WO2021037133A1 - 一种网络管理的方法及设备 - Google Patents

一种网络管理的方法及设备 Download PDF

Info

Publication number
WO2021037133A1
WO2021037133A1 PCT/CN2020/111700 CN2020111700W WO2021037133A1 WO 2021037133 A1 WO2021037133 A1 WO 2021037133A1 CN 2020111700 W CN2020111700 W CN 2020111700W WO 2021037133 A1 WO2021037133 A1 WO 2021037133A1
Authority
WO
WIPO (PCT)
Prior art keywords
network
structured
online
control device
network element
Prior art date
Application number
PCT/CN2020/111700
Other languages
English (en)
French (fr)
Inventor
刘金亮
曾昕宗
于凤青
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to EP20856647.1A priority Critical patent/EP3993322A4/en
Publication of WO2021037133A1 publication Critical patent/WO2021037133A1/zh
Priority to US17/579,973 priority patent/US11824709B2/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0876Aspects of the degree of configuration automation
    • H04L41/0886Fully automatic configuration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0806Configuration setting for initial configuration or provisioning, e.g. plug-and-play
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/04Network management architectures or arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0813Configuration setting characterised by the conditions triggering a change of settings
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/084Configuration by using pre-existing information, e.g. using templates or copying from other elements
    • H04L41/0843Configuration by using pre-existing information, e.g. using templates or copying from other elements based on generic templates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/02Topology update or discovery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/12Shortest path evaluation
    • H04L45/123Evaluation of link metrics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/24Multipath
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/302Route determination based on requested QoS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/64Routing or path finding of packets in data switching networks using an overlay routing layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/50Address allocation
    • H04L61/5007Internet protocol [IP] addresses
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/085Retrieval of network configuration; Tracking network configuration history
    • H04L41/0853Retrieval of network configuration; Tracking network configuration history by actively collecting configuration information or by backing up configuration information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0895Configuration of virtualised networks or elements, e.g. virtualised network function or OpenFlow elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/12Discovery or management of network topologies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • H04L41/145Network analysis or design involving simulating, designing, planning or modelling of a network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/40Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using virtualisation of network functions or resources, e.g. SDN or NFV entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/50Network service management, e.g. ensuring proper service fulfilment according to agreements
    • H04L41/5003Managing SLA; Interaction between SLA and QoS
    • H04L41/5019Ensuring fulfilment of SLA
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/50Network service management, e.g. ensuring proper service fulfilment according to agreements
    • H04L41/5003Managing SLA; Interaction between SLA and QoS
    • H04L41/5019Ensuring fulfilment of SLA
    • H04L41/5022Ensuring fulfilment of SLA by giving priorities, e.g. assigning classes of service

Definitions

  • This application relates to the field of communication technology, and specifically relates to a method and equipment for network management.
  • the embodiment of the present application provides a network management method, which can perform automated online management of devices in the network based on the structured plane of the network.
  • the embodiments of the present application also provide corresponding control equipment.
  • the first aspect of the present application provides a network management method, which may include: a control device receives information about device online, the device online information includes location information of the online device, and the control device determines the online device according to the location information of the online device.
  • the device belongs to or accesses the first structured plane of the network topology within the scope of the network managed by the control device, and the network topology is planned as at least one structured plane (fabric plane), wherein the first structured plane is associated with The forwarding resources are isolated from the forwarding resources outside the first structured plane.
  • the control device determines the configuration information of the online device according to the first structured plane.
  • the control device determines the configuration information of the online device according to the location information of the online device.
  • the control device sends the configuration information to the online device, where the configuration information is used for the online device to perform automated online configuration.
  • the network range managed by the control device may be a province or a city, and usually refers to a network within a certain physical range.
  • the forwarding resources managed by the structured plane are separated from the forwarding resources outside the structured plane to avoid business crossover, so that one network can be effectively used for multiple purposes.
  • the location information may be the interface information of other devices accessed by the online device, or other information that can express the location of the online device.
  • the control device can determine configuration information for the online device, and the configuration information is used for the automatic online configuration of the online device, thereby realizing the automatic management of the online device. Improve the efficiency of network management.
  • the first structured plane when the first structured plane belongs to the bearer network, the first structured plane includes a convergence type of fabric area and an access type structure When the first structured plane belongs to a single-layer network, the first structured plane includes a default type of structured area; when the first structured plane belongs to a data center (DC) network When the first structured plane includes a structured area of the DC type; when the first structured plane belongs to a cloud-network co-managed network, the type of the structured area includes a structured area of a convergence type, an access Type of structured area and DC type of structured area.
  • DC data center
  • the cloud-network co-managed network can be understood as a combination of a bearer network and a DC network.
  • the types of structured areas contained in the structured planes of networks of different structures are different, so that it can be ensured that networks of various structures have appropriate structured areas to realize automated management.
  • the method may further include: the control device obtains template filtering information; the above steps: the control device determines the configuration information of the online device according to the first structured plane, which may include: the control device according to the first structured plane
  • the location information of an access device determines the first structured area of the access type to which the first access device belongs, and the role of the first access device in the first structured area.
  • the control device determines the online parameter template of the first access device and preset network element login parameters according to the template filtering information.
  • the control device allocates the interior gateway protocol (IGP) process number of the first access device and the link internet protocol (internet protocol) of the first access device according to the first structured area. IP) address, the identifier of the first access device, or the name of the first access device, wherein all devices included in the first structured area belong to the same IGP domain.
  • the control device sets the preset network element login parameters, the role of the first access device, the IGP process number, the link IP address of the first access device, and the first access device
  • the identification of the device or the name of the first access device is filled in the online parameter template to obtain configuration information for the online of the first access device.
  • the template filtering information can be public network information or private network information, and each template filtering information corresponds to an online parameter template.
  • the preset network element login parameters can be user name and password.
  • the identifier of the first access device may also be the IP address of the first access device.
  • the IGP domain refers to an IGP range.
  • the method may further include: when the second access device in the first structured area goes offline, the control device determines to change the configuration information of the network element, and
  • the changed network element is a network element whose configuration information changes due to the offline of the second access device.
  • the control device sends the configuration change information to the change network element, where the configuration change information is used for the automatic update configuration of the change network element.
  • the device when the second access device goes offline, the device may be unplugged, the interface on the device may be broken, or the link may fail.
  • the link relationship When a device in the network goes offline, the link relationship will change, which will affect some network elements related to the second access device. In this case, it is necessary to update the configuration information of these related network elements to control The device will re-determine the changed configuration information for the update for these changed network elements, so that when the network changes, the automatic update of the device configuration and the automatic management of the network are realized.
  • the control device determines the configuration information of the online device according to the location information of the online device, which may include:
  • the control device determines configuration information according to the interface information of the third access device and the ESN of the first base station, where the configuration information includes the first base station allocated to the first base station based on the first structured plane.
  • the IP address and the first mask are the second IP address and the second mask assigned to the interface indicated by the interface information, and the first IP address and the second IP address belong to the same network segment;
  • control device sends the configuration information to the online device, where the configuration information is used for the online device to perform automatic online configuration, which may include:
  • the control device sends the ESN of the first base station, the first IP address and the first mask, the first IP address and the first mask to a dynamic host configuration protocol (DHCP) server
  • DHCP dynamic host configuration protocol
  • the first mask is transmitted by the DHCP server to the first base station through the third access device, and the first IP address and the first mask are used by the first base station for automatic online configuration;
  • the control device sends the second IP address and the second mask to the third access device, where the second IP address and the second mask are used for the third access device
  • the interface is configured to communicate with the first base station.
  • the control device when the base station is online, the control device will generate respective IP addresses and masks for the base station and the interfaces of the equipment accessed by the base station, so as to realize the communication between the base station and the bearer network, and is a virtual private network ( Virtual private network (VPN) service deployment provides protection.
  • VPN Virtual private network
  • the method may further include:
  • the control device obtains, according to the ESN of the first base station, a first available traffic model based on the first structured plane of the bearer network, where the first available traffic model includes a traffic sub-model for communication between the base station and the Internet, Network management flow sub-model and base station-base station communication flow sub-model;
  • the control device determines the functional requirements of different network elements in the first structured plane according to the first available traffic model, and determines that the first structured plane satisfies the virtual private deployment through the first base station At least one service path of the network VPN service, where different functional requirements correspond to different traffic sub-models, and each traffic sub-model corresponds to a set of configuration templates;
  • the control device determines, from the at least one service path, an optimal path that meets the service level agreement (SLA) requirement of the VPN service;
  • SLA service level agreement
  • the control device generates network element configuration information for the key network elements on the optimal path according to the functional requirements of the different network elements, and the network element configuration information includes a configuration template corresponding to the traffic submodel to which the key network element belongs ;
  • the control device sends the network element configuration information to the key network element, where the network element configuration information is used for automatic configuration of the key network element.
  • the key network elements may be the start network element and the end network element on the optimal path, or other network elements.
  • the deployment of VPN services through the base station can realize the automatic configuration of services.
  • the control device determines the configuration information of the online device according to the first structured plane, which may include:
  • the control device determines configuration information for the fourth access device according to the first structured plane, and the configuration information includes the IGP process number of the fourth access device and the chain of the fourth access device. IP address, the identifier of the fourth access device, or the name of the fourth access device.
  • control device can allocate resources to the fourth access device according to the resource pool associated with the first structured plane, thereby determining the fourth access device’s Configuration information.
  • the method may further include:
  • the control device determines to change the configuration information of the changed network element, and the changed network element generates configuration for the fifth access device to go offline Network elements whose information changes;
  • the control device sends the changed configuration information to the changed network element, where the changed configuration information is used for the automatic update configuration of the changed network element.
  • the fifth access device goes offline.
  • the device may be unplugged, the interface on the device may be broken, or the link may fail.
  • the link relationship will change, which will affect some network elements related to the fifth access device.
  • the device will re-determine the changed configuration information for the update for these changed network elements, so that when the network changes, the automatic update of the device configuration and the automatic management of the network are realized.
  • the control device determines the configuration information of the online device according to the first structured plane, which may include:
  • the control device establishes the first logical interface and the first logical interface according to the identification of the first VM and the information of the first interface, and the pre-recorded correspondence between the identification of the first VM and the first logical interface.
  • the control device determines configuration information for the first VM according to the information of the first interface, the ESN of the server where the first VM is located, the identification of the first VM, the MAC address of the first VM, and the configuration information Including the third IP address;
  • control device sends the configuration information to the online device, where the configuration information is used for the online device to perform automatic online configuration, which may include:
  • the third IP address is used for automatic online configuration of the first VM.
  • control device when it is a DC network, the control device can automatically manage the VM going online, and provide a basis for business deployment on the VM.
  • the method may further include:
  • the control device obtains a second available traffic model based on the first structured plane according to the ESN of the server where the first VM is located, and the second available traffic model includes a traffic sub-model for communication between the VM and the Internet, and The flow sub-model of VM-VM communication;
  • the control device determines the functional requirements of different network elements in the first structured plane according to the second available traffic model, and determines the number of VPN services deployed through the first VM in the first structured plane M business paths, where different functional requirements correspond to different traffic sub-models, and each traffic sub-model corresponds to a set of configuration templates, where M is an integer greater than 0;
  • the control device generates first network element configuration information for the first key network element on the first optimal path according to the functional requirements of the different network elements, and the first network element configuration information includes the first key The configuration template corresponding to the traffic sub-model to which the network element belongs;
  • the control device sends the first network element configuration information to the first key network element, where the first network element configuration information is used for the automatic configuration of the first key network element.
  • the key network elements may be the start network element and the end network element on the optimal path, or other network elements.
  • the deployment of VPN services through VM can realize the automatic configuration of services.
  • the method may further include:
  • control device When the control device acquires that the first VM is migrated to the second interface, it deletes the correspondence between the first logical interface and the first interface, and the second interface is the sixth access device or the second interface. Seven access to the interface on the device;
  • the control device determines, according to the second interface, N service paths of the VPN service deployed through the migrated first VM in the first structured plane, where different functional requirements correspond to different traffic sub-paths.
  • Model each traffic sub-model corresponds to a set of configuration templates, and the N is an integer greater than 0;
  • the control device generates second network element configuration information for the second key network element on the second optimal path according to the functional requirements of the different network elements, and the second network element configuration information includes the second key The configuration template corresponding to the traffic sub-model to which the network element belongs;
  • the control device sends the second network element configuration information to the second key network element, where the first network element configuration information is used for the automatic configuration of the first key network element.
  • the services deployed on the VM are also migrated at any time.
  • the method may further include:
  • the control device also obtains the service level agreement SLA requirements of the business
  • the control device determines at least one structured plane according to the requirements of the SLA, where different SLA requirements correspond to different structured planes.
  • the method may further include:
  • the control device obtains first intent information corresponding to a first structured plane, where the first intent information includes information about a pair of core aggregation network elements in the first structured plane and information about the one core aggregation network element.
  • a first interior gateway protocol IGP process identifier where the first structured plane is any one of the at least one structured plane;
  • the control device searches for a network in the same IGP domain as the first IGP process identifier, starting from the pair of core aggregation network elements in the first structured plane, according to the information of the pair of core aggregation network elements.
  • the control device determines at least one structured area of the access type according to the structured area of the convergence type.
  • control device determining at least one access type structured area according to the convergence type structured area may include:
  • the control device determines the role of each network element in the structured area of the convergence type
  • the control device deducts links in the structured area of the convergence type in the first structured plane to obtain at least one subgraph that is not connected to each other;
  • For each disconnected subgraph start from the first network element in the structured area of the aggregation type to search for network elements and links in the same IGP domain as the second IGP process identifier to obtain at least one connection Entry type structured area, where the first network element and link, and the network elements and links in the same IGP domain as the second IGP process identifier form a connected sub-graph, and different sub-graphs that are not connected to each other
  • the IGP domains of the structured areas of the access type formed are different, and the first network element is a network element of any access role with a connection edge number greater than 2.
  • the control device determining at least one access type structured area according to the convergence type structured area includes:
  • the control device determines the role of each network element in the structured area of the convergence type
  • the control device acquires second intent information of the structured area of the convergence type, where the second intent information includes information of at least one pair of network elements with access roles in the structured area of the convergence type and information related to each network element.
  • IGP process ID corresponding to the network element of the access role;
  • the control device searches the network element of the first pair of access roles starting from the network element of the first pair of access roles in the first structured plane.
  • the third IGP process identifier corresponding to the element is a network element and link in the same IGP domain to determine the structured area of the access type corresponding to the third IGP process identifier.
  • the network element is any pair of the at least one pair of network elements with access roles, and the IGP process identifiers corresponding to the network elements of each pair of access roles are different.
  • a second aspect of the present application provides a control device, which is used to execute the foregoing first aspect or any possible implementation of the first aspect.
  • the control device includes a module or unit for executing the above-mentioned first aspect or any possible implementation of the first aspect.
  • the third aspect of the present application provides a control device, including: at least one processor, a memory, a transceiver, and computer-executable instructions stored in the memory and running on the processor.
  • a control device including: at least one processor, a memory, a transceiver, and computer-executable instructions stored in the memory and running on the processor.
  • the processor executes the method described in the foregoing first aspect or any one of the possible implementation manners of the first aspect.
  • the fourth aspect of the present application provides a computer-readable storage medium storing one or more computer-executable instructions.
  • the processor executes any of the above-mentioned first aspect or the first aspect.
  • One possible implementation is the method described.
  • the fifth aspect of the present application provides a computer program product storing one or more computer-executable instructions.
  • the processor executes any one of the first aspect or the first aspect. A possible way to achieve this.
  • control device described in the second aspect to the fifth aspect may also be a chip applied to the control device, or other combination devices, components, etc. having the functions of the control device.
  • the technical effects brought by the second aspect to the fifth aspect or any one of the possible implementation manners may refer to the technical effects brought about by the first aspect or the different possible implementation manners of the first aspect, and details are not described herein again.
  • Fig. 1 is a schematic diagram of an embodiment of a network management system in an embodiment of the present application
  • Fig. 2 is a schematic diagram of an example of a structured plane in an embodiment of the present application.
  • FIG. 3 is a schematic diagram of an example of a structured area of a bearer network in an embodiment of the present application
  • FIG. 4 is a schematic diagram of another example of a structured area of a bearer network in an embodiment of the present application.
  • FIG. 5 is a schematic diagram of another example of a structured area of a bearer network in an embodiment of the present application.
  • FIG. 6 is a schematic diagram of an example of a structured area of a default type in an embodiment of the present application.
  • FIG. 7 is a schematic diagram of an example of a structured area of a data center type in an embodiment of the present application.
  • FIG. 8 is a schematic diagram of an example of a structured area co-managed by a cloud network in an embodiment of the present application.
  • FIG. 9 is a schematic diagram of an example of determining an access type structured area in an embodiment of the present application.
  • FIG. 10 is a schematic diagram of another example of determining a structured area of an access type in an embodiment of the present application.
  • FIG. 11 is a schematic diagram of an embodiment of network management in an embodiment of the present application.
  • FIG. 12 is a schematic diagram of another embodiment of network management in an embodiment of the present application.
  • FIG. 13 is a schematic diagram of another embodiment of network management in an embodiment of the present application.
  • FIG. 14 is a schematic diagram of another embodiment of network management in an embodiment of the present application.
  • FIG. 14A is a schematic diagram of a first-class quantum model in an embodiment of the present application.
  • FIG. 14B is a schematic diagram of another traffic sub-model in an embodiment of the present application.
  • 14C is a schematic diagram of another traffic sub-model in an embodiment of the present application.
  • FIG. 14D is a schematic diagram of an available flow model in an embodiment of the present application.
  • FIG. 15 is a schematic diagram of an example of a path in an embodiment of the present application.
  • FIG. 16 is a schematic diagram of another embodiment of network management in an embodiment of the present application.
  • FIG. 17 is a schematic diagram of an example of a single-layer network in an embodiment of the present application.
  • FIG. 18 is a schematic diagram of another embodiment of network management in an embodiment of the present application.
  • FIG. 19 is a schematic diagram of an example of a DC network in an embodiment of the present application.
  • FIG. 20 is a schematic diagram of another embodiment of network management in an embodiment of the present application.
  • Figure 21 is a schematic diagram of an embodiment of a control device in an embodiment of the present application.
  • Fig. 22 is a schematic diagram of another embodiment of a control device in an embodiment of the present application.
  • the embodiments of the present application provide a network management method according to the embodiments of the present application, which can perform automated online management of devices and services in the network based on the structured plane of the network.
  • the embodiments of the present application also provide corresponding control equipment. Detailed descriptions are given below.
  • the network in order to manage the network more automatically, the network may be divided into different fabric planes.
  • Each structured plane can be divided into multiple different structured areas (fabric areas) based on a pre-planned network hierarchical structure.
  • the task of network management is performed by the control device.
  • the control device manages the network within a certain range.
  • a control device is configured in a province, and the control device manages the network of the province.
  • the control device obtains the network topology and the pre-planned network hierarchical structure within the scope of the managed network; the control device determines at least one structured plane for the network topology, wherein different structured planes The associated network resources are different, and the forwarding resources in different structured planes are isolated. Even if there are other resources in the network that are not divided into structured planes, the structured plane is also isolated from resources that are not divided into structured planes. In view of this division of structured planes, there is no intersection between the structured planes, which can effectively realize multiple uses in one network.
  • the structured plane is a collection of a group of network elements and links, and the network configuration resource pool bound to the collection is called a structured plane.
  • the network elements and links in a structured plane form a connected graph.
  • a network topology can be divided into one or more structured planes, and each structured plane can define different device ranges, interface resources, etc.
  • control device may determine at least one type of structured area (fabric area) according to the pre-divided network layered structure.
  • a structured area In a structured plane, a group of network elements and links that provide a certain abstract network capability is called a structured area.
  • the network elements and links of a structured area are connected subgraphs in the structured plane to which they belong.
  • the structured area provides an abstract network function, which is an assurance of the structured area to its own forwarding capability. For users of abstract network functions, they no longer need to pay attention to the connection mode and topological structure within the structured area.
  • the control device can obtain the network topology formed by the network elements and links as shown in FIG. 1.
  • the network topology is a network topology of the bearer network.
  • the network topology in the embodiment of the present application is not limited to the network of the bearer network.
  • the topology can also be other types of network topologies, such as a single-layer network topology or a data center network topology.
  • the control device can divide the network topology shown in FIG. 1 into multiple structured planes that are logically isolated from each other. For example, the control device may divide the network topology described in FIG. 1 into two different structured planes, Fabric Plane M and Fabric Plane N, shown in FIG. 2.
  • the control device can flexibly define the set of network elements contained in each structured plane.
  • the Fabric Plane N in Figure 2 contains all the network elements in the network topology shown in Figure 1, and the Fabric Plane M does not include the cell site gateway (CSG) 1 and CSG2 of the network element.
  • CSG cell site gateway
  • the network element CSG4 in Figure 2 belongs to both Fabric Plane M and Fabric Plane N.
  • the two structured planes, Fabric Plane M and Fabric Plane N, are associated with different network resources, and the forwarding resources in the different structured planes are isolated.
  • the base stations connected to the same fabric plane communicate with each other and use forwarding resources in the fabric plane, such as: sub-interface collection, network fragmentation, link bandwidth, virtual private network (virtual private network, VPN) instances, etc.
  • forwarding resources in the fabric plane such as: sub-interface collection, network fragmentation, link bandwidth, virtual private network (virtual private network, VPN) instances, etc.
  • the intercommunication between two base stations connected between different Fabric planes can only be accomplished through third-party forwarding.
  • the intercommunication between base station 1 and base station 3 needs to be forwarded through the new generation core (NGC), although the base station is physically Both 1 and base station 3 access the network through CSG3.
  • NTC new generation core
  • a Fabric plane can carry one or more VPN services.
  • similar services are deployed in a Fabric plane as much as possible. That is, in the same network, by dividing different fabric planes, services required by different service level agreements (SLA) can use different link forwarding resources and different network bearer technologies.
  • SLA service level agreements
  • the control device Before determining the structured plane, the control device also obtains the service level agreement SLA requirement of the service; and then determines at least one structured plane according to the SLA requirement, where different SLA requirements correspond to different structured planes.
  • SLA service level agreements
  • the structured plane it is not limited to the method of SLA requirements, and the structured plane can also be determined according to other requirements or rules.
  • Fabric area planning can be further done, and a Fabric plane can include at least one Fabric area.
  • Fabric Area 0, Fabric Area 1, and Fabric Area 2 shown in the structured area schematic diagram shown in FIG. 3 are three different Fabric areas.
  • the control device can flexibly define the set of network elements contained in each Fabric area.
  • Fabric area1 includes aggregate site gateway (ASG) 1, ASG2, and CSG1, CSG2, CSG3, CSG4, and CSG5. 7 network elements.
  • the same network element can belong to multiple Fabric areas at the same time.
  • ASG1 belongs to both Fabric area 0 and Fabric area 1.
  • the network topology in each Fabric area is a connected subgraph, and the network elements in each Fabric area belong to the same interior gateway protocol (IGP) domain.
  • the connected subgraph is relative to the connected graph of Fabric. Connected graph means that in a graph G, if there is a path connected from vertex i to vertex j, then i and j are said to be connected.
  • Connected subgraph means that if all fixed points and edges of graph G ⁇ belong to graph G, then G ⁇ is a subgraph of G.
  • the IGP domain means that the IGP process IDs of the network elements in the same IGP domain can be different within the scope of the same IGP.
  • the IGP process identification can be the IGP process number or other identification information of the IGP.
  • ASG1, ASG2 and CSG1, CSG2, CSG3, CSG4, and CSG5 are all in the same IGP domain and connected to each other, and can be grouped into one Fabric area (Fabric area 1). In the same way, if different IGP domain planning methods are adopted, the scope of the Fabric area is also different. As shown in Figure 4, the core-area border router (C-ABR) 1, C-ABR2 and ASG8, ASG6, ASG1, ASG2, and CSG1, CSG2, CSG3, CSG4, and CSG5 are in the same IGP domain and are in the same IGP domain. Connected, then Fabric area 1 should contain all the above network elements at this time.
  • C-ABR core-area border router
  • the fabric area promises abstract network capabilities externally, and the fabric area uses the same bearer technology internally. For example, in a possible situation, Fabric area 1 promises that any service accessed from CSG network elements has 300Mb uplink bandwidth. At the same time, CSG network elements in Fabric area 1 are configured with bandwidth-guaranteed segment routing traffic engineering (segment routing). -traffic engineering, SR-TE) The tunnel fulfills this promise.
  • segment routing traffic engineering segment routing
  • SR-TE bandwidth-traffic engineering
  • the control device can divide the fabric area into four types: access type, aggregate type, default type, data center, DC) type.
  • access type access type
  • aggregate type default type
  • data center DC
  • Each type of Fabric area only promises corresponding service forwarding capabilities.
  • the type of the structured area includes an aggregation type and an access type.
  • Fabric Area 0 is an Aggregate type structured area
  • Fabric Area 1 and Fabric Area 2 are an Access type structured area.
  • the inter-Access type structured area forwarding needs to pass through the Aggregate type structured area
  • the service uplink forwarding that accesses the Access type structured area needs to pass through the Aggregate type structured area.
  • the area type of the layered bearer network is described above. For a simple network that is not layered, it can also be called a single-layer network.
  • the type of the structured area is a default type.
  • a Fabric plane includes a structured area of the default type.
  • the network elements and link topology in the fabric area of the default type are a connected graph, and all network elements belong to an IGP domain.
  • the type of the structured area is a data center type.
  • a Fabric plane includes a DC-type Fabric area.
  • the network elements and link topology in the DC-type Fabric area are a connected graph, and all network elements belong to an IGP domain; in particular, the topology of the DC-type Fabric Area should also conform to the Spine-leaf structure.
  • the types of the structured area include aggregation type, access type, and data center type
  • the cloud-network co-managed network topology is the hierarchical bearer network topology and the data A combination of central network topologies.
  • the 5G bearer network structure is a combination of Access and Aggregate fabric areas. At this time, if you need to co-manage with an edge DC (edge DC), there may be three scenarios where Fabric area cascades.
  • access role In the forwarding process, when a network element receives traffic outside the fabric area and forwards it to a network element with an edge role in the fabric area, it has an access role in the fabric area; typically, access In the entry type Fabric area, CSG network elements generally play an access role.
  • Border Role During the forwarding process, when a network element receives traffic in the fabric area and forwards it to other fabric areas, it has a border role in the fabric area; typically, in the access type Fabric area , ASG network elements generally act as borders.
  • Fabric area of the default type All network elements in the area have access roles.
  • Fabric area of the access type the area contains one or more network elements with access roles, two egress nodes are network elements with border roles, and 0 to more network elements with transparent transmission roles; among them, the network elements with border roles need Identifies the active and standby.
  • Convergence type Fabric area The area contains one or more network elements with access roles, two egress nodes with boundary roles, and 0 to more transparent transmission roles; the network elements with boundary roles need to be identified Active and standby.
  • DC-type Fabric area The area contains one or more network elements with access roles, and two egress nodes are network elements with border roles, and need to identify active and standby network elements.
  • leaf (leaf) network elements In a DC type fabric area, leaf (leaf) network elements generally play an access role, and backbone (spine)/gateway (gateway, GW) network elements generally play a boundary role.
  • the forwarding ability of the network element of the border role is generally stronger than that of the network element of the access role.
  • its role in different fabric areas may be the same or different.
  • the control device determining at least one type of structured area according to the pre-divided network layered structure may include two parts: determining the structured area of the convergence type and determining the structured area of the access type.
  • the process for the control device to determine the structured area of the convergence type may include:
  • the control device obtains first intent information corresponding to a first structured plane, where the first intent information includes information about a pair of core aggregation network elements in the first structured plane and information about the one core aggregation network element.
  • a first interior gateway protocol IGP process identifier where the first structured plane is any one of the at least one structured plane;
  • the control device searches for a network in the same IGP domain as the first IGP process identifier, starting from the pair of core aggregation network elements in the first structured plane, according to the information of the pair of core aggregation network elements.
  • the control device determines at least one structured area of the access type according to the structured area of the convergence type.
  • the intention information is used to indicate the intention of the network administrator or user to divide the structured area.
  • the information of a pair of core aggregation network elements can be the information of the mobile aggregation service gateway (MASG) 1 and MASG2 as shown in Figure 3 or Figure 4, such as the device identifiers of MASG1 and MASG2, or the Internet protocol (internet protocol). Protocol, IP) address and other information.
  • the IGP process ID of MASG1 and the IGP process ID of MASG2 can be the same or different. However, the IGP process IDs of MASG1 and MASG2 belong to the same IGP domain.
  • the IGP domain represents a range.
  • search for the network elements and links in the same IGP domain as the first IGP process identifier from the pair of core aggregation network elements in the first structured plane To determine the process of converging structured areas.
  • the intermediate system to the intermediate system (intermediate system to intermediate system, ISIS) process ID in the same IGP domain as the process identifiers of MASG1 and MASG2 has C-ABR1 , C-ABR2, ASG8, ASG1, ASG2, ASG6, ASG7, ASG3, ASG4 and ASG5.
  • the network elements of the ISIS process N located in the same IGP domain as the process identifiers of MASG1 and MASG2 include C-ABR1 and C-ABR2.
  • the control device may determine at least one structured area of the access type according to the structured area of the convergence type. There may be two solutions.
  • the control device determines the role of each network element in the structured area of the convergence type
  • the control device deducts links in the structured area of the convergence type in the first structured plane to obtain at least one subgraph that is not connected to each other;
  • For each disconnected subgraph start from the first network element in the structured area of the aggregation type to search for network elements and links in the same IGP domain as the second IGP process identifier to obtain at least one connection Entry type structured area, where the first network element and link, and the network elements and links in the same IGP domain as the second IGP process identifier form a connected sub-graph, and different sub-graphs that are not connected to each other
  • the IGP domains of the structured areas of the access type formed are different, and the first network element is a network element of any access role with a connection edge number greater than 2.
  • the aggregated part of the network is the determined structured area of the convergence type.
  • the identification information of the IGP domain of the structured area of the convergence type is ISIS process 100, as shown in Figure 9
  • the structured area of the convergence type includes 6 network elements ASG1, ASG2, ASG3, ASG4, ASG5 and ASG6. Among these 6 network elements, ASG1, ASG2, ASG3 and ASG4 belong to the network elements of the access role. ASG5 and ASG6 is the network element of the border role. In the structured area of the convergence type, only the network element in the access role can become the network element in the structured area of the access type.
  • the number of connected edges of ASG1, ASG2, ASG3, and ASG4 all have 3, that is, the number of connected edges is greater than 2. Therefore, for the first disconnected subgraph, you can start from ASG1 or ASG2 to search for network elements in the same IGP domain as the process ID of ASG1 or ASG2, and find CSG1, CSG2, CSG3, CSG4, and CSG5 respectively. In this way, coupled with the link between ASG1 and ASG2, it is determined that the identifier of an IGP domain is a structured area of the access type of ISIS process 1.
  • the identifier of an IGP domain is a structured area of the access type of ISIS process 2.
  • control equipment obtains the following information after network collection:
  • the control device determines the role of each network element in the structured area of the convergence type
  • the control device acquires second intent information of the structured area of the convergence type, where the second intent information includes information of at least one pair of network elements with access roles in the structured area of the convergence type and information related to each network element.
  • IGP process ID corresponding to the network element of the access role;
  • the control device searches the network element of the first pair of access roles starting from the network element of the first pair of access roles in the first structured plane.
  • the third IGP process identifier corresponding to the element is a network element and link in the same IGP domain to determine the structured area of the access type corresponding to the third IGP process identifier.
  • the network element is any pair of the at least one pair of network elements with access roles, and the IGP process identifiers corresponding to the network elements of each pair of access roles are different.
  • the difference between the second solution and the first solution is that the method of link deduction is not adopted, but the structured area of the access type is determined according to the intention information specified by the network administrator or user.
  • the intent information will include information about at least one pair of network elements in access roles.
  • the control device can Starting from ASG1 and ASG2, search for network elements that are in the same IGP domain as the IGP process IDs of ASG1 and ASG2. Through searching, you can determine that CSG1, CSG2, CSG3, CSG4, and CSG5 are in the same IGP domain as ASG1 and ASG2 A structured area of access type is determined.
  • the control device can start from ASG3 and ASG4 and look for the IGP process identifiers of ASG3 and ASG4 in the same IGP domain. Through searching, it can be determined that CSG6, CSG7, CSG8, CSG9, and CSG10 are in the same IGP domain with ASG3 and ASG4. ISIS process 2 determines another access type structured area.
  • the name and IGP process id of the Fabric area of this access type can also be specified.
  • the second intention information includes the name of the structured area of the access type to be created: Fabric_acc3.
  • the designated pair of devices are ASG5 and ASG6, and ASG6 is designated as the primary boundary device, and ASG5 is the secondary boundary device.
  • the downstream interface identifiers of ASG5 and ASG6 are port 1/0/1.
  • the specified IGP process id is ISIS 3.
  • the process of determining the structured area of the default type can be:
  • the control device obtains third intent information corresponding to a second structured plane, where the third intent information includes information about a pair of devices and a fourth IGP process identifier of the pair of devices, and the second structured plane is Any one of the at least one structured plane;
  • the control device searches for devices and links in the same IGP domain as the fourth IGP process identifier in the second structured plane from the pair of devices according to the information of the pair of devices to determine A structured area of a default type is generated, and the sparsely connected graph of the structured area of the default type is a subset of the network topology within the scope of the managed network.
  • the third intent information can include the information of RSG1 and RSG2, and then search for the ISIS process M belonging to the same IGP domain as the IGP process identifiers of RSG1 and RSG2. Through searching, it is determined that ASG1, ASG2, CSG1, CSG2, and CSG3 belong to the same IGP domain as the IGP process identifiers of RSG1 and RSG2. Then determine the default type of Fabric Area0.
  • the process of determining the structured area of the DC type can be:
  • fourth intent information corresponding to the third structured plane, where the fourth intent information includes information about a backbone network element, information about a leaf network element, and information about a data center gateway;
  • the control device determines the link between the backbone network element and the leaf network element according to the information of the backbone network element and the information of the leaf network element, and determines the link between the backbone network element and the leaf network element according to the information of the backbone network element and the data
  • the information of the central gateway determines the link between the backbone network element and the data center gateway to determine the structured area of the data center type.
  • the fourth intent information includes the information of the spine and the information of the leaf.
  • the data is not shown in FIG. 7.
  • the central gateway, in fact, the structured area of the DC type also includes the data center gateway. After the link between the spine and leaf, the data center gateway and the spine or between the spine and leaf is determined, the structured area of the DC type is determined.
  • the spine, leaf, and data center gateway in the DC-type structured area also belong to the same IGP domain.
  • the IGP domain identifier of Fabric Area 0 shown in FIG. 7 is ISIS process M.
  • the determination of the structured area of the cloud network co-management scenario can be understood in conjunction with the above process of determining the structured area of the bearer network and the data center network.
  • the above embodiments describe the structured plane and the structured area, and the following describes the method of network management based on the structured plane.
  • an embodiment of the network management method provided by the embodiment of the present application may include:
  • the control device receives the online information of the device.
  • the online information of the device may be reported to the control device by the gateway device accessed by the online device.
  • the online information of the device includes the location information of the online device.
  • the control device determines, according to the location information of the online device, that the online device belongs to or accesses the first structured plane of the network topology within the network range managed by the control device.
  • the network topology is planned as at least one structured plane, wherein the forwarding resources associated with the first structured plane are isolated from the forwarding resources outside the first structured plane.
  • the location information of the online device may be the interface information of the device inserted into the online device. For example, if CSG2 is inserted into the first interface of CSG1, then the location information may be information of the first interface of CSG1.
  • the control device can determine the structured plane to which the online device belongs according to the interface information of the gateway device inserted into the online device.
  • the online device can access the gateway device in the structured area of the type.
  • the online device may also be a gateway device in a structured area of the default type.
  • the on-line device accesses the first structured plane of the network topology within the network managed by the control device, which means that the on-line device does not belong to the first structured plane, but can be connected to the devices in the first structured plane to perform Communication.
  • the online device may be a base station when accessing the bearer network, and may be a virtual machine (VM) when accessing the DC network.
  • VM virtual machine
  • the control device determines the configuration information of the online device according to the first structured plane.
  • each structured plane manages a resource pool, and the control device can allocate resources for the online device based on the resource pool managed by the structured plane, thereby generating corresponding configuration information.
  • the control device sends the configuration information to the online device, where the configuration information is used for the online device to perform automated online configuration.
  • the control device can issue the configuration information through the gateway device accessed by the online device.
  • the online device After receiving the configuration information, the online device performs automatic online configuration.
  • the control device can automatically manage the online device based on the structured plane. After the device goes online, the control device can determine configuration information for the online device, and the configuration information is used for the automated online configuration of the online device, thereby realizing the automated management of the online device and improving the efficiency of network management.
  • the access equipment in the structured area of the access type belonging to the bearer network is automatically online and offline.
  • the access equipment in the structured area belonging to the default type is automatically online and offline.
  • VN automated online process VM-based business automated online and VM migration process connected to the DC network.
  • the access equipment in the structured area of the access type belonging to the bearer network is automatically online and offline.
  • the solution when the first access device belonging to the bearer network goes online may include:
  • the control device receives information that the first access device is online.
  • the online information may include location information of the first access device, and the location information may be information of an interface of a gateway device accessed by the first access device, such as an interface identifier.
  • the control device obtains template filtering information.
  • the template filtering information may be pre-configured during network planning, and the template filtering information may be public network information or private network information.
  • the public network and the private network each correspond to an online parameter template.
  • the template filtering information is not limited to public network information or private network information, and other information can also be included. However, no matter what content the template filtering information includes, there will be a corresponding online parameter template.
  • the control device determines, according to the location information of the first access device, the first structured area of the access type to which the first access device belongs, and the first access device is in the first structured area. The role in the area.
  • the control device may determine the structured area in the first structured plane to which the interface resource belongs according to the interface accessed by the first access device.
  • the role of the online device is usually the network element of the access role.
  • the control device determines the online parameter template of the first access device and preset network element login parameters according to the template filtering information.
  • the online parameter template corresponding to the public network information is determined. If the template filtering information is private network information, the online parameter template corresponding to the private network information is determined.
  • the preset network element login parameters can be user name and password.
  • the control device allocates the internal gateway protocol IGP process number of the first access device, the link Internet Protocol IP address of the first access device, and the first access device according to the first structured area. Or the name of the first access device, where all devices included in the first structured area belong to the same IGP domain.
  • a structured plane corresponds to a resource pool, and the resource pool includes resources that can be used by online network elements in the plane, such as address resources, name resources, and IGP process resources.
  • the identity of the first access device may be the IP address of the first access device. Because the IGP domain of each structured area is different, the control device will allocate resources according to the structured area to which the first access device belongs.
  • the control device sends the preset network element login parameters, the role of the first access device, the IGP process number, the link IP address of the first access device, and the first access device
  • the identification of the device or the name of the first access device is filled in the online parameter template to obtain configuration information for the online of the first access device.
  • NE stands for network entity.
  • the control device sends the configuration information to the first access device.
  • the first access device automatically goes online in the structured area of the access type according to the configuration information.
  • the network element and link relationship of the structured area of the access type where the first access device is located has changed, so that the control device needs to be based on the link of the first access device.
  • the relationship updates the connectivity subgraph of the structured area of the access type accessed by the first access device.
  • the device offline process can be:
  • the control device determines to change the configuration information of the changed network element, and the changed network element generates configuration information for the second access device to go offline Changing network elements;
  • the control device sends the changed configuration information to the changed network element, where the changed configuration information is used for the automatic update configuration of the changed network element.
  • the control device When the second access device goes offline in the structured area of the access type, the control device obtains the link relationship of the second access device, and the control device is in the structured area of the access type. Delete the second access device and its corresponding link relationship in the first connected subgraph corresponding to the area, and re-establish the link relationship of the remaining network elements in the first connected subgraph to obtain the second connected subgraph Figure.
  • the changed configuration information of the changed network element can be automatically updated for the network element that has the configuration change, so as to realize the automatic update of the configuration information.
  • the connected sub-graph will be automatically updated without manual participation, which improves the efficiency of network management when the device is offline.
  • the third access device After the first base station is inserted into the interface of the third access device, the third access device sends the online information of the first base station to the control device. Correspondingly, the control device obtains the online information of the first base station.
  • the online information of the first base station includes the interface information of the third access device accessed by the first base station in the structured area of the access type and the electronic serial number of the first base station. number, ESN).
  • the interface information of the third access device may be the interface identifier of the third access device.
  • the control device allocates a first IP address and a first mask to the first base station according to the interface information of the third access device and the ESN of the first base station, and allocates a first IP address and a first mask to the interface indicated by the interface information The second IP address and the second mask.
  • the first IP address and the second IP address belong to the same network segment.
  • the process may be that the control device determines the resource pool associated with the structured plane to which the third access device belongs according to the interface information of the third access device and the ESN of the first base station, and the resource pool Including the IP address and mask that can be allocated to the structured plane corresponding device to which the third access device belongs; the control device allocates the first IP address and the first mask to the first base station according to the resource pool, and The interface indicated by the interface information is assigned a second IP address and a second mask.
  • the control device sends the ESN of the first base station, the first IP address, and the first mask to a dynamic host configuration protocol (DHCP) server.
  • DHCP dynamic host configuration protocol
  • the DHCP server sends the first IP address and the first mask to the first base station through the third access device.
  • the first base station uses the first IP address and the first mask to perform automatic online configuration.
  • the control device sends the second IP address and the second mask to the third access device.
  • the third access device uses the second IP address and the second mask to perform interworking configuration between the interface and the first base station.
  • the process of going online based on the first base station may include:
  • the control device obtains, according to the ESN of the first base station, a first available traffic model based on the first structured plane of the bearer network.
  • the first available traffic model includes a traffic sub-model for base station and Internet communication, a network management traffic sub-model, and a traffic sub-model for base station and base station communication;
  • the traffic sub-model for communication between the first base station and the Internet can be called the N2/N3 service traffic model, and the network management traffic model can be called the (orchestrator mangment, OM) management traffic sub-model.
  • the traffic model of the base station communication can be called the Xn service traffic sub-model.
  • the N2/N3 service flow sub-model can design the connection relationship shown in Figure 14A on the control device:
  • FIG 14A there are two types of access points, the first base station and NGC; the NGC side access point type is Hub, and the first base station side access point type is Spoke; the access point will eventually be instantiated as one or one To access equipment.
  • the NGC side access point type is Hub
  • the first base station side access point type is Spoke
  • the access point will eventually be instantiated as one or one To access equipment.
  • the Hub in the middle of the area acts as a cross-layer relay node for VPN services.
  • the fabric area type will eventually be assigned to a specific Access type Fabric area and an Aggregate type Fabric area.
  • the OM management flow model can design the connection relationship shown in Figure 14B on the control device, and the Xn service flow model can design the connection relationship shown in Figure 14C on the control device.
  • the connection relationship expressed in FIG. 14B and FIG. 14C is similar to that in FIG. 14A, and can be understood by referring to the corresponding description in FIG. 14A above.
  • the control device determines the functional requirements of different network elements in the first structured plane according to the first available traffic model, and determines that the first structured plane satisfies the virtual private deployment through the first base station. At least one service path of the network VPN service.
  • each traffic sub-model corresponds to a set of configuration templates
  • Spoke1 is responsible for both the task of communicating with the Internet and the task of communicating with other first base stations, while Spoke2 only undertakes the task of communicating with this Spoke1.
  • the task of communication In this case, Spoke1 must configure the configuration template of the traffic model for the communication between the first base station and the Internet and the configuration template of the traffic model for the communication between the first base station and the first base station.
  • Spoke2 only needs to configure the configuration template of the traffic model for the communication between the first base station and the first base station.
  • the control device determines, from the at least one service path, an optimal path that meets the service level agreement SLA requirement of the VPN service.
  • the SLA of each path may be different. For example, some paths have large bandwidth and small delay, while some paths have small bandwidth and large delay. In this way, an optimal path can be selected according to the SLA of each path.
  • the path from Haidian Environmental Protection Park to Xizhimen can have path 1: Haidian Environmental Protection Park-PE1-PE2-PE4-Xizhimen, and path 2: Haidian Environmental Protection Park-PE1-PE3-PE5-Xizhimen.
  • the SLA of path 1 is higher than that of path 2, then path 1 can be selected as the optimal path.
  • the control device generates network element configuration information for key network elements on the optimal path according to the functional requirements of the different network elements, where the network element configuration information includes a configuration template corresponding to the traffic submodel to which the key network element belongs .
  • the key network elements can be all network elements on the optimal path, or some network elements.
  • Spoke1 not only undertakes the task of communicating with the Internet, but also the task of communicating with other first base stations, while Spoke2 only undertakes the task of communicating with all Spoke1.
  • Spoke1 must configure the configuration template of the traffic model for the communication between the first base station and the Internet and the configuration template of the traffic model for the communication between the first base station and the first base station.
  • Spoke2 only needs to configure the configuration template of the traffic model for the communication between the first base station and the first base station.
  • the control device sends the network element configuration information to the key network element.
  • the network element configuration information is used for automatic configuration of the key network element.
  • the business automatic online management solution provided by the embodiment of this application , Fast speed and high accuracy.
  • the access equipment in the structured area belonging to the default type is automatically online and offline.
  • this single-layer simple network is planned as a default fabric area, which can effectively manage connections in the area and realize automatic management of network changes.
  • Figure 16 refers to Figure 16 to introduce the online process of a single-layer simple network device.
  • the automated online and automated offline process of access devices in the structured area belonging to the default type provided by the embodiment of the present application may include:
  • the control device acquires that a fourth access device is newly added to the structured area of the default type.
  • the control device determines that the fourth access device accesses the first structured plane according to the location information of the fourth access device.
  • the control device determines configuration information for the fourth access device according to the first structured plane.
  • the configuration information includes the IGP process number of the fourth access device, the link IP address of the fourth access device, the identifier of the fourth access device, or the name of the fourth access device.
  • the structured plane to which the fourth access device belongs corresponds to a resource pool, and the control device can allocate the foregoing configuration information to the fourth access device according to the resources in the resource pool.
  • the control device sends the configuration information to the fourth access device.
  • the configuration information is used for the fourth access device to work normally in the structured area of the default type.
  • the control device sends configuration information for router7 for router7 to work normally in the structured area of the default type.
  • the above is the process of going online for a simple network device.
  • the process of going offline can actually include:
  • the control device determines to change the configuration information of the changed network element, and the changed network element generates configuration for the fifth access device to go offline Network elements whose information changes;
  • the control device sends the changed configuration information to the changed network element, where the changed configuration information is used for the automatic update configuration of the changed network element.
  • control device obtains the link relationship of the fifth access device
  • the control device deletes the fifth access device and its corresponding link relationship in the first sparse connectivity graph corresponding to the structured area of the default type, and re-establishes the remaining devices in the first sparse connectivity graph To obtain the second sparsely connected graph.
  • the above-mentioned default type of structured area division can be used to automatically manage the online and offline of devices, thereby improving the efficiency of network management.
  • VN automated online process VM-based business automated online and VM migration process connected to the DC network.
  • the VPN service of the DC network is based on a virtual machine (VM).
  • VM virtual machine
  • another embodiment of network management provided by the embodiment of the present application may include:
  • the control device obtains the online information of the first virtual machine VM.
  • the online information of the first VM includes information about the first interface of the sixth access device accessed by the first virtual machine in the structured area of the data center type and the server where the first VM is located The ESN, the identifier of the first VM, and the media access control (MAC) address of the first VM.
  • the control device establishes the first logical interface and the first logical interface according to the identification of the first VM and the information of the first interface, and the pre-recorded correspondence between the identification of the first VM and the first logical interface. Describe the correspondence between the first interfaces.
  • the control device determines the structured plane location to which the sixth access device belongs according to the information of the first interface, the ESN of the server where the first VM is located, the identification of the first VM, and the MAC address of the first VM.
  • An associated resource pool where the resource pool includes an IP address that can be allocated by the structured plane to which the sixth access device belongs.
  • the control device allocates a third IP address to the first VM according to the resource pool.
  • the control device allocates a third IP address to the first VM according to the information of the first interface, the ESN of the server where the first VM is located, and the identification of the first VM, and the MAC address of the first VM.
  • the control device sends the identifier of the first VM and the third IP address to the DHCP server.
  • the DHCP server transmits the third IP address to the first VM through the sixth access device.
  • the first virtual machine uses the third IP address to perform automatic online configuration.
  • FIG. 19 is a schematic structural diagram of a DC network. If VM1 in the virtual network function (VNF) 1 in Figure 19 represents the first virtual machine, then this VM1 accesses the DC-type structured area through TOR1, and TOR1 can pass through the spine node in Figure 19 and The data center gateway reports the online information of the VM1 to the controller, and then the controller allocates a third IP address to the VM1 through the process performed by the above-mentioned control device, and the third IP address is used for the VM1 to automatically go online configuration.
  • VNF virtual network function
  • the automated online process of the VPN service can be realized based on the first VM. This process can be understood with reference to Figure 20.
  • the automated online process of implementing a VPN service based on the first VM may include:
  • the control device obtains a second available traffic model based on the first structured plane according to the ESN of the server where the first VM is located.
  • the second available traffic model includes a traffic sub-model for the communication between the VM and the Internet and a traffic sub-model for the communication between the VM and the VM.
  • the control device determines the functional requirements of different network elements in the first structured plane according to the second available traffic model, and determines the value of the VPN service deployed through the first VM in the first structured plane. M business paths.
  • each traffic sub-model corresponds to a set of configuration templates
  • the M is an integer greater than 0.
  • the control device determines, from the M service paths, the first optimal path that meets the SLA requirement of the VPN service.
  • the control device generates first network element configuration information for the first key network element on the first optimal path according to the functional requirements of the different network elements.
  • the first network element configuration information includes a configuration template corresponding to the traffic submodel to which the first key network element belongs.
  • the control device sends the first network element configuration information to the first key network element.
  • the first network element configuration information is used for automatic configuration of the first key network element.
  • VM is a virtualized resource
  • VM may be migrated. After deploying services based on the first VM, as the first VM migrates, the services will also migrate.
  • the virtual machine migration process can include:
  • control device When the control device acquires that the first VM is migrated to the second interface, it deletes the correspondence between the first logical interface and the first interface, and the second interface is the sixth access device or the second interface. Seven access to the interface on the device;
  • the control device determines, according to the second interface, N service paths of the VPN service deployed through the migrated first VM in the first structured plane, where different functional requirements correspond to different traffic sub-paths.
  • Model each traffic sub-model corresponds to a set of configuration templates, and the N is an integer greater than 0;
  • the control device generates second network element configuration information for the second key network element on the second optimal path according to the functional requirements of the different network elements, and the second network element configuration information includes the second key The configuration template corresponding to the traffic sub-model to which the network element belongs;
  • the control device sends the second network element configuration information to the second key network element, where the first network element configuration information is used for the automatic configuration of the first key network element.
  • a virtual machine can only present one logical interface to the outside, even if the internal physical interface changes, The user does not perceive it, and the external presentation can be simplified.
  • an embodiment of the control device 80 provided in the embodiment of the present application may include:
  • the receiving unit 801 is configured to receive device online information, where the device online information includes location information of the online device;
  • the processing unit 802 is configured to determine, according to the location information of the online device received by the receiving unit 801, that the online device belongs to or accesses the first structured plane of the network topology within the network managed by the control device, and according to the The first structured plane determines the configuration information of the online device, and the network topology is planned as at least one structured plane, wherein the forwarding resources associated with the first structured plane are related to those outside the first structured plane. Forwarding resource isolation;
  • the sending unit 803 is configured to send the configuration information determined by the processing unit 802 to the online device, where the configuration information is used for the online device to perform automatic online configuration.
  • the control device can automatically manage the online device based on the structured plane. After the device goes online, the control device can determine configuration information for the online device, and the configuration information is used for the automated online configuration of the online device, thereby realizing the automated management of the online device and improving the efficiency of network management.
  • the first structured plane when the first structured plane belongs to a bearer network, the first structured plane includes a structured area of a convergence type and a structured area of an access type;
  • the first structured plane When the first structured plane belongs to a single-layer network, the first structured plane includes a structured area of a default type;
  • the first structured plane When the first structured plane belongs to a data center DC network, the first structured plane includes a DC type structured area;
  • the type of the structured area includes a structured area of a convergence type, a structured area of an access type, and a structured area of a DC type.
  • the processing unit 802 is also configured to: when the first structured plane belongs to a bearer network or a cloud network co-managed network, and the online device is a structured area of the access type Obtain template filtering information when the first access device in the device is connected;
  • the processing unit 802 is used to:
  • Template filtering information to determine the online parameter template of the first access device and preset network element login parameters
  • the internal gateway protocol IGP process number of the first access device, the link Internet Protocol IP address of the first access device, the identification of the first access device, or the address of the first access device are allocated according to the first structured area. State the name of the first access device, where all devices included in the first structured area belong to the same IGP domain;
  • the processing unit 802 is further configured to determine the change configuration information of the changed network element when the second access device in the first structured area is offline, and the changed network element is The network element whose configuration information changes when the second access device goes offline;
  • the sending unit 803 is further configured to send the changed configuration information, and the changed configuration information is used for the automatic update configuration of the changed network element.
  • the processing unit 802 is configured to:
  • the location information is the first
  • the interface information of the third access device accessed by the base station in the structured area of the access type and the online information further includes the electronic serial number ESN of the first base station, according to the third access
  • the interface information of the device and the ESN of the first base station determine configuration information, where the configuration information includes a first IP address and a first mask allocated to the first base station based on the first structured plane, which is A second IP address and a second mask allocated by the interface indicated by the interface information, where the first IP address and the second IP address belong to the same network segment;
  • the sending unit 803 is used to:
  • the ESN of the first base station, the first IP address, and the first mask are sent to the dynamic host configuration protocol DHCP server, and the first IP address and the first mask are passed by the DHCP server.
  • the third access device is transmitted to the first base station, and the first IP address and the first mask are used by the first base station to configure an automatic online connection;
  • the first base station performs interworking configuration.
  • processing unit 802 is further configured to:
  • the first available traffic model includes a traffic sub-model for communication between the base station and the Internet and a network management traffic sub-model The traffic sub-model for communicating with the base station and the base station;
  • the functional requirements of different network elements in the first structured plane are determined, and it is determined that the first structured plane meets the requirements of the VPN service of the virtual private network deployed through the first base station.
  • At least one business path where different functional requirements correspond to different traffic sub-models, and each traffic sub-model corresponds to a set of configuration templates;
  • the network element configuration information includes a configuration template corresponding to a traffic submodel to which the key network element belongs;
  • the sending unit is further configured to send the network element configuration information to the key network element, where the network element configuration information is used for the automatic configuration of the key network element.
  • the processing unit 802 is configured to: when the first structured plane belongs to a single-layer network, and the online device is the fourth access device in the structured area of the default type : Determine configuration information for the fourth access device according to the first structured plane, where the configuration information includes the IGP process number of the fourth access device and the link IP address of the fourth access device , The identity of the fourth access device or the name of the fourth access device.
  • the processing unit 802 is further configured to determine the change configuration information of the changed network element when the fifth access device in the structured area of the default type is offline, and the changed network element is The network element whose configuration information changes when the fifth access device goes offline;
  • the sending unit 803 is further configured to send the changed configuration information to the changed network element, where the changed configuration information is used for the automatic update configuration of the changed network element.
  • the processing unit 802 is configured to: when the first structured plane belongs to a DC network or a cloud network co-managed network, and the online device is connected to the DC type structured area
  • the location information is the information of the first interface of the sixth access device accessed by the first virtual machine on the DC-type structured area:
  • the ESN of the server where the first VM is located, and the identification of the first VM, the MAC address of the first VM determines configuration information for the first VM, and the configuration information includes a third IP address;
  • the sending unit is configured to send the identifier of the first VM and the third IP address to a DHCP server, and the third IP address is transmitted by the DHCP server to the first VM through the sixth access device.
  • a VM, the third IP address is used for the first VM to automatically go online configuration.
  • processing unit 802 is further configured to:
  • the second available traffic model includes a traffic sub-model for communication between the VM and the Internet and communication between the VM and the VM Flow sub-model;
  • first network element configuration information is generated for the first key network element on the first optimal path, where the first network element configuration information includes the traffic to which the first key network element belongs The configuration template corresponding to the sub-model;
  • the sending unit is further configured to send the first network element configuration information to the first key network element, where the first network element configuration information is used for the automatic configuration of the first key network element.
  • processing unit 802 is further configured to:
  • the second interface After acquiring the migration of the first VM to the second interface, delete the corresponding relationship between the first logical interface and the first interface, and the second interface is the sixth access device or the seventh access device On the interface;
  • N service paths of the VPN service deployed through the migrated first VM in the first structured plane, where different functional requirements correspond to different traffic sub-models, each The traffic sub-model corresponds to a set of configuration templates, and the N is an integer greater than 0;
  • second network element configuration information is generated for the second key network element on the second optimal path, where the second network element configuration information includes the traffic to which the second key network element belongs The configuration template corresponding to the sub-model;
  • the sending unit is further configured to send the second network element configuration information to the second key network element, where the first network element configuration information is used for the automatic configuration of the first key network element.
  • control device described above is based on the same concept as the method embodiment of this application, and its technical effects are the same as the method embodiment of this application.
  • control device described above is based on the same concept as the method embodiment of this application, and its technical effects are the same as the method embodiment of this application.
  • the embodiments of the present application also provide a computer storage medium, wherein the computer storage medium stores a program, and the program executes some or all of the steps recorded in the above method embodiments.
  • the control device may be a server or other devices that can implement the functions of this application.
  • the control device may include: a processor 901 (such as a CPU), a memory 902, a transmitter 904, and a receiver 903; the transmitter 904 and the receiver 903 are coupled to the processor 901, and the processor 901 controls the sending and receiving of the transmitter 904.
  • the memory 902 may include a high-speed RAM memory, or may also include a non-volatile memory NVM, such as at least one disk memory.
  • the memory 902 may store various instructions for completing various processing functions and implementing the methods of the embodiments of the present application. step.
  • control device involved in the embodiment of the present application may further include one or more of a power supply 905 and a communication port 906.
  • the devices described in FIG. 22 may be connected through a communication bus or through other The connection mode is connected, which is not limited in the embodiment of the present application.
  • the receiver 903 and the transmitter 904 may be integrated in the transceiver of the control device, or may be independent receiving and transmitting antennas on the control device.
  • the communication bus is used to realize the communication connection between the components.
  • the aforementioned communication port 906 is used to implement connection and communication between the control device and other peripherals.
  • the above-mentioned memory 902 is used to store computer executable program code
  • the program code includes instructions; when the processor 901 executes the instructions, the processor 901 in the control device can execute the actions performed by the processing unit 802 in FIG. 21, The receiver 903 or the communication port 906 in the control device can perform the actions performed by the receiving unit 801 in FIG. 21, and the transmitter 904 or the communication port 906 in the control device can perform the actions performed by the sending unit 803 in FIG. 21.
  • the implementation principle and The technical effects are similar, so I won't repeat them here.
  • the present application also provides a chip system including a processor for supporting the aforementioned control device to realize its related functions, for example, receiving or processing the data and/or information involved in the aforementioned method embodiment.
  • the chip system further includes a memory, and the memory is used to store necessary program instructions and data of the computer equipment.
  • the chip system can be composed of chips, or include chips and other discrete devices.
  • the computer program product includes one or more computer instructions.
  • the computer may be a general-purpose computer, a special-purpose computer, a computer network, or other programmable devices.
  • the computer instructions may be stored in a computer-readable storage medium, or transmitted from one computer-readable storage medium to another computer-readable storage medium.
  • the computer instructions may be transmitted from a website, computer, server, or data center. Transmission to another website, computer, server or data center via wired (such as coaxial cable, optical fiber, Digital Subscriber Line (DSL)) or wireless (such as infrared, wireless, microwave, etc.).
  • wired such as coaxial cable, optical fiber, Digital Subscriber Line (DSL)
  • wireless such as infrared, wireless, microwave, etc.
  • the computer-readable storage medium may be any available medium that can be stored by a computer or a data storage device such as a server or a data center integrated with one or more available media.
  • the usable medium may be a magnetic medium (for example, a floppy disk, a hard disk, and a magnetic tape), an optical medium (for example, a DVD), or a semiconductor medium (for example, a solid state disk (SSD)).
  • the disclosed system, device, and method may be implemented in other ways.
  • the device embodiments described above are merely illustrative, for example, the division of the units is only a logical function division, and there may be other divisions in actual implementation, for example, multiple units or components may be combined or It can be integrated into another system, or some features can be ignored or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or they may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
  • the functional units in the various embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
  • the above-mentioned integrated unit can be implemented in the form of hardware or software functional unit.
  • the integrated unit is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer readable storage medium.
  • the technical solution of the present application essentially or the part that contributes to the existing technology or all or part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium , Including several instructions to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the methods described in the various embodiments of the present application.
  • the aforementioned storage media include: U disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disk or optical disk and other media that can store program code .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Automation & Control Theory (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

本申请公开了一种网络管理的方法,包括:控制设备接收设备上线的信息,该设备上线的信息包括上线设备的位置信息。该控制设备根据上线设备的位置信息确定上线设备属于或接入控制设备所管理网络范围内网络拓扑的第一结构化平面,该网络拓扑被规划为至少一个结构化平面,其中,第一结构化平面所关联的转发资源与第一结构化平面之外的转发资源隔离。控制设备根据第一结构化平面确定上线设备的配置信息;控制设备向上线设备发送配置信息,配置信息用于上线设备进行自动化上线配置。本申请实施例可以基于网络的结构化平面对网络中的设备进行自动化的上线管理,提高了网络管理的效率。

Description

一种网络管理的方法及设备
本申请要求于2019年8月30日提交中国专利局、申请号为CN 201910816847.X、发明名称为“一种网络管理的方法及设备”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及通信技术领域,具体涉及一种网络管理的方法及设备。
背景技术
随着网络需求的增加,网络中设备的数量越来越多,网络结构越来越复杂。以承载网为例:相比于第四代(the 4th generation,4G)移动通信,第五代(the 5th generation,5G)移动通信的承载网中设备数量显著增加。典型规模:网元设备约2万台。同时,由于流量需求的复杂性与多样性,这也导致了业务数量大幅度增加。传统的管理和运维方法无疑是无法应对如此海量的管理对象的。
因此,网络管理问题亟待解决。
发明内容
本申请实施例提供一种网络管理的方法,可以基于网络的结构化平面对网络中的设备进行自动化的上线管理。本申请实施例还提供了相应的控制设备。
本申请第一方面提供一种网络管理的方法,可以包括:控制设备接收设备上线的信息,该设备上线的信息包括上线设备的位置信息,控制设备根据所述上线设备的位置信息确定所述上线设备属于或接入所述控制设备所管理网络范围内网络拓扑的第一结构化平面,所述网络拓扑被规划为至少一个结构化平面(fabric plane),其中,第一结构化平面所关联的转发资源与所述第一结构化平面之外的转发资源隔离。控制设备根据所述第一结构化平面确定所述上线设备的配置信息。该控制设备根据所述上线设备的位置信息确定所述上线设备的配置信息。该控制设备向所述上线设备发送所述配置信息,所述配置信息用于所述上线设备进行自动化上线配置。
上述第一方面中,控制设备所管理的网络范围可以是一个省,也可以是一个市,通常指的是一定物理范围内的网络。结构化平面所管理的转发资源与该结构化平面之外的转发资源隔离可以避免业务交叉,从而可以有效的实现一网多用。位置信息可以是上线设备所接入的其他设备的接口信息,或者其他能表达该上线设备所处位置的信息。该第一方面中,基于该结构化平面,在设备上线后,控制设备可以为该上线设备确定配置信息,该配置信息用于上线设备的自动化上线配置,从而实现了对设备上线的自动化管理,提高了网络管理效率。
在第一方面的一种可能的实现方式中,当所述第一结构化平面属于承载网时,所述第一结构化平面包括汇聚类型的结构化区域(fabric area)和接入类型的结构化区域;当所述 第一结构化平面属于单层网络时,所述第一结构化平面包括默认类型的结构化区域;当所述第一结构化平面属于数据中心(data centre,DC)网络时,所述第一结构化平面包括DC类型的结构化区域;当所述第一结构化平面属于云网共管的网络时,所述结构化区域的类型包括汇聚类型的结构化区域、接入类型的结构化区域和DC类型的结构化区域。
该种可能的实现方式中,云网共管的网络可以理解为是承载网与DC网络的组合。不同结构的网络的结构化平面所包含的结构化区域的类型不同,这样可以确保各种结构的网络都有合适的结构化区域来实现自动化管理。
在第一方面的一种可能的实现方式中,当所述第一结构化平面属于承载网或云网共管的网络,且所述上线设备为所述接入类型的结构化区域中的第一接入设备时,该方法还可以包括:该控制设备获取模板过滤信息;上述步骤:控制设备根据所述第一结构化平面确定所述上线设备的配置信息,可以包括:控制设备根据所述第一接入设备的位置信息确定所述第一接入设备所属的接入类型的第一结构化区域,以及所述第一接入设备在所述第一结构化区域中的角色。控制设备根据模板过滤信息,确定所述第一接入设备的上线参数模板和预置的网元登录参数。所述控制设备根据所述第一结构化区域分配所述第一接入设备的内部网关协议(interior gateway protocol,IGP)进程号、所述第一接入设备的链路互联网协议(internet protocol,IP)地址、所述第一接入设备的标识或所述第一接入设备的名称,其中,包含于第一结构化区域的所有设备属于同一个IGP域。所述控制设备将所述预置的网元登录参数、所述第一接入设备的角色、所述IGP进程号、所述第一接入设备的链路IP地址、所述第一接入设备的标识或所述第一接入设备的名称填写到所述上线参数模板,以得到用于所述第一接入设备的上线的配置信息。
该种可能的实现方式中,模板过滤信息可以是公网信息或私网信息,每种模板过滤信息都会对应一个上线参数模板。预置的网元登录参数可以是用户名和密码等。第一接入设备的标识也可以是第一接入设备的IP地址。IGP域指的是一个IGP范围。针对归属于接入类型的结构化区域中的第一接入设备上线,控制设备会为该第一接入设备生成适合接入类型的结构化区域中上线的设备的配置信息,从而使得在该区域中的设备可以进行自动化上线配置,实现设备上线的自动化管理,提高了网络管理的效率。
在第一方面的一种可能的实现方式中,该方法还可以包括:当所述第一结构化区域中第二接入设备下线时,控制设备确定变更网元的变更配置信息,所述变更网元为所述第二接入设备下线而产生配置信息变化的网元。控制设备向所述变更网元发送所述变更配置信息,所述变更配置信息用于所述变更网元进行自动化更新配置。
该种可能的实现方式中,第二接入设备下线,可以是设备被拔出,也可以是设备上的接口坏掉,也可以是链路出现故障等。当网络中有设备下线时,会产生链路关系的变更,会对一些与该第二接入设备相关的网元产生影响,这种情况下需要更新这些相关的网元的配置信息,控制设备会为这些变更网元重新确定用于更新的变更配置信息,从而在网络发生变化时,实现设备配置的自动化更新,实现网络的自动化管理。
在第一方面的一种可能的实现方式中,当所述第一结构化平面属于承载网或云网共管的网络,且所述上线设备为接入所述接入类型的结构化区域中的第一基站,所述位置信息为所述第一基站在所述接入类型的结构化区域上所接入的第三接入设备的接口信息,所述上线信息还包括所述第一基站的电子序列号(electronic serial number,ESN)时,上述步骤:控制设备根据所述上线设备的位置信息确定所述上线设备的配置信息,可以包括:
所述控制设备根据所述第三接入设备的接口信息和所述第一基站的ESN确定配置信息,所述配置信息包括基于所述第一结构化平面为所述第一基站分配的第一IP地址和第一掩码,为所述接口信息所指示的接口分配的第二IP地址和第二掩码,所述第一IP地址和所述第二IP地址属于同一个网段;
上述步骤:控制设备向所述上线设备发送所述配置信息,所述配置信息用于所述上线设备进行自动化上线配置,可以包括:
所述控制设备向动态主机配置协议(dynamic host configuration protocol,DHCP)服务器发送所述第一基站的ESN、所述第一IP地址和所述第一掩码,所述第一IP地址和所述第一掩码被所述DHCP服务器通过所述第三接入设备传输到所述第一基站,所述第一IP地址和所述第一掩码用于所述第一基站进行自动上线配置;
所述控制设备向所述第三接入设备发送所述第二IP地址和所述第二掩码,所述第二IP地址和所述第二掩码用于所述第三接入设备的所述接口与所述第一基站进行互通配置。
该种可能的实现方式中,在基站上线时,控制设备会为基站以及基站所接入设备的接口生成各自的IP地址和掩码,从而实现基站与承载网的通信,并为虚拟专用网络(virtual private network,VPN)业务布放提供了保障。
在第一方面的一种可能的实现方式中,该方法还可以包括:
所述控制设备根据所述第一基站的ESN获取基于所述承载网的所述第一结构化平面的第一可用流量模型,所述第一可用流量模型包括基站与互联网通信的流量子模型、网管流量子模型和基站与基站通信的流量子模型;
所述控制设备根据所述第一可用流量模型确定所述第一结构化平面中不同网元的功能需求,并确定所述第一结构化平面中满足通过所述第一基站布放的虚拟专用网络VPN业务的至少一条业务路径,其中,不同的功能需求对应不同的流量子模型,每种流量子模型对应一套配置模板;
所述控制设备从所述至少一条业务路径中确定满足所述VPN业务的服务等级协议(service level agreement,SLA)要求的最优路径;
所述控制设备根据所述不同网元的功能需求为所述最优路径上的关键网元生成网元配置信息,所述网元配置信息包括所述关键网元所属流量子模型对应的配置模板;
所述控制设备向所述关键网元发送所述网元配置信息,所述网元配置信息用于所述关键网元进行自动化配置。
该种可能的实现方式中,关键网元可以是最优路径上的起始网元和结束网元,也可以是其他网元。通过基站进行VPN业务布放,可以实现业务的自动化配置。
在第一方面的一种可能的实现方式中,当所述第一结构化平面属于单层网络,且所述上线设备为所述默认类型的结构化区域中的第四接入设备时,上述步骤:控制设备根据所述第一结构化平面确定所述上线设备的配置信息,可以包括:
所述控制设备根据所述第一结构化平面为所述第四接入设备确定配置信息,所述配置信息包括所述第四接入设备的IGP进程号、所述第四接入设备的链路IP地址、所述第四接入设备的标识或所述第四接入设备的名称。
该种可能的实现方式中,针对比较简单的单层网络,控制设备可以根据该第一结构化平面所关联的资源池为该第四接入设备分配资源,从而确定该第四接入设备的配置信息。
在第一方面的一种可能的实现方式中,该方法还可以包括:
当所述默认类型的结构化区域中第五接入设备下线时,所述控制设备确定变更网元的变更配置信息,所述变更网元为所述第五接入设备下线而产生配置信息变化的网元;
所述控制设备向所述变更网元发送所述变更配置信息,所述变更配置信息用于所述变更网元进行自动化更新配置。
该种可能的实现方式中,第五接入设备下线,可以是设备被拔出,也可以是设备上的接口坏掉,也可以是链路出现故障等。当网络中有设备下线时,会产生链路关系的变更,会对一些与该第五接入设备相关的网元产生影响,这种情况下需要更新这些相关的网元的配置信息,控制设备会为这些变更网元重新确定用于更新的变更配置信息,从而在网络发生变化时,实现设备配置的自动化更新,实现网络的自动化管理。
在第一方面的一种可能的实现方式中,当所述第一结构化平面属于DC网络或云网共管的网络,且所述上线设备为接入所述DC类型的结构化区域中的第一虚拟机VM,所述位置信息为所述第一虚拟机在所述DC类型的结构化区域上所接入的第六接入设备的第一接口的信息,所述设备上线的信息还包括所述第一VM所在的服务器的ESN、第一VM的标识,第一VM的MAC地址时;上述步骤:控制设备根据所述第一结构化平面确定所述上线设备的配置信息,可以包括:
所述控制设备根据所述第一VM的标识和所述第一接口的信息,以及预先记录的所述第一VM的标识与第一逻辑接口的对应关系,建立所述第一逻辑接口与所述第一接口之间的对应关系;
所述控制设备根据所述第一接口的信息和所述第一VM所在的服务器的ESN、第一VM的标识,第一VM的MAC地址为所述第一VM确定配置信息,所述配置信息包括第三IP地址;
上述步骤:控制设备向所述上线设备发送所述配置信息,所述配置信息用于所述上线设备进行自动化上线配置,可以包括:
所述控制设备向DHCP服务器发送所述第一VM的标识和所述第三IP地址,所述第三IP地址被所述DHCP服务器通过所述第六接入设备传输到所述第一VM,所述第三IP地址用于所述第一VM进行自动上线配置。
该种可能的实现方式中,当是DC网络时,控制设备可以对VM进行自动化上线的管理,并为在VM上的业务布放提供了基础。
在第一方面的一种可能的实现方式中,该方法还可以包括:
所述控制设备根据所述第一VM所在的服务器的ESN获取基于所述第一结构化平面的第二可用流量模型,所述第二可用流量模型包括所述VM与互联网通信的流量子模型和VM与VM通信的流量子模型;
所述控制设备根据所述第二可用流量模型确定所述第一结构化平面中不同网元的功能需求,并确定所述第一结构化平面中通过所述第一VM布放的VPN业务的M条业务路径,其中,不同的功能需求对应不同的流量子模型,每种流量子模型对应一套配置模板,所述M为大于0的整数;
所述控制设备从所述M条业务路径中确定满足所述VPN业务的SLA要求的第一最优路径;
所述控制设备根据所述不同网元的功能需求为所述第一最优路径上的第一关键网元生成第一网元配置信息,所述第一网元配置信息包括所述第一关键网元所属流量子模型对应的配置模板;
所述控制设备向所述第一关键网元发送所述第一网元配置信息,所述第一网元配置信息用于所述第一关键网元进行自动化配置。
该种可能的实现方式中,关键网元可以是最优路径上的起始网元和结束网元,也可以是其他网元。通过VM进行VPN业务布放,可以实现业务的自动化配置。
在第一方面的一种可能的实现方式中,该方法还可以包括:
所述控制设备获取到所述第一VM迁移到第二接口,则删除所述第一逻辑接口与第一接口之间的对应关系,所述第二接口为所述第六接入设备或第七接入设备上的接口;
所述控制设备根据所述第二接口确定所述第一结构化平面中通过迁移后的所述第一VM布放的VPN业务的N条业务路径,其中,不同的功能需求对应不同的流量子模型,每种流量子模型对应一套配置模板,所述N为大于0的整数;
所述控制设备从所述N条业务路径中确定满足所述VPN业务的SLA要求的第二最优路径;
所述控制设备根据所述不同网元的功能需求为所述第二最优路径上的第二关键网元生成第二网元配置信息,所述第二网元配置信息包括所述第二关键网元所属流量子模型对应的配置模板;
所述控制设备向所述第二关键网元发送所述第二网元配置信息,所述第一网元配置信息用于所述第一关键网元进行自动化配置。
该种可能的实现方式中,在VM迁移后,VM上布放的业务也随时迁移。
在第一方面的一种可能的实现方式中,该方法还可以包括:
所述还控制设备还获取业务的服务等级协议SLA的需求;
所述控制设备根据所述SLA的需求确定至少一个结构化平面,其中,不同的SLA的需求对应不同的结构化平面。
在第一方面的一种可能的实现方式中,该方法还可以包括:
所述控制设备获取与第一结构化平面对应的第一意图信息,所述第一意图信息包括所述第一结构化平面中一对核心汇聚网元的信息和所述一核心汇聚网元的第一内部网关协议IGP进程标识,所述第一结构化平面为所述至少一个结构化平面中的任意一个;
所述控制设备根据所述一对核心汇聚网元的信息在所述第一结构化平面中从所述一对核心汇聚网元开始查找与所述第一IGP进程标识在同一个IGP域的网元和链路,以确定出汇聚类型的结构化区域,所述汇聚类型的结构化区域的拓扑图是所述第一结构化平面的连通图中的一个连通子图;
所述控制设备根据所述汇聚类型的结构化区域确定至少一个接入类型的结构化区域。
在第一方面的一种可能的实现方式中,上述步骤:控制设备根据所述汇聚类型的结构化区域确定至少一个接入类型的结构化区域,可以包括:
所述控制设备确定所述汇聚类型的结构化区域中各网元的角色;
所述控制设备在所述第一结构化平面中扣减所述汇聚类型的结构化区域中的链路,以得到至少一个互相不连通的子图;
针对每个互相不连通的子图,从所述汇聚类型的结构化区域中的第一网元开始查找与第二IGP进程标识在同一个IGP域的网元和链路,以得到至少一个接入类型的结构化区域,其中,所述第一网元以及链路,以及与第二IGP进程标识在同一个IGP域的网元和链路构成一个连通子图,不同互相不连通的子图所构成的接入类型的结构化区域的IGP域不同,所 述第一网元为连接边数大于2的任意一个接入角色的网元。
在第一方面的一种可能的实现方式中,上述步骤:控制设备根据所述汇聚类型的结构化区域确定至少一个接入类型的结构化区域,包括:
所述控制设备确定所述汇聚类型的结构化区域中各网元的角色;
所述控制设备获取所述汇聚类型的结构化区域的第二意图信息,所述第二意图信息包括所述汇聚类型的结构化区域中的至少一对接入角色的网元的信息和与每对接入角色的网元对应的IGP进程标识;
所述控制设备根据第一对接入角色的网元的信息在所述第一结构化平面中从所述第一对接入角色的网元开始查找与所述第一对接入角色的网元对应的第三IGP进程标识在同一个IGP域的网元和链路,以确定出与所述第三IGP进程标识对应的接入类型的结构化区域,所述第一对接入角色的网元是所述至少一对接入角色的网元中的任意一对,且每对接入角色的网元所对应的IGP进程标识不相同。
本申请第二方面提供一种控制设备,用于执行上述第一方面或第一方面的任意可能的实现方式中的方法。具体地,该控制设备包括用于执行上述第一方面或第一方面的任意可能的实现方式中的方法的模块或单元。
本申请第三方面提供一种控制设备,包括:至少一个处理器、存储器、收发器以及存储在存储器中并可在处理器上运行的计算机执行指令,当所述计算机执行指令被所述处理器执行时,所述处理器执行如上述第一方面或第一方面任意一种可能的实现方式所述的方法。
本申请第四方面提供一种存储一个或多个计算机执行指令的计算机可读存储介质,当所述计算机执行指令被处理器执行时,所述处理器执行如上述第一方面或第一方面任意一种可能的实现方式所述的方法。
本申请第五方面提供一种存储一个或多个计算机执行指令的计算机程序产品,当所述计算机执行指令被所述处理器执行时,所述处理器执行上述第一方面或第一方面任意一种可能实现方式的方法。
上述第二方面至第五方面所描述的控制设备也可以是应用于控制设备中的芯片,或者其他具有上述控制设备功能的组合器件、部件等。
其中,第二方面至第五方面或者其中任一种可能实现方式所带来的技术效果可参见第一方面或第一方面不同可能实现方式所带来的技术效果,此处不再赘述。
附图说明
图1是本申请实施例中网络管理系统的一实施例示意图;
图2是本申请实施例中结构化平面的一示例示意图;
图3是本申请实施例中承载网的结构化区域的一示例示意图;
图4是本申请实施例中承载网的结构化区域的另一示例示意图;
图5是本申请实施例中承载网的结构化区域的另一示例示意图;
图6是本申请实施例中默认类型的结构化区域的一示例示意图;
图7是本申请实施例中数据中心类型的结构化区域的一示例示意图;
图8是本申请实施例中云网共管的一结构化区域的一示例示意图;
图9是本申请实施例中确定接入类型的结构化区域的一示例示意图;
图10是本申请实施例中确定接入类型的结构化区域的另一示例示意图;
图11是本申请实施例中网络管理的一实施例示意图;
图12是本申请实施例中网络管理的另一实施例示意图;
图13是本申请实施例中网络管理的另一实施例示意图;
图14是本申请实施例中网络管理的另一实施例示意图;
图14A是本申请实施例中一流量子模型示意图;
图14B是本申请实施例中另一流量子模型示意图;
图14C是本申请实施例中另一流量子模型示意图;
图14D是本申请实施例中一可用流量模型示意图;
图15是本申请实施例中一路径示例示意图;
图16是本申请实施例中网络管理的另一实施例示意图;
图17是本申请实施例中单层网络的一示例示意图;
图18是本申请实施例中网络管理的另一实施例示意图;
图19是本申请实施例中DC网络的一示例示意图;
图20是本申请实施例中网络管理的另一实施例示意图;
图21是本申请实施例中控制设备的一实施例示意图;
图22是本申请实施例中控制设备的另一实施例示意图。
具体实施方式
下面结合附图,对本申请的实施例进行描述,显然,所描述的实施例仅仅是本申请一部分的实施例,而不是全部的实施例。本领域普通技术人员可知,随着技术的发展和新场景的出现,本申请实施例提供的技术方案对于类似的技术问题,同样适用。
本申请的说明书和权利要求书及上述附图中的术语“第一”、“第二”等是用于区别类似的对象,而不必用于描述特定的顺序或先后次序。应该理解这样使用的数据在适当情况下可以互换,以便这里描述的实施例能够以除了在这里图示或描述的内容以外的顺序实施。此外,术语“包括”和“具有”以及他们的任何变形,意图在于覆盖不排他的包含,例如,包含了一系列步骤或单元的过程、方法、系统、产品或设备不必限于清楚地列出的那些步骤或单元,而是可包括没有清楚地列出的或对于这些过程、方法、产品或设备固有的其它步骤或单元。
本申请实施例提供本申请实施例提供一种网络管理的方法,可以基于网络的结构化平面对网络中的设备和业务进行自动化的上线管理。本申请实施例还提供了相应的控制设备。以下分别进行详细说明。
本申请实施例中,为了更自动化的管理网络,可以将网络划分成不同的结构化平面(fabric plane)。每个结构化平面基于预规划的网络分层结构可以划分为多个不同的结构化区域(fabric area)。
本申请实施例中,网络管理的任务由控制设备来执行,如图1所示,控制设备会对一定范围内的网络进行管理。例如:一个省份内配置一个控制设备,由该控制设备管理该省份的网络。在做结构化划分时,控制设备获取所管理网络范围内的网络拓扑和预规划的网 络分层结构;所述控制设备为所述网络拓扑确定至少一个结构化平面,其中,不同的结构化平面所关联的网络资源不同,且不同的结构化平面中的转发资源隔离,即使网络中存在没有被划分为结构化平面其他资源,结构化平面也与这部分没被划分为结构化平面资源隔离。针对这种结构化平面的划分方式,各结构化平面之间不存在交叉,可以有效的实现一网多用。
结构化平面是一组网元和链路的集合,以及与该集合绑定的网络配置资源池称为一个结构化平面。一个结构化平面内的网元和链路组成一个连通图。一个网络拓扑可划分为一到多个结构化平面,每个结构化平面可以定义不同的设备范围、接口资源等。
针对每个结构化平面,控制设备根据所述预划分的网络分层结构可以确定至少一种类型的结构化区域(fabric area)。
在一个结构化平面内,提供某种抽象网络能力的一组网元和链路称为一个结构化区域。一个结构化区域的网元和链路是其所属结构化平面内的一个连通子图。结构化区域提供抽象网络功能,该抽象网络功能是结构化区域对其自身转发能力的承诺(assurance)。对于抽象网络功能的使用者,不再需要关注结构化区域内部的连接方式和拓扑结构。
下面结合附图介绍结构化平面(fabric plane)和结构化区域(fabric area)。
控制设备可以获取如图1所示的网元及链路所形成的网络拓扑,该网络拓扑是承载网的一网络拓扑,实际上,本申请实施例中的网络拓扑不限于是承载网的网络拓扑,也可以是其他类型的网络拓扑,例如单层网络拓扑或数据中心网络拓扑。
控制设备可以对图1所示的网络拓扑可以划分为逻辑上相互隔离的多个结构化平面。例如:控制设备可以将图1所述的网络拓扑划分为图2所示的Fabric Plane M和Fabric Plane N两个不同的结构化平面。
在划分结构化平面时,控制设备可以为每个结构化平面灵活定义其包含的网元集合,如图2中的Fabric Plane N包含图1所示的网络拓扑中的全部网元,而Fabric Plane M中不包含网元基站侧网关(cell site gateway,CSG)1和CSG2。
由图2中也可以看出,在划分结构化平面时,相同的网元可以属于不同的Fabric平面,如图2中的网元CSG4,其既属于Fabric Plane M又属于Fabric Plane N。
Fabric Plane M和Fabric Plane N两个结构化平面所关联的网络资源不同,且不同的结构化平面中的转发资源隔离。
连接在同一个Fabric平面的基站间互通使用该Fabric平面内的转发资源,如:子接口集合、网络分片、链路带宽、虚拟专用网络(virtual private network,VPN)实例等。
连接在不同Fabric平面间的两个基站间互通只能通过第三方转发完成,如图2中的基站1和基站3互通需要通过新一代核心网(new generation core,NGC)转发,尽管物理上基站1和基站3都通过CSG3接入网络。
一个Fabric平面可以承载一种或多种VPN业务。在典型的5G承载网场景下,近似的业务尽量部署在一个Fabric平面内。即:在同一个网络内,通过划分不同的Fabric平面,不同服务等级协议(service level agreement,SLA)需求的业务可以使用不同的链路转发资源和不同的网络承载技术。在确定结构化平面之前,控制设备还获取业务的服务等级协议SLA的需求;然后根据所述SLA的需求确定至少一个结构化平面,其中,不同的SLA的需求对应不同的结构化平面。当然,在确定结构化平面时,也不限于SLA的需求这一种方式,也可以根据其他需求或规则来确定结构化平面。
对于每个Fabric平面,都可以进一步再做Fabric区域的规划,一个Fabric平面上可以包括至少一个Fabric区域。如图3所示的结构化区域示意图中所示出的Fabric Area 0、Fabric Area 1和Fabric Area 2是三个不同的Fabric区域。
控制设备可以为每个Fabric区域灵活定义其包含的网元集合,如图3中的Fabric area1中包含汇聚侧网关(aggregate site gateway,ASG)1、ASG2和CSG1、CSG2、CSG3、CSG4、CSG5共7个网元。相同网元可以同时属于多个Fabric区域,如图3中的ASG1,其既属于Fabric area 0又属于Fabric area 1。每个Fabric区域内的网络拓扑都是一个连通子图,每个Fabric区域内的网元都属于相同的内部网关协议(interior gateway protocol,IGP)域。连通子图是相对于Fabric的连通图来说的。连通图是指在一个图G中,若从顶点i到顶点j有路径相连,则称i和j是连通的。连通子图是指如果图G`的所有定点和边都属于图G,则G`是G的子图。IGP域是指位于同一个IGP范围内,同一个IGP域的网元的IGP进程标识可以不同。IGP进程标识可以是IGP进程号,也可以是IGP的其他标识信息。
如图3中,ASG1、ASG2和CSG1、CSG2、CSG3、CSG4、CSG5都在相同的IGP域内且互相连通,可以归集到一个Fabric区域(Fabric area 1)中。同理,如果采用不同的IGP域规划方式,则Fabric区域的范围也不同。如图4中,核心区域边界路由器(core-area border router,C-ABR)1、C-ABR2和ASG8、ASG6、ASG1、ASG2以及CSG1、CSG2、CSG3、CSG4、CSG5处于相同的IGP域内且互相连通,则此时Fabric area 1应包含以上全部这些网元。
Fabric区域对外承诺抽象的网络能力,Fabric区域对内采用相同的承载技术。如一种可能的情况下,Fabric area 1承诺任何从CSG网元接入的业务都有300Mb上行带宽,同时,Fabric area 1内的CSG网元通过配置有带宽保障的分段路由流量工程(segment routing-traffic engineering,SR-TE)隧道达成该承诺。
根据Fabric区域在转发过程中所属的层次和网络拓扑,控制设备可以将Fabric区域分成四种类型:接入(access)类型、汇聚(aggregate)类型、默认(default)类型、数据中心(data centre,DC)类型。每种类型的Fabric area只承诺对应的业务转发能力。
当所述网络拓扑为分层的承载网拓扑时,所述结构化区域的类型包括汇聚类型和接入类型。如图5所示,Fabric Area 0是Aggregate类型的结构化区域,Fabric Area 1和Fabric Area 2是Access类型的结构化区域。其中,Access类型的结构化区域间转发需要经过Aggregate类型的结构化区域,接入Access类型的结构化区域的业务上行转发需要经过Aggregate类型的结构化区域。
以上描述了分层的承载网的区域类型,对于不分层的简单网络,也可以称为单层网络。当所述网络拓扑为单层网络拓扑时,所述结构化区域的类型为默认类型。如图6所示,一个Fabric平面包括一个是默认类型的结构化区域。同样,该默认类型的Fabric区域内的网元和链路拓扑是一个连通图,且所有网元属于一个IGP域。
当所述网络拓扑为数据中心网络拓扑时,所述结构化区域的类型为数据中心类型。对于数据中心网络拓扑,如图7所示,一个Fabric平面包括一个DC类型的Fabric区域。同样,该DC类型的Fabric区域内的网元和链路拓扑是一个连通图,且所有网元属于一个IGP域;特别地,DC类型的Fabric Area的拓扑应同时符合Spine-leaf结构。
需要说明的是,不同类型的Fabric区域可以组合。当网络拓扑为云网共管网络拓扑时,所述结构化区域的类型包括汇聚类型、接入类型和数据中心类型,所述云网共管网络拓扑为所述分层的承载网拓扑和所述数据中心网络拓扑的组合。如图8所示,5G承载网结构是 Access与Aggregate类型的Fabric区域的组合。此时,如果需要与边缘DC(edge DC)共管,则可能出现三种Fabric区域级联的场景。
对于Fabric区域内部的网元,如果不同的网元在转发过程中起到的作用不同,则还需要区分网元角色(network entity role)。网元角色分三种:接入角色(access role)、边界角色(border role)、透传角色(deliver role)。
其中,接入角色:转发过程中,当一个网元接收本Fabric区域外的流量并转发至本Fabric区域中的边缘角色的网元时,其在Fabric区域内为接入角色;典型的,接入类型Fabric区域中,CSG网元一般充当接入角色。
边界角色(Border Role):转发过程中,当一个网元接收本Fabric区域中的流量并转发至其它Fabric区域中时,其在本Fabric区域内为边界角色;典型的,接入类型Fabric区域中,ASG网元一般充当边界角色。
默认类型的Fabric区域:区域内所有网元的角色都为接入角色。
接入类型的Fabric区域:区域内含有一个到多个接入角色的网元,两个出口节点为边界角色的网元,以及0至多个透传角色的网元;其中边界角色的网元需要标识主备。
汇聚类型的Fabric区域:区域内含有一个到多个接入角色的网元,两个出口节点为边界角色的网元,以及0至多个透传角色的网元;其中边界角色的网元需要标识主备。
DC类型的Fabric区域:区域内含一个到多个接入角色的网元,两个出口节点为边界角色的网元,且需要标识主备。DC类型Fabric区域内,叶子(leaf)网元一般作为接入角色,主干(spine)/网关(gateway,GW)网元一般作为边界角色。
边界角色的网元的转发能力一般强于接入角色的网元,当一个网元属于多个Fabric区域时,其在不同的Fabric区域中的角色可能相同,也可能不同。
以上介绍了结构化区域的四种类型,下面介绍这四种类型的结构化区域的确定过程。
针对承载网的结构化平面,控制设备根据所述预划分的网络分层结构确定至少一种类型的结构化区域可以包括确定汇聚类型的结构化区域和确定接入类型的结构化区域两部分。
其中,控制设备确定汇聚类型的结构化区域的过程可以包括:
所述控制设备获取与第一结构化平面对应的第一意图信息,所述第一意图信息包括所述第一结构化平面中一对核心汇聚网元的信息和所述一核心汇聚网元的第一内部网关协议IGP进程标识,所述第一结构化平面为所述至少一个结构化平面中的任意一个;
所述控制设备根据所述一对核心汇聚网元的信息在所述第一结构化平面中从所述一对核心汇聚网元开始查找与所述第一IGP进程标识在同一个IGP域的网元和链路,以确定出汇聚类型的结构化区域,所述汇聚类型的结构化区域的拓扑图是所述第一结构化平面的连通图中的一个连通子图;
所述控制设备根据所述汇聚类型的结构化区域确定至少一个接入类型的结构化区域。
该种可能的实现方式中,意图信息用于表示网管人员或用户对结构化区域的划分打算。一对核心汇聚网元的信息可以是如图3或图4中的移动汇聚业务网关(mobile aggregate service gateway,MASG)1和MASG2的信息,如:MASG1和MASG2的设备标识,或者互联网协议(internet protocol,IP)地址等信息。MASG1的IGP进程标识与MASG2的IGP进程标识可以相同,也可以不同。但MASG1和MASG2的IGP进程标识都属于同一IGP域。IGP域表示的是一个范围。
根据所述一对核心汇聚网元的信息在所述第一结构化平面中从所述一对核心汇聚网元开始查找与所述第一IGP进程标识在同一个IGP域的网元和链路,以确定出汇聚类型的结构化区域的过程。
以图3为例可以理解为从MASG1和MASG2开始,与MASG1和MASG2的进程标识位于同一个IGP域的中间系统到中间系统(intermediate system to intermediate system,ISIS)process N的网元有C-ABR1、C-ABR2、ASG8、ASG1、ASG2、ASG6、ASG7、ASG3、ASG4和ASG5。
以图4为例可以理解为从MASG1和MASG2开始,与MASG1和MASG2的进程标识位于同一个IGP域的ISIS process N的网元有C-ABR1和C-ABR2。
确定出汇聚类型的结构化区域后,所述控制设备根据所述汇聚类型的结构化区域确定至少一个接入类型的结构化区域可以有两种方案。
其中,方案一:
所述控制设备确定所述汇聚类型的结构化区域中各网元的角色;
所述控制设备在所述第一结构化平面中扣减所述汇聚类型的结构化区域中的链路,以得到至少一个互相不连通的子图;
针对每个互相不连通的子图,从所述汇聚类型的结构化区域中的第一网元开始查找与第二IGP进程标识在同一个IGP域的网元和链路,以得到至少一个接入类型的结构化区域,其中,所述第一网元以及链路,以及与第二IGP进程标识在同一个IGP域的网元和链路构成一个连通子图,不同互相不连通的子图所构成的接入类型的结构化区域的IGP域不同,所述第一网元为连接边数大于2的任意一个接入角色的网元。
该方案一中,以图9为例,网络已归集部分也就是所确定的汇聚类型的结构化区域,该汇聚类型的结构化区域的IGP域的标识信息为ISIS process 100,图9中示出的汇聚类型的结构化区域包括ASG1、ASG2、ASG3、ASG4、ASG5和ASG6这6个网元,这6个网元中ASG1、ASG2、ASG3和ASG4都属于接入角色的网元,ASG5和ASG6是边界角色的网元。在汇聚类型的结构化区域中,只有接入角色的网元才能成为接入类型的结构化区域中的网元。
从图9所示的结构化平面的拓扑中扣减掉汇聚类型的结构化区域的链路,对于未归集部分就会得到两个互相不连通的子图,这两个子图也就是网络未归集部分,也就是要确定的接入类型的结构化区域。这两个子图中的第一个子图因为ASG1和ASG2间的链路被扣减,从而导致这个子图不能连通。第二个子图因为ASG3和ASG4间的链路被扣减,从而导致这个子图不能连通。所以,在确定接入类型的结构化区域时,在汇聚类型的结构化区域的网元中选取边>2的网元,在图9所示的汇聚类型的结构化区域中,忽略链路扣减,ASG1、ASG2、ASG3和ASG4的连接边数都有3个,也就是连接的边数都大于2。所以针对第一个不连通的子图可以从ASG1或ASG2开始查找与ASG1或ASG2的进程标识在同一个IGP域的网元,分别找到了CSG1、CSG2、CSG3、CSG4和CSG5。这样,再加上ASG1和ASG2之间的链路,就确定了一个IGP域的标识是ISIS process 1的接入类型的结构化区域。针对第二个不连通的子图可以从ASG3或ASG4开始查找与ASG3或ASG4的进程标识在同一个IGP域的网元,分别找到了CSG6、CSG7、CSG8、CSG9和CSG10。这样,再加上ASG3和ASG4之间的链路,就确定了一个IGP域的标识是ISIS process 2的接入类型的结构化区域。
通过自动计算,控制设备得到网络归集后的信息如下:
Figure PCTCN2020111700-appb-000001
Figure PCTCN2020111700-appb-000002
方案二:
所述控制设备确定所述汇聚类型的结构化区域中各网元的角色;
所述控制设备获取所述汇聚类型的结构化区域的第二意图信息,所述第二意图信息包括所述汇聚类型的结构化区域中的至少一对接入角色的网元的信息和与每对接入角色的网元对应的IGP进程标识;
所述控制设备根据第一对接入角色的网元的信息在所述第一结构化平面中从所述第一对接入角色的网元开始查找与所述第一对接入角色的网元对应的第三IGP进程标识在同一个IGP域的网元和链路,以确定出与所述第三IGP进程标识对应的接入类型的结构化区域,所述第一对接入角色的网元是所述至少一对接入角色的网元中的任意一对,且每对接入角色的网元所对应的IGP进程标识不相同。
该方案二与方案一的区别是不采用扣减链路的方式,而是根据网管人员或用户指定的意图信息确定接入类型的结构化区域。该意图信息中会包括至少一对接入角色的网元的信息,如图9中,若第二意图信息中包括了ASG1和ASG2的信息,以及ASG1和ASG2的IGP进程标识,则控制设备可以从ASG1和ASG2开始,查找与ASG1和ASG2的IGP进程标识在同一个IGP域的网元,通过查找可以确定CSG1、CSG2、CSG3、CSG4和CSG5与ASG1和ASG2在同一个IGP域ISIS process 1,则确定了一个接入类型的结构化区域。另外,若该第二意图信息中包括了ASG3和ASG4的信息,以及ASG3和ASG4的IGP进程标识,则控制设备可以从ASG3和ASG4开始,查找与ASG3和ASG4的IGP进程标识在同一个IGP域的网元,通过查找可以确定CSG6、CSG7、CSG8、CSG9和CSG10与ASG3和ASG4在同一个IGP域ISIS process 2,则确定了另一个接入类型的结构化区域。
该第二种方案中,也可以是用户指定一对ASG设备和一对下行接口时,还可以指定这个接入类型的Fabric区域的名称和IGP process id。
如图10所示,第二意图信息中包括了要创建的接入类型的结构化区域的名称为:Fabric_acc3。指定的一对设备为ASG5和ASG6,并指定了ASG6为主边界设备,ASG5为从边界设备。ASG5和ASG6的下行接口标识都为port 1/0/1。指定的IGP process id为ISIS 3。
对于默认类型的结构化区域的确定过程可以是:
所述控制设备获取第二结构化平面对应的第三意图信息,所述第三意图信息包括一对设备的信息和所述一对设备的第四IGP进程标识,所述第二结构化平面为所述至少一个结构化平面中的任意一个;
所述控制设备根据所述一对设备的信息在所述第二结构化平面中从所述一对设备开始查找与所述第四IGP进程标识在同一个IGP域的设备和链路,以确定出默认类型的结构化区域,所述默认类型的结构化区域的稀疏连通图为所述所管理网络范围内的网络拓扑的一个子集。
默认类型的结构化区域的确定可以参阅图6进行理解,如图6中,第三意图信息中可以 包括RSG1和RSG2的信息,然后查找与RSG1和RSG2的IGP进程标识ISIS process M属于同一IGP域的其他网元,通过查找确定出ASG1、ASG2、CSG1、CSG2和CSG3都与RSG1和RSG2的IGP进程标识属于同一IGP域。则确定出默认类型的Fabric Area0。
对于DC类型的结构化区域的确定过程可以是:
所述控制设备获取第三结构化平面对应的第四意图信息,所述第四意图信息包括主干网元的信息、叶子网元的信息和数据中心网关的信息;
所述控制设备根据所述主干网元的信息和所述叶子网元的信息确定所述主干网元和所述叶子网元之间的链路,根据所述主干网元的信息和所述数据中心网关的信息确定所述主干网元和所述数据中心网关之间的链路,以确定出数据中心类型的结构化区域。
DC类型的结构化区域的确定可以参阅图7进行理解,如图7中,第四意图信息包括主干网元(spine)的信息、叶子网元(leaf)的信息,图7中未示出数据中心网关,实际上,DC类型的结构化区域还包括数据中心网关。上述spine与leaf,数据中心网关与spine或者spine与leaf之间的链路确定后,就确定了DC类型的结构化区域。DC类型的结构化区域中的spine、leaf和数据中心网关也是属于同一IGP域的,图7中示出的Fabric Area0的IGP域标识是ISIS process M。
云网共管场景的结构化区域的确定,可以结合上述承载网和数据中心网确定结构化区域的过程进行理解。
上述实施例描述了结构化平面和结构化区域,下面描述基于结构化平面所实现的网络管理的方法。
参阅图11,本申请实施例提供的网络管理的方法的一实施例可以包括:
101、控制设备接收设备上线的信息。
该设备上线的信息可以是上线设备所接入的网关设备上报给控制设备的。
该设备上线的信息包括上线设备的位置信息。
102、控制设备根据所述上线设备的位置信息确定所述上线设备属于或接入所述控制设备所管理网络范围内网络拓扑的第一结构化平面。
所述网络拓扑被规划为至少一个结构化平面,其中,第一结构化平面所关联的转发资源与所述第一结构化平面之外的转发资源隔离。
该上线设备的位置信息可以是该上线设备所插入的设备的接口信息,例如:CSG2插入CSG1的第一接口,那么该位置信息就可以为CSG1的第一接口的信息。控制设备根据该上线设备所插入的网关设备的接口信息就可以确定出该上线设备所属的结构化平面。
上线设备属于所述控制设备所管理网络范围内网络拓扑的第一结构化平面时,该上线设备可以接入类型的结构化区域中的网关设备。该上线设备也可以是默认类型的结构化区域中的网关设备。
上线设备接入所述控制设备所管理网络范围内网络拓扑的第一结构化平面表示该上线设备不属于该第一结构化平面,但可以与该第一结构化平面中的设备连接,从而进行通信。该上线设备在接入承载网时可以是基站,在接入DC网络时,可以是虚拟机(virtual machine,VM)。
103、控制设备根据所述第一结构化平面确定所述上线设备的配置信息。
前述介绍结构化平面时已经介绍过,每个结构化平面都会管理一个资源池,控制设备可以基于该结构化平面所管理的资源池为该上线设备分配资源,从而生成相应的配置信 息。
104、控制设备向所述上线设备发送所述配置信息,所述配置信息用于所述上线设备进行自动化上线配置。
控制设备可以通过上线设备所接入的网关设备下发该配置信息。
105、上线设备在接收到配置信息后,进行自动化上线配置。
本申请实施例提供的方案,控制设备可以基于该结构化平面对上线设备进行自动化管理。在设备上线后,控制设备可以为该上线设备确定配置信息,该配置信息用于上线设备的自动化上线配置,从而实现了对设备上线的自动化管理,提高了网络管理效率。
以上图11所对应的实施例,从整体上做了描述,下面分别介绍:
1、归属于承载网的接入类型的结构化区域中的接入设备自动化上线和自动化下线过程。
2、接入承载网的基站自动化上线过程和基于该基站的VPN业务的自动化上线过程。
3、归属于默认类型的结构化区域中的接入设备自动化上线和自动化下线过程。
4、接入DC网络的VN自动化上线过程、基于VM的业务自动化上线和VM迁移的过程。
下面依次进行介绍。
1、归属于承载网的接入类型的结构化区域中的接入设备自动化上线和自动化下线过程。
参阅图12,归属于承载网的第一接入设备上线时的方案可以包括:
201、控制设备接收到第一接入设备上线的信息。
所述上线的信息可以包括所述第一接入设备的位置信息,该位置信息可以是第一接入设备所接入的网关设备的接口的信息,如接口标识等。
202、控制设备获取模板过滤信息。
该模板过滤信息可以是在网络规划时预先配置好的,模板过滤信息可以是公网信息或私网信息。公网和私网各自对应一个上线参数模板。当然,模板过滤信息不限于公网信息或私网信息,还可以有其他信息,但无论模板过滤信息包括哪些内容,都会对应有一个上线参数模板。
203、控制设备根据所述第一接入设备的位置信息确定所述第一接入设备所属的接入类型的第一结构化区域,以及所述第一接入设备在所述第一结构化区域中的角色。
控制设备根据第一接入设备所接入的接口可以确定该接口资源所属的第一结构化平面中的结构化区域。上线设备的角色通常都为接入角色的网元。
204、控制设备根据模板过滤信息,确定所述第一接入设备的上线参数模板和预置的网元登录参数。
若模板过滤信息是公网信息,则确定该公网信息所对应的上线参数模板。若模板过滤信息是私网信息,则确定该私网信息所对应的上线参数模板。
预置的网元登录参数可以是用户名和密码等。
205、控制设备根据所述第一结构化区域分配所述第一接入设备的内部网关协议IGP进程号、所述第一接入设备的链路互联网协议IP地址、所述第一接入设备的标识或所述第一接入设备的名称,其中,包含于第一结构化区域的所有设备属于同一个IGP域。
一个结构化平面会对应一个资源池,资源池中包括该平面中上线网元可以使用的资源,如:地址资源、名称资源、IGP进程资源等。第一接入设备的标识可以是第一接入设 备的IP地址。因为每个结构化区域的IGP域不同,所以控制设备会根据第一接入设备所属的结构化区域做资源分配。
206、控制设备将所述预置的网元登录参数、所述第一接入设备的角色、所述IGP进程号、所述第一接入设备的链路IP地址、所述第一接入设备的标识或所述第一接入设备的名称填写到所述上线参数模板,以得到用于所述第一接入设备的上线的配置信息。
上述回填信息的过程用字段的形式可以表示为:
Figure PCTCN2020111700-appb-000003
其中,NE表示网络单元(network entity)。
207、控制设备向所述第一接入设备发送所述配置信息。
208、第一接入设备根据所述配置信息在所述接入类型的结构化区域内自动上线。
在第一接入设备上线后,第一接入设备所在的接入类型的结构化区域的网元和链路关系就发生了变化,这样控制设备需要根据所述第一接入设备的链路关系更新所述第一接入设备所接入的所述接入类型的结构化区域的连通子图。
设备下线过程可以为:
当所述第一结构化区域中第二接入设备下线时,所述控制设备确定变更网元的变更配置信息,所述变更网元为所述第二接入设备下线而产生配置信息变化的网元;
所述控制设备向所述变更网元发送所述变更配置信息,所述变更配置信息用于所述变更网元进行自动化更新配置。
当所述接入类型的结构化区域中第二接入设备下线时,所述控制设备获取所述第二接入设备的链路关系,所述控制设备在所述接入类型的结构化区域对应的第一连通子图中删除所述第二接入设备和其对应的链路关系,并重新建立所述第一连通子图中剩余网元的链路关系,以得到第二连通子图。
相对于现有技术中设备上线过程中需要每个环节串行手动确认,全程需3至10天,流转时间不可控而且错误多相比,本申请实施例提供的设备自动上线的方案不需要人工干 预,全程可以实现自动化的上线配置,不仅简单而且方便快捷准确度高。
本申请实施例提供的接入设备自动化下线的方案,在接入设备下线后,可以针对发生配置变化的网元自动更新这些变更网元的变更配置信息,从而实现配置信息的自动化更新。另外还会自动更新连通子图,不需要人工参与,提高了设备下线时网络管理的效率。
2、接入承载网的第一基站自动化上线过程和基于该第一基站的VPN业务的自动化上线过程。
下面参阅图13介绍第一基站上线的过程:
301、第一基站插入第三接入设备的接口后,第三接入设备向控制设备发送第一基站上线的信息。对应地,控制设备获取到第一基站上线的信息。
所述第一基站上线信息中包括所述第一基站在所述接入类型的结构化区域上所接入的第三接入设备的接口信息和所述第一基站的电子序列号(electronic serial number,ESN)。其中,第三接入设备的接口信息可以是第三接入设备的接口标识。
302、控制设备根据所述第三接入设备的接口信息和所述第一基站的ESN为所述第一基站分配第一IP地址和第一掩码,为所述接口信息所指示的接口分配第二IP地址和第二掩码。
所述第一IP地址和所述第二IP地址属于同一个网段。该过程可以是所述控制设备根据所述第三接入设备的接口信息和所述第一基站的ESN确定所述第三接入设备所属的结构化平面所关联的资源池,所述资源池包括所述第三接入设备所属的结构化平面对应设备可分配的IP地址和掩码;控制设备根据所述资源池为所述第一基站分配第一IP地址和第一掩码,为所述接口信息所指示的接口分配第二IP地址和第二掩码。
303、控制设备向动态主机配置协议(dynamic host configuration protocol,DHCP)服务器发送所述第一基站的ESN、所述第一IP地址和所述第一掩码。
304、DHCP服务器通过第三接入设备向第一基站发送所述第一IP地址和所述第一掩码。
305、第一基站使用所述第一IP地址和所述第一掩码进行自动上线配置。
306、控制设备向所述第三接入设备发送所述第二IP地址和所述第二掩码。
307、第三接入设备使用所述第二IP地址和所述第二掩码进行所述接口与所述第一基站的互通配置。
参阅图14,基于第一基站进行业务上线的过程可以包括:
401、控制设备根据所述第一基站的ESN获取基于所述承载网的所述第一结构化平面的第一可用流量模型。
所述第一可用流量模型包括基站与互联网通信的流量子模型、网管流量子模型和基站与基站通信的流量子模型;
该种可能的实现方式中,第一基站与互联网通信的流量子模型可以称为N2/N3业务流量模型,网管流量模型可以称为(orchestrator mangment,OM)管理流量子模型,第一基站与其他基站通信的流量模型可以称为Xn业务流量子模型。
N2/N3业务流量子模型可以在控制设备上设计如图14A所示的连接关系:
图14A中,含有两种接入点类型,第一基站和NGC;NGC侧接入点类型为Hub,第一基站侧接入点类型为Spoke;接入点最终会被实例化为一个或一对接入设备。图14A中,含有两种Fabric区域类型,Access型和Aggregate型;第一基站接入侧spoke点在Access类型的 Fabric区域中;NGC接入侧hub点在Aggregate类型的Fabric区域中,两个Fabric区域中间的Hub作为VPN业务跨层的中继节点。Fabric区域类型最终会被指定到具体的一个Access类型的Fabric区域和一个Aggregate类型的Fabric区域中去。
OM管理流量模型可以在控制设备上设计如图14B所示的连接关系,Xn业务流量模型可以在控制设备上设计如图14C所示的连接关系。图14B和图14C中所表达的连接关系与图14A相似,可以参阅上述图14A对应的相应描述进行理解。
402、控制设备根据所述第一可用流量模型确定所述第一结构化平面中不同网元的功能需求,并确定所述第一结构化平面中满足通过所述第一基站布放的虚拟专用网络VPN业务的至少一条业务路径。
其中,不同的功能需求对应不同的流量子模型,每种流量子模型对应一套配置模板;
在网络拓扑中,每个网元的功能需求是不同的,例如:图14D中Spoke1既承担着与互联网通信的任务,又承担与其他第一基站通信的任务,而Spoke2只承担与所以该Spoke1通信的任务。这种情况下,Spoke1既要配置第一基站与互联网通信的流量模型的配置模板,又要配置第一基站与第一基站通信的流量模型的配置模板。而Spoke2只需要配置第一基站与第一基站通信的流量模型的配置模板即可。
在网络中,从A点到达B点,可通行的路径可以有多条,例如:如图15所示,从海淀环保园到西直门的路径可以有多条。
403、控制设备从所述至少一条业务路径中确定满足所述VPN业务的服务等级协议SLA要求的最优路径。
路径有多条时,每条路径的SLA可能都不相同,例如:有的路径带宽大,时延小等,而有的路径带宽小,时延大。这样就可以根据各条路径的SLA选择一条最优路径。例如图15中,从海淀环保园到西直门的路径可以有路径1:海淀环保园-PE1-PE2-PE4-西直门,还可以有路径2:海淀环保园-PE1-PE3-PE5-西直门。路径1的SLA高于路径2,那么可以选路径1作为最优路径。
404、控制设备根据所述不同网元的功能需求为所述最优路径上的关键网元生成网元配置信息,所述网元配置信息包括所述关键网元所属流量子模型对应的配置模板。
关键网元可以是最优路径上的所有网元,也可以是部分网元。
在网络拓扑中,每个网元的功能需求是不同的,Spoke1既承担着与互联网通信的任务,又承担与其他第一基站通信的任务,而Spoke2只承担与所以该Spoke1通信的任务。这种情况下,Spoke1既要配置第一基站与互联网通信的流量模型的配置模板,又要配置第一基站与第一基站通信的流量模型的配置模板。而Spoke2只需要配置第一基站与第一基站通信的流量模型的配置模板即可。
405、控制设备向所述关键网元发送所述网元配置信息。
所述网元配置信息用于所述关键网元进行自动化配置。
相比对现有技术中根据工单中的业务诉求和网络参数,通过运维人员把它转化成业务配置脚本并下发配置的业务上线方案,本申请实施例提供的业务自动化上线的管理方案,速度快,而且准确度高。
3、归属于默认类型的结构化区域中的接入设备自动化上线和自动化下线过程。
对于中小型网络,由于设备数量少,接入需求相对简单,所以在网络建设时更倾向于 简化多层网络设计,设备间的通道一般可抽象为全连接(fullmesh)结构,连接数正比于设备数量的平方,设备数量的增加将导致设备间的通道管理困难。本申请实施例中将这种单层的简单网络规划为default类型的Fabric区域,可以有效的管理区域内的连接,实现网络变更的自动化管理。下面参阅图16介绍单层的简单网络的设备上线的过程。
如图16所示,本申请实施例提供的归属于默认类型的结构化区域中的接入设备自动化上线和自动化下线过程可以包括:
501、控制设备获取到所述默认类型的结构化区域中新增加了第四接入设备。
502、所述控制设备根据所述第四接入设备的位置信息确定所述第四接入设备接入所述第一结构化平面。
503、控制设备根据所述第一结构化平面为所述第四接入设备确定配置信息。
所述配置信息包括所述第四接入设备的IGP进程号、所述第四接入设备的链路IP地址、所述第四接入设备的标识或所述第四接入设备的名称。
第四接入设备所属的结构化平面会对应一个资源池,控制设备可以根据该资源池中的资源为第四接入设备分配上述配置信息。
504、控制设备向所述第四接入设备发送所述配置信息。
所述配置信息用于所述第四接入设备在所述默认类型的结构化区域中正常工作。
如图17所示,若该结构化平面中新增加的设备为路由器router7,则控制设备为router7发送配置信息,用于router7在所述默认类型的结构化区域中正常工作。
上述介绍的是简单网络的设备上线的过程,设备下线的过程其实可以包括:
当所述默认类型的结构化区域中第五接入设备下线时,所述控制设备确定变更网元的变更配置信息,所述变更网元为所述第五接入设备下线而产生配置信息变化的网元;
所述控制设备向所述变更网元发送所述变更配置信息,所述变更配置信息用于所述变更网元进行自动化更新配置。
另外,当所述默认类型的结构化区域中下线了第五接入设备时,所述控制设备获取所述第五接入设备的链路关系;
所述控制设备在所述默认类型的结构化区域对应的第一稀疏连通图中删除所述第五接入设备和其对应的链路关系,并重新建立所述第一稀疏连通图中剩余设备的链路关系,以得到第二稀疏连通图。
针对简单的单层网络,可以通过上述默认类型的结构化区域的划分来自动化管理设备上线和下线,从而提高了网络管理的效率。
4、接入DC网络的VN自动化上线过程、基于VM的业务自动化上线和VM迁移的过程。
DC网络的VPN业务是基于虚拟机(virtual machine,VM),下面结合VM的上线和迁移过程介绍DC网络的管理过程。
参阅图18,本申请实施例提供的网络管理的另一实施例可以包括:
601、控制设备获取到第一虚拟机VM上线的信息。
所述第一VM上线的信息包括所述第一虚拟机在所述数据中心类型的结构化区域上所接入的第六接入设备的第一接口的信息和所述第一VM所在的服务器的ESN、第一VM的标识,第一VM的媒体接入控制(media access control,MAC)地址。
602、控制设备根据所述第一VM的标识和所述第一接口的信息,以及预先记录的所述 第一VM的标识与第一逻辑接口的对应关系,建立所述第一逻辑接口与所述第一接口之间的对应关系。
所述控制设备根据所述第一接口的信息和所述第一VM所在的服务器的ESN、第一VM的标识,第一VM的MAC地址确定所述第六接入设备所属的结构化平面所关联的资源池,所述资源池包括所述第六接入设备所属的结构化平面可分配的IP地址。
所述控制设备根据所述资源池为所述第一VM分配第三IP地址。
603、控制设备根据所述第一接口的信息和所述第一VM所在的服务器的ESN、第一VM的标识,第一VM的MAC地址为所述第一VM分配第三IP地址。
604、控制设备向DHCP服务器发送所述第一VM的标识和所述第三IP地址。
605、DHCP服务器通过所述第六接入设备将第三IP地址传输到所述第一VM。
606、第一虚拟机使用所述第三IP地址进行自动上线配置。
以图19所示出的为例,图19是DC网络的一结构示意图。若该图19中虚拟机网络功能(virtual network function,VNF)1中的VM1表示第一虚拟机,则该VM1通过TOR1接入DC类型的结构化区域,TOR1可以通过图19中的spine节点和数据中心网关向控制器上报该VM1上线的信息,然后控制器会通过上述控制设备所执行的过程,为该VM1分配第三IP地址,该第三IP地址用于VM1进行自动上线配置。
在第一VM上线后,就可以基于该第一VM实现VPN业务的自动化上线过程。该过程可以参阅图20进行理解。
如图20所示,本申请实施例提供的基于该第一VM实现VPN业务的自动化上线过程可以包括:
701、控制设备根据所述第一VM所在的服务器的ESN获取基于所述第一结构化平面的第二可用流量模型。
所述第二可用流量模型包括所述VM与互联网通信的流量子模型和VM与VM通信的流量子模型。
702、控制设备根据所述第二可用流量模型确定所述第一结构化平面中不同网元的功能需求,并确定所述第一结构化平面中通过所述第一VM布放的VPN业务的M条业务路径。
其中,不同的功能需求对应不同的流量子模型,每种流量子模型对应一套配置模板,所述M为大于0的整数。
703、控制设备从所述M条业务路径中确定满足所述VPN业务的SLA要求的第一最优路径。
704、控制设备根据所述不同网元的功能需求为所述第一最优路径上的第一关键网元生成第一网元配置信息。
所述第一网元配置信息包括所述第一关键网元所属流量子模型对应的配置模板。
705、控制设备向所述第一关键网元发送所述第一网元配置信息。
所述第一网元配置信息用于所述第一关键网元进行自动化配置。
因为VM是一块虚拟化的资源,VM可能会发生迁移,在基于第一VM布放业务后,随着第一VM迁移,业务也会随之迁移。
虚拟机迁移过程中可以包括:
所述控制设备获取到所述第一VM迁移到第二接口,则删除所述第一逻辑接口与第一接口之间的对应关系,所述第二接口为所述第六接入设备或第七接入设备上的接口;
所述控制设备根据所述第二接口确定所述第一结构化平面中通过迁移后的所述第一VM布放的VPN业务的N条业务路径,其中,不同的功能需求对应不同的流量子模型,每种流量子模型对应一套配置模板,所述N为大于0的整数;
所述控制设备从所述N条业务路径中确定满足所述VPN业务的SLA要求的第二最优路径;
所述控制设备根据所述不同网元的功能需求为所述第二最优路径上的第二关键网元生成第二网元配置信息,所述第二网元配置信息包括所述第二关键网元所属流量子模型对应的配置模板;
所述控制设备向所述第二关键网元发送所述第二网元配置信息,所述第一网元配置信息用于所述第一关键网元进行自动化配置。
本申请实施例中,在虚拟机自动化上线的过程中,通过逻辑接口和实际的接入设备上的接口绑定的方式可以使得一个虚拟机对外只呈现一个逻辑接口,即使内部物理接口发生变化,用户也不感知,可以简化外部呈现。
关于上述VM上线和基于VM上线过程中所涉及的流量子模型和路径选择的过程可以参阅上述基站上线过程和业务自动化上线过程中的相应描述进行理解,本处不再重复赘述。
以上介绍了网络管理的方法,下面结合附图介绍本申请实施例中执行上述网络管理的控制设备。
如图21所示,本申请实施例提供的控制设备80的一实施例可以包括:
接收单元801,用于接收设备上线的信息,所述设备上线的信息包括上线设备的位置信息;
处理单元802,用于根据所述接收单元801接收的上线设备的位置信息确定所述上线设备属于或接入所述控制设备所管理网络范围内网络拓扑的第一结构化平面,并根据所述第一结构化平面确定所述上线设备的配置信息,所述网络拓扑被规划为至少一个结构化平面,其中,第一结构化平面所关联的转发资源与所述第一结构化平面之外的转发资源隔离;
发送单元803,用于向所述上线设备发送所述处理单元802确定的配置信息,所述配置信息用于所述上线设备进行自动化上线配置。
本申请实施例提供的方案,控制设备可以基于该结构化平面对上线设备进行自动化管理。在设备上线后,控制设备可以为该上线设备确定配置信息,该配置信息用于上线设备的自动化上线配置,从而实现了对设备上线的自动化管理,提高了网络管理效率。
一种可能的实现方式中,当所述第一结构化平面属于承载网时,所述第一结构化平面包括汇聚类型的结构化区域和接入类型的结构化区域;
当所述第一结构化平面属于单层网络时,所述第一结构化平面包括默认类型的结构化区域;
当所述第一结构化平面属于数据中心DC网络时,所述第一结构化平面包括DC类型的结构化区域;
当所述第一结构化平面属于云网共管的网络时,所述结构化区域的类型包括汇聚类型的结构化区域、接入类型的结构化区域和DC类型的结构化区域。
一种可能的实现方式中,所述处理单元802,还用于当所述第一结构化平面属于承载网或云网共管的网络,且所述上线设备为所述接入类型的结构化区域中的第一接入设备 时,获取模板过滤信息;
所述处理单元802用于:
根据所述第一接入设备的位置信息确定所述第一接入设备所属的接入类型的第一结构化区域,以及所述第一接入设备在所述第一结构化区域中的角色;
模板过滤信息,确定所述第一接入设备的上线参数模板和预置的网元登录参数;
根据所述第一结构化区域分配所述第一接入设备的内部网关协议IGP进程号、所述第一接入设备的链路互联网协议IP地址、所述第一接入设备的标识或所述第一接入设备的名称,其中,包含于第一结构化区域的所有设备属于同一个IGP域;
将所述预置的网元登录参数、所述第一接入设备的角色、所述IGP进程号、所述第一接入设备的链路IP地址、所述第一接入设备的标识或所述第一接入设备的名称填写到所述上线参数模板,以得到用于所述第一接入设备的上线的配置信息。
一种可能的实现方式中,所述处理单元802,还用于当所述第一结构化区域中第二接入设备下线时,确定变更网元的变更配置信息,所述变更网元为所述第二接入设备下线而产生配置信息变化的网元;
发送单元803,还用于发送所述变更配置信息,所述变更配置信息用于所述变更网元进行自动化更新配置。
一种可能的实现方式中,所述处理单元802用于:
当所述第一结构化平面属于承载网或云网共管的网络,且所述上线设备为接入所述接入类型的结构化区域中的第一基站,所述位置信息为所述第一基站在所述接入类型的结构化区域上所接入的第三接入设备的接口信息,所述上线信息还包括所述第一基站的电子序列号ESN时,根据所述第三接入设备的接口信息和所述第一基站的ESN确定配置信息,所述配置信息包括基于所述第一结构化平面为所述第一基站分配的第一IP地址和第一掩码,为所述接口信息所指示的接口分配的第二IP地址和第二掩码,所述第一IP地址和所述第二IP地址属于同一个网段;
所述发送单元803用于:
向动态主机配置协议DHCP服务器发送所述第一基站的ESN、所述第一IP地址和所述第一掩码,所述第一IP地址和所述第一掩码被所述DHCP服务器通过所述第三接入设备传输到所述第一基站,所述第一IP地址和所述第一掩码用于所述第一基站进行自动上线配置;
向所述第三接入设备发送所述第二IP地址和所述第二掩码,所述第二IP地址和所述第二掩码用于所述第三接入设备的所述接口与所述第一基站进行互通配置。
一种可能的实现方式中,所述处理单元802还用于:
根据所述第一基站的ESN获取基于所述承载网的所述第一结构化平面的第一可用流量模型,所述第一可用流量模型包括基站与互联网通信的流量子模型、网管流量子模型和基站与基站通信的流量子模型;
根据所述第一可用流量模型确定所述第一结构化平面中不同网元的功能需求,并确定所述第一结构化平面中满足通过所述第一基站布放的虚拟专用网络VPN业务的至少一条业务路径,其中,不同的功能需求对应不同的流量子模型,每种流量子模型对应一套配置模板;
从所述至少一条业务路径中确定满足所述VPN业务的服务等级协议SLA要求的最优路径;
根据所述不同网元的功能需求为所述最优路径上的关键网元生成网元配置信息,所述网元配置信息包括所述关键网元所属流量子模型对应的配置模板;
所述发送单元,还用于向所述关键网元发送所述网元配置信息,所述网元配置信息用于所述关键网元进行自动化配置。
一种可能的实现方式中,所述处理单元802用于当所述第一结构化平面属于单层网络,且所述上线设备为所述默认类型的结构化区域中的第四接入设备时:根据所述第一结构化平面为所述第四接入设备确定配置信息,所述配置信息包括所述第四接入设备的IGP进程号、所述第四接入设备的链路IP地址、所述第四接入设备的标识或所述第四接入设备的名称。
一种可能的实现方式中,所述处理单元802还用于当所述默认类型的结构化区域中第五接入设备下线时,确定变更网元的变更配置信息,所述变更网元为所述第五接入设备下线而产生配置信息变化的网元;
发送单元803,还用于向所述变更网元发送所述变更配置信息,所述变更配置信息用于所述变更网元进行自动化更新配置。
一种可能的实现方式中,所述处理单元802用于:当所述第一结构化平面属于DC网络或云网共管的网络,且所述上线设备为接入所述DC类型的结构化区域中的第一虚拟机VM,所述位置信息为所述第一虚拟机在所述DC类型的结构化区域上所接入的第六接入设备的第一接口的信息时:
根据所述第一VM的标识和所述第一接口的信息,以及预先记录的所述第一VM的标识与第一逻辑接口的对应关系,建立所述第一逻辑接口与所述第一接口之间的对应关系;
根据所述第一接口的信息和所述第一VM所在的服务器的ESN、第一VM的标识,第一VM的MAC地址为所述第一VM确定配置信息,所述配置信息包括第三IP地址;
所述发送单元,用于向DHCP服务器发送所述第一VM的标识和所述第三IP地址,所述第三IP地址被所述DHCP服务器通过所述第六接入设备传输到所述第一VM,所述第三IP地址用于所述第一VM进行自动上线配置。
一种可能的实现方式中,所述处理单元802还用于:
根据所述第一VM所在的服务器的ESN获取基于所述第一结构化平面的第二可用流量模型,所述第二可用流量模型包括所述VM与互联网通信的流量子模型和VM与VM通信的流量子模型;
根据所述第二可用流量模型确定所述第一结构化平面中不同网元的功能需求,并确定所述第一结构化平面中通过所述第一VM布放的VPN业务的M条业务路径,其中,不同的功能需求对应不同的流量子模型,每种流量子模型对应一套配置模板,所述M为大于0的整数;
从所述M条业务路径中确定满足所述VPN业务的SLA要求的第一最优路径;
根据所述不同网元的功能需求为所述第一最优路径上的第一关键网元生成第一网元配置信息,所述第一网元配置信息包括所述第一关键网元所属流量子模型对应的配置模板;
所述发送单元,还用于向所述第一关键网元发送所述第一网元配置信息,所述第一网元配置信息用于所述第一关键网元进行自动化配置。
一种可能的实现方式中,所述处理单元802还用于:
获取到所述第一VM迁移到第二接口,则删除所述第一逻辑接口与第一接口之间的对应关系,所述第二接口为所述第六接入设备或第七接入设备上的接口;
根据所述第二接口确定所述第一结构化平面中通过迁移后的所述第一VM布放的VPN业务的N条业务路径,其中,不同的功能需求对应不同的流量子模型,每种流量子模型对应一套配置模板,所述N为大于0的整数;
从所述N条业务路径中确定满足所述VPN业务的SLA要求的第二最优路径;
根据所述不同网元的功能需求为所述第二最优路径上的第二关键网元生成第二网元配置信息,所述第二网元配置信息包括所述第二关键网元所属流量子模型对应的配置模板;
所述发送单元,还用于向所述第二关键网元发送所述第二网元配置信息,所述第一网元配置信息用于所述第一关键网元进行自动化配置。
需要说明的是,上述所描述的控制设备由于与本申请方法实施例基于同一构思,其带来的技术效果与本申请方法实施例相同,具体内容可参见本申请前述所示的方法实施例中的叙述,此处不再赘述。
本申请实施例还提供一种计算机存储介质,其中,该计算机存储介质存储有程序,该程序执行包括上述方法实施例中记载的部分或全部步骤。
如图22所示,为本申请实施例的又一种控制设备的结构示意图,该控制设备可以是服务器,也可以是其他可以实现本申请功能的设备。该控制设备可以包括:处理器901(例如CPU)、存储器902、发送器904和接收器903;发送器904和接收器903耦合至处理器901,处理器901控制发送器904的发送动作和接收器903的接收动作。存储器902可能包含高速RAM存储器,也可能还包括非易失性存储器NVM,例如至少一个磁盘存储器,存储器902中可以存储各种指令,以用于完成各种处理功能以及实现本申请实施例的方法步骤。可选的,本申请实施例涉及的控制设备还可以包括:电源905、以及通信端口906中的一个或多个,图22中所描述的各器件可以是通过通信总线连接,也可以是通过其他连接方式连接,对此,本申请实施例中不做限定。接收器903和发送器904可以集成在控制设备的收发器中,也可以为控制设备上分别独立的收、发天线。通信总线用于实现元件之间的通信连接。上述通信端口906用于实现控制设备与其他外设之间进行连接通信。
在一些实施例中,上述存储器902用于存储计算机可执行程序代码,程序代码包括指令;当处理器901执行指令时,控制设备中的处理器901可以执行图21中处理单元802执行的动作,控制设备中的接收器903或通信端口906可以执行图21中接收单元801执行的动作,控制设备中的发送器904或通信端口906可以执行图21中发送单元803执行的动作,其实现原理和技术效果类似,在此不再赘述。
本申请还提供了一种芯片系统,该芯片系统包括处理器,用于支持上述控制设备实现其所涉及的功能,例如,例如接收或处理上述方法实施例中所涉及的数据和/或信息。在一种可能的设计中,所述芯片系统还包括存储器,所述存储器,用于保存计算机设备必要的程序指令和数据。该芯片系统,可以由芯片构成,也可以包含芯片和其他分立器件。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。
所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机 程序指令时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(Digital Subscriber Line,DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存储的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质(例如固态硬盘Solid State Disk(SSD))等。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统,装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统,装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。
所述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,以上实施例仅用以说明本申请的技术方案,而非对其限制;尽管参照前述实施例对本申请进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本申请各实施例技术方案的精神和范围。

Claims (20)

  1. 一种网络管理的方法,其特征在于,包括:
    控制设备接收设备上线的信息,所述设备上线的信息包括上线设备的位置信息;
    所述控制设备根据所述上线设备的位置信息确定所述上线设备属于或接入所述控制设备所管理网络范围内网络拓扑的第一结构化平面,所述网络拓扑被规划为至少一个结构化平面,其中,第一结构化平面所关联的转发资源与所述第一结构化平面之外的转发资源隔离;
    所述控制设备根据所述第一结构化平面确定所述上线设备的配置信息;
    所述控制设备向所述上线设备发送所述配置信息,所述配置信息用于所述上线设备进行自动化上线配置。
  2. 根据权利要求1所述的方法,其特征在于,
    当所述第一结构化平面属于承载网时,所述第一结构化平面包括汇聚类型的结构化区域和接入类型的结构化区域;
    当所述第一结构化平面属于单层网络时,所述第一结构化平面包括默认类型的结构化区域;
    当所述第一结构化平面属于数据中心DC网络时,所述第一结构化平面包括DC类型的结构化区域;
    当所述第一结构化平面属于云网共管的网络时,所述结构化区域的类型包括汇聚类型的结构化区域、接入类型的结构化区域和DC类型的结构化区域。
  3. 根据权利要求2所述的方法,其特征在于,当所述第一结构化平面属于承载网或云网共管的网络,且所述上线设备为所述接入类型的结构化区域中的第一接入设备时,所述方法还包括:
    所述控制设备获取模板过滤信息;
    所述控制设备根据所述第一结构化平面确定所述上线设备的配置信息,包括:
    所述控制设备根据所述第一接入设备的位置信息确定所述第一接入设备所属的接入类型的第一结构化区域,以及所述第一接入设备在所述第一结构化区域中的角色;
    所述控制设备根据模板过滤信息,确定所述第一接入设备的上线参数模板和预置的网元登录参数;
    所述控制设备根据所述第一结构化区域分配所述第一接入设备的内部网关协议IGP进程号、所述第一接入设备的链路互联网协议IP地址、所述第一接入设备的标识或所述第一接入设备的名称,其中,包含于第一结构化区域的所有设备属于同一个IGP域;
    所述控制设备将所述预置的网元登录参数、所述第一接入设备的角色、所述IGP进程号、所述第一接入设备的链路IP地址、所述第一接入设备的标识或所述第一接入设备的名称填写到所述上线参数模板,以得到用于所述第一接入设备的上线的配置信息。
  4. 根据权利要求3所述的方法,其特征在于,所述方法还包括:
    当所述第一结构化区域中第二接入设备下线时,所述控制设备确定变更网元的变更配置信息,所述变更网元为所述第二接入设备下线而产生配置信息变化的网元;
    所述控制设备向所述变更网元发送所述变更配置信息,所述变更配置信息用于所述变更网元进行自动化更新配置。
  5. 根据权利要求2所述的方法,其特征在于,当所述第一结构化平面属于承载网或云网共管的网络,且所述上线设备为接入所述接入类型的结构化区域中的第一基站,所述位置信息为所述第一基站在所述接入类型的结构化区域上所接入的第三接入设备的接口信息,所述上线信息还包括所述第一基站的电子序列号ESN时,
    所述控制设备根据所述第一结构化平面确定所述上线设备的配置信息,包括:
    所述控制设备根据所述第三接入设备的接口信息和所述第一基站的ESN确定配置信息,所述配置信息包括基于所述第一结构化平面为所述第一基站分配的第一IP地址和第一掩码,为所述接口信息所指示的接口分配的第二IP地址和第二掩码,所述第一IP地址和所述第二IP地址属于同一个网段;
    所述控制设备向所述上线设备发送所述配置信息,所述配置信息用于所述上线设备进行自动化上线配置,包括:
    所述控制设备向动态主机配置协议DHCP服务器发送所述第一基站的ESN、所述第一IP地址和所述第一掩码,所述第一IP地址和所述第一掩码被所述DHCP服务器通过所述第三接入设备传输到所述第一基站,所述第一IP地址和所述第一掩码用于所述第一基站进行自动上线配置;
    所述控制设备向所述第三接入设备发送所述第二IP地址和所述第二掩码,所述第二IP地址和所述第二掩码用于所述第三接入设备的所述接口与所述第一基站进行互通配置。
  6. 根据权利要求5所述的方法,其特征在于,所述方法还包括:
    所述控制设备根据所述第一基站的ESN获取基于所述承载网的所述第一结构化平面的第一可用流量模型,所述第一可用流量模型包括基站与互联网通信的流量子模型、网管流量子模型和基站与基站通信的流量子模型;
    所述控制设备根据所述第一可用流量模型确定所述第一结构化平面中不同网元的功能需求,并确定所述第一结构化平面中满足通过所述第一基站布放的虚拟专用网络VPN业务的至少一条业务路径,其中,不同的功能需求对应不同的流量子模型,每种流量子模型对应一套配置模板;
    所述控制设备从所述至少一条业务路径中确定满足所述VPN业务的服务等级协议SLA要求的最优路径;
    所述控制设备根据所述不同网元的功能需求为所述最优路径上的关键网元生成网元配置信息,所述网元配置信息包括所述关键网元所属流量子模型对应的配置模板;
    所述控制设备向所述关键网元发送所述网元配置信息,所述网元配置信息用于所述关键网元进行自动化配置。
  7. 根据权利要求2所述的方法,其特征在于,当所述第一结构化平面属于单层网络,且所述上线设备为所述默认类型的结构化区域中的第四接入设备时,
    所述控制设备根据所述第一结构化平面确定所述上线设备的配置信息,包括:
    所述控制设备根据所述第一结构化平面为所述第四接入设备确定配置信息,所述配置信息包括所述第四接入设备的IGP进程号、所述第四接入设备的链路IP地址、所述第四接入设备的标识或所述第四接入设备的名称。
  8. 根据权利要求7所述的方法,其特征在于,所述方法还包括:
    当所述默认类型的结构化区域中第五接入设备下线时,所述控制设备确定变更网元的变更配置信息,所述变更网元为所述第五接入设备下线而产生配置信息变化的网元;
    所述控制设备向所述变更网元发送所述变更配置信息,所述变更配置信息用于所述变更网元进行自动化更新配置。
  9. 根据权利要求2所述的方法,其特征在于,当所述第一结构化平面属于DC网络或云网共管的网络,且所述上线设备为接入所述DC类型的结构化区域中的第一虚拟机VM,所述位置信息为所述第一虚拟机在所述DC类型的结构化区域上所接入的第六接入设备的第一接口的信息,所述设备上线的信息还包括所述第一VM所在的服务器的ESN、第一VM的标识,第一VM的媒体接入控制MAC地址时;
    所述控制设备根据所述第一结构化平面确定所述上线设备的配置信息,包括:
    所述控制设备根据所述第一VM的标识和所述第一接口的信息,以及预先记录的所述第一VM的标识与第一逻辑接口的对应关系,建立所述第一逻辑接口与所述第一接口之间的对应关系;
    所述控制设备根据所述第一接口的信息和所述第一VM所在的服务器的ESN、第一VM的标识,第一VM的MAC地址为所述第一VM确定配置信息,所述配置信息包括第三IP地址;
    所述控制设备向所述上线设备发送所述配置信息,所述配置信息用于所述上线设备进行自动化上线配置,包括:
    所述控制设备向DHCP服务器发送所述第一VM的标识和所述第三IP地址,所述第三IP地址被所述DHCP服务器通过所述第六接入设备传输到所述第一VM,所述第三IP地址用于所述第一VM进行自动上线配置。
  10. 根据权利要求9所述的方法,其特征在于,所述方法还包括:
    所述控制设备根据所述第一VM所在的服务器的ESN获取基于所述第一结构化平面的第二可用流量模型,所述第二可用流量模型包括所述VM与互联网通信的流量子模型和VM与VM通信的流量子模型;
    所述控制设备根据所述第二可用流量模型确定所述第一结构化平面中不同网元的功能需求,并确定所述第一结构化平面中通过所述第一VM布放的VPN业务的M条业务路径,其中,不同的功能需求对应不同的流量子模型,每种流量子模型对应一套配置模板,所述M为大于0的整数;
    所述控制设备从所述M条业务路径中确定满足所述VPN业务的SLA要求的第一最优路径;
    所述控制设备根据所述不同网元的功能需求为所述第一最优路径上的第一关键网元生成第一网元配置信息,所述第一网元配置信息包括所述第一关键网元所属流量子模型对应的配置模板;
    所述控制设备向所述第一关键网元发送所述第一网元配置信息,所述第一网元配置信息用于所述第一关键网元进行自动化配置。
  11. 根据权利要求9或10所述的方法,其特征在于,所述方法还包括:
    所述控制设备获取到所述第一VM迁移到第二接口,则删除所述第一逻辑接口与第一接口之间的对应关系,所述第二接口为所述第六接入设备或第七接入设备上的接口;
    所述控制设备根据所述第二接口确定所述第一结构化平面中通过迁移后的所述第一VM布放的VPN业务的N条业务路径,其中,不同的功能需求对应不同的流量子模型,每种流量子模型对应一套配置模板,所述N为大于0的整数;
    所述控制设备从所述N条业务路径中确定满足所述VPN业务的SLA要求的第二最优路 径;
    所述控制设备根据所述不同网元的功能需求为所述第二最优路径上的第二关键网元生成第二网元配置信息,所述第二网元配置信息包括所述第二关键网元所属流量子模型对应的配置模板;
    所述控制设备向所述第二关键网元发送所述第二网元配置信息,所述第一网元配置信息用于所述第一关键网元进行自动化配置。
  12. 一种控制设备,其特征在于,包括:
    接收单元,用于接收设备上线的信息,所述设备上线的信息包括上线设备的位置信息;
    处理单元,用于根据所述接收单元接收的上线设备的位置信息确定所述上线设备属于或接入所述控制设备所管理网络范围内网络拓扑的第一结构化平面,并根据所述第一结构化平面确定所述上线设备的配置信息,所述网络拓扑被规划为至少一个结构化平面,其中,第一结构化平面所关联的转发资源与所述第一结构化平面之外的转发资源隔离;
    发送单元,用于向所述上线设备发送所述处理单元确定的配置信息,所述配置信息用于所述上线设备进行自动化上线配置。
  13. 根据权利要求12所述的控制设备,其特征在于,
    当所述第一结构化平面属于承载网时,所述第一结构化平面包括汇聚类型的结构化区域和接入类型的结构化区域;
    当所述第一结构化平面属于单层网络时,所述第一结构化平面包括默认类型的结构化区域;
    当所述第一结构化平面属于数据中心DC网络时,所述第一结构化平面包括DC类型的结构化区域;
    当所述第一结构化平面属于云网共管的网络时,所述结构化区域的类型包括汇聚类型的结构化区域、接入类型的结构化区域和DC类型的结构化区域。
  14. 根据权利要求13所述的控制设备,其特征在于,
    所述处理单元,还用于当所述第一结构化平面属于承载网或云网共管的网络,且所述上线设备为所述接入类型的结构化区域中的第一接入设备时,获取模板过滤信息;
    所述处理单元用于:
    根据所述第一接入设备的位置信息确定所述第一接入设备所属的接入类型的第一结构化区域,以及所述第一接入设备在所述第一结构化区域中的角色;
    模板过滤信息,确定所述第一接入设备的上线参数模板和预置的网元登录参数;
    根据所述第一结构化区域分配所述第一接入设备的内部网关协议IGP进程号、所述第一接入设备的链路互联网协议IP地址、所述第一接入设备的标识或所述第一接入设备的名称,其中,包含于第一结构化区域的所有设备属于同一个IGP域;
    将所述预置的网元登录参数、所述第一接入设备的角色、所述IGP进程号、所述第一接入设备的链路IP地址、所述第一接入设备的标识或所述第一接入设备的名称填写到所述上线参数模板,以得到用于所述第一接入设备的上线的配置信息。
  15. 根据权利要求13所述的控制设备,其特征在于,
    所述处理单元用于:当所述第一结构化平面属于承载网或云网共管的网络,且所述上线设备为接入所述接入类型的结构化区域中的第一基站,所述位置信息为所述第一基站在所述接入类型的结构化区域上所接入的第三接入设备的接口信息,所述上线信息还包括所 述第一基站的电子序列号ESN时,根据所述第三接入设备的接口信息和所述第一基站的ESN确定配置信息,所述配置信息包括基于所述第一结构化平面为所述第一基站分配的第一IP地址和第一掩码,为所述接口信息所指示的接口分配的第二IP地址和第二掩码,所述第一IP地址和所述第二IP地址属于同一个网段;
    所述发送单元用于:
    向动态主机配置协议DHCP服务器发送所述第一基站的ESN、所述第一IP地址和所述第一掩码,所述第一IP地址和所述第一掩码被所述DHCP服务器通过所述第三接入设备传输到所述第一基站,所述第一IP地址和所述第一掩码用于所述第一基站进行自动上线配置;
    向所述第三接入设备发送所述第二IP地址和所述第二掩码,所述第二IP地址和所述第二掩码用于所述第三接入设备的所述接口与所述第一基站进行互通配置。
  16. 根据权利要求15所述的控制设备,其特征在于,
    所述处理单元还用于:
    根据所述第一基站的ESN获取基于所述承载网的所述第一结构化平面的第一可用流量模型,所述第一可用流量模型包括基站与互联网通信的流量子模型、网管流量子模型和基站与基站通信的流量子模型;
    根据所述第一可用流量模型确定所述第一结构化平面中不同网元的功能需求,并确定所述第一结构化平面中满足通过所述第一基站布放的虚拟专用网络VPN业务的至少一条业务路径,其中,不同的功能需求对应不同的流量子模型,每种流量子模型对应一套配置模板;
    从所述至少一条业务路径中确定满足所述VPN业务的服务等级协议SLA要求的最优路径;
    根据所述不同网元的功能需求为所述最优路径上的关键网元生成网元配置信息,所述网元配置信息包括所述关键网元所属流量子模型对应的配置模板;
    所述发送单元,还用于向所述关键网元发送所述网元配置信息,所述网元配置信息用于所述关键网元进行自动化配置。
  17. 根据权利要求13所述的控制设备,其特征在于,
    所述处理单元用于当所述第一结构化平面属于单层网络,且所述上线设备为所述默认类型的结构化区域中的第四接入设备时:根据所述第一结构化平面为所述第四接入设备确定配置信息,所述配置信息包括所述第四接入设备的IGP进程号、所述第四接入设备的链路IP地址、所述第四接入设备的标识或所述第四接入设备的名称。
  18. 根据权利要求13所述的控制设备,其特征在于,
    所述处理单元用于:当所述第一结构化平面属于DC网络或云网共管的网络,且所述上线设备为接入所述DC类型的结构化区域中的第一虚拟机VM,所述位置信息为所述第一虚拟机在所述DC类型的结构化区域上所接入的第六接入设备的第一接口的信息时:
    根据所述第一VM的标识和所述第一接口的信息,以及预先记录的所述第一VM的标识与第一逻辑接口的对应关系,建立所述第一逻辑接口与所述第一接口之间的对应关系;
    根据所述第一接口的信息和所述第一VM所在的服务器的ESN、第一VM的标识,第一VM的MAC地址为所述第一VM确定配置信息,所述配置信息包括第三IP地址;
    所述发送单元,用于向DHCP服务器发送所述第一VM的标识和所述第三IP地址,所述第三IP地址被所述DHCP服务器通过所述第六接入设备传输到所述第一VM,所述第三IP地 址用于所述第一VM进行自动上线配置。
  19. 根据权利要求18所述的控制设备,其特征在于,
    所述处理单元还用于:
    根据所述第一VM所在的服务器的ESN获取基于所述第一结构化平面的第二可用流量模型,所述第二可用流量模型包括所述VM与互联网通信的流量子模型和VM与VM通信的流量子模型;
    根据所述第二可用流量模型确定所述第一结构化平面中不同网元的功能需求,并确定所述第一结构化平面中通过所述第一VM布放的VPN业务的M条业务路径,其中,不同的功能需求对应不同的流量子模型,每种流量子模型对应一套配置模板,所述M为大于0的整数;
    从所述M条业务路径中确定满足所述VPN业务的SLA要求的第一最优路径;
    根据所述不同网元的功能需求为所述第一最优路径上的第一关键网元生成第一网元配置信息,所述第一网元配置信息包括所述第一关键网元所属流量子模型对应的配置模板;
    所述发送单元,还用于向所述第一关键网元发送所述第一网元配置信息,所述第一网元配置信息用于所述第一关键网元进行自动化配置。
  20. 根据权利要求18或19所述的控制设备,其特征在于,
    所述处理单元还用于:
    获取到所述第一VM迁移到第二接口,则删除所述第一逻辑接口与第一接口之间的对应关系,所述第二接口为所述第六接入设备或第七接入设备上的接口;
    根据所述第二接口确定所述第一结构化平面中通过迁移后的所述第一VM布放的VPN业务的N条业务路径,其中,不同的功能需求对应不同的流量子模型,每种流量子模型对应一套配置模板,所述N为大于0的整数;
    从所述N条业务路径中确定满足所述VPN业务的SLA要求的第二最优路径;
    根据所述不同网元的功能需求为所述第二最优路径上的第二关键网元生成第二网元配置信息,所述第二网元配置信息包括所述第二关键网元所属流量子模型对应的配置模板;
    所述发送单元,还用于向所述第二关键网元发送所述第二网元配置信息,所述第一网元配置信息用于所述第一关键网元进行自动化配置。
PCT/CN2020/111700 2019-08-30 2020-08-27 一种网络管理的方法及设备 WO2021037133A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP20856647.1A EP3993322A4 (en) 2019-08-30 2020-08-27 NETWORK MANAGEMENT METHOD AND APPARATUS
US17/579,973 US11824709B2 (en) 2019-08-30 2022-01-20 Network management method and device

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910816847.X 2019-08-30
CN201910816847.XA CN112448831B (zh) 2019-08-30 2019-08-30 一种网络管理的方法及设备

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US17/579,973 Continuation US11824709B2 (en) 2019-08-30 2022-01-20 Network management method and device

Publications (1)

Publication Number Publication Date
WO2021037133A1 true WO2021037133A1 (zh) 2021-03-04

Family

ID=74685589

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/111700 WO2021037133A1 (zh) 2019-08-30 2020-08-27 一种网络管理的方法及设备

Country Status (4)

Country Link
US (1) US11824709B2 (zh)
EP (1) EP3993322A4 (zh)
CN (2) CN114884808A (zh)
WO (1) WO2021037133A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP4156632A1 (en) * 2021-09-24 2023-03-29 Schneider Electric USA, Inc. Method to commission a distributed system
US20230308346A1 (en) * 2020-06-18 2023-09-28 Orange Method for configuring a terminal device

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113572650A (zh) * 2021-08-18 2021-10-29 浪潮思科网络科技有限公司 一种基于sdn的网络调控方法、设备及介质
CN115277401B (zh) * 2022-07-20 2024-05-14 浪潮思科网络科技有限公司 一种既定组网的设备扩容方法、装置、设备及介质

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016160420A1 (en) * 2015-03-31 2016-10-06 Cisco Technology, Inc. Rapid provisioning in a dynamic network environment
CN106161077A (zh) * 2015-04-24 2016-11-23 中兴通讯股份有限公司 接入汇聚装置和认证注册方法
CN108062231A (zh) * 2017-12-18 2018-05-22 江苏润和软件股份有限公司 一种基于相关分析的云应用自动化配置方法
CN108667638A (zh) * 2017-03-28 2018-10-16 华为技术有限公司 一种网络业务配置方法及网络管理设备
WO2019140486A1 (en) * 2018-01-22 2019-07-25 Megaport (Services) Pty Ltd Provisioning network ports and virtual links

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030120822A1 (en) * 2001-04-19 2003-06-26 Langrind Nicholas A. Isolated control plane addressing
US7843906B1 (en) * 2004-02-13 2010-11-30 Habanero Holdings, Inc. Storage gateway initiator for fabric-backplane enterprise servers
FI20040978A0 (fi) * 2004-07-13 2004-07-13 Nokia Corp Järjestelmä, menetelmä, verkkokohteet ja tietokoneohjelmat dynaamisen isäntäkonfigurointikäytännön kehyksen konfiguroinnin hallitsemiseksi
US9077683B2 (en) * 2010-12-08 2015-07-07 At&T Intellectual Property I, L.P. Architecture for network management in a multi-service network
CN103229463B (zh) * 2012-12-18 2015-11-25 华为技术有限公司 一种确定管理域的方法、网络设备及虚拟集群
CN103067207B (zh) * 2012-12-28 2015-09-09 北京华为数字技术有限公司 配置信息下发方法及装置
US9654335B2 (en) * 2013-02-27 2017-05-16 Hughes Network Systems, Llc System and method for provision and management of segmented virtual networks within a physical communications network
CN103428306B (zh) * 2013-08-02 2016-09-07 北京华为数字技术有限公司 网元设备上线方法、设备及系统
EP3614790A1 (en) * 2015-05-18 2020-02-26 Huawei Technologies Co., Ltd. Terminal device, network device, and data transmission method
CN107943547B (zh) * 2016-10-13 2022-05-24 斑马智行网络(香港)有限公司 多服务集成方法、装置、智能终端、服务器和操作系统
US10554483B2 (en) * 2017-05-31 2020-02-04 Cisco Technology, Inc. Network policy analysis for networks
US10498608B2 (en) * 2017-06-16 2019-12-03 Cisco Technology, Inc. Topology explorer
US10411996B2 (en) * 2017-06-19 2019-09-10 Cisco Technology, Inc. Validation of routing information in a network fabric
CN109218052A (zh) * 2017-07-03 2019-01-15 中兴通讯股份有限公司 网络管理方法、装置、系统、存储介质和计算机设备
CN109062550B (zh) * 2018-07-27 2021-10-01 京东数字科技控股有限公司 页面构建方法和系统、用户终端、服务器和可读存储介质

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016160420A1 (en) * 2015-03-31 2016-10-06 Cisco Technology, Inc. Rapid provisioning in a dynamic network environment
CN106161077A (zh) * 2015-04-24 2016-11-23 中兴通讯股份有限公司 接入汇聚装置和认证注册方法
CN108667638A (zh) * 2017-03-28 2018-10-16 华为技术有限公司 一种网络业务配置方法及网络管理设备
CN108062231A (zh) * 2017-12-18 2018-05-22 江苏润和软件股份有限公司 一种基于相关分析的云应用自动化配置方法
WO2019140486A1 (en) * 2018-01-22 2019-07-25 Megaport (Services) Pty Ltd Provisioning network ports and virtual links

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3993322A4

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20230308346A1 (en) * 2020-06-18 2023-09-28 Orange Method for configuring a terminal device
EP4156632A1 (en) * 2021-09-24 2023-03-29 Schneider Electric USA, Inc. Method to commission a distributed system
US11962470B2 (en) 2021-09-24 2024-04-16 Schneider Electric USA, Inc. Method to commission a distributed system

Also Published As

Publication number Publication date
CN114884808A (zh) 2022-08-09
US20220141089A1 (en) 2022-05-05
EP3993322A4 (en) 2022-08-31
CN112448831B (zh) 2022-04-12
US11824709B2 (en) 2023-11-21
CN112448831A (zh) 2021-03-05
EP3993322A1 (en) 2022-05-04

Similar Documents

Publication Publication Date Title
WO2021037133A1 (zh) 一种网络管理的方法及设备
CN105657081B (zh) 提供dhcp服务的方法、装置及系统
CN106487695B (zh) 一种数据传输方法、虚拟网络管理装置及数据传输系统
CN103997414B (zh) 生成配置信息的方法和网络控制单元
US9584369B2 (en) Methods of representing software defined networking-based multiple layer network topology views
CN111224821B (zh) 安全服务部署系统、方法及装置
CN105162704B (zh) Overlay网络中组播复制的方法及装置
CN103026660A (zh) 网络策略配置方法、管理设备以及网络管理中心设备
WO2017032300A1 (zh) 一种数据传输方法、虚拟网络管理装置及数据传输系统
CN105634770A (zh) 部署虚拟扩展局域网的方法和装置
CN106953848B (zh) 一种基于ForCES的软件定义网络实现方法
CN106031116A (zh) 一种ns与vnf的关联方法、装置及系统
WO2019062830A1 (zh) 实例业务拓扑的生成方法及装置
WO2018218977A1 (zh) 一种编排软件定义网络的方法及sdn控制器
WO2018000890A1 (zh) 用于实现组合虚拟专用网vpn的方法与装置
WO2019029267A1 (zh) 网络切片的管理方法和装置
US11855893B2 (en) Tag-based cross-region segment management
US11916698B2 (en) Dynamic cellular connectivity between the hypervisors and virtual machines
WO2016150139A1 (zh) 一种建立网络业务实例的方法和装置
WO2021147358A1 (zh) 一种网络接口的建立方法、装置及系统
US20220350637A1 (en) Virtual machine deployment method and related apparatus
US11799755B2 (en) Metadata-based cross-region segment routing
US20220206865A1 (en) Distributed artificial intelligence fabric controller
CN109787938A (zh) 实现访问虚拟私有云的方法、装置及计算机可读存储介质
CN112333014B (zh) 设备管理方法及通信装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20856647

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2020856647

Country of ref document: EP

Effective date: 20220125

NENP Non-entry into the national phase

Ref country code: DE