WO2021098425A1 - 配置业务的服务质量策略方法、装置和计算设备 - Google Patents

配置业务的服务质量策略方法、装置和计算设备 Download PDF

Info

Publication number
WO2021098425A1
WO2021098425A1 PCT/CN2020/121714 CN2020121714W WO2021098425A1 WO 2021098425 A1 WO2021098425 A1 WO 2021098425A1 CN 2020121714 W CN2020121714 W CN 2020121714W WO 2021098425 A1 WO2021098425 A1 WO 2021098425A1
Authority
WO
WIPO (PCT)
Prior art keywords
data stream
access path
service
qos policy
virtual switch
Prior art date
Application number
PCT/CN2020/121714
Other languages
English (en)
French (fr)
Inventor
孙克勇
肖磊
孙宏伟
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to EP20889808.0A priority Critical patent/EP3982600A4/en
Publication of WO2021098425A1 publication Critical patent/WO2021098425A1/zh
Priority to US17/747,234 priority patent/US20220286409A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/70Admission control; Resource allocation
    • H04L47/80Actions related to the user profile or the type of traffic
    • H04L47/805QOS or priority aware
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5061Partitioning or combining of resources
    • G06F9/5072Grid computing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5061Partitioning or combining of resources
    • G06F9/5077Logical partitioning of resources; Management or configuration of virtualized resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0823Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0894Policy-based network configuration management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/50Network service management, e.g. ensuring proper service fulfilment according to agreements
    • H04L41/5003Managing SLA; Interaction between SLA and QoS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/302Route determination based on requested QoS
    • H04L45/308Route determination based on user's profile, e.g. premium users
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/70Routing based on monitoring results
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/24Traffic characterised by specific attributes, e.g. priority or QoS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/24Traffic characterised by specific attributes, e.g. priority or QoS
    • H04L47/2425Traffic characterised by specific attributes, e.g. priority or QoS for supporting services specification, e.g. SLA
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/24Traffic characterised by specific attributes, e.g. priority or QoS
    • H04L47/2441Traffic characterised by specific attributes, e.g. priority or QoS relying on flow classification, e.g. using integrated services [IntServ]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/24Traffic characterised by specific attributes, e.g. priority or QoS
    • H04L47/2483Traffic characterised by specific attributes, e.g. priority or QoS involving identification of individual flows
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L49/00Packet switching elements
    • H04L49/70Virtual switches
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/4557Distribution of virtual machine instances; Migration and load balancing

Definitions

  • This application relates to the field of network communication technology, and in particular to a method, device and computing device for configuring service quality policies.
  • the cloud network is composed of virtual networks and physical network resources in the data center. It provides network services for the data center, which can make the hosts in the data center flexibly communicate with the hosts outside the data center and those in the data center. The host communicates, so that the services deployed on the host can be accessed between the hosts.
  • the business in the data center usually needs to pass through multiple different devices when accessing the business.
  • Service, QoS Quality of Service
  • the business Qos policy of the business is manually set on the equipment through which the data flow of the business passes. In this way, it takes a lot of time when there are more businesses or more equipment through which the data flow of the business passes.
  • This application provides a method, a device and a computing device for configuring a service quality policy of a service, which saves the time for configuring a service quality policy of a service when there are many devices passing through the data flow of the service.
  • the present application provides a method for configuring a service quality policy.
  • the method includes: obtaining a first data stream forwarded by a virtual switch. Determine the service information of the first data stream, where the service information includes the service type of the first data stream and the access path of the first data stream. According to the service information of the first data flow, a QoS policy that matches the first data flow is determined. Configure the devices on the access path according to the matched QoS policy.
  • the method for configuring the service quality policy of the service can be executed by the configuration device.
  • an application in a virtual machine of a certain host which can be called a target host
  • the data stream of the service can be generated (The following may be referred to as the first data stream).
  • the virtual machine then transmits the first data stream to the virtual switch of the host.
  • applications in virtual machines of other hosts need to perform services.
  • the service data stream (which may be referred to as the first data stream in the following) can be generated, and the first data stream can be transmitted to the virtual switch of the target host.
  • the virtual switch sends the first data stream to the service identification engine of the configuration device.
  • the configuration device can identify the first data stream, and determine the service type of the first data stream and the access path of the first data stream.
  • the configuration device may use the service type of the first data stream to determine the QoS policy matching the first data stream.
  • the device on the access path of the first data stream can be configured according to the QoS policy matching the first data stream.
  • the device on the subsequent access path of the first data stream may process the first data stream based on the configuration of the first data stream. In this way, for any service, the configuration device can be used to configure the equipment of the access path without manual configuration, so the efficiency of the Qos strategy for configuring the service can be improved.
  • the source end identifier and the destination end identifier of the first data stream are determined according to the quintuple information in the first data stream.
  • the access path of the first data stream is determined according to the network topology, source end identification and destination end identification of the host to which the stored virtual switch belongs.
  • the configuration device can identify the header in the first data stream, and obtain quintuple information therefrom.
  • the configuration device obtains the source identification (including the source Internet Protocol (IP) address and source port number) and the destination identification (including the destination IP address and destination port) of the first data stream in the quintuple information number).
  • IP Internet Protocol
  • the configuration device obtains the network topology where the stored target host is located.
  • the configuration device uses the source identifier of the first data stream to correspond to the source device of the first data stream in the network topology, and uses the first data stream.
  • the destination identifier of the data flow corresponds to the destination device of the first data flow in the network topology.
  • the configuration apparatus may determine a path from the source device to the destination device based on the source device and the destination device, and the path is the access path of the first data stream. In this way, the access path of the first data stream can be determined relatively accurately.
  • the SLA corresponding to the service type of the first data stream is determined according to the correspondence between the stored service type and the service level agreement (Service Level Agreement, SLA). According to the SLA corresponding to the service type, the QoS policy that matches the first data flow is determined.
  • SLA Service Level Agreement
  • the configuration device can obtain the stored correspondence between the service type and the SLA, and in the correspondence, the SLA corresponding to the service type of the first data stream is determined. Then the configuration device can convert the SLA into a Qos policy, and the Qos policy is a QoS policy matching the first data flow. In this way, the Qos policy matching the first data stream can be obtained.
  • the sub-Qos policy corresponding to each device on the access path of the first data stream is determined according to the QoS policy matched with the first data stream. For each device on the access path, configure the device according to the sub-Qos policy corresponding to the device.
  • the configuration device can determine the sub-Qos policy corresponding to each device on the access path of the first data stream according to the QoS policy matching the first data stream. Subsequently, for each device on the access path, the configuration apparatus uses the sub-Qos policy corresponding to the device to configure the device. In this way, for each device on the access path, the sub-Qos strategy is determined separately, which can better guarantee the service quality of the business.
  • determining the sub-Qos policy of each device on the access path of the first data stream according to the QoS policy matching the first data stream includes: obtaining monitoring indicators of each device on the access path, where The monitoring indicators include one or more of the central processing unit (CPU) occupancy rate, memory occupancy rate, packet loss rate, and transmission delay.
  • the monitoring indicators of each device a key device among the devices on the access path is determined, where the key device is the device with the slowest data stream processing on the access path.
  • the sub-Qos strategy of the key device is determined.
  • the matched Qos policy is determined as the sub Qos policy of the device on the access path except for the key device.
  • the configuration device can obtain the monitoring indicators of each device on the access path of the first data stream.
  • the monitoring indicators include one or more of CPU occupancy rate, memory occupancy rate, packet loss rate, and transmission delay.
  • the CPU occupancy rate is the CPU occupancy rate of the device in the closest cycle to the current;
  • the memory occupancy rate is the memory occupancy rate of the device in the closest cycle to the current;
  • the packet loss rate is the packet loss rate of the device in the closest cycle to the current (The number of data packets entering the device during the period minus the number of data packets sent from the device, to get the number of lost data packets, use the number of lost data packets divided by the number of data packets entering the device That is, the packet loss rate);
  • the transmission delay is the transmission delay of the device in the nearest cycle (the average value of the duration of each data packet from entering the device to leaving the device in the cycle).
  • the configuration device uses the monitoring indicators of the equipment to determine the key equipment among the equipment on the access path. Then the configuration device determines the minimum requirements of each indicator in the Qos strategy that matches the first data stream, and based on the minimum requirements, determines the sub-Qos strategy of the key device. And the configuration device can determine the Qos policy matching the first data stream, and determine it as the sub-Qos policy of the devices on the access path of the first data stream except for the key devices. In this way, the sub-Qos strategy can be determined corresponding to each device on the access path.
  • the method further includes: obtaining the disappearance message of the first data stream sent by the virtual switch, or determining the data stream forwarded by the virtual switch according to the quintuple information of the data stream forwarded by the virtual switch Does not include the first data stream. Cancel the configuration of the device on the access path of the first data flow according to the QoS policy that matches the first data flow.
  • the configuration device after the configuration device receives the disappearance message of the first data stream sent by the virtual switch of the target host, it can parse the first data stream’s identity from it, and can determine that the data stream forwarded by the virtual switch does not include The first data stream. Or, the configuration device obtains the quintuple information of the data stream forwarded by the virtual switch, and if the quintuple information of the first data stream is not included in the quintuple information, it is determined that the data stream forwarded by the virtual switch does not include the first data stream. One data stream.
  • the configuration device can cancel the configuration of the device on the access path of the first data stream by using the QoS policy matching the first data stream. In this way, the storage space of the device can be saved.
  • the method further includes: obtaining an increase message of the first data flow sent by the virtual switch, or determining the data flow forwarded by the virtual switch according to the quintuple information of the data flow forwarded by the virtual switch Add the first data stream on the basis of the original data stream.
  • the configuration device after the configuration device receives the increase message of the first data stream sent by the virtual switch of the target host, it can parse the identifier of the first data stream from it, and can determine that the data stream forwarded by the virtual switch includes the first data stream. One data stream.
  • the configuration device obtains the quintuple information of the data stream forwarded by the virtual switch, and if the quintuple information of the first data stream is added to the quintuple information, it is determined that the first data stream is added to the data stream forwarded by the virtual switch. data flow. In this way, the newly added data stream can be determined in time, and the devices on the access path of the data stream can be configured based on the Qos policy that matches the data stream.
  • the present application provides a service quality policy device for configuring services.
  • the device includes a plurality of modules that execute the method described in the first aspect by executing instructions.
  • the present application provides a computing device, the computing device includes a memory and a processor, the processor executes computer instructions stored in the memory, so that the computing device executes the method described in the first aspect above .
  • the present application provides a non-volatile readable computer storage medium that stores a computer program that, when executed by a computing device, implements the method described in the first aspect.
  • the present application provides a computer program product, the computer program product comprising computer instructions, and when the computer instructions are executed by a computing device, the computing device executes the method described in the first aspect.
  • the configuration device can determine the Qos policy that matches the data flow and the access path based on the data flow. Then the configuration device configures the devices on the access path based on the Qos policy matching the data flow. In this way, for any service, the device on the access path can be configured in this way without manual configuration, so the efficiency of configuring the QoS strategy of the service can be improved.
  • FIG. 1 is a schematic structural diagram of a cloud network provided by an embodiment of this application.
  • FIG. 2 is a schematic structural diagram of a configuration device in a cloud network provided by an embodiment of this application;
  • FIG. 3 is a schematic structural diagram of a configuration device in a cloud network provided by an embodiment of this application.
  • FIG. 4 is a schematic diagram of a data stream transmission provided by an embodiment of the application.
  • FIG. 5 is a schematic diagram of data stream transmission according to an embodiment of the application.
  • FIG. 6 is a schematic flowchart of a method for configuring a service quality policy for a service provided by an embodiment of the application
  • FIG. 7 is a schematic flow chart of determining the sub-Qos policy of each device on the access path according to an embodiment of the application
  • FIG. 8 is a schematic structural diagram of a service quality policy device for configuring a service provided by an embodiment of this application.
  • FIG. 9 is a schematic structural diagram of a computing device provided by an embodiment of the application.
  • the cloud network is composed of the virtual network and physical network resources in the data center.
  • the general structure diagram is shown in Figure 1.
  • the cloud network includes a host, and multiple service-providing devices (hereinafter referred to as service devices), multiple Physical Switch.
  • the services provided by the service equipment include but are not limited to Virtual Private Network (VPN) services, Elastic Load Balance (ELB) services, Network Address Translation (NAT) services and Virtual Router (Virtual Router) ) Services etc.
  • Each host is connected to a physical switch, and each host is connected to a service device through the physical switch.
  • Multiple virtual machines are mounted on the host (the virtual machine can be any type of virtualized virtual machine), and the multiple virtual machines use virtual network interface cards (vNIC) to implement network communication.
  • vNIC virtual network interface cards
  • the host includes a distributed virtual firewall (DFW), a virtual switch (Virtual Switch), a distributed virtual router (Distribute Virtual Router, DVR) and a physical network card (Physical Network Interface Card, pNIC), etc.
  • DFW distributed virtual firewall
  • Virtual Switch Virtual Switch
  • DVR distributed virtual router
  • pNIC Physical Network Interface Card
  • the QoS policy of the service is manually set on the equipment through which the data flow of the service passes.
  • the access path of the business data stream on the virtual machine will also change accordingly, and the manual cannot find out that the access path of the business data stream has changed in time, even if the manual finds the access path in time If a change occurs, it is also necessary to manually reconfigure the Qos policy of the service on the changed access path.
  • the configuration efficiency is relatively low, so it is necessary to provide an efficient method for configuring the Qos policy of the service.
  • the execution subject of the method may be a Qos policy configuration device (which may be referred to as a configuration device for short later).
  • the configuration device is established with the host in FIG. Communication connection: There is a communication connection with the equipment that provides services such as ELB services in Figure 1.
  • the configuration device may be a hardware device, such as a computing device, or software, such as a program deployed on the computing device. It should be noted here that only one host is shown in Figure 2. In fact, the configuration device can manage multiple hosts, and a process (which can be called a four-service recognition engine) is set on each host to identify the data of the service. Flow, as shown in Figure 3.
  • the configuration device when the configuration device is a hardware device, a process (which may be referred to as a service recognition engine) is set in the host, and the configuration device obtains the data stream transmitted by the host through the process.
  • the configuration device can also obtain the service type of the data stream, the source end and the destination end of the data stream through the process.
  • the configuration device when it is software, it can be deployed on a computing device and a host.
  • the part deployed on the host is a process (which can be called a service recognition engine), which is used to obtain the data stream transmitted by the host, and determine the service type of the data stream and the source and destination of the data stream.
  • the part deployed on the computing device can be used to determine the Qos policy of the data stream based on the content determined by the process (described later).
  • the data stream transmitted through the host when passing through the virtual switch of the host, the virtual switch of the host transmits the data stream to the service identification engine.
  • the service recognition engine After the service recognition engine obtains the data stream, it recognizes the data stream and determines the service type of the data stream and the source and destination ends of the data stream. Then the service recognition engine transmits the data stream to the virtual switch, and the virtual switch continues to perform subsequent processing (the subsequent processing is exactly the same as the processing of the virtual switch in the related art, and will not be repeated in this application).
  • the service recognition engine can carry an identifier when sending the data stream to the virtual switch.
  • the identifier is used to indicate that the data stream can continue to be processed instead of being transmitted to the service recognition engine.
  • Method two as shown in Figure 5, the data stream transmitted by the host, when passing through the virtual switch, the virtual switch copies the data stream, and the virtual switch takes the original data stream through the normal processing flow and transmits the copied data stream To the business recognition engine.
  • the service recognition engine After the service recognition engine receives it, it recognizes the data stream and determines the service type of the data stream and the source and destination of the data stream. Then the service recognition engine deletes the data stream.
  • each time the virtual switch receives a data flow it will create a flow table or update the flow table (the flow table is created if the flow table corresponding to the data flow is not currently stored, and the data flow is newly created.
  • the situation of updating the flow table is that the flow table of the data flow is stored corresponding to the data flow, and the time of the flow table may only be updated to the current time).
  • the virtual switch may only send the data stream corresponding to the newly created flow table to the service recognition engine, instead of sending the data stream corresponding to the flow table to the service recognition engine. In this way, for the same business, the business processing engine can only process the data stream once.
  • the above-mentioned flow table may include the quintuple information of the data flow.
  • the quintuple information is the Internet Protocol (IP) address of the interconnection between the source network, the destination IP address, the source port number, and the destination. Port number and protocol number.
  • IP Internet Protocol
  • Step 601 The configuration device obtains the first data stream forwarded by the virtual switch.
  • the first data stream is any data stream forwarded by the virtual switch.
  • a data stream of the service can be generated (which may be referred to as the first data stream in the following). Then the virtual machine transmits the first data stream to the virtual switch of the target host. Or applications in virtual machines of other hosts need to perform services.
  • the service data stream (which may be referred to as the first data stream in the following) can be generated, and the first data stream can be transmitted to the virtual switch of the target host.
  • the virtual switch of the target host can receive the first data stream, and the virtual switch will determine whether the flow table corresponding to the first data stream is stored. If the judgment result is that the flow table corresponding to the first data stream is stored, the time of the flow table is updated to the current time, and if the judgment result is that the flow table corresponding to the first data flow is not stored, the first data flow is established The corresponding flow table.
  • the virtual switch sends the first data stream to the service identification engine of the configuration device. In this way, the configuration device obtains the first data stream through the service recognition engine.
  • the service recognition engine is a netfilter with hooks added for obtaining data streams.
  • Step 602 The configuration device determines the service information of the first data stream.
  • the service information of the data stream includes the service type of the data stream and the access path of the data stream.
  • the service type is used to indicate the type of the data stream to be processed.
  • Business types include mail type, web service type, file transfer type, office system type, voice service type, etc.
  • the access path of the data stream refers to the path composed of all the devices that the data stream passes through from the source end to the destination end.
  • the configuration device can identify the first data stream, and determine the service type of the service information of the first data stream and the access path of the first data stream.
  • the first data stream is an encrypted data stream
  • the service recognition engine obtains the password
  • the first data stream can be decrypted and subsequent processing can be performed.
  • the service recognition engine fails to obtain the password
  • the first data stream can be input into the preset service type recognition model to obtain the service type of the first data stream.
  • the preset service recognition model may be a service type recognition model obtained by training based on various data streams calibrated with service types.
  • Step 603 The configuration device determines a QoS policy matching the first data flow according to the service information of the first data flow.
  • the Qos strategy includes one or more of the network bandwidth requirements of the service, the delay requirement of the service, or the packet loss requirement of the service.
  • the network bandwidth requirement can be a network bandwidth range, indicating that the minimum bandwidth of the service cannot be lower than the minimum value of the network bandwidth range, and the maximum bandwidth of the service cannot be higher than the maximum value of the network bandwidth range
  • the delay requirement can be delay Threshold, indicating that the delay of the data stream cannot exceed the delay threshold
  • the packet loss requirement can be a packet loss rate threshold, indicating that the packet loss rate of the data stream cannot exceed the packet loss rate threshold.
  • the configuration device can use the service type of the first data stream to determine the QoS policy matching the first data stream.
  • Step 604 The configuration device configures the devices on the access path according to the matched QoS policy.
  • the configuration apparatus may configure the device on the access path of the first data flow according to the QoS policy matching the first data flow.
  • the device on the subsequent access path of the first data stream may process the first data stream based on the configuration of the first data stream.
  • the configuration device can determine the Qos policy matching the data flow and the access path based on the data flow. Then the configuration device configures the devices on the access path based on the Qos policy matching the data flow. In this way, for any service, the access path device can be configured in this way without manual configuration, so the efficiency of configuring the Qos strategy of the service can be improved.
  • the configuration device may determine the service type of the first data stream as follows:
  • the configuration device can identify the first data stream according to the seventh layer protocol of the network (ie, the application layer protocol), and identify the application layer protocol corresponding to the first data stream. Then the configuration device obtains the service type of the first data stream according to the correspondence between the application layer protocol and the service type.
  • the application layer protocol is the http protocol
  • the service type can be the web service type.
  • the method for the configuration apparatus to determine the access path of the first data stream may be:
  • the configuration device determines the source identifier and destination identifier of the first data stream according to the quintuple information in the first data stream, and determines the first data stream according to the network topology, source identifier, and destination identifier of the host to which the stored virtual switch belongs.
  • the access path of a data stream is not limited to the network topology, source identifier, and destination identifier of the host to which the stored virtual switch belongs.
  • the configuration device recognizes the header in the first data stream, and obtains the quintuple information therefrom.
  • the configuration device obtains the source end identifier (including the source end IP address and the source port number) and the destination end identifier (including the destination end IP address and the destination port number) of the first data stream in the quintuple information.
  • the configuration device obtains the network topology of the host to which the stored virtual switch belongs.
  • the configuration device uses the source identification of the first data stream to correspond to the source device of the first data stream in the network topology, and uses The destination identifier of the first data flow corresponds to the destination device of the first data flow in the network topology.
  • the configuration apparatus may determine a path from the source device to the destination device based on the source device and the destination device, and the path is the access path of the first data stream.
  • the process for the configuration device to determine the path from the source device to the destination device is:
  • the network topology records: the host where the virtual machine is located, the virtual switch bound to the virtual network card of the virtual machine, the physical network card connected to the virtual switch, the port of the physical switch connected to the physical network card, and the interconnection between the physical switches relationship.
  • each physical switch that the first data packet passes through will establish a forwarding table for the first data packet, so that the forwarding table from the source device to the destination device is It was recorded.
  • the configuration device finds the physical switch that communicates with the virtual switch that forwards the first data stream, and then determines the physical switch through which the first data stream is to be transmitted to the destination device based on the forwarding table of the first data stream, and thus determines The path from the source device to the destination device.
  • the configuration device can only manage the data center controlled by itself, if the destination device of the first data stream is the same as the source device In the data center, the access path of the first data stream determined by the configuration device is the access path from the source end to the destination end. If the destination device of the first data stream and the source device are not in the same data center, the access path of the first data stream determined by the configuration device is actually the access path from the source end to the outgoing port of the data center. Including the access path from the outgoing port of the data center to the destination.
  • LLDP Link Layer Discovery Protocol
  • SNMP Simple Network Management Protocol
  • the configuration device itself stores the network topology and the forwarding table of the first data stream. If the configuration device is not a network management device, the configuration device may obtain the network topology and the forwarding table of the first data stream from the network management device.
  • step 603 the manner of determining the Qos policy matching the first data stream may be:
  • the configuration device determines the SLA corresponding to the service type of the first data stream according to the stored correspondence between the service type and the SLA, and determines the QoS policy matching the first data stream according to the SLA corresponding to the service type.
  • the service type is the file transfer type
  • the SLA corresponding to the file transfer type includes: the amount of data to be transmitted within the target duration, the target number of data packets that can be lost when the amount of data is transmitted, and the maximum delay for transmitting the amount of data is Target value, etc.
  • a service information center is established in the configuration device, and SLAs corresponding to various service types are stored in the service information center. Specifically, the corresponding relationship between service types and SLAs can be used for storage.
  • the configuration device may search for the SLA corresponding to the service type of the first data stream in the correspondence between the service type and the SLA in use. Then the configuration device converts the SLA into a Qos policy, and the Qos policy is the Qos policy that matches the first data stream.
  • the amount of data transferred in the SLA can be divided by the maximum and minimum values of the target duration to determine the second
  • the maximum and minimum values of the amount of data transmitted by the clock, and the maximum and minimum values of the amount of data transmitted per second are the network bandwidth requirements.
  • the configuration device obtains the preset data packet size, and then divides the data amount by the preset data packet size to obtain the number of data packets of the data amount, and then divides the target number by the number of data packets of the data amount , To obtain the packet loss rate, which is the packet loss requirement.
  • the configuration device obtains the number of data packets of the data amount, and then divides the target value by the number of data packets of the data amount to obtain the delay of each data packet, which is the delay requirement.
  • the service type is the file transmission type as an example for description, and other service types are similar to this, and will not be repeated in the embodiment of this application.
  • the configuration device can also directly store the Qos policy corresponding to each service type, that is, the configuration device converts the SLA corresponding to the service type to the Qos policy in advance, and then stores the correspondence between the service type and the Qos policy.
  • the subsequent configuration device can directly use the service type to obtain the corresponding Qos policy.
  • other equipment can convert the SLA corresponding to the service type to the QoS policy corresponding to the service type, and the configuration apparatus can obtain the correspondence between the service type and the QoS policy from the other equipment.
  • step 604 the execution process may be as shown in FIG. 7:
  • Step 6041 The configuration device determines the sub-Qos strategy corresponding to each device on the access path according to the matched QoS strategy.
  • step 6041 When step 6041 is performed, there may be multiple possible implementations. Two possible implementations are given below:
  • Method 1 The configuration device obtains monitoring indicators of each device on the access path, where the monitoring indicators include one or more of CPU occupancy rate, memory occupancy rate, packet loss rate, and transmission delay.
  • the configuration device determines the key equipment in the equipment on the access path according to the monitoring indicators of each equipment.
  • the configuration device determines the sub-Qos strategy of the key equipment according to the minimum requirements of each index in the matched Qos strategy.
  • the QoS strategy that the configuration device will match is determined as the sub-Qos strategy of the equipment on the access path except for the key equipment.
  • the configuration device is connected to the monitoring device, and the monitoring device collects monitoring indicators of each device of the network topology.
  • each device of the network topology periodically reports its own monitoring indicators to the monitoring device, and the monitoring indicators include one or more of CPU usage, memory usage, packet loss rate, and transmission delay.
  • the CPU occupancy rate is the CPU occupancy rate of the device in the network topology in the nearest cycle to the current;
  • the memory occupancy rate is the memory occupancy rate of the device in the network topology in the nearest cycle to the current;
  • the packet loss rate is the rate in the network topology
  • the packet loss rate of the device in the closest period to the current period (the number of data packets entering the device in this period minus the number of data packets sent from the device, to get the number of lost data packets, using the lost data packet
  • the number divided by the number of data packets entering the device is the packet loss rate);
  • the transmission delay is the transmission delay of the device in the network topology in the nearest cycle (in this cycle, each data packet enters the device The average of the time to the device).
  • the configuration device may send a monitoring index acquisition request to the monitoring device, and the acquisition request carries the identifier of the device on the access path of the first data stream.
  • the monitoring device parses the acquisition request to obtain the identifier of the device on the access path of the first data stream, and uses the identifier to find the monitoring index corresponding to the device on the access path of the first data stream.
  • the monitoring device sends the monitoring index corresponding to the device on the access path of the first data stream to the configuration device.
  • the configuration device receives the monitoring index corresponding to the device on the access path of the first data stream.
  • the configuration device uses the monitoring indicators corresponding to each device on the access path of the first data stream to determine the key devices among the devices on the access path. Specifically, if there are multiple types of monitoring indicators, the configuration device may weight the multiple types of content, and the obtained weighting value will determine the equipment to which the monitoring indicator with the largest weighting value belongs as the key equipment.
  • monitoring indicators include CPU occupancy, memory occupancy, packet loss rate, transmission delay, CPU occupancy, memory occupancy, packet loss rate, and transmission delay have corresponding weights of a, b, c, and d.
  • the access path includes 3 devices, the weighted value of the monitoring index of device 1 on the access path is 0.8, the weighted value of the monitoring index of device 2 on the access path is 0.9, and the weighted value of the monitoring index of device 3 on the access path If the value is 0.6, the configuration device can determine device 2 on the access path as a key device.
  • a threshold can be set.
  • the configuration device can determine the device to which the weighted value of the monitoring index greater than the threshold belongs as the key equipment.
  • the configuration device directly determines the device with the largest weighted value of the monitoring index as the key device.
  • the configuration device determines the minimum requirements of each indicator in the Qos strategy that matches the first data stream. For example, when the Qos policy includes network bandwidth requirements, the range of the network bandwidth is 100M ⁇ 200M, and the minimum requirement for network bandwidth requirements is not less than 100M. When the Qos policy includes packet loss requirements, the packet loss rate cannot exceed 10%. The minimum requirement is that the packet loss rate cannot exceed 10%.
  • the configuration device can obtain the sub-Qos strategy of the key device according to the minimum requirements on the basis of the minimum requirements of the indicators in the Qos strategy matching the first data stream. Specifically, it can be based on the minimum requirement to increase the requirement according to a certain algorithm. For example, the minimum requirement of the network bandwidth requirement in the Qos policy matching the first data stream is not less than 100M, and the sub-Qos of the first data stream corresponding to the key device The minimum requirement of the network bandwidth requirement in the strategy is not less than 120M and so on.
  • the minimum requirement of the packet loss requirement in the Qos policy matching the first data stream is that the packet loss rate cannot exceed 8%, and the minimum requirement of the packet loss requirement in the sub-Qos policy of the first data stream corresponding to the key device is not to exceed 7% etc.
  • the configuration apparatus may determine the Qos policy matching the first data stream as the sub-Qos policy of each device in the other devices.
  • the configuration device may determine the Qos policy matching the first data stream as the sub-Qos policy of each device on the access path of the first data stream.
  • Step 6042 For each device on the access path, the configuration apparatus configures the device according to the sub-Qos policy corresponding to the device.
  • the configuration device uses the sub-Qos policy corresponding to the device and the first The identifier of the data stream, sent to the device.
  • the specific identifier of the first data stream may be the quintuple information of the first data stream, or the unique value obtained after some processing of the quintuple information of the first data stream (such as a hash value after a hash process). ).
  • the device After the device receives the sub-Qos policy corresponding to the device and the identifier of the first data stream, it can add the identifier of the first data stream and the sub-Qos policy corresponding to the device to the corresponding relationship between the identifier of the data stream and the Qos policy .
  • a device on the access path of the subsequent first data stream receives a data stream, it can identify the identifier of the data stream. If in the stored corresponding relationship between the identifier of the data stream and the Qos policy, the Qos policy corresponding to the identifier of the data stream can be found, then the Qos policy is used to execute the processing of the data stream.
  • the Qos policy that matches the first data flow is determined based on the first data flow, so the device that forwards the service data flow for the first time has not configured the Qos policy that matches the first data flow, so
  • the configuration apparatus may issue a preset Qos policy for each device that forwards a data stream of a service for the first time, and each device stores the preset Qos policy. In this way, when the device that forwards the first data stream for the first time receives the first data stream, because the stored correspondence between the identifier of the data stream and the QoS policy does not find the QoS policy corresponding to the identifier of the first data stream, A preset QoS strategy can be obtained to process the first data stream.
  • the Qos strategy includes service network bandwidth requirements, service delay requirements or service packet loss requirements, it is a requirement for each device on the access path, and It is not a cumulative requirement for all devices on the access path. For example, the delay of the data flow of the business is 2 milliseconds, and the requirement for each device on the access path is 2 milliseconds.
  • the configuration apparatus obtains the disappearance message of the first data stream sent by the virtual switch, or determines that the data stream forwarded by the virtual switch does not include the first data stream according to the quintuple information of the data stream forwarded by the virtual switch. Cancel the configuration of the device on the access path according to the matched QoS policy.
  • the configuration device can use two methods to determine that the data stream forwarded by the virtual switch does not include the first data stream:
  • Manner 1 A flow table corresponding to the first data flow is established on the virtual switch, and each time a data packet of the first data flow is transmitted, the time of the flow table corresponding to the first data flow is updated.
  • the virtual switch may determine the last update time of the flow table corresponding to the first data flow, and then use the last update time to determine the time length from the current point in time.
  • the virtual switch determines the size of the duration and the first preset duration (the first preset duration is used to indicate that the probability of receiving the first data stream within a subsequent period of time is very low), if the duration is greater than the first preset duration, then It can be determined that the first data stream disappeared.
  • the virtual switch may send a disappearing message of the first data stream to the service identification engine of the configuration device, and the disappearing message carries the identifier of the first data stream, such as the quintuple information of the first data stream.
  • the service identification engine of the configuration device After the service identification engine of the configuration device receives the disappearance message of the first data flow, it can parse the identification of the first data flow therefrom, and it can be determined that the data flow forwarded by the virtual switch does not include the first data flow.
  • Method 2 The service recognition engine will record the time point of each data stream it receives. If the time between the last reception time of the first data stream and the current time point exceeds the second preset time period (the second preset time period is used to indicate The possibility of receiving the first data stream subsequently is very low), it is determined that the data stream forwarded by the virtual switch does not include the first data stream. It should be noted here that the second method is only applicable to the processing method in which each data packet of the first data stream is sent by the virtual switch to the service identification engine.
  • the configuration apparatus may send a deconfiguration notice to the device on the access path of the first data stream, and the deconfiguration notice carries the information of the first data stream.
  • logo When the device on the access path of the first data stream receives the unconfiguration notification, it can delete the QoS policy corresponding to the identifier of the first data stream in the corresponding relationship between the identifier of the data stream and the QoS policy. Corresponding item.
  • the Qos policy in the device on the access path of the first data stream can be cleaned up in time to reduce memory usage.
  • the first data stream is a newly added data stream
  • the process of identifying that the first data stream is a newly added data stream may be as follows:
  • the configuration device obtains the increase message of the first data stream sent by the virtual switch, or determines that the data stream forwarded by the virtual switch adds the first data stream on the basis of the original data stream according to the quintuple information of the data stream forwarded by the virtual switch.
  • a flow table corresponding to the data flow is established on the virtual switch.
  • the virtual switch When the virtual switch receives the first data flow, it will determine whether the flow table corresponding to the first data flow is stored. If the flow table corresponding to the first data flow is not stored, the virtual switch will establish a flow table corresponding to the first data flow and correspond the flow table to the current time.
  • the virtual switch may send an increase message of the first data flow to the service identification engine, where the increase message carries an identifier of the first data flow, such as quintuple information of the first data flow.
  • the configuration device After receiving the adding message of the first data stream, the configuration device can parse the identifier of the first data stream from it, and can determine that the first data stream is newly added to the virtual switch.
  • the service recognition engine may record the identifier of each data stream it receives, and if the service identifier of the first data stream does not belong to the identifier of the previously received data stream, it is determined that the first data stream is a newly-added data stream.
  • the subsequent configuration device can obtain the first data stream, and execute the process from step 602 to step 604.
  • the newly added data stream can be identified in time, and the Qos policy can be configured for the newly added data stream.
  • the configuration device may determine the adjusted Qos matching the first data stream.
  • the strategy is to configure the device on the access path of the first data flow based on the adjusted Qos strategy that matches the first data flow (the configuration process is the same as the previous processing, and will not be repeated here).
  • the configuration device may determine the access of the first data stream based on the current network topology, the source end and the destination end of the first data stream Whether the path has changed. If the access path of the first data stream has not changed, the configuration device does not perform processing. If the access path of the first data stream changes, it is determined that the devices on the changed access path do not belong to the devices on the original access path. The configuration device configures these devices based on the Qos policy matched with the first data stream. In this way, when the first data stream is transmitted on these devices, it is also processed according to the Qos policy that matches the first data stream. In addition, the configuration device can also cancel the Qos policy based on matching with the first data stream, and configure a device that no longer transmits the first data stream.
  • the configuration device also stores the correspondence between the service type and the service level. In this correspondence, for any two service types, when queuing to transmit the data streams of the two service types, the data stream of the service type of the higher service level is transmitted in priority to the data stream of the service type of the lower service level.
  • the configuration device may also determine the service level corresponding to the service type of the first data stream in the corresponding relationship between the service type and the service level.
  • the configuration apparatus may deliver the service level and the identifier of the first data flow to the equipment on the access path of the first data flow.
  • the device on the access path of the first data stream may correspondingly add the identifier of the first data stream and the service level of the first data stream to the corresponding relationship between the identifier of the data stream and the service level. In this way, devices on the access path of the subsequent first data flow can forward the data flow based on the service level.
  • the first data stream is a general reference, and the above-mentioned manner can be adopted for all data streams.
  • Fig. 8 is a structural diagram of a service quality policy device for configuring a service provided by an embodiment of the present application.
  • the device can be implemented as part or all of the device through software, hardware or a combination of the two.
  • the apparatus provided in the embodiment of the present application can implement the process described in FIG. 6 of the embodiment of the present application.
  • the apparatus includes: an acquisition module 810, a determination module 820, and a configuration module 830, wherein:
  • the obtaining module 810 is configured to obtain the first data stream forwarded by the virtual switch, which may be specifically used to implement the obtaining function of step 601 and the implicit steps included in step 601;
  • the determining module 820 is used for:
  • Determining the service information of the first data stream where the service information includes the service type of the first data stream and the access path of the first data stream;
  • the quality of service QoS policy that matches the first data stream, which can be specifically used to implement the determining function of step 602 and step 603 and the implicit steps included in step 602 and step 603 ;
  • the configuration module 830 is configured to configure the devices on the access path according to the matched QoS policy, and can be specifically used to implement the determining function of step 604 and the implicit steps included in step 604.
  • the determining module 820 is configured to:
  • the access path of the first data stream is determined according to the network topology of the host to which the stored virtual switch belongs, the source end identifier and the destination end identifier.
  • the determining module 820 is configured to:
  • a QoS policy that matches the first data flow is determined.
  • the configuration module 830 is configured to:
  • the configuration module 830 is configured to:
  • monitoring indicators of each device on the access path include one or more of the CPU occupancy rate, memory occupancy rate, packet loss rate, and transmission delay of the central processing unit;
  • the matched Qos policy is determined as a sub Qos policy of devices on the access path other than the key device.
  • the determining module 820 is further configured to:
  • the configuration module 830 is also used for:
  • the determining module 820 is further configured to:
  • the configuration device may determine the Qos policy matching the data flow and the access path based on the data flow. Then the configuration device configures the devices on the access path based on the Qos policy matching the data flow. In this way, for any service, the device on the access path can be configured in this way without manual configuration, so the efficiency of configuring the QoS strategy of the service can be improved.
  • the division of modules in the above embodiments of the present application is illustrative, and it is only a logical function division. In actual implementation, there may also be other division methods.
  • the functional modules in the various embodiments of the present application may be integrated in In a processor, it may also exist alone physically, or two or more modules may be integrated into one module.
  • the above-mentioned integrated modules can be implemented in the form of hardware or software function modules.
  • the service quality policy device for configuring services provided in the above embodiment only uses the division of the above functional modules to illustrate when configuring the service quality policy of the service.
  • the above functions can be changed according to needs.
  • the allocation is completed by different functional modules, that is, the internal structure of the device is divided into different functional modules to complete all or part of the functions described above.
  • the device for configuring the service quality policy provided by the above-mentioned embodiment and the embodiment of the service quality policy method for configuring the service belong to the same concept.
  • the specific implementation process please refer to the method embodiment, which will not be repeated here.
  • Fig. 9 exemplarily provides a possible architecture diagram of the computing device of the present application.
  • the computing device may include a processor 901, a memory 902, a communication interface 903, and a bus 904.
  • the number of processors 901 may be one or more, and FIG. 9 only illustrates one of the processors 901.
  • the processor 901 may be a CPU. If the computing device has multiple processors 901, the types of the multiple processors 901 may be different or may be the same. Optionally, multiple processors of the computing device may also be integrated into a multi-core processor.
  • the memory 902 stores computer instructions and data, and the memory 902 can store computer instructions and data required to implement the method for configuring the service quality policy of the application provided by the present application.
  • the memory 902 may be any one or any combination of the following storage media: non-volatile memory (such as read-only memory (Read-Only Memory, ROM), solid state disk (Solid State Disk, SSD), hard disk (Hard Disk) Drive, HDD), optical disc, etc.), volatile memory.
  • the communication interface 903 may be any one or any combination of the following devices: a network interface (such as an Ethernet interface), a wireless network card, and other devices with a network access function.
  • the communication interface 903 is used for data communication between the computing device and other nodes or terminal devices.
  • FIG. 9 also exemplarily plots the bus 904.
  • the bus 904 can connect the processor 901 with the memory 902 and the communication interface 903. In this way, through the bus 904, the processor 901 can access the memory 902, and can also use the communication interface 903 to interact with other computing devices or terminal devices.
  • the computing device executes the computer instructions in the memory 902, and uses the computing device to implement the method of providing network services for the business provided in this application.
  • the computing device is caused to execute the steps performed by the receiving module in the above-mentioned method for configuring the service quality policy of the service.
  • the computer program product includes one or more computer instructions, and when the computer program instructions are loaded and executed on a server or a terminal, the processes or functions described in the embodiments of the present application are generated in whole or in part.
  • the computer instructions may be stored in a computer-readable storage medium, or transmitted from one computer-readable storage medium to another computer-readable storage medium.
  • the computer instructions may be transmitted from a website, computer, server, or data center.
  • the computer-readable storage medium may be any available medium that can be accessed by a server or a terminal, or a data storage device such as a server or a data center integrated with one or more available media.
  • the usable medium may be a magnetic medium (such as a floppy disk, a hard disk, a tape, etc.), an optical medium (such as a digital video disk (Digital Video Disk, DVD), etc.), or a semiconductor medium (such as a solid state hard disk, etc.).

Abstract

本申请提供了一种配置业务的服务质量策略方法、装置和计算设备,属于网络通信技术领域。该方法包括:获取由虚拟交换机转发的第一数据流,确定第一数据流的业务信息,其中,业务信息包括第一数据流的业务类型和第一数据流的访问路径,根据第一数据流的业务信息,确定与第一数据流匹配的服务质量QoS策略,根据匹配的QoS策略配置访问路径上的设备。采用本申请,可以提高配置业务的服务质量策略的效率。

Description

配置业务的服务质量策略方法、装置和计算设备
本申请要求于2019年12月31日提交中国专利局、申请号为201911403653.3、发明名称为“配置业务的服务质量策略方法、装置和计算设备”的中国专利申请的优先权,以及于2019年11月19日提交的申请号为201911138148.0、发明名称为“一种为业务流配置Qos的方法和系统”的中国专利申请的优先权,前述两件专利申请的全部内容通过引用结合在本申请中。
技术领域
本申请涉及网络通信技术领域,特别涉及一种配置业务的服务质量策略方法、装置和计算设备。
背景技术
随着网络技术的发展,云网络由数据中心内的虚拟网络与物理网络资源共同组成,为数据中心提供网络服务,可以使数据中心内的主机灵活的与数据中心外的主机以及数据中心内的主机进行通信,这样,可以使得部署在主机上的业务在主机间实现业务访问。
相关技术中,数据中心中的业务在进行业务访问时通常需要经过多个不同的设备,为了使业务的服务质量可以保证,人工在业务的数据流经过的设备上设置该业务的服务质量(Quality of Service,Qos)策略,这样,业务的数据流在设备上进行传输时,可以按照该Qos策略,处理数据流,从而可以保证该业务的服务质量。
在相关技术中,是人工在业务的数据流经过的设备上设置业务的业务Qos策略,这样,在业务比较多或者,业务的数据流经过的设备比较多时,花费大量的时间。
发明内容
本申请提供了一种配置业务的服务质量策略方法、装置和计算设备,在业务的数据流经过的设备比较多时,节约配置业务的服务质量策略的时间。
第一方面,本申请提供一种配置业务的服务质量策略方法,该方法包括:获取由虚拟交换机转发的第一数据流。确定第一数据流的业务信息,其中,该业务信息包括第一数据流的业务类型和第一数据流的访问路径。根据第一数据流的业务信息,确定与第一数据流匹配的QoS策略。根据该匹配的QoS策略配置访问路径上的设备。
本申请所示的方案,配置业务的服务质量策略的方法可以由配置装置执行,某个主机(可以称为是目标主机)的虚拟机中的应用要进行业务时,可以生成该业务的数据流(后续可以称为是第一数据流)。然后虚拟机将第一数据流传输至主机的虚拟交换机。或者其他主机的虚拟机中的应用要进行业务,访问目标主机时,可以生成该业务的数据流(后续可以称为是第一数据流),将第一数据流传输至目标主机的虚拟交换机。虚拟交换机将第一数据流发送至配置装置的业务识别引擎。配置装置可以对第一数据流进行识别,确定出第一数据流的业务类型和第一数据流的访问路径。配置装置可以使用第一数据流的业务类型,确定与第一数据流匹配的Qos策略。然后可以根据与第一数据流匹配的Qos策略,配置第一数据流的访问 路径上的设备。后续第一数据流的访问路径上的设备可以基于第一数据流的配置,对第一数据流进行处理。这样,对于任一业务,均可以使用配置装置配置访问路径的设备,而不需要人工配置,所以可以提高配置业务的Qos策略的效率。
在一种可能的实施方式中,根据第一数据流中的五元组信息,确定第一数据流的源端标识和目的端标识。根据存储的虚拟交换机所属主机所在的网络拓扑、源端标识和目的端标识,确定第一数据流的访问路径。
本申请所示的方案,配置装置可以识别第一数据流中的报头,从中获得五元组信息。配置装置在五元组信息中,获取到第一数据流的源端标识(包括源端网际协议(Internet Protocol,IP)地址和源端口号)和目的端标识(包括目的端IP地址和目的端口号)。然后配置装置获取存储的目标主机所在的网络拓扑,在该网络拓扑中,配置装置使用第一数据流的源端标识,对应到第一数据流在该网络拓扑的源端设备,并使用第一数据流的目的端标识,对应到第一数据流在该网络拓扑的目的端设备。然后配置装置可以基于源端设备和目的端设备,确定从源端设备至目的端设备的路径,该路径即为第一数据流的访问路径。这样,可以比较准确的确定出第一数据流的访问路径。
在一种可能的实施方式中,根据存储的业务类型与服务水平协议(Service Level Agreement,SLA)的对应关系,确定第一数据流的业务类型对应的SLA。根据该业务类型对应的SLA,确定与第一数据流匹配的QoS策略。
本申请所示的方案,配置装置可以获取存储的业务类型与SLA的对应关系,在该对应关系中,确定出第一数据流的业务类型对应的SLA。然后配置装置可以将该SLA,转换为Qos策略,该Qos策略即为与第一数据流匹配的QoS策略。这样,可以获取到与第一数据流匹配的Qos策略。
在一种可能的实施方式中,根据与第一数据流匹配的Qos策略,确定第一数据流的访问路径上各设备对应的子Qos策略。对于该访问路径上的每个设备,根据该设备对应的子Qos策略,配置该设备。
本申请所示的方案,配置装置可以根据与第一数据流匹配的Qos策略,确定出第一数据流的访问路径上各设备对应的子Qos策略。后续对于该访问路径上的每个设备,配置装置使用该设备对应的子Qos策略,配置该设备。这样,对于访问路径上的每个设备,分别确定子Qos策略,可以更好的保证业务的服务质量。
在一种可能的实施方式中,根据与第一数据流匹配的Qos策略,确定第一数据流的访问路径上各设备的子Qos策略,包括:获取该访问路径上各设备的监控指标,其中,该监控指标包括中央处理器(Central Processing Unit/Processor,CPU)占用率、内存占用率、丢包率、传输时延中的一种多种。根据该各设备的监控指标,确定该访问路径上的设备中的关键设备,其中,该关键设备为该访问路径上数据流处理最慢的设备。根据该匹配的Qos策略中各项指标的最低要求,确定该关键设备的子Qos策略。将该匹配的Qos策略,确定为该访问路径上除该关键设备之外的设备的子Qos策略。
本申请所示的方案,配置装置可以获取第一数据流的访问路径上各设备的监控指标,该监控指标包括CPU占用率、内存占用率、丢包率、传输时延中的一种多种。CPU占用率为设备在离当前最近的周期内的CPU占用率;内存占用率为设备在离当前最近的周期内的内存占用率;丢包率为设备在离当前最近的周期内的丢包率(该周期内进入该设备的数据包的数目减去从该设备发出的数据包的数目,得到丢掉的数据包的数目,使用丢掉的数据包的数目除 以该进入该设备的数据包的数目即为丢包率);传输时延为设备在离当前最近的周期内传输时延(该周期内每个数据包从进入该设备到出该设备的时长的平均值)。然后配置装置使用该各设备的监控指标,确定该访问路径上的设备中的关键设备。然后配置装置确定与第一数据流匹配的Qos策略中各指标的最低要求,基于该最低要求,确定关键设备的子Qos策略。并且配置装置可以确定与第一数据流匹配的Qos策略,确定为第一数据流的访问路径上的各设备中除关键设备之外的设备的子Qos策略。这样,可以对应访问路径上的每个设备,确定子Qos策略。
在一种可能的实施方式中,该方法还包括:获取虚拟交换机发送的第一数据流的消失消息,或者根据该虚拟交换机转发的数据流的五元组信息,确定该虚拟交换转发的数据流不包括所述第一数据流。取消根据与第一数据流匹配的QoS策略对第一数据流的访问路径上的设备的配置。
本申请所示的方案,配置装置接收到目标主机的虚拟交换机发送的第一数据流的消失消息后,可以从中解析到第一数据流的标识,可以确定该虚拟交换机转发的数据流中不包括第一数据流。或者,配置装置获取该虚拟交换机转发的数据流的五元组信息,若这些五元组信息中不包括第一数据流的五元组信息,则确定该虚拟交换机转发的数据流中不包括第一数据流。
然后配置装置可以取消使用与第一数据流匹配的QoS策略,对第一数据流的访问路径上的设备的配置。这样,可以节约设备的存储空间。
在一种可能的实施方式中,该方法还包括:获取虚拟交换机发送的第一数据流的增加消息,或者根据该虚拟交换机转发的数据流的五元组信息,确定该虚拟交换转发的数据流在原有数据流的基础上增加第一数据流。
本申请所示的方案,配置装置接收到目标主机的虚拟交换机发送的第一数据流的增加消息后,可以从中解析到第一数据流的标识,可以确定该虚拟交换机转发的数据流中包括第一数据流。或者,配置装置获取虚拟交换机转发的数据流的五元组信息,若这些五元组信息中新增第一数据流的五元组信息,则确定该虚拟交换机转发的数据流中新增第一数据流。这样,可以及时的确定出新增的数据流,基于与该数据流匹配的Qos策略,对该数据流的访问路径上的设备进行配置。
第二方面,本申请提供了一种配置业务的服务质量策略装置,该装置包括多个模块,该多个模块通过执行指令来执行上述第一方面所述的方法。
第三方面,本申请提供了一种计算设备,所述计算设备包括存储器和处理器,所述处理器执行所述存储器存储的计算机指令,使得所述计算设备执行上述第一方面所述的方法。
第四方面,本申请提供了一种非易失性可读计算机存储介质,所述计算机存储介质存储有计算机程序,所述计算机程序在被计算设备执行时实现上述第一方面所述的方法。
第五方面,本申请提供了一种计算机程序产品,所述计算机程序产品包括计算机指令,当所述计算机指令被计算设备执行时,所述计算设备执行上述第一方面所述的方法。
本申请提供的技术方案至少包括以下有益效果:
在本申请中,配置装置可以基于数据流,确定出与数据流匹配的Qos策略,以及访问路径。然后配置装置基于与数据流匹配的Qos策略,配置该访问路径上的设备。这样,对于任一业务,均可以使用该方式配置访问路径上的设备,而不需要人工配置,所以可以提高配置业务的Qos策略的效率。
附图说明
图1为本申请实施例提供的一种云网络的结构示意图;
图2为本申请实施例提供的一种云网络中设置配置装置的结构示意图;
图3为本申请实施例提供的一种云网络中设置配置装置的结构示意图;
图4为本申请实施例提供的一种数据流的传输示意图;
图5为本申请实施例提供的一种数据流的传输示意图;
图6为本申请实施例提供的一种配置业务的服务质量策略方法的流程示意图;
图7为本申请实施例提供的一种确定访问路径上各设备的子Qos策略的流程示意图;
图8为本申请实施例提供的一种配置业务的服务质量策略装置的结构示意图;
图9为本申请实施例提供的一种计算设备的结构示意图。
具体实施方式
为使本申请的目的、技术方案和优点更加清楚,下面将结合附图对本申请实施方式作进一步地详细描述。
为了便于对本申请实施例的理解,下面首先介绍所涉及到的名词的概念:
云网络,由数据中心内的虚拟网络与物理网络资源共同组成,大致结构图如图1所示,云网络中包括主机、以及多个提供服务的设备(后续可以简称为服务设备)、多个物理交换机(Physical Switch)。服务设备提供的服务包括但不限于虚拟专用网络(Virtual Private Network,VPN)服务、弹性负载均衡(Elastic Load Balance,ELB)服务、网络地址转换(Network Address Translation,NAT)服务和虚拟路由器(Virtual Router)服务等。每个主机与一个物理交换机连接,每个主机通过物理交换机与一个服务设备连接。主机中挂载有多个虚拟机(虚拟机可以是任意一种虚拟化的虚拟机),多个虚拟机使用虚拟网卡(virtual Network Interface Card,vNIC)实现网络通信。主机包括分布式虚拟防火墙(Distribute Firewall,DFW)、虚拟交换机(Virtual Switch)、分布式虚拟路由器(Distribute Virtual Router,DVR)和物理网卡(Physical Network Interface Card,pNIC)等。此处需要说明的是,此处仅示出了一个主机、一个服务设备和一个物理交换机。
相关技术中,为了保证业务的服务质量,人工在业务的数据流经过的设备上设置该业务的Qos策略,在业务比较多或者业务的数据流经过的设备比较多时,会耗费大量的时间。而且在虚拟机发生迁移后,虚拟机上的业务的数据流的访问路径也会相应的改变,而人工并不能及时的发现业务的数据流的访问路径已发生改变,即使人工及时的发现访问路径发生改变,也需要人工去更改后的访问路径上,重新配置该业务的Qos策略,配置效率比较低,所以需要提供一种高效率的配置业务的Qos策略的方法。
本申请提供了一种配置业务的Qos策略方法,该方法的执行主体可以是Qos策略的配置 装置(后续可以简称为配置装置),如图2所示,配置装置与图1中的主机建立有通信连接、与图1中提供ELB服务等服务的设备有通信连接。该配置装置可以是硬件设备,如计算设备,也可以是软件,如部署在计算设备的程序等。此处需要说明的是,图2中仅示出了一个主机,实际上配置装置可以管理多个主机,在每个主机上设置进程(可以称为四业务识别引擎),用于识别业务的数据流,如图3所示。
在一种可能的实施方式中,配置装置为硬件设备时,在主机中设置一个进程(可以称为是业务识别引擎),配置装置通过该进程获取经过主机传输的数据流。此外,配置装置还可以通过该进程获取该数据流的业务类型、该数据流的源端和目的端。
在一种可能的实施方式中,配置装置为软件时,可以部署在计算设备和主机上。部署在主机上部分为一个进程(可以称为是业务识别引擎),该进程用于获取经过主机传输的数据流、以及确定该数据流的业务类型和该数据流的源端和目的端。部署在计算设备的部分可以用于基于该进程确定的内容,确定出该数据流的Qos策略(在后文进行描述)。
需要说明的是,上述业务识别引擎获取主机传输的数据流的方式有多种,以下给出两种可行的方式:
方式一,如图4所示,经过主机传输的数据流,在经过主机的虚拟交换机时,主机的虚拟交换机将该数据流传输给业务识别引擎。业务识别引擎在获取到数据流后,对该数据流进行识别,确定出该数据流的业务类型和该数据流的源端和目的端。然后业务识别引擎将该数据流传输至虚拟交换机,虚拟交换机继续执行后续处理(后续处理与相关技术中虚拟交换机的处理完全相同,本申请不再赘述)。此处需要说明的是,为了防止主机的虚拟交换机将接收到业务识别引擎传输的业务数据流再次传输给业务识别引擎,业务识别引擎在将数据流发送至虚拟交换机时,可以携带一个标识,该标识用于指示该数据流可以继续进行处理,而不是传输至业务识别引擎。
方式二,如图5所示,经过主机传输的数据流,在经过虚拟交换机时,虚拟交换机将数据流复制一份,虚拟交换机将原来的数据流走正常的处理流程,将复制的数据流传输至业务识别引擎。业务识别引擎接收到后,对该数据流进行识别,确定出该数据流的业务类型和该数据流的源端和目的端。然后业务识别引擎将该数据流删除。
另外,对于上述方式一和方式二,虚拟交换机每接收到一条数据流,会建立流表或者更新流表(建立流表的情况是当前未存储有该数据流对应的流表,新建该数据流对应的流表,更新流表的情况是对应该数据流存储有该数据流的流表,可以仅将该流表的时间更新为当前时间)。为了减少业务识别引擎的工作重复,虚拟交换机可以仅将新建立流表对应的数据流发送至业务识别引擎,而不会将已经对应有流表的数据流发送至业务识别引擎。这样,对于同一业务,业务处理引擎可以仅处理一次数据流。
需要说明的是,上述流表可以包括数据流的五元组信息,五元组信息为源端网络之间互连的协议(Internet Protocol,IP)地址、目的端IP地址、源端口号、目的端口号和协议号。
以下将结合图6描述配置业务的Qos策略方法的流程(该实施例以上述方式一为例进行说明):
步骤601,配置装置获取由虚拟交换机转发的第一数据流。
其中,第一数据流为虚拟交换机转发的任一数据流。
在本实施例中,某个主机(如目标主机)的虚拟机中的应用要进行业务时,可以生成该业务的数据流(后续可以称为是第一数据流)。然后虚拟机将第一数据流传输至目标主机的虚拟交换机。或者其他主机的虚拟机中的应用要进行业务,访问目标主机时,可以生成该业务的数据流(后续可以称为是第一数据流),将第一数据流传输至目标主机的虚拟交换机。
上述两种方式下,目标主机的虚拟交换机均可以接收到第一数据流,虚拟交换机将判断是否存储有第一数据流对应的流表。若判断结果为存储有第一数据流对应的流表,则将该流表的时间进行更新为当前时间,若判断结果为未存储有第一数据流对应的流表,则建立第一数据流对应的流表。虚拟交换机将第一数据流发送至配置装置的业务识别引擎。这样,配置装置通过业务识别引擎获取到第一数据流。
在一种可能的实施方式中,业务识别引擎为添加有钩子(hook)的网络过滤器(Netfilter),用于获取数据流。
步骤602,配置装置确定第一数据流的业务信息。
其中,对于任一数据流,该数据流的业务信息包括该数据流的业务类型和该数据流的访问路径。对于每个数据流,都对应有一种业务类型。业务类型用于指示所要处理的数据流所属的类型。业务类型包括邮件类型、网页(web)服务类型、文件传输类型、办公系统类型、语音服务类型等。数据流的访问路径指数据流从源端到目的端,所经过的所有设备组成的路径。
在本实施例中,配置装置可以对第一数据流进行识别,确定出第一数据流的业务信息的业务类型和第一数据流的访问路径。
在一种可能的实施方式中,第一数据流是加密的数据流的情况下,若业务识别引擎获取到密码,则可以对第一数据流进行解密后,执行后续处理。若业务识别引擎未能获取到密码,则可以将第一数据流输入至预设的业务类型识别模型,获得该第一数据流的业务类型。预设的业务识别模型可以是基于各种标定有业务类型的数据流训练得到的业务类型识别模型。
步骤603,配置装置根据第一数据流的业务信息,确定与第一数据流匹配的QoS策略。
其中,Qos策略包括业务的网络带宽要求、业务的时延要求或业务的丢包要求中的一种或多种。例如,网络带宽要求可以是一个网络带宽范围,指示业务的最小带宽不能低于该网络带宽范围的最小值,业务的最大带宽不能高于该网络带宽范围的最大值;时延要求可以是时延阈值,指示数据流的时延不能超过该时延阈值;丢包要求可以是丢包率阈值,指示数据流的丢包率不能超过该丢包率阈值。
在本实施例中,配置装置在识别出第一数据流的业务信息后,可以使用第一数据流的业务类型,确定与第一数据流匹配的Qos策略。
步骤604,配置装置根据匹配的QoS策略配置访问路径上的设备。
在本实施例中,配置装置可以根据与第一数据流匹配的Qos策略,配置第一数据流的访问路径上的设备。后续第一数据流的访问路径上的设备可以基于第一数据流的配置,对第一数据流进行处理。
这样,本申请实施例中,配置装置可以基于数据流,确定出与数据流匹配的Qos策略,以及访问路径。然后配置装置基于与数据流匹配的Qos策略,配置该访问路径上的设备。这样,对于任一业务,均可以使用该方式配置访问路径的设备,而不需要人工配置,所以可以提高配置业务的Qos策略的效率。
在一种可能的实施方式中,上述步骤602的处理中,配置装置确定第一数据流的业务类 型的方式可以为:
配置装置可以根据网络第七层协议(即应用层协议),对第一数据流进行识别,识别出第一数据流对应的应用层协议。然后配置装置根据应用层协议与业务类型的对应关系,获得第一数据流的业务类型。例如,应用层协议为http协议,业务类型可以为网页服务类型。
在一种可能的实施方式中,上述步骤602的处理中,配置装置确定第一数据流的访问路径的方方式可以为:
配置装置根据第一数据流中的五元组信息,确定第一数据流的源端标识和目的端标识,根据存储的虚拟交换机所属主机所在的网络拓扑、源端标识和目的端标识,确定第一数据流的访问路径。
本实施例中,配置装置识别第一数据流中的报头,从中获得五元组信息。配置装置在五元组信息中,获取到第一数据流的源端标识(包括源端IP地址和源端口号)和目的端标识(包括目的端IP地址和目的端口号)。然后配置装置获取存储的虚拟交换机所属主机所在的网络拓扑,在该网络拓扑中,配置装置使用第一数据流的源端标识,对应到第一数据流在该网络拓扑的源端设备,并使用第一数据流的目的端标识,对应到第一数据流在该网络拓扑的目的端设备。然后配置装置可以基于源端设备和目的端设备,确定从源端设备至目的端设备的路径,该路径即为第一数据流的访问路径。
具体的,配置装置确定从源端设备至目的端设备的路径的过程为:
网络拓扑中记录有:虚拟机所在的主机、虚拟机的虚拟网卡所绑定的虚拟交换机、虚拟交换机连接的物理网卡、该物理网卡连接的物理交换机的端口、以及各物理交换机之间的互连关系。在第一数据流的第一个数据包传输时,该第一个数据包经过的各物理交换机会建立第一个数据包的转发表,这样,从源端设备到目的端设备的转发表就被记录了。
配置装置查找到与转发第一数据流的虚拟交换机进行通信的物理交换机,进而基于第一数据流的转发表,确定出第一数据流要传输至目的端设备所经过的物理交换机,这样就确定出源端设备至目的端设备的路径。
此处需要说明的是,在不同的数据中心由不同的配置装置管理的情况下,由于配置装置仅能管理自己控制的数据中心,所以如果第一数据流的目的端设备与源端设备在同一数据中心内,则配置装置确定出的第一数据流的访问路径是从源端到目的端的访问路径。如果第一数据流的目的端设备与源端设备不在同一数据中心内,则配置装置确定出的第一数据流的访问路径实际上是从源端到数据中心的出端口的访问路径,而不包括数据中心的出端口至目的端的访问路径。
此处还需要说明的是,物理交换机之间的互连关系可以是通过链路发现协议(Link Layer Discovery Protocol,LLDP)或者简单网络管理协议(Simple Network Management Protocol,SNMP)获取。
此处还需要说明的是,如果配置装置是网络管理设备,则配置装置自身就存储有网络拓扑以及第一数据流的转发表。如果配置装置不是网络管理设备,配置装置可以从网络管理设备获取网络拓扑,以及第一数据流的转发表。
在一种可能的实施方式中,步骤603中,确定与第一数据流匹配的Qos策略的方式可以为:
配置装置根据存储的业务类型与SLA的对应关系,确定第一数据流的业务类型对应的SLA,根据业务类型对应的SLA,确定与第一数据流匹配的QoS策略。
其中,不同的业务类型对应有不同的SLA,基于SLA,可以确定出Qos策略。例如,业务类型为文件传输类型,文件传输类型对应的SLA包括:目标时长范围传输数据的数据量、传输该数据量的数据可以丢目标数目个数据包、传输该数据量的时延最长为目标数值等。
本实施例中,配置装置中建立有业务信息中心,该业务信息中心中存储有各种业务类型对应的SLA,具体可以使用业务类型与SLA的对应关系的方式进行存储。
配置装置在步骤602中确定出第一数据流的业务类型后,可以在使用业务类型与SLA的对应关系中,查找第一数据流的业务类型对应的SLA。然后配置装置将该SLA转换为Qos策略,该Qos策略即为与第一数据流匹配的Qos策略。
具体在将该SLA转换为Qos策略时,对应上述的例子,对于文件传输类型对应的SLA,可以使用该SLA中的传输的数据量除以目标时长范围的最大值和最小值,确定出每秒钟传输的数据量的最大值和最小值,将该每秒钟传输的数据量的最大值和最小值,即为网络带宽要求。
配置装置获得预设的数据包的大小,然后使用该数据量除以预设的数据包的大小,获得该数据量的数据包的数目,然后使用目标数目除以该数据量的数据包的数目,获得丢包率,即为丢包要求。
配置装置获取该数据量的数据包的数目,然后将目标数值除以该数据量的数据包的数目,获得每个数据包的时延,即为时延要求。
此处仅为业务类型为文件传输类型为例进行说明,其它业务类型与之类似,本申请实施例不再赘述。
需要说明的是,当然配置装置也可以直接存储每个业务类型对应的Qos策略,也即配置装置提前将业务类型对应的SLA转换为Qos策略,然后存储业务类型与Qos策略的对应关系。后续配置装置可以直接使用业务类型获取到对应的Qos策略。另外,其它设备可以将业务类型对应SLA转换为业务类型对应的Qos策略,配置装置可以从该其它设备获取业务类型与Qos策略的对应关系。
在一种可能的实施方式中,在步骤604中,执行流程可以为如图7所示:
步骤6041,配置装置根据匹配的Qos策略,确定访问路径上各设备对应的子Qos策略。
在执行步骤6041时,可以有多种可能的实现方式,以下给出两种可能的实现方式:
方式一,配置装置获取访问路径上各设备的监控指标,其中,监控指标包括CPU占用率、内存占用率、丢包率、传输时延中的一种多种。配置装置根据各设备的监控指标,确定访问路径上的设备中的关键设备。配置装置根据匹配的Qos策略中各项指标的最低要求,确定关键设备的子Qos策略。配置装置将匹配的Qos策略,确定为访问路径上除关键设备之外的设备的子Qos策略。
本实施例中,配置装置与监控设备连接,监控设备收集网络拓扑的各设备的监控指标。具体可以是网络拓扑的各设备周期性向监控设备上报自身的监控指标,该监控指标包括CPU占用率、内存占用率、丢包率、传输时延中的一种多种。CPU占用率为网络拓扑中的设备在离当前最近的周期内的CPU占用率;内存占用率为网络拓扑中的设备在距离当前最近的周期内的内存占用率;丢包率为网络拓扑中的设备在距离当前最近的周期内的丢包率(该周期内进入该设备的数据包的数目减去从该设备发出的数据包的数目,得到丢掉的数据包的数目,使用丢掉的数据包的数目除以该进入该设备的数据包的数目即为丢包率);传输时延为网络拓扑中的设备在距离当前最近的周期内传输时延(该周期内每个数据包从进入该设备到出该 设备的时长的平均值)。
配置装置可以向监控设备发送监控指标的获取请求,在该获取请求中携带第一数据流的访问路径上的设备的标识。监控设备接收到后,解析该获取请求,获得第一数据流的访问路径上的设备的标识,使用该标识,查找到第一数据流的访问路径上的设备对应的监控指标。监控设备向配置装置发送第一数据流的访问路径上的设备对应的监控指标。配置装置接收第一数据流的访问路径上的设备对应的监控指标。
配置装置使用第一数据流的访问路径上的各设备对应的监控指标,确定该访问路径上的设备中的关键设备。具体的,若监控指标的内容有多种,配置装置可以将多种内容加权,获的加权值,将加权值最大的监控指标所属的设备,确定为关键设备。例如,监控指标包括CPU占用率、内存占用率、丢包率、传输时延,CPU占用率、内存占用率、丢包率、传输时延分别对应的权值为a、b、c和d,a、b、c和d之和等于1,监控指标的加权值为:a*CPU占用率+b*内存占用率+c*丢包率+d*传输时延,其中,“*”表示相乘的意思。访问路径上包括3个设备,访问路径上的设备1的监控指标的加权值为0.8,访问路径上的设备2的监控指标的加权值为0.9,访问路径上的设备3的监控指标的加权值为0.6,配置装置可以将访问路径上的设备2,确定为关键设备。
另外,还可以设置一个阈值,在访问路径上的设备的监控指标的加权值中有超过该阈值的加权值时,配置装置可以将大于该阈值的监控指标的加权值所属的设备,确定为关键设备。在访问路径上的设备的监控指标的加权值中没有超过该阈值的加权值时,配置装置直接将监控指标的加权值最大的设备,确定为关键设备。
配置装置在确定出关键设备后,确定与第一数据流匹配的Qos策略中各指标的最低要求。例如,Qos策略包括网络带宽要求时,网络带宽的范围为100M~200M,网络带宽要求的最低要求为不能低于100M,Qos策略包括丢包要求时,丢包率为不能超过10%,丢包要求的最低要求为丢包率为不能超过10%。
配置装置可以在与第一数据流匹配的Qos策略中各指标的最低要求的基础上,根据最低要求,获得关键设备的子Qos策略。具体可以是在最低要求的基础上按照一定算法提高要求,例如,与第一数据流匹配的Qos策略中网络带宽要求的最低要求为不能低于100M,关键设备对应的第一数据流的子Qos策略中网络带宽要求的最低要求为不能低于120M等。再例如,与第一数据流匹配的Qos策略中丢包要求的最低要求为丢包率不能超过8%,关键设备对应的第一数据流的子Qos策略中丢包要求的最低要求为不能超过7%等。
而对于第一数据流的访问路径上除关键设备之外的其它设备,配置装置可以将与第一数据流匹配的Qos策略,确定为该其它设备中每个设备的子Qos策略。
方式二,配置装置可以将与第一数据流匹配的Qos策略,确定为第一数据流的访问路径上的每个设备的子Qos策略。
步骤6042,配置装置对于访问路径上的每个设备,根据该设备对应的子Qos策略,配置该设备。
本实施例中,配置装置确定出第一数据流的访问路径上的每个设备的子Qos策略后,对于该访问路径上的任一设备,配置装置将该设备对应的子Qos策略和第一数据流的标识,发送至该设备。具体的第一数据流的标识可以是第一数据流的五元组信息,或者是第一数据流的五元组信息经过某种处理后唯一得到的数值(如经过哈希处理的哈希值)。
该设备接收到该设备对应的子Qos策略和第一数据流的标识后,可以将第一数据流的标 识和该设备对应的子Qos策略,添加至数据流的标识与Qos策略的对应关系中。后续第一数据流的访问路径上的设备每当接收到一个数据流,可以识别该数据流的标识。若在存储的数据流的标识与Qos策略的对应关系中,能找到该数据流的标识对应的Qos策略,则使用该Qos策略,执行对该数据流的处理。
另外,本实施例中,是基于第一数据流,确定与第一数据流匹配的Qos策略,所以第一次转发业务的数据流的设备还没有配置与第一数据流匹配的Qos策略,所以配置装置可以为第一次转发业务的数据流的每个设备下发预设Qos策略,该每个设备存储预设Qos策略。这样,第一次转发第一数据流的设备在接收到第一数据流时,由于在存储的数据流的标识与Qos策略的对应关系中未查找到第一数据流的标识对应的Qos策略,可以获取预设Qos策略对第一数据流进行处理。
此处需要说明的是,对应于上述Qos策略的概念,若Qos策略包括业务的网络带宽要求、业务的时延要求或业务的丢包要求,是对访问路径上的每个设备的要求,而不是对访问路径上所有设备的累加要求。例如,业务的数据流的时延是2毫秒,对访问路径上每个设备的要求均为2毫秒。
在一种可能的实施方式中,在数据中心中,主机上的虚拟机经常发生迁移。这样,导致虚拟机上的业务也会进行迁移,那么该虚拟机所属的主机就不会传输该业务的数据流,所以可以使该数据流的访问路径上的设备删除原有的与该数据流匹配的子Qos策略。配置装置的处理可以如下:
配置装置获取虚拟交换机发送的第一数据流的消失消息,或者根据虚拟交换机转发的数据流的五元组信息,确定虚拟交换转发的数据流不包括第一数据流。取消根据匹配的QoS策略对访问路径上的设备的配置。
本实施例中,配置装置可以使用两种方式,确定虚拟交换机转发的数据流不包括第一数据流:
方式一:虚拟交换机上建立有第一数据流对应的流表,每次传输第一数据流的数据包,都会对第一数据流对应的流表的时间进行更新。虚拟交换机可以确定第一数据流对应的流表的最后更新时间,然后使用最后更新时间,确定距离当前时间点的时长。虚拟交换机判断该时长与第一预设时长的大小(第一预设时长用于指示后续一段时间内接收到第一数据流的可能性非常低),若该时长大于第一预设时长,则可以确定第一数据流消失。虚拟交换机可以向配置装置的业务识别引擎发送第一数据流的消失消息,在该消失消息中携带有第一数据流的标识,如第一数据流的五元组信息。配置装置的业务识别引擎接收到第一数据流的消失消息后,可以从中解析到第一数据流的标识,可以确定虚拟交换机转发的数据流中不包括第一数据流。
方式二,业务识别引擎会记录自身接收到的每条数据流的时间点,若第一数据流的最后接收时间距离当前时间点的时长超过第二预设时长(第二预设时长用于指示后续接收到第一数据流的可能性非常低),则确定虚拟交换机转发的数据流中不包括第一数据流。此处需要说明的是,该方式二仅适用于虚拟交换机将第一数据流的每个数据包均发送至业务识别引擎的处理方式中。
配置装置确定出虚拟交换机转发的数据流中不包括第一数据流时,配置装置可以向第一数据流的访问路径上的设备发送取消配置通知,该取消配置通知中携带有第一数据流的标识。第一数据流的访问路径上的设备接收到取消配置通知时,可以在数据流的标识与Qos策 略的对应关系中,删除第一数据流的标识的第一数据流的标识对应的Qos策略的对应项。
这样,可以及时的对第一数据流的访问路径上的设备中的Qos策略进行清理,减少内存占用。
在一种可能的实施方式中,在图6所示的流程中,第一数据流是新增的一条数据流,识别第一数据流是新增的一条数据流的处理可以如下:
配置装置获取虚拟交换机发送的第一数据流的增加消息,或者根据虚拟交换机转发的数据流的五元组信息,确定虚拟交换转发的数据流在原有数据流的基础上增加第一数据流。
在本实施例中,虚拟交换机上建立有数据流对应的流表。虚拟交换机在接收到第一数据流时,会判断是否存储有第一数据流对应的流表。若未存储有第一数据流对应的流表,虚拟交换机会建立第一数据流对应的流表,并将该流表对应当前时间。虚拟交换机可以向业务识别引擎发送第一数据流的增加消息,该增加消息中携带有第一数据流的标识,如第一数据流的五元组信息。配置装置接收到第一数据流的增加消息后,可以从中解析到第一数据流的标识,可以确定虚拟交换机中新增第一数据流。
或者,业务识别引擎会记录自身接收到的每条数据流的标识,若第一数据流的业务标识不属于之前接收到的数据流的标识,则确定第一数据流是新增的数据流。
后续配置设备可以获取第一数据流,执行步骤602至步骤604的流程。
这样,可以及时的识别到新增的数据流,并为新增的数据流配置Qos策略。
在一种可能的实施方式中,在第一数据流的传输过程中,有可能需要对与第一数据流匹配的Qos策略进行调整,配置装置可以确定调整后的与第一数据流匹配的Qos策略,基于调整后的与第一数据流匹配的Qos策略,对第一数据流的访问路径上的设备进行配置(配置过程与前面的处理一样,此处不再赘述)。
在一种可能的实施方式中,虚拟交换机所属主机所在的网络拓扑发生变化的情况下,配置装置可以基于当前的网络拓扑、第一数据流的源端和目的端,确定第一数据流的访问路径是否发生变化。若第一数据流的访问路径未发生变化,则配置装置不做处理。若第一数据流的访问路径发生变化,确定变化后的访问路径上的设备中不属于原来的访问路径上的设备。配置装置基于与第一数据流匹配的Qos策略,配置这些设备。这样,第一数据流在这些设备上进行传输时,也是按照与第一数据流匹配的Qos策略进行处理。另外,配置装置还可以取消基于与第一数据流匹配的Qos策略,配置不再传输第一数据流的设备。
在一种可能的实施方式中,配置装置中还存储有业务类型与业务等级的对应关系。在该对应关系中,对于任两个个业务类型,在排队传输这两个业务类型的数据流时,高业务等级的业务类型的数据流优先于低业务等级的业务类型的数据流被传输。配置装置在确定出第一数据流的业务类型后,还可以在该业务类型与业务等级的对应关系中,确定第一数据流的业务类型对应的业务等级。配置装置可以将该业务等级和第一数据流的标识下发至第一数据流的访问路径上的设备。第一数据流的访问路径上的设备可以在数据流的标识和业务等级的对应关系中,对应添加第一数据流的标识和第一数据流的业务等级。这样,后续第一数据流的访问路径上的设备可以基于业务等级转发数据流。
本申请实施例中,需要说明的是,第一数据流是一个泛指,对于所有的数据流均可以采用上述方式。
图8是本申请实施例提供的配置业务的服务质量策略装置的结构图。该装置可以通过软 件、硬件或者两者的结合实现成为装置中的部分或者全部。本申请实施例提供的装置可以实现本申请实施例图6所述的流程,该装置包括:获取模块810、确定模块820和配置模块830,其中:
获取模块810,用于获取由虚拟交换机转发的第一数据流,具体可以用于实现步骤601的获取功能以及步骤601包含的隐含步骤;
确定模块820,用于:
确定所述第一数据流的业务信息,其中,所述业务信息包括所述第一数据流的业务类型和所述第一数据流的访问路径;
根据所述第一数据流的业务信息,确定与所述第一数据流匹配的服务质量QoS策略,具体可以用于实现步骤602和步骤603的确定功能以及步骤602和步骤603包含的隐含步骤;
配置模块830,用于根据所述匹配的QoS策略配置所述访问路径上的设备,具体可以用于实现步骤604的确定功能以及步骤604包含的隐含步骤。
在一种可能的实施方式中,所述确定模块820,用于:
根据所述第一数据流中的五元组信息,确定所述第一数据流的源端标识和目的端标识;
根据存储的虚拟交换机所属主机所在的网络拓扑、所述源端标识和目的端标识,确定所述第一数据流的访问路径。
在一种可能的实施方式中,所述确定模块820,用于:
根据存储的业务类型与服务水平协议SLA的对应关系,确定所述第一数据流的业务类型对应的SLA;
根据所述业务类型对应的SLA,确定与所述第一数据流匹配的QoS策略。
在一种可能的实施方式中,所述配置模块830,用于:
根据所述匹配的Qos策略,确定所述访问路径上各设备对应的子Qos策略;
对于所述访问路径上的每个设备,根据所述设备对应的子Qos策略,配置所述设备。
在一种可能的实施方式中,所述配置模块830,用于:
获取所述访问路径上各设备的监控指标,其中,所述监控指标包括中央处理器CPU占用率、内存占用率、丢包率、传输时延中的一种多种;
根据所述各设备的监控指标,确定所述访问路径上的设备中的关键设备,其中,所述关键设备为所述访问路径上数据流处理最慢的设备;
根据所述匹配的Qos策略中各项指标的最低要求,确定所述关键设备的子Qos策略;
将所述匹配的Qos策略,确定为所述访问路径上除所述关键设备之外的设备的子Qos策略。
在一种可能的实施方式中,所述确定模块820,还用于:
获取所述虚拟交换机发送的所述第一数据流的消失消息,或者根据所述虚拟交换机转发的数据流的五元组信息,确定所述虚拟交换转发的数据流不包括所述第一数据流;
所述配置模块830,还用于:
取消根据所述匹配的QoS策略对所述访问路径上的设备的配置。
在一种可能的实施方式中,所述确定模块820,还用于:
获取所述虚拟交换机发送的所述第一数据流的增加消息,或者根据所述虚拟交换机转发的数据流的五元组信息,确定所述虚拟交换转发的数据流在原有数据流的基础上增加所述第一数据流。
本申请实施例中,配置装置可以基于数据流,确定出与数据流匹配的Qos策略,以及访问路径。然后配置装置基于与数据流匹配的Qos策略,配置该访问路径上的设备。这样,对于任一业务,均可以使用该方式配置访问路径上的设备,而不需要人工配置,所以可以提高配置业务的Qos策略的效率。
上述本申请实施例中对模块的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时也可以有另外的划分方式,另外,在本申请各个实施例中的各功能模块可以集成在一个处理器中,也可以是单独物理存在,也可以两个或两个以上模块集成为一个模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。
需要说明的是:上述实施例提供的为配置业务的服务质量策略装置在配置业务的服务质量策略时,仅以上述各功能模块的划分进行举例说明,实际应用中,可以根据需要而将上述功能分配由不同的功能模块完成,即将装置的内部结构划分成不同的功能模块,以完成以上描述的全部或者部分功能。另外,上述实施例提供的配置业务的服务质量策略装置与配置业务的服务质量策略方法实施例属于同一构思,其具体实现过程详见方法实施例,这里不再赘述。
图9示例性的提供了本申请的计算设备的一种可能的架构图。计算设备可以包括处理器901、存储器902、通信接口903和总线904。在计算设备中,处理器901的数量可以是一个或多个,图9仅示意了其中一个处理器901。可选的,处理器901可以是CPU。若计算设备具有多个处理器901,多个处理器901的类型可以不同,或者可以相同。可选的,计算设备的多个处理器还可以集成为多核处理器。
存储器902存储计算机指令和数据,存储器902可以存储实现本申请提供的配置业务的服务质量策略的方法所需的计算机指令和数据。存储器902可以是以下存储介质的任一种或任一种组合:非易失性存储器(如只读存储器(Read-Only Memory,ROM)、固态硬盘(Solid State Disk,SSD)、硬盘(Hard Disk Drive,HDD)、光盘等)、易失性存储器。
通信接口903可以是以下器件的任一种或任一种组合:网络接口(如以太网接口)、无线网卡等具有网络接入功能的器件。
通信接口903用于计算设备与其他节点或者终端设备进行数据通信。
图9还示例性地绘制出总线904。总线904可以将处理器901与存储器902、通信接口903连接。这样,通过总线904,处理器901可以访问存储器902,还可以利用通信接口903与其它计算设备或者终端设备进行数据交互。
在本申请中,计算设备执行存储器902中的计算机指令,使用计算设备实现本申请提供的为业务提供网络服务的方法。例如,使得计算设备执行上述为配置业务的服务质量策略的方法中接收模块执行的步骤。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现,当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令,在服务器或终端上加载和执行所述计算机程序指令时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴光缆、光纤、 数字用户线)或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是服务器或终端能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质(如软盘、硬盘和磁带等),也可以是光介质(如数字视盘(Digital Video Disk,DVD)等),或者半导体介质(如固态硬盘等)。

Claims (17)

  1. 一种配置业务的服务质量策略方法,其特征在于,所述方法包括:
    获取由虚拟交换机转发的第一数据流;
    确定所述第一数据流的业务信息,其中,所述业务信息包括所述第一数据流的业务类型和所述第一数据流的访问路径;
    根据所述第一数据流的业务信息,确定与所述第一数据流匹配的服务质量QoS策略;
    根据所述匹配的QoS策略配置所述访问路径上的设备。
  2. 根据权利要求1所述的方法,其特征在于,确定所述第一数据流的访问路径,包括:
    根据所述第一数据流中的五元组信息,确定所述第一数据流的源端标识和目的端标识;
    根据存储的虚拟交换机所属主机所在的网络拓扑、所述源端标识和目的端标识,确定所述第一数据流的访问路径。
  3. 根据权利要求1或2所述的方法,其特征在于,所述根据所述第一数据流的业务信息,确定与所述第一数据流匹配的QoS策略,包括:
    根据存储的业务类型与服务水平协议SLA的对应关系,确定所述第一数据流的业务类型对应的SLA;
    根据所述业务类型对应的SLA,确定与所述第一数据流匹配的QoS策略。
  4. 根据权利要求1至3任一项所述的方法,其特征在于,所述根据所述匹配的Qos策略配置所述访问路径上的设备,包括:
    根据所述匹配的Qos策略,确定所述访问路径上各设备对应的子Qos策略;
    对于所述访问路径上的每个设备,根据所述设备对应的子Qos策略,配置所述设备。
  5. 根据权利要求4所述的方法,其特征在于,所述根据所述匹配的Qos策略,确定所述访问路径上各设备的子Qos策略,包括:
    获取所述访问路径上各设备的监控指标,其中,所述监控指标包括中央处理器CPU占用率、内存占用率、丢包率、传输时延中的一种多种;
    根据所述各设备的监控指标,确定所述访问路径上的设备中的关键设备,其中,所述关键设备为所述访问路径上数据流处理最慢的设备;
    根据所述匹配的Qos策略中各项指标的最低要求,确定所述关键设备的子Qos策略;
    将所述匹配的Qos策略,确定为所述访问路径上除所述关键设备之外的设备的子Qos策略。
  6. 根据权利要求1至5任一项所述的方法,其特征在于,所述方法还包括:
    获取所述虚拟交换机发送的所述第一数据流的消失消息,或者根据所述虚拟交换机转发的数据流的五元组信息,确定所述虚拟交换转发的数据流不包括所述第一数据流;
    取消根据所述匹配的QoS策略对所述访问路径上的设备的配置。
  7. 根据权利要求1至6任一项所述的方法,其特征在于,所述方法还包括:
    获取所述虚拟交换机发送的所述第一数据流的增加消息,或者根据所述虚拟交换机转发的数据流的五元组信息,确定所述虚拟交换转发的数据流在原有数据流的基础上增加所述第一数据流。
  8. 一种配置业务的服务质量策略装置,其特征在于,所述装置包括:
    获取模块,用于获取由虚拟交换机转发的第一数据流;
    确定模块,用于:
    确定所述第一数据流的业务信息,其中,所述业务信息包括所述第一数据流的业务类型和所述第一数据流的访问路径;
    根据所述第一数据流的业务信息,确定与所述第一数据流匹配的服务质量QoS策略;
    配置模块,用于根据所述匹配的QoS策略配置所述访问路径上的设备。
  9. 根据权利要求8所述的装置,其特征在于,所述确定模块,用于:
    根据所述第一数据流中的五元组信息,确定所述第一数据流的源端标识和目的端标识;
    根据存储的虚拟交换机所属主机所在的网络拓扑、所述源端标识和目的端标识,确定所述第一数据流的访问路径。
  10. 根据权利要求8或9所述的装置,其特征在于,所述确定模块,用于:
    根据存储的业务类型与服务水平协议SLA的对应关系,确定所述第一数据流的业务类型对应的SLA;
    根据所述业务类型对应的SLA,确定与所述第一数据流匹配的QoS策略。
  11. 根据权利要求8至10任一项所述的装置,其特征在于,所述配置模块,用于:
    根据所述匹配的Qos策略,确定所述访问路径上各设备对应的子Qos策略;
    对于所述访问路径上的每个设备,根据所述设备对应的子Qos策略,配置所述设备。
  12. 根据权利要求11所述的装置,其特征在于,所述配置模块,用于:
    获取所述访问路径上各设备的监控指标,其中,所述监控指标包括中央处理器CPU占用率、内存占用率、丢包率、传输时延中的一种多种;
    根据所述各设备的监控指标,确定所述访问路径上的设备中的关键设备,其中,所述关键设备为所述访问路径上数据流处理最慢的设备;
    根据所述匹配的Qos策略中各项指标的最低要求,确定所述关键设备的子Qos策略;
    将所述匹配的Qos策略,确定为所述访问路径上除所述关键设备之外的设备的子Qos策略。
  13. 根据权利要求8至12任一项所述的装置,其特征在于,所述确定模块,还用于:
    获取所述虚拟交换机发送的所述第一数据流的消失消息,或者根据所述虚拟交换机转发的数据流的五元组信息,确定所述虚拟交换转发的数据流不包括所述第一数据流;
    所述配置模块,还用于:
    取消根据所述匹配的QoS策略对所述访问路径上的设备的配置。
  14. 根据权利要求8至12任一项所述的装置,其特征在于,所述确定模块,还用于:
    获取所述虚拟交换机发送的所述第一数据流的增加消息,或者根据所述虚拟交换机转发的数据流的五元组信息,确定所述虚拟交换转发的数据流在原有数据流的基础上增加所述第一数据流。
  15. 一种计算设备,其特征在于,所述计算设备包括存储器和处理器,所述处理器执行所述存储器存储的计算机指令,使得所述计算设备执行权利要求1至7任一项所述的方法。
  16. 一种非易失性可读计算机存储介质,其特征在于,所述计算机存储介质存储有计算机程序,所述计算机程序在被计算设备执行时实现权利要求1至7任一项所述的方法。
  17. 一种计算机程序产品,其特征在于,所述计算机程序产品包括计算机指令,当所述计算机指令被计算设备执行时,所述计算设备执行权利要求1至7任一项所述的方法。
PCT/CN2020/121714 2019-11-19 2020-10-17 配置业务的服务质量策略方法、装置和计算设备 WO2021098425A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP20889808.0A EP3982600A4 (en) 2019-11-19 2020-10-17 QOS POLICY METHOD, DEVICE AND COMPUTING DEVICE FOR SERVICE CONFIGURATION
US17/747,234 US20220286409A1 (en) 2019-11-19 2022-05-18 Method and apparatus for configuring quality of service policy for service, and computing device

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
CN201911138148 2019-11-19
CN201911138148.0 2019-11-19
CN201911403653.3A CN111245740B (zh) 2019-11-19 2019-12-31 配置业务的服务质量策略方法、装置和计算设备
CN201911403653.3 2019-12-31

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US17/747,234 Continuation US20220286409A1 (en) 2019-11-19 2022-05-18 Method and apparatus for configuring quality of service policy for service, and computing device

Publications (1)

Publication Number Publication Date
WO2021098425A1 true WO2021098425A1 (zh) 2021-05-27

Family

ID=70865738

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/121714 WO2021098425A1 (zh) 2019-11-19 2020-10-17 配置业务的服务质量策略方法、装置和计算设备

Country Status (4)

Country Link
US (1) US20220286409A1 (zh)
EP (1) EP3982600A4 (zh)
CN (1) CN111245740B (zh)
WO (1) WO2021098425A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111245740B (zh) * 2019-11-19 2022-06-28 华为云计算技术有限公司 配置业务的服务质量策略方法、装置和计算设备
CN115580568B (zh) * 2022-11-16 2023-03-24 北京连星科技有限公司 基于IPv6流标签实现网络服务质量保障的方法及系统

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1812365A (zh) * 2005-01-26 2006-08-02 华为技术有限公司 一种保证端到端业务服务质量的方法及接入网络
CN101572719A (zh) * 2008-04-30 2009-11-04 华为技术有限公司 策略决策功能实体、家庭网关、服务质量控制方法及系统
WO2011130471A2 (en) * 2010-04-16 2011-10-20 Intel Corporation WiMAX VoIP SERVICE ARCHITECTURE
CN104301251A (zh) * 2014-09-22 2015-01-21 杭州华三通信技术有限公司 一种QoS处理方法、系统及设备
US20180331958A1 (en) * 2017-05-15 2018-11-15 Samsung Electronics Co., Ltd. Qos information control method and apparatus
CN111245740A (zh) * 2019-11-19 2020-06-05 华为技术有限公司 配置业务的服务质量策略方法、装置和计算设备

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7020086B2 (en) * 2000-07-03 2006-03-28 Telefonaktiebolaget Lm Ericsson (Publ) Lagrange quality of service routing
US7016363B1 (en) * 2000-10-19 2006-03-21 Interactic Holdings, Llc Scaleable interconnect structure utilizing quality-of-service handling
US8305893B2 (en) * 2009-03-16 2012-11-06 Samsung Electronics Co., Ltd. Quality of service management for home-to-home connections
CN101867580B (zh) * 2010-06-03 2012-11-28 北京蓝汛通信技术有限责任公司 一种分配网络流量的方法及装置
CN103095836B (zh) * 2013-01-17 2016-08-10 华为技术有限公司 互联网应用服务质量的调整方法及装置、系统
US20150033222A1 (en) * 2013-07-25 2015-01-29 Cavium, Inc. Network Interface Card with Virtual Switch and Traffic Flow Policy Enforcement
US10291503B2 (en) * 2013-09-26 2019-05-14 Taiwan Semiconductor Manufacturing Co., Ltd. File block placement in a distributed network
KR20160041631A (ko) * 2014-10-08 2016-04-18 한국전자통신연구원 서비스 품질 인지 라우팅 제어 장치 및 라우팅 제어 방법
CN105207787B (zh) * 2015-08-28 2018-09-11 华为技术有限公司 一种业务QoS控制方法及网络设备
CN105577546A (zh) * 2015-12-28 2016-05-11 中铁工程装备集团有限公司 一种基于QoS的主动请求连接方法
US10433203B1 (en) * 2017-04-19 2019-10-01 Sprint Spectrum L.P. Providing a quality of service to wireless devices attached to relay access nodes
CN108494588A (zh) * 2018-03-12 2018-09-04 深圳市瑞驰信息技术有限公司 一种集群块设备动态QoS配置的系统及方法

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1812365A (zh) * 2005-01-26 2006-08-02 华为技术有限公司 一种保证端到端业务服务质量的方法及接入网络
CN101572719A (zh) * 2008-04-30 2009-11-04 华为技术有限公司 策略决策功能实体、家庭网关、服务质量控制方法及系统
WO2011130471A2 (en) * 2010-04-16 2011-10-20 Intel Corporation WiMAX VoIP SERVICE ARCHITECTURE
CN104301251A (zh) * 2014-09-22 2015-01-21 杭州华三通信技术有限公司 一种QoS处理方法、系统及设备
US20180331958A1 (en) * 2017-05-15 2018-11-15 Samsung Electronics Co., Ltd. Qos information control method and apparatus
CN111245740A (zh) * 2019-11-19 2020-06-05 华为技术有限公司 配置业务的服务质量策略方法、装置和计算设备

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3982600A4

Also Published As

Publication number Publication date
CN111245740B (zh) 2022-06-28
EP3982600A1 (en) 2022-04-13
CN111245740A (zh) 2020-06-05
EP3982600A4 (en) 2022-07-20
US20220286409A1 (en) 2022-09-08

Similar Documents

Publication Publication Date Title
US11895154B2 (en) Method and system for virtual machine aware policy management
US10148492B2 (en) Data center bridging network configuration and management
KR101703088B1 (ko) Sdn 기반의 통합 라우팅 방법 및 그 시스템
US8954992B2 (en) Distributed and scaled-out network switch and packet processing
US9654395B2 (en) SDN-based service chaining system
US9071529B2 (en) Method and apparatus for accelerating forwarding in software-defined networks
EP2727297B1 (en) Variable-based forwarding path construction for packet processing within a network device
WO2021207922A1 (zh) 报文传输方法、装置及系统
US9743367B2 (en) Link layer discovery protocol (LLDP) on multiple nodes of a distributed fabric
JP2015503274A (ja) 仮想レーンの動的割り当てを用いてファットツリートポロジにおける輻輳を緩和するためのシステムおよび方法
US20220286409A1 (en) Method and apparatus for configuring quality of service policy for service, and computing device
WO2016050109A1 (zh) 一种通信方法、云管理服务器及虚拟交换机
CN113472646B (zh) 一种数据传输方法、节点、网络管理器及系统
WO2012100671A1 (zh) 一种绑定物理网口的方法、网卡及通信系统
RU2602333C2 (ru) Сетевая система, способ обработки пакетов и носитель записи
KR101746105B1 (ko) 서비스 체이닝이 가능한 오픈플로우 스위치
KR101729944B1 (ko) Sdn 기반의 멀티 테넌트 지원 네트워크 시스템의 ip 주소 제공 방법
US9277014B2 (en) Handling of auxiliary NAS
JP7388533B2 (ja) ゲートウェイ装置、方法及びプログラム
US11528187B1 (en) Dynamically configurable networking device interfaces for directional capacity modifications
KR20210016802A (ko) 소프트웨어 정의 네트워킹 환경에서 서버-클라이언트 기반의 네트워크 서비스를 위한 플로우 테이블을 최적화하는 방법 및 이를 위한 sdn 스위치
KR101729945B1 (ko) Sdn 기반의 네트워크 시스템의 멀티 테넌트 지원 방법
KR101729939B1 (ko) Sdn 기반의 멀티 테넌트 지원 네트워크 시스템
US11218394B1 (en) Dynamic modifications to directional capacity of networking device interfaces
KR101806376B1 (ko) Ip 주소 제공하는 sdn 기반의 멀티 테넌트 지원 네트워크 시스템

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20889808

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2020889808

Country of ref document: EP

Effective date: 20220104

NENP Non-entry into the national phase

Ref country code: DE