类别的等级低于所述第一流量类别的等级;拆除单元,设置为在所述第二流量类别借用所述第一宽带约束中的带宽的情况下,从所述第二宽带约束开始,依次判断其他流量类别对应的其余带宽约束中的带宽是否被借用,得到判断结果,所述其他流量类别的等级低于所述第二流量类别的等级,以被占用带宽的各个带宽约束中被拆除的链路数量最少且拆除链路冗余带宽最小的原则回收所述其余带宽约束中被借用的带宽。In an exemplary embodiment, the teardown module includes: a determining unit configured to: when a new link of the first traffic class is to be established in the first bandwidth constraint, the remaining bandwidth is insufficient in the first bandwidth constraint, and If the sum of the borrowable bandwidth and the remaining bandwidth is still insufficient to meet the establishment requirement, it is determined whether the bandwidth in the first bandwidth constraint is borrowed by the second traffic category, and the level of the second traffic category is lower than the a level of the first traffic class; a teardown unit configured to, when the second traffic class borrows the bandwidth in the first broadband constraint, start from the second broadband constraint, and sequentially determine the rest of the other traffic classes Whether the bandwidth in the bandwidth constraint is borrowed, and the judgment result is obtained. The rank of the other traffic category is lower than the level of the second traffic category, and the number of links that are removed in each bandwidth constraint of the occupied bandwidth is the least and the chain is removed. The principle of minimum road redundancy bandwidth recovers the borrowed bandwidth in the remaining bandwidth constraints.
本公开实施例还提供了一种计算机可读存储介质,存储有计算机可执行指令,所述计算机可执行指令被处理器执行时实现以上描述的方法。Embodiments of the present disclosure also provide a computer readable storage medium storing computer executable instructions that, when executed by a processor, implement the methods described above.
本公开有益效果如下:The beneficial effects of the disclosure are as follows:
本公开实施例在链路建立的过程中使用通用的资源回收原则,在发生带宽资源抢占时,能够根据不同的流量模型对数据结构表项进行快速查找,进而可以迅速定位到最优可利用资源带宽,保证新链路的建立,并且在此过程中,实现了对其他业务的影响最小化以及资源浪费的最小化。The embodiment of the present disclosure uses a common resource recovery principle in the process of establishing a link. When bandwidth resource preemption occurs, data structure entries can be quickly searched according to different traffic models, and then the optimal available resources can be quickly located. Bandwidth ensures the establishment of new links, and in the process, minimizes the impact on other services and minimizes waste of resources.
在阅读并理解了附图和详细描述后,可以明白其他方面。Other aspects will be apparent upon reading and understanding the drawings and detailed description.
附图说明DRAWINGS
图1是在流量模型中进行带宽资源管理的示意图;FIG. 1 is a schematic diagram of bandwidth resource management in a traffic model;
图2是在设备之间仅有一条链路存在时,链路资源的抢占过程示意图;2 is a schematic diagram of a preemption process of link resources when only one link exists between devices;
图3是本公开方法实施例中设备之间存在多条链路的示意图;3 is a schematic diagram of multiple links between devices in an embodiment of the method of the present disclosure;
图4是本公开方法实施例中隧道带宽资源回收方法的流程图;4 is a flowchart of a method for recovering a tunnel bandwidth resource in an embodiment of a method according to the present disclosure;
图5是本公开方法实施例中涉及的MPLS-TE流量工程模型示意图;5 is a schematic diagram of an MPLS-TE traffic engineering model involved in an embodiment of the method of the present disclosure;
图6是本公开方法实施例中HP优先级有序链表的示意图;6 is a schematic diagram of an HP priority ordered list in an embodiment of the method of the present disclosure;
图7是本公开方法实施例中提供的带宽数据管理模型的示意图;7 is a schematic diagram of a bandwidth data management model provided in an embodiment of the method of the present disclosure;
图8是本公开方法实施例中涉及到的MAM分配模式示意图;8 is a schematic diagram of a MAM allocation mode involved in an embodiment of the method of the present disclosure;
图9是本公开方法实施例中涉及到的MAM模型中BC与CT之间的对应关系示意图;9 is a schematic diagram of a correspondence between BC and CT in a MAM model involved in an embodiment of the method according to the present disclosure;
图10是本公开方法实施例中涉及到的MAM约束模型的内部数据管理模型示意图;10 is a schematic diagram of an internal data management model of a MAM constraint model involved in an embodiment of the method of the present disclosure;
图11是本公开方法实施例中涉及的RDM的BC限制示意图;11 is a schematic diagram of BC limitation of an RDM involved in an embodiment of the method of the present disclosure;
图12是本公开装置实施例中提供的隧道带宽资源回收装置的结构框图。FIG. 12 is a structural block diagram of a tunnel bandwidth resource recovery apparatus provided in an embodiment of the present disclosure.
具体实施方式detailed description
图1描述了在流量模型中进行带宽资源管理的过程。在接口带宽分配初始化的同时,要建立资源管理数据初始化表,记录初始保证带宽情况。在建 立隧道链路(以下简称链路)时,更新数据管理表,当建立隧道链路出现带宽不足时,向资源管理表查询是否存在可回收带宽资源,如果存在则建立链路,否则的话建立隧道链路失败。Figure 1 depicts the process of bandwidth resource management in a traffic model. At the same time as the interface bandwidth allocation is initialized, a resource management data initialization table is established to record the initial guaranteed bandwidth. When a tunnel link (hereinafter referred to as a link) is established, the data management table is updated. When the bandwidth of the tunnel link is insufficient, the resource management table is queried whether there is a reclaimable bandwidth resource. If yes, the link is established. Otherwise, the link is established. The tunnel link failed.
MPLS-TE流量工程利用可用资源沿链路建立LSP(Label Switching Path,标签交换路径),从而确保始终为特定流量提供带宽保证,以避免在稳定或故障的情况下出现拥塞。DS-TE使MPLS-TE感知到CoS(class of service,服务等级),允许根据CoS细粒度来预留资源,并在每个CoS级别提供MPLS(Multi-Protocol Label Switching,多协议标签交换)容错机制。通过将DiffServ(区分服务)与TE(traffic-engineering,流量工程)的功能结合在一起,DS-TE可提供QoS(Quality of Service,服务质量)保证以满足严格的SLA(Service-Level Agreement,服务等级协议),如语音、ATM(Asynchronous Transfer Mode,异步传输模式)和帧中继等。MPLS-TE traffic engineering uses the available resources to establish an LSP (Label Switching Path) along the link to ensure that bandwidth is always guaranteed for specific traffic to avoid congestion in case of stability or failure. DS-TE enables MPLS-TE to sense the CoS (class of service), allows resources to be reserved according to the fine-grained CoS, and provides MPLS (Multi-Protocol Label Switching) fault tolerance at each CoS level. mechanism. By combining the functions of DiffServ (differentiated service) and TE (traffic-engineering), DS-TE can provide QoS (Quality of Service) guarantee to meet strict SLA (Service-Level Agreement). Level agreements), such as voice, ATM (Asynchronous Transfer Mode) and frame relay.
在建立LSP的过程中,当带宽无法满足时,一种解决方法是拆除另外一条已经建立的路径,占用为它分配的带宽资源,这种方式称为抢占。在抢占过程中,如何快速定位到最优可利用的链路,成为至关重要的一个环节,对此,目前不同的厂商第一的回收原则不尽相同,并没有统一的处理方式,导致新链路的建立效率较低。In the process of establishing an LSP, when the bandwidth cannot be met, one solution is to remove another established path and occupy the bandwidth resources allocated for it. This method is called preemption. In the process of preemption, how to quickly locate the optimal available link becomes a crucial link. At present, the recycling principles of different manufacturers are different, and there is no unified processing method, resulting in new Link establishment is inefficient.
下面将结合本公开实施例中的附图,对本公开实施例中的方案进行清楚、完整地描述。所描述的实施例仅仅是本公开一部分实施例,而不是全部的实施例。基于本公开中的实施例,本领域普通技术人员在没有作出创造性劳动的前提下所获得的所有其他实施例,都属于本公开保护的范围。The solution in the embodiments of the present disclosure will be clearly and completely described below in conjunction with the drawings in the embodiments of the present disclosure. The described embodiments are only a part of the embodiments of the present disclosure, and not all of the embodiments. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments of the present disclosure without departing from the inventive scope are the scope of the disclosure.
首先通过以下例子来说明本公开在隧道链路建立的过程中如何建立资源回收原则。First, the following example is used to illustrate how the present disclosure establishes a resource recovery principle in the process of tunnel link establishment.
如图2所示,在设备A和设备C之间已建立一条隧道tunnel(链路或路径)1,该链路的建立优先级和保持优先级组合为(3,2),当新建一条隧道tunnel2时,如果与已建立的隧道链路tunnel1争夺资源,只有当tunnel2的建立优先级高于tunnel1时(数值越小优先级越高),tunnel2抢占资源才会成功。如图2所示,设备A和设备C之间最大预留带宽为20M,已建链 路tunnel1带宽为15M,优先级组合为(3,2),于是当前剩余可用带宽为5M。新建路径tunnel2,优先级组合为(1,0),要占用带宽18M,剩余带宽已经无法满足tunnel2的建立要求,此时就要拆除优先级比较低的tunnel1,来保证tunnel2成功建链。As shown in Figure 2, a tunnel tunnel (link or path) 1 is established between device A and device C. The association between the establishment priority and the hold priority of the link is (3, 2). In tunnel2, if the tunnel is contending with the established tunnel link, the resource will be successful only if the priority of the tunnel is higher than that of the tunnel1 (the smaller the value is, the higher the priority is). As shown in Figure 2, the maximum reserved bandwidth between device A and device C is 20M, the bandwidth of the established tunnel1 is 15M, and the priority combination is (3, 2), so the current remaining available bandwidth is 5M. Create tunnel 2, the priority combination is (1,0), and the bandwidth is 18M. The remaining bandwidth cannot meet the requirements for tunnel2. In this case, tunnel1 with lower priority is removed to ensure that tunnel2 is successfully established.
以上例子只是展示了设备间只有一条链路存在时的抢占规则,但是在现实网络中设备间往往承载了大量的链路,如图3所示的模型,中,所有链路最大预留带宽为60M,目前包含4条链路,已分配了60M,现在新增链路tunnel5需要带宽15M,优先级组合为(2,1),带宽资源已经不足。按照上述原则,新建立的链路只能按照优先级抢占已建立的链路,图3中的tunnel2、tunnel3和tunnel4均是满足抢占条件的链路,那么在抢占资源时可能有下面几种情况产生:The above example only shows the preemption rule when only one link exists between devices. However, in a real network, devices often carry a large number of links. As shown in Figure 3, the maximum reserved bandwidth of all links is 60M, currently contains 4 links, has been allocated 60M, now the new link tunnel5 needs bandwidth 15M, priority combination is (2,1), bandwidth resources are insufficient. According to the above principles, the newly established link can only preempt the established link according to the priority. Tunnel 2, tunnel 3, and tunnel 4 in Figure 3 are the links that meet the preemption condition. produce:
第一种情况:选择优先级最低的链路开始拆除,假设从tunnel4开始拆除,由于tunnel4占用20M带宽,只拆除tunnel4就能满足带宽要求。In the first case, the link with the lowest priority is selected to be removed. Assume that it is removed from tunnel4. Since tunnel4 occupies 20M bandwidth, only the tunnel4 can be removed to meet the bandwidth requirement.
第二种情况:选择优先级最低的链路开始拆除,假设从tunnel3开始拆除,由于tunnel3占用10M带宽,不能满足带宽要求,继续拆除tunnel4,最后满足带宽要求。The second case: the link with the lowest priority is selected to be removed. Assume that the tunnel 3 is removed from the tunnel. As the tunnel 3 occupies 10 Mbits of bandwidth, the bandwidth cannot be met. The tunnel 4 is removed and the bandwidth is met.
第三种情况:在比新建链路优先级低的链路中随机选择拆除,直到满足新建链路的带宽要求。假设从tunnel2开始拆除,那么可能同时拆除tunnel2和tunnel3。The third case: randomly removes the link with a lower priority than the newly created link until the bandwidth requirement of the new link is met. Assuming that the tunnel2 is removed, it is possible to remove both tunnel2 and tunnel3.
第四种情况:在比新建链路优先级低的链路中随机选择拆除,直到满足新建链路的带宽要求。假设从tunnel2开始拆除,那么可能同时拆除tunnel2和tunnel4。The fourth case: randomly removes the link with lower priority than the new link until the bandwidth requirement of the new link is met. Assuming that you are removing from tunnel2, you may remove tunnel2 and tunnel4 at the same time.
对上面的几个情况逐一进行分析如下:The above several cases are analyzed one by one as follows:
拆除了最低优先级的链路,拆除了一条共20M的链路,冗余带宽为5M。The lowest priority link was removed, and a total of 20M links were removed with a redundant bandwidth of 5M.
拆除了最低优先级的链路,拆除了两条共30M的链路,冗余带宽为15M。The lowest priority link was removed, and two 30M links were removed with a redundant bandwidth of 15M.
拆除了最低优先级和较低优先级的链路,拆除了两条共20M链路,冗余带宽为5M。The lowest priority and lower priority links were removed, and two 20M links were removed with a redundant bandwidth of 5M.
拆除了最低和较低优先级的链路,拆除了两条共30M链路,冗余带宽为15M。The lowest and lower priority links were removed, and two 30M links were removed with a redundant bandwidth of 15M.
从以上的分析情况来看,如果拆除的链路过多,影响的业务也会增多,如果拆除的链路的优先级非最低,也会影响优先级高的业务,因此,在本公开中认为上述第一种情况是最佳的结果,拆除链路的优先级最低,拆除的链路数量最少,且拆除的链路的冗余带宽最小。From the above analysis, if there are too many links to be removed, the number of services affected will also increase. If the priority of the removed link is not the lowest, it will affect the service with higher priority. Therefore, it is considered in the present disclosure. The first case described above is the best result. The removal link has the lowest priority, the number of removed links is the least, and the redundant bandwidth of the removed link is the smallest.
综上所述,在带宽抢占时,从对已有业务影响范围最小,以及资源合理利用的角度来考虑,本公开提出以下三个资源回收原则:In summary, in terms of bandwidth preemption, the present disclosure proposes the following three resource recovery principles from the perspective of minimizing the impact on existing services and rational utilization of resources:
优先级最低的路径为抢占的第一选择;The path with the lowest priority is the first choice for preemption;
拆除的路径数总和最少;The total number of paths removed is the least;
拆除的路径的冗余带宽最小。The removed path has the least redundant bandwidth.
在使用上述三个资源回收原则进行资源回收时,按照上述三个原则的顺序依次进行查找,并确认。When using the above three resource recovery principles for resource recovery, look up and confirm in the order of the above three principles.
基于本公开中提出的上述资源回收原则,通过下述实施例对本公开提供的隧道带宽资源回收方法进行详细说明。Based on the above-mentioned resource recovery principle proposed in the present disclosure, the tunnel bandwidth resource recovery method provided by the present disclosure will be described in detail through the following embodiments.
方法实施例Method embodiment
本实施例提供了一种隧道带宽资源回收方法,图4是该方法的流程图,如图4所示,该方法包括如下处理:This embodiment provides a tunnel bandwidth resource recovery method, and FIG. 4 is a flowchart of the method. As shown in FIG. 4, the method includes the following processing:
步骤401:在新建一条目标链路时,在剩余带宽资源不足的情况下,从已建立的链路中保持优先级最低的链路开始,选择在足以满足目标链路所需带宽的基础上,拆除链路数据量最少且拆除链路冗余带宽最小的链路进行拆除;Step 401: When a new target link is created, if the remaining bandwidth resources are insufficient, starting from the link with the lowest priority in the established link, and selecting the bandwidth required for the target link, Demolition of the link with the least amount of link data and the smallest redundant bandwidth of the removed link;
步骤402:基于拆除链路得到的带宽新建目标链路。Step 402: Create a new target link based on the bandwidth obtained by removing the link.
上述步骤401至402是一种通用的隧道带宽资源回收方法,以下基于不同的流量工程模型来对该方法的使用进行说明。The above steps 401 to 402 are a general tunnel bandwidth resource recovery method. The following uses the different traffic engineering models to illustrate the use of the method.
MPLS-TE流量工程模型如图5所示。接口上分配了一定的TE带宽,每新建一条tunnel按比例分配一定的带宽,每个tunnel上可建立多条LSP,tunnel之间存在优先级组合,建立优先级和保持优先级组合(SP,HP),其中,SP用于表示建立优先级,HP用于表示保持优先级,根据优先级最低抢占原则,在建链过程中,按优先级类别进行表项管理,在剩余带宽不足的情况下,要保证能够查到优先级低的链路,不能占用优先级高的链路。如图6所示HP优先级有序链表,优先级HP1>HP2>HP3>HP4>HP5>HP6>HP7,如果HP1中出现带宽不足,则可以向HP7到HP2的优先级链表中抢占带宽。The MPLS-TE traffic engineering model is shown in Figure 5. A certain TE bandwidth is allocated on the interface. Each new tunnel is allocated a certain amount of bandwidth. Multiple LSPs can be set up on each tunnel. There is a priority combination between the tunnels to establish a priority and maintain priority combination (SP, HP). ), wherein the SP is used to indicate the establishment of the priority, and the HP is used to indicate that the priority is maintained. According to the principle of the lowest priority preemption, in the process of establishing the chain, the item management is performed according to the priority category, and in the case that the remaining bandwidth is insufficient, To ensure that a link with a lower priority can be found, a link with a higher priority cannot be used. As shown in Figure 6, the HP priority ordered list, priority HP1> HP2> HP3> HP4> HP5> HP6> HP7, if there is insufficient bandwidth in HP1, you can preempt the bandwidth from HP7 to HP2 priority list.
根据拆除最少链路原则及冗余带宽最小原则,本实施例在图6中所示的优先级表项的基础上,还记录了同一种优先级下带宽的一种排序情况,本实施例中采用的是有序链表的管理方式,即每种优先级节点下挂一个关于带宽的有序链表,基于此得到的带宽数据管理模型如图7所示。According to the principle of removing the minimum link and the principle of minimizing the redundancy, the present embodiment records a sorting situation of the bandwidth of the same priority on the basis of the priority entry shown in FIG. 6. In this embodiment, The management method of the ordered linked list is adopted, that is, each priority node is linked with an ordered list of bandwidths, and the bandwidth data management model obtained based on this is shown in FIG. 7 .
基于图7中所示的带宽数据管理模块,基于MPLS-TE流量工程模型隧道带宽资源回收方法具体可以按照如下方式进行处理:Based on the bandwidth data management module shown in FIG. 7, the MPLS-TE traffic engineering model tunnel bandwidth resource recovery method may be specifically processed as follows:
在新建目标链路之前,将已建立的链路的各个保持优先级与有序链表建立对应关系,有序链表中包括至少一项已建立的链路与该链路已分配的带宽的信息;选择在足以满足目标链路所需带宽的基础上,拆除链路数据量最少且拆除链路冗余带宽最小的链路进行拆除,包括:从已建的链路中保持优先级最低的优先级所对应的所述有序链表中开始查找满足目标链路带宽需求的至少一种待拆除链路的第一链路组合,筛选出所述第一链路组合中需拆除链路数量最小的第二链路组合,在所述第二链路组合中选择冗余带宽最小的第三链路组合,拆除所述第三链路组合中的链路,其中,有序链表中按照已建链路的建链优先级的顺序进行排序。Before the new target link is created, the respective retention priorities of the established links are associated with the ordered linked list, and the ordered linked list includes at least one established link and information about the allocated bandwidth of the link; Selecting the link with the least amount of link data and the minimum link redundancy bandwidth to be removed, including maintaining the lowest priority priority from the established link, based on the bandwidth required to meet the target link. Corresponding to the first linked combination of at least one to-be-removed link that meets the target link bandwidth requirement, the corresponding ordered list is selected to filter out the minimum number of links to be removed in the first link combination. a second link combination, in which the third link combination with the smallest redundant bandwidth is selected, and the link in the third link combination is removed, wherein the ordered link is in accordance with the established link The order of the build chain priorities is sorted.
基于图7中所示的模型,当出现剩余带宽不足时,查找低优先级下挂的(即对应的)带宽排序链表(即上述有序链表),根据抢占原则,抢占合适的链路。由于目前抢占动作仅在建立动态TE隧道时发生,为了保证抢占发生时可以快速确定拆除的链路,性能问题也要纳入考虑。对于查找可拆除的链路来说,顺序查找时,复杂度为O(n),在存在大量链路时,查找性能较低,有可能会导致新建链路失败,而折半查找(又称二分查找)复杂度为O(log 2n),故在本实施例中采用折半查找算法。当一条路径的带宽无法满足新建链路的带宽需求时,会拆分多条链路来满足带宽需求,假设共有n个可选择的链路,要拆除的链路路径数为m(1≤m≤n),最差的情况会遍历组合C(n,m)次,对于固定m-1个路径后,第m个路径的查找用折半查找,提高查询性能,将满足条件的链路组合放到一个有序链表中,链表根据冗余带宽的大小进行排序,最后选择冗余带宽最小的一组作为选择结果,如果在查找过程中刚好找到冗余带宽为0的组合,则直接返回该组合结果。 Based on the model shown in FIG. 7, when the remaining bandwidth is insufficient, the low-priority (ie, corresponding) bandwidth ordering list (ie, the above-mentioned ordered list) is searched for, and the appropriate link is preempted according to the preemption principle. The current preemption action occurs only when a dynamic TE tunnel is established. To ensure that the removed link can be quickly determined when the preemption occurs, performance problems should also be considered. For the search for a detachable link, the complexity is O(n) when searching in a sequential order. When there are a large number of links, the search performance is low, which may cause the new link to fail, and the half-search (also called the binary point). The complexity is found to be O(log 2 n), so a binary search algorithm is employed in this embodiment. When the bandwidth of a path cannot meet the bandwidth requirements of the new link, multiple links are split to meet the bandwidth requirement. Assume that there are n selectable links. The number of link paths to be removed is m (1 ≤ m). ≤n), the worst case will traverse the combination C(n,m) times. After fixing m-1 paths, the search of the mth path uses a half-fold search to improve query performance and put the link combination that satisfies the condition. In an ordered list, the linked list is sorted according to the size of the redundant bandwidth. Finally, the group with the smallest redundant bandwidth is selected as the selection result. If the combination with the redundant bandwidth of 0 is found in the search process, the combination is directly returned. result.
图7中的模型可以满足MPLS-TE流量工程的带宽资源回收计算,MPLS-TE在拆除链路时,并不考虑链路上承载了哪些业务,其无法做到对业务类别的区分。而DS-TE工程能够区分不同类型的流量,对不同类型的流量实行不同的带宽限制。流量类别CT的范围为CT0-CT7,一般来说CT7是QoS要求最严格的流量,CT0是尽力而为的流量,在这里,将流量类别CT0-CT7对应的带宽约束定义为BC0-BC7。而流量类别(CT)对应的带宽约束(BC)关系,在不同的约束模型中并不相同,下面介绍基于两种常用的带宽约束模型实现本实施例提供的隧道带宽资源回收方法:The model in Figure 7 can meet the bandwidth resource recovery calculation of MPLS-TE traffic engineering. When the link is removed, MPLS-TE does not consider which services are carried on the link, and cannot distinguish the service class. DS-TE engineering can distinguish between different types of traffic and impose different bandwidth limits on different types of traffic. The traffic class CT ranges from CT0 to CT7. Generally, CT7 is the traffic with the strictest QoS requirements, and CT0 is the best-effort traffic. Here, the bandwidth constraint corresponding to traffic class CT0-CT7 is defined as BC0-BC7. The bandwidth constraint (BC) relationship corresponding to the traffic class (CT) is different in different constraint models. The following describes the tunnel bandwidth resource recovery method provided by this embodiment based on two common bandwidth constraint models:
MAM(Maximum Allocation Model,最大分配模型):MAM (Maximum Allocation Model):
MAM将一个BC映射成一个CT。链路带宽在不同CT间进行简单的分配,以3个CT为例,MAM分配模式如图8所示。MAM的约束条件如下:The MAM maps a BC into a CT. The link bandwidth is simply allocated between different CTs. Take 3 CTs as an example. The MAM allocation mode is shown in Figure 8. The constraints of MAM are as follows:
Figure PCTCN2018075400-appb-000001
最大预留带宽为各个带宽约束BC之和;
Figure PCTCN2018075400-appb-000001
The maximum reserved bandwidth is the sum of the individual bandwidth constraints BC;
假设设置BC i和BC j(i<j)两个带宽约束条件,它们要满足:BC i和BC j之间的带宽绝对不可以互相使用。该MAM模型的约束条件较为简单,在每个BC内建立新隧道时如发生带宽不足的情况,需在本BC内抢占带宽资源。以两类流量类别(CT)为例,如图9所示,每个BC中所有隧道的LSP都映射为同一个CT,即BC0上承载的LSP均为CT0,BC1上承载的LSP均为CT1。当发生资源抢占时,隧道间的资源抢占发生在同一个BC内,确保其他类别的流量不受影响。对于MAM约束模型,内部数据管理模型如图10所示,每个BC进行独立管理,每个BC内的tunnel都是同一个CT,在发生资源抢占时,在同一个BC内,依据上述三个资源回收原则,对带宽资源进行回收,具体处理流程如下: Assuming that two bandwidth constraints, BC i and BC j (i<j), are set, they are satisfied that the bandwidth between BC i and BC j must not be used with each other. The constraints of the MAM model are relatively simple. If a bandwidth is insufficient when a new tunnel is established in each BC, the bandwidth resources need to be preempted in the BC. For example, as shown in Figure 9, the LSPs of all the tunnels in each BC are mapped to the same CT. The LSPs carried on BC0 are all CT0, and the LSPs carried on BC1 are CT1. . When resource preemption occurs, resource preemption between tunnels occurs in the same BC, ensuring that traffic of other categories is not affected. For the MAM constraint model, the internal data management model is shown in Figure 10. Each BC is managed independently. The tunnels in each BC are the same CT. In the event of resource preemption, in the same BC, according to the above three The principle of resource recovery is to recycle bandwidth resources. The specific processing flow is as follows:
当即将在一个带宽约束内建立一条新链路时,在剩余带宽资源不足的情况下,在带宽约束内已建立的链路中保持优先级最低的链路开始,选择在足以满足新建链路所需带宽的基础上,拆除链路数据量最少且拆除链路冗余带宽最小的链路进行拆除。When a new link is to be established within a bandwidth constraint, in the case where the remaining bandwidth resources are insufficient, the link with the lowest priority is maintained in the established link within the bandwidth constraint, and the selection is sufficient to satisfy the new link. On the basis of the required bandwidth, the link with the least amount of link data and the smallest redundant bandwidth of the link is removed for removal.
RDM(Russian Dolls Model,俄罗斯套娃模型)RDM (Russian Dolls Model, Russian doll model)
RDM模型允许CT间共享带宽,BC直接的约束条件如下:The RDM model allows shared bandwidth between CTs. The direct constraints of BC are as follows:
max-te-resv-bw≥BC0≥BC1≥BC2≥BC3≥BC4≥BC5≥BC6≥BC7;Max-te-resv-bw≥BC0≥BC1≥BC2≥BC3≥BC4≥BC5≥BC6≥BC7;
假设设置BC i和BC j(i<j)两个带宽约束条件,它们要满足以下两个条件: Assuming that two bandwidth constraints, BC i and BC j (i<j), are set, they satisfy the following two conditions:
BC j的带宽要得到保证,如果BC j的带宽未被使用,BC i可以使用;也就是说,在BC i使用了BC j的带宽,而BC j剩余带宽不足分配时,要将已分配的BC i回收,保证BC j的带宽利用。 BC j bandwidth to be guaranteed, if BC j of unused bandwidth, BC i can use; that is to say, in BC i BC j using the bandwidth, while the remaining BC j insufficient bandwidth allocation, to the allocated BC i recycling, to ensure the bandwidth utilization of BC j .
BC j绝对不可以使用BC i的带宽。 BC j must not use the bandwidth of BC i .
以3个CT为例,RDM的BC限制如图11所示,BC2的带宽只允许CT2使用,CT2的流量最大为BC2,BC1的流量允许CT1和CT2使用,CT1最大可以为BC2,当CT2带宽不足时,对CT1的带宽进行回收。Taking 3 CTs as an example, the BC limit of RDM is shown in Figure 11. The bandwidth of BC2 is only allowed to be used by CT2. The traffic of CT2 is BC2. The traffic of BC1 is allowed to be used by CT1 and CT2. The maximum of CT1 can be BC2. When CT2 is used. When it is insufficient, the bandwidth of CT1 is recovered.
由于这种模型中BC之间的带宽是可以共享的,在同一个BC中CT出现带宽不足时,还要考虑该BC的带宽是否已经被低等级的CT(低等级CT即等级低于与BC对应的CT)所分享。每个BC在分配时,都存在一个保证带宽,当该BC内已使用的带宽与剩余可用带宽之和小于保证带宽时,说明此时该BC带宽已经被低等级的CT占用。反之,如果BC内已使用带宽与剩余带宽之和大于保证带宽时,说明该BC中的CT占用了高等级CT(高低等级CT即等级高于与BC对应的CT)的带宽。由此可见,要建立一张BC间的带宽约束管理表,以在发生资源共享时,快速计算查找占用者进行带宽回收,详见如下表1以及表2。Since the bandwidth between BCs in this model can be shared, when the CT has insufficient bandwidth in the same BC, it is also considered whether the bandwidth of the BC has been low-level CT (low-level CT is lower than BC). Corresponding to CT). Each BC has a guaranteed bandwidth when it is allocated. When the sum of the used bandwidth and the remaining available bandwidth in the BC is less than the guaranteed bandwidth, it indicates that the BC bandwidth has been occupied by the low-level CT at this time. On the other hand, if the sum of the used bandwidth and the remaining bandwidth in the BC is greater than the guaranteed bandwidth, it indicates that the CT in the BC occupies a bandwidth of a high-level CT (high-low-level CT, that is, a level higher than a CT corresponding to the BC). It can be seen that a bandwidth constraint management table between BCs is to be established to quickly calculate and search for occupants for bandwidth recovery when resource sharing occurs, as shown in Table 1 and Table 2 below.
表1Table 1
TYPETYPE max-bandwidthMax-bandwidth guaranteed-bwGuaranteed-bw used-bwUsed-bw remained-bwMetic-bw
BC0BC0 20M20M 10M10M 0M0M 10M10M
BC1BC1 10M10M 5M5M 0M0M 5M5M
BC2BC2 5M5M 5M5M 0M0M 5M5M
表2Table 2
TYPETYPE max-bandwidthMax-bandwidth guaranteed-bwGuaranteed-bw used-bwUsed-bw remained-bwMetic-bw
BC0BC0 20M20M 10M10M 15M15M 0M0M
BC1BC1 10M10M 5M5M 0M0M 0M0M
BC2BC2 5M5M 5M5M 0M0M 5M5M
其中,表1所建立的即为一张带宽管理约束表,该表为初始化表,表2为低等级CT占用高等级CT带宽时各表项数据的更新情况。表项内各个字 段的含义如下:Among them, Table 1 is a bandwidth management constraint table, which is an initialization table. Table 2 shows the update of each entry data when the low-level CT occupies a high-level CT bandwidth. The meaning of each field in the entry is as follows:
max-bandwidthMax-bandwidth
表示BC i(0≤i≤7)可用最大带宽,要满足RDM的第一个约束条件; Indicates that the maximum bandwidth available for BC i (0 ≤ i ≤ 7) is to satisfy the first constraint of the RDM;
guaranteed-bwGuaranteed-bw
保证带宽,即保证分配给CT i,不能被其他CT抢占的带宽,按照RDM的约束条件:guarannteed-bw i=BC j-BC i(i<j)。 The guaranteed bandwidth, that is, the bandwidth that is guaranteed to be allocated to CT i and cannot be preempted by other CTs, is in accordance with the constraints of RDM: guarannteed-bw i = BC j - BC i (i < j).
used-bwUsed-bw
BC i中实际分配给对应的CT i应用的带宽,对于其他CT共享的带宽的情况不做考虑,即used-bw i=∑CT iThe bandwidth actually allocated to the corresponding CT i application in BC i is not considered for the bandwidth shared by other CTs, that is, used-bw i = ∑ CT i .
remaind-bwRetaind-bw
guarannteed-bw i扣除被CT i和CT j占用的带宽后的剩余值。 Guaranneteed-bw i deducts the remaining value after the bandwidth occupied by CT i and CT j .
当CT i有建链需求时,其分配的带宽的流程如下: When CT i has a link-building requirement, the process of allocating bandwidth is as follows:
第一种情况:如果BC i的剩余带宽能够满足CT i的带宽要求,则更新BC i的使用带宽和剩余带宽属性,即CT i的带宽是从BC i获取的。 The first case: if the remaining bandwidth of BC i can meet the bandwidth requirement of CT i , the used bandwidth and remaining bandwidth attribute of BC i , that is, the bandwidth of CT i is obtained from BC i .
第二种情况:如果BC i的剩余带宽不能够满足CT i的带宽要求,则查询BC j(j>i)的剩余带宽是否满足要求,当剩余带宽能够满足时,则更新BC j的剩余带宽和BC i的使用带宽,即CT i的带宽是借用了BC j的保证带宽,此时存在了占用高级别CT带宽的情况。 The second case: if the remaining bandwidth of BC i cannot meet the bandwidth requirement of CT i , then whether the remaining bandwidth of BC j (j>i) is satisfied, and when the remaining bandwidth can be satisfied, the remaining bandwidth of BC j is updated. The bandwidth used by BC i , that is, the bandwidth of CT i is borrowed from the guaranteed bandwidth of BC j . At this time, there is a case where high-level CT bandwidth is occupied.
第三种情况:然而,当一直查询到CB 7,发现剩余带宽都不能满足CT i的要求时,则检查是否BC i的used-bw i属性是否小于guarannteed-bw i,当小于时,说明BC i有被其他的BC借用带宽,则从BC i-1向低优先级的方向检 查used-bw和guaranteed-bw的关系,直到查到BC k(k<i)存在used-bw>guaranteed-bw,说明其对应的CT通过借用BC i的带宽资源,而BC k也有可能存在被其他BC借用带宽的情况,所以继续向后遍历,直到找到“始作俑者”BC j(即借用其他BC带宽资源的低优先级的BC)。在本实施例中,BC j也可以是多个BC,然后回归更新从BC j到BC k到BC i的带宽属性。首先要回收BC j借用资源,保证BC k能够满足自身CT建链的要求,再将BC k借用的带宽释放给BC i,以满足CT i的建链,在本实施例中,也可能无需将BC k借用的带宽释放给BC i。回收BC j的借用资源时,通过查找对应BC建立的资源管理表项,见图10,查找满足资源回收原则的最低优先级隧道进行回收。 The third case: However, when a query has to CB 7, the remaining bandwidth is found to not meet the requirements of the CT i, it is checked whether the attribute used-bw i I BC is less than guarannteed-bw i, when less than described BC If i has borrowed bandwidth from other BCs, check the relationship between used-bw and guaranteed-bw from BC i-1 to the low priority direction until BC k (k<i) is found to have used-bw>guaranteed-bw , indicating that its corresponding CT borrows the bandwidth resources of BC i , and BC k may also have the bandwidth borrowed by other BCs, so continue to traverse backwards until it finds the “originator” BC j (ie borrowing other BC bandwidth resources) Priority BC). In this embodiment, BC j may also be a plurality of BCs, and then the bandwidth attributes from BC j to BC k to BC i are regression updated. Firstly, it is necessary to recover BC j borrowing resources to ensure that BC k can meet the requirements of its own CT chain building, and then release the bandwidth borrowed by BC k to BC i to meet the chain building of CT i . In this embodiment, it may not be necessary. The bandwidth borrowed by BC k is released to BC i . When recovering the borrowed resources of BC j , look up the resource management entries established by the corresponding BC, as shown in Figure 10, and find the lowest priority tunnel that meets the principle of resource recovery for recycling.
如果通过以上三种情况均无法满足CT i的带宽要求,则对应隧道建立不成功。 If the bandwidth requirements of CT i cannot be met through the above three cases, the corresponding tunnel establishment is unsuccessful.
基于上述分析,基于RDM模型实现本实施例的隧道带宽资源回收方法具体包括如下处理:当即将在第一带宽约束中建立第一流量类别的新链路时,在该第一带宽约束中剩余带宽不足,且可借用的带宽与该剩余带宽之和仍不足以满足建立需求的情况下,判断第一带宽约束中的带宽是否被第二流量类别借用,第二流量类别的等级低于第一流量类别的等级;在第二流量类别借用第一宽带约束中的带宽的情况下,从第二宽带约束开始,依次判断其他流量类别对应的其余带宽约束中的带宽是否被借用,得到判断结果,其他流量类别的等级低于第二流量类别的等级,以被占用带宽的各个带宽约束中被拆除的链路数量最少且拆除链路冗余带宽最小的原则回收其余带宽约束中被借用的带宽。Based on the foregoing analysis, the method for implementing the tunnel bandwidth resource recovery in this embodiment based on the RDM model specifically includes the following process: when a new link of the first traffic class is to be established in the first bandwidth constraint, the remaining bandwidth in the first bandwidth constraint If the sum of the borrowable bandwidth and the remaining bandwidth is still insufficient to meet the establishment requirement, determine whether the bandwidth in the first bandwidth constraint is borrowed by the second traffic category, and the second traffic class has a lower level than the first traffic. Level of the category; in the case that the second traffic class borrows the bandwidth in the first broadband constraint, starting from the second broadband constraint, sequentially determining whether the bandwidth in the remaining bandwidth constraints corresponding to the other traffic classes is borrowed, and obtaining the judgment result, the other The level of the traffic class is lower than the level of the second traffic class, and the borrowed bandwidth in the remaining bandwidth constraints is recovered on the principle that the number of removed links in each bandwidth constraint of the occupied bandwidth is the smallest and the redundant bandwidth of the removed link is minimized.
本公开实施例建立了一套通用流量带宽管理模型,由不同的数据结构表项组成。在发生资源抢占时,根据不同的流量模型对数据结构表项进行快速 查找,能迅速定位到最优可利用资源,保证新链路的建立,并且在此过程中,实现了对其他业务的影响最小化以及资源浪费的最小化。The embodiment of the present disclosure establishes a set of general traffic bandwidth management model, which is composed of different data structure entries. When resource preemption occurs, data structure entries are quickly searched according to different traffic models, which can quickly locate the optimal available resources, ensure the establishment of new links, and realize the impact on other services in the process. Minimization and minimization of resource waste.
装置实施例Device embodiment
本实施例提供了一种隧道带宽资源回收装置,该装置可以用于实现上述方法实施例中涉及到的隧道宽带资源回收方法,图12是该装置120的结构框图,如图12所示,该装置120包括如下组成部分:The embodiment provides a tunnel bandwidth resource recovery device, which can be used to implement the tunnel broadband resource recovery method involved in the foregoing method embodiment, and FIG. 12 is a structural block diagram of the device 120, as shown in FIG. Device 120 includes the following components:
拆除模块121,设置为在新建一条目标链路时,在剩余带宽资源不足的情况下,从已建立的链路中保持优先级最低的链路开始,选择在足以满足目标链路所需带宽的基础上,拆除链路数据量最少且拆除链路冗余带宽最小的链路进行拆除;The module 121 is configured to set a link with the lowest priority from the established link when the remaining bandwidth resource is insufficient, and select a bandwidth sufficient to meet the required bandwidth of the target link. On the basis of the removal, the link with the least amount of link data and the least redundant link bandwidth is removed for removal;
新建模块122,设置为基于拆除链路得到的带宽新建目标链路。The new module 122 is configured to create a new target link based on the bandwidth obtained by tearing down the link.
本实施例提供的装置120还可以包括:The apparatus 120 provided in this embodiment may further include:
建立模块,设置为在新建目标链路之前,将已建立的链路的各个保持优先级与有序链表建立对应关系,有序链表中包括至少一项已建立的链路与该链路已分配的带宽的信息;基于该创建模块,上述拆除模块设置为:从已建的链路中保持优先级最低的优先级所对应的有序链表中开始查找待拆除的链路,待查找成功后,拆除查找到的链路;其中,有序链表中按照已建链路的建链优先级的顺序进行排序。Establishing a module, configured to associate each retention priority of the established link with the ordered linked list before the new target link is established, and the ordered linked list includes at least one established link and the link is allocated. According to the creation module, the removal module is configured to: start to find the link to be removed from the ordered list corresponding to the lowest priority priority of the established link, and after the search is successful, The discovered link is removed; wherein the ordered list is sorted according to the link establishment priority of the established link.
在一个具体的实施例中,拆除模块121设置为:当即将在一个带宽约束内建立一条新链路时,在剩余带宽资源不足的情况下,在带宽约束内已建立的链路中保持优先级最低的链路开始,选择在足以满足新建链路所需带宽的基础上,拆除链路数据量最少且拆除链路冗余带宽最小的链路进行拆除。In a specific embodiment, the teardown module 121 is configured to maintain a priority in the established link within the bandwidth constraint when a new link is to be established within a bandwidth constraint, in the event that the remaining bandwidth resources are insufficient. The lowest link starts, and the link with the least amount of link data and the smallest redundant bandwidth of the link is removed for removal on the basis of sufficient bandwidth for the new link.
在另一个具体的实例中,上述拆除模块121包括:In another specific example, the removing module 121 includes:
判断单元,设置为当即将在第一带宽约束中建立第一流量类别的新链路 时,在该第一带宽约束中剩余带宽不足,且可借用的带宽与该剩余带宽之和仍不足以满足建立需求的情况下,判断第一带宽约束中的带宽是否被第二流量类别借用,第二流量类别的等级低于第一流量类别的等级;拆除单元,设置为在第二流量类别借用第一宽带约束中的带宽的情况下,从第二宽带约束开始,依次判断其他流量类别对应的其余带宽约束中的带宽是否被借用,得到判断结果,其他流量类别的等级低于第二流量类别的等级,以被占用带宽的各个带宽约束中被拆除的链路数量最少且拆除链路冗余带宽最小的原则回收其余带宽约束中被借用的带宽。The determining unit is configured to: when a new link of the first traffic class is to be established in the first bandwidth constraint, the remaining bandwidth is insufficient in the first bandwidth constraint, and the sum of the borrowable bandwidth and the remaining bandwidth is still insufficient to satisfy If the requirement is established, determining whether the bandwidth in the first bandwidth constraint is borrowed by the second traffic class, the level of the second traffic class is lower than the level of the first traffic class; and the removing unit is configured to borrow the first in the second traffic class. In the case of the bandwidth in the broadband constraint, starting from the second broadband constraint, it is sequentially determined whether the bandwidth in the remaining bandwidth constraints corresponding to the other traffic classes is borrowed, and the judgment result is obtained, and the rank of the other traffic class is lower than the level of the second traffic class. The borrowed bandwidth in the remaining bandwidth constraints is recovered on the principle that the number of removed links in each bandwidth constraint of the occupied bandwidth is the smallest and the redundant bandwidth of the removed link is minimized.
本公开实施例还提供了一种计算机可读存储介质,存储有计算机可执行指令,所述计算机可执行指令被处理器执行时实现以上描述的方法。Embodiments of the present disclosure also provide a computer readable storage medium storing computer executable instructions that, when executed by a processor, implement the methods described above.
本领域普通技术人员可以理解,上文中所公开方法中的全部或某些步骤、系统、装置中的功能模块/单元可以被实施为软件、固件、硬件及其适当的组合。在硬件实施方式中,在以上描述中提及的功能模块/单元之间的划分不一定对应于物理组件的划分;例如,一个物理组件可以具有多个功能,或者一个功能或步骤可以由若干物理组件合作执行。某些组件或所有组件可以被实施为由处理器,如数字信号处理器或微处理器执行的软件,或者被实施为硬件,或者被实施为集成电路,如专用集成电路。这样的软件可以分布在计算机可读介质上,计算机可读介质可以包括计算机存储介质(或非暂时性介质)和通信介质(或暂时性介质)。如本领域普通技术人员公知的,术语计算机存储介质包括在用于存储信息(诸如计算机可读指令、数据结构、程序模块或其他数据)的任何方法或技术中实施的易失性和非易失性、可移除和不可移除介质。计算机存储介质包括但不限于RAM、ROM、EEPROM、闪存或其他存储器技术、CD-ROM、数字多功能盘(DVD)或其他光盘存储、磁盒、磁带、磁盘存储或其他磁存储装置、或者可以用于存储期望的信息并且可以被计算机访问的任何其他的介质。此外,本领域普通技术人员公知的 是,通信介质通常包含计算机可读指令、数据结构、程序模块或者诸如载波或其他传输机制之类的调制数据信号中的其他数据,并且可包括任何信息递送介质。Those of ordinary skill in the art will appreciate that all or some of the steps, systems, and functional blocks/units of the methods disclosed above may be implemented as software, firmware, hardware, and suitable combinations thereof. In a hardware implementation, the division between functional modules/units mentioned in the above description does not necessarily correspond to the division of physical components; for example, one physical component may have multiple functions, or one function or step may be composed of several physical The components work together. Some or all of the components may be implemented as software executed by a processor, such as a digital signal processor or microprocessor, or as hardware, or as an integrated circuit, such as an application specific integrated circuit. Such software may be distributed on a computer readable medium, which may include computer storage media (or non-transitory media) and communication media (or transitory media). As is well known to those of ordinary skill in the art, the term computer storage medium includes volatile and nonvolatile, implemented in any method or technology for storing information, such as computer readable instructions, data structures, program modules or other data. Sex, removable and non-removable media. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disc (DVD) or other optical disc storage, magnetic cartridge, magnetic tape, magnetic disk storage or other magnetic storage device, or may Any other medium used to store the desired information and that can be accessed by the computer. Moreover, it is well known to those skilled in the art that communication media typically includes computer readable instructions, data structures, program modules, or other data in a modulated data signal, such as a carrier wave or other transport mechanism, and can include any information delivery media. .
尽管为示例目的,已经公开了本公开的示例性实施例,本领域的技术人员将意识到各种改进、增加和取代也是可能的,因此,本公开的范围应当不限于上述实施例。While the exemplary embodiments of the present disclosure have been disclosed for illustrative purposes, those skilled in the art will recognize that various modifications, additions and substitutions are possible, and the scope of the present disclosure should not be limited to the embodiments described above.
工业实用性Industrial applicability
本公开实施例建立了一套通用流量带宽管理模型,由不同的数据结构表项组成。在发生资源抢占时,根据不同的流量模型对数据结构表项进行快速查找,能迅速定位到最优可利用资源,保证新链路的建立,并且在此过程中,实现了对其他业务的影响最小化、资源浪费的最小化。The embodiment of the present disclosure establishes a set of general traffic bandwidth management model, which is composed of different data structure entries. When resource preemption occurs, data structure entries are quickly searched according to different traffic models, which can quickly locate the optimal available resources, ensure the establishment of new links, and realize the impact on other services in the process. Minimize and minimize waste of resources.

Claims (11)

  1. 一种隧道带宽资源回收方法,包括:A tunnel bandwidth resource recovery method includes:
    在新建一条目标链路时,在剩余带宽资源不足的情况下,从已建立的链路中保持优先级最低的链路开始,选择在足以满足所述目标链路所需带宽的基础上,拆除链路数据量最少且拆除链路冗余带宽最小的链路进行拆除(401);When a new target link is created, if the remaining bandwidth resources are insufficient, the link with the lowest priority is maintained from the established link, and the bandwidth is selected to be sufficient to meet the required bandwidth of the target link. The link with the least amount of link data and the least redundant link bandwidth is removed (401);
    基于拆除链路得到的带宽新建所述目标链路(402)。The target link is created (402) based on the bandwidth obtained by tearing down the link.
  2. 根据权利要求1所述的方法,其中,所述方法还包括:The method of claim 1 wherein the method further comprises:
    在新建所述目标链路之前,将已建立的链路的每个保持优先级与有序链表建立对应关系,所述有序链表中包括至少一项已建立的链路与该链路已分配的带宽的信息;Before each of the target links is created, each retention priority of the established link is associated with an ordered list, and the ordered list includes at least one established link and the link is allocated. Information about the bandwidth;
    所述选择在足以满足所述目标链路所需带宽的基础上,拆除链路数据量最少且拆除链路冗余带宽最小的链路进行拆除,包括:The selection is performed on the basis of the bandwidth required for the target link, and the link with the least amount of link data and the least redundant bandwidth of the link is removed, including:
    从已建的链路中保持优先级最低的优先级所对应的所述有序链表中开始查找满足目标链路带宽需求的至少一种待拆除链路的第一链路组合,筛选出所述第一链路组合中需拆除链路数量最小的第二链路组合,在所述第二链路组合中选择冗余带宽最小的第三链路组合,拆除所述第三链路组合中的链路。The first link combination of at least one to-be-removed link that satisfies the target link bandwidth requirement is searched for from the ordered linked list corresponding to the lowest-priority priority in the established link, and the selected The second link combination with the smallest number of links needs to be removed in the first link combination, and the third link combination with the smallest redundant bandwidth is selected in the second link combination, and the third link combination is removed. link.
  3. 根据权利要求2所述的方法,其中,所述有序链表中按照已建链路的建链优先级的顺序进行排序。The method according to claim 2, wherein the ordered list is sorted in the order of the link establishment priorities of the established links.
  4. 根据权利要求1所述的方法,其中,所述在新建一条目标链路时,在剩余带宽资源不足的情况下,从已建立的链路中保持优先级最低的链路开始,选择在足以满足所述目标链路所需带宽的基础上,拆除链路数据量最少且拆除链路冗余带宽最小的链路进行拆除(401),包括:The method according to claim 1, wherein when the new target link is newly created, in the case that the remaining bandwidth resources are insufficient, the link having the lowest priority is maintained from the established link, and the selection is sufficient. Based on the required bandwidth of the target link, the link with the least amount of link data removed and the minimum redundant bandwidth of the link is removed (401), including:
    当即将在一个带宽约束内建立一条新链路时,在剩余带宽资源不足的情 况下,在所述带宽约束内已建立的链路中保持优先级最低的链路开始,选择在足以满足新建链路所需带宽的基础上,拆除链路数据量最少且拆除链路冗余带宽最小的链路进行拆除。When a new link is about to be established within a bandwidth constraint, in the case where the remaining bandwidth resources are insufficient, the link with the lowest priority is maintained in the established link within the bandwidth constraint, and the selection is sufficient to satisfy the new link. On the basis of the required bandwidth of the road, the link with the least amount of link data removed and the minimum redundant bandwidth of the link is removed for removal.
  5. 根据权利要求1所述的方法,其中,所述在新建一条目标链路时,在剩余带宽资源不足的情况下,从已建立的链路中保持优先级最低的链路开始,选择在足以满足所述目标链路所需带宽的基础上,拆除链路数据量最少且拆除链路冗余带宽最小的链路进行拆除(401),包括:The method according to claim 1, wherein when the new target link is newly created, in the case that the remaining bandwidth resources are insufficient, the link having the lowest priority is maintained from the established link, and the selection is sufficient. Based on the required bandwidth of the target link, the link with the least amount of link data removed and the minimum redundant bandwidth of the link is removed (401), including:
    当即将在第一带宽约束中建立第一流量类别的新链路时,在该第一带宽约束中剩余带宽不足,且可借用的带宽与该剩余带宽之和仍不足以满足建立需求的情况下,判断所述第一带宽约束中的带宽是否被第二流量类别借用,所述第二流量类别的等级低于所述第一流量类别的等级;When a new link of the first traffic class is to be established in the first bandwidth constraint, the remaining bandwidth in the first bandwidth constraint is insufficient, and the sum of the borrowable bandwidth and the remaining bandwidth is still insufficient to satisfy the establishment requirement. Determining whether the bandwidth in the first bandwidth constraint is borrowed by the second traffic class, the level of the second traffic class being lower than the level of the first traffic class;
    在所述第二流量类别借用所述第一宽带约束中的带宽的情况下,从所述第二宽带约束开始,依次判断其他流量类别对应的其余带宽约束中的带宽是否被借用,得到判断结果,所述其他流量类别的等级低于所述第二流量类别的等级,以被占用带宽的每个带宽约束中被拆除的链路数量最少且拆除链路冗余带宽最小的原则回收所述其余带宽约束中被借用的带宽。When the second traffic class borrows the bandwidth in the first broadband constraint, starting from the second broadband constraint, sequentially determining whether the bandwidth in the remaining bandwidth constraints corresponding to the other traffic classes is borrowed, and obtaining a determination result The rank of the other traffic class is lower than the level of the second traffic class, and the rest is recovered according to the principle that the number of removed links in each bandwidth constraint of the occupied bandwidth is the smallest and the redundant bandwidth of the link is minimized. The bandwidth borrowed in the bandwidth constraint.
  6. 一种隧道带宽资源回收装置(120),包括:A tunnel bandwidth resource recovery device (120) includes:
    拆除模块(121),设置为在新建一条目标链路时,在剩余带宽资源不足的情况下,从已建立的链路中保持优先级最低的链路开始,选择在足以满足所述目标链路所需带宽的基础上,拆除链路数据量最少且拆除链路冗余带宽最小的链路进行拆除;The module (121) is removed, and when a new target link is created, if the remaining bandwidth resources are insufficient, the link with the lowest priority is maintained from the established link, and the selection is sufficient to satisfy the target link. On the basis of the required bandwidth, remove the link with the least amount of link data and remove the link with the least redundant bandwidth to remove it;
    新建模块(122),设置为基于拆除链路得到的带宽新建所述目标链路。The new module (122) is configured to create the target link based on the bandwidth obtained by dismantling the link.
  7. 根据权利要求6所述的装置(120),其中,所述装置(120)还包括:The device (120) of claim 6, wherein the device (120) further comprises:
    建立模块,设置为在新建所述目标链路之前,将已建立的链路的每个保 持优先级与有序链表建立对应关系,所述有序链表中包括至少一项已建立的链路与该链路已分配的带宽的信息;Establishing a module, configured to: prior to creating the target link, associate each retention priority of the established link with an ordered list, where the ordered list includes at least one established link and Information about the bandwidth allocated by the link;
    所述拆除模块(121)设置为:The removal module (121) is configured to:
    从已建的链路中保持优先级最低的优先级所对应的所述有序链表中开始查找满足目标链路带宽需求的至少一种待拆除链路的第一链路组合,筛选出所述第一链路组合中需拆除链路数量最小的第二链路组合,在所述第二链路组合中选择冗余带宽最小的第三链路组合,拆除所述第三链路组合中的链路。The first link combination of at least one to-be-removed link that satisfies the target link bandwidth requirement is searched for from the ordered linked list corresponding to the lowest-priority priority in the established link, and the selected The second link combination with the smallest number of links needs to be removed in the first link combination, and the third link combination with the smallest redundant bandwidth is selected in the second link combination, and the third link combination is removed. link.
  8. 根据权利要求7所述的装置(120),其中,所述有序链表中按照已建链路的建链优先级的顺序进行排序。The apparatus (120) according to claim 7, wherein the ordered list is sorted in the order of the link establishment priorities of the established links.
  9. 根据权利要求6所述的装置(120),其中,所述拆除模块(121)设置为:The device (120) according to claim 6, wherein the removal module (121) is configured to:
    当即将在一个带宽约束内建立一条新链路时,在剩余带宽资源不足的情况下,在所述带宽约束内已建立的链路中保持优先级最低的链路开始,选择在足以满足新建链路所需带宽的基础上,拆除链路数据量最少且拆除链路冗余带宽最小的链路进行拆除。When a new link is about to be established within a bandwidth constraint, in the case where the remaining bandwidth resources are insufficient, the link with the lowest priority is maintained in the established link within the bandwidth constraint, and the selection is sufficient to satisfy the new link. On the basis of the required bandwidth of the road, the link with the least amount of link data removed and the minimum redundant bandwidth of the link is removed for removal.
  10. 根据权利要求6所述的装置(120),其中,所述拆除模块(121),包括:The device (120) according to claim 6, wherein the removal module (121) comprises:
    判断单元,设置为当即将在第一带宽约束中建立第一流量类别的新链路时,在该第一带宽约束中剩余带宽不足,且可借用的带宽与该剩余带宽之和仍不足以满足建立需求的情况下,判断所述第一带宽约束中的带宽是否被第二流量类别借用,所述第二流量类别的等级低于所述第一流量类别的等级;The determining unit is configured to: when a new link of the first traffic class is to be established in the first bandwidth constraint, the remaining bandwidth is insufficient in the first bandwidth constraint, and the sum of the borrowable bandwidth and the remaining bandwidth is still insufficient to satisfy If the requirement is established, determining whether the bandwidth in the first bandwidth constraint is borrowed by the second traffic class, where the level of the second traffic class is lower than the level of the first traffic class;
    拆除单元,设置为在所述第二流量类别借用所述第一宽带约束中的带宽的情况下,从所述第二宽带约束开始,依次判断其他流量类别对应的其余带宽约束中的带宽是否被借用,得到判断结果,所述其他流量类别的等级低于 所述第二流量类别的等级,以被占用带宽的每个带宽约束中被拆除的链路数量最少且拆除链路冗余带宽最小的原则回收所述其余带宽约束中被借用的带宽。Demolition unit, configured to determine, in the second traffic class, the bandwidth in the first broadband constraint, starting from the second broadband constraint, sequentially determining whether the bandwidth in the remaining bandwidth constraints corresponding to other traffic classes is Borrowing, obtaining a judgment result, the level of the other traffic class is lower than the level of the second traffic class, and the number of links that are removed in each bandwidth constraint of the occupied bandwidth is the smallest and the redundant bandwidth of the link is minimized. The principle recovers the borrowed bandwidth in the remaining bandwidth constraints.
  11. 一种计算机可读存储介质,存储有计算机可执行指令,所述计算机可执行指令被处理器执行时实现权利要求1-5中任一项所述的方法。A computer readable storage medium storing computer executable instructions that, when executed by a processor, implement the method of any of claims 1-5.
PCT/CN2018/075400 2017-03-07 2018-02-06 Method and apparatus for recovering tunnel bandwidth resource WO2018161754A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710131122.8A CN108574646A (en) 2017-03-07 2017-03-07 A kind of tunnel bandwidth recovery method as resource and device
CN201710131122.8 2017-03-07

Publications (1)

Publication Number Publication Date
WO2018161754A1 true WO2018161754A1 (en) 2018-09-13

Family

ID=63448447

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/075400 WO2018161754A1 (en) 2017-03-07 2018-02-06 Method and apparatus for recovering tunnel bandwidth resource

Country Status (2)

Country Link
CN (1) CN108574646A (en)
WO (1) WO2018161754A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116347528A (en) * 2023-05-29 2023-06-27 天翼云科技有限公司 CDN coverage resource dynamic adjustment method and device and electronic equipment

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111767134A (en) * 2020-05-18 2020-10-13 鹏城实验室 Multitask dynamic resource scheduling method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101127689A (en) * 2006-08-15 2008-02-20 中国电信股份有限公司 Method for minimizing priority seizing cost
CN101155131A (en) * 2006-09-29 2008-04-02 中国电信股份有限公司 Method for establishing label switched path of minimized path preemption cost
CN103312628A (en) * 2012-03-16 2013-09-18 中兴通讯股份有限公司 Scheduling method and device for aggregated links in packet switched network
US20160380818A1 (en) * 2015-06-26 2016-12-29 Ciena Corporation Tdm network call with compound service layer agreement

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1287563C (en) * 2002-06-24 2006-11-29 华为技术有限公司 Method for preempting multi-procotol label switching flow controlling band width resource
US8462638B2 (en) * 2011-03-31 2013-06-11 Cisco Technology, Inc. Soft preemption for minimizing preemptions in a network
CN104158739B (en) * 2014-08-29 2017-11-14 新华三技术有限公司 A kind of IP traffic engineerings management method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101127689A (en) * 2006-08-15 2008-02-20 中国电信股份有限公司 Method for minimizing priority seizing cost
CN101155131A (en) * 2006-09-29 2008-04-02 中国电信股份有限公司 Method for establishing label switched path of minimized path preemption cost
CN103312628A (en) * 2012-03-16 2013-09-18 中兴通讯股份有限公司 Scheduling method and device for aggregated links in packet switched network
US20160380818A1 (en) * 2015-06-26 2016-12-29 Ciena Corporation Tdm network call with compound service layer agreement

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116347528A (en) * 2023-05-29 2023-06-27 天翼云科技有限公司 CDN coverage resource dynamic adjustment method and device and electronic equipment
CN116347528B (en) * 2023-05-29 2023-07-28 天翼云科技有限公司 CDN coverage resource dynamic adjustment method and device and electronic equipment

Also Published As

Publication number Publication date
CN108574646A (en) 2018-09-25

Similar Documents

Publication Publication Date Title
EP3433759B1 (en) Method and apparatus for expanding high-availability server cluster
Guo et al. Secondnet: a data center network virtualization architecture with bandwidth guarantees
WO2018006653A1 (en) Method for determining forwarding path, and control device
US20140016652A1 (en) Dynamic traffic rearrangement and restoration for mpls networks with differentiated services capabilities
JP6789401B2 (en) Equal cost path entry established
US10063457B2 (en) Method, system, and apparatus for improving forwarding capabilities during route convergence
JP2013510459A (en) Separate path computation algorithm
CN108476175B (en) Transfer SDN traffic engineering method and system using dual variables
CN107332766B (en) Method for improving network throughput based on software defined network flow scheduling
WO2018161754A1 (en) Method and apparatus for recovering tunnel bandwidth resource
CN108322406B (en) SDN data plane fault recovery method based on link performance and flow classification
CN110858986A (en) Bandwidth adjusting method, device, communication equipment and computer readable storage medium
CN108347377B (en) Data forwarding method and device
CN110365588B (en) Data flow scheduling method and device and SDN controller
CN106921576B (en) Virtualization system-based data network and management network flow separation method and device
CN108429688B (en) Single-node fault route protection method based on segment route
CN111970149A (en) Shared bandwidth realizing method based on hardware firewall QOS
JP4255080B2 (en) Network failure recovery management method and network failure recovery management device
CN109474464B (en) Rapid network updating method based on OpenNF mechanism
CN113556281A (en) Rerouting method and device, electronic equipment and computer readable medium
CN107248952B (en) Method and system for determining service alternative route
WO2016095610A1 (en) Method and system for restoring optical layer service
WO2017000845A1 (en) Traffic control method and apparatus
JP4308788B2 (en) Task allocation method, task allocation device, path setting device, and network information collection device
CN107231301B (en) Optical cable replacement route determining method and system

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18763261

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18763261

Country of ref document: EP

Kind code of ref document: A1