WO2021008595A1 - 一种服务器通信方法、宽带接入服务器及系统 - Google Patents
一种服务器通信方法、宽带接入服务器及系统 Download PDFInfo
- Publication number
- WO2021008595A1 WO2021008595A1 PCT/CN2020/102496 CN2020102496W WO2021008595A1 WO 2021008595 A1 WO2021008595 A1 WO 2021008595A1 CN 2020102496 W CN2020102496 W CN 2020102496W WO 2021008595 A1 WO2021008595 A1 WO 2021008595A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- bas
- terminal
- connection request
- pool
- session resources
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/70—Admission control; Resource allocation
- H04L47/76—Admission control; Resource allocation using dynamic resource allocation, e.g. in-call renegotiation requested by the user or requested by the network in response to changing network conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/70—Admission control; Resource allocation
- H04L47/76—Admission control; Resource allocation using dynamic resource allocation, e.g. in-call renegotiation requested by the user or requested by the network in response to changing network conditions
- H04L47/762—Admission control; Resource allocation using dynamic resource allocation, e.g. in-call renegotiation requested by the user or requested by the network in response to changing network conditions triggered by the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/70—Admission control; Resource allocation
- H04L47/78—Architectures of resource allocation
- H04L47/781—Centralised allocation of resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/70—Admission control; Resource allocation
- H04L47/80—Actions related to the user profile or the type of traffic
- H04L47/803—Application aware
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/70—Admission control; Resource allocation
- H04L47/82—Miscellaneous aspects
- H04L47/822—Collecting or measuring resource availability data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1001—Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
- H04L67/1004—Server selection for load balancing
- H04L67/1008—Server selection for load balancing based on parameters of servers, e.g. available memory or workload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
- H04L67/141—Setup of application sessions
Definitions
- the invention relates to the field of communication, in particular to a server communication method, a broadband access server and a system.
- a terminal accessing the network through a broadband access server needs to occupy the session resources of the BAS.
- BAS broadband access server
- the BAS in the area needs more session resources; when the number of terminals in an area is small, the session resources provided by the BAS in the area are needed less.
- the BAS session resources in the first area may not be sufficient.
- the only way to increase the session resources of the BAS in the first area is to enable all terminal devices in the first area to access the network through the BAS in the first area.
- there may be relatively few terminal devices in the second area After all the terminal devices in the second area are satisfied to access the network, some of the session resources of the BAS in the second area are still idle.
- This setting method may cause insufficient session resources in some areas in different areas in one area, while session resources in another area are idle. As a result, session resources are not evenly distributed, and the utilization rate of session resources is relatively low.
- the first aspect of the embodiments of the present invention provides a server communication method.
- the method includes: after a first BAS receives a connection request from a first terminal, if the first BAS determines that the number of remaining session resources of the first BAS is less than or equal to the first When the threshold is set, the first BAS sends a connection request of the first BAS to the second BAS, so that the first terminal accesses the network through the second BAS, and the second BAS is determined by the first BAS through the BAS pool communication protocol, The second BAS and the first BAS are two different BAS in the BAS pool.
- the first terminal that should access the network through the first BAS can access the network through the second BAS that belongs to the same BAS pool as the first BAS. Realize session resource sharing between servers in a BAS pool, thereby improving the utilization of session resources.
- the method before the first BAS sends the connection request of the first terminal to the second BAS, the method further includes: when the remaining of the first BAS When the number of session resources is less than or equal to the second threshold, the first BAS sends a resource request message to at least one BAS in the BAS pool except the first BAS according to the BAS pool communication protocol, the at least one BAS includes the second BAS, and the resource request message Used to instruct the second BAS to send the remaining session resource quantity of the second BAS to the first BAS; the first BAS receives the remaining session resource quantity of the second BAS from the second BAS; the first BAS sends the connection of the first terminal to the second BAS
- the request includes: when the first BAS determines that the number of remaining session resources of the second BAS is greater than or equal to the third threshold, the first BAS sends a connection request of the first terminal to the second BAS.
- the first BAS can obtain the number of session resources of other BAS in the BAS pool through the resource request message, thereby determining that the number of session resources on the second BAS is sufficient, and can support the first terminal to access the network through the second BAS.
- the method after the first BAS sends the connection request of the first terminal to the second BAS, the method also Including: the first BAS determines that the Layer 2 channel between the first BAS and the second BAS is not clear; when the first BAS receives the reconnection request of the first terminal, the first BAS sends the first terminal's information to the third BAS The reconnection request enables the first terminal to access the network through a third BAS.
- the third BAS is one of the at least one BAS that is different from the second BAS.
- the third BAS is determined by the first BAS through the BAS pool communication protocol. 3.
- the number of remaining session resources of the BAS is greater than or equal to the fourth threshold.
- the first BAS can borrow the session resources of the third BAS in the same BAS pool, which enhances the stability of the solution and provides a set of alternatives Program.
- the method before the first BAS sends the connection request of the first terminal to the third BAS, the method also Including: the first BAS sends a detection message to the second BAS, the detection message is used to instruct the second BAS to send a response message to the first BAS, and the response message is used by the first BAS to determine whether the first BAS is with the second BAS Whether the second layer channel between BAS is unblocked; the first BAS determines that the second layer channel between the first BAS and the second BAS is not unblocked, including: if the first BAS does not receive a response message within the first time range, the first BAS determined that the second-tier channel between the first BAS and the second BAS is not clear.
- the first BAS can determine whether the layer 2 channel between the first BAS and the second BAS is unblocked by detecting the message. When the second floor channel is not clear, it can be found in time, which can increase the timeline
- the first BAS determines the second or third possible implementation manner between the first BAS and the second BAS.
- the method further includes: the first BAS receives a connection request from the second terminal, which is different from the first terminal; when the first BAS determines that the number of remaining session resources of the first BAS is less than or equal to the first
- the first BAS sends a connection request of the second terminal to the third BAS, so that the second terminal accesses the network through the third BAS.
- the first BAS can borrow the session resources of the third BAS, which enhances the stability of the solution.
- the method further includes: the first BAS receives a resource warning message from the second BAS, the resource warning message is used to indicate that the remaining number of session resources of the second BAS is less than a third threshold; when the first BAS receives the third terminal’s
- the first BAS sends a connection request of the third terminal to the fourth BAS, so that the third terminal accesses the network through the fourth BAS, and the fourth BAS is a BAS different from the second BAS among at least one BAS
- the fourth BAS is determined by the first BAS through the BAS pool communication protocol, and the number of remaining session resources of the fourth BAS is greater than or equal to the fifth threshold.
- the first BAS can continue to borrow session resources from the fourth BAS, which enhance
- the first BAS receives the connection request of the fourth terminal; when the first aspect When the BAS determines that the number of remaining sessions of the first BAS is greater than the second threshold, the first BAS determines that the fourth terminal accesses the network through the first BAS. When the remaining session resources of the first BAS are sufficient, the first BAS may no longer need to borrow session resources, so that the fourth terminal accesses the network through the first BAS.
- the method further includes: the first BAS sends upstream traffic to the second BAS, where the upstream traffic is received by the first BAS from the first terminal.
- the upstream traffic of the first terminal is forwarded to the second BAS through the first BAS.
- the method further includes: the first BAS sends downlink traffic to the first terminal, where the downlink traffic is received by the first BAS from the second BAS. After the first terminal accesses the network through the second BAS, the downstream traffic generated by the second BAS is forwarded to the first BAS through the first BAS.
- a second aspect of the embodiments of the present invention provides a broadband access server BAS, characterized in that the BAS is the first BAS in the BAS pool, and the first BAS includes: a receiving unit for receiving a connection request from a first terminal, The first BAS is any BAS in the BAS pool; the processing unit is used to determine that the number of remaining session resources of the first BAS is less than or equal to the first threshold; the sending unit is used when the processing unit determines that the number of remaining session resources of the first BAS is less than Or equal to the first threshold, send a connection request of the first terminal to the second BAS so that the first terminal accesses the network through the second BAS.
- the second BAS is determined by the first BAS through the BAS pool communication protocol.
- the first terminal that should access the network through the first BAS can access the network through the second BAS that belongs to the same BAS pool as the first BAS. Realize session resource sharing between servers in a BAS pool, thereby improving the utilization of session resources.
- the processing unit in the first BAS is further configured to send the first terminal connection request to the second BAS before the sending unit, It is determined that the number of remaining session resources of the first BAS is less than or equal to the second threshold; the sending unit is further configured to, when the processing unit determines that the number of remaining session resources of the first BAS is less than or equal to the second threshold, send to the BAS pool according to the BAS pool communication protocol At least one BAS other than the first BAS sends a resource request message, the at least one BAS includes a second BAS, and the resource request message is used to instruct the second BAS to send the remaining session resource quantity of the second BAS to the first BAS; a receiving unit, It is also used to receive the number of remaining session resources of the second BAS from the second BAS; the processing unit is also used to determine that the number of remaining session resources of the second BAS is greater than or equal to the third threshold; the sending unit is also used to when the processing
- the processing unit in the first BAS is further used for the sending unit to send to the second BAS After the connection request of the first terminal, it is determined that the Layer 2 channel between the first BAS and the second BAS is not clear; the receiving unit is also used to receive the reconnection request from the first terminal; the sending unit is also used to send the third The BAS sends the reconnection request of the first terminal, so that the first terminal accesses the network through the third BAS.
- the third BAS is a BAS different from the second BAS among the at least one BAS, and the third BAS is the first BAS communicating through the BAS pool As determined by the protocol, the number of remaining session resources of the third BAS is greater than or equal to the fourth threshold.
- the sending unit in the first BAS is also used to send the sending unit to the third BAS Before the reconnection request of the first terminal, it sends a detection message to the second BAS.
- the detection message is used to instruct the second BAS to send a response message to the sending unit.
- the response message is used by the first BAS to determine whether the first BAS is Whether the Layer 2 channel between the second BAS is unblocked; the processing unit is also used to determine the Layer 2 channel between the first BAS and the second BAS when the sending unit does not receive the response message within the first time range blocked.
- the receiving unit in the first BAS After the processing unit determines that the second layer channel between the first BAS and the second BAS is not clear, it receives a connection request from the second terminal, which is different from the first terminal; the processing unit is also used to determine the first The number of remaining session resources of the BAS is less than or equal to the first threshold; the sending unit is further configured to send a connection request of the second terminal to the third BAS, so that the second terminal accesses the network through the third BAS.
- the receiving unit in the first BAS is also used for the second aspect
- the BAS receives a resource alarm message, which is used to indicate that the remaining number of session resources of the second BAS is less than the third threshold; the receiving unit is also used to receive the connection request of the third terminal; the sending unit is also used to send the fourth BAS sends the connection request of the third terminal to make the third terminal access the network through the fourth BAS.
- the fourth BAS is a BAS different from the second BAS among at least one BAS, and the fourth BAS is the first BAS through the BAS pool communication protocol It is determined that the number of remaining session resources of the fourth BAS is greater than or equal to the fifth threshold.
- the receiving unit is further configured to receive a connection request of the fourth terminal; the processing unit is further configured to determine that the fourth terminal accesses the network through the first BAS when the number of remaining sessions of the first BAS is greater than the second threshold.
- the receiving unit in the first BAS is further configured to receive data from the first The terminal receives the uplink traffic; the sending unit is also used to send the uplink traffic to the second BAS.
- the receiving unit in the first BAS is also used for the second aspect
- the BAS receives the downlink traffic; the sending unit is also used to send the downlink traffic to the first terminal.
- a third aspect of the embodiments of the present invention provides a system, which is characterized in that the system is a broadband access server BAS pool in any one of the first aspect and the first aspect, and the BAS pool includes the first aspect and the first aspect.
- the BAS pool includes at least two BAS.
- the fourth aspect of the embodiments of the present invention provides a first broadband access server BAS, characterized in that the first BAS includes: a processor and a memory, the memory stores program instructions, and the processor is used to execute the program instructions stored in the memory , Execute the method in the first aspect and any one of the possible implementation manners of the first aspect.
- a fifth aspect of the embodiments of the present invention provides a computer-readable storage medium, including program instructions, which are characterized in that, when the program instructions run on a computer device, the computer device executes any one of the first aspect and the first aspect. Methods in possible implementations.
- Embodiments of the present invention provide a server communication method, broadband access server and system.
- the method includes: after a first BAS receives a connection request from a first terminal, if the first BAS determines that the number of remaining session resources of the first BAS is less than When or equal to the first threshold, the first BAS sends a connection request of the first BAS to the second BAS, so that the first terminal accesses the network through the second BAS, and the second BAS means that the first BAS communicates through the BAS pool According to the agreement, the second BAS and the first BAS are two different BAS in the BAS pool.
- the first terminal that should access the network through the first BAS can access the network through the second BAS that belongs to the same BAS pool as the first BAS. Realize session resource sharing between servers in a BAS pool, thereby improving the utilization of session resources.
- FIG. 1 is a schematic diagram of an embodiment of a server communication method provided by an embodiment of the present invention
- FIG. 2 is a schematic diagram of another embodiment of a server communication method according to an embodiment of the present invention.
- FIG. 3 is a schematic diagram of another embodiment of a server communication method provided by an embodiment of the present invention.
- FIG. 4 is a schematic diagram of another embodiment of a server communication method according to an embodiment of the present invention.
- FIG. 5 is a schematic diagram of an embodiment of a broadband access server provided by an embodiment of the present invention.
- FIG. 6 is a schematic diagram of another embodiment of a broadband access server provided by an embodiment of the present invention.
- Fig. 7 is a schematic diagram of an embodiment of a system provided by an embodiment of the present invention.
- the only way to increase the session resources of the BAS in the first area is to enable all terminal devices in the first area to access the network through the BAS in the first area.
- there may be relatively few terminal devices in the second area After all the terminal devices in the second area are satisfied to access the network, some of the session resources of the BAS in the second area are still idle.
- This setting method may cause insufficient session resources in some areas in different areas in one area, while session resources in another area are idle. As a result, session resources are not evenly distributed, and the utilization rate of session resources is relatively low.
- the embodiment of the present invention provides a method for server communication, which can make BAS in a region form a BAS pool, and BAS in the BAS pool can borrow session resources from each other, thereby improving the utilization of session resources.
- a BAS pool communication protocol (BAS pool communication protocol, BPCP) can be defined in the server pool, and BAS in the BAS pool communicate according to the BPCP.
- the BPCP can include the following seven types of messages:
- Resource request message If the remaining session resources of a BAS in the BAS pool are less than or equal to the second threshold and the session resources on the BAS are about to be exhausted, the BAS can send the resource request message to at least one BAS in the BAS pool Text. This BAS can be called a BAS for help. If the BAS that received the resource request message is in the state of being borrowed, the BAS that received the resource request message sends a message that cannot be borrowed to the BAS for assistance.
- the BAS that received the resource request message in 1 sends a resource response message to the BAS for help.
- the resource response message may include the remaining session resource quantity of the BAS that received the resource request message .
- the BAS for assistance receives the resource response message, it determines the BAS of the borrowed resource according to the resource response message.
- the BAS for assistance can determine at least one BAS of borrowed resources based on the remaining session resources of each BAS. For example, the BAS with the largest number of remaining session resources is used as the borrowed resource BAS; the BAS with the largest number of remaining session resources can be used as the main borrowed resource BAS, and the BAS with the second number of remaining session resources can be used as the borrowed resource backup BAS.
- Service request message After the BAS requesting assistance determines the BAS of the borrowed resource in 2, the requesting BAS sends the service request message to the BAS of the borrowed resource.
- the service request message is used to request the borrowing of session resources.
- the BAS of the borrowed resource can send a service response message to the BAS for assistance.
- the service response message may include the BAS's own media access control (media access control, MAC) address.
- the BAS for assistance After the BAS for assistance receives the service response message, it records the MAC address of the BAS of the borrowed resource, and encapsulates the MAC address of the BAS of the borrowed resource in the connection request of the terminal that needs to access the network through the BAS for assistance. , And send the connection request message to the BAS of the borrowed resource.
- media access control media access control
- the BAS of the borrowed resource can send the resource alarm message to all BAS in the BAS pool. After receiving the resource alarm BAS, the BAS that has a borrowing relationship with the BAS sending the resource alarm message can re-determine the BAS of a borrowed resource. After receiving the resource alarm message, other BAS that have no borrowing relationship with the BAS sending the resource alarm message can mark the BAS sending the resource alarm message as a BAS that cannot borrow resources. If the BAS sending the resource alarm message is the master BAS of borrowed resources determined by the BAS for assistance in 2, the BAS for assistance may also send the connection request of the terminal that needs to access the network to the borrowed resource backup BAS determined by the BAS for assistance.
- a message type (messagetype) field can be used to identify the message type.
- a message type (messagetype) field
- the value of this field is 1, it means that the message type is a resource request message; when the value is 2, it means that the message type is a resource response message; when the value is 3, it means the message is The type is a service request message; when the value is 4, it means that the message type is a service response message; when the value is 5, it means that the message type is a resource alarm message; when the value is 6, it means the message is The message type is a borrowing release message; when the value is 7, it means that the message type is a borrowing release response message.
- a status field can be used to identify the resource status of the BAS. Exemplarily, when the field value is 0, it may indicate that the BAS resource is idle; when the field value is 1, it may indicate that the BAS resource is busy. When the remaining resources of the BAS are less than or equal to a certain threshold, the BAS can enter the resource busy state.
- the above message may be transmitted according to the transmission control protocol (TCP) or the terminal datagram protocol (user datagram protocol, UDP).
- TCP transmission control protocol
- UDP user datagram protocol
- a message needs to be sent to all BAS in the BAS pool UDP may be used for transmission, such as a resource request message and a resource alarm message.
- TCP can be used for transmission, such as resource response messages, service request messages, service response messages, borrowing release messages, and borrowing release response messages.
- the first embodiment of the present invention provides a server communication method. Please refer to FIG. 1.
- the method includes:
- the first BAS receives a connection request from the first terminal.
- the first BAS receives the connection request of the first terminal.
- the first terminal is a terminal in the area where the first BAS is located.
- the first BAS determines that the first terminal has a need to access the network according to the connection request of the first terminal.
- the first BAS determines that the number of remaining session resources of the first BAS is less than or equal to a first threshold.
- Each BAS's own session resources are limited, and the terminal needs to consume BAS session resources to access the network through the BAS.
- the number of remaining session resources of the first BAS is less than or equal to the first threshold, the session resources of the first BAS are nearly exhausted.
- the first threshold may be 10% of the resource quantity of the first BASsession. At this time, the first terminal cannot access the network through the first BAS.
- the first BAS sends a connection request of the first terminal to the second BAS, so that the first terminal accesses the network through the second BAS.
- the first BAS sends the connection request of the first terminal to the second BAS in the BAS pool, so that the first terminal accesses the network through the second BAS.
- the first BAS and the second BAS are located in two different BAS in the BAS pool.
- the first BAS is the BAS for assistance
- the second BAS is the BAS of the borrowed resource determined by the first BAS.
- any two BAS in the BAS pool can communicate with each other through a Layer 2 channel, and the Layer 2 channel can include Ethernet virtual private network (EVPN) and Layer 2 virtual private network (layer 2 virtual private network).
- network L2VPN
- VXLAN virtual extended local area network
- EVPN or virtual private LAN service can be set between any two BAS in the BAS pool, so that the layer 2 channel pseudowire (PW) between each BAS in the BAS pool ) Reachable.
- PW pseudowire
- VE loopback virtual ethernet
- L2VPN is bound to PW
- L3VPN layer 3 virtual private network
- the first BAS Before the first BAS sends the connection request of the first terminal to the second BAS, the first BAS may first send a service request message to the second BAS to request the second BAS to borrow session resources, and the second BAS receives After the service request message, a service response message may be sent to the first BAS, where the service response message includes the MAC address of the second BAS.
- the first BAS may encapsulate the MAC address of the second BAS in the connection request of the first terminal, and then send the connection request of the first terminal to the second BAS, so that the first terminal accesses the network through the second BAS.
- the first BAS After the first terminal accesses the network through the second BAS, if the first terminal generates upstream traffic, the first BAS first receives the upstream traffic generated by the first terminal, and then forwards the upstream traffic to the second BAS through the Layer 2 channel.
- the downstream traffic generated by the second BAS is first sent to the first BAS through the Layer 2 channel, and the first BAS forwards the downstream traffic to the first terminal.
- the second BAS determines that the session resources lent to the first BAS are all released, that is, when the first BAS forwards the connection request, and all the terminals that access the network through the second BAS disconnect the network, the second BAS sends the message to the first BAS. Send the borrow release message.
- the first BAS receives the borrow release message and determines that the number of remaining session resources of the first BAS is greater than the second threshold, the first BAS releases the borrow state.
- the first BAS can send a borrowing release response message to the second BAS.
- the second BAS confirms that the borrowed state is released. The borrowing relationship between BAS and the second BAS was terminated.
- the first BAS may forward the connection request to the second BAS, so that the terminal that needs to access the network accesses the network through the second BAS.
- the first BAS can enter the borrowing state again, the second BAS enters the borrowed state again, and the first BAS and the second BAS form a borrowing relationship again.
- the first terminal may disconnect from the second BAS due to network congestion or other reasons. After that, the first terminal needs to access the network again. If there is still a borrowing relationship between the first BAS and the second BAS at this time, the first terminal can continue to access the network through the second BAS.
- the first embodiment of the present invention provides a server communication method.
- this method can enable the first terminal that should access the network through the first BAS to pass through the same ownership as the first BAS.
- the second BAS of a BAS pool is connected to the network, so that session resource sharing between servers in a BAS pool can be realized, thereby improving the utilization of session resources.
- the first BAS before the first BAS sends the connection request of the first terminal to the second BAS, the first BAS needs to determine whether the remaining session resources on the second BAS are sufficient.
- the first BAS may first send a resource request message to other BAS in the BAS pool, and then, according to the received resource response message, determine that the session resources on the second BAS are sufficient to support the first terminal to access the network through the second BAS.
- the second embodiment of the present invention provides a server communication method. Please refer to FIG. 2. The method includes:
- the first BAS determines that the number of remaining session resources of the first BAS is less than or equal to a second threshold.
- the first BAS determines that the number of remaining session resources of itself is less than or equal to the second threshold.
- the second threshold may be 30% of the total number of session resources of the first BAS.
- the first BAS sends a resource request message to the second BAS.
- the first BAS sends a resource request message to at least one BAS in the BAS pool, the at least one BAS includes a second BAS, and the first message is used to inquire about the remaining session resource quantity of the at least one BAS.
- the value of the status field in the first packet sent by the first BAS to the at least one BAS may be 1, which indicates that the first BAS A BAS resource is busy, the first BAS cannot be borrowed by other BAS in the BAS pool session resource.
- the first BAS receives the remaining session resource quantity of the second BAS from the second BAS.
- the at least one BAS may send a resource response message to the first BAS, where the resource response message includes the remaining session resource quantity of the at least one BAS.
- the at least one BAS includes a second BAS.
- the first BAS determines that the number of remaining session resources in the second BAS is greater than or equal to a third threshold.
- the first BAS determines the second BAS in the at least one BAS according to the resource response message fed back by the at least one BAS.
- the number of remaining session resources of the second BAS is greater than or equal to the third threshold.
- the third threshold may be 30% of the total number of session resources of the second BAS.
- the first BAS may determine the second BAS as the BAS of the borrowed resource.
- the third threshold and the second threshold may be the same or different.
- the total number of session resources of the first BAS and the total number of session resources of the second BAS may be the same or different, and there is no limitation here.
- the first BAS may also determine multiple borrowed resource BAS in the at least one BAS according to the resource response message sent by the at least one BAS.
- the first BAS may use the BAS with the largest number of remaining session resources as the master BAS for borrowed resources, and the BAS with the second number of remaining session resources as the standby BAS for borrowed resources.
- the first BAS may send a service request message to the second BAS, where the service request message is used to request the borrowing of the session resource.
- the second BAS may send a service response message to the first BAS, and the service response message may include the MAC address of the second BAS.
- the first BAS receives the connection request of the first terminal.
- step 101 in Embodiment 1 please refer to step 101 in Embodiment 1, which will not be repeated here.
- the first BAS determines that the number of remaining session resources of the first BAS is less than or equal to the first threshold.
- step 102 in Embodiment 1 please refer to step 102 in Embodiment 1, which will not be repeated here.
- the first BAS sends a connection request of the first terminal to the second BAS, so that the first terminal accesses the network through the second BAS.
- step 103 in Embodiment 1 please refer to step 103 in Embodiment 1, which will not be repeated here.
- the number of remaining session resources on the first BAS is greater than the second threshold due to the terminal disconnection from the network or other reasons, when the first BAS receives the connection request from the terminal again, the need A terminal that accesses the network can access the network through the first BAS.
- the first BAS may first determine that the remaining session resources on the second BAS are sufficient, and then determine the session resources on the second BAS It can support the first terminal to access the network through the second BAS, and then send the connection request of the first terminal to the second BAS, so as to ensure that the first terminal can smoothly access the network through the second BAS.
- the first BAS can monitor in real time whether the Layer 2 channel between the first BAS and the second BAS is unblocked.
- the first BAS may use bidirectional forwarding detection (BFD) technology, network quality analyzer (NQA) technology or other technologies to detect whether the layer 2 channel between the first BAS and the second BAS is unblocked. If the first BAS confirms that the Layer 2 channel between the first BAS and the second BAS is not clear, the first terminal can sense that the network is disconnected.
- BFD bidirectional forwarding detection
- NQA network quality analyzer
- the first terminal sends a reconnection request to the first BAS, and the first BAS forwards the reconnection request to the third BAS, so that the first terminal accesses the network through the third BAS.
- the first BAS receives the connection request of the second terminal
- the first BAS also forwards the connection request of the second terminal to the third BAS, so that the second terminal accesses the network through the third BAS.
- the third embodiment includes:
- the first BAS determines that the second-level channel between the first BAS and the second BAS is not clear.
- the first BAS may send a detection message to the second BAS.
- the detection message is used to detect whether the layer 2 channel between the first BAS and the second BAS is unblocked. If it is within the first time range, the first BAS is not Upon receiving the response message sent by the second BAS, the first BAS can determine that the layer 2 channel between the first BAS and the second BAS is not clear.
- the first time range may be preset.
- the first BAS can determine that the Layer 2 channel between the first BAS and the second BAS is unblocked , The first BAS can continue to borrow the session resources of the second BAS, so that the terminal that should have access to the network through the first BAS access the network through the second BAS.
- the first BAS will send a terminal connection request to the second BAS only after confirming that the layer 2 channel between the first BAS and the second BAS is unblocked, and will borrow the session resources of the second BAS . Therefore, at the moment when the first BAS sends the connection request of the first terminal to the second BAS, the second layer channel between the first BAS and the second BAS is unblocked.
- the first BAS sends a probe message to the second BAS as a continuous process. After the first BAS receives the resource response message sent by the second BAS, it can send probes to the second BAS every preset time period. Message, continuously monitor whether the layer 2 channel between the first BAS and the second BAS is unblocked.
- the first BAS receives a reconnection request from the first terminal.
- the first terminal can also sense the disconnection of the network. BAS sends a reconnection request. It should be noted that the reconnection request and the connection request of the first terminal may be the same or different. There is no restriction here. The first terminal cannot perceive which BAS in the BAS pool is used to access the network of.
- the first BAS sends a reconnection request of the first terminal to the third BAS, so that the first terminal accesses the network through the third BAS.
- the first BAS may send a reconnection request of the first terminal to the third BAS, so that the first terminal passes through the 3. BAS reconnects to the network.
- the first BAS forms a borrowing relationship with the third BAS.
- the first BAS may send a resource request message to the third BAS, and the third BAS feeds back the remaining third BAS after receiving the resource request message Session resource situation.
- the first BAS confirms that the number of remaining session resources of the third BAS is greater than or equal to the fourth threshold
- the first BAS sends a service request message to the third BAS for requesting the third BAS to borrow session resources.
- the fourth threshold may be 30% of the total number of session resources of the third BAS.
- the third BAS may send a service response message to the first BAS, where the service response message includes the MAC address of the third BAS.
- the first BAS may encapsulate the MAC address of the third BAS in the reconnection request of the first terminal, and then send the reconnection request of the first terminal to the third BAS, so that the first terminal can access the network through the third BAS .
- the total number of session resources of the first BAS, the total number of session resources of the second BAS, and the total number of session resources of the third BAS may be the same or different, and there is no limitation here.
- the second BAS may be the master BAS of the borrowed resources determined by the first BAS
- the third BAS may be the standby BAS of the borrowed resources determined by the first BAS.
- the second BAS and the third BAS may be determined at the same time. It can be understood with reference to step 204 of the second embodiment.
- the first BAS can enable the terminal that needs to access the network to access the network through the borrowed resource standby BAS.
- the first BAS can also send resource request messages to other BAS again in the BAS pool, and select the third BAS from the BAS pool As a new borrowed resource BAS. There is no limitation on when the third BAS is determined.
- the third BAS determines that the session resources lent to the first BAS are all released, that is, when the connection request is forwarded through the first BAS, and all terminals that access the network through the third BAS disconnect the network.
- the third BAS reports to the first BAS Send the borrow release message.
- the first BAS receives the borrow release message and determines that the number of remaining session resources of the first BAS is greater than the second threshold, the first BAS releases the borrow state.
- the first BAS can send a borrow release response message to the third BAS, and the third BAS confirms that the third BAS releases the borrow after receiving the borrow release response message Status, the first BAS and the third BAS cancel the borrowing relationship.
- the first BAS receives the borrow release message and the remaining session resource quantity of the first BAS is still less than or equal to the second threshold, the first BAS receives the online request from the terminal again, the The first BAS may forward the online request to the third BAS, so that the terminal that needs to access the network accesses the network through the third BAS.
- the first BAS can enter the borrowing state again, the third BAS enters the borrowed state again, and the first BAS and the third BAS form a borrowing relationship again.
- the first BAS receives a connection request from the second terminal.
- the first BAS receives the connection request of the second terminal.
- the second terminal is a terminal in the area where the first BAS is located.
- the first BAS determines that the second terminal needs to access the network according to the connection request of the second terminal, and the second terminal is different from the first terminal.
- the first BAS sends a connection request of the second terminal to the third BAS, so that the second terminal accesses the network through the third BAS.
- step 301 when the first BAS determines that the second-level channel between the first BAS and the second BAS is not clear, the first BAS sends a connection request of the second terminal to the third BAS, so that the second terminal passes through the third BAS. Access the network.
- the first BAS will continue to send detection messages to the third BAS to monitor the communication between the first BAS and the third BAS. Whether the second floor channel is unblocked. If the second layer channel between the first BAS and the third BAS is not smooth, the first BAS borrows resources from other BAS in the resource pool. Before the first BAS sends the connection request of the second terminal to the third BAS, the first BAS needs to determine that the second layer channel between the first BAS and the third BAS is unblocked.
- the third embodiment provides a server communication method.
- the first BAS can borrow the session resources on the third BAS in the BAS pool. Enables the terminal that needs to access the network to access the network through the third BAS, so that when the second BAS cannot be borrowed, the session resource of the third BAS can be borrowed, which can provide an emergency measure in an emergency state and improve the stability of the solution .
- the first BAS can send the connection request of the terminal to the second BAS, so that the terminal that should access the network through the first BAS Access the network through the second BAS.
- terminals in the area where the second BAS is located also access the network through the second terminal.
- the session resources on the second BAS are also about to be exhausted. If the number of remaining session resources of the first BAS is still less than or equal to the second threshold, the first BAS needs to determine the fourth BAS and borrow the session resources of the fourth BAS.
- the fourth BAS can be the same as the third BAS in the third embodiment. The same or different, there is no restriction here. As shown in Figure 4, the fourth embodiment includes:
- the first BAS receives a connection request from the first terminal.
- step 101 of the first embodiment and step 205 of the second embodiment for understanding, and will not be repeated here.
- the first BAS determines that the number of remaining session resources of the first BAS is less than or equal to a first threshold.
- step 102 of the first embodiment and step 206 of the second embodiment for understanding, and will not be repeated here.
- the first BAS sends a connection request of the first terminal to the second BAS, so that the first terminal accesses the network through the second BAS.
- step 103 of Embodiment 1 and step 207 of Embodiment 2 Please refer to step 103 of Embodiment 1 and step 207 of Embodiment 2 for understanding of this step, and will not be repeated here.
- the first BAS receives a resource warning message from the second BAS, where the resource warning message is used to indicate that the remaining session resource quantity of the second BAS is less than a third threshold.
- the first BAS receives a resource warning message from the second BAS, and the resource warning message may indicate that the remaining session resource quantity of the second BAS is less than the third threshold.
- the second BAS can send the resource alarm message to all BAS in the BAS pool.
- the first BAS has a borrowing relationship with the second BAS. After the first BAS receives the resource alarm message, it needs to borrow Session resources of other BAS in the BAS pool. After receiving the resource alarm message, the BAS that has no borrowing relationship with the second BAS may mark the second BAS as an unborrowable BAS.
- the first BAS receives a connection request from the third terminal.
- the first BAS receives the connection request of the third terminal.
- the third terminal is a terminal in the area where the first BAS is located.
- the first BAS determines that the third terminal has a need to access the network according to the connection request of the third terminal.
- the first BAS sends a connection request of the third terminal to the fourth BAS, so that the third terminal accesses the network through the fourth BAS.
- the first BAS determines, according to the resource alarm message sent by the second BAS, that the remaining session resource quantity of the second BAS is less than the third threshold.
- the first BAS sends a connection request of the third terminal to the fourth BAS, so that the third terminal accesses the network through the fourth BAS.
- the first BAS forms a borrowing relationship with the fourth BAS, and the first BAS may have a borrowing relationship with multiple BAS in the BAS pool.
- the borrowing relationship of the first BAS, the second BAS, and the fourth BAS can exist simultaneously.
- connection request is forwarded through the first BAS, and then the uplink and downlink traffic of terminals that access the network through other BASs in the BAS pool are forwarded on the first BAS.
- the connection request is forwarded through the first BAS, and the upstream and downstream traffic generated by the terminal that goes online through the second BAS is forwarded in the first BAS; the connection request is forwarded through the first BAS, and then the upstream and downstream traffic generated by the terminal that goes online through the fourth BAS is also Forward in the first BAS.
- step 103 of the first embodiment for understanding, and will not be repeated here.
- the first BAS may send a resource request message to the fourth BAS, and the fourth BAS feeds back the remaining fourth BAS after receiving the resource request message Session resource situation.
- the first BAS confirms that the number of remaining session resources of the fourth BAS is greater than the fifth threshold
- the first BAS sends a service request message to the fourth BAS for requesting the fourth BAS to borrow session resources.
- the fifth threshold may be 30% of the total number of session resources of the third BAS.
- the fourth BAS may send a service response message to the first BAS, where the service response message includes the MAC address of the fourth BAS.
- the first BAS may encapsulate the MAC address of the fourth BAS in the connection request of the third terminal, and then send the connection request of the third terminal to the fourth BAS, so that the third terminal accesses the network through the fourth BAS.
- the second BAS may be the master BAS of the borrowed resource determined by the first BAS
- the fourth BAS may be the standby BAS of the borrowed resource determined by the first BAS. It can be understood with reference to step 204 of the second embodiment.
- the first BAS can borrow the borrowed resource to prepare the session resource of the BAS.
- the fourth BAS may also be a borrowed resource BAS selected in the BAS pool through a resource request when the first BAS determines that the session resources of the second BAS are about to be exhausted. It is not limited here when the fourth BAS is determined.
- the fourth BAS determines that the session resources lent to the first BAS are all released, that is, when the first BAS forwards the connection request, and all the terminals that access the network through the fourth BAS disconnect the network, the fourth BAS sends the first BAS to the first BAS. Send the borrow release message.
- the first BAS receives the borrow release message and determines that the number of remaining session resources of the first BAS is greater than the second threshold, the first BAS releases the borrow state.
- the first BAS can send a borrowing release response message to the fourth BAS.
- the fourth BAS confirms that the fourth BAS is released. In the borrowing state, the borrowing relationship between the first BAS and the fourth BAS is cancelled.
- the first BAS may forward the connection request to the fourth BAS, so that the terminal that needs to access the network accesses the network through the fourth BAS.
- the first BAS can enter the borrowed state again, the fourth BAS enters the borrowed state again, and the first BAS and the fourth BAS form a borrowing relationship again.
- the session resources on the second BAS are about to be exhausted. If the number of remaining session resources of the first BAS is still less than or equal to the second threshold, the first BAS needs to determine the fourth BAS and borrow the session resources of the fourth BAS. In this way, when the resources of the second BAS are about to be exhausted, the first BAS can continue to borrow session resources from the fourth BAS, which can enhance the integrity and flexibility of the solution.
- the fifth embodiment provides a broadband access server 50.
- the broadband access server 50 is the first BAS in the first to fourth embodiments.
- the second broadband access server 50 may include:
- the receiving unit 501 is configured to receive a connection request from the first terminal, and the first BAS is any BAS in the BAS pool. It can be understood with reference to step 101 of the first embodiment, step 205 of the second embodiment, and step 401 of the fourth embodiment, and will not be repeated here.
- the receiving unit 501 is further configured to receive the remaining session resource quantity of the second BAS from the second BAS. It can be understood with reference to step 203 in the second embodiment, which will not be repeated here.
- the receiving unit 501 is also configured to receive a reconnection request from the first terminal. It can be understood with reference to step 302 of the third embodiment, which will not be repeated here.
- the receiving unit 501 is further configured to receive the connection request from the second terminal after the processing unit 502 determines that the layer 2 channel between the first BAS and the second BAS is not clear.
- the second terminal is different from the first terminal. It can be understood with reference to step 304 in the third embodiment, which will not be repeated here.
- the receiving unit 501 is further configured to receive a resource alarm message from the second BAS, and the resource alarm message is used to indicate that the remaining number of session resources of the second BAS is less than the third threshold; it can be understood with reference to step 404 of the fourth embodiment. I won't repeat it here.
- the receiving unit 501 is also configured to receive a connection request from the third terminal. It can be understood with reference to step 405 in the fourth embodiment, which will not be repeated here.
- the receiving unit 501 is also configured to receive uplink traffic from the first terminal. It can be understood with reference to step 103 in the first embodiment, which will not be repeated here.
- the receiving unit 501 is also used to receive downlink traffic from the second BAS. It can be understood with reference to step 103 in the first embodiment, which will not be repeated here.
- the processing unit 502 is configured to determine that the number of remaining session resources of the first BAS is less than or equal to a first threshold. It can be understood with reference to step 102 of the first embodiment, step 206 of the second embodiment, and step 402 of the fourth embodiment, which will not be repeated here.
- the processing unit 502 is further configured to determine that the number of remaining session resources of the first BAS is less than or equal to the second threshold before the sending unit 503 sends the connection request of the first terminal to the second BAS. It can be understood with reference to step 201 in the second embodiment, which will not be repeated here.
- the processing unit 502 is further configured to determine that the number of remaining session resources of the second BAS is greater than or equal to the third threshold. It can be understood with reference to step 204 of the second embodiment, which will not be repeated here.
- the processing unit 502 is also used to determine that the second layer channel between the first BAS and the second BAS is not clear. It can be understood with reference to step 301 of the third embodiment, which will not be repeated here.
- the sending unit 503 is configured to send a connection request of the first terminal to the second BAS when the processing unit 502 determines that the number of remaining session resources of the first BAS is less than or equal to the first threshold, so that the first terminal accesses the network through the second BAS
- the second BAS is determined by the first BAS through the BAS pool communication protocol, and the second BAS is a BAS in the BAS pool that is different from the first BAS. It can be understood with reference to step 103 of the first embodiment, step 207 of the second embodiment, and step 403 of the fourth embodiment, and will not be repeated here.
- the sending unit 503 is further configured to send a resource request report to at least one BAS in the BAS pool except the first BAS in the BAS pool according to the BAS pool communication protocol when the processing unit 502 determines that the number of remaining session resources in the first BAS is less than or equal to the second threshold.
- at least one BAS includes a second BAS, and the resource request message is used to instruct the second BAS to send the remaining session resource quantity of the second BAS to the first BAS. It can be understood with reference to step 202 of the second embodiment, which will not be repeated here.
- the sending unit 503 is further configured to send a reconnection request of the first terminal to the third BAS, so that the first terminal accesses the network through the third BAS, and the third BAS is a BAS different from the second BAS among the at least one BAS,
- the third BAS is determined by the first BAS through the BAS pool communication protocol, and the number of remaining session resources of the third BAS is greater than or equal to the fourth threshold. It can be understood with reference to step 303 of the third embodiment, which will not be repeated here.
- the sending unit 503 is further configured to send a detection message to the second BAS before the sending unit 503 sends the reconnection request of the first terminal to the third BAS, and the detection message is used to instruct the second BAS to send a response message to the sending unit
- the response message is used by the first BAS to determine whether the layer 2 channel between the first BAS and the second BAS is unblocked. It can be understood with reference to step 301 in the third embodiment, which will not be repeated here.
- the sending unit 503 is further configured to send a connection request of the second terminal to the third BAS, so that the second terminal accesses the network through the third BAS. It can be understood with reference to step 305 in the third embodiment, which will not be repeated here.
- the sending unit 503 is further configured to send a connection request of the third terminal to the fourth BAS, so that the third terminal accesses the network through the fourth BAS.
- the fourth BAS is a BAS different from the second BAS among the at least one BAS.
- the address of the fourth BAS is obtained by the first BAS through the BAS pool communication protocol, and the number of remaining session resources of the fourth BAS is greater than or equal to the fifth threshold. It can be understood with reference to step 406 in the fourth embodiment, which will not be repeated here.
- the sending unit 503 is also used to send uplink traffic to the second BAS. It can be understood with reference to step 103 in the first embodiment, which will not be repeated here.
- the sending unit 503 is also used to send downlink traffic to the first terminal. It can be understood with reference to step 103 in the first embodiment, which will not be repeated here.
- the sixth embodiment provides a broadband access server 60.
- the broadband access server 60 may be the first BAS in the first to fourth embodiments.
- the broadband access server 60 includes a processor 601 and a memory 602. And the transceiver 603, the processor 601 is connected to the memory 602 and the transceiver 603.
- the broadband access server 60 is a device with a hardware structure and can be used to implement the functional modules in the first BAS described in FIG. 5.
- the processing unit 502 shown in FIG. 5 can be implemented by the processor 601 calling codes in the memory 602, and the receiving unit 501 and the sending unit 503 in Figure 5 can be implemented by the transceiver 603. .
- the foregoing processor 601 may be one or more central processing units (CPU), microprocessors, application-specific integrated circuits (ASICs), or one or more The integrated circuit that controls the execution of the program of this application.
- CPU central processing units
- ASICs application-specific integrated circuits
- the memory 602 is used to store program instructions, and the processor 601 is used to execute the program instructions stored in the memory 602, so that the broadband access server performs the following processing:
- step 102 of the first embodiment it is determined that the number of remaining session resources of the first BAS is less than or equal to the first threshold. It can be understood with reference to step 102 of the first embodiment, step 206 of the second embodiment, and step 402 of the fourth embodiment, which will not be repeated here.
- the transceiver 603 Before the transceiver 603 sends the connection request of the first terminal to the second BAS, it is determined that the number of remaining session resources of the first BAS is less than or equal to the second threshold. It can be understood with reference to step 201 in the second embodiment, which will not be repeated here.
- the number of remaining session resources of the second BAS is greater than or equal to the third threshold. It can be understood with reference to step 204 of the second embodiment, which will not be repeated here.
- the memory 602, the processor 601, and the transceiver 603 are connected to each other through a bus 604; the bus 604 may be a peripheral component interconnect standard (PCI) bus or an extended industry standard architecture (EISA) bus Wait.
- PCI peripheral component interconnect standard
- EISA extended industry standard architecture
- the bus can be divided into address bus, data bus, control bus, etc.
- the transceiver 603 can both receive and send messages.
- the transceiver 603 can be understood with reference to the receiving unit 501 and the sending unit 503 in the fifth embodiment.
- the transceiver 603 can be used to perform the following steps:
- the first BAS is any BAS in the BAS pool. It can be understood with reference to step 101 of the first embodiment, step 205 of the second embodiment, and step 401 of the fourth embodiment, and will not be repeated here.
- a reconnection request is received from the first terminal. It can be understood with reference to step 302 of the third embodiment, which will not be repeated here.
- the processor 601 After the processor 601 determines that the Layer 2 channel between the first BAS and the second BAS is not clear, it receives a connection request from the second terminal, and the second terminal is different from the first terminal. It can be understood with reference to step 304 in the third embodiment, which will not be repeated here.
- a resource alarm message is received from the second BAS.
- the resource alarm message is used to indicate that the remaining number of session resources of the second BAS is less than the third threshold; it can be understood with reference to step 404 of the fourth embodiment, and will not be repeated here.
- the processor 601 determines that the number of remaining session resources of the first BAS is less than or equal to the first threshold, it sends a connection request of the first terminal to the second BAS so that the first terminal accesses the network through the second BAS, and the second BAS is the first A BAS is determined by the BAS pool communication protocol, and the second BAS is a BAS in the BAS pool that is different from the first BAS. It can be understood with reference to step 103 of the first embodiment, step 207 of the second embodiment, and step 403 of the fourth embodiment, and will not be repeated here.
- the processor 601 determines that the number of remaining session resources of the first BAS is less than or equal to the second threshold, it sends a resource request message to at least one BAS in the BAS pool except the first BAS according to the BAS pool communication protocol, and at least one BAS includes the second BAS, the resource request message is used to instruct the second BAS to send the remaining session resource quantity of the second BAS to the first BAS. It can be understood with reference to step 202 of the second embodiment, which will not be repeated here.
- the third BAS is a BAS different from the second BAS among the at least one BAS, and the third BAS is the first BAS through As determined by the BAS pool communication protocol, the number of remaining session resources of the third BAS is greater than or equal to the fourth threshold. It can be understood with reference to step 303 of the third embodiment, which will not be repeated here.
- the probe message Before sending the reconnection request of the first terminal to the third BAS, send a probe message to the second BAS, the probe message is used to instruct the second BAS to send a response message to the sending unit, and the response message is for the first BAS Determine whether the second-level channel between the first BAS and the second BAS is unblocked. It can be understood with reference to step 301 in the third embodiment, which will not be repeated here.
- the fourth BAS is a BAS different from the second BAS among the at least one BAS, and the address of the fourth BAS is the first BAS Obtained through the BAS pool communication protocol, the number of remaining session resources of the fourth BAS is greater than or equal to the fifth threshold. It can be understood with reference to step 406 in the fourth embodiment, which will not be repeated here.
- the seventh embodiment provides a system 70.
- the system 70 may be the BAS pool described in the first to fourth embodiments, and the BAS pool includes at least two BASs, the first BAS701 and the second BAS702. Any two BASs in the system 70 can communicate with each other through a Layer 2 channel.
- the first BAS701 determines that the number of remaining session resources of the first BAS is less than or equal to the first threshold, it can send a connection request of the first terminal to the second BAS so that the first terminal can access the network through the second BAS.
- the first example is for understanding, so I won’t repeat it here.
Abstract
Description
Claims (21)
- 一种服务器通信方法,其特征在于,所述方法包括:第一宽带接入服务器BAS接收第一终端的连接请求,所述第一BAS为BAS池内的任意一个BAS;当所述第一BAS确定所述第一BAS剩余的会话资源数量小于或等于第一阈值且第二BAS剩余的会话资源数量大于或等于第三阈值时,所述第一BAS向所述第二BAS发送所述第一终端的连接请求,使得所述第一终端通过所述第二BAS接入网络,所述第二BAS是所述第一BAS通过BAS池通信协议确定的,所述第二BAS为所述BAS池内不同于所述第一BAS的一个BAS。
- 根据权利要求1所述的服务器通信方法,其特征在于,在所述第一BAS向第二BAS发送所述第一终端的连接请求之前,所述方法还包括:当所述第一BAS剩余的会话资源数量小于或等于第二阈值时,所述第一BAS根据所述BAS池通信协议向所述BAS池内除所述第一BAS外的至少一个BAS发送资源请求报文,所述至少一个BAS包括所述第二BAS,所述资源请求报文用于指示所述第二BAS向所述第一BAS发送所述第二BAS剩余的会话资源数量;所述第一BAS从所述第二BAS接收所述第二BAS剩余的会话资源数量。
- 根据权利要求2所述的服务器通信方法,其特征在于,在所述第一BAS向所述第二BAS发送所述第一终端的连接请求之后,所述方法还包括:所述第一BAS确定所述第一BAS与所述第二BAS之间的二层通道不通畅;当所述第一BAS接收到所述第一终端的重连接请求时,所述第一BAS向第三BAS发送所述第一终端的重连接请求,使得所述第一终端通过所述第三BAS接入网络,所述第三BAS为所述至少一个BAS中不同于所述第二BAS的一个BAS,所述第三BAS是所述第一BAS通过所述BAS池通信协议确定的,所述第三BAS剩余的会话资源数量大于或等于第四阈值。
- 根据权利要求3所述的服务器通信方法,其特征在于,在所述第一BAS确定所述第一BAS与所述第二BAS之间的二层通道不通畅之前,所述方法还包括:所述第一BAS向所述第二BAS发送探测报文,所述探测报文用于指示所述第二BAS向所述第一BAS发送响应报文,所述响应报文用于所述第一BAS判断所述第一BAS与所述第二BAS之间的所述二层通道是否通畅;所述第一BAS确定所述第一BAS与所述第二BAS之间的所述二层通道不通畅包括:若所述第一BAS在第一时间范围内未收到所述响应报文,所述第一BAS确定所述第一BAS与所述第二BAS之间的所述二层通道不通畅。
- 根据权利要求3或4所述的服务器通信方法,其特征在于,在所述第一BAS确定所述第一BAS和所述第二BAS之间的所述二层通道不通畅之后,所述方法还包括:所述第一BAS接收第二终端的连接请求,所述第二终端不同于所述第一终端;当所述第一BAS确定所述第一BAS剩余的会话资源数量小于或等于第一阈值时,所述第一BAS向所述第三BAS发送所述第二终端的连接请求,使得所述第二终端通过所述第三BAS接入网络。
- 根据权利要求2所述的服务器通信方法,其特征在于,在所述第一BAS向所述第二BAS发送所述第一终端的连接请求之后,所述方法还包括:所述第一BAS从所述第二BAS接收资源告警报文,所述资源告警报文用于指示所述第二BAS的剩余会话资源数量小于所述第三阈值;当所述第一BAS接收到第三终端的连接请求时,所述第一BAS向第四BAS发送所述第三 终端的连接请求,使得所述第三终端通过所述第四BAS接入网络,所述第四BAS为所述至少一个BAS中不同于所述第二BAS的一个BAS,所述第四BAS是所述第一BAS通过所述BAS池通信协议确定的,所述第四BAS剩余的会话资源数量大于或等于第五阈值。
- 根据权利要求2至4任一所述的服务器通信方法,其特征在于,所述方法还包括:所述第一BAS接收第四终端的连接请求;当所述第一BAS确定所述第一BAS剩余的会话数量大于所述第二阈值时,所述第一BAS确定所述第四终端通过所述第一BAS接入网络。
- 根据权利要求1或2所述的服务器通信方法,其特征在于,所述第一BAS向第二BAS发送所述第一终端的连接请求之后,所述方法还包括:所述第一BAS向所述第二BAS发送上行流量,所述上行流量是所述第一BAS从所述第一终端接收的。
- 根据权利要求1或2所述的服务器通信方法,其特征在于,所述第一BAS向第二BAS发送所述第一终端的连接请求之后,所述方法还包括:所述第一BAS向所述第一终端发送下行流量,所述下行流量是所述第一BAS从所述第二BAS接收的。
- 一种宽带接入服务器BAS,其特征在于,所述BAS为BAS池内的第一BAS,所述第一BAS包括:接收单元,用于接收第一终端的连接请求,所述第一BAS为BAS池内的任意一个BAS;处理单元,用于确定所述第一BAS剩余的会话资源数量小于或等于第一阈值且第二BAS剩余的会话资源数量大于或等于第三阈值;发送单元,用于当所述处理单元确定所述第一BAS剩余的会话资源数量小于或等于第一阈值且所述第二BAS剩余的会话资源数量大于或等于第三阈值时,向所述第二BAS发送所述第一终端的连接请求,使得所述第一终端通过所述第二BAS接入网络,所述第二BAS是所述第一BAS通过BAS池通信协议确定的,所述第二BAS为所述BAS池内不同于所述第一BAS的一个BAS。
- 根据权利要求10所述的BAS,其特征在于,所述处理单元,还用于在所述发送单元向所述第二BAS发送所述第一终端的连接请求之前,确定所述第一BAS剩余的会话资源数量小于或等于第二阈值;所述发送单元,还用于当所述处理单元确定所述第一BAS剩余的会话资源数量小于或等于第二阈值时,根据所述BAS池通信协议向所述BAS池内除所述第一BAS外的至少一个BAS发送资源请求报文,所述至少一个BAS包括所述第二BAS,所述资源请求报文用于指示所述第二BAS向所述第一BAS发送所述第二BAS剩余的会话资源数量;所述接收单元,还用于从所述第二BAS接收所述第二BAS剩余的会话资源数量。
- 根据权利要求11所述的BAS,其特征在于,所述处理单元,还用于在所述发送单元向所述第二BAS发送所述第一终端的连接请求之后,确定所述第一BAS与所述第二BAS之间的二层通道不通畅;所述接收单元,还用于从所述第一终端接收重连接请求;所述发送单元,还用于向第三BAS发送所述第一终端的重连接请求,使得所述第一终端通过所述第三BAS接入网络,所述第三BAS为所述至少一个BAS中不同于所述第二BAS的一个BAS,所述第三BAS是所述第一BAS通过所述BAS池通信协议确定的,所述第三BAS剩余的会话资源数量大于或等于第四阈值。
- 根据权利要求12所述的BAS,其特征在于,所述发送单元,还用于在所述发送单元向所述第三BAS发送所述第一终端的重连接请求之前,向所述第二BAS发送探测报文,所述探测报文用于指示所述第二BAS向所述发送单元发送响应报文,所述响应报文用于所述第一BAS判断所述第一BAS与所述第二BAS之间的所述二层通道是否通畅;所述处理单元,还用于当所述发送单元在第一时间范围内未收到所述响应报文时,确定所述第一BAS与所述第二BAS之间的所述二层通道不通畅。
- 根据权利要求12或13所述的BAS,其特征在于,所述接收单元,还用于在所述处理单元确定所述第一BAS与所述第二BAS之间的二层通道不通畅之后,接收第二终端的连接请求,所述第二终端不同于所述第一终端;所述处理单元,还用于确定所述第一BAS剩余的会话资源数量小于或等于第一阈值;所述发送单元,还用于向第三BAS发送所述第二终端的连接请求,使得第二终端通过所述第三BAS接入网络。
- 根据权利要求11所述的BAS,其特征在于,所述接收单元,还用于从所述第二BAS接收资源告警报文,所述资源告警报文用于指示所述第二BAS的剩余会话资源数量小于所述第三阈值;所述接收单元,还用于接收第三终端的连接请求;所述发送单元,还用于向第四BAS发送所述第三终端的连接请求,使得所述第三终端通过所述第四BAS接入网络,所述第四BAS为所述至少一个BAS中不同于所述第二BAS的一个BAS,所述第四BAS是所述第一BAS通过所述BAS池通信协议确定的,所述第四BAS剩余的会话资源数量大于或等于第五阈值。
- 根据权利要求11至13任一所述的BAS,其特征在于,所述接收单元,还用于接收第四终端的连接请求;所述处理单元,还用于当所述第一BAS剩余的会话数量大于所述第二阈值时,确定所述第四终端通过所述第一BAS接入网络。
- 根据权利要求10或11所述的BAS,其特征在于,所述接收单元,还用于从所述第一终端接收上行流量;所述发送单元,还用于向所述第二BAS发送所述上行流量。
- 根据权利要求10或11所述的BAS,其特征在于,所述接收单元,还用于从所述第二BAS接收下行流量;所述发送单元,还用于向所述第一终端发送所述下行流量。
- 一种系统,其特征在于,所述系统为权利要求1-9任一所述的宽带接入服务器BAS池,所述BAS池内包括权利要求1-9任一所述的第一BAS,所述BAS池中包括至少两个BAS。
- 一种宽带接入服务器BAS,其特征在于,所述BAS包括:处理器和存储器,所述存储器中存储有程序指令,所述处理器用于执行所述存储器中存储的程序指令,执行如权利要求1-9任一所述的方法。
- 一种计算机可读存储介质,包括程序指令,其特征在于,当所述程序指令在计算机设备上运行时,使得所述计算机设备执行如权利要求1-9任一所述的方法。
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
BR112022000115A BR112022000115A2 (pt) | 2019-07-16 | 2020-07-16 | Método de comunicação de servidor, servidor de acesso de banda larga, e sistema |
MX2022000617A MX2022000617A (es) | 2019-07-16 | 2020-07-16 | Metodo de comunicacion de servidor, servidor de acceso de banda ancha y sistema. |
EP20840704.9A EP3989506A4 (en) | 2019-07-16 | 2020-07-16 | SERVER COMMUNICATION METHOD, BROADBAND ACCESS SERVER AND SYSTEM |
US17/568,962 US20220141153A1 (en) | 2019-07-16 | 2022-01-05 | Server communication method, broadband access server, and system |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910641253.X | 2019-07-16 | ||
CN201910641253.XA CN110166579B (zh) | 2019-07-16 | 2019-07-16 | 一种服务器通信方法、宽带接入服务器及系统 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/568,962 Continuation US20220141153A1 (en) | 2019-07-16 | 2022-01-05 | Server communication method, broadband access server, and system |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2021008595A1 true WO2021008595A1 (zh) | 2021-01-21 |
Family
ID=67637977
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2020/102496 WO2021008595A1 (zh) | 2019-07-16 | 2020-07-16 | 一种服务器通信方法、宽带接入服务器及系统 |
Country Status (6)
Country | Link |
---|---|
US (1) | US20220141153A1 (zh) |
EP (1) | EP3989506A4 (zh) |
CN (1) | CN110166579B (zh) |
BR (1) | BR112022000115A2 (zh) |
MX (1) | MX2022000617A (zh) |
WO (1) | WO2021008595A1 (zh) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110166579B (zh) * | 2019-07-16 | 2020-01-03 | 华为技术有限公司 | 一种服务器通信方法、宽带接入服务器及系统 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102387222A (zh) * | 2011-10-19 | 2012-03-21 | 中国联合网络通信集团有限公司 | 地址分配方法、装置及系统 |
CN104901989A (zh) * | 2014-03-07 | 2015-09-09 | 中国科学院声学研究所 | 一种现场服务提供系统及方法 |
CN106936729A (zh) * | 2015-12-29 | 2017-07-07 | 中国电信股份有限公司 | 一种终端设备接入的控制方法、系统及宽带接入网系统 |
WO2018113633A1 (zh) * | 2016-12-21 | 2018-06-28 | 中兴通讯股份有限公司 | 报文转发方法、报文转发控制器、bras、计算机存储介质 |
CN110166579A (zh) * | 2019-07-16 | 2019-08-23 | 华为技术有限公司 | 一种服务器通信方法、宽带接入服务器及系统 |
Family Cites Families (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4919608B2 (ja) * | 2005-03-02 | 2012-04-18 | 株式会社日立製作所 | パケット転送装置 |
JP4680866B2 (ja) * | 2006-10-31 | 2011-05-11 | 株式会社日立製作所 | ゲートウェイ負荷分散機能を備えたパケット転送装置 |
US8639813B2 (en) * | 2008-11-25 | 2014-01-28 | Citrix Systems, Inc. | Systems and methods for GSLB based on SSL VPN users |
CN103095597B (zh) * | 2011-10-28 | 2017-04-26 | 华为技术有限公司 | 一种用于负载均衡的方法和装置 |
CN102387083B (zh) * | 2011-11-28 | 2014-11-26 | 中国联合网络通信集团有限公司 | 网络访问控制方法和系统 |
CN102523531A (zh) * | 2011-12-08 | 2012-06-27 | 深圳市同洲视讯传媒有限公司 | 视频点播系统中处理会话的接入实体及方法 |
CN103002038B (zh) * | 2012-12-13 | 2016-01-20 | 华为技术有限公司 | 弹性负载均衡的处理方法和装置 |
CN103501297B (zh) * | 2013-09-27 | 2017-03-15 | 杭州华三通信技术有限公司 | 一种门户认证方法和设备 |
CN105591891A (zh) * | 2015-09-09 | 2016-05-18 | 杭州华三通信技术有限公司 | 一种切换伪线的方法和装置 |
CN106453124A (zh) * | 2016-10-26 | 2017-02-22 | 杭州华三通信技术有限公司 | 流量调度方法及装置 |
CN106506664B (zh) * | 2016-11-18 | 2020-09-25 | 新华三技术有限公司 | 一种服务器负载均衡的方法和装置 |
CN108696370B (zh) * | 2017-04-06 | 2021-04-13 | 中国移动通信集团甘肃有限公司 | 一种服务器与业务绑定和解绑定方法、装置及系统 |
CN107493333B (zh) * | 2017-08-16 | 2020-06-12 | 山东省计算中心(国家超级计算济南中心) | 一种基于SDN的云计算环境下web系统资源管理方法及系统 |
CN108683633A (zh) * | 2018-04-10 | 2018-10-19 | 新华三技术有限公司成都分公司 | 访问控制方法及装置 |
CN110505073B (zh) * | 2018-05-16 | 2020-11-17 | 华为技术有限公司 | 一种移动边缘计算方法及装置 |
-
2019
- 2019-07-16 CN CN201910641253.XA patent/CN110166579B/zh active Active
-
2020
- 2020-07-16 BR BR112022000115A patent/BR112022000115A2/pt unknown
- 2020-07-16 MX MX2022000617A patent/MX2022000617A/es unknown
- 2020-07-16 WO PCT/CN2020/102496 patent/WO2021008595A1/zh unknown
- 2020-07-16 EP EP20840704.9A patent/EP3989506A4/en active Pending
-
2022
- 2022-01-05 US US17/568,962 patent/US20220141153A1/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102387222A (zh) * | 2011-10-19 | 2012-03-21 | 中国联合网络通信集团有限公司 | 地址分配方法、装置及系统 |
CN104901989A (zh) * | 2014-03-07 | 2015-09-09 | 中国科学院声学研究所 | 一种现场服务提供系统及方法 |
CN106936729A (zh) * | 2015-12-29 | 2017-07-07 | 中国电信股份有限公司 | 一种终端设备接入的控制方法、系统及宽带接入网系统 |
WO2018113633A1 (zh) * | 2016-12-21 | 2018-06-28 | 中兴通讯股份有限公司 | 报文转发方法、报文转发控制器、bras、计算机存储介质 |
CN110166579A (zh) * | 2019-07-16 | 2019-08-23 | 华为技术有限公司 | 一种服务器通信方法、宽带接入服务器及系统 |
Also Published As
Publication number | Publication date |
---|---|
EP3989506A4 (en) | 2022-07-27 |
EP3989506A1 (en) | 2022-04-27 |
BR112022000115A2 (pt) | 2022-05-10 |
CN110166579B (zh) | 2020-01-03 |
CN110166579A (zh) | 2019-08-23 |
US20220141153A1 (en) | 2022-05-05 |
MX2022000617A (es) | 2022-03-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8300646B2 (en) | Message handling in a local area network having redundant paths | |
US5546540A (en) | Automatic topology monitor for multi-segment local area network | |
JP2008539631A (ja) | パワー・オーバ・イーサネット(登録商標)管理装置及びイーサネット(登録商標)装置間の接続 | |
US10516599B1 (en) | Link priority for loop-protect | |
US9985928B2 (en) | Dynamic link aggregation | |
JP6377565B2 (ja) | ワイヤレス通信環境において送信する複数のアクセス端末ための分散チャネルアクセスを可能にすること | |
CN111682989B (zh) | 一种端口链路状态的检测方法、设备及系统 | |
WO2021109726A1 (zh) | 一种带宽限制方法、装置及系统 | |
EP2218214B1 (en) | Network location service | |
CN109218456A (zh) | Mac地址表的老化时间的处理方法及装置 | |
JP2007004361A (ja) | 負荷分散装置 | |
WO2021008595A1 (zh) | 一种服务器通信方法、宽带接入服务器及系统 | |
CN107659464A (zh) | 一种路由器实现流量监控的方法及系统 | |
CN107645517A (zh) | 数据推送方法及装置 | |
US20190349436A1 (en) | Methods, apparatus and systems for resuming transmission link | |
WO2017041577A1 (zh) | 一种管理链路聚合成员端口丢包的方法和装置 | |
WO2018024200A1 (zh) | 虚拟桌面组播控制方法、终端、代理终端及云桌面服务器 | |
WO2013159492A1 (zh) | 信息上报与下载的方法及系统 | |
US9705809B2 (en) | Method and device for adjusting rate of data transmission in Ethernet | |
WO2019005741A1 (en) | SYSTEMS AND METHODS FOR ENABLING THE MULTICAST DOMAIN NAMES SYSTEM | |
WO2015024523A1 (zh) | 确定ip承载网故障的方法和系统 | |
US7870285B2 (en) | Mitigating subscriber side attacks in a cable network | |
JP2005102104A (ja) | Ipマルチキャスト配信システムとそのレート制御方法、およびそのプログラムと記録媒体 | |
US10652200B2 (en) | Systems and methods for multicast domain name system redundant query suppression | |
CN103501272B (zh) | 一种组播流量转发方法及设备 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20840704 Country of ref document: EP Kind code of ref document: A1 |
|
REG | Reference to national code |
Ref country code: BR Ref legal event code: B01A Ref document number: 112022000115 Country of ref document: BR |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 2020840704 Country of ref document: EP Effective date: 20220118 |
|
REG | Reference to national code |
Ref country code: BR Ref legal event code: B01E Ref document number: 112022000115 Country of ref document: BR Free format text: APRESENTAR A TRADUCAO SIMPLES DA FOLHA DE ROSTO DA CERTIDAO DE DEPOSITO DA PRIORIDADE CN 201910641253.X OU DECLARACAO CONTENDO, OBRIGATORIAMENTE, TODOS OS DADOS IDENTIFICADORES DESTA CONFORME O ART. 15 DA PORTARIA 39/2021. O DOCUMENTO APRESENTADO NAO ESTA TRADUZIDO. |
|
ENP | Entry into the national phase |
Ref document number: 112022000115 Country of ref document: BR Kind code of ref document: A2 Effective date: 20220104 |