WO2019179282A1 - 一种拓扑隐藏方法、节点、网络功能和计算机存储介质 - Google Patents

一种拓扑隐藏方法、节点、网络功能和计算机存储介质 Download PDF

Info

Publication number
WO2019179282A1
WO2019179282A1 PCT/CN2019/076085 CN2019076085W WO2019179282A1 WO 2019179282 A1 WO2019179282 A1 WO 2019179282A1 CN 2019076085 W CN2019076085 W CN 2019076085W WO 2019179282 A1 WO2019179282 A1 WO 2019179282A1
Authority
WO
WIPO (PCT)
Prior art keywords
network function
service
identifier
service provider
provider network
Prior art date
Application number
PCT/CN2019/076085
Other languages
English (en)
French (fr)
Inventor
陈旭
宋月
Original Assignee
中国移动通信有限公司研究院
中国移动通信集团有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中国移动通信有限公司研究院, 中国移动通信集团有限公司 filed Critical 中国移动通信有限公司研究院
Publication of WO2019179282A1 publication Critical patent/WO2019179282A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/40Support for services or applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/146Markers for unambiguous identification of a particular session, e.g. session cookie or URL-encoding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/51Discovery or management thereof, e.g. service location protocol [SLP] or web services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
    • H04L67/63Routing a service request depending on the request content or context

Definitions

  • the present application relates to wireless communication technologies, and in particular, to a topology hiding method, a node, a network function, and a computer storage medium.
  • the topology hiding of the roaming signaling interworking is to hide the topology of the local network without replacing the protocol standard, replace the real network element identifier, and hide the signaling route in the network.
  • the source host name in the request message and response message sent by this network needs to be hidden.
  • the signaling addressing after the topology is hidden is to translate and restore the replaced network element identifier in the subsequently received message, and realize the addressing in the network.
  • the destination host name (identification of the network element of the local network) in the request message sent by the external network is a hidden identifier and needs to be translated and restored.
  • the international roaming Diameter signaling is hop-by-hop addressed, and the topology is hidden by the International Routing Agent (I-DRA) node of the Diameter signaling network.
  • the I-DRA maintains a topology-hidden mapping table and routes it.
  • the problem to be solved is to hide the identifier of the source network element in the service request message and the response message, that is, hide the carrier network topology where the source node is located.
  • the service discovery process is introduced in the fifth generation mobile communication technology (5G) network, which is implemented by the NF Repository Function (NRF), and needs to discover the destination service provider network function before the service access ( NF, Network Function).
  • 5G fifth generation mobile communication technology
  • NRF NF Repository Function
  • the service user NF of the local network accesses the NRF of the network through the NRF of the local network to obtain the identifier (ID) or address of the network service provider NF.
  • ID identifier
  • the returned NF ID will expose the carrier network topology where the service provider NF is located if no topology hiding is performed.
  • SEPP security edge protection agent of the carrier network
  • Edge Protection Proxy performs topology hiding; the network topology information in the response message returned by the service provider NF is hidden by the SEPP of the carrier network of the carrier.
  • the prior art can only hide the service initiated by the service user NF during the service access process.
  • the request message and the carrier network topology in the response message returned by the service provider NF cannot meet the topology hiding requirement of the service provider NF in the service provider discovery process of the 5G network.
  • the embodiments of the present application provide a topology hiding method, a node, a network function, and a computer storage medium.
  • An embodiment of the present application provides a topology hiding method, where the method includes: an edge node receives an ingress service discovery request, and replaces, by the ingress service discovery request, an identifier of a service provider network function in a service discovery response with a topology hiding. The identifier of the service provider network function; the edge node forwards the service discovery response corresponding to the identifier of the service provider network function that is hidden by the topology service corresponding to the ingress service discovery request.
  • the replacing, by the ingress service discovery request, the identifier of the service provider network function in the service discovery response with the identifier of the service provider network function after the topology hiding includes: the edge node query pre
  • the mapping table obtains the identifier of the service provider network function after the topology hiding corresponding to the identifier of the service provider network function, and replaces the identifier of the service provider network function in the service discovery request corresponding to the ingress service discovery request with The identifier of the service provider network function after the topology is hidden.
  • the replacing, by the ingress service discovery request, the identifier of the service provider network function in the service discovery response with the identifier of the service provider network function after the topology hiding includes: the edge node The identifier of the service provider network function is transformed into an identifier of the service provider network function after the topology hiding, and the identifier of the service provider network function in the service discovery response corresponding to the ingress service discovery request is replaced by the topology hidden service The identity of the provider's network function.
  • the method further includes: the edge node storing a mapping relationship between an identifier of the service provider network function and an identifier of the service provider network function after the topology is hidden.
  • the method further includes: the edge node determining, according to the uniform resource identifier carried in the received message, that the message is a service discovery request, and the service discovery request is based on an external network service discovery network.
  • the function is sent to the local network service discovery network function to determine that the service discovery request is an ingress service discovery request.
  • the method further includes: the edge node receiving an ingress service request; the ingress service request carrying an identifier of the service provider network function after the topology hiding; the edge node is to enter the portal The identifier of the service provider network function after the topology hiding in the service request is replaced by the identifier of the service provider network function; the edge node sends the function of the service provider network to the network service provider network function The service request for the identity.
  • the edge node replaces the identifier of the service provider network function in the topology hidden request in the ingress service request with the identifier of the service provider network function, including: the edge node query Determining a mapping table or a stored mapping relationship, obtaining an identifier of the service provider network function corresponding to the identifier of the service provider network function after the topology hiding; the edge node is in the portal service request The identifier of the service provider network function after the topology is hidden is replaced with the identifier of the service provider network function.
  • the ingress service discovery request is a service discovery request sent by the extranet service discovery network function to the local network service discovery network function.
  • the ingress service request is a service request sent by the extranet service consumer network function to the local network service provider network function.
  • the embodiment of the present application further provides a topology hiding method, where the method includes: a service discovery network function receives an ingress service discovery request; and the service discovery network function determines a service provider network function corresponding to the ingress service discovery request, Performing topology hiding on the identifier of the service provider network function; the service discovery network function returns a service discovery response corresponding to the identifier of the service provider network function that carries the topology hidden corresponding to the ingress service discovery request.
  • the identifier of the service provider network function is topologically hidden, including: the service discovery network function determines whether an identifier including the service provider network function and the topology hidden service are stored. a mapping relationship of the identifier of the provider network function; when the mapping relationship between the identifier of the service provider network function and the identifier of the service provider network function after the topology hiding is stored, the obtaining is performed based on the mapping relationship The identifier of the service provider network function corresponding to the identifier of the service provider network function; the identifier of the service provider network function when the mapping relationship of the identifier of the service provider network function is not stored And generating an identifier of the service provider network function after the topology is hidden, and storing a mapping relationship between the identifier of the service provider network function and the identifier of the service provider network function after the topology is hidden.
  • the method further includes: the service discovery network function receiving a service discovery request of a local network node; the service discovery request carrying an identifier of a service provider network function after the topology hiding; the service discovery The network function determines an identifier of the service provider network function corresponding to the identifier of the service provider network function after the topology is hidden; and the service discovery network function returns the function of the service provider network to the local network node The identity of the service found response.
  • the service discovery network function determines an identifier of the service provider network function corresponding to the identifier of the service provider network function after the topology is hidden, and includes: the service discovery network function query storage mapping Relationship: obtaining an identifier of the service provider network function corresponding to the identifier of the service provider network function after the topology is hidden.
  • the ingress service discovery request is a service discovery request sent by the extranet service discovery network function to the local network service discovery network function.
  • the embodiment of the present application further provides a topology hiding method, where the method includes: a node receives an ingress service request, and extracts, from the ingress service request, an identifier of a service provider network function that is hidden by a topology;
  • the network service discovery network function sends a service discovery request carrying an identifier of the service provider network function after the topology is hidden;
  • the node receives the service provided by the service discovery network function and is provided with the topology hidden
  • the service discovery response of the identifier of the service provider network function corresponding to the identifier of the network function; the node replacing the identifier of the service provider network function after the topology hiding in the portal service request with the service discovery response
  • the embodiment of the present application further provides an edge node, where the edge node includes: a first receiving unit, a first replacing unit, and a first sending unit, where the first receiving unit is configured to receive an ingress service discovery request.
  • the first replacing unit is configured to replace the identifier of the service provider network function in the service discovery request corresponding to the ingress service discovery request received by the first receiving unit with the service provider network function after the topology hiding
  • the first sending unit is configured to forward a service discovery response corresponding to the identifier of the service provider network function of the topology hidden corresponding to the ingress service discovery request.
  • the first replacing unit is configured to query a preset mapping table to obtain an identifier of the service provider network function after the topology hiding corresponding to the identifier of the service provider network function, where the portal service is The identifier of the service provider network function in the discovery service corresponding to the service discovery response is replaced with the identifier of the service provider network function after the topology is hidden.
  • the first replacing unit is configured to transform an identifier of the service provider network function into an identifier of a service provider network function after topology hiding, and the ingress service discovery request corresponds to a service discovery response.
  • the identifier of the service provider network function in the middle replaces the identifier of the service provider network function after the topology is hidden.
  • the edge node further includes a first storage unit configured to store a mapping relationship between an identifier of the service provider network function and an identifier of the service provider network function after the topology is hidden.
  • the edge node further includes a first determining unit, configured to determine, according to the uniform resource identifier carried in the message received by the first receiving unit, that the message is a service discovery request, based on the service
  • the discovery request is sent by the external network service discovery network function to the local network service discovery network function to determine that the service discovery request is an ingress service discovery request.
  • the first receiving unit is further configured to receive an ingress service request; the ingress service request carries an identifier of the service provider network function after the topology hiding; the first replacement unit further And configured to replace, by the first receiving unit, the identifier of the service provider network function in the topology hidden in the ingress service request with an identifier of the service provider network function; the first sending unit And configured to send a service request carrying the identity of the service provider network function to the network service provider network function.
  • the first replacing unit is configured to query a preset mapping table or a stored mapping relationship, and obtain the service provider network function corresponding to the identifier of the service provider network function after the topology hiding. And an identifier of the service provider network function of the topology hidden in the ingress service request is replaced with an identifier of the service provider network function.
  • the ingress service discovery request is a service discovery request sent by the extranet service discovery network function to the local network service discovery network function.
  • the ingress service request is a service request sent by the extranet service consumer network function to the local network service provider network function.
  • the embodiment of the present application further provides a service discovery network function, where the service discovery network function includes a second receiving unit, a topology hiding unit, and a second sending unit, where the second receiving unit is configured to receive an ingress service. a discovery request; the topology hiding unit is configured to determine a service provider network function corresponding to the portal service discovery request received by the second receiving unit, and perform topology hiding on the identifier of the service provider network function; The second sending unit is configured to return a service discovery response corresponding to the identifier of the service provider network function that is hidden by the topology service corresponding to the ingress service discovery request.
  • the service discovery network function further includes a second storage unit configured to store a mapping relationship including an identifier of the service provider network function; the topology hiding unit configured to determine the second storage Whether the unit stores a mapping relationship including an identifier of the service provider network function; when the second storage unit stores a mapping relationship including an identifier of the service provider network function, obtaining the service based on the mapping relationship The identifier of the service provider network function corresponding to the topology hidden by the identifier of the provider network function; when the second storage unit does not store the mapping relationship including the identifier of the service provider network function, providing the service The identity of the network function generates an identification of the service provider network function after the topology is hidden.
  • the second receiving unit is further configured to receive a service discovery request of the local network node; the service discovery request carries an identifier of the service provider network function after the topology hiding; the topology hiding unit, An identifier of the service provider network function corresponding to the identifier of the service provider network function after the topology is hidden; the second sending unit is further configured to return to the local network node to carry the Service discovery response for the identity of the service provider network function.
  • the topology hiding unit is configured to query a stored mapping relationship, and obtain an identifier of the service provider network function corresponding to the identifier of the service provider network function after the topology is hidden.
  • the ingress service discovery request is a service discovery request sent by the extranet service discovery network function to the local network service discovery network function.
  • the embodiment of the present application further provides a node, where the node includes: a third receiving unit, an extracting unit, a third sending unit, and a second replacing unit; wherein the third receiving unit is configured to receive an ingress service request
  • the extracting unit is configured to extract, from the ingress service request received by the third receiving unit, an identifier of a topology-hidden service provider network function;
  • the third sending unit is configured to send, to the local service discovery network function, a service discovery request that carries an identifier of the service provider network function that is hidden by the topology; the third receiving unit is further configured to receive the a service discovery response returned by the service discovery network function carrying an identifier of a service provider network function corresponding to an identifier of the service provider network function after the topology is hidden; the second replacement unit configured to: The identifier of the service provider network function after the topology hiding in the service request is replaced by the identifier of the service provider network function corresponding to the identifier of the service provider network function after the topology hiding carried in the service discovery response .
  • the embodiment of the present application further provides a computer storage medium, where the computer instruction is stored, where the instruction is executed by the processor to implement the step of applying the topology hiding method of the edge node according to the embodiment of the present application; or When the instruction is executed by the processor, the step of applying the topology hiding method applied to the service discovery network function in the embodiment of the present application is implemented; or the instruction is executed by the processor to implement the topology applied to the node in the embodiment of the present application.
  • the steps to hide the method are described by the computer instruction is stored, where the instruction is executed by the processor to implement the step of applying the topology hiding method of the edge node according to the embodiment of the present application; or When the instruction is executed by the processor, the step of applying the topology hiding method applied to the service discovery network function in the embodiment of the present application is implemented; or the instruction is executed by the processor to implement the topology applied to the node in the embodiment of the present application.
  • the steps to hide the method are not limited to hide the method.
  • the embodiment of the present application further provides an edge node, including a memory, a processor, and a computer program stored on the memory and operable on the processor, and the processor executes the program to implement the embodiment of the present application.
  • the steps of the topology hiding method applied to the edge node are not limited to a processor, and a computer program stored on the memory and operable on the processor, and the processor executes the program to implement the embodiment of the present application.
  • the embodiment of the present application further provides a service discovery network function, including a memory, a processor, and a computer program stored on the memory and operable on the processor, and the processor executes the program to implement the embodiment of the present application.
  • a service discovery network function including a memory, a processor, and a computer program stored on the memory and operable on the processor, and the processor executes the program to implement the embodiment of the present application.
  • the embodiment of the present application further provides a node, including a memory, a processor, and a computer program stored on the memory and operable on the processor, and the processor implements the application described in the embodiment of the present application when the program is executed by the processor.
  • the steps of the topology hiding method of the node are described in the embodiment of the present application when the program is executed by the processor.
  • the edge node receives the ingress service discovery request, and the ingress service discovery request corresponds to the service provider network function in the service discovery response.
  • the identifier is replaced with an identifier of the service provider network function after the topology is hidden; the edge node forwards the service discovery response corresponding to the identifier of the service provider network function that is hidden by the topology service corresponding to the ingress service discovery request.
  • the service discovery network function receives an ingress service discovery request; the service discovery network function determines a service provider network function corresponding to the ingress service discovery request, and performs topology hiding on an identifier of the service provider network function; The service discovery network function returns a service discovery response corresponding to the identifier of the service provider network function that carries the topology hidden corresponding to the ingress service discovery request.
  • FIG. 1 is a schematic diagram of an application architecture of a topology hiding method according to an embodiment of the present application
  • FIG. 2 is a schematic flowchart 1 of a topology hiding method according to an embodiment of the present application
  • FIG. 3 is a schematic flowchart 2 of a topology hiding method according to an embodiment of the present application.
  • FIG. 4 is a schematic flowchart 3 of a topology hiding method according to an embodiment of the present application.
  • FIG. 5 is a schematic diagram of a specific interaction process of a topology hiding method according to an embodiment of the present application.
  • FIG. 6 is a schematic diagram of another specific interaction process of the topology hiding method according to an embodiment of the present application.
  • FIG. 7 is a schematic structural diagram of a structure of an edge node according to an embodiment of the present application.
  • FIG. 8 is a schematic structural diagram of another structure of an edge node according to an embodiment of the present application.
  • FIG. 9 is a schematic structural diagram of still another structure of an edge node according to an embodiment of the present application.
  • FIG. 10 is a schematic structural diagram of a structure of a service discovery network function according to an embodiment of the present application.
  • FIG. 11 is another schematic structural diagram of a function of a service discovery network according to an embodiment of the present application.
  • FIG. 12 is a schematic structural diagram of a node of an embodiment of the present application.
  • FIG. 1 is a schematic diagram of an application architecture of a topology hiding method according to an embodiment of the present application; as shown in FIG. 1, an NRF for service discovery and an NF for service provision are included.
  • the system architecture also includes edge nodes for forwarding data between the NRFs.
  • An example of an edge node may be SEPP, which is responsible for the security of interaction between networks.
  • a connection can be established between the two nodes of SEPP, NRF and NF over the network.
  • the destination node hidden in the topology in the service discovery scenario is the NF, that is, in the following embodiments, the identifier of the service provider network function may specifically be the identifier of the NF (denoted as the NF ID).
  • the embodiment of the present application provides a topology hiding method.
  • 2 is a schematic flowchart 1 of a topology hiding method according to an embodiment of the present application; as shown in FIG. 2, the method includes:
  • Step 101 The edge node receives the ingress service discovery request, and replaces the identifier of the service provider network function in the service discovery request corresponding to the service provider network response with the identifier of the service provider network function after the topology is hidden.
  • Step 102 The edge node forwards a service discovery response corresponding to the identifier of the service provider network function after the topology hiding corresponding to the ingress service discovery request.
  • the ingress service discovery request is a service discovery request sent by the external network service discovery network function to the local network service discovery network function.
  • the portal is The service discovery request is a service discovery request sent by the NRF of the network 1 to the NRF of the network 2.
  • the method further includes: the edge node determining, according to the uniform resource identifier carried in the received message, the message as a service discovery request, based on the service discovery request being The network discovery function is sent to the local network service discovery network function to determine that the service discovery request is an ingress service discovery request.
  • the edge node determines that the received message is an ingress service discovery request, and determines that the message is a service discovery request by using an API name of a Uniform Resource Identifier (URI) carried in the message;
  • URI Uniform Resource Identifier
  • the identifier of the service provider network function in the service discovery request corresponding to the service discovery request is replaced by the identifier of the service provider network function after the topology is hidden, including:
  • the edge node query preset mapping table obtains an identifier of the service provider network function after the topology hiding corresponding to the identifier of the service provider network function, and the ingress service discovery request corresponds to the service provider network in the service discovery response
  • the identity of the function is replaced with the identity of the service provider network function after the topology is hidden.
  • the mapping table is pre-configured and stored in the edge node, where the identifier of the service provider network function attributed to the local network (ie, the NF ID) and the identifier of the service provider network function after the topology hiding are recorded.
  • the mapping relationship of the NF ID after hiding the topology is recorded. In this way, in the scenario where the NF is used as the destination node or the source node for topology hiding, the same topology hidden NF ID can be used for replacement, thereby reducing the mapping table space.
  • the edge node searches for the stored mapping table by using the information (such as the NF ID) carried in the service discovery response corresponding to the ingress service discovery request or the ingress service discovery request, and obtains the identifier of the service provider network function after the topology hiding corresponding to the NF ID. (The NF ID after the topology is hidden), the NF ID in the service discovery response corresponding to the ingress service discovery request is replaced with the NF ID after the topology is hidden, and the edge node forwards the ingress service discovery that carries the NF ID after the topology hiding. Request the corresponding service discovery response.
  • the information such as the NF ID
  • the replacing, by the ingress service discovery request, the identifier of the service provider network function in the service discovery response with the identifier of the service provider network function after the topology hiding includes: the edge node The identifier of the service provider network function is transformed into an identifier of the service provider network function after the topology hiding, and the identifier of the service provider network function in the service discovery response corresponding to the ingress service discovery request is replaced by the topology hidden The identity of the service provider network function. And, the method further includes: the edge node storing a mapping relationship between an identifier of the service provider network function and an identifier of the service provider network function after the topology is hidden.
  • the edge node uses the dynamic transformation to generate the identifier of the service provider network function (the NF ID after the topology hiding) corresponding to the topology hidden by the identifier (NF ID) of the service provider network function. After the NF ID of the topology is hidden, the mapping between the NF ID and the NF ID after the topology is hidden is recorded.
  • the method further includes: the edge node receiving an ingress service request; the ingress service request carrying an identifier of the service provider network function after the topology hiding; The edge node replaces the identifier of the service provider network function in the topology hidden request in the ingress service request with an identifier of the service provider network function; the edge node sends a bearer to the network service provider network function A service request identifying the identity of the service provider network function.
  • the ingress service request is a service request sent by the external network service user network function to the network service provider network function.
  • the portal is The service request is a service request sent by the NF of the network 1 as the service user to the NF of the network 2 as the service provider.
  • the edge node replaces the identifier of the service provider network function in the topology service request with the identifier of the service provider network function in the ingress service request, and includes: the edge node query pre- Obtaining a mapping table or a stored mapping relationship, obtaining an identifier of the service provider network function corresponding to the identifier of the service provider network function after the topology hiding; the edge node is configured in the portal service request The identifier of the service provider network function after the topology is hidden is replaced with the identifier of the service provider network function.
  • the edge node receives the ingress service request, and the ingress service request carries the NF ID after the topology is hidden, and obtains the NF ID corresponding to the NF ID corresponding to the NF ID after the topology is hidden by querying the mapping table or the mapping relationship;
  • the edge node replaces the identifier of the service provider network function (ie, the NF ID after the topology hiding) of the topology hidden in the portal server request with the identifier (NF ID) of the real service provider network function.
  • the hiding of the identifier of the service provider network function of the service discovery response corresponding to the ingress service discovery request by the edge node in the service discovery scenario is implemented.
  • the embodiment of the present application further provides a topology hiding method.
  • 3 is a schematic flowchart 2 of a topology hiding method according to an embodiment of the present disclosure; as shown in FIG. 3, the method includes:
  • Step 201 The service discovery network function receives an ingress service discovery request.
  • Step 202 The service discovery network function determines a service provider network function corresponding to the ingress service discovery request, and performs topology hiding on the identifier of the service provider network function.
  • Step 203 The service discovery network function returns a service discovery response corresponding to the identifier of the service provider network function that is hidden by the topology service corresponding to the ingress service discovery request.
  • the ingress service discovery request is a service discovery request sent by the external network service discovery network function to the local network service discovery network function.
  • the service discovery network function is the NRF of the network 2
  • the The ingress service discovery request is a service discovery request sent by the NRF of the network 1 to the NRF of the network 2.
  • the service discovery network function receives an ingress service discovery request, and determines a service provider network function (NF) corresponding to the ingress service discovery request.
  • NF service provider network function
  • the topological hiding of the identifier of the service provider network function includes: the service discovery network function determines whether to store a mapping relationship that includes the identifier of the service provider network function; When the mapping relationship of the identifier of the service provider network function is described, the identifier of the service provider network function after the topology hiding corresponding to the identifier of the service provider network function is obtained based on the mapping relationship; when the service is not included And generating an identifier of the service provider network function after the topology is hidden, and storing the identifier of the service provider network function and the topology hidden after the mapping of the identifier of the service provider network function The mapping relationship of the identity of the service provider network function.
  • the service discovery network function stores a mapping relationship between the identifier of the at least one service provider network function and the identifier of the service provider network function after the topology is hidden, and then finds the service provider network function corresponding to the portal service discovery request. Determining, by the stored mapping relationship, whether a mapping relationship including an identifier of the service provider network function is stored; if a mapping relationship including an identifier of the service provider network function is stored, obtaining an identifier corresponding to the service provider network function The identifier of the service provider network function after the topology is hidden (that is, the NF ID after the topology is hidden); if the mapping relationship of the identifier of the service provider network function is not stored, the identifier of the service provider network function is The identifier of the service provider network function after the topology is hidden (that is, the NF ID after the topology is hidden) is generated, and the mapping relationship between the identifier of the service provider network function (that is, the NF ID) and the NF ID after the topology is
  • the service discovery network function returns a service discovery response corresponding to the identifier of the service provider network function that is hidden by the topology service corresponding to the ingress service discovery request.
  • the service discovery network function is The NRF of the network 2
  • the NRF of the network 2 receives the ingress service discovery request sent by the NRF of the network 1
  • the NRF of the network 2 determines the NF, and the topology of the NF ID is hidden
  • the NRF of the network 2 carries the topology to the NRF feedback of the network 1
  • the service discovery response corresponding to the ingress service discovery request of the hidden NF ID is The service discovery response corresponding to the ingress service discovery request of the hidden NF ID.
  • the method further includes: the service discovery network function receives a service discovery request of a local network node; and the service discovery request carries a service provider network function after the topology hiding
  • the service discovery network function determines an identifier of the service provider network function corresponding to the identifier of the service provider network function after the topology is hidden; and the service discovery network function returns to the local network node to carry A service discovery response that identifies the identity of the service provider network function.
  • the service discovery network function receives the service discovery request of the local network node, and the local network node may be an edge node of the local network (such as the SEPP), or may be other nodes of the local network, which is not limited in this embodiment.
  • the service discovery request carries an identifier of the service provider network function after the topology is hidden.
  • the local network node receives an ingress service request, where the ingress service request carries an identifier of a service provider network function.
  • the local network node extracts the identifier of the service provider network function hidden by the topology from the ingress service request, and sends a service discovery request that carries the identifier of the service provider network function with the topology hidden to the network service discovery network function. .
  • the ingress service request is a service request sent by the extranet service user network function to the network service provider network function; referring to the example shown in FIG. 1, the ingress service request is the NF direction of the network 1 as the service user.
  • the service discovery network function determines an identifier of the service provider network function corresponding to the identifier of the service provider network function after the topology is hidden, and includes: mapping the storage function of the service discovery network function, and obtaining the The identifier of the service provider network function corresponding to the identifier of the service provider network function after the topology is hidden.
  • the service discovery network function stores a mapping relationship between the identifier of the at least one service provider network function and the identifier of the service provider network function after the topology is hidden; and the service discovery network function obtains the service by querying the stored mapping relationship.
  • the identifier of the service provider network function corresponding to the identifier of the service provider network function of the topology hidden in the request is obtained, that is, the NF ID corresponding to the NF ID after the topology hiding is obtained.
  • the service discovery network function replaces the topology-hidden NF ID with the NF ID in the service discovery response returned to the local network node, that is, returns a service discovery response that carries the identifier of the service provider network function. .
  • the hiding of the identifier of the service provider network function of the service discovery response corresponding to the ingress service discovery request by the service discovery network function in the service discovery scenario is implemented.
  • the embodiment of the present application further provides a topology hiding method.
  • 4 is a schematic flowchart 3 of a topology hiding method according to an embodiment of the present application; as shown in FIG. 4, the method includes:
  • Step 301 The node receives an ingress service request, and extracts, from the ingress service request, an identifier of a topology-hidden service provider network function.
  • Step 302 The node sends a service discovery request carrying the identifier of the service provider network function after the topology hiding to the local service discovery network function.
  • Step 303 The node receives a service discovery response that is returned by the service discovery network function and carries an identifier of a service provider network function corresponding to the identifier of the service provider network function after the topology is hidden.
  • Step 304 The node replaces the identifier of the service provider network function after the topology hiding in the ingress service request with the function of the service provider network that is carried in the service discovery response and is hidden by the topology. Identifies the identity of the corresponding service provider network function.
  • the node may be an edge node of the local network (such as the SEPP), or may be other nodes of the local network, which is not limited in this embodiment.
  • the ingress service request is a service request sent by the external network service user network function to the network service provider network function. Referring to the example of FIG. 1, if the node is a node of the network 2, the ingress service request is a service request sent to the NF of the network 2 as a service provider for the NF of the network 1 as the service consumer.
  • the service discovery network function returns a service discovery response corresponding to the identifier of the service provider network function that carries the topology hidden after the ingress service discovery request, and is carried in the ingress service request received by the node.
  • the identifier of the service provider network function hidden in the topology that is, the NF ID after the topology is hidden
  • extracts the identifier of the service provider network function hidden by the topology from the ingress service request (the NF ID after the topology is hidden) .
  • the node sends a service discovery request carrying the identifier of the service provider network function (the NF ID after the topology hiding) of the service provider network function hidden by the topology to the local network service discovery network function.
  • the node receives the service provider network function that is returned by the service discovery network function and carries the identifier of the service provider network function (the NF ID after the topology is hidden).
  • the service discovery response of the identifier (NF ID) it can be understood that the service discovery network function obtains the identifier of the service provider network function (the NF ID after the topology is hidden) corresponding to the topology hidden by querying the stored mapping relationship.
  • the identifier (NF ID) of the service provider network function returns a service discovery response carrying the identifier (NF ID) of the service provider network function to the local network node.
  • topology hiding method of the embodiment of the present application is further described below with reference to specific embodiments.
  • network 1 is the source network
  • network 2 is the destination network
  • edge node and service discovery network functions are respectively SEPP and NRF shown in FIG. 1
  • the nodes in network 1 include SEPP1 and NRF1
  • the nodes in network 2 include SEPP2 and NRF2
  • the service consumer network function is NF1 in network 1
  • the service provider network function is NF2 in network 2.
  • FIG. 5 is a schematic diagram of a specific interaction process of a topology hiding method according to an embodiment of the present disclosure; as shown in FIG. 5, the topology hiding method includes:
  • Step 401 When NF1 of network 1 needs to invoke the service provided by NF2 in network 2, NF1 initiates a service discovery request to NRF1; based on the service discovery request, NRF1 determines that the corresponding service provider network function is in network 2, and then passes SEPP1. And SEPP2 initiates a service discovery request to NRF2 of network 2.
  • Step 402 The NRF2 returns a service discovery response corresponding to the service discovery request to the SEPP2, where the service discovery response carries the NF2 ID.
  • Step 403 The SEPP2 receives the service discovery response, performs topology hiding on the NF2 ID in the service discovery response, replaces the NF2 ID with the NF2 ID after the topology is hidden, and saves the mapping of the NF2 ID and the NF2 ID after the topology hiding in the SEPP2. relationship.
  • the NF2 ID of the topology hidden by the NF2 ID may be obtained by querying the preset mapping table by SEPP2.
  • the NF2 ID of the topology hidden by the NF2 ID may be generated by dynamic transformation, and the NF2 ID is stored. The mapping relationship with the NF2 ID after the topology is hidden.
  • Step 404 SEPP2 returns the service discovery response carrying the topology hidden NF2 ID to NRF1 through SEPP1, and sends the service discovery response to NF1 by NRF1.
  • Step 405 The NF1 initiates a service request to the NF2, where the service request carries the NF2 ID after the topology is hidden; the service request is sent to the SEPP2 through the SEPP1.
  • Step 406 The SEPP2 receives the service request, obtains the NF2 ID corresponding to the NF2 ID in the service request, and replaces the NF2 ID in the service request with the NF2 ID.
  • Step 407 SEPP2 sends a service request to NF2, where the service request carries an NF2 ID.
  • Step 408 NF2 returns a service response corresponding to the service request to NF1.
  • the optional embodiment is configured to perform topology hiding on the NF2 ID returned by the service discovery response through the SEPP2 of the destination network, and save the mapping relationship; and subsequently restore the NF2 ID after the topology hiding in the service request that accesses the NF2, thereby implementing The hiding of the identity of the service provider network function of the service discovery response corresponding to the ingress service discovery request by the edge node.
  • FIG. 6 is a schematic diagram of another specific interaction process of the topology hiding method according to an embodiment of the present disclosure; as shown in FIG. 6, the topology hiding method includes:
  • Step 501 When NF1 of network 1 needs to invoke the service provided by NF2 in network 2, NF1 initiates a service discovery request to NRF1; based on the service discovery request, NRF1 determines that the corresponding service provider network function is in network 2, and then passes SEPP1. And SEPP2 initiates a service discovery request to NRF2 of network 2.
  • Step 502 After receiving the service discovery request, the NRF2 determines the corresponding service provider NF2, and determines whether the mapping relationship between the NF2 ID and the NF2 ID hidden by the topology is stored, and the NF2 ID including the NF2 ID and the topology hidden is stored.
  • the mapping relationship is obtained, the NF2 ID of the topology hidden by the NF2 ID is obtained; when the mapping relationship between the NF2 ID and the NF2 ID hidden by the topology is not stored, the NF2 ID after the topology hiding is generated for the NF2 ID, and the NF2 ID is stored.
  • the mapping relationship between the NF2 ID and the hidden topology is stored.
  • Step 503 The NRF2 returns a service discovery response that carries the topology-hidden NF2 ID corresponding to the service discovery request.
  • the service discovery response is sent to the NF1 through the SEPP2 and the SEPP1, and the service discovery response is sent by the NRF1 to the NF1.
  • Step 504 NF1 initiates a service request to NF2, where the service request carries the NF2 ID after the topology is hidden; the service request is sent to SEPP2 through SEPP1.
  • Step 505 - Step 506 SEPP2 extracts the NF2 ID of the topology hidden from the service request, and initiates a service discovery request to the NRF2, where the service discovery request carries the NF2 ID after the topology is hidden.
  • Step 507 The NRF2 determines the NF2 ID corresponding to the NF2 ID after the topology is hidden, and returns a service discovery response carrying the NF2 ID corresponding to the service discovery request to the SEPP2.
  • Step 508 to step 509 SEPP2 replaces the NF2 ID after the topology hiding in the service request from NF1 with the NF2 ID, and sends a service request carrying the NF2 ID to NF2.
  • Step 510 NF2 returns a service response corresponding to the service request to NF1, and the service response is sent through SEPP2 and SEPP1.
  • the NRF of the destination network receives the service discovery request from the different network, determines the corresponding NF, obtains the NF ID of the topology hidden by the NF by searching the mapping relationship, or generates the topology hidden corresponding to the NF ID.
  • NF ID the topology hiding of the NF2 ID returned in the service discovery response;
  • the subsequent destination network node such as SEPP
  • SEPP when receiving the service request from the different network, initiates the NRF service discovery of the local network, and carries the NF ID after the topology hiding.
  • the destination network node forwards the service request to the NF according to the service discovery response result of the network, thereby implementing the service corresponding to the ingress service discovery request by the service discovery network function
  • the identification of the identity of the service provider's network function is found to be hidden.
  • FIG. 7 is a schematic structural diagram of an edge node according to an embodiment of the present disclosure; as shown in FIG. 7, the edge node includes: a first receiving unit 61, a first replacing unit 62, and a first sending unit 63, where
  • the first receiving unit 61 is configured to receive an ingress service discovery request
  • the first replacing unit 62 is configured to replace, by the first receiving unit 61, the identifier of the service provider network function in the service discovery request corresponding to the service discovery response with the topology-hidden service provider network. Identification of functions;
  • the first sending unit 63 is configured to forward a service discovery response corresponding to the identifier of the service provider network function after the topology hiding corresponding to the ingress service discovery request.
  • the first replacing unit 62 is configured to query a preset mapping table to obtain an identifier of the service provider network function after the topology hiding corresponding to the identifier of the service provider network function, where The identifier of the service provider network function in the ingress service discovery request corresponding to the service discovery response is replaced with the identifier of the service provider network function after the topology is hidden.
  • the first replacing unit 62 is configured to transform an identifier of the service provider network function into an identifier of a service provider network function after topology hiding, and the ingress service discovery request corresponding service The identifier of the service provider network function in the discovery response replaces the identity of the service provider network function after the topology is hidden.
  • the edge node further includes a first storage unit 64 configured to store an identifier of the service provider network function and the topology hidden service. The mapping relationship between the identifiers of the provider network functions.
  • the edge node further includes a first determining unit 65 configured to be based on the uniform resource identifier carried in the message received by the first receiving unit 61.
  • the message is determined to be a service discovery request, and the service discovery request is determined by the external network service discovery network function to be sent to the local network service discovery network function to determine that the service discovery request is an ingress service discovery request.
  • the first receiving unit 61 is further configured to receive an ingress service request; the ingress service request carries an identifier of the service provider network function after the topology is hidden;
  • the first replacing unit 62 is further configured to replace the identifier of the topology-hidden service provider network function in the ingress service request received by the first receiving unit 61 with the service provider network. Identification of functions;
  • the first sending unit 63 is further configured to send, to the local service provider network function, a service request that carries an identifier of the service provider network function.
  • the first replacing unit 62 is configured to query a preset mapping table or a stored mapping relationship, and obtain an identifier of the service provider network function corresponding to the identifier of the service provider network function after the topology hiding; The identifier of the service provider network function after the topology hiding in the ingress service request is replaced with the identifier of the service provider network function.
  • the ingress service discovery request is a service discovery request sent by the external network service discovery network function to the local network service discovery network function.
  • the ingress service request is a service request sent by the extranet service user network function to the network service provider network function.
  • the edge node may be implemented by a server in an actual application; the first replacement unit 62 and the first determining unit 65 in the edge node may be implemented by a central processing unit (CPU, Central) in actual applications. Processing Unit), a digital signal processor (DSP), a Microcontroller Unit (MCU), or a Field-Programmable Gate Array (FPGA); the first storage in the edge node
  • the unit 64 can be implemented by a memory in an actual application; the first receiving unit 61 and the first sending unit 63 in the edge node can pass through a communication module in actual applications (including: basic communication suite, operating system, communication) Modules, standardized interfaces and protocols, etc. and transceiver antenna implementation.
  • edge node provided by the foregoing embodiment is only illustrated by the division of each of the foregoing program modules when performing topology hiding.
  • the foregoing processing may be performed by different program modules according to requirements, that is, The internal structure of the node is divided into different program modules to perform all or part of the processing described above.
  • the edge node provided by the foregoing embodiment is in the same concept as the embodiment of the topology hiding method, and the specific implementation process is described in detail in the method embodiment, and details are not described herein again.
  • the embodiment of the present application further provides an edge node, including a memory, a processor, and a computer program stored on the memory and operable on the processor, where the processor executes the program to implement the application in the embodiment of the present application.
  • the steps of the topology hiding method in the edge node are described in detail below.
  • FIG. 10 is a schematic structural diagram of a service discovery network function according to an embodiment of the present application; as shown in FIG. 10, the service discovery network function includes a second receiving unit. 71, a topology hiding unit 72 and a second sending unit 73; wherein
  • the second receiving unit 71 is configured to receive an ingress service discovery request
  • the topology hiding unit 72 is configured to determine a service provider network function corresponding to the portal service discovery request received by the second receiving unit 71, and perform topology hiding on the identifier of the service provider network function;
  • the second sending unit 73 is configured to return a service discovery response that carries the identifier of the service provider network function after the topology hiding corresponding to the ingress service discovery request.
  • the service discovery network function further includes a second storage unit 74 configured to store a mapping relationship including an identifier of the service provider network function;
  • the topology hiding unit 72 is configured to determine whether the second storage unit 74 stores a mapping relationship including an identifier of the service provider network function; when the second storage unit 74 stores the service provider network And determining, according to the mapping relationship, an identifier of the service provider network function after the topology hiding corresponding to the identifier of the service provider network function; and when the second storage unit 74 does not store the inclusion
  • an identifier of the service provider network function after the topology hiding is generated for the identifier of the service provider network function.
  • the second receiving unit 71 is further configured to receive a service discovery request of the local network node; the service discovery request carries an identifier of the service provider network function after the topology hiding ;
  • the topology hiding unit 72 is further configured to determine an identifier of the service provider network function corresponding to the identifier of the service provider network function after the topology hiding;
  • the second sending unit 73 is further configured to return, to the local network node, a service discovery response that carries an identifier of the service provider network function.
  • the topology hiding unit 72 is configured to query the stored mapping relationship, and obtain the identifier of the service provider network function corresponding to the identifier of the service provider network function after the topology is hidden.
  • the ingress service discovery request is a service discovery request sent by the external network service discovery network function to the local network service discovery network function.
  • the service discovery network function may be implemented by a server in an actual application; the topology hiding unit 72 in the service discovery network function may be implemented by a CPU, a DSP, an MCU, or an FPGA in an actual application;
  • the second storage unit 74 in the service discovery network function can be implemented by a memory in an actual application;
  • the second receiving unit 71 and the second sending unit 73 in the service discovery network function can pass the communication mode in an actual application.
  • Group including: basic communication suite, operating system, communication module, standardized interface and protocol, etc.
  • transceiver antenna implementation including: basic communication suite, operating system, communication module, standardized interface and protocol, etc.
  • service discovery network function provided by the foregoing embodiment is only illustrated by the division of each of the foregoing program modules when performing topology hiding. In actual applications, the foregoing processing may be performed by different program modules according to requirements. The internal structure of the service discovery network function is divided into different program modules to complete all or part of the above description.
  • service discovery network function and the topology hiding method embodiment provided by the foregoing embodiments are in the same concept, and the specific implementation process is described in detail in the method embodiment, and details are not described herein again.
  • the embodiment of the present application further provides a service discovery network function, including a memory, a processor, and a computer program stored on the memory and operable on the processor, where the processor executes the program to implement the embodiment of the present application.
  • the steps applied to the topology hiding method in the service discovery network function are not limited to a service discovery network function.
  • the embodiment of the present application also provides a node.
  • 12 is a schematic structural diagram of a node of a node according to an embodiment of the present disclosure; as shown in FIG. 12, the node includes: a third receiving unit 81, an extracting unit 82, a third sending unit 83, and a second replacing unit 84;
  • the third receiving unit 81 is configured to receive an ingress service request
  • the extracting unit 82 is configured to extract, from the ingress service request received by the third receiving unit 81, an identifier of a topology-hidden service provider network function;
  • the third sending unit 83 is configured to send, to the local service discovery network function, a service discovery request that carries an identifier of the service provider network function after the topology hiding;
  • the third receiving unit 81 is further configured to receive a service discovery response that is returned by the service discovery network function and that carries an identifier of a service provider network function corresponding to the identifier of the service provider network function after the topology is hidden. ;
  • the second replacing unit 84 is configured to replace the identifier of the service provider network function after the topology hiding in the ingress service request with the service provided in the service discovery response and the topology hidden service
  • the identity of the network function corresponds to the identity of the service provider network function.
  • the node may be implemented by a server in an actual application; the extracting unit 82 and the second replacing unit 84 in the node may be implemented by a CPU, a DSP, an MCU, or an FPGA in an actual application;
  • the third receiving unit 81 and the third sending unit 83 in the node can be implemented in a practical application by a communication module (including: a basic communication suite, an operating system, a communication module, a standardized interface, a protocol, etc.) and a transmitting and receiving antenna.
  • the node provided by the foregoing embodiment is used for topology hiding, only the division of each of the foregoing program modules is illustrated. In an actual application, the foregoing processing may be performed by different program modules according to requirements, that is, the node is The internal structure is divided into different program modules to perform all or part of the processing described above.
  • the node and the topology hiding method are provided in the same embodiment, and the specific implementation process is described in detail in the method embodiment, and details are not described herein again.
  • the embodiment of the present application further provides a node, including a memory, a processor, and a computer program stored on the memory and operable on the processor, where the processor executes the program to implement the node in the embodiment of the present application.
  • a node including a memory, a processor, and a computer program stored on the memory and operable on the processor, where the processor executes the program to implement the node in the embodiment of the present application.
  • the memory in this embodiment may be a volatile memory or a non-volatile memory, and may also include both volatile and non-volatile memory.
  • the non-volatile memory may be a Read Only Memory (ROM), a Programmable Read-Only Memory (PROM), or an Erasable Programmable Read (EPROM). Only Memory), Electrically Erasable Programmable Read-Only Memory (EEPROM), Ferromagnetic Random Access Memory (FRAM), Flash Memory, Magnetic Surface Memory , CD-ROM, or Compact Disc Read-Only Memory (CD-ROM); the magnetic surface memory can be a disk storage or a tape storage.
  • the volatile memory can be a random access memory (RAM) that acts as an external cache.
  • RAM Random Access Memory
  • SRAM Static Random Access Memory
  • SSRAM Synchronous Static Random Access Memory
  • SSRAM Dynamic Random Access
  • DRAM Dynamic Random Access Memory
  • SDRAM Synchronous Dynamic Random Access Memory
  • DDRSDRAM Double Data Rate Synchronous Dynamic Random Access Memory
  • ESDRAM enhancement Enhanced Synchronous Dynamic Random Access Memory
  • SLDRAM Synchronous Dynamic Random Access Memory
  • DRRAM Direct Memory Bus Random Access Memory
  • the method disclosed in the foregoing embodiment of the present application may be applied to a processor or implemented by a processor.
  • the processor may be an integrated circuit chip with signal processing capabilities.
  • each step of the above method may be completed by an integrated logic circuit of hardware in the processor or an instruction in the form of software.
  • the above described processor may be a general purpose processor, a DSP, or other programmable logic device, discrete gate or transistor logic device, discrete hardware component, or the like.
  • the processor may implement or perform the methods, steps, and logic blocks disclosed in the embodiments of the present application.
  • a general purpose processor can be a microprocessor or any conventional processor or the like.
  • the steps of the method disclosed in the embodiment of the present application may be directly implemented as a hardware decoding processor, or may be performed by a combination of hardware and software modules in the decoding processor.
  • the software module can be located in a storage medium, the storage medium being located in the memory, the processor reading the information in the memory, and completing the steps of the foregoing methods in combination with the hardware thereof.
  • the embodiment of the present application further provides a computer storage medium, where the computer instruction is stored, and when the instruction is executed by the processor, the step of applying the topology hiding method in the edge node in the embodiment of the present application is implemented; or the instruction is The step of implementing the topology hiding method in the service discovery network function in the embodiment of the present application when the processor is executed; or the step of applying the topology hiding method in the node in the embodiment of the present application when the instruction is executed by the processor.
  • the disclosed apparatus and method may be implemented in other manners.
  • the device embodiments described above are merely illustrative.
  • the division of the unit is only a logical function division.
  • there may be another division manner such as: multiple units or components may be combined, or Can be integrated into another system, or some features can be ignored or not executed.
  • the coupling, or direct coupling, or communication connection of the components shown or discussed may be indirect coupling or communication connection through some interfaces, devices or units, and may be electrical, mechanical or other forms. of.
  • the units described above as separate components may or may not be physically separated, and the components displayed as the unit may or may not be physical units, that is, may be located in one place or distributed to multiple network units; Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may be separately used as one unit, or two or more units may be integrated into one unit; the above integration
  • the unit can be implemented in the form of hardware or in the form of hardware plus software functional units.
  • the foregoing program may be stored in a computer readable storage medium, and the program is executed when executed.
  • the foregoing steps include the steps of the foregoing method embodiments; and the foregoing storage medium includes: a removable storage device, a ROM, a RAM, a magnetic disk, or an optical disk, and the like, which can store program codes.
  • the above-described integrated unit of the present application may be stored in a computer readable storage medium if it is implemented in the form of a software function module and sold or used as a stand-alone product.
  • the technical solution of the embodiments of the present application may be embodied in the form of a software product in essence or in the form of a software product stored in a storage medium, including a plurality of instructions.
  • a computer device (which may be a personal computer, server, or network device, etc.) is caused to perform all or part of the methods described in various embodiments of the present application.
  • the foregoing storage medium includes various media that can store program codes, such as a mobile storage device, a ROM, a RAM, a magnetic disk, or an optical disk.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

本申请实施例公开了一种拓扑隐藏方法、节点、网络功能和计算机存储介质。所述方法包括:边缘节点接收到入口服务发现请求,将所述入口服务发现请求对应服务发现响应中的服务提供者网络功能的标识替换为拓扑隐藏后的服务提供者网络功能的标识;所述边缘节点转发所述入口服务发现请求所对应的携带所述拓扑隐藏后的服务提供者网络功能的标识的服务发现响应。

Description

一种拓扑隐藏方法、节点、网络功能和计算机存储介质
相关申请的交叉引用
本申请基于申请号为201810226767.4、申请日为2018年3月19日的中国专利申请提出,并要求该中国专利申请的优先权,该中国专利申请的全部内容在此以引入方式并入本申请。
技术领域
本申请涉及无线通信技术,具体涉及一种拓扑隐藏方法、节点、网络功能和计算机存储介质。
背景技术
漫游信令互通的拓扑隐藏,是在不违背协议标准的情况下实现本网拓扑隐藏,替换真实网元标识、隐藏网内信令路由。本网发送的请求消息和响应消息中的源主机名需要隐藏。拓扑隐藏后的信令寻址,是对后续接收的消息中被替换的网元标识进行翻译还原,实现本网内的寻址。外网发送的请求消息中目的主机名(本网网元的标识)是被隐藏的标识,需要进行翻译还原。
在第四代移动通信技术(4G,the 4th Generation mobile communication technology)网络中,国际漫游Diameter信令逐跳寻址,通过Diameter信令网的国际路由代理(I-DRA)节点实现拓扑隐藏,由I-DRA维护拓扑隐藏映射表,并进行路由。解决的问题是对服务请求消息和响应消息中的源网络网元的标识进行隐藏,即隐藏源节点所在运营商网络拓扑。
在第五代移动通信技术(5G,the 5th Generation mobile communication technology)网络引入服务发现过程,由NF存储功能(NRF,NF Repository  Function)实现,在服务访问之前需要先发现目的服务提供者网络功能(NF,Network Function)。漫游场景下本网服务使用者NF通过本网NRF访问它网NRF获取它网服务提供者NF的标识(ID)或地址。返回的NF的ID如果不进行拓扑隐藏就会暴露服务提供者NF所在运营商网络拓扑。服务发现过程后,在服务使用者NF对服务提供者NF的服务访问过程中,服务使用者NF发起的服务请求消息中的网络拓扑信息由其所在运营商网络的安全边缘保护代理(SEPP,Security Edge Protection Proxy)进行拓扑隐藏;服务提供者NF返回的响应消息中的网络拓扑信息由其所在运营商网络的SEPP进行隐藏显然,现有技术仅能够隐藏服务访问过程中服务使用者NF发起的服务请求消息以及服务提供者NF返回的响应消息中的所在运营商网络拓扑,无法满足5G网络跨运营商服务发现过程中对服务提供者NF所在运营商网络的拓扑隐藏需求。
发明内容
为解决现有存在的技术问题,本申请实施例提供一种拓扑隐藏方法、节点、网络功能和计算机存储介质。
为达到上述目的,本申请实施例的技术方案是这样实现的:
本申请实施例提供了一种拓扑隐藏方法,所述方法包括:边缘节点接收到入口服务发现请求,将所述入口服务发现请求对应服务发现响应中的服务提供者网络功能的标识替换为拓扑隐藏后的服务提供者网络功能的标识;所述边缘节点转发所述入口服务发现请求所对应的携带所述拓扑隐藏后的服务提供者网络功能的标识的服务发现响应。
在一实施例中,所述将所述入口服务发现请求对应服务发现响应中的服务提供者网络功能的标识替换为拓扑隐藏后的服务提供者网络功能的标识,包括:所述边缘节点查询预置的映射表获得所述服务提供者网络功能的标识对应的拓扑隐藏后的服务提供者网络功能的标识,将所述入口服务 发现请求对应服务发现响应中的服务提供者网络功能的标识替换为所述拓扑隐藏后的服务提供者网络功能的标识。
在一实施例中,所述将所述入口服务发现请求对应服务发现响应中的服务提供者网络功能的标识替换为拓扑隐藏后的服务提供者网络功能的标识,包括:所述边缘节点将所述服务提供者网络功能的标识变换成拓扑隐藏后的服务提供者网络功能的标识,将所述入口服务发现请求对应服务发现响应中的服务提供者网络功能的标识替换所述拓扑隐藏后的服务提供者网络功能的标识。
在一实施例中,所述方法还包括:所述边缘节点存储所述服务提供者网络功能的标识和所述拓扑隐藏后的服务提供者网络功能的标识的映射关系。
在一实施例中,所述方法还包括:所述边缘节点基于接收到的消息中携带的统一资源标识符判断所述消息为服务发现请求,基于所述服务发现请求是由外网服务发现网络功能发送给本网服务发现网络功能确定所述服务发现请求为入口服务发现请求。
在一实施例中,所述方法还包括:所述边缘节点接收到入口服务请求;所述入口服务请求携带所述拓扑隐藏后的服务提供者网络功能的标识;所述边缘节点将所述入口服务请求中的所述拓扑隐藏后的服务提供者网络功能的标识替换为所述服务提供者网络功能的标识;所述边缘节点向本网服务提供者网络功能发送携带所述服务提供者网络功能的标识的服务请求。
在一实施例中,所述边缘节点将所述入口服务请求中的所述拓扑隐藏后的服务提供者网络功能的标识替换为所述服务提供者网络功能的标识,包括:所述边缘节点查询预置的映射表或存储的映射关系,获得所述拓扑隐藏后的服务提供者网络功能的标识对应的所述服务提供者网络功能的标识;所述边缘节点将所述入口服务请求中的所述拓扑隐藏后的服务提供者 网络功能的标识替换为所述服务提供者网络功能的标识。
在一实施例中,所述入口服务发现请求为外网服务发现网络功能向本网服务发现网络功能发送的服务发现请求。
在一实施例中,所述入口服务请求为外网服务使用者网络功能向本网服务提供者网络功能发送的服务请求。
本申请实施例还提供了一种拓扑隐藏方法,所述方法包括:服务发现网络功能接收到入口服务发现请求;所述服务发现网络功能确定所述入口服务发现请求对应的服务提供者网络功能,对服务提供者网络功能的标识进行拓扑隐藏;所述服务发现网络功能返回所述入口服务发现请求所对应的携带拓扑隐藏后的服务提供者网络功能的标识的服务发现响应。
在一实施例中,所述对服务提供者网络功能的标识进行拓扑隐藏,包括:所述服务发现网络功能判断是否存储了包含所述服务提供者网络功能的标识和所述拓扑隐藏后的服务提供者网络功能的标识的映射关系;当存储有包含所述服务提供者网络功能的标识和所述拓扑隐藏后的服务提供者网络功能的标识的映射关系时,基于所述映射关系获得所述服务提供者网络功能的标识对应的拓扑隐藏后的服务提供者网络功能的标识;当未存储有包含所述服务提供者网络功能的标识的映射关系时,为所述服务提供者网络功能的标识生成拓扑隐藏后的服务提供者网络功能的标识,存储所述服务提供者网络功能的标识和所述拓扑隐藏后的服务提供者网络功能的标识的映射关系。
在一实施例中,所述方法还包括:所述服务发现网络功能接收到本网节点的服务发现请求;所述服务发现请求携带拓扑隐藏后的服务提供者网络功能的标识;所述服务发现网络功能确定所述拓扑隐藏后的服务提供者网络功能的标识对应的所述服务提供者网络功能的标识;所述服务发现网络功能向所述本网节点返回携带有所述服务提供者网络功能的标识的服务 发现响应。
在一实施例中,所述服务发现网络功能确定所述拓扑隐藏后的服务提供者网络功能的标识对应的所述服务提供者网络功能的标识,包括:所述服务发现网络功能查询存储的映射关系,获得所述拓扑隐藏后的服务提供者网络功能的标识对应的所述服务提供者网络功能的标识。
在一实施例中,所述入口服务发现请求为外网服务发现网络功能向本网服务发现网络功能发送的服务发现请求。
本申请实施例还提供了一种拓扑隐藏方法,所述方法包括:节点接收到入口服务请求,从所述入口服务请求中提取拓扑隐藏过的服务提供者网络功能的标识;所述节点向本网服务发现网络功能发送携带有所述拓扑隐藏后的服务提供者网络功能的标识的服务发现请求;所述节点接收到所述服务发现网络功能返回的携带有与所述拓扑隐藏后的服务提供者网络功能的标识对应的服务提供者网络功能的标识的服务发现响应;所述节点将所述入口服务请求中的所述拓扑隐藏后的服务提供者网络功能的标识替换为所述服务发现响应中携带的与所述拓扑隐藏后的服务提供者网络功能的标识对应的服务提供者网络功能的标识。
本申请实施例还提供了一种边缘节点,所述边缘节点包括:第一接收单元、第一替换单元和第一发送单元,其中,所述第一接收单元,配置为接收到入口服务发现请求;所述第一替换单元,配置为将所述第一接收单元接收到的所述入口服务发现请求对应服务发现响应中的服务提供者网络功能的标识替换为拓扑隐藏后的服务提供者网络功能的标识;所述第一发送单元,配置为转发所述入口服务发现请求所对应的携带所述拓扑隐藏后的服务提供者网络功能的标识的服务发现响应。
在一实施例中,所述第一替换单元,配置为查询预置的映射表获得所述服务提供者网络功能的标识对应的拓扑隐藏后的服务提供者网络功能的 标识,将所述入口服务发现请求对应服务发现响应中的服务提供者网络功能的标识替换为所述拓扑隐藏后的服务提供者网络功能的标识。
在一实施例中,所述第一替换单元,配置为将所述服务提供者网络功能的标识变换成拓扑隐藏后的服务提供者网络功能的标识,将所述入口服务发现请求对应服务发现响应中的服务提供者网络功能的标识替换所述拓扑隐藏后的服务提供者网络功能的标识。
在一实施例中,所述边缘节点还包括第一存储单元,配置为存储所述服务提供者网络功能的标识和所述拓扑隐藏后的服务提供者网络功能的标识的映射关系。
在一实施例中,所述边缘节点还包括第一判断单元,配置为基于所述第一接收单元接收到的消息中携带的统一资源标识符判断所述消息为服务发现请求,基于所述服务发现请求是由外网服务发现网络功能发送给本网服务发现网络功能确定所述服务发现请求为入口服务发现请求。
在一实施例中,所述第一接收单元,还配置为接收到入口服务请求;所述入口服务请求携带所述拓扑隐藏后的服务提供者网络功能的标识;所述第一替换单元,还配置为将所述第一接收单元接收到的所述入口服务请求中的所述拓扑隐藏后的服务提供者网络功能的标识替换为所述服务提供者网络功能的标识;所述第一发送单元,还配置为向本网服务提供者网络功能发送携带所述服务提供者网络功能的标识的服务请求。
在一实施例中,所述第一替换单元,配置为查询预置的映射表或存储的映射关系,获得所述拓扑隐藏后的服务提供者网络功能的标识对应的所述服务提供者网络功能的标识;将所述入口服务请求中的所述拓扑隐藏后的服务提供者网络功能的标识替换为所述服务提供者网络功能的标识。
在一实施例中,所述入口服务发现请求为外网服务发现网络功能向本网服务发现网络功能发送的服务发现请求。
在一实施例中,所述入口服务请求为外网服务使用者网络功能向本网服务提供者网络功能发送的服务请求。
本申请实施例还提供了一种服务发现网络功能,所述服务发现网络功能包括第二接收单元、拓扑隐藏单元和第二发送单元;其中,所述第二接收单元,配置为接收到入口服务发现请求;所述拓扑隐藏单元,配置为确定所述第二接收单元接收到的所述入口服务发现请求对应的服务提供者网络功能,对服务提供者网络功能的标识进行拓扑隐藏;所述第二发送单元,配置为返回所述入口服务发现请求所对应的携带拓扑隐藏后的服务提供者网络功能的标识的服务发现响应。
在一实施例中,所述服务发现网络功能还包括第二存储单元,配置为存储包含所述服务提供者网络功能的标识的映射关系;所述拓扑隐藏单元,配置为判断所述第二存储单元是否存储包含所述服务提供者网络功能的标识的映射关系;当所述第二存储单元存储有包含所述服务提供者网络功能的标识的映射关系时,基于所述映射关系获得所述服务提供者网络功能的标识对应的拓扑隐藏后的服务提供者网络功能的标识;当所述第二存储单元未存储有包含所述服务提供者网络功能的标识的映射关系时,为所述服务提供者网络功能的标识生成拓扑隐藏后的服务提供者网络功能的标识。
在一实施例中,所述第二接收单元,还配置为接收到本网节点的服务发现请求;所述服务发现请求携带拓扑隐藏后的服务提供者网络功能的标识;所述拓扑隐藏单元,还配置为确定所述拓扑隐藏后的服务提供者网络功能的标识对应的所述服务提供者网络功能的标识;所述第二发送单元,还配置为向所述本网节点返回携带有所述服务提供者网络功能的标识的服务发现响应。
在一实施例中,所述拓扑隐藏单元,配置为查询存储的映射关系,获得所述拓扑隐藏后的服务提供者网络功能的标识对应的所述服务提供者网 络功能的标识。
在一实施例中,所述入口服务发现请求为外网服务发现网络功能向本网服务发现网络功能发送的服务发现请求。
本申请实施例还提供了一种节点,所述节点包括:第三接收单元、提取单元、第三发送单元和第二替换单元;其中,所述第三接收单元,配置为接收到入口服务请求;所述提取单元,配置为从所述第三接收单元接收到的所述入口服务请求中提取拓扑隐藏过的服务提供者网络功能的标识;
所述第三发送单元,配置为向本网服务发现网络功能发送携带有所述拓扑隐藏后的服务提供者网络功能的标识的服务发现请求;所述第三接收单元,还配置为接收到所述服务发现网络功能返回的携带有与所述拓扑隐藏后的服务提供者网络功能的标识对应的服务提供者网络功能的标识的服务发现响应;所述第二替换单元,配置为将所述入口服务请求中的所述拓扑隐藏后的服务提供者网络功能的标识替换为所述服务发现响应中携带的与所述拓扑隐藏后的服务提供者网络功能的标识对应的服务提供者网络功能的标识。
本申请实施例还提供了一种计算机存储介质,其上存储有计算机指令,其中,该指令被处理器执行时实现本申请实施例所述的应用于边缘节点的拓扑隐藏方法的步骤;或者,该指令被处理器执行时实现本申请实施例所述的应用于服务发现网络功能的拓扑隐藏方法的步骤;或者,该指令被处理器执行时实现本申请实施例所述的应用于节点的拓扑隐藏方法的步骤。
本申请实施例还提供了一种边缘节点,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,所述处理器执行所述程序时实现本申请实施例所述的应用于边缘节点的拓扑隐藏方法的步骤。
本申请实施例还提供了一种服务发现网络功能,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,所述处理器执行所 述程序时实现本申请实施例所述的应用于边缘节点的拓扑隐藏方法的步骤。
本申请实施例还提供了一种节点,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,所述处理器执行所述程序时实现本申请实施例所述的应用于节点的拓扑隐藏方法的步骤。
本申请实施例提供的拓扑隐藏方法、节点、网络功能和计算机存储介质,一方面,边缘节点接收到入口服务发现请求,将所述入口服务发现请求对应服务发现响应中的服务提供者网络功能的标识替换为拓扑隐藏后的服务提供者网络功能的标识;所述边缘节点转发所述入口服务发现请求所对应的携带所述拓扑隐藏后的服务提供者网络功能的标识的服务发现响应。采用本申请实施例的技术方案,实现了服务发现场景下通过边缘节点对入口服务发现请求对应的服务发现响应的服务提供者网络功能的标识的隐藏。
另一方面,服务发现网络功能接收到入口服务发现请求;所述服务发现网络功能确定所述入口服务发现请求对应的服务提供者网络功能,对服务提供者网络功能的标识进行拓扑隐藏;所述服务发现网络功能返回所述入口服务发现请求所对应的携带拓扑隐藏后的服务提供者网络功能的标识的服务发现响应。采用本申请实施例的技术方案,实现了服务发现场景下通过服务发现网络功能对入口服务发现请求对应的服务发现响应的服务提供者网络功能的标识的隐藏。
附图说明
图1为本申请实施例的拓扑隐藏方法的应用架构示意图;
图2为本申请实施例的拓扑隐藏方法的流程示意图一;
图3为本申请实施例的拓扑隐藏方法的流程示意图二;
图4为本申请实施例的拓扑隐藏方法的流程示意图三;
图5为本申请实施例的拓扑隐藏方法的一种具体交互流程示意图;
图6为本申请实施例的拓扑隐藏方法的另一种具体交互流程示意图;
图7为本申请实施例的边缘节点的一种组成结构示意图;
图8为本申请实施例的边缘节点的另一种组成结构示意图;
图9为本申请实施例的边缘节点的又一种组成结构示意图;
图10为本申请实施例的服务发现网络功能的一种组成结构示意图;
图11为本申请实施例的服务发现网络功能的另一种组成结构示意图;
图12为本申请实施例的节点的组成结构示意图。
具体实施方式
在对本申请实施例的拓扑隐藏方法进行详细说明之前,首先对本申请实施例的拓扑隐藏方法应用的系统架构进行说明。图1为本申请实施例的拓扑隐藏方法的应用架构示意图;如图1所示,包括用于服务发现的NRF和用于服务提供的NF。系统架构中还包括边缘节点,用于转发NRF之间的数据。其中,边缘节点的一种示例可以是SEPP,该节点用于负责网络之间的交互安全。SEPP、NRF和NF中任两个节点之间可通过网络建立连接。
本申请各实施例中,服务发现场景中拓扑隐藏的目的节点为NF,也即本申请以下各实施例中,服务提供者网络功能的标识具体可以为NF的标识(记为NF ID)。
下面结合附图及具体实施例对本申请作进一步详细的说明。
本申请实施例提供了一种拓扑隐藏方法。图2为本申请实施例的拓扑隐藏方法的流程示意图一;如图2所示,所述方法包括:
步骤101:边缘节点接收到入口服务发现请求,将所述入口服务发现请求对应服务发现响应中的服务提供者网络功能的标识替换为拓扑隐藏后的服务提供者网络功能的标识。
步骤102:所述边缘节点转发所述入口服务发现请求所对应的携带所述 拓扑隐藏后的服务提供者网络功能的标识的服务发现响应。
本实施例中,所述入口服务发现请求为外网服务发现网络功能向本网服务发现网络功能发送的服务发现请求,参考图1的示例,若边缘节点为网络2的SEPP,则所述入口服务发现请求为网络1的NRF向网络2的NRF发送的服务发现请求。
在本申请的一种可选实施例中,所述方法还包括:所述边缘节点基于接收到的消息中携带的统一资源标识符判断所述消息为服务发现请求,基于所述服务发现请求是由外网服务发现网络功能发送给本网服务发现网络功能确定所述服务发现请求为入口服务发现请求。
具体的,边缘节点判断接收到的消息是入口服务发现请求的判断方式在于,通过消息中携带的统一资源标识符(URI,Uniform Resource Identifier)的API name判断该消息是服务发现请求;进一步根据消息的局向,也即该消息是由网服务发现网络功能发送给本网服务发现网络功能的确定服务发现请求为入口服务发现请求。
本实施例中,作为一种实施方式,所述将所述入口服务发现请求对应服务发现响应中的服务提供者网络功能的标识替换为拓扑隐藏后的服务提供者网络功能的标识,包括:所述边缘节点查询预置的映射表获得所述服务提供者网络功能的标识对应的拓扑隐藏后的服务提供者网络功能的标识,将所述入口服务发现请求对应服务发现响应中的服务提供者网络功能的标识替换为所述拓扑隐藏后的服务提供者网络功能的标识。
具体的,边缘节点中预先配置并存储映射表,该映射表中记录有归属于本网的服务提供者网络功能的标识(即NF ID)以及拓扑隐藏后的服务提供者网络功能的标识(记为拓扑隐藏后的NF ID)的映射关系。如此,在NF作为目的节点或源节点进行拓扑隐藏的场景下可使用相同的拓扑隐藏后的NF ID进行替换,从而减少映射表空间。
则边缘节点通过入口服务发现请求或者入口服务发现请求对应的服务发现响应中携带的信息(例如NF ID)查找存储的映射表,获得该NF ID对应的拓扑隐藏后的服务提供者网络功能的标识(拓扑隐藏后的NF ID),将入口服务发现请求对应的服务发现响应中的NF ID替换为拓扑隐藏后的NF ID,边缘节点转发携带有拓扑隐藏后的NF ID的、所述入口服务发现请求对应的服务发现响应。
作为另一种实施方式,所述将所述入口服务发现请求对应服务发现响应中的服务提供者网络功能的标识替换为拓扑隐藏后的服务提供者网络功能的标识,包括:所述边缘节点将所述服务提供者网络功能的标识变换成拓扑隐藏后的服务提供者网络功能的标识,将所述入口服务发现请求对应服务发现响应中的服务提供者网络功能的标识替换所述拓扑隐藏后的服务提供者网络功能的标识。以及,还可以包括:所述边缘节点存储所述服务提供者网络功能的标识和所述拓扑隐藏后的服务提供者网络功能的标识的映射关系。
具体的,本实施方式中,边缘节点采用动态变换生成服务提供者网络功能的标识(NF ID)对应的拓扑隐藏后的服务提供者网络功能的标识(拓扑隐藏后的NF ID),在每次变换生成拓扑隐藏后的NF ID后,记录NF ID与拓扑隐藏后的NF ID的映射关系。
在本申请的一种可选实施例中,所述方法还包括:所述边缘节点接收到入口服务请求;所述入口服务请求携带所述拓扑隐藏后的服务提供者网络功能的标识;所述边缘节点将所述入口服务请求中的所述拓扑隐藏后的服务提供者网络功能的标识替换为所述服务提供者网络功能的标识;所述边缘节点向本网服务提供者网络功能发送携带所述服务提供者网络功能的标识的服务请求。
本实施例中,所述入口服务请求为外网服务使用者网络功能向本网服 务提供者网络功能发送的服务请求,参考图1的示例,若边缘节点为网络2的SEPP,则所述入口服务请求为作为服务使用者的网络1的NF向作为服务提供者的网络2的NF发送的服务请求。
本实施例中,所述边缘节点将所述入口服务请求中的所述拓扑隐藏后的服务提供者网络功能的标识替换为所述服务提供者网络功能的标识,包括:所述边缘节点查询预置的映射表或存储的映射关系,获得所述拓扑隐藏后的服务提供者网络功能的标识对应的所述服务提供者网络功能的标识;所述边缘节点将所述入口服务请求中的所述拓扑隐藏后的服务提供者网络功能的标识替换为所述服务提供者网络功能的标识。
可以理解为,边缘节点接收到入口服务请求,该入口服务请求携带有拓扑隐藏后的NF ID,通过查询映射表或映射关系获得该拓扑隐藏后的NF ID对应的表征真实NF标识的NF ID;边缘节点将该入口服务器请求中的拓扑隐藏后的服务提供者网络功能的标识(即拓扑隐藏后的NF ID)替换为真实的服务提供者网络功能的标识(NF ID)。
采用本申请实施例的技术方案,实现了服务发现场景下通过边缘节点对入口服务发现请求对应的服务发现响应的服务提供者网络功能的标识的隐藏。
本申请实施例还提供了一种拓扑隐藏方法。图3为本申请实施例的拓扑隐藏方法的流程示意图二;如图3所示,所述方法包括:
步骤201:服务发现网络功能接收到入口服务发现请求。
步骤202:所述服务发现网络功能确定所述入口服务发现请求对应的服务提供者网络功能,对服务提供者网络功能的标识进行拓扑隐藏。
步骤203:所述服务发现网络功能返回所述入口服务发现请求所对应的携带拓扑隐藏后的服务提供者网络功能的标识的服务发现响应。
本实施例中,所述入口服务发现请求为外网服务发现网络功能向本网 服务发现网络功能发送的服务发现请求,参考图1的示例,若服务发现网络功能为网络2的NRF,则所述入口服务发现请求为网络1的NRF向网络2的NRF发送的服务发现请求。
本实施例中,服务发现网络功能接收到入口服务发现请求,确定所述入口服务发现请求对应的服务提供者网络功能(NF)。
本申请实施例中,所述对服务提供者网络功能的标识进行拓扑隐藏,包括:所述服务发现网络功能判断是否存储包含所述服务提供者网络功能的标识的映射关系;当存储有包含所述服务提供者网络功能的标识的映射关系时,基于所述映射关系获得所述服务提供者网络功能的标识对应的拓扑隐藏后的服务提供者网络功能的标识;当未存储有包含所述服务提供者网络功能的标识的映射关系时,为所述服务提供者网络功能的标识生成拓扑隐藏后的服务提供者网络功能的标识,存储所述服务提供者网络功能的标识和所述拓扑隐藏后的服务提供者网络功能的标识的映射关系。
具体的,服务发现网络功能中存储有至少一组服务提供者网络功能的标识与拓扑隐藏后的服务提供者网络功能的标识的映射关系,则找到入口服务发现请求对应的服务提供者网络功能后,通过存储的映射关系判断是否存储有包含该服务提供者网络功能的标识的映射关系;若存储有包含该服务提供者网络功能的标识的映射关系,则获得该服务提供者网络功能的标识对应的拓扑隐藏后的服务提供者网络功能的标识(即拓扑隐藏后的NF ID);若未存储有包含该服务提供者网络功能的标识的映射关系,则为所述服务提供者网络功能的标识生成拓扑隐藏后的服务提供者网络功能的标识(即生成拓扑隐藏后的NF ID),并记录服务提供者网络功能的标识(即NF ID)与拓扑隐藏后的NF ID的映射关系。
进一步地,服务发现网络功能返回所述入口服务发现请求所对应的携带拓扑隐藏后的服务提供者网络功能的标识的服务发现响应,参照图1的 示例,可以理解为,若服务发现网络功能为网络2的NRF,则网络2的NRF接收到网络1的NRF发送的入口服务发现请求;网络2的NRF确定NF,对NF ID进行拓扑隐藏;网络2的NRF向网络1的NRF反馈携带有拓扑隐藏后的NF ID的、与该入口服务发现请求对应的服务发现响应。
在本申请的一种可选实施例中,所述方法还包括:所述服务发现网络功能接收到本网节点的服务发现请求;所述服务发现请求携带拓扑隐藏后的服务提供者网络功能的标识;所述服务发现网络功能确定所述拓扑隐藏后的服务提供者网络功能的标识对应的所述服务提供者网络功能的标识;所述服务发现网络功能向所述本网节点返回携带有所述服务提供者网络功能的标识的服务发现响应。
具体的,服务发现网络功能接收到本网节点的服务发现请求,本网节点可以是本网的边缘节点(如SEPP),也可以是本网的其他节点,本实施例中对此不进行限定;其中,所述服务发现请求携带拓扑隐藏后的服务提供者网络功能的标识。其中,本网节点接收到入口服务请求,所述入口服务请求中携带有服务提供者网络功能的标识。则本网节点从入口服务请求中提取出拓扑隐藏过的服务提供者网络功能的标识;向本网服务发现网络功能发送携带有所述拓扑隐藏后的服务提供者网络功能的标识的服务发现请求。所述入口服务请求为外网服务使用者网络功能向本网服务提供者网络功能发送的服务请求;参照图1所示的示例,所述入口服务请求为作为服务使用者的网络1的NF向作为服务提供者的网络2的NF发送的服务请求。
其中,所述服务发现网络功能确定所述拓扑隐藏后的服务提供者网络功能的标识对应的所述服务提供者网络功能的标识,包括:所述服务发现网络功能查询存储的映射关系,获得所述拓扑隐藏后的服务提供者网络功能的标识对应的所述服务提供者网络功能的标识。
具体的,服务发现网络功能中存储有至少一组服务提供者网络功能的标识与拓扑隐藏后的服务提供者网络功能的标识的映射关系;则服务发现网络功能通过查询存储的映射关系,获得服务发现请求中携带的拓扑隐藏后的服务提供者网络功能的标识对应的所述服务提供者网络功能的标识,即获得拓扑隐藏后的NF ID对应的NF ID。进一步地,服务发现网络功能在向所述本网节点返回的服务发现响应中,将拓扑隐藏后的NF ID替换为NF ID,即返回携带有所述服务提供者网络功能的标识的服务发现响应。
采用本申请实施例的技术方案,实现了服务发现场景下通过服务发现网络功能对入口服务发现请求对应的服务发现响应的服务提供者网络功能的标识的隐藏。
本申请实施例还提供了一种拓扑隐藏方法。图4为本申请实施例的拓扑隐藏方法的流程示意图三;如图4所示,所述方法包括:
步骤301:节点接收到入口服务请求,从所述入口服务请求中提取拓扑隐藏过的服务提供者网络功能的标识。
步骤302:所述节点向本网服务发现网络功能发送携带有所述拓扑隐藏后的服务提供者网络功能的标识的服务发现请求。
步骤303:所述节点接收到所述服务发现网络功能返回的携带有与所述拓扑隐藏后的服务提供者网络功能的标识对应的服务提供者网络功能的标识的服务发现响应。
步骤304:所述节点将所述入口服务请求中的所述拓扑隐藏后的服务提供者网络功能的标识替换为所述服务发现响应中携带的与所述拓扑隐藏后的服务提供者网络功能的标识对应的服务提供者网络功能的标识。
本实施例中,所述节点可以是本网的边缘节点(如SEPP),也可以是本网的其他节点,本实施例中对此不进行限定。其中,所述入口服务请求为外网服务使用者网络功能向本网服务提供者网络功能发送的服务请求。 参考图1的示例,若节点为网络2的节点,则所述入口服务请求为作为服务使用者的网络1的NF向作为服务提供者的网络2的NF发送的服务请求。
结合前述实施例中的服务发现过程,服务发现网络功能返回入口服务发现请求所对应的携带拓扑隐藏后的服务提供者网络功能的标识的服务发现响应,则节点接收到的入口服务请求中携带的是拓扑隐藏过的服务提供者网络功能的标识(即拓扑隐藏后的NF ID),进而从所述入口服务请求中提取拓扑隐藏过的服务提供者网络功能的标识(拓扑隐藏后的NF ID)。进一步地,节点向本网服务发现网络功能发送携带有所述拓扑隐藏后的服务提供者网络功能的标识(拓扑隐藏后的NF ID)的服务发现请求。
本申请实施例中,所述节点接收到所述服务发现网络功能返回的携带有与所述拓扑隐藏后的服务提供者网络功能的标识(拓扑隐藏后的NF ID)对应的服务提供者网络功能的标识(NF ID)的服务发现响应,可以理解,服务发现网络功能通过查询存储的映射关系,获得所述拓扑隐藏后的服务提供者网络功能的标识(拓扑隐藏后的NF ID)对应的所述服务提供者网络功能的标识(NF ID),向本网节点返回携带有所述服务提供者网络功能的标识(NF ID)的服务发现响应。
下面结合具体的实施例对本申请实施例的拓扑隐藏方法进行进一步说明。
以图1所示的应用架构为例,假设网络1作为源网络,网络2作为目的网络,边缘节点和服务发现网络功能分别为图1中所示的SEPP和NRF,则网络1中的节点包括SEPP1和NRF1,网络2中的节点包括SEPP2和NRF2;服务使用者网络功能为网络1中的NF1,服务提供者网络功能为网络2中的NF2。
可选实施例一
图5为本申请实施例的拓扑隐藏方法的一种具体交互流程示意图;如 图5所示,所述拓扑隐藏方法包括:
步骤401:当网络1的NF1需要调用网络2中的NF2提供的服务时,NF1向NRF1发起服务发现请求;NRF1基于该服务发现请求确定对应的服务提供者网络功能在网络2中,则通过SEPP1和SEPP2向网络2的NRF2发起服务发现请求。
步骤402:NRF2向SEPP2返回服务发现请求对应的服务发现响应,所述服务发现响应中携带有NF2 ID。
步骤403:SEPP2接收到该服务发现响应,对服务发现响应中的NF2 ID进行拓扑隐藏,替换NF2 ID为拓扑隐藏后的NF2 ID,并且,SEPP2中保存NF2 ID与拓扑隐藏后的NF2 ID的映射关系。
其中,SEPP2可通过查询预设的映射表的方式获得NF2 ID对应的拓扑隐藏后的NF2 ID;或者,也可以通过动态变换的方式生成NF2 ID对应的拓扑隐藏后的NF2 ID,并存储NF2 ID与拓扑隐藏后的NF2 ID的映射关系。
步骤404:SEPP2将携带有拓扑隐藏后的NF2 ID的服务发现响应通过SEPP1返回至NRF1,由NRF1将该服务发现响应发送至NF1。
步骤405:NF1向NF2发起服务请求,该服务请求中携带有拓扑隐藏后的NF2 ID;该服务请求通过SEPP1发送至SEPP2。
步骤406:SEPP2接收到该服务请求,通过查询存储的映射关系,获得该服务请求中的拓扑隐藏后的NF2 ID对应的NF2 ID,将服务请求中的拓扑隐藏后的NF2 ID替换为NF2 ID。
步骤407:SEPP2向NF2发送服务请求,该服务请求中携带有NF2 ID。
步骤408:NF2向NF1返回该服务请求对应的服务响应。
本可选实施方式通过目的网络的SEPP2对服务发现响应中返回的NF2 ID进行拓扑隐藏,并保存映射关系;后续针对访问该NF2的服务请求中的拓扑隐藏后的NF2 ID进行还原,从而实现通过边缘节点对入口服务发现请 求对应的服务发现响应的服务提供者网络功能的标识的隐藏。
可选实施例二
图6为本申请实施例的拓扑隐藏方法的另一种具体交互流程示意图;如图6所示,所述拓扑隐藏方法包括:
步骤501:当网络1的NF1需要调用网络2中的NF2提供的服务时,NF1向NRF1发起服务发现请求;NRF1基于该服务发现请求确定对应的服务提供者网络功能在网络2中,则通过SEPP1和SEPP2向网络2的NRF2发起服务发现请求。
步骤502:NRF2接收到服务发现请求后,确定对应的服务提供者NF2,判断是否存储了包含NF2 ID和拓扑隐藏后的NF2 ID的映射关系,当存储有包含NF2 ID和拓扑隐藏后的NF2 ID的映射关系时,获得NF2 ID对应的拓扑隐藏后的NF2 ID;当未存储有包含NF2 ID和拓扑隐藏后的NF2 ID的映射关系时,为NF2 ID生成拓扑隐藏后的NF2 ID,存储NF2 ID和拓扑隐藏后的NF2 ID的映射关系。
步骤503:NRF2返回服务发现请求对应的携带有拓扑隐藏后的NF2 ID的服务发现响应,该服务发现响应通过SEPP2、SEPP1发送至NF1,由NRF1将该服务发现响应发送至NF1。
步骤504:NF1向NF2发起服务请求,该服务请求中携带有拓扑隐藏后的NF2 ID;该服务请求通过SEPP1发送至SEPP2。
步骤505-步骤506:SEPP2从服务请求中提取出拓扑隐藏后的NF2 ID,向NRF2发起服务发现请求,该服务发现请求中携带有拓扑隐藏后的NF2 ID。
步骤507:NRF2确定拓扑隐藏后的NF2 ID对应的NF2 ID,向SEPP2返回与所述服务发现请求对应的携带有NF2 ID的服务发现响应。
步骤508至步骤509:SEPP2对来自NF1的服务请求中的拓扑隐藏后 的NF2 ID替换为NF2 ID,发送携带有NF2 ID的服务请求至NF2。
步骤510:NF2向NF1返回服务请求对应的服务响应,该服务响应通过SEPP2和SEPP1发送。
本实施方式通过目的网络的NRF接收到来自异网的服务发现请求,确定对应的NF,通过查找映射关系获得该NF对应的拓扑隐藏后的NF ID,或者,生成NF ID对应的拓扑隐藏后的NF ID,对服务发现响应中返回的NF2 ID进行拓扑隐藏;后续目的网络节点(如SEPP)接收到来自异网的服务请求时,发起本网的NRF的服务发现,携带拓扑隐藏后的NF ID;通过本网的NFR获得拓扑隐藏后的NF ID对应的NF ID;目的网络节点根据本网的服务发现响应结果转发服务请求至NF,从而实现通过服务发现网络功能对入口服务发现请求对应的服务发现响应的服务提供者网络功能的标识的隐藏。
本申请实施例还提供了一种边缘节点。图7为本申请实施例的边缘节点的一种组成结构示意图;如图7所示,所述边缘节点包括:第一接收单元61、第一替换单元62和第一发送单元63,其中,
所述第一接收单元61,配置为接收到入口服务发现请求;
所述第一替换单元62,配置为将所述第一接收单元61接收到的所述入口服务发现请求对应服务发现响应中的服务提供者网络功能的标识替换为拓扑隐藏后的服务提供者网络功能的标识;
所述第一发送单元63,配置为转发所述入口服务发现请求所对应的携带所述拓扑隐藏后的服务提供者网络功能的标识的服务发现响应。
作为第一种实施方式,所述第一替换单元62,配置为查询预置的映射表获得所述服务提供者网络功能的标识对应的拓扑隐藏后的服务提供者网络功能的标识,将所述入口服务发现请求对应服务发现响应中的服务提供者网络功能的标识替换为所述拓扑隐藏后的服务提供者网络功能的标识。
作为第二种实施方式,所述第一替换单元62,配置为将所述服务提供者网络功能的标识变换成拓扑隐藏后的服务提供者网络功能的标识,将所述入口服务发现请求对应服务发现响应中的服务提供者网络功能的标识替换所述拓扑隐藏后的服务提供者网络功能的标识。
在本申请的一种可选实施例中,如图8所示,所述边缘节点还包括第一存储单元64,配置为存储所述服务提供者网络功能的标识和所述拓扑隐藏后的服务提供者网络功能的标识的映射关系。
在本申请的一种可选实施例中,如图9所示,所述边缘节点还包括第一判断单元65,配置为基于所述第一接收单元61接收到的消息中携带的统一资源标识符判断所述消息为服务发现请求,基于所述服务发现请求是由外网服务发现网络功能发送给本网服务发现网络功能确定所述服务发现请求为入口服务发现请求。
在本申请的一种可选实施例中,所述第一接收单元61,还配置为接收到入口服务请求;所述入口服务请求携带所述拓扑隐藏后的服务提供者网络功能的标识;
所述第一替换单元62,还配置为将所述第一接收单元61接收到的所述入口服务请求中的所述拓扑隐藏后的服务提供者网络功能的标识替换为所述服务提供者网络功能的标识;
所述第一发送单元63,还配置为向本网服务提供者网络功能发送携带所述服务提供者网络功能的标识的服务请求。
其中,所述第一替换单元62,配置为查询预置的映射表或存储的映射关系,获得所述拓扑隐藏后的服务提供者网络功能的标识对应的所述服务提供者网络功能的标识;将所述入口服务请求中的所述拓扑隐藏后的服务提供者网络功能的标识替换为所述服务提供者网络功能的标识。
本实施例中,所述入口服务发现请求为外网服务发现网络功能向本网 服务发现网络功能发送的服务发现请求。
所述入口服务请求为外网服务使用者网络功能向本网服务提供者网络功能发送的服务请求。
本申请实施例中,所述边缘节点在实际应用中可通过服务器实现;所述边缘节点中的第一替换单元62和第一判断单元65,在实际应用中均可由中央处理器(CPU,Central Processing Unit)、数字信号处理器(DSP,Digital Signal Processor)、微控制单元(MCU,Microcontroller Unit)或可编程门阵列(FPGA,Field-Programmable Gate Array)实现;所述边缘节点中的第一存储单元64,在实际应用中可通过存储器实现;所述边缘节点中的第一接收单元61和第一发送单元63,在实际应用中可通过通信模组(包含:基础通信套件、操作系统、通信模块、标准化接口和协议等)及收发天线实现。
需要说明的是:上述实施例提供的边缘节点在进行拓扑隐藏时,仅以上述各程序模块的划分进行举例说明,实际应用中,可以根据需要而将上述处理分配由不同的程序模块完成,即将节点的内部结构划分成不同的程序模块,以完成以上描述的全部或者部分处理。另外,上述实施例提供的边缘节点与拓扑隐藏方法实施例属于同一构思,其具体实现过程详见方法实施例,这里不再赘述。
本申请实施例还提供了一种边缘节点,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,所述处理器执行所述程序时实现本申请实施例中应用于边缘节点中的拓扑隐藏方法的步骤。
本申请实施例还提供了一种服务发现网络功能;图10为本申请实施例的服务发现网络功能的一种组成结构示意图;如图10所示,所述服务发现网络功能包括第二接收单元71、拓扑隐藏单元72和第二发送单元73;其中,
所述第二接收单元71,配置为接收到入口服务发现请求;
所述拓扑隐藏单元72,配置为确定所述第二接收单元71接收到的所述入口服务发现请求对应的服务提供者网络功能,对服务提供者网络功能的标识进行拓扑隐藏;
所述第二发送单元73,配置为返回所述入口服务发现请求所对应的携带拓扑隐藏后的服务提供者网络功能的标识的服务发现响应。
在本申请的一种可选实施例中,如图11所示,所述服务发现网络功能还包括第二存储单元74,配置为存储包含所述服务提供者网络功能的标识的映射关系;
所述拓扑隐藏单元72,配置为判断所述第二存储单元74是否存储包含所述服务提供者网络功能的标识的映射关系;当所述第二存储单元74存储有包含所述服务提供者网络功能的标识的映射关系时,基于所述映射关系获得所述服务提供者网络功能的标识对应的拓扑隐藏后的服务提供者网络功能的标识;当所述第二存储单元74未存储有包含所述服务提供者网络功能的标识的映射关系时,为所述服务提供者网络功能的标识生成拓扑隐藏后的服务提供者网络功能的标识。
在本申请的一种可选实施例中,所述第二接收单元71,还配置为接收到本网节点的服务发现请求;所述服务发现请求携带拓扑隐藏后的服务提供者网络功能的标识;
所述拓扑隐藏单元72,还配置为确定所述拓扑隐藏后的服务提供者网络功能的标识对应的所述服务提供者网络功能的标识;
所述第二发送单元73,还配置为向所述本网节点返回携带有所述服务提供者网络功能的标识的服务发现响应。
其中,所述拓扑隐藏单元72,配置为查询存储的映射关系,获得所述拓扑隐藏后的服务提供者网络功能的标识对应的所述服务提供者网络功能 的标识。
本申请实施例中,所述入口服务发现请求为外网服务发现网络功能向本网服务发现网络功能发送的服务发现请求。
本申请实施例中,所述服务发现网络功能在实际应用中可通过服务器实现;所述服务发现网络功能中的拓扑隐藏单元72,在实际应用中均可由CPU、DSP、MCU或FPGA实现;所述服务发现网络功能中的第二存储单元74,在实际应用中可通过存储器实现;所述服务发现网络功能中的第二接收单元71和第二发送单元73,在实际应用中可通过通信模组(包含:基础通信套件、操作系统、通信模块、标准化接口和协议等)及收发天线实现。
需要说明的是:上述实施例提供的服务发现网络功能在进行拓扑隐藏时,仅以上述各程序模块的划分进行举例说明,实际应用中,可以根据需要而将上述处理分配由不同的程序模块完成,即将服务发现网络功能的内部结构划分成不同的程序模块,以完成以上描述的全部或者部分处理。另外,上述实施例提供的服务发现网络功能与拓扑隐藏方法实施例属于同一构思,其具体实现过程详见方法实施例,这里不再赘述。
本申请实施例还提供了一种服务发现网络功能,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,所述处理器执行所述程序时实现本申请实施例中应用于服务发现网络功能中的拓扑隐藏方法的步骤。
本申请实施例还提供了一种节点。图12为本申请实施例的节点的组成结构示意图;如图12所示,所述节点包括:第三接收单元81、提取单元82、第三发送单元83和第二替换单元84;其中,
所述第三接收单元81,配置为接收到入口服务请求;
所述提取单元82,配置为从所述第三接收单元81接收到的所述入口服 务请求中提取拓扑隐藏过的服务提供者网络功能的标识;
所述第三发送单元83,配置为向本网服务发现网络功能发送携带有所述拓扑隐藏后的服务提供者网络功能的标识的服务发现请求;
所述第三接收单元81,还配置为接收到所述服务发现网络功能返回的携带有与所述拓扑隐藏后的服务提供者网络功能的标识对应的服务提供者网络功能的标识的服务发现响应;
所述第二替换单元84,配置为将所述入口服务请求中的所述拓扑隐藏后的服务提供者网络功能的标识替换为所述服务发现响应中携带的与所述拓扑隐藏后的服务提供者网络功能的标识对应的服务提供者网络功能的标识。
本申请实施例中,所述节点在实际应用中可通过服务器实现;所述节点中的提取单元82和第二替换单元84,在实际应用中均可由CPU、DSP、MCU或FPGA实现;所述节点中的第三接收单元81和第三发送单元83,在实际应用中可通过通信模组(包含:基础通信套件、操作系统、通信模块、标准化接口和协议等)及收发天线实现。
需要说明的是:上述实施例提供的节点在进行拓扑隐藏时,仅以上述各程序模块的划分进行举例说明,实际应用中,可以根据需要而将上述处理分配由不同的程序模块完成,即将节点的内部结构划分成不同的程序模块,以完成以上描述的全部或者部分处理。另外,上述实施例提供的节点与拓扑隐藏方法实施例属于同一构思,其具体实现过程详见方法实施例,这里不再赘述。
本申请实施例还提供了一种节点,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,所述处理器执行所述程序时实现本申请实施例中应用于节点中的拓扑隐藏方法的步骤。
可以理解,本实施例中的存储器可以是易失性存储器或非易失性存储 器,也可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(ROM,Read Only Memory)、可编程只读存储器(PROM,Programmable Read-Only Memory)、可擦除可编程只读存储器(EPROM,Erasable Programmable Read-Only Memory)、电可擦除可编程只读存储器(EEPROM,Electrically Erasable Programmable Read-Only Memory)、磁性随机存取存储器(FRAM,ferromagnetic random access memory)、快闪存储器(Flash Memory)、磁表面存储器、光盘、或只读光盘(CD-ROM,Compact Disc Read-Only Memory);磁表面存储器可以是磁盘存储器或磁带存储器。易失性存储器可以是随机存取存储器(RAM,Random Access Memory),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如静态随机存取存储器(SRAM,Static Random Access Memory)、同步静态随机存取存储器(SSRAM,Synchronous Static Random Access Memory)、动态随机存取存储器(DRAM,Dynamic Random Access Memory)、同步动态随机存取存储器(SDRAM,Synchronous Dynamic Random Access Memory)、双倍数据速率同步动态随机存取存储器(DDRSDRAM,Double Data Rate Synchronous Dynamic Random Access Memory)、增强型同步动态随机存取存储器(ESDRAM,Enhanced Synchronous Dynamic Random Access Memory)、同步连接动态随机存取存储器(SLDRAM,SyncLink Dynamic Random Access Memory)、直接内存总线随机存取存储器(DRRAM,Direct Rambus Random Access Memory)。本申请实施例描述的存储器旨在包括但不限于这些和任意其它适合类型的存储器。
上述本申请实施例揭示的方法可以应用于处理器中,或者由处理器实现。处理器可能是一种集成电路芯片,具有信号的处理能力。在实现过程中,上述方法的各步骤可以通过处理器中的硬件的集成逻辑电路或者软件 形式的指令完成。上述的处理器可以是通用处理器、DSP,或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。处理器可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者任何常规的处理器等。结合本申请实施例所公开的方法的步骤,可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件模块组合执行完成。软件模块可以位于存储介质中,该存储介质位于存储器,处理器读取存储器中的信息,结合其硬件完成前述方法的步骤。
本申请实施例还提供了一种计算机存储介质,其上存储有计算机指令,该指令被处理器执行时实现本申请实施例中应用于边缘节点中的拓扑隐藏方法的步骤;或者,该指令被处理器执行时实现本申请实施例中应用于服务发现网络功能中的拓扑隐藏方法的步骤;或者,该指令被处理器执行时实现本申请实施例中应用于节点中的拓扑隐藏方法的步骤。
在本申请所提供的几个实施例中,应该理解到,所揭露的设备和方法,可以通过其它的方式实现。以上所描述的设备实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,如:多个单元或组件可以结合,或可以集成到另一个系统,或一些特征可以忽略,或不执行。另外,所显示或讨论的各组成部分相互之间的耦合、或直接耦合、或通信连接可以是通过一些接口,设备或单元的间接耦合或通信连接,可以是电性的、机械的或其它形式的。
上述作为分离部件说明的单元可以是、或也可以不是物理上分开的,作为单元显示的部件可以是、或也可以不是物理单元,即可以位于一个地方,也可以分布到多个网络单元上;可以根据实际的需要选择其中的部分或全部单元来实现本实施例方案的目的。
另外,在本申请各实施例中的各功能单元可以全部集成在一个处理单 元中,也可以是各单元分别单独作为一个单元,也可以两个或两个以上单元集成在一个单元中;上述集成的单元既可以采用硬件的形式实现,也可以采用硬件加软件功能单元的形式实现。
本领域普通技术人员可以理解:实现上述方法实施例的全部或部分步骤可以通过程序指令相关的硬件来完成,前述的程序可以存储于一计算机可读取存储介质中,该程序在执行时,执行包括上述方法实施例的步骤;而前述的存储介质包括:移动存储设备、ROM、RAM、磁碟或者光盘等各种可以存储程序代码的介质。
或者,本申请上述集成的单元如果以软件功能模块的形式实现并作为独立的产品销售或使用时,也可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请实施例的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机、服务器、或者网络设备等)执行本申请各个实施例所述方法的全部或部分。而前述的存储介质包括:移动存储设备、ROM、RAM、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。

Claims (34)

  1. 一种拓扑隐藏方法,所述方法包括:
    边缘节点接收到入口服务发现请求,将所述入口服务发现请求对应服务发现响应中的服务提供者网络功能的标识替换为拓扑隐藏后的服务提供者网络功能的标识;
    所述边缘节点转发所述入口服务发现请求所对应的携带所述拓扑隐藏后的服务提供者网络功能的标识的服务发现响应。
  2. 根据权利要求1所述的方法,其中,所述将所述入口服务发现请求对应服务发现响应中的服务提供者网络功能的标识替换为拓扑隐藏后的服务提供者网络功能的标识,包括:
    所述边缘节点查询预置的映射表获得所述服务提供者网络功能的标识对应的拓扑隐藏后的服务提供者网络功能的标识,将所述入口服务发现请求对应服务发现响应中的服务提供者网络功能的标识替换为所述拓扑隐藏后的服务提供者网络功能的标识。
  3. 根据权利要求1所述的方法,其中,所述将所述入口服务发现请求对应服务发现响应中的服务提供者网络功能的标识替换为拓扑隐藏后的服务提供者网络功能的标识,包括:
    所述边缘节点将所述服务提供者网络功能的标识变换成拓扑隐藏后的服务提供者网络功能的标识,将所述入口服务发现请求对应服务发现响应中的服务提供者网络功能的标识替换所述拓扑隐藏后的服务提供者网络功能的标识。
  4. 根据权利要求3所述的方法,其中,所述方法还包括:
    所述边缘节点存储所述服务提供者网络功能的标识和所述拓扑隐藏后的服务提供者网络功能的标识的映射关系。
  5. 根据权利要求1所述的方法,其中,所述方法还包括:
    所述边缘节点基于接收到的消息中携带的统一资源标识符判断所述消息为服务发现请求,基于所述服务发现请求是由外网服务发现网络功能发送给本网服务发现网络功能确定所述服务发现请求为入口服务发现请求。
  6. 根据权利要求1至5任一项所述的方法,其中,所述方法还包括:
    所述边缘节点接收到入口服务请求;所述入口服务请求携带所述拓扑隐藏后的服务提供者网络功能的标识;
    所述边缘节点将所述入口服务请求中的所述拓扑隐藏后的服务提供者网络功能的标识替换为所述服务提供者网络功能的标识;
    所述边缘节点向本网服务提供者网络功能发送携带所述服务提供者网络功能的标识的服务请求。
  7. 根据权利要求6所述的方法,其中,所述边缘节点将所述入口服务请求中的所述拓扑隐藏后的服务提供者网络功能的标识替换为所述服务提供者网络功能的标识,包括:
    所述边缘节点查询预置的映射表或存储的映射关系,获得所述拓扑隐藏后的服务提供者网络功能的标识对应的所述服务提供者网络功能的标识;
    所述边缘节点将所述入口服务请求中的所述拓扑隐藏后的服务提供者网络功能的标识替换为所述服务提供者网络功能的标识。
  8. 根据权利要求1至5任一项所述的方法,其中,所述入口服务发现请求为外网服务发现网络功能向本网服务发现网络功能发送的服务发现请求。
  9. 根据权利要求6所述的方法,其中,所述入口服务请求为外网服务使用者网络功能向本网服务提供者网络功能发送的服务请求。
  10. 一种拓扑隐藏方法,所述方法包括:
    服务发现网络功能接收到入口服务发现请求;
    所述服务发现网络功能确定所述入口服务发现请求对应的服务提供者网络功能,对服务提供者网络功能的标识进行拓扑隐藏;
    所述服务发现网络功能返回所述入口服务发现请求所对应的携带拓扑隐藏后的服务提供者网络功能的标识的服务发现响应。
  11. 根据权利要求10所述的方法,其中,所述对服务提供者网络功能的标识进行拓扑隐藏,包括:
    所述服务发现网络功能判断是否存储了包含所述服务提供者网络功能的标识和所述拓扑隐藏后的服务提供者网络功能的标识的映射关系;
    当存储有包含所述服务提供者网络功能的标识和所述拓扑隐藏后的服务提供者网络功能的标识的映射关系时,基于所述映射关系获得所述服务提供者网络功能的标识对应的拓扑隐藏后的服务提供者网络功能的标识;
    当未存储有包含所述服务提供者网络功能的标识的映射关系时,为所述服务提供者网络功能的标识生成拓扑隐藏后的服务提供者网络功能的标识,存储所述服务提供者网络功能的标识和所述拓扑隐藏后的服务提供者网络功能的标识的映射关系。
  12. 根据权利要求10或11所述的方法,其中,所述方法还包括:
    所述服务发现网络功能接收到本网节点的服务发现请求;所述服务发现请求携带拓扑隐藏后的服务提供者网络功能的标识;
    所述服务发现网络功能确定所述拓扑隐藏后的服务提供者网络功能的标识对应的所述服务提供者网络功能的标识;
    所述服务发现网络功能向所述本网节点返回携带有所述服务提供者网络功能的标识的服务发现响应。
  13. 根据权利要求12所述的方法,其中,所述服务发现网络功能确定所述拓扑隐藏后的服务提供者网络功能的标识对应的所述服务提供者网络功能的标识,包括:
    所述服务发现网络功能查询存储的映射关系,获得所述拓扑隐藏后的服务提供者网络功能的标识对应的所述服务提供者网络功能的标识。
  14. 根据权利要求10所述的方法,其中,所述入口服务发现请求为外网服务发现网络功能向本网服务发现网络功能发送的服务发现请求。
  15. 一种拓扑隐藏方法,所述方法包括:
    节点接收到入口服务请求,从所述入口服务请求中提取拓扑隐藏过的服务提供者网络功能的标识;
    所述节点向本网服务发现网络功能发送携带有所述拓扑隐藏后的服务提供者网络功能的标识的服务发现请求;
    所述节点接收到所述服务发现网络功能返回的携带有与所述拓扑隐藏后的服务提供者网络功能的标识对应的服务提供者网络功能的标识的服务发现响应;
    所述节点将所述入口服务请求中的所述拓扑隐藏后的服务提供者网络功能的标识替换为所述服务发现响应中携带的与所述拓扑隐藏后的服务提供者网络功能的标识对应的服务提供者网络功能的标识。
  16. 一种边缘节点,所述边缘节点包括:第一接收单元、第一替换单元和第一发送单元,其中,
    所述第一接收单元,配置为接收到入口服务发现请求;
    所述第一替换单元,配置为将所述第一接收单元接收到的所述入口服务发现请求对应服务发现响应中的服务提供者网络功能的标识替换为拓扑隐藏后的服务提供者网络功能的标识;
    所述第一发送单元,配置为转发所述入口服务发现请求所对应的携带所述拓扑隐藏后的服务提供者网络功能的标识的服务发现响应。
  17. 根据权利要求16所述的边缘节点,其中,所述第一替换单元,配置为查询预置的映射表获得所述服务提供者网络功能的标识对应的拓扑隐 藏后的服务提供者网络功能的标识,将所述入口服务发现请求对应服务发现响应中的服务提供者网络功能的标识替换为所述拓扑隐藏后的服务提供者网络功能的标识。
  18. 根据权利要求16所述的边缘节点,其中,所述第一替换单元,配置为将所述服务提供者网络功能的标识变换成拓扑隐藏后的服务提供者网络功能的标识,将所述入口服务发现请求对应服务发现响应中的服务提供者网络功能的标识替换所述拓扑隐藏后的服务提供者网络功能的标识。
  19. 根据权利要求18所述的边缘节点,其中,所述边缘节点还包括第一存储单元,配置为存储所述服务提供者网络功能的标识和所述拓扑隐藏后的服务提供者网络功能的标识的映射关系。
  20. 根据权利要求16所述的边缘节点,其中,所述边缘节点还包括第一判断单元,配置为基于所述第一接收单元接收到的消息中携带的统一资源标识符判断所述消息为服务发现请求,基于所述服务发现请求是由外网服务发现网络功能发送给本网服务发现网络功能确定所述服务发现请求为入口服务发现请求。
  21. 根据权利要求16至20任一项所述的边缘节点,其中,所述第一接收单元,还配置为接收到入口服务请求;所述入口服务请求携带所述拓扑隐藏后的服务提供者网络功能的标识;
    所述第一替换单元,还配置为将所述第一接收单元接收到的所述入口服务请求中的所述拓扑隐藏后的服务提供者网络功能的标识替换为所述服务提供者网络功能的标识;
    所述第一发送单元,还配置为向本网服务提供者网络功能发送携带所述服务提供者网络功能的标识的服务请求。
  22. 根据权利要求21所述的边缘节点,其中,所述第一替换单元,配置为查询预置的映射表或存储的映射关系,获得所述拓扑隐藏后的服务提 供者网络功能的标识对应的所述服务提供者网络功能的标识;将所述入口服务请求中的所述拓扑隐藏后的服务提供者网络功能的标识替换为所述服务提供者网络功能的标识。
  23. 根据权利要求16至20任一项所述的边缘节点,其中,所述入口服务发现请求为外网服务发现网络功能向本网服务发现网络功能发送的服务发现请求。
  24. 根据权利要求21所述的边缘节点,其中,所述入口服务请求为外网服务使用者网络功能向本网服务提供者网络功能发送的服务请求。
  25. 一种服务发现网络功能,所述服务发现网络功能包括第二接收单元、拓扑隐藏单元和第二发送单元;其中,
    所述第二接收单元,配置为接收到入口服务发现请求;
    所述拓扑隐藏单元,配置为确定所述第二接收单元接收到的所述入口服务发现请求对应的服务提供者网络功能,对服务提供者网络功能的标识进行拓扑隐藏;
    所述第二发送单元,配置为返回所述入口服务发现请求所对应的携带拓扑隐藏后的服务提供者网络功能的标识的服务发现响应。
  26. 根据权利要求25所述的服务发现网络功能,其中,所述服务发现网络功能还包括第二存储单元,配置为存储包含所述服务提供者网络功能的标识的映射关系;
    所述拓扑隐藏单元,配置为判断所述第二存储单元是否存储包含所述服务提供者网络功能的标识的映射关系;当所述第二存储单元存储有包含所述服务提供者网络功能的标识的映射关系时,基于所述映射关系获得所述服务提供者网络功能的标识对应的拓扑隐藏后的服务提供者网络功能的标识;当所述第二存储单元未存储有包含所述服务提供者网络功能的标识的映射关系时,为所述服务提供者网络功能的标识生成拓扑隐藏后的服务 提供者网络功能的标识。
  27. 根据权利要求25或26所述的服务发现网络功能,其中,所述第二接收单元,还配置为接收到本网节点的服务发现请求;所述服务发现请求携带拓扑隐藏后的服务提供者网络功能的标识;
    所述拓扑隐藏单元,还配置为确定所述拓扑隐藏后的服务提供者网络功能的标识对应的所述服务提供者网络功能的标识;
    所述第二发送单元,还配置为向所述本网节点返回携带有所述服务提供者网络功能的标识的服务发现响应。
  28. 根据权利要求27所述的服务发现网络功能,其中,所述拓扑隐藏单元,配置为查询存储的映射关系,获得所述拓扑隐藏后的服务提供者网络功能的标识对应的所述服务提供者网络功能的标识。
  29. 根据权利要求25所述的服务发现网络功能,其中,所述入口服务发现请求为外网服务发现网络功能向本网服务发现网络功能发送的服务发现请求。
  30. 一种节点,所述节点包括:第三接收单元、提取单元、第三发送单元和第二替换单元;其中,
    所述第三接收单元,配置为接收到入口服务请求;
    所述提取单元,配置为从所述第三接收单元接收到的所述入口服务请求中提取拓扑隐藏过的服务提供者网络功能的标识;
    所述第三发送单元,配置为向本网服务发现网络功能发送携带有所述拓扑隐藏后的服务提供者网络功能的标识的服务发现请求;
    所述第三接收单元,还配置为接收到所述服务发现网络功能返回的携带有与所述拓扑隐藏后的服务提供者网络功能的标识对应的服务提供者网络功能的标识的服务发现响应;
    所述第二替换单元,配置为将所述入口服务请求中的所述拓扑隐藏后 的服务提供者网络功能的标识替换为所述服务发现响应中携带的与所述拓扑隐藏后的服务提供者网络功能的标识对应的服务提供者网络功能的标识。
  31. 一种计算机存储介质,其上存储有计算机指令,该指令被处理器执行时实现权利要求1至9任一项所述拓扑隐藏方法的步骤;或者,
    该指令被处理器执行时实现权利要求10至14任一项所述拓扑隐藏方法的步骤;或者,
    该指令被处理器执行时实现权利要求15所述拓扑隐藏方法的步骤。
  32. 一种边缘节点,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,所述处理器执行所述程序时实现权利要求1至9任一项所述拓扑隐藏方法的步骤。
  33. 一种服务发现网络功能,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,所述处理器执行所述程序时实现权利要求10至14任一项所述拓扑隐藏方法的步骤。
  34. 一种节点,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,所述处理器执行所述程序时实现权利要求15所述拓扑隐藏方法的步骤。
PCT/CN2019/076085 2018-03-19 2019-02-25 一种拓扑隐藏方法、节点、网络功能和计算机存储介质 WO2019179282A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810226767.4 2018-03-19
CN201810226767.4A CN110290161A (zh) 2018-03-19 2018-03-19 一种拓扑隐藏方法、节点、功能实体和计算机存储介质

Publications (1)

Publication Number Publication Date
WO2019179282A1 true WO2019179282A1 (zh) 2019-09-26

Family

ID=67988159

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/076085 WO2019179282A1 (zh) 2018-03-19 2019-02-25 一种拓扑隐藏方法、节点、网络功能和计算机存储介质

Country Status (2)

Country Link
CN (1) CN110290161A (zh)
WO (1) WO2019179282A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20230139732A1 (en) * 2021-11-01 2023-05-04 Samsung Electronics Co., Ltd. Multi-dimensional memory cluster

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112468483B (zh) * 2020-11-24 2022-02-08 中国电子科技集团公司第三十研究所 基于5g边缘防护代理的服务动态分配及信令防护方法
US11558737B2 (en) * 2021-01-08 2023-01-17 Oracle International Corporation Methods, systems, and computer readable media for preventing subscriber identifier leakage
CN114945173B (zh) * 2022-03-29 2023-05-05 广州爱浦路网络技术有限公司 跨plmn信令转发方法、电子设备及存储介质
CN117580030A (zh) * 2022-08-08 2024-02-20 华为技术有限公司 通信方法和通信装置

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103596118A (zh) * 2012-08-13 2014-02-19 华为终端有限公司 发现机器对机器业务的方法、设备及系统
WO2017205185A1 (en) * 2016-05-23 2017-11-30 Amazon Technologies, Inc. Protecting content-stream portions from modification or removal

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101272534B (zh) * 2008-05-08 2012-07-18 中兴通讯股份有限公司 一种隐藏拜访地网络拓扑结构的策略计费控制的方法
US8811393B2 (en) * 2010-10-04 2014-08-19 Cisco Technology, Inc. IP address version interworking in communication networks
CN103023865B (zh) * 2011-09-28 2017-07-11 中兴通讯股份有限公司 拓扑隐藏网络中路径参数的恢复、隐藏方法及装置
CN105338511B (zh) * 2014-06-25 2019-08-16 华为技术有限公司 网络拓扑隐藏方法和设备
US20160227394A1 (en) * 2015-02-03 2016-08-04 Alcatel-Lucent Canada Inc. Hiding Diameter Network Topology
US9967148B2 (en) * 2015-07-09 2018-05-08 Oracle International Corporation Methods, systems, and computer readable media for selective diameter topology hiding

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103596118A (zh) * 2012-08-13 2014-02-19 华为终端有限公司 发现机器对机器业务的方法、设备及系统
WO2017205185A1 (en) * 2016-05-23 2017-11-30 Amazon Technologies, Inc. Protecting content-stream portions from modification or removal

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20230139732A1 (en) * 2021-11-01 2023-05-04 Samsung Electronics Co., Ltd. Multi-dimensional memory cluster

Also Published As

Publication number Publication date
CN110290161A (zh) 2019-09-27

Similar Documents

Publication Publication Date Title
WO2019179282A1 (zh) 一种拓扑隐藏方法、节点、网络功能和计算机存储介质
CN107508795B (zh) 跨容器集群的访问处理装置及方法
US10798222B2 (en) Apparatus for managing SDN-based in-vehicle network and control method thereof
WO2019095889A1 (zh) 通过nrf进行nf发现的方法、设备及可读存储介质
US10389848B2 (en) Message transmission method and core network interface device
WO2017054526A1 (zh) 一种arp条目生成方法和装置
WO2019144742A1 (zh) 用户终端和设备的绑定方法、装置和系统
JP2019515555A (ja) 識別情報指向型ネットワークの匿名識別情報及びプロトコル
WO2017071087A1 (zh) 信息的传输方法、装置和设备
CN111064804B (zh) 网络访问方法和装置
CN113507475B (zh) 跨域访问方法和装置
EP4044754A1 (en) Information processing method and related network device
CN102067525A (zh) 用于发现对等覆盖网络的方法和装置
WO2022052648A1 (zh) 会话管理方法、装置、相关设备及存储介质
CN111460458A (zh) 一种数据处理方法、相关装置及计算机可存储介质
US11750716B2 (en) Methods for publishing resource, and gateway
US8774053B2 (en) Method, network element device, and network system for associating a terminal device with a network
WO2013044691A1 (zh) 基于lisp的映射请求响应、信息获取方法及相应设备
KR101426012B1 (ko) 객체 식별자를 이용한 확장된 해석 시스템
WO2021237527A1 (zh) 信息处理方法及装置、设备、计算机存储介质
CN111600833B (zh) 网络操作系统及报文转发方法
WO2022028170A1 (zh) 一种数据传输方法、相关网络节点和存储介质
CN106209407B (zh) 进行会话备份的方法与设备
CN113992658A (zh) 数据传输方法及相关装置、设备、系统和存储介质
CN102843663B (zh) 提供wlan用户接入信息的方法及系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19770803

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 14.01.2021)

122 Ep: pct application non-entry in european phase

Ref document number: 19770803

Country of ref document: EP

Kind code of ref document: A1