WO2021135414A1 - 一种主动随流检测的方法、网络设备以及通信系统 - Google Patents

一种主动随流检测的方法、网络设备以及通信系统 Download PDF

Info

Publication number
WO2021135414A1
WO2021135414A1 PCT/CN2020/116483 CN2020116483W WO2021135414A1 WO 2021135414 A1 WO2021135414 A1 WO 2021135414A1 CN 2020116483 W CN2020116483 W CN 2020116483W WO 2021135414 A1 WO2021135414 A1 WO 2021135414A1
Authority
WO
WIPO (PCT)
Prior art keywords
detection
message
flow
node
network
Prior art date
Application number
PCT/CN2020/116483
Other languages
English (en)
French (fr)
Inventor
黄金明
胡永健
张文锋
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to EP20911127.7A priority Critical patent/EP4068702A4/en
Publication of WO2021135414A1 publication Critical patent/WO2021135414A1/zh
Priority to US17/855,915 priority patent/US20220337497A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/02Capturing of monitoring data
    • H04L43/026Capturing of monitoring data using flow identification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/06Generation of reports
    • H04L43/062Generation of reports related to network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/70Routing based on monitoring results
    • HELECTRICITY
    • H01ELECTRIC ELEMENTS
    • H01MPROCESSES OR MEANS, e.g. BATTERIES, FOR THE DIRECT CONVERSION OF CHEMICAL ENERGY INTO ELECTRICAL ENERGY
    • H01M4/00Electrodes
    • H01M4/02Electrodes composed of, or comprising, active material
    • H01M4/13Electrodes for accumulators with non-aqueous electrolyte, e.g. for lithium-accumulators; Processes of manufacture thereof
    • HELECTRICITY
    • H01ELECTRIC ELEMENTS
    • H01MPROCESSES OR MEANS, e.g. BATTERIES, FOR THE DIRECT CONVERSION OF CHEMICAL ENERGY INTO ELECTRICAL ENERGY
    • H01M4/00Electrodes
    • H01M4/02Electrodes composed of, or comprising, active material
    • H01M4/64Carriers or collectors
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0805Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
    • H04L43/0817Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking functioning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0852Delays
    • H04L43/0864Round trip delays
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0876Network utilisation, e.g. volume of load or congestion level
    • H04L43/0894Packet rate
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/14Arrangements for monitoring or testing data switching networks using software, i.e. software packages
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/20Hop count for routing purposes, e.g. TTL
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/38Flow based routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/50Routing or path finding of packets in data switching networks using label swapping, e.g. multi-protocol label switch [MPLS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/74Address processing for routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • H04L41/145Network analysis or design involving simulating, designing, planning or modelling of a network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/10Active monitoring, e.g. heartbeat, ping or trace-route
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/20Arrangements for monitoring or testing data switching networks the monitoring system or the monitored elements being virtualised, abstracted or software-defined entities, e.g. SDN or NFV
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/50Testing arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/26Route discovery packet
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/11Identifying congestion
    • H04L47/115Identifying congestion using a dedicated packet

Definitions

  • This application relates to the field of communication technology, and in particular to a method, network equipment, and communication system for active flow detection.
  • Network performance detection technology is a research hotspot in the field of telecommunications.
  • Network performance detection technology analyzes, controls, and adjusts network operation status by monitoring, measuring, and collecting network performance data, and provides stable network services, which is the foundation of network operation.
  • network performance detection technologies can be divided into two types: active detection (English: Active Metrics) and passive detection (English: Passive Metrics).
  • active detection is to actively send a detection flow to the network, and analyze the network behavior according to the characteristic changes of the detection flow affected by the network.
  • the measured network performance indicators usually include one or more of packet loss rate, delay, jitter, or bandwidth.
  • Common active measurement protocols include PING, Traceroute, Internet Protocol Measurement Protocol (English: Internet Protocol Measurement Protocol, abbreviated as: IPMP), Two-Way Active Measurement Protocol (English: Two-Way Active Measurement Protocol, abbreviated as: OWAMP), etc.
  • Active detection is flexible, but the traditional active detection indirectly simulates the actual business by sending out-of-band analog detection messages, but this detection method does not measure the real business traffic, and cannot guarantee that the simulated messages are consistent with the real business path and cannot be completely true. It reflects the quality of network services, and the accuracy of active detection has a certain deviation from the actual network.
  • Passive detection is a detection technology that uses flow detection technology to directly measure the actual service flow sent by user equipment.
  • Flow detection technology can be, for example, in-situ Operation Administration and Maintenance (English: in-situ Operations Administration and Maintenance, abbreviated as: iOAM), in-band flow information telemetry (English: In-situ Flow Information Telemetry, abbreviation: IFIT), in-band network telemetry (In-band Network Telemetry abbreviation: INT) and other detection technologies, passive detection is based on actual service flow measurement , The detection accuracy is high, but the passive detection must be based on the real service traffic sent by the user equipment. In some network scenarios lacking real business traffic, the current passive detection technology cannot detect network performance. Therefore, how to provide a new detection mechanism that can cover various scenarios of network performance detection has become a technical problem that needs to be solved at present.
  • the embodiments of the present application provide a method, network equipment, and communication system for active flow-following detection, and provide a new detection mechanism, that is, configure an extended flow-following detection protocol to make it easier to detect when there is no real business traffic.
  • a new detection mechanism that is, configure an extended flow-following detection protocol to make it easier to detect when there is no real business traffic.
  • a method of active flow-following detection is provided.
  • the method may include: The first network node generates a first analog service packet, and the first analog service packet is not a real service packet sent by the user equipment; the first network node generates a first detection packet, and the first detection packet includes the first The packet header and the first analog service packet, and the first forwarding path of the first detection packet in the detection domain determined according to the first analog service packet is used to simulate the use of the user
  • the upper node is used to perform flow-following detection of network performance, the first flow-following detection information includes first indication information, and the first indication information is used to instruct the tail node in the detection domain to
  • the head node of the detection domain can autonomously generate detection packets for flow detection. This makes it possible to measure the network performance with the flow based on the flow detection technology.
  • the method provided by the embodiments of the present application is equivalent to providing a new flow-following detection mechanism. Only an extended flow-following detection protocol needs to be configured, and both active flow-following detection and passive flow-following detection can be completed. It can cover various scenarios of network performance testing, which provides convenience for network performance testing.
  • the detection message generated by the head node also needs to carry indication information to inform the tail node that it has received a detection message specifically for network performance measurement. Instruct the tail node to no longer forward the forwarded message to other nodes, so that the detection message that is specifically used for measurement but not the real service message is terminated by the tail node and will not be forwarded by the tail node to other nodes outside the detection domain. This avoids problems that affect the real services provided to users, and makes the network performance detection mechanism more intelligent.
  • the first packet header may include a first flow-following detection header, and the first flow-following detection header includes first indication information.
  • the first indication information is information indicated by at least one bit included in the first stream-following detection header.
  • the first flow-following detection header may be the flow instruction header field FIH, and the first indication information may be the value of the R flag bit in the FIH. For example, when the R flag bit has a value of 0, It can indicate that the first detection message is passive flow-following detection; conversely, when the R flag bit has a value of 1, it can indicate that the first detection message is active flow-following detection.
  • the first packet header may include a first extended flow following detection header, the first extended flow following detection header is used to carry first indication information, and the type field of the first extended flow following detection header indicates flow detection It is active flow detection.
  • the first extended flow-following detection header may specifically be FIEH, then, the first indication information may be, for example, the value of the type field in the FIEH, and the value of the type field in the FIEH is used to indicate the type field in the FIEH.
  • the flow detection is active or passive flow detection; or, the first indication information may also be any value of a preset field or flag bit that can be used as an indication in the FIEH.
  • the first packet header may include an option OPTION field, and the OPTION field includes the first indication information.
  • the first indication information is information indicated by at least one bit included in the OPTION field.
  • the first indication information is the information indicated by the type field of the OPTION field, and the type field indicates that the flow-following detection is active flow-following detection.
  • the first indication information may specifically be the information indicated by the Type field of the extended OPTION field, or first, the indication information 1 may also be the reserved field of the extended OPTION field or other information. The value of one or more bits of the field.
  • the first indication information may specifically be the information indicated by the iOAM Type field of the extended OPTION field, or the first indication information may also be the value of one or more bits of the iOAM data Data .
  • the first message header may be encapsulated in an IPv6 message header, a VXLAN message header, an IPv4 message header, or SRH.
  • the above three examples are only exemplary introductions of the first indication information carried in the first detection message in the embodiments of this application, including but not limited to the above three possible implementations, and any other can be used to indicate the flow detection
  • the information for active flow detection can be used as the first indication information in the embodiment of the present application, and any packet header that can carry the first indication information can be used as the first packet header in the embodiment of the present application.
  • the flow-following detection can be IFIT flow-following detection, or it can also be iOAM flow-following detection, or alternatively, it can also be INT flow-fighting detection.
  • Any stream-following detection protocol can be extended by the method provided in the embodiment of the present application, and supports the active stream-following detection method provided in the embodiment of the present application.
  • the flow-following detection provided by the embodiments of the present application may be end-to-end E2E active flow-following detection, or hop-by-hop active flow-following detection, which can be flexibly set according to the requirements of flow detection.
  • E2E active flow-following detection means that each node in the detection domain of the first forwarding path sends its own measurement results to the control and management device after network performance detection; hop-by-hop flow-following detection means that the first forwarding path is detecting Nodes other than the tail node in the domain, after performing network performance testing, carry their own measurement results in a detection message and send them to the next hop node. Until the tail node obtains its own measurement results after performing network performance testing, the The measurement results of the nodes of the first forwarding path in the detection domain are sent to the control and management device together.
  • the control and management equipment analyzes and manages the flow of the detection domain.
  • the specific process of generating the first detection message by the first network node may include: the first network node generates the first analog service message; the first network node encapsulates the first analog service message; Detect information with the flow.
  • the first analog service packet may be a layer 2 packet, and the layer 2 packet includes a virtual local area network VLAN identifier, and the VLAN identifier is used to identify the VLAN to which the user equipment belongs.
  • the embodiment of the present application may further include: the first network node receives the first real service message, and the first real service message carries the same VLAN identifier as that in the first analog service message; then, the first network node The first real service message is forwarded to the tail node along the first forwarding path.
  • the Layer 2 simulated service packets generated by the head node carry the VLAN identifiers carried by the real service packets to simulate the real Layer 2 services.
  • the message enters the ingress port of the head node, so that the analog service message is transmitted in the detection domain according to the same forwarding path as the real service message, so that the measurement result of the network performance measurement is that the real service message is forwarded in the detection domain.
  • Real reference meaning For private network services, considering that Layer 2 packets are forwarded according to the VLAN and destination MAC address they belong to, the Layer 2 analog service packets generated by the head node carry the VLAN ID and destination MAC address carried by the real service packets.
  • the real service message of the simulation layer 2 enters the ingress port of the head node, so that the simulation service message is transmitted in the detection domain according to the same forwarding path as the real service message, so that the measurement result of the network performance measurement is the real service message
  • the forwarding in the detection domain has real reference significance.
  • the first analog service message may also be a three-layer message.
  • the three-layer message includes a source Internet Protocol IP address and a destination IP address.
  • the source IP address is used by the first network node to receive the first
  • the IP address of the inbound interface of the real service packet is in the same network segment
  • the destination IP address is the IP address of the same network segment as the outbound interface through which the tail node forwards the first real service packet to the user side.
  • the embodiment of the present application may further include: the first network node receives the first real service packet through the ingress interface; the first network node forwards the first real service packet to the tail node along the first forwarding path.
  • the source IP address of the same network segment and the destination IP address of the same network segment have the same packet forwarding path, so the Layer 3 simulation generated by the head node
  • the source IP address and destination IP address carried in the business message correspond to the same network segment as the source IP address and destination IP address carried in the real business message, so that the analog business message is in the detection domain in accordance with the real business message
  • the same forwarding path is transmitted, so that the measurement result of the network performance measurement is that the forwarding of real service packets in the detection domain has real reference significance.
  • the embodiments of the present application further include: the first network node generates a second detection message, where the protocol numbers of the first detection message and the second detection message, and the TCP port number of the transmission control protocol Or at least one of the user datagram protocol UDP port numbers is different, the second detection message includes a second message header and a second analog service message generated by the first network node, determined according to the second analog service message
  • the second forwarding path of the second detection packet in the detection domain is used to simulate the forwarding path of the second real service packet sent by the user equipment in the detection domain, and the second packet header includes the second flow-following detection information,
  • the second flow-following detection information is used by the nodes in the second forwarding path to perform flow-following detection of network performance.
  • the second flow-following detection information includes second indication information, and the second indication information is used to instruct the tail node to no longer report to other nodes. Forward the second detection message; the first network node forwards the second detection message to the tail node along the second forwarding path.
  • the embodiment of the present application may further include: the first network node receives the second real service message sent by the user equipment, where the second real service message and the protocol number and TCP carried in the second detection message The port number or the UDP port number is the same; the first network node forwards the second real service message to the tail node along the second forwarding path.
  • this implementation can detect multiple forwarding paths with the same head node and tail node in the detection domain, and provide data support for the normal transmission of different real service packets that need to be transmitted through different forwarding paths in the network. This enables the network performance detection mechanism to adapt to more network scenarios, and achieve a more complete network performance measurement in the detection domain.
  • the embodiments of the present application also provide a method for proactively detecting network performance based on flow detection.
  • the method is applied in the detection domain of flow detection, with any detection domain following the head node of the detection domain.
  • Node-the second network node is the execution subject, the method may include, for example, the second network node in the detection domain receives the first detection message sent by the first network node in the detection domain through the first forwarding path in the detection domain ,
  • the first detection message includes a first message header and a first analog service message, the first message header includes first flow-following detection information, the first flow-following detection information includes indication information, and the indication information is used to indicate detection
  • the tail node in the domain no longer forwards the first detection message to other nodes, the first simulated service message is not the real service message sent by the user equipment, and the first forwarding path is used to simulate the first real service message sent by the user equipment
  • the forwarding path in the detection domain the second network node performs a flow detection on the network performance according
  • the second network node may be a tail node in the detection domain.
  • the method may further include: according to the instruction information, the second network node no longer forwards to other nodes The first detection message.
  • the second network node may also be an intermediate node in the detection domain, and the method may further include: the second network node updates the first detection message to obtain the second detection message.
  • the message includes second flow-following detection information, and the second flow-following detection information includes indication information; the second network node forwards the second detection message to the tail node along the first forwarding path.
  • the first analog service packet may be a layer 2 packet, and the layer 2 packet includes a virtual local area network VLAN identifier, and the VLAN identifier is used to identify the VLAN to which the user equipment belongs. Then, the first network node receives the first real service packet sent by the user equipment, the first real service packet carries the VLAN identifier, and the first network node may forward the first real service packet to the tail node along the first forwarding path Text.
  • the first analog service message is a three-layer message.
  • the three-layer message includes a source Internet Protocol IP address and a destination IP address.
  • the source IP address is used by the head node in the detection domain.
  • the destination IP address is the IP address of the same network segment as the outbound interface of the tail node forwarding the first real service packet to the user side.
  • the embodiments of the present application can enable the analog service message to be transmitted in the detection domain according to the same forwarding path as the real service message, thereby enabling the measurement of network performance measurement
  • the result is that the forwarding of real service packets in the detection domain has real reference significance.
  • the flow detection is IFIT flow detection, iOAM flow detection or INT flow detection.
  • the flow detection is end-to-end active flow detection or hop-by-hop active flow detection.
  • this application also provides a first network device, including a transceiver unit and a processing unit.
  • the transceiving unit is used to perform the transceiving operations in the method provided in the above first aspect; the processing unit is used to perform other operations in addition to the transceiving operations in the above first aspect.
  • the transceiver unit is configured to send the first detection to the tail node in the detection domain along the first forwarding path Message; the processing unit is used to generate a first detection message.
  • an embodiment of the present application also provides a second network device, and the second network device includes a transceiver unit and a processing unit.
  • the transceiving unit is used to perform the transceiving operation in the method provided in the above second aspect
  • the processing unit is used to perform other operations in addition to the transceiving operation in the above second aspect.
  • the transceiver unit is configured to receive the first detection sent by the first network node in the detection domain through the first forwarding path in the detection domain.
  • the processing unit is used to perform a flow detection of the network performance according to the first flow detection information.
  • an embodiment of the present application also provides a first network device, including a first communication interface, a second communication interface, and a processor.
  • the first communication interface is used to perform the receiving operation in the method provided in the foregoing first aspect
  • the second communication interface is used to perform the sending operation in the method provided in the foregoing first aspect
  • the processor is used to perform the foregoing first aspect Operations other than the receiving and sending operations in the provided method.
  • an embodiment of the present application also provides a second network device, including a first communication interface, a second communication interface, and a processor.
  • the first communication interface is used to perform the receiving operation in the method provided in the foregoing second aspect
  • the second communication interface is used to perform the sending operation in the method provided in the foregoing second aspect
  • the processor is used to perform the foregoing second aspect Operations other than the receiving and sending operations in the provided method.
  • an embodiment of the present application also provides a first network device, where the first device includes a memory and a processor.
  • the memory includes computer-readable instructions; the processor in communication with the memory is used to execute the computer-readable instructions, so that the first network device is used to execute the method provided in the first aspect above.
  • an embodiment of the present application also provides a second network device, where the second network device includes a memory and a processor.
  • the memory includes computer-readable instructions; the processor in communication with the memory is used to execute the computer-readable instructions, so that the second network device is used to execute the method provided in the above second aspect.
  • the embodiments of the present application also provide a computer-readable storage medium that stores instructions in the computer-readable storage medium, which when run on a computer, causes the computer to execute the first aspect or the second aspect above.
  • the active flow detection method provided by the aspect.
  • the embodiments of the present application also provide a computer program product, including a computer program or computer readable instructions, when the computer program or the computer readable instructions run on a computer, the computer can execute the aforementioned first aspect or
  • the second aspect provides the method of active flow-following detection.
  • an embodiment of the present application also provides a communication system, which includes the first network device provided in the third aspect, the fifth aspect, or the seventh aspect, and the fourth, sixth, or The second network device provided by the eighth aspect.
  • Figure 1 is a schematic diagram of an IFIT header structure in an embodiment of the application
  • FIG. 2 is a schematic diagram of a network system framework involved in an application scenario in an embodiment of this application;
  • FIG. 3 is a schematic diagram of a network system framework involved in another application scenario in an embodiment of the application.
  • FIG. 4 is a schematic flowchart of an active flow-following detection method 100 in an embodiment of this application;
  • 5a is a schematic diagram of the format of the extended OPTION field in the detection message 1 under IFIT in an embodiment of the application;
  • 5b is a schematic diagram of the format of the extended OPTION field in the detection message 1 under iOAM in an embodiment of the application;
  • FIG. 6 is a schematic flowchart of an active flow-following detection method 200 in an embodiment of this application.
  • FIG. 7 is a schematic diagram of an active flow-following detection method in a scenario in an embodiment of the application.
  • FIG. 8 is a schematic flowchart of an active flow-following detection method 400 in an embodiment of this application.
  • FIG. 9 is a schematic flowchart of an active flow-following detection method 500 in an embodiment of this application.
  • FIG. 10 is a schematic structural diagram of a first network device 1000 in an embodiment of this application.
  • FIG. 11 is a schematic structural diagram of a second network device 1100 in an embodiment of this application.
  • FIG. 12 is a schematic structural diagram of a first network device 1200 in an embodiment of this application.
  • FIG. 13 is a schematic structural diagram of a second network device 1300 in an embodiment of this application.
  • FIG. 14 is a schematic structural diagram of a first network device 1400 in an embodiment of this application.
  • FIG. 15 is a schematic structural diagram of a second network device 1500 in an embodiment of this application.
  • FIG. 16 is a schematic structural diagram of a communication system 1600 in an embodiment of this application.
  • the flow detection technology based on iOAM involved in this application refers to that when a data message is transmitted in the detection domain, OAM information is carried in the data message.
  • in-band English: in-situ
  • in-situ means that the OAM information is appended to the data message instead of being carried in a special OAM message.
  • Follow-up detection It can also be called follow-up detection, follow-up telemetry, follow-up measurement, or follow-up measurement, which refers to the detection of network performance along with the business flow.
  • the detection of network performance may include, for example, detection of the service channel carrying the service and the network performance of the corresponding network element.
  • the service channel may be the forwarding path of the service flow, and the network performance may include, for example, transmission delay, packet loss rate, jitter, bit error rate, etc.
  • the simulated service message in this application refers to a real service message generated by a detection node in the flow detection domain to simulate a real service message sent by a user equipment when there is no real service traffic in the network.
  • the forwarding path of the analog service packet in the detection domain is consistent with the forwarding path of the real service packet sent by the user equipment. After the tail node in the detection domain receives the analog service message, it will not forward the analog service message like other nodes in the network.
  • Real business message refers to the real business traffic sent by the user equipment and transmitted on the network.
  • the tail node in the detection domain receives the real service message, it needs to forward the message to the destination address of the real service message.
  • the IFIT technology can use the IFIT information carried in the message to perform feature marking on the nodes through which the service flow in the network passes, and the feature marking may also be referred to as dyeing.
  • the IFIT information may constitute an IFIT header as a whole, for example, it may be used as an extension header of the Multi-Protocol Label Switching (English: Multi-Protocol Label Switching, referred to as MPLS) protocol, etc.; or, the IFIT information may also be based on field information, etc.
  • the dispersion is included in, for example, the Internet Protocol (English: Internet Protocol, IP) header.
  • Each hop node that the service flow passes through reports the collected time stamp, packet number and other data to the network management device, so that the network management device can further calculate the network delay, packet loss, restoration path, etc. based on the reported data .
  • a possible IFIT information header structure for the MPLS protocol network is shown in Fig. 1, and the key fields in the IFIT header structure are described here.
  • Flow instruction indicator field (English: Flow Instruction Indicator, abbreviated as FII). This field is mainly used to identify the subsequent data information as IFIT information. For example, the following field information can be included:
  • Flow instruction indicator label (English: FII Label), which can be configured with a default value to identify the IFIT detection flow;
  • the S flag is used to mark whether it is the bottom of the stack, for example, a value of 1 is the bottom of the stack, and a value of 0 is the bottom of the stack;
  • Part of the relevant information in the outer MPLS label header can be inherited, such as priority EXP and time to live (English: Time To Live, TTL for short), etc.
  • the flow instruction header field (English: Flow Instruction Header, abbreviated as: FIH), can also be referred to as flow detection header or flow detection header. This field is mainly used to carry information related to IFIT detection. For example, the following field information can be included:
  • Flow ID (English: Flow ID), a globally unique ID assigned to each IFIT detection flow;
  • L flag bit packet loss (English: packet loss) detection dyeing mark, for example: the value of the L flag bit is "1" means packet loss is collected, and "0" means no packet loss is collected.
  • the D flag bit measures the dyeing mark. For example, the value of the D flag bit is "1", which means the time stamp is collected, and "0" means that the time stamp is not collected.
  • Header Type Indicator (English: Header Type Indicator, abbreviated as: HTI), which marks the range of nodes that need to send IFIT detection results and the detection content range. For example, different tag values can be used to distinguish whether the nodes have IFIT or not.
  • HTI Header Type Indicator
  • FIEH flow Instruction Extension Header
  • the R flag can be used as a reserved flag.
  • the flow instruction extension header field FIEH can also be called the flow extension detection header or the extension flow detection header.
  • this field is mainly used to carry other IFIT detection related information.
  • the following field information can be included:
  • the V flag bit is used to mark the reverse flow (English: reverse flow). For example, the value of the V flag bit is “0" to indicate that the current flow is a forward flow, and the receiving end can automatically create a reverse flow; “1" means The current flow is a reverse flow, and the receiving end no longer automatically creates a reverse flow;
  • Period (English: Period). Different values indicate different detection periods.
  • the detection period can be, for example, 1s, 10s, 30s, 1min, or 10min.
  • the head node in the detection domain receives a message sent by the user equipment, it encapsulates IFIT information (that is, flow detection information) in the message to instruct the network node in the detection domain to perform IFIT detection.
  • the type of the message can be, for example, a data message or a control message.
  • multiple data messages or control messages can be sent continuously, for example, multiple data messages can form a data stream; or, multiple data messages or control messages are intervals within a certain period Sent, such as operation and maintenance management (English: Operation, Administration and Maintenance, OAM for short) control messages, etc.
  • the network range that needs to perform IFIT detection can be determined by specifying the detection domain.
  • the network nodes in the detection domain need to transmit IFIT information to achieve IFIT detection, and send the corresponding information obtained after performing the IFIT detection to Network management equipment.
  • the detection range of the detection domain can be determined based on multiple methods. For example, it can be determined based on network scenarios, such as designating a core network part of the network as the detection domain; or, it can be determined based on service types, such as video services and voice services.
  • the business specifies detection domains of different scopes, etc.
  • the IFIT network includes three types of nodes, specifically a head node (English: head node), a tail node (English: end node), and a hop-by-hop path node (English: path node). Among them, the hop-by-hop path node can also be called an intermediate node.
  • the head node, tail node and path node may be corresponding network nodes in the network, for example.
  • the first network node that transmits the data stream within the detection range specified by the detection domain can be used as the head node for transmitting the data stream.
  • the last network node that transmits the data stream within the detection range specified by the detection domain may be used as the tail node for transmitting the data stream.
  • Each node that transmits the data stream between the head node and the tail node is a hop-by-hop path node. IFIT information can be added by the head node and stripped at the tail node.
  • the detection domain mentioned in this application refers to the network domain that executes the flow detection application.
  • the detection domain includes multiple forwarding devices, such as routers or switches, that enable the flow-following detection function.
  • the detection domain may also include control and management equipment, such as a logical centralized controller, which is used to configure the flow detection of multiple forwarding devices in the detection domain, and collect and analyze flow detection data reported by multiple forwarding devices. .
  • Active flow detection means that based on the flow detection technology introduced above, when the head node in the detection domain does not receive the real business traffic sent by the user equipment, the head node actively generates detection traffic, and encapsulates the detection traffic in the detection traffic.
  • Flow detection information For example, if it is based on IFIT flow detection, the detection message carries IFIT flow detection information.
  • the head node sends a detection message to the tail node along the forwarding path of the detection message, and nodes on the forwarding path in the detection domain can measure network performance based on the received detection message.
  • active flow detection extends the traditional passive flow detection, so that the flow detection protocol supports active detection capabilities, which can achieve high-precision detection of network performance in scenarios where there is no real business traffic. .
  • Fig. 2 is a schematic diagram of a network architecture provided by an embodiment of the present application.
  • the network 100 includes a control management device and a plurality of network nodes.
  • the multiple network nodes are connected by a communication link and used to transmit data streams.
  • the head node, the intermediate node 1, the intermediate node 2, and the tail node in the detection domain are connected by a communication link.
  • the detection domain may also include other nodes not shown.
  • the tail node can also be connected to an external node through a communication link.
  • the data stream sent by the user equipment can reach the external node along the forwarding path 1, via the head node, the intermediate node 1, the intermediate node 2, and the tail node.
  • the control management device may be, for example, a centralized controller, a network management device, or a flow analysis device that performs a flow analysis function.
  • the control and management device can be one device or a collection of multiple devices.
  • the control and management device can be used to collect information and detect the performance of the transmission path of the data messages on the transmission path between the multiple network nodes.
  • the performance detection of the transmission path includes, but is not limited to, transmission delay, packet loss rate, and Detection of packet loss location.
  • the transmission path may include a path through which data flows.
  • the detection domain may be determined by the control and management device, and the detection domain is the detection range determined by the control and management device; it may also be configured on each forwarding device in the detection domain to form a detection domain. .
  • the network nodes located between the head node and the tail node of the detection domain are intermediate nodes, such as intermediate node 1 and intermediate node 2 in FIG. 2.
  • FIG. 3 shows a schematic diagram of another network architecture provided by the present application.
  • the main difference between the network 200 shown in FIG. 3 and the network 100 shown in FIG. 2 is that there are multiple transmission paths between the head node and the tail node.
  • the multiple transmission paths include at least forwarding path 1 and forwarding path 2 shown in FIG. 3.
  • the data stream sent by the user equipment can follow forwarding path 1, via the head node, intermediate node 1, intermediate node 2, and the tail node to reach the external node; or along forwarding path 2, via the head node and intermediate node in the detection domain 3.
  • the intermediate node 4 and the tail node arrive at the outer node.
  • forwarding path 1 may be a working path
  • forwarding path 2 may be a protection path.
  • forwarding path 1 fails, forwarding path 2 carries service traffic.
  • forwarding path 1 and forwarding path 2 may be equal-cost paths.
  • the head node receives the service flow sent by the user equipment, it selects forwarding path 1 to carry the service flow based on hash calculation.
  • FIG. 2 or FIG. 3 only exemplarily shows 4 nodes included in the detection domain, and the detection domain may include any other number of nodes, which is not limited in the embodiment of the present application.
  • the network architecture shown in FIG. 2 or FIG. 3 is only an example, and the application scenario of flow detection provided in this application is not limited to the scenario shown in FIG. 2 or FIG. 3.
  • the technical solution provided by this application is applicable to all network scenarios where the flow detection technology is applied for data transmission.
  • forwarding path 2 is used as a protection path and usually does not carry real service traffic. Measure the performance indicators of forwarding path 2 to determine whether the protection path can meet the service bearer requirements, so that when the working channel fails, the traffic can be switched to the protection path that meets the service bearer requirements; face the two possible specific networks mentioned above Application scenarios, based on the current flow detection technology, cannot complete performance detection. However, if the measurement is combined with the out-of-band flow measurement method, the protocol configuration will be very complicated.
  • the present application provides a method 100 for active flow detection, which extends the flow detection protocol to support active detection capabilities, so that in network scenarios without real business traffic, It can also measure the network performance with the flow based on the flow detection technology.
  • the active flow-following detection method 100 described in the present application will be briefly introduced.
  • FIG. 4 shows an active flow-following detection method 100 provided by an embodiment of the application.
  • the method 100 may include the following S101 to S110, for example:
  • a head node in the detection domain generates a detection message 1, which includes a message header 1 and an analog service message 1 generated by the head node, and the message header 1 includes flow detection information 1.
  • any extended flow detection protocol can be configured to support the execution of S101 to S110 in the method 100.
  • the flow-following detection protocol can be, for example, any one of the IFIT protocol, the IOAM protocol, or the INT protocol.
  • the flow-following detection and configuration performed by the head node, the intermediate node 1, the intermediate node 2, and the tail node in the embodiment of the present application The protocol is the same, that is, the flow detection performed is any one of IFIT flow detection, IOAM flow detection, or INT flow detection.
  • the head node of the detection domain has a functional module capable of generating detection messages, which can be called a packet sender.
  • a functional module capable of generating detection messages which can be called a packet sender.
  • the head node of the forwarding path 1 in the detection domain can generate a detection message 1, which is used to implement the active flow-following detection method 100. Link to perform network performance measurement.
  • the process of generating the detection message 1 by the head node may specifically include: S11, the head node generates the analog service message 1; S12, the head node encapsulates the analog service message 1 including the flow detection information 1. Message header 1, get detection message 1.
  • the generated detection message 1 is different, and the header 1 is adaptively encapsulated according to the message type of the detection message 1, for example: for the fourth version of the Internet Protocol (English: Internet Protocol version 4) , Abbreviation: IPv4) network environment, the detection message 1 is an IPv4 message, and the header 1 of the message can be encapsulated in the OPTION field of the IPv4 message; another example: for the sixth version of the Internet Protocol (English: Internet Protocol version 6, Abbreviation: IPv6) network environment, the detection message 1 is an IPv6 message, and the message header 1 can be encapsulated in an IPv6 message header (such as: Hop By Hop header); another example: For IPv6-based Segment routing (English: Segment Routing IPv6, abbreviated as: SRv6) network environment, detection message 1 is an SRv6 message, and header 1 can be encapsulated in the SRv6 extension header of the SRv6 message (English: Segment Routing Header, abbreviation: IPv4 network
  • the simulated service packet 1 generated in S11 is not a real service packet sent by the user equipment to the head node, but the head node simulates the real service packet 1 that the user equipment may send along the forwarding path 1, and is generated in the detection An analog message transmitted along forwarding path 1 in the domain.
  • the message header 1 in S12 it is the message header encapsulated on the analog service message 1 in order to generate the detection message 1 after the head node generates the analog service message 1.
  • the flow detection information 1 is used to instruct each node on the forwarding path 1 to perform flow detection on the network performance.
  • the flow detection information 1 also includes indication information 1, which is used to indicate that the forwarding path 1 no longer forwards the detection message 1 to other nodes at the tail node of the detection domain. In this way, the tail node can be effectively prevented.
  • the detection message is regarded as a real service message and sent from the tail node to a node outside the detection domain, which will affect the service provided to the user.
  • the analog service message 1 it can be a Layer 2 message or a Layer 3 message. Whether the head node specifically generates a Layer 2 analog business message 1 or a Layer 3 analog business message 1 can be determined based on whether the real business message 1 is a Layer 2 message or a Layer 3 message. Specifically, if the head node The real service message 1 transmitted along the forwarding path 1 is a Layer 2 message, then the generated analog service message 1 can be a Layer 2 message; if the real business message 1 transmitted by the head node along the forwarding path 1 is A three-layer message, the generated analog service message 1 may be a three-layer message.
  • the analog service message 1 and the real service message 1 are both Layer 2 messages, and the real service message 1 carries a virtual local area network (English: Virtual Local Area Network, abbreviated: VLAN) identifier, where the VLAN identifier is To identify the VLAN to which the user equipment belongs, and the real service message 1 can enter the head node from port 1, that is, the port 1 is the ingress port of the head node for receiving the real service message 1; then, the head node simulates the real service
  • the analog service message 1 generated by message 1 may include the VLAN identifier and the port number corresponding to port 1. The port number is used to indicate port 1. In this way, it can be ensured that the head node is based on the analog service message 1.
  • the generated detection message 1 is also transmitted along the forwarding path 1 in the detection domain.
  • the forwarding table included in each node includes the corresponding relationship between the ingress port on the node, the VLAN identifier, and the egress port on the node.
  • the real service packet is forwarded based on the VLAN to which it belongs, then, For the real service message 1 carrying the VLAN ID 1, then, when the head node receives the real service message 1 from the ingress port 11, it obtains the VLAN ID 1 carried in the real service message 1 through analysis, so as to be based on the incoming port 11. Port 11, VLAN ID 1, determine the egress port 12, and forward the real service message 1 from the egress port 12 to the next hop node (ie, intermediate node 1).
  • the generated simulated business message 1 needs to carry the same VLAN identifier as the real business message 1. That is, the analog service message 1 carries VLAN identification 1, and the head node needs to simulate the configuration of the analog service message 1 received from the ingress port 11 (that is, the ingress port of the real service message 1), for example: through configuration
  • the command informs the forwarder responsible for forwarding the message that the ingress port of the analog service message 1 is port 11, or another example: the analog service message 1 also carries the port number used to identify the ingress port 11, but it needs to be in The port number is deleted from the analog service packet 1 before forwarding to the next hop node.
  • the head node when the head node generates a simulation and receives the analog service message 1 from the ingress port 11, it obtains the VLAN ID 1 carried in the analog service message 1 through analysis, so as to determine the outgoing port based on the ingress port 11 and VLAN ID 1. 12, and forward the analog service message 1 from the outgoing port 12 to the next hop node (ie, intermediate node 1), and since the forwarding table on each node is consistent, it is ensured that the analog service message 1 can follow the real Service packets are forwarded on forwarding path 1 of the detection domain.
  • the next hop node ie, intermediate node 1
  • the forwarding table included in each node includes the ingress port on the node, the VLAN ID, and the source media access control (English: Media Access Control Address, abbreviation: MAC) address (hereinafter referred to as the destination) of the destination node. MAC address) and the corresponding relationship between the four outgoing ports on the node.
  • the real business message is forwarded based on the VLAN to which it belongs and the destination MAC address. Then, for the real business message carrying the VLAN ID 1 and the destination MAC address 1 1.
  • the head node when the head node receives the real service message 1 from the ingress port 11, it obtains the VLAN ID 1 and the destination MAC address 1 carried in the real service message 1 through analysis, so as to be based on the ingress port 11 and VLAN ID 1 and the destination MAC address 1, determine the egress port 12, and forward the real service message 1 from the egress port 12 to the next hop node (ie, intermediate node 1).
  • the generated simulated service message 1 needs to carry the same VLAN ID and ID as the real service message 1
  • the destination MAC address that is, the VLAN ID 1 and the destination MAC address 1 are carried in the analog service message 1, and the head node needs to simulate the configuration of the analog service message 1 from the ingress port 11 (that is, the ingress port of the real service message 1).
  • the ingress port of the analog service message 1 is port 11, or another example: the analog service message 1 is also carried to identify the port The port number of 11, but the port number needs to be deleted from the analog service packet 1 before forwarding to the next hop node.
  • the head node when the head node generates the simulation and receives the analog service message 1 from the ingress port 11, it obtains the VLAN ID 1 and the destination MAC address 1 carried in the analog service message 1 through analysis, so as to be based on the ingress port 11 and the VLAN ID 1 and the destination MAC address 1, determine the outgoing port 12, and forward the analog service message 1 from the outgoing port 12 to the next hop node (ie, intermediate node 1), and since the forwarding table on each node is consistent afterwards, ensure The analog service message 1 can be forwarded along the forwarding path 1 of the real service message in the detection domain.
  • the next hop node ie, intermediate node 1
  • the source MAC address, the destination MAC address, the source Internet Protocol (English: Internet Protocol, abbreviation: IP) address and the destination IP address can also be carried.
  • the source The MAC address can be the MAC address of any node other than the nodes on the forwarding path 1 or the MAC address of the interface on any node other than the nodes on the forwarding path 1; for the destination MAC address of the dedicated line service, it can be the MAC address of any node other than forwarding
  • the destination MAC address of the private network service it can be the real service message 1 Destination MAC address; the source IP address and destination IP address can be any unicast IP address.
  • the head node may also receive a real service message 1 from the ingress port (that is, port 1), and the real service message 1 carries the VLAN identifier, or , The real service message 1 carries the VLAN identifier and the destination MAC address, then the head node can determine the output port based on the forwarding table stored on it, and so on, each hop node is the same to determine the real service Packet 1 passes through the head node, intermediate node 1, intermediate node 2 and tail node in sequence on the forwarding path 1 of the detection domain, that is, the head node forwards the real service packet 1 to the tail node along the forwarding path 1.
  • the flow-following detection method can completely realize the detection domain.
  • both the analog service message 1 and the real service message 1 are Layer 3 messages. Since the real service message 1 carries the source IP address and the destination IP address, it is known that in the detection domain, the head node The IP address of the inbound interface 11 that receives the real service message 1 is IP address 11, and the IP address of the outgoing interface 12 of the tail node forwarding the real business message 1 to the user side is IP address 12; it is determined based on the source IP address and the destination IP address The forwarding path of the real service message 1 in the network includes a forwarding path 1 determined based on the network segment to which the IP address 11 belongs and the network segment to which the IP address 12 belongs.
  • the forwarding path determined between the two nodes can be certain for the two packets.
  • the generated analog service message 1 may also include the source IP address 3 and the destination IP address 4, where, The source IP address 3 and IP address 11 belong to the same network segment, and the destination IP address 4 and IP address 12 belong to the same network segment. In this way, it can be ensured that the detection packet 1 generated by the head node based on the analog service packet 1 It is also transmitted along the forwarding path 1 in the detection domain.
  • the head node may also receive the real service packet 1 from the ingress interface (ie, the ingress interface 1); and the head node forwards it to the tail node along the forwarding path 1
  • the tail node forwards the real business message 1 to other nodes from its upper outgoing interface 2 until the real business message 1 is forwarded to the user-side device, where the user-side device may refer to, for example, the device corresponding to the destination IP address of the real service message 1, and the real service message 1 is received by the device to provide users with corresponding service services.
  • the flow-following detection method can completely realize the detection domain.
  • the generated analog service packet 1 can carry the source IP address 3.
  • destination IP address 4 where the source IP address 3 can be any IP address that belongs to the same network segment as the IP address 11 of the inbound interface 11 on which the head node receives the real business message 1, and the destination IP address 4 can be taken from the tail node
  • the IP address 12 of the outbound interface 12 of the real service packet 1 belongs to any IP address in the same network segment.
  • the detection message 1 including the analog service message 1 can also carry the source MAC address and the destination MAC address, where the source MAC address can be any other single address except the MAC address corresponding to the inbound interface 1 of the head node. Broadcast MAC address, the destination MAC address can be the MAC address corresponding to the inbound interface 1 on the head node. It should be noted that before the detection message 1 is forwarded from the head node to the intermediate node 1, the source MAC address needs to be replaced with the MAC address in the head node. The MAC address corresponding to the outbound interface of the node, and the destination MAC address is replaced with the MAC address corresponding to the inbound interface on the intermediate node 1, to support normal forwarding of Layer 3 packets.
  • the generated detection message 1 may specifically be an IPv4 or IPv6 message.
  • the detection message 1 in order not to affect the provision of high-quality business services for users in the network, the detection message 1 needs to be limited to be forwarded within the detection domain, and may not be forwarded from the tail node of the forwarding path 1 to other nodes outside the detection domain.
  • the flow detection information 1 in the detection message 1 generated by the head node, not only instructs the nodes receiving the detection message 1 to perform flow detection, but also carries indication information 1 to indicate that the forwarding path 1 is in the detection domain.
  • the tail node no longer forwards detection message 1 to other nodes.
  • the indication information 1 may be, for example, an extension of a reserved field in the flow detection header 1 of the message header 1, such as adding at least one bit, and the information indicated by the at least one bit is the indication information 1; for example, it may also be An identifier is added to other fields in the flow detection header 1 of the message header 1 to indicate the indication information 1; for another example, the type information of the flow detection header 1 of the message header 1 may be expanded.
  • the indication information 1 may be one or more bits, which is not specifically limited in this application. The following exemplarily introduces the specific implementation of part of the instruction information 1:
  • the packet header 1 may be the flow detection header 1, and the indication information 1 may carry the value of the preset field or flag bit in the flow detection header 1.
  • the indication information 1 may be the information indicated by at least one bit included in the flow detection header 1.
  • the flow detection header 1 can be the flow instruction header field FIH of Figure 1
  • the indication information 1 can be, for example, the value of the R flag bit in the FIH.
  • the R flag The bit value is 0, which can indicate that the detection message 1 is a passive flow-following detection; on the contrary, when the R flag bit is 1, it can indicate that the detection message 1 is an active flow-following detection.
  • the indication information 1 may also be the value of a preset field in the flow detection header 1.
  • the indication information 1 may specifically be the information indicated by the header type indicator HTI, and the value of the HIT can indicate whether the flow-based detection header 1 includes the flow instruction extension header field FIEH or includes The type of FIEH. Specifically, when the value of HIT indicates that FIEH is not included in the flow-following detection header 1, or FIEH is included and the type is FIEH of passive flow-following detection, it is determined that the detection packet 1 is passive-fleeing detection. Detection; On the contrary, when the value of HIT indicates that the flow detection header 1 includes FIEH and the type is FIEH of active flow detection, it is determined that the detection packet 1 is active flow detection.
  • the packet header 1 includes an extended flow-following detection header 1, and the indication information 1 can be carried in the extended flow-following detection header 1, specifically, it can be the type field of the extended flow-following detection header 1.
  • the indicated information Taking IFIT detection as an example, referring to Figure 1, the extended flow detection header 1 can be the FIEH shown in Figure 1.
  • the indication information 1 can be, for example, the value of the type field in the FIEH, and the value of the type field in the FIEH is used for Indicate that the flow-following detection is active flow-following detection or passive flow-following detection; or, the indication information 1 may also be the value of any preset field or flag bit in the FIEH that can be used as an indication.
  • the packet header 1 includes the option OPTION field, and the OPTION field can carry indication information 1, specifically the information indicated by the type field of the OPTION field or the OPTION field The information indicated by at least one bit included.
  • the indication information 1 may specifically be the information indicated by the Type field of the extended OPTION field, or the indication information 1 may also be Reserve the value of one or more bits in the Reserved field or other fields. Taking iOAM detection as an example, see Figure 5b.
  • the indication information 1 may specifically be the information indicated by the iOAM Type field of the extended OPTION field, or the indication information 1 may also be It is the value of one or more bits of iOAM data Data.
  • the header 1 of the iOAM can be specifically encapsulated in an IPv6 header, a Virtual Extensible Local Area Network (English: Virtual Extensible Local Area Network, abbreviated as: VXLAN) header, or an IPv4 header.
  • the header 1 of the iOAM can also be encapsulated in the SRH.
  • the head node of the detection domain after the head node of the detection domain generates the detection message 1, the head node can measure the network performance according to the flow detection information 1 in the detection message 1, and the obtained measurement result is 0.
  • the head node 10 in the network architecture of the embodiment shown in FIG. 7.
  • the head node 10 also has a repeater 102.
  • the transponder 102 has a measurement module 1021 for realizing flow detection.
  • the process of the head node measuring the network performance according to the flow detection information 1 in the detection message 1 may include: S21, the head node 10 transmits the detection message 1 generated by the packet sender 101 to the repeater 102; S22, The repeater 102 recognizes that the received detection message 1 is a message for active flow detection.
  • the measurement module 1021 performs network performance measurement based on the flow detection information 1 in the detection message 1, and obtains a measurement result of 0.
  • the measurement result 0 may include, for example, a packet count, a time stamp, etc., which are used to reflect the network performance of the head node 10 and the link connected to the head node 10.
  • the flow-following detection information 1 can not only characterize whether the flow-following detection is active or passive flow-following detection, but also can reflect that the flow-following detection is end-to-end (English: Edge to Edge, abbreviated as: E2E)
  • the identification information 2 may be indication information 1, that is, the indication information 1 may indicate that the detection message 1 is: E2E active flow detection or hop-by-hop active flow detection.
  • the identification information 2 may also be other information besides the indication information 1, and is used to separately identify the E2E or the hop-by-hop detection mechanism adopted by the detection message 1.
  • each node on the forwarding path 1 is required to perform network performance measurement, and each of the obtained measurement results is sent to the control and management device; in the E2E active flow-following detection, forwarding path 1 is required After each node on the network performs network performance measurement, it carries the obtained measurement results in a detection message and sends it to the next hop until the tail node obtains the corresponding measurement result. The measurement result corresponding to each hop node is sent to the control management device.
  • the head node when the head node recognizes that the generated detection message 1 corresponds to hop-by-hop active flow detection, it needs to send the obtained measurement result 0 to the control and management device, and perform the following S102; when the head node recognizes the generated The detection message 1 corresponds to the E2E active flow detection, then the obtained measurement result 0 can be carried in the detection message 1, and the method 100 is continued to be executed as the detection message 1 in S102.
  • the head node sends the detection message 1 to the intermediate node 1 along the forwarding path 1.
  • the head node of the detection domain When the head node of the detection domain generates detection message 1, the head node can not only measure the network performance based on the flow detection information 1 in the detection message 1, and obtain a measurement result of 0; it can also follow the forwarding path 1.
  • the intermediate node 1 sends the detection message 1 so that the intermediate node 1 can measure the network performance based on the flow detection information 1 in the detection message 1.
  • the head node 10 determines that the next hop is the intermediate node 11 based on the determined forwarding path 1. Then, the forwarder 102 of the head node can detect the message 1 is forwarded to the repeater 112 of the intermediate node 11.
  • the intermediate node 1 performs a flow-following detection on the network performance according to the flow-following detection information 1 in the detection message 1.
  • the intermediate node 1 after the intermediate node 1 receives the detection message 1, the intermediate node 1 can measure the network performance according to the flow detection information 1 in the detection message 1, and obtain the measurement result 1.
  • the intermediate node 1 refers to the intermediate node 11 in the network architecture of the embodiment shown in FIG. 7, the intermediate node 11 has a transponder 112, and the transponder 112 has a measurement module 1121 for implementing flow detection.
  • the process for the intermediate node to measure network performance according to the flow detection information 1 in the detection message 1 may include: S31, the intermediate node 11 transmits the received detection message 1 to the repeater 112; S32, the repeater 112 Recognizing that the received detection message 1 is a message for active flow detection, the measurement module 1121 performs network performance measurement based on the flow detection information 1 in the detection message 1, and obtains measurement result 1.
  • This measurement result 1 It is used to reflect the network performance of the intermediate node 11 and the link connected to the intermediate node 11.
  • the intermediate node 1 updates the detection message 1 to obtain the detection message 1', and the detection message 1'includes the flow detection information 1'.
  • the intermediate node 1 When the intermediate node 1 recognizes that the received detection message 1 corresponds to the hop-by-hop active flow detection, it needs to send the obtained measurement result 1 to the control management device; when the intermediate node 1 recognizes the received detection message 1 corresponds to E2E active flow detection, then the obtained measurement result 1 can be carried in the detection message 1.
  • the intermediate node 1 recognizes that it is not the tail node of the forwarding path 1 in the detection domain, then the detection message 1 is updated to the detection message 1', and the detection message 1'includes the flow detection information 1' , Indication information 1 is still included in the flow detection information 1'.
  • the detection message 1' also includes measurement result 0 and measurement result 1; when the flow-following detection is hop-by-hop active flow-following detection, detection message 1 ' May not include measurement result 0 and measurement result 1.
  • the intermediate node 1 sends the detection message 1'to the intermediate node 2 along the forwarding path 1.
  • the intermediate node 2 performs a flow detection of the network performance according to the flow detection information 1'in the detection message 1'.
  • the intermediate node 2 updates the detection message 1'to obtain the detection message 1", and the detection message 1" includes the flow detection information 1".
  • S108 The intermediate node 2 sends the detection message 1" along the forwarding path 1 to the tail node of the detection domain.
  • the intermediate node 2 can measure the network performance according to the flow detection information 1'in the detection message 1', and obtain the measurement result 2.
  • the tail node performs a flow-following detection on the network performance according to the flow-following detection information 1" in the detection message 1".
  • the tail node after the tail node of the detection domain generates the detection message 1", the tail node can measure the network performance according to the flow detection information 1" in the detection message 1", and obtain the measurement result 3.
  • the tail node 13 in the network architecture of the embodiment shown in FIG. 7.
  • the tail node 13 also includes a packet receiver 131 for collecting detection messages;
  • the transponder 132 has a measurement module 1321 for realizing flow detection.
  • the process for the tail node to measure network performance according to the flow detection information 1" in the detection message 1" may include: S41, the tail node 13 transmits the received detection message 1" to the repeater 132; S42, The transponder 132 recognizes that the received detection message 1" is a message for active flow detection, and then the measurement module 1321 measures the network performance based on the flow detection information 1" in the detection message 1”, and obtains the measurement result 3.
  • the tail node determines that the detection message 1" will not be forwarded to other nodes according to the indication information 1 included in the flow detection information 1" in the detection message 1".
  • the detection message 1 "following detection information 1" carries indication information 1 to indicate detection
  • the tail node in the domain no longer forwards the detection message 1" to other nodes.
  • the tail node 13 parses the detection message 1" to obtain the indication information 1.
  • the tail node 13 can terminate the detection message 1" to prevent the traffic from being sent to the network outside the detection domain.
  • the tail node 13 terminates the detection message 1 "Can be implemented as follows: the tail node 13 directly deletes the detection message 1"; or, the tail node 13 terminates the detection message 1" can also be implemented as: the repeater 132 of the tail node 13 can delete the detection message 1 "Send to the packet receiver 131, and the packet receiver 131 saves or deletes the detection message 1". Since the packet receiver 131 is an internal module of the tail node 13, it does not have an interface to communicate with other nodes, so, The problem caused by the tail node 13 continuing to forward the detection message 1" to other nodes can also be avoided.
  • the head node of the detection domain can autonomously generate The detection message of the flow detection makes it possible to perform flow measurement of the network performance based on the flow detection technology.
  • the method provided by the embodiments of the present application is equivalent to providing a new flow-following detection mechanism. Only an extended flow-following detection protocol needs to be configured, and both active flow-following detection and passive flow-following detection can be completed. It can cover various scenarios of network performance testing, which provides convenience for network performance testing.
  • the detection message generated by the head node also needs to carry indication information to inform the tail node that it has received a detection message specifically for network performance measurement. Instruct the tail node to no longer forward the forwarded message to other nodes, so that the detection message that is specifically used for measurement but not the real service message is terminated by the tail node and will not be forwarded by the tail node to other nodes outside the detection domain. This avoids problems that affect the real services provided to users, and makes the network performance detection mechanism more intelligent.
  • the control and management device determines that the network performance of the forwarding path 1 in the detection domain is passed through the analysis, the real service packet is allowed to be transmitted through the forwarding path 1.
  • the head node receives the real business message 1, it determines that the forwarding path of the real business message 1 is forwarding path 1, and then the real business message 1 passes through the intermediate node 1, the intermediate node 2 and the tail node , Forward the detection domain, and forward it from the tail node to other nodes outside the detection domain, until it is transmitted to the destination node of the real service message 1.
  • the head node can generate different detection messages based on the different forwarding paths to be detected, and perform network performance measurement on the different forwarding paths to be detected respectively.
  • the measurement process of the two is basically the same and independent of each other.
  • the present application also provides an active flow-following detection method 200.
  • the method 200 performs S101-S110 on the forwarding path 1 in the above method 100.
  • the following S201 to S210 may be included to measure the forwarding path 2:
  • a head node in the detection domain generates a detection message 2, the detection message 2 includes a message header 2 and an analog service message 2 generated by the head node, and the message header 2 includes flow detection information 2.
  • the analog service message 2 is similar to the analog service message 1, and it is not a real service message sent by the user equipment.
  • the forwarding path 2 of the detection message 2 in the detection domain determined according to the analog service message 2 is used for Simulate the forwarding path of the real service message 2 sent by the user equipment in the detection domain.
  • the header 2 of the message includes the flow detection information 2.
  • the flow detection information 2 is used by the nodes on the forwarding path 2 to improve the network performance.
  • the flow-following detection information 2 includes indication information 2, and the indication information 2 is used to indicate that the tail node in the detection domain no longer forwards the detection message 2 to other nodes.
  • analog service message 2 and analog service message 1 have different protocol numbers, different transmission control protocol (English: Transmission Control Protocol, abbreviated: TCP) port numbers, and different user datagram protocols (English: User Datagram Protocol (abbreviation: UDP) at least one of the port numbers, in this way, it is determined that the head node will perform network performance tests for different forwarding paths after generating these two detection packets.
  • the analog service message 2 and the analog service message 1 have different protocol numbers. In this way, the head node determines the different forwarding paths of the analog service message 1 and the analog service message 2 in the detection domain based on the different protocol numbers.
  • the analog service message 2 and the analog service message 1 carry different TCP port numbers (or UDP port numbers).
  • the head node determines the analog service message 1 based on the different TCP port numbers (or UDP port numbers). It has a different forwarding path in the detection domain than the analog service message 2.
  • analog service message 2 and analog service message 1 have different protocol numbers and carry different TCP port numbers (or UDP port numbers). In this way, the head node is based on different protocol numbers and TCP port numbers (or UDP port numbers). Port number) respectively determine the different forwarding paths of the analog service message 1 and the analog service message 2 in the detection domain.
  • S202 The head node sends the detection message 2 to the intermediate node 3 along the forwarding path 2.
  • the intermediate node 3 performs a flow-following detection on the network performance according to the flow-following detection information 2 in the detection message 2.
  • the intermediate node 3 updates the detection message 2 to obtain the detection message 2', and the detection message 2'includes the flow detection information 2'.
  • S205 The intermediate node 3 sends the detection message 2'to the intermediate node 4 along the forwarding path 2.
  • the intermediate node 4 performs a flow-following detection on the network performance according to the flow-following detection information 2'in the detection message 2'.
  • the intermediate node 4 updates the detection message 2'to obtain the detection message 2", and the detection message 2" includes the flow detection information 2".
  • the intermediate node 4 sends the detection message 2" along the forwarding path 2 to the tail node of the detection domain.
  • S209 The tail node performs a flow-following detection on the network performance according to the flow-following detection information 2" in the detection message 2".
  • the tail node determines that the detection message 2" will not be forwarded to other nodes according to the indication information 2 included in the flow detection information 2" in the detection message 2".
  • the head node of the detection domain can autonomously generate
  • the detection message of the flow detection makes it possible to perform flow measurement of the network performance based on the flow detection technology; in addition, the detection message carries the indication information, so that the detection message is used for measurement rather than real business packets. It is terminated by the tail node and will not be forwarded by the tail node to other nodes outside the detection domain, thereby avoiding the problem of affecting the real services provided to users and making the network performance detection mechanism more intelligent.
  • the method 200 can detect multiple forwarding paths with the same head node and tail node in the detection domain, so that the network performance detection mechanism can adapt to more network scenarios and achieve more complete network performance in the detection domain. measuring.
  • the head node when the control and management device has analyzed and determined that the network performance tests of forwarding path 1 and forwarding path 2 in the detection domain both pass, then real service packets are allowed to be transmitted through forwarding path 1 and forwarding path 2.
  • the head node when the head node receives the real business message 2, the head node can determine the real business message 2 according to at least one of the protocol number, TCP port number, and UDP port number carried in the real business message 2.
  • the real service message 2 is transmitted along the determined forwarding path.
  • the head node determines the protocol number, TCP port number and/or UDP port number carried in the real service message 2 and the protocol number, TCP port number and/or UDP port number carried in the detection message 1 If the correspondence is the same, the forwarding path of the real business message 2 is determined to be forwarding path 1, and the real business message 2 is forwarded out of the detection domain through the intermediate node 1, the intermediate node 2 and the tail node; in another case , If the head node determines that at least one of the protocol number, TCP port number, and UDP port number carried in the real service message 2 is the same as at least one of the protocol number, TCP port number, and UDP port number carried in the detection message 2. If the correspondence is the same, it is determined that the forwarding path of the real service message 2 is forwarding path 2, and the real service message 2 is forwarded out of the detection domain through the intermediate node 3, the intermediate node 4, and the tail node.
  • the network includes a control management device 100, a head node 10, an intermediate node 11, an intermediate node 12, and a tail node 13.
  • the head node 10 includes an IFIT packet sender 101 and a repeater 102 for generating detection messages.
  • the repeater 102 includes an IFIT measurement module 1021;
  • the intermediate node 11 includes a repeater 112, which includes an IFIT measurement module 1121;
  • the intermediate node 12 includes a repeater 122, which includes an IFIT measurement module 1221;
  • the tail node 13 includes an IFIT packet receiver 131 and a repeater 132 for terminating detection messages.
  • the repeater 132 includes an IFIT measurement module 1321;
  • the control and management device 100 is used to collect the measurement results of each node in the detection domain, And conduct analysis and management.
  • the extended IFIT protocol provided by the embodiment of the application is configured in the network shown in FIG. 7. If there is real business traffic on the forwarding path X of the head node 10->intermediate node 11->intermediate node 12->tail node 13, then, According to the current IFIT passive flow detection mechanism, the network performance measurement of the nodes and links in the detection domain of the forwarding path X will not be repeated here; if there is no real business traffic on the forwarding path X (such as: each node just Open, after the service channel configuration is completed, no real service messages enter, but the network performance of the newly configured channel needs to be measured; another example, among the multiple forwarding paths between the head node and the tail node, some paths are used as protection paths. Normally, real service packets are not carried, but the performance index of the protection path needs to be measured), then the network performance measurement can be performed on the nodes and links of the forwarding path X in the detection domain according to the following S301 to S312:
  • the IFIT packet sender 101 of the head node 10 generates a detection message a, and sends the detection message to the repeater 102; wherein the detection message a includes a message header a and an analog service message a, and the message header a Including flow detection header a, the flow detection header a includes indication information 1, the indication information 1 is used to indicate that the detection of the detection message a is a hop-by-hop active flow-following detection, and instruct the tail node 13 to no longer send other The node forwards the detection message a.
  • the transponder 102 of the head node 10 recognizes that the detection of the detection message a is hop-by-hop active flow-following detection, and the IFIT measurement module 1021 therein performs network performance measurement based on the flow-following detection head a to obtain a measurement result 10, and The measurement result 10 is sent to the control management device 100.
  • the repeater 102 of the head node 10 updates the detection message a, obtains the detection message a', and sends the detection message a'to the intermediate node 11, where the detection message a'includes the flow detection header a '.
  • the IFIT measurement module 1121 in the repeater 112 of the intermediate node 11 performs network performance measurement based on the flow-following detection head a', obtains the measurement result 11, and sends the measurement result 11 to the control management device 100.
  • the transponder 112 of the intermediate node 11 updates the detection message a', obtains the detection message a", and sends the detection message a" to the intermediate node 12, where the detection message a" includes a flow detection header a".
  • the IFIT measurement module 1221 in the transponder 122 of the intermediate node 12 performs network performance measurement based on the flow detection head a", obtains the measurement result 12, and sends the measurement result 12 to the control management device 100.
  • the transponder 122 of the intermediate node 12 updates the detection message a", obtains the detection message a"', and sends the detection message a"' to the intermediate node 12, where the detection message a'" includes follow the flow detection head a'".
  • the IFIT measurement module 1321 in the repeater 132 of the tail node 13 performs network performance measurement based on the flow detection head a"', obtains the measurement result 13, and sends the measurement result 13 to the control management device 100.
  • the tail node 13 determines that the detection message a'” will not be forwarded to other nodes according to the indication information 1 included in the flow detection header a”' in the detection message a'”, and will detect the message a'” Send to the IFIT packet receiver 131 of the tail node 13.
  • the control and management device 100 analyzes and determines the performance index of the forwarding path X based on the received measurement result 10 to the measurement result 13, evaluates whether the service bearer requirement is met, and if so, determines that the test of the forwarding path X passes.
  • this embodiment may further include:
  • the head node 10 receives the real business message b, and the real business message b and the detection message a carry the same protocol number and TCP/UDP port number;
  • the head node 10 determines that the transmission path passes through the forwarding path X, forwards the real service message b through the intermediate node 11, the intermediate node 12, and the tail node 13 along the forwarding path X, and transfers the real business message b from the tail node 13 It is sent to other nodes until it is transmitted to the destination node of the real business message b, so as to provide users with high-quality business services.
  • this embodiment takes the hop-by-hop active flow-following detection under IFIT as an example.
  • active flow-following detection under other protocols such as iOAM
  • detection mechanisms such as E2E All are similar to the above implementations.
  • the measurement module carried in each node is the iOAM measurement module
  • the packet sender in the head node is the iOAM packet sender
  • the packet receiver in the tail node is the iOAM receiver.
  • the detection message carries the flow detection information corresponding to iOAM, and the detection process is basically the same, so I will not list them here.
  • FIG. 8 shows a schematic flowchart of a method 400 for active flow-following detection in an embodiment of the present application.
  • the method 400 is applied in the detection domain of flow-following detection, and the head node of the detection domain—the first network node is used as The executive body, the method 400 of active flow-following detection may include, for example:
  • a first network node generates a first detection message, where the first network node is a head node in a detection domain.
  • the first detection message includes a first message header and a first analog service message generated by the first network node.
  • the first analog service message is not a real service message sent by the user equipment.
  • the first forwarding path of the first detection packet in the detection domain determined by the document is used to simulate the forwarding path of the first real service packet sent by the user equipment in the detection domain, and the first packet header includes the first packet.
  • the first flow detection information is used by nodes on the first forwarding path to perform flow detection of network performance, the first flow detection information includes first indication information, and the first indication information is used to indicate the detection domain The tail node of no longer forwards the first detection message to other nodes.
  • the first network node sends the first detection message to the tail node in the detection domain along the first forwarding path.
  • the first network node may be the head node in FIG. 2 or FIG. 3, or the head node 10 in FIG.
  • the first detection message may be detection message 1 in method 100 and method 200
  • the first analog service message may be analog service message 1 in method 100 and method 200
  • the first message header may be It is the message header 1 in method 100 and method 200
  • the first indication information may be the indication information 1 in method 100 and method 200
  • the first forwarding path may be forwarding path 1 in method 100 and method 200
  • a detection message may be the detection message a in the method shown in FIG. 7.
  • the first analog service message may be the analog service message a in the method shown in FIG. 7, and the first message header may be the analog service message a in the method shown in FIG.
  • the first indication information may be the indication information a in the method shown in FIG. 7, and the first forwarding path may be the forwarding path X in the method shown in FIG. 7.
  • the first packet header may include a first flow-following detection header, and the first flow-following detection header includes first indication information.
  • the first indication information is information indicated by at least one bit included in the first stream-following detection header.
  • the first packet header may include a first extended flow following detection header, the first extended flow following detection header is used to carry first indication information, and the type field of the first extended flow following detection header indicates flow detection It is active flow detection.
  • the first packet header may include an option OPTION field, and the OPTION field includes the first indication information.
  • the first indication information is information indicated by at least one bit included in the OPTION field.
  • the first indication information is the information indicated by the type field of the OPTION field, and the type field indicates that the flow-following detection is active flow-following detection.
  • the above three examples are only exemplary introductions of the first indication information carried in the first detection message in the embodiments of this application, including but not limited to the above three possible implementations, and any other can be used to indicate the flow detection
  • the information for active flow detection can be used as the first indication information in the embodiment of the present application, and any packet header that can carry the first indication information can be used as the first packet header in the embodiment of the present application.
  • the flow detection may be IFIT flow detection, or iOAM flow detection, or alternatively, INT flow detection.
  • Any stream-following detection protocol can be extended by the method provided in the embodiment of the present application, and supports the active stream-following detection method provided in the embodiment of the present application.
  • the flow-following detection may be end-to-end E2E active flow-following detection, or hop-by-hop active flow-following detection, which can be flexibly set according to the requirements of flow detection.
  • the specific process may include: the first network node generates the first analog service message; the first network node encapsulates the first flow-following detection information on the first analog service message.
  • the specific process refer to the related descriptions of S11 to S12 in the above method 100.
  • the first analog service packet may be a layer 2 packet, and the layer 2 packet includes a virtual local area network VLAN identifier, and the VLAN identifier is used to identify the VLAN to which the user equipment belongs.
  • the method 400 may further include: the first network node receives a first real service message, and the first real service message carries the same VLAN identifier as that in the first analog service message; then, the first network node follows The first forwarding path forwards the first real service message to the tail node. In this way, for dedicated line services, considering that Layer 2 packets are forwarded according to the VLAN to which they belong, the Layer 2 simulated service packets generated by the head node carry the VLAN identifiers carried by the real service packets to simulate the real Layer 2 services.
  • the message enters the ingress port of the head node, so that the analog service message is transmitted in the detection domain according to the same forwarding path as the real service message, so that the measurement result of the network performance measurement is that the real service message is forwarded in the detection domain.
  • Real reference meaning For private network services, considering that Layer 2 packets are forwarded according to the VLAN and destination MAC address they belong to, the Layer 2 analog service packets generated by the head node carry the VLAN ID and destination MAC address carried by the real service packets.
  • the real service message of the simulation layer 2 enters the ingress port of the head node, so that the simulation service message is transmitted in the detection domain according to the same forwarding path as the real service message, so that the measurement result of the network performance measurement is the real service message
  • the forwarding in the detection domain has real reference significance.
  • the first analog service message may also be a three-layer message.
  • the three-layer message includes a source Internet Protocol IP address and a destination IP address.
  • the source IP address is used by the first network node to receive the first
  • the IP address of the inbound interface of the real service packet is in the same network segment
  • the destination IP address is the IP address of the same network segment as the outbound interface through which the tail node forwards the first real service packet to the user side.
  • the method 400 may further include: the first network node receives the first real service packet through the ingress interface; and the first network node forwards the first real service packet to the tail node along the first forwarding path.
  • the source IP address of the same network segment and the destination IP address of the same network segment have the same packet forwarding path, so the Layer 3 simulation generated by the head node
  • the source IP address and destination IP address carried in the business message correspond to the same network segment as the source IP address and destination IP address carried in the real business message, so that the analog business message is in the detection domain in accordance with the real business message
  • the same forwarding path is transmitted, so that the measurement result of the network performance measurement is that the forwarding of real service packets in the detection domain has real reference significance.
  • the method 400 further includes: the first network node generates a second detection message, wherein the first detection message and the second detection message have different protocol numbers and/or transmission control protocols TCP/User Datagram Protocol UDP port number, the second detection message includes the second message header and the second analog service message generated by the first network node, and the second detection message is determined according to the second analog service message
  • the second forwarding path of the document in the detection domain is used to simulate the forwarding path of the second real service packet sent by the user equipment in the detection domain.
  • the second packet header includes the second flow-following detection information.
  • the detection information is used by nodes in the second forwarding path to perform flow-following detection of network performance, the second flow-following detection information includes second indication information, and the second indication information is used to instruct the tail node to no longer forward the second detection to other nodes Message; the first network node forwards the second detection message to the tail node along the second forwarding path.
  • the method 400 may further include: the first network node receives the second real service message sent by the user equipment, the protocol number and the TCP/UDP port carried in the second real service message and the second detection message The numbers are the same; the first network node forwards the second real service message to the tail node along the second forwarding path.
  • the second detection message may be the detection message 2 in the method 200
  • the second analog service message may be the detection message 2 in the method 200
  • the second packet header can be the packet header 2 in the method 200
  • the second indication information can be the instruction information 2 in the method 200
  • the second forwarding path can be the forwarding path 2 in the method 200.
  • this implementation can detect multiple forwarding paths with the same head node and tail node in the detection domain, and provide data support for the normal transmission of different real service packets that need to be transmitted through different forwarding paths in the network. This enables the network performance detection mechanism to adapt to more network scenarios, and achieve a more complete network performance measurement in the detection domain.
  • FIG. 9 shows a schematic flow chart of another method 500 for active flow detection in an embodiment of the present application.
  • the method 500 is applied in the detection domain of flow detection, and any node after the head node of the detection domain—
  • the second network node is the execution subject, and the method 500 for active flow detection may include, for example:
  • a second network node in the detection domain receives a first detection message sent by a first network node in the detection domain through a first forwarding path in the detection domain, where the first detection message includes a first message header and a first For analog service packets, the first packet header includes first flow-following detection information, the first flow-following detection information includes indication information, and the indication information is used to instruct the tail node in the detection domain to no longer forward the first detection message to other nodes
  • the first analog service packet is not a real service packet sent by the user equipment, and the first forwarding path is used to simulate the forwarding path of the first real service packet sent by the user equipment in the detection domain;
  • the second network node performs a flow detection on the network performance according to the first flow detection information.
  • the second network node may be a tail node in the detection domain.
  • the method 500 may further include: according to the instruction information, the second network node no longer reports to other nodes Forward the first detection message.
  • the second network node may be the tail node in FIG. 2 or FIG. 3, or the tail node 13 in FIG. 7; for the operations performed by the second network node, please refer to the tail node execution in method 100 and method 200. See also the corresponding operation performed by the tail node 13 in FIG. 7 for the operation of.
  • the first detection message may be the detection message 1" in the method 100 and the method 200, then the first analog service message may be the analog service message 1" in the method 100 and the method 200, and the first message
  • the header can be the message header 1" in the method 100 and the method 200, the indication information can be the instruction information 1 in the method 100 and the method 200, and the first forwarding path can be the forwarding path 1 in the method 100 and the method 200; or,
  • the first detection message may be the detection message 2" in the method 200, then the first analog service message may be the analog service message 2" in the method 200, and the first message header may be the message in the method 200.
  • Header 2 the indication information may be indication information 2 in method 200, and the first forwarding path may be forwarding path 2 in method 200.
  • the first detection message may be the detection message a'" in the method shown in FIG. 7.
  • the first analog service message may be the analog service message a'" in the method shown in FIG. 7.
  • a message header may be the message header a'" in the method shown in FIG. 7
  • the indication information may be the indication information a in the method shown in FIG. 7, and the first forwarding path may be the forwarding path in the method shown in FIG. X.
  • the second network node may also be an intermediate node in the detection domain, and the method 500 may further include: the second network node updates the first detection message to obtain the second detection message, and the second detection The message includes second flow-following detection information, and the second flow-following detection information includes indication information; the second network node forwards the second detection message to the tail node along the first forwarding path.
  • the second network node may be intermediate node 1 or intermediate node 2 in Fig. 2, or any one of intermediate node 1 to intermediate node 4 in Fig. 3, or intermediate node 11 or intermediate node 12 in Fig. 7; the For the operations performed by the second network node, refer to method 100, method 200, and operations performed by corresponding intermediate nodes in FIG. 7 for details.
  • the second detection message may be, for example, detection message 1'or detection message 1" in method 100 and method 200, or detection message 2'or detection message 2" in method 200; then, the first 2.
  • the flow-following detection information can be corresponding flow-following detection information 1'or flow-following detection information 1" or flow-following detection information 2'or flow-following detection information 2", indicating information corresponding to the instruction information 1 or instruction information 2,
  • the first A forwarding path may be corresponding forwarding path 1 or forwarding path 2; or, the second detection message may be a detection message a', a detection message a", or a detection message a'" in the method shown in FIG. 7,
  • the second flow detection information may be corresponding flow detection information a', flow detection information a" or flow detection information a'", indicating information corresponding to the indication information a
  • the first forwarding path may be corresponding Forwarding path X.
  • the first analog service packet may be a layer 2 packet, and the layer 2 packet includes a virtual local area network VLAN identifier, and the VLAN identifier is used to identify the VLAN to which the user equipment belongs. Then, the first network node receives the first real service message sent by the user equipment from the first port, and the first real service message carries the VLAN identifier.
  • the first analog service message is a three-layer message.
  • the three-layer message includes a source Internet Protocol IP address and a destination IP address.
  • the source IP address is used by the head node in the detection domain.
  • the destination IP address is the IP address of the same network segment as the outbound interface of the tail node forwarding the first real service packet to the user side.
  • the embodiments of the present application can enable the analog service message to be transmitted in the detection domain according to the same forwarding path as the real service message, thereby enabling the measurement of network performance measurement
  • the result is that the forwarding of real service packets in the detection domain has real reference significance.
  • the flow detection is IFIT flow detection, iOAM flow detection or INT flow detection.
  • the flow detection is end-to-end active flow detection or hop-by-hop active flow detection.
  • an embodiment of the present application also provides a first network device 1000, as shown in FIG. 10.
  • the first network device 1000 includes a processing unit 1001 and a sending unit 1002.
  • the processing unit 1001 is configured to perform the processing operations performed by the head node in the embodiment shown in FIG. 4 and FIG. 6, the processing operations performed by the head node 10 in the embodiment shown in FIG. 7, and the processing operation performed by the head node 10 in the embodiment shown in FIG. A processing operation performed by a network node;
  • the sending unit 1002 is configured to execute the sending operation performed by the head node in the embodiment shown in FIG. 4 and FIG. 6 and the sending operation performed by the head node 10 in the embodiment shown in FIG. 7 ,
  • the processing unit 1001 may perform the operation in the embodiment in FIG. 4: the head node in the detection domain generates a detection message 1.
  • an embodiment of the present application also provides a second network device 1100, as shown in FIG. 11.
  • the second network device 1100 includes a receiving unit 1101, a processing unit 1102, and a sending unit 1103.
  • the receiving unit 1101 is configured to perform the receiving operations performed by the intermediate node 1, the intermediate node 2, or the tail node in the embodiment shown in FIG. 4 and FIG. 6, the intermediate node 11, the intermediate node 12, or the intermediate node in the embodiment shown in FIG.
  • the sending unit 1103 is configured to execute the execution of the intermediate node 1 or the intermediate node 2 in the embodiment shown in FIG. 4 and FIG.
  • processing The unit 1102 is used to perform the processing operations performed by the intermediate node 1, the intermediate node 2 or the tail node in the embodiment shown in FIG. 4 and FIG. 6, and the intermediate node 11, the intermediate node 12 or the tail node 13 in the embodiment shown in FIG.
  • the receiving unit 1101 can perform the operation in the embodiment in Figure 4: the intermediate node 2 receives the detection message 1'sent by the intermediate node 1; the processing unit 1102 can perform the operation in the embodiment in Figure 4: the intermediate node 2 detects The flow-following detection information 1'in the message 1'performs flow-following detection on the network performance, and the intermediate node 2 updates the detection message 1'to obtain a detection message 1".
  • the detection message 1" includes random Flow detection information 1"; the sending unit 1103 can perform the operation in the embodiment in FIG. 4: the intermediate node 2 sends the detection message 1" to the tail node of the detection domain along the forwarding path 1.
  • an embodiment of the present application also provides a first network device 1200, as shown in FIG. 12.
  • the first network device 1200 includes a first communication interface 1201, a second communication interface 1202, and a processor 1203.
  • the first communication interface 1201 is used to execute the aforementioned head node in the embodiment shown in Figs. 4 and 6, the head node 10 in the embodiment shown in Fig. 7 and the first network node in the embodiment shown in Fig. 8
  • the second communication interface 1202 is used to execute the aforementioned head node used to execute the head node in the embodiment shown in FIGS. 4 and 6, the head node 10 in the embodiment shown in FIG. 7 and the first node in the embodiment shown in FIG.
  • a sending operation performed by a network node; the processor 1203 is configured to execute the head node in the embodiment shown in Figs. 4 and 6, the head node 10 in the embodiment shown in Fig. 7 and the first network node in the embodiment shown in Fig. 8 Perform operations other than receiving and sending operations.
  • the processor 1202 may perform the operation in the embodiment in FIG. 4: the head node in the detection domain generates a detection message 1.
  • an embodiment of the present application also provides a second network device 1300, as shown in FIG. 13.
  • the second network device 1300 includes a first communication interface 1301, a second communication interface 1302, and a processor 1303.
  • the first communication interface 1301 is used to perform the receiving operation performed by the intermediate node 1 and the intermediate node 2 in the embodiment shown in FIGS. 4 and 6, and the receiving operation performed by the intermediate node 11 and the intermediate node 12 in the embodiment shown in FIG. 7
  • the second communication interface 1302 is used to execute the intermediate node 1 and the intermediate node 2 in the embodiment shown in FIGS.
  • the sending operation performed is the sending operation performed by the intermediate node 11 and the intermediate node 12 in the embodiment shown in FIG. 7, and the sending operation performed by the second network node (when it is an intermediate node) in the embodiment shown in FIG. 8.
  • the first communication interface 1301 is used to perform the receiving operation performed by the tail node in the embodiment shown in FIGS. 4 and 6, the receiving operation performed by the tail node 13 in the embodiment shown in FIG. 7, and the first communication interface in the embodiment shown in FIG. 2.
  • the receiving operation performed by the network node (when it is a tail node); the second communication interface 1302 is used to perform the sending operation performed by the tail node in the embodiment shown in FIGS. 4 and 6, and the sending operation performed by the tail node 13 in the embodiment shown in FIG.
  • the processor 1302 is configured to perform other operations other than the receiving operation and the sending operation performed by the intermediate node 1, the intermediate node 2 or the tail node in the embodiment shown in Figs. 4 and 6.
  • the intermediate node 11 The operations performed by the intermediate node 12 or the tail node 13 in addition to the receiving operation and the sending operation, and the operations performed by the second network node in the embodiment shown in FIG. 8 other than the receiving operation and the sending operation.
  • the processor 1302 may perform the operations in the embodiment in FIG.
  • the intermediate node 2 performs the following flow detection on the network performance according to the flow detection information 1'in the detection message 1', and the intermediate node 2 checks the detection report The message 1'is updated, and the detection message 1" is obtained, and the detection message 1" includes the flow detection information 1".
  • an embodiment of the present application also provides a first network device 1400, as shown in FIG. 14.
  • the first network device 1400 includes a memory 1401 and a processor 1402 communicating with the memory 1401.
  • the memory 1401 includes computer-readable instructions; the processor 1402 is configured to execute the computer-readable instructions, so that the first network device 1400 executes the method executed on the head node side in the embodiments shown in FIG. 4 and FIG. 6, as shown in FIG. The method executed on the head node 10 side in the embodiment shown in 7 and the method executed on the first network node side in the embodiment shown in FIG. 8.
  • an embodiment of the present application also provides a second network device 1500, as shown in FIG. 15.
  • the second network device 1500 includes a memory 1501 and a processor 1502 communicating with the memory 1501.
  • the memory 1501 includes computer-readable instructions;
  • the processor 1502 is configured to execute the computer-readable instructions, so that the second network device 1500 executes the intermediate node 1, the intermediate node 2, or the intermediate node 1 in the embodiment shown in FIG. 4 and FIG.
  • the method executed on the tail node side is the method executed on the side of the intermediate node 11, the intermediate node 12 or the tail node 13 in the embodiment shown in FIG. 7, and the method executed on the side of the second network node in the embodiment shown in FIG.
  • the processor may be a central processing unit (English: central processing unit, abbreviation: CPU), a network processor (English: network processor, abbreviation: NP), or a combination of CPU and NP.
  • the processor may also be an application-specific integrated circuit (English: application-specific integrated circuit, abbreviation: ASIC), a programmable logic device (English: programmable logic device, abbreviation: PLD) or a combination thereof.
  • the above-mentioned PLD can be a complex programmable logic device (English: complex programmable logic device, abbreviation: CPLD), field programmable logic gate array (English: field-programmable gate array, abbreviation: FPGA), general array logic (English: generic array) logic, abbreviation: GAL) or any combination thereof.
  • the processor may refer to one processor or may include multiple processors.
  • the memory may include volatile memory (English: volatile memory), such as random access memory (English: random-access memory, abbreviation: RAM); the memory may also include non-volatile memory (English: non-volatile memory), For example, read-only memory (English: read-only memory, abbreviation: ROM), flash memory (English: flash memory), hard disk (English: hard disk drive, abbreviation: HDD) or solid state drive (English: solid-state drive, Abbreviation: SSD); the memory can also include a combination of the above-mentioned types of memory.
  • the memory may refer to one memory, or may include multiple memories.
  • computer-readable instructions are stored in the memory, and the computer-readable instructions include multiple software modules, such as a sending module, a processing module, and a receiving module. After executing each software module, the processor can perform corresponding operations according to the instructions of each software module. In this embodiment, an operation performed by a software module actually refers to an operation performed by the processor according to an instruction of the software module. After the processor executes the computer-readable instructions in the memory, it can perform all operations that can be performed by each network node that actively follows the flow detection according to the instructions of the computer-readable instructions.
  • the second communication interface 1202 of the first network device 1200 can be specifically used as the sending unit 1002 in the first network device 1000 to realize communication between the first network device and the second network device.
  • the first communication interface 1301 of the second network device 1300 can be specifically used as the receiving unit 1101 in the second network device 1100 to realize communication between adjacent second network devices or between the first network device and the second network device.
  • Data communication; the second communication interface 1302 of the second network device 1300 can be specifically used as the sending unit 1103 in the second network device 1100 to achieve between adjacent second network devices or the second network device to outside the detection domain Data communication of network equipment.
  • an embodiment of the present application also provides a communication system 1600, as shown in FIG. 16.
  • the communication system 1600 includes a first network device 1601 and a second network device 1602, where the first network device 1601 may specifically be the first network device 1000, the first network device 1200, or the first network device 1400, and the second network device 1602 may specifically be the aforementioned second network device 1100, second network device 1300, or second network device 1500.
  • embodiments of the present application also provide a computer-readable storage medium that stores instructions in the computer-readable storage medium, which when run on a computer, causes the computer to execute the above figures 4 and 6-9.
  • the active flow-following detection method in the illustrated embodiment is also provided.
  • embodiments of the present application also provide a computer program product, including a computer program or computer readable instructions, when the computer program or the computer readable instructions run on a computer, the computer can execute the aforementioned Figures 4 and 6- The active flow-following detection method in the embodiment shown in FIG. 9.
  • the "head node” and “tail node” in the embodiments of this application are for the detection domain of flow detection, and the "source MAC address”, “destination MAC address”, “source IP address” and The “destination IP address” is a concept for the source network node and the destination network node when the service message is transmitted in the entire network, and the two are different in scope.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Environmental & Geological Engineering (AREA)
  • Computer Security & Cryptography (AREA)
  • Chemical & Material Sciences (AREA)
  • Chemical Kinetics & Catalysis (AREA)
  • Electrochemistry (AREA)
  • General Chemical & Material Sciences (AREA)
  • Materials Engineering (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

本申请请求保护一种主动随流检测的方法、网络设备以及系统。该方法包括:在应用随流检测的检测域中,如果头节点没有收到由用户设备发送的真实业务流量,该头节点主动生成包括随流检测信息和模拟业务报文的检测报文,随流检测信息被检测域中的节点用于流量检测,该模拟业务报文中包括的指示信息用于指示检测域中的尾节点不再向其它节点转发该检测报文。当尾节点接收到由头节点发送的该检测报文后,基于该检测报文中携带的随流检测信息进行网络性能检测后,终结该检测报文,不再继续转发该检测报文。通过本申请的方法,对随流检测协议进行扩展,增加主动随流检测能力,即使在没有真实业务流量的场景中也实现随流检测,覆盖网络性能检测的各种场景。

Description

一种主动随流检测的方法、网络设备以及通信系统
本申请要求于2020年02月24日提交中国国家知识产权局、申请号为202010112503.3、申请名称为“一种主动随流检测的方法、网络设备以及通信系统”的中国专利申请的优先权,以及于2020年01月03日递交中国国家知识产权局、申请号为202010006017.3,发明名称为“一种随流检测的方法和设备”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及通信技术领域,尤其涉及一种主动随流检测的方法、网络设备以及通信系统。
背景技术
网络性能检测技术是电信领域的研究热点。网络性能检测技术通过监控、测量和采集网络性能数据,对网络运行状态进行分析、控制、调整,提供稳定的网络服务,是网络运行的基础。根据测量方法,网络性能检测技术可以分为主动检测(英文:Active Metrics)和被动检测(英文:Passive Metrics)两类。
其中,主动检测是通过向网络中主动发送检测流,根据检测流受网络影响而发生的特性变化来分析网络行为。被测量的网络性能指标通常包括丢包率、时延、抖动或带宽中的一种或多种。常见的主动测量协议包括PING、Traceroute、互联网协议测量协议(英文:Internet Protocol Measurement Protocol,简称:IPMP)、双向主动测量协议(英文:Two-Way Active Measurement Protocol,简称:OWAMP)等。主动检测使用灵活,但是传统的主动检测通过带外发送模拟检测报文而间接模拟实际业务,但这种检测方式测量的不是真实业务流量,无法保证模拟报文与真实业务路径一致,不能完全真实地反映网络业务质量,主动检测的准确度与实际网络存在一定偏差。
被动检测是采用随流检测技术,直接对用户设备发送的实际业务流进行测量的检测技术,随流检测技术例如可以是带内操作管理和维护(英文:in-situ Operations Adminstration and Maintenance,简称:iOAM)、带内流信息遥测(英文:In-situ Flow Information Telemetry,简称:IFIT)、带内网络遥测(In-band Network Telemetry简称:INT)等检测技术,被动检测基于实际的业务流进行测量,检测精度较高,但是被动检测必须基于用户设备发送的真实业务流量进行检测。在一些缺少真实业务流量的网络场景中,目前的被动检测技术无法对网络性能进行检测。因此,如何提供一种新的检测机制,能够覆盖网络性能检测的各种场景,成为目前需要解决的技术问题。
发明内容
基于此,本申请实施例提供了一种主动随流检测的方法、网络设备及通信系统,提供了一种新的检测机制,即,配置扩展的随流检测协议,使得在无真实业务流量的网络场景中,也能够基于随流检测技术对网络性能进行有效的随流测量,实现各种场景下的网络性 能检测。
第一方面,提供了一种主动随流检测的方法,在应用随流检测的检测域中的头节点(即第一网络节点)未接收到真实业务报文的情况下,该方法可以包括:第一网络节点生成第一模拟业务报文,所述第一模拟业务报文不是用户设备发送的真实业务报文;第一网络节点生成第一检测报文,该第一检测报文包括第一报文头和所述第一模拟业务报文,根据所述第一模拟业务报文所确定的所述第一检测报文在所述检测域中的第一转发路径用于模拟由所述用户设备发送的第一真实业务报文在所述检测域中的转发路径,所述第一报文头中包括第一随流检测信息,所述第一随流检测信息被所述第一转发路径上的节点用于对网络性能进行随流检测,所述第一随流检测信息包括第一指示信息,所述第一指示信息用于指示所述检测域中的尾节点不再向其它节点转发所述第一检测报文;该第一网络节点沿着所述第一转发路径向所述检测域中的尾节点发送所述第一检测报文。
可见,在本申请实施例中,通过对目前的随流检测协议进行扩展,即使在无真实业务流量的网络场景中,检测域的头节点能够自主的生成用于随流检测的检测报文,使得基于随流检测技术对网络性能进行随流测量成为可能。这样,本申请实施例提供的方法相当于提供了一种新的随流检测机制,仅仅需要配置一种扩展的随流检测协议,就既能够完成主动随流检测又能够进行被动随流检测,能够覆盖网络性能检测的各种场景,为网络性能检测提供了便利。而且,该实施例中在采用主动随流检测技术时,头节点生成的检测报文中还需要携带指示信息,用于告知尾节点其接收到的是专门用于网络性能测量的检测报文,指示尾节点不再向其他节点转发该转发报文,如此,使得专门用于测量而非真实业务报文的检测报文被尾节点终结,不会被尾节点转发至检测域以外的其他节点,从而避免了影响为用户提供的真实业务的问题,使得该网络性能检测机制更加智能。
作为一个示例,第一报文头中可以包括第一随流检测头,该第一随流检测头包括第一指示信息。该第一指示信息为第一随流检测头中包括的至少一个比特位所指示的信息。例如:对于IFIT随流检测,第一随流检测头可以是流指令头部字段FIH,第一指示信息可以是该FIH中的R标志位的值,如,当R标志位取值为0,可以指示该第一检测报文为被动随流检测;反之,当R标志位取值为1,可以指示该第一检测报文为主动随流检测。
作为另一个示例,第一报文头可以包括第一扩展随流检测头,第一扩展随流检测头用于携带第一指示信息,该第一扩展随流检测头的类型字段指示随流检测为主动随流检测。仍然以IFIT随流检测为例,第一扩展随流检测头具体可以是FIEH,那么,第一指示信息例如可以是该FIEH中类型字段的值,该FIEH中类型字段的值用于指示该随流检测为主动随流检测或被动随流检测;或者,第一该指示信息也可以是该FIEH中任意可以用作指示的预设字段或标志位的取值。
作为再一个示例,第一报文头可以包括选项OPTION字段,该OPTION字段包括第一指示信息。例如:该第一指示信息为OPTION字段中包括的至少一个比特位所指示的信息。又例如:该第一指示信息为OPTION字段的类型字段所指示的信息,类型字段指示随流检测为主动随流检测。仍然以IFIT随流检测为例,第一指示信息具体可以是扩展的OPTION字段的类型Type字段所指示的信息,或者第一,指示信息1也可以是扩展的OPTION字段 的预留Reserved字段或者其他字段的一个或多个比特位的值。以iOAM随流检测为例,第一指示信息具体可以是该扩展的OPTION字段的iOAM Type字段所指示的信息,或者,第一指示信息也可以是iOAM数据Data的一个或多个比特位的值。其中,第一报文头可以封装在IPv6报文头、VXLAN报文头、IPv4报文头或SRH中。
上述三个示例仅是本申请实施例中在第一检测报文中携带第一指示信息的示例性介绍,包括但不限于上述三种可能的实现方式,其他任何可以用于指示该随流检测为主动随流检测的信息均可以作为本申请实施例中的第一指示信息,任意可以携带该第一指示信息的报文头均可以作为本申请实施例中的第一报文头。
需要说明的是,该随流检测可以是IFIT随流检测,或者,也可以是iOAM随流检测,再或者,还可以是INT随流检测。任何随流检测协议均可以通过本申请实施例提供的方法进行扩展,支持本申请实施例提供的主动随流检测方法。
其中,本申请实施例提供的随流检测可以是端到端E2E主动随流检测,也可以是逐跳主动随流检测,具体可以根据随流检测的需求进行灵活设置。E2E主动随流检测,是指第一转发路径在检测域中的各节点,进行网络性能检测后将自身的测量结果发送给控制管理设备;逐跳随流检测,是指第一转发路径在检测域中的尾节点之外的其他节点,进行网络性能检测后将自身的测量结果携带在检测报文中发给下一跳节点,直至尾节点进行网络性能检测后获得自身的测量结果,将该第一转发路径在检测域中的各节点的测量结果一起发送给控制管理设备。由控制管理设备进行分析并对检测域的流量进行管理。
在一个可能的实现方式中,第一网络节点生成第一检测报文的具体过程可以包括:第一网络节点生成第一模拟业务报文;第一网络节点对第一模拟业务报文封装第一随流检测信息。
作为一个示例,该第一模拟业务报文可以为二层报文,该二层报文中包括虚拟局域网VLAN标识,VLAN标识用于标识用户设备所属的VLAN。本申请实施例还可以包括:第一网络节点接收第一真实业务报文,第一真实业务报文中携带和第一模拟业务报文中相同的所述VLAN标识;那么,第一网络节点沿着第一转发路径向尾节点转发第一真实业务报文。这样,对于专线业务,考虑到二层报文根据其所属的VLAN指导转发,所以,头节点生成的二层模拟业务报文中携带真实业务报文所携带的VLAN标识,模拟二层的真实业务报文进入头节点的入端口,使得模拟业务报文在检测域中按照和真实业务报文相同的转发路径传输,从而使得网络性能测量的测量结果为真实业务报文在该检测域的转发具有真实参考意义。对于专网业务,考虑到二层报文根据其所属的VLAN和目的MAC地址指导转发,所以,头节点生成的二层模拟业务报文中携带真实业务报文所携带的VLAN标识和目的MAC地址,模拟二层的真实业务报文进入头节点的入端口,使得模拟业务报文在检测域中按照和真实业务报文相同的转发路径传输,从而使得网络性能测量的测量结果为真实业务报文在该检测域的转发具有真实参考意义。
作为另一个示例,该第一模拟业务报文也可以为三层报文,该三层报文包括源互联网协议IP地址和目的IP地址,源IP地址为与第一网络节点用于接收第一真实业务报文的入接口相同网段的IP地址,目的IP地址为与尾节点向用户侧转发第一真实业务报文的出接 口相同网段的IP地址。本申请实施例还可以包括:第一网络节点通过入接口接收第一真实业务报文;第一网络节点沿着第一转发路径向尾节点转发第一真实业务报文。这样,考虑到三层报文根据源IP地址和目的IP地址指导转发,相同网段的源IP地址和相同网段的目的IP地址的报文转发路径一致,所以,头节点生成的三层模拟业务报文中携带的源IP地址和目的IP地址和真实业务报文所携带的源IP地址和目的IP地址所属的网段对应相同,使得模拟业务报文在检测域中按照和真实业务报文相同的转发路径传输,从而使得网络性能测量的测量结果为真实业务报文在该检测域的转发具有真实参考意义。
在另一些具体的实现方式中,本申请实施例还包括:第一网络节点生成第二检测报文,其中,第一检测报文和第二检测报文的协议号、传输控制协议TCP端口号或用户数据报协议UDP端口号中的至少一个不同,第二检测报文包括第二报文头和由第一网络节点生成的第二模拟业务报文,根据第二模拟业务报文所确定的第二检测报文在检测域中的第二转发路径用于模拟由用户设备发送的第二真实业务报文在检测域中的转发路径,第二报文头中包括第二随流检测信息,第二随流检测信息被第二转发路径中的节点用于对网络性能进行随流检测,第二随流检测信息包括第二指示信息,第二指示信息用于指示尾节点不再向其它节点转发第二检测报文;第一网络节点沿着第二转发路径向尾节点转发第二检测报文。
该实现方式中,本申请实施例还可以包括:第一网络节点接收用户设备发送的第二真实业务报文,其中,第二真实业务报文和第二检测报文所携带的协议号、TCP端口号或UDP端口号相同;第一网络节点沿着第二转发路径向尾节点转发第二真实业务报文。
这样,该实现方式中可以实现对检测域中头节点和尾节点均相同的多条转发路径进行检测,为需要经过不同转发路径传输的不同真实业务报文在网络中正常传输提供了数据支持,使得该网络性能检测机制能够适应更多的网络场景,实现检测域中更加完善的网络性能测量。
第二方面,本申请实施例还提供了一种一种基于随流检测对网络性能进行主动检测的方法,该方法应用在随流检测的检测域中,以该检测域的头节点之后的任意节点——第二网络节点为执行主体,该方法例如可以包括:检测域中的第二网络节点通过检测域中的第一转发路径接收检测域中的第一网络节点发送的第一检测报文,第一检测报文包括第一报文头和第一模拟业务报文,第一报文头中包括第一随流检测信息,第一随流检测信息包括指示信息,指示信息用于指示检测域中的尾节点不再向其它节点转发第一检测报文,第一模拟业务报文并非用户设备发送的真实业务报文,第一转发路径用于模拟用户设备发送的第一真实业务报文在检测域中的转发路径;第二网络节点根据第一随流检测信息,对网络性能进行随流检测。
作为一个示例,该第二网络节点可以为检测域中的尾节点,在第二网络节点对网络性能进行检测之后,该方法还可以包括:根据指示信息,第二网络节点不再向其他节点转发第一检测报文。
作为另一个示例,该第二网络节点也可以为检测域中的中间节点,该方法还可以包括:第二网络节点对第一检测报文进行更新,得到第二检测报文,第二检测报文包括第二随流检测信息,第二随流检测信息包括指示信息;第二网络节点沿着第一转发路径向尾节点转 发第二检测报文。
在一种可能的实现方式中,第一模拟业务报文可以为二层报文,该二层报文中包括虚拟局域网VLAN标识,VLAN标识用于标识用户设备所属的VLAN。那么,第一网络节点接收用户设备发送的第一真实业务报文,该第一真实业务报文中携带VLAN标识,第一网络节点可以沿着第一转发路径向尾节点转发第一真实业务报文。
在另一种可能的实现方式中,第一模拟业务报文为三层报文,该三层报文中包括源互联网协议IP地址和目的IP地址,源IP地址为检测域中的头节点用于接收用户设备发送的第一真实业务报文的入接口相同网段的IP地址,目的IP地址为尾节点向用户侧转发第一真实业务报文的出接口相同网段的IP地址。
可见,无论是二层报文还是三层报文的场景,本申请实施例均可以使得模拟业务报文在检测域中按照和真实业务报文相同的转发路径传输,从而使得网络性能测量的测量结果为真实业务报文在该检测域的转发具有真实参考意义。
其中,随流检测为IFIT随流检测或iOAM随流检测或INT随流检测。
其中,随流检测为端到端主动随流检测或逐跳主动随流检测。
需要说明的是,本申请实施例第二方面提供的方法,具体实现方式以及达到的效果可以参见上述第一方面所示实施例中的相关说明,此处不再赘述。
第三方面,本申请还提供了第一网络设备,包括收发单元和处理单元。其中,收发单元用于执行上述第一方面提供的方法中的收发操作;处理单元用于执行上述第一方面中除了收发操作以外的其他操作。例如:当所述第一网络设备执行所述第一方面所述的方法时,所述收发单元用于沿着所述第一转发路径向所述检测域中的尾节点发送所述第一检测报文;所述处理单元用于生成第一检测报文。
第四方面,本申请实施例还提供了第二网络设备,该第二网络设备包括收发单元和处理单元。其中,收发单元用于执行上述第二方面提供的方法中的收发操作;处理单元用于执行上述第二方面中除了收发操作以外的其他操作。例如:当所述第二网络设备执行所述第二方面所述的方法时,所述收发单元用于通过检测域中的第一转发路径接收检测域中的第一网络节点发送的第一检测报文;所述处理单元用于根据第一随流检测信息,对网络性能进行随流检测。
第五方面,本申请实施例还提供了一种第一网络设备,包括第一通信接口、第二通信接口和处理器。其中,第一通信接口用于执行前述第一方面提供的方法中的接收操作;第二通信接口用于执行前述第一方面提供的方法中的发送操作;处理器,用于执行前述第一方面提供的方法中除所述接收和发送操作以外的其他操作。
第六方面,本申请实施例还提供了一种第二网络设备,包括第一通信接口、第二通信接口和处理器。其中,第一通信接口用于执行前述第二方面提供的方法中的接收操作;第二通信接口用于执行前述第二方面提供的方法中的发送操作;处理器,用于执行前述第二方面提供的方法中除所述接收和发送操作以外的其他操作。
第七方面,本申请实施例还提供了一种第一网络设备,该第一设备包括存储器和处理器。其中,该存储器包括计算机可读指令;与该存储器通信的处理器用于执行所述计算机 可读指令,使得所述第一网络设备用于执行以上第一方面提供的方法。
第八方面,本申请实施例还提供了一种第二网络设备,该第二网络设备包括存储器和处理器。其中,该存储器包括计算机可读指令;与该存储器通信的处理器用于执行所述计算机可读指令,使得所述第二网络设备用于执行以上第二方面提供的方法。
第九方面,本申请实施例还提供了一种计算机可读存储介质,该计算机可读存储介质中存储有指令,当其在计算机上运行时,使得所述计算机执行以上第一方面或第二方面提供的所述的主动随流检测的方法。
第十方面,本申请实施例还提供了计算机程序产品,包括计算机程序或计算机可读指令,当所述计算机程序或所述计算机可读指令在计算机上运行时,使得计算机执行前述第一方面或第二方面提供的所述的主动随流检测的方法。
第十一方面,本申请实施例还提供了一种通信系统,该通信系统包括第三方面、第五方面或第七方面提供的所述的第一网络设备以及第四方面、第六方面或第八方面提供的第二网络设备。
附图说明
图1为本申请实施例中一种IFIT信息头结构的示意图;
图2为本申请实施例中一应用场景所涉及的网络系统框架示意图;
图3为本申请实施例中另一应用场景所涉及的网络系统框架示意图;
图4为本申请实施例中一种主动随流检测方法100的流程示意图;
图5a为本申请实施例中IFIT下检测报文1中扩展的OPTION字段的格式示意图;
图5b为本申请实施例中iOAM下检测报文1中扩展的OPTION字段的格式示意图;
图6为本申请实施例中一种主动随流检测方法200的流程示意图;
图7为本申请实施例中一场景下的主动随流检测方法的示意图;
图8为本申请实施例中一种主动随流检测方法400的流程示意图;
图9为本申请实施例中一种主动随流检测方法500的流程示意图;
图10为本申请实施例中一种第一网络设备1000的结构示意图;
图11为本申请实施例中一种第二网络设备1100的结构示意图;
图12为本申请实施例中一种第一网络设备1200的结构示意图;
图13为本申请实施例中一种第二网络设备1300的结构示意图;
图14为本申请实施例中一种第一网络设备1400的结构示意图;
图15为本申请实施例中一种第二网络设备1500的结构示意图;
图16为本申请实施例中一种通信系统1600的结构示意图。
具体实施方式
下面将结合附图,对本申请实施例中的技术方案进行描述。本申请实施例描述的网络架构以及业务场景是为了更加清楚的说明本申请实施例的技术方案,并不构成对于本申请实施例提供的技术方案的限定,本领域普通技术人员可知,随着网络架构的演变和新业务 场景的出现,本申请实施例提供的技术方案对于类似的技术问题,同样适用。
本申请中的“1”、“2”、“3”、“第一”、“第二”以及“第三”等序数词用于对多个对象进行区分,不用于限定多个对象的顺序。
本申请中提及的“A和/或B”,应该理解为包括以下情形:仅包括A,仅包括B,或者同时包括A和B。
本申请所涉及的基于iOAM的随流检测技术是指当数据报文在检测域中传输时,在数据报文中携带OAM信息。其中带内(英文:in-situ)是指OAM信息附加在数据报文中,而不是携带在专门的OAM报文中。
所涉及的基于IFIT的随流检测技术可以参见因特网工程任务组(英文:Internet Engineering Task Force,缩写:IETF)草案“In-situ Flow Information Telemetry draft-song-opsawg-ifit-framework-10”的相关说明,上述草案以全文引用的方式并入本申请中。
本申请所涉及的基于INT的随流检测技术可以参见IETF草案“Data-plane for in-band telemetry collection draft-lapukhov-dataplane-prove-01”的相关说明,上述草案以全文引用的方式并入本申请中。
需要说明的是,随着各种随流检测技术的发展,本申请所提及的随流检测技术包括随着技术发展的各种随流检测技术。
下面对于本申请涉及的一些技术术语做出简单解释说明。
客户:在本申请中,指用户设备。“用户设备”和“客户”可能经常交替使用,应理解,二者指代相同的含义。
随流检测:也可以称之为随路检测、随路遥测、随流测量或随路测量,是指随着业务流对网络性能进行检测。对网络性能检测例如可以包括对承载业务的业务通道以及相应的网元的网络性能进行检测。业务通道可以是业务流的转发路径,网络性能例如可以包括:传输时延,丢包率,抖动,误码率等。
模拟业务报文:本申请中模拟业务报文是指在网络中没有真实业务流量时,由随流检测域中的检测节点生成的用于模拟由用户设备发送的真实业务报文。该模拟业务报文在检测域中的转发路径与所述用户设备发送的真实业务报文的转发路径一致。检测域中的尾节点收到该模拟业务报文后,不会像网络中的其它节点转发该模拟业务报文。
真实业务报文:是指由用户设备发送的,在网络中传输的真实的业务流量。检测域中的尾节点接收到该真实业务报文时,需要向该真实业务报文的目的地址转发该报文。
下面以IFIT技术为例,对随流检测技术进行举例说明。
IFIT技术可以利用报文中携带的IFIT信息对网络中的业务流经过的节点进行特征标记,所述特征标记也可称之为染色。所述IFIT信息可以作为一个整体构成IFIT头,例如可以作为多协议标签交换(英文:Multi-Protocol Label Switching,简称:MPLS)协议等的扩展头;或者,所述IFIT信息也可以按照字段信息等分散包括在例如网际协议(英文:Internet Protocol,IP)头中。所述业务流经过的每跳节点将收集到的时间戳、包数等数据上报给网络管理设备,以供所述网络管理设备基于上报的数据进一步计算网络时延、丢包情 况和还原路径等。在点到点流传输业务场景下,一种可能的用于MPLS协议网络的IFIT信息头结构如图1所示,这里就所述IFIT头结构中的关键字段进行描述。
1.流指令指示符字段(英文:Flow Instruction Indicator,简称:FII)。该字段主要用于标识此后的数据信息为IFIT信息。例如可以包括以下字段信息:
流指令指示符标签(英文:FII Label),可配置缺省值以用于标识IFIT检测流;
S标志位,用于标记是否为栈底,例如取值为1为栈底,取值为0为非栈底;
可以继承外层MPLS标签头中的部分相关信息,如优先级EXP和生存时间(英文:Time To Live,简称:TTL)等。
2.流指令头部字段(英文:Flow Instruction Header,简称:FIH),也可以称之为随流检测头或流检测头。该字段主要用于携带IFIT检测相关的信息。例如可以包括以下字段信息:
流标识(英文:Flow ID),为每条IFIT检测流量分配的全局唯一标识;
L标志位,丢包(英文:packet loss)检测染色标记,例如:L标志位取值为“1”表示采集丢包,“0”表示不采集丢包。
D标志位,时延(英文:delay)测量染色标记,例如:D标志位取值为“1”表示采集时间戳,“0”表示不采集时间戳。
头类型指示符(英文:Header Type Indicator,简称:HTI),标记需发送IFIT检测结果的节点范围和检测内容范围,例如:可以用不同的标记值区分除检测两端节点外,是否对具备IFIT能力的路径节点进行检测,以及是否包括流指令扩展头字段(英文:Flow Instruction Extension Header,简称:FIEH)等。
R标志位可以作为保留标志位。
3.流指令扩展头字段FIEH,也可以称之为流扩展检测头或者扩展随流检测头。该字段作为扩展字段,主要用于携带其他IFIT检测相关的信息。例如可以包括以下字段信息:
流标识扩展Flow ID Ext,用于扩展流标识位宽;
V标志位,用于作反向流(英文:reverse flow)标记,例如:V标志位取值为“0”表示当前流为正向流,接收端可自动创建反向流;“1”表示当前流为反向流,接收端不再自动创建反向流;
周期(英文:Period),取值不同表示检测周期不同,检测周期例如可以为1s、10s、30s、1min或10min等。
通常情况下,检测域中的头节点收到用户设备发送的报文后,在该报文中封装IFIT信息(即随流检测信息),以指示检测域中的网络节点执行IFIT检测。所述报文的类型例如可以是数据报文,也可以是控制报文等。在实际应用场景中,多个数据报文或控制报文可以是连续发送的,例如多个数据报文可以构成一条数据流;或者,多个数据报文或控制报文在一定周期内是间隔发送的,例如操作维护管理(英文:Operation,Administration and Maintenance,简称:OAM)控制报文等。
在一个网络中可以通过指定检测域确定需要执行IFIT检测的网络范围,通常所述检测域中的网络节点需要传输IFIT信息以实现IFIT检测,并将执行所述IFIT检测后获取的相 应信息发送至网络管理设备。所述检测域的检测范围可以基于多种方式确定,例如,可以基于网络场景确定,如指定网络中的核心网部分作为所述检测域;或者,可以基于业务类型确定,如为视频业务和语音业务指定不同范围的检测域等。IFIT网络中包括三类节点,具体为头节点(英文:head node)、尾节点(英文:end node)和逐跳的路径节点(英文:path node)。其中,逐跳的路径节点也可以称之为中间节点。所述头节点、尾节点和路径节点例如可以是网络中的相应网络节点。对于一条数据流而言,在所述检测域指定的检测范围内传输所述数据流的第一个网络节点,可以作为传输所述数据流的头节点。在所述检测域指定的检测范围内传输所述数据流的最后一个网络节点,可以作为传输所述数据流的尾节点。在所述头节点和所述尾节点之间传输所述数据流的各个节点即为逐跳的路径节点。IFIT信息可以由头节点添加,并在尾节点剥离。
在本申请中所述的检测域是指执行随流检测应用的网络域。具体来说,检测域中包括多个使能了随流检测功能的转发设备,例如路由器或交换机。该检测域中还可以包括控制管理设备,例如逻辑的集中控制器,用于对检测域中的多个转发设备进行随流检测的配置,并采集和分析多个转发设备上报的随流检测数据。
结合上文介绍的随流检测技术,对本申请中所述的主动随流检测技术进行介绍。
主动随流检测,是指基于上文中介绍的随流检测技术,在检测域中的头节点没有收到用户设备发送的真实业务流量时,由头节点主动生成检测流量,并在检测流量中封装随流检测信息。例如,如果是基于IFIT随流检测,则在检测报文中携带IFIT随流检测信息。头节点沿着所述检测报文的转发路径向尾节点发送检测报文,检测域中该转发路径上的节点可以基于接收到的检测报文,对网络性能进行测量。在本申请中,主动随流检测,对传统的被动的随流检测进行了扩展,使得随流检测协议支持主动检测能力,可以在无真实业务流量的场景中,实现对网络性能的高精度检测。本申请中,根据主动随流检测的测量结果可以判断该转发路径是否满足业务承载需求。由此,基于同一个随流检测协议,就可以覆盖有真实业务流量的场景以及缺少真实业务流量的场景。相当于使用带外测量协议,测量无真实业务流量的网络性能检测,并基于带内随流检测测试真实流量的网络性能的技术方案,本申请提供的方案仅需要一套测量协议,配置简单,兼容多种网络场景。
图2是本申请实施例提供的一种网络架构示意图。网络100包括控制管理设备和多个网络节点。所述多个网络节点之间通过通信链路连接,用于传输数据流。如图2所示,检测域中的头节点、中间节点1、中间节点2、尾节点通过通信链路连接。检测域中除了包括图示所述的各节点外,还可以包括其他未示出的节点。尾节点还可以通过通信链路和外部节连接。用户设备发送的数据流可以沿着转发路径1,经由头节点、中间节点1、中间节点2和尾节点,到达外部节点。控制管理设备例如可以是集中控制器,可以是网管,也可以是执行流量分析功能的流量分析设备。控制管理设备可以是一个设备,也可以是指多个设备的集合。
控制管理设备可以用于对上述多个网络节点之间的传输路径上的数据报文进行信息的采集和传输路径性能检测,所述传输路径性能检测包括但不限于传输时延、丢包率和丢包定位的检测。在本申请的实施例中,传输路径可以包括数据流流经的路径。在本申请中, 可以由控制管理设备确定检测域,所述检测域是所述控制管理设备确定的检测范围;也可以是在检测域中的各转发设备上分别进行配置,从而形成一个检测域。在所述检测域中的传输路径上,位于检测域的头节点和尾节点之间的网络节点是中间节点,例如图2中的中间节点1和中间节点2。
图3示出了本申请提供的另一种网络架构示意图,图3所示的网络200与图2所示的网络100的主要区别在于,在头节点和尾节点之间存在多条传输路径。一个具体的实施方式中,该多条传输路径至少包括图3所示的转发路径1和转发路径2。用户设备发送的数据流,可以沿着转发路径1,经由头节点、中间节点1、中间节点2和尾节点到达外部节点;也可以沿着转发路径2,经由检测域中的头节点、中间节点3、中间节点4和尾节点到达外部节点。在一种可能的实现方式中,转发路径1可以是工作路径,转发路径2可以是保护路径,当转发路径1发生故障时,由转发路径2承载业务流量。在另一种可能的实现方式中,转发路径1和转发路径2可以是等价路径,头节点接收到用户设备发送的业务流时,基于哈希计算,选择转发路径1承载业务流量。
应理解,图2或图3中仅示例性的示出检测域中包括的4个节点,该检测域可以包括任意其它数量的节点,本申请实施例对此不做限定。图2或图3中所示的网络架构仅是举例说明,本申请提供的随流检测的应用场景不限于图2或图3所示的场景。本申请提供的技术方案适用于所有应用随流检测技术进行数据传输的网络场景。
在图2或图3所示的场景中,当检测域中所示的各节点设备开通,头节点至尾节点之间的业务通道配置完成,希望对业务通道进行性能检测,从而判断业务通道是否满足业务承载需求时,如对时延,带宽、丢包率等指标的要求;再比如,在图3所示的场景中,转发路径2作为保护路径,通常不会承载真实的业务流量,希望对转发路径2的性能指标进行测量,确定保护路径能否满足业务承载需求,以便在工作通道故障时,可以将流量倒换到满足业务承载需求的保护路径中;面对上述两种可能的具体网络应用场景,基于目前的随流检测技术,无法完成性能检测。而如果结合带外流量测量方法来进行测量,又会使协议配置非常复杂。
有鉴于此,为了解决上述问题,本申请提供了一种主动随流检测的方法100,通过对随流检测协议进行扩展,使其支持主动检测能力,使得在无真实业务流量的网络场景中,也能基于随流检测技术对网络性能进行随流测量。下面结合图4,以图3所示的场景为例,对本申请所述的主动随流检测方法100进行简单介绍。
图4所示为本申请实施例提供的一种主动随流检测方法100,该方法100例如可以包括下述S101~S110:
S101,检测域中的头节点生成检测报文1,检测报文1包括报文头1和由该头节点生成的模拟业务报文1,报文头1中包括随流检测信息1。
需要说明的是,本申请实施例中的方法100所应用的网络中,可以配置任意一种扩展的随流检测协议,支持该方法100中S101~S110的执行。其中,随流检测协议例如可以是IFIT协议、IOAM协议或INT协议中的任意一种,那么,本申请实施例中头节点、中间节点1、中间节点2和尾节点执行的随流检测与配置的协议一致,即,执行的随流检测为 IFIT随流检测、IOAM随流检测或INT随流检测的任意一种。
在本申请实施例中,检测域的头节点上具有能够生成检测报文的功能模块,可以称为发包器,当需要对检测域中的转发路径1进行网络性能检测,但该网络的转发路径1上目前没有真实报文在传输时,该转发路径1在检测域的头节点可以生成检测报文1,用于实现该主动随流检测方法100,对该转发路径1上各个节点以及所包括的链路进行网络性能测量。
在一个具体的实现方式中,头节点生成检测报文1的过程具体可以包括:S11,头节点生成模拟业务报文1;S12,头节点对模拟业务报文1封装包括随流检测信息1的报文头1,得到检测报文1。
根据不同的网络环境,生成的检测报文1不同,而报文头1根据检测报文1的报文类型,适应性的进行封装,例如:对于第四版互联网协议(英文:Internet Protocol version 4,简称:IPv4)网络环境,检测报文1为IPv4报文,报文头1可以封装在IPv4报文的选项OPTION字段中;又例如:对于第六版互联网协议(英文:Internet Protocol version 6,简称:IPv6)网络环境,检测报文1为IPv6报文,报文头1可以封装在IPv6报文头(如:逐跳(英文:Hop By Hop)头)中;还例如:对于基于IPv6的段路由(英文:Segment Routing IPv6,简称:SRv6)网络环境,检测报文1为SRv6报文,报文头1可以封装在SRv6报文的SRv6扩展头(英文:Segment Routing Header,简称:SRH)中;再例如:对于MPLS网络环境,报文头1可以封装在MPLS报文头中。需要说明的是,本领域技术人员可以基于现有的技术常识对本申请实施例的报文头1进行具体的封装,生成对应的检测报文1。
其中,S11中所生成的模拟业务报文1并不是用户设备发送给头节点的真实业务报文,而是头节点模拟用户设备可能沿转发路径1发送的真实业务报文1,生成在该检测域中也沿着转发路径1传输的一个模拟报文。对于S12中的报文头1,是头节点在生成模拟业务报文1后,为了生成检测报文1,在该模拟业务报文1上封装的报文头,该报文头1中的随流检测信息1用于指示转发路径1上的各节点对网络性能进行随流检测。此外,该随流检测信息1还包括指示信息1,该指示信息1用于指示该转发路径1在检测域的尾节点处不再向其它节点转发检测报文1,这样,可以有效防止尾节点将检测报文作为真实业务报文,从该尾节点发送到检测域之外的节点上,从而引起影响向用户提供的业务。
对于模拟业务报文1,可以是二层报文,也可以是三层报文。头节点具体生成的是二层的模拟业务报文1还是三层的模拟业务报文1,可以基于真实业务报文1是二层报文还是三层报文确定,具体而言,如果头节点沿着转发路径1传输的真实业务报文1为二层报文,则,生成的模拟业务报文1可以是二层报文;如果头节点沿着转发路径1传输的真实业务报文1为三层报文,则,生成的模拟业务报文1可以是三层报文。
作为一个示例,模拟业务报文1和真实业务报文1均为二层报文,真实业务报文1中携带虚拟局域网(英文:Virtual Local Area Network,简称:VLAN)标识,其中,VLAN标识用于标识用户设备所属的VLAN,而该真实业务报文1可以从端口1进入到头节点,即,该端口1为头节点用于接收真实业务报文1的入端口;那么,头节点模拟真实业务报文1生成的模拟业务报文1中,可以包括该VLAN标识,还可以包括该端口1对应的端口 号,该端口号用于指示端口1,这样,可以确保头节点基于模拟业务报文1生成的检测报文1在检测域中也沿着转发路径1传输。
例如:对于专线业务,各节点中包括的转发表包括该节点上入端口、VLAN标识和该节点上出端口三者之间的对应关系,真实业务报文基于其所属的VLAN进行转发,那么,对于携带VLAN标识1的真实业务报文1,那么,当头节点从入端口11接收到该真实业务报文1后,通过解析获得该真实业务报文1中携带的VLAN标识1,从而基于该入端口11、VLAN标识1,确定出端口12,并从出端口12将真实业务报文1转发到下一跳节点(即,中间节点1)。由于各个节点上的转发表不变,那么,为了模拟该真实业务报文1在检测域中的转发路径1,需要生成的模拟业务报文1中携带与真实业务报文1相同的VLAN标识,即,模拟业务报文1中携带VLAN标识1,而且,头节点需要模拟配置该模拟业务报文1从入端口11(即,真实业务报文1的入端口)接收上来的,如:通过配置命令告知负责转发报文的转发器,该模拟业务报文1的入端口为端口11,或者,又如:还在模拟业务报文1中携带用于标识入端口11的端口号,但需要在转发到下一跳节点之前从模拟业务报文1中删除该端口号。这样,当头节点生成模拟从入端口11接收到该模拟业务报文1后,通过解析获得该模拟业务报文1中携带的VLAN标识1,从而基于该入端口11、VLAN标识1,确定出端口12,并从出端口12将模拟业务报文1转发到下一跳节点(即,中间节点1),而且,由于之后各个节点上的转发表一致,确保该模拟业务报文1可以沿着真实业务报文在检测域的转发路径1进行转发。
又例如:对于专网业务,各节点中包括的转发表包括该节点上入端口、VLAN标识、目的节点的源媒体存取控制(英文:Media Access Control Address,简称:MAC)地址(下称目的MAC地址)和该节点上出端口四者之间的对应关系,真实业务报文基于其所属的VLAN和目的MAC地址进行转发,那么,对于携带VLAN标识1和目的MAC地址1的真实业务报文1,那么,当头节点从入端口11接收到该真实业务报文1后,通过解析获得该真实业务报文1中携带的VLAN标识1和目的MAC地址1,从而基于该入端口11、VLAN标识1和目的MAC地址1,确定出端口12,并从出端口12将真实业务报文1转发到下一跳节点(即,中间节点1)。由于各个节点上的转发表不变,那么,为了模拟该真实业务报文1在检测域中的转发路径1,需要生成的模拟业务报文1中携带与真实业务报文1相同的VLAN标识和目的MAC地址,即,模拟业务报文1中携带VLAN标识1和目的MAC地址1,而且,头节点需要模拟配置该模拟业务报文1从入端口11(即,真实业务报文1的入端口)接收上来的,如:通过配置命令告知负责转发报文的转发器,该模拟业务报文1的入端口为端口11,或者,又如:还在模拟业务报文1中携带用于标识端口11的端口号,但需要在转发到下一跳节点之前从模拟业务报文1中删除该端口号。这样,当头节点生成模拟从入端口11接收到该模拟业务报文1后,通过解析获得该模拟业务报文1中携带的VLAN标识1和目的MAC地址1,从而基于该入端口11、VLAN标识1和目的MAC地址1,确定出端口12,并从出端口12将模拟业务报文1转发到下一跳节点(即,中间节点1),而且,由于之后各个节点上的转发表一致,确保该模拟业务报文1可以沿着真实业务报文在检测域的转发路径1进行转发。
此外,在包括模拟业务报文1的检测报文1中,还可以携带的源MAC地址、目的MAC地址、源互联网协议(英文:Internet Protocol,简称:IP)地址和目的IP地址,其中,源MAC地址可以是除了转发路径1上各节点以外的其他任意节点的MAC地址或者除了转发路径1上各节点以外的其他任意节点上接口的MAC地址;对于专线业务的目的MAC地址,可以是除了转发路径1上各节点以外的其他任意节点的MAC地址或者是除了转发路径1上各节点以外的其他任意节点上接口的MAC地址,对于专网业务的目的MAC地址,可以是真实业务报文1的目的MAC地址;源IP地址和目的IP地址可以是任意的单播IP地址。
在执行该方法100之前,或者,在执行完该方法100后,头节点还可以从入端口(即端口1)接收真实业务报文1,该真实业务报文1中携带所述VLAN标识,或者,该真实业务报文1中携带所述VLAN标识和目的MAC地址,那么,头节点可以基于其上保存的转发表,确定出端口,以此类推,各跳节点均如此,确定出该真实业务报文1在检测域的转发路径1依次经过头节点、中间节点1、中间节点2和尾节点,即,头节点沿着转发路径1向尾节点转发该真实业务报文1。如此,即使采用的是非真实业务报文完成随流检测,但是由于检测报文模拟了真实业务报文在检测域中的转发路径,所以,该随流检测方法能够完全真实的实现对检测域中真实业务报文传输所历经转发路径的网络性能的测量。
作为另一个示例,模拟业务报文1和真实业务报文1均为三层报文,由于真实业务报文1中携带源IP地址和目的IP地址,其中,已知在检测域中,头节点接收真实业务报文1的入接口11的IP地址为IP地址11,尾节点向用户侧转发真实业务报文1的出接口12的IP地址为IP地址12;基于源IP地址和目的IP地址确定该真实业务报文1在网络中的转发路径中,包括基于IP地址11所属的网段和IP地址12所属的网段确定的转发路径1。那么,考虑到如果2个报文中携带的源IP地址属于相同网段且目的IP地址也属于相同网段,那么,可以为这2个报文在两个节点之间确定出的转发路径一定相同,基于此,为了使得头节点生成的模拟业务报文1在检测域中也经过转发路径1传输,生成的模拟业务报文1中也可以包括源IP地址3和目的IP地址4,其中,所述源IP地址3与IP地址11属于相同的网段,所述目的IP地址4与IP地址12属于相同的网段,这样,可以确保头节点基于模拟业务报文1生成的检测报文1在检测域中也沿着转发路径1传输。
在执行该方法100之前,或者,在执行完该方法100后,头节点还可以从入接口(即入接口1)接收真实业务报文1;并且,头节点沿着转发路径1向尾节点转发该真实业务报文1,如果该尾节点不是该真实业务报文1的目的节点,那么,尾节点从其上出接口2向其他节点转发该真实业务报文1,直至将该真实业务报文1转发至用户侧设备,其中,用户侧设备例如可以是指真实业务报文1的目的IP地址所对应的设备,通过该设备接收到真实业务报文1实现为用户提供对应的业务服务。如此,即使采用的是非真实业务报文完成随流检测,但是由于检测报文模拟了真实业务报文在检测域中的转发路径,所以,该随流检测方法能够完全真实的实现对检测域中真实业务报文传输所历经转发路径的网络性能的测量。
例如:对于图3所示的网络中,假设图3所示的网络为三层网络,那么,头节点检测 转发路径1的网络性能时,生成的模拟业务报文1中可以携带源IP地址3和目的IP地址4,其中,源IP地址3可以取与头节点接收真实业务报文1的入接口11的IP地址11属于相同网段的任意IP地址,目的IP地址4可以取与尾节点发出真实业务报文1的出接口12的IP地址12属于相同网段的任意IP地址。此外,在包括模拟业务报文1的检测报文1中,还可以携带源MAC地址和目的MAC地址,其中,源MAC地址可以是除了头节点的入接口1对应的MAC地址以外的其他任意单播MAC地址,目的MAC地址可以是头节点上入接口1对应的MAC地址,需要说明的是,当该检测报文1从头节点转发到中间节点1之前,需要将源MAC地址替换为其在头节点的出接口对应的MAC地址,目的MAC地址替换为中间节点1上入接口对应的MAC地址,以支持三层报文的正常转发。
需要说明的是,对于三层的模拟业务报文1,生成的检测报文1具体可以IPv4或IPv6报文。
在本申请实施例中,为了不影响该网络中为用户提供高质量的业务服务,需要将检测报文1限定在检测域内转发,不得从转发路径1的尾节点向检测域外的其他节点转发,基于此,在头节点生成的检测报文1中,随流检测信息1不仅指示接收该检测报文1的各节点进行随流检测,还携带指示信息1,用于指示转发路径1在检测域的尾节点不再向其它节点转发检测报文1。
对于指示信息1,根据网络环境的不同,具体可以对应不同的内容。指示信息1例如可以是对报文头1的随流检测头1中保留字段进行扩展,如增加至少一个比特位,该至少一个比特位所指示的信息为指示信息1;又例如还可以是在报文头1的随流检测头1中其它字段增加一个标识来指示所述指示信息1;再例如还可以是对报文头1的随流检测头1的类型进行扩展后的类型信息。该指示信息1可以是一个或多个比特,本申请不作具体限制。下面示例性介绍部分指示信息1的具体实现方式:
作为一个示例,对于MPLS协议网络,报文头1可以是随流检测头1,指示信息1可以携带在该随流检测头1中的预设字段或标志位的取值。例如:指示信息1可以是随流检测头1中包括的至少一个比特位所指示的信息。以IFIT检测为例,参见图1,随流检测头1可以是图1的流指令头部字段FIH,指示信息1例如可以是该FIH中的R标志位的值,作为一个例子,当R标志位取值为0,可以指示该检测报文1为被动随流检测;反之,当R标志位取值为1,可以指示该检测报文1为主动随流检测。又例如:指示信息1还可以是随流检测头1中预设字段的取值。仍然以IFIT检测为例,参见图1,指示信息1具体可以是头类型指示符HTI所指示的信息,该HIT的值能够指示该随流检测头1中是否包括流指令扩展头字段FIEH或者包括FIEH的类型,具体而言,当HIT的取值指示该随流检测头1中不包括FIEH,或者包括FIEH且类型为被动随流检测的FIEH时,则确定该检测报文1为被动随流检测;反之,当HIT的取值指示该随流检测头1中包括FIEH且类型为主动随流检测的FIEH时,则确定该检测报文1为主动随流检测。
作为又一个示例,仍然对于MPLS协议网络,报文头1包括扩展随流检测头1,指示信息1可以携带在该扩展随流检测头1中,具体可以是扩展随流检测头1的类型字段所指示的信息。以IFIT检测为例,参见图1,扩展随流检测头1可以是图1所示的FIEH,那 么,指示信息1例如可以是该FIEH中类型字段的值,该FIEH中类型字段的值用于指示该随流检测为主动随流检测或被动随流检测;或者,该指示信息1也可以是该FIEH中任意可以用作指示的预设字段或标志位的取值。
作为再一个示例,对于IPv4或IPv6协议网络,报文头1中包括选项OPTION字段,在该OPTION字段中可以携带指示信息1,具体可以是OPTION字段的类型字段所指示的信息或者该OPTION字段中包括的至少一个比特位所指示的信息。以IFIT为例,参见图5a,为检测报文1中扩展的OPTION字段的格式,指示信息1具体可以是该扩展的OPTION字段的类型Type字段所指示的信息,或者,指示信息1也可以是预留Reserved字段或者其他字段的一个或多个比特位的值。以iOAM检测为例,参见图5b,为检测报文1中扩展的OPTION字段的格式,指示信息1具体可以是该扩展的OPTION字段的iOAM Type字段所指示的信息,或者,指示信息1也可以是iOAM数据Data的一个或多个比特位的值。其中,对于iOAM检测,iOAM的报文头1具体可以封装在IPv6报文头、虚拟扩展局域网(英文:Virtual Extensible Local Area Network,简称:VXLAN)报文头或IPv4报文头中。对于SRv6协议网络,该iOAM的报文头1也可以封装在SRH中。
需要说明的是,本申请所涉及的随流检测技术的相关描述,具体可以参见下述IETF草案“IPv6 Application of the Alternate Marking Method draft-fz-6man-ipv6-alt-mark-01”、“In-situ OAM IPv6 Options draft-ioametal-ippm-6man-ioam-ipv6-options-02”以及“VXLAN-GPE Encapsulation for In-situ OAM Data draft-brockners-ippm-ioam-vxlan-gpe-03”的相关说明,上述草案以全文引用的方式并入本申请中。
在一些具体的实现方式中,当检测域的头节点生成检测报文1后,头节点可以根据检测报文1中的随流检测信息1,对网络性能进行测量,获得的测量结果0。
作为一个示例,头节点的结构具体可以参见图7所示实施例的网络架构中的头节点10,该头节点10除了包括用于生成检测报文的发包器101以外,还具有转发器102,该转发器102中具有用于实现随流检测的测量模块1021。那么,该头节点根据检测报文1中的随流检测信息1对网络性能进行测量的过程可以包括:S21,头节点10将发包器101生成的检测报文1传输至转发器102;S22,转发器102识别接收到的检测报文1为主动随流检测的报文,则,由测量模块1021基于检测报文1中的随流检测信息1进行网络性能的测量,获得测量结果0,该测量结果0例如可以包括报文计数、时间戳等,用于体现头节点10以及与头节点10相连的链路的网络性能。
需要说明的是,随流检测信息1中不仅能够表征该随流检测为主动随流检测还是被动随流检测,还包括能够体现该随流检测为端到端(英文:Edge to Edge,简称:E2E)随流检测还是逐跳随流检测的标识信息2。一种情况下,该标识信息2可以是指示信息1,即,指示信息1可以指示该检测报文1为:E2E主动随流检测或者逐跳主动随流检测。该情况下,参见图1所示的MPLS网络环境,指示信息1例如可以是HTI字段所指示的信息,可以定义:HTI=0时指示保留,HTI=1时指示该报文头1为基本的E2E FIH(即不包括FIEH),HTI=2时指示该报文头1为普通的逐跳FIH,HTI=3时指示该报文头1中包括E2E的FIEH(即被动随流检测的FIEH类型),HTI=4时指示该报文头1中包括逐跳的FIEH; 可以在上述定义的基础上,新增扩展HTI类型定义,即,可以定义HTI=5时指示该报文头1中包括E2E主动检测FIEH,HTI=6时指示该报文头1中包括逐跳主动检测FIEH。另一种情况下,该标识信息2也可以是指示信息1之外的其他信息,用于单独标识该检测报文1采用的E2E还是逐跳的检测机制。
可以理解的是,逐跳主动随流检测中,要求转发路径1上的各节点进行网络性能测量后,各自将获得的测量结果发送至控制管理设备;E2E主动随流检测中,要求转发路径1上的各节点进行网络性能测量后,分别将获得的测量结果携带在检测报文中向下一跳发送,直至尾节点获得对应的测量结果后,将自己的测量结果以及检测报文中携带的各跳节点对应的测量结果发送至控制管理设备。对于S101,当头节点识别出生成的检测报文1对应的是逐跳主动随流检测,则,需要将获得的测量结果0发送给控制管理设备,并执行下述S102;当头节点识别出生成的检测报文1对应的是E2E主动随流检测,则,可以将获得的测量结果0携带在检测报文1中,作为S102中的检测报文1继续执行该方法100。
S102,头节点沿着转发路径1向中间节点1发送该检测报文1。
当检测域的头节点生成检测报文1后,头节点不仅可以基于检测报文1中的随流检测信息1,对网络性能进行测量,获得的测量结果0;还可以沿着转发路径1向中间节点1发送该检测报文1,以便中间节点1基于检测报文1中的随流检测信息1,对网络性能进行测量。
作为一个示例,仍然参见图7所示实施例的网络架构,头节点10基于确定的转发路径1,确定下一跳为中间节点11,那么,该头节点的转发器102可以将该检测报文1转发至中间节点11的转发器112。
S103,中间节点1根据检测报文1中的随流检测信息1,对网络性能进行随流检测。
在一些具体的实现方式中,当中间节点1接收到检测报文1后,中间节点1可以根据检测报文1中的随流检测信息1,对网络性能进行测量,获得的测量结果1。
作为一个示例,若中间节点1参见图7所示实施例的网络架构中的中间节点11,该中间节点11具有转发器112,该转发器112中具有用于实现随流检测的测量模块1121。那么,该中间节点根据检测报文1中的随流检测信息1对网络性能进行测量的过程可以包括:S31,中间节点11将接收的检测报文1传输至转发器112;S32,转发器112识别接收到的检测报文1为主动随流检测的报文,则,由测量模块1121基于检测报文1中的随流检测信息1进行网络性能的测量,获得测量结果1,该测量结果1用于体现中间节点11以及与中间节点11相连的链路的网络性能。
S104,中间节点1对检测报文1进行更新,得到检测报文1’,该检测报文1’包括随流检测信息1’。
当中间节点1识别出接收到的检测报文1对应的是逐跳主动随流检测,则,需要将获得的测量结果1发送给控制管理设备;当中间节点1识别出接收到的检测报文1对应的是E2E主动随流检测,则,可以将获得的测量结果1携带在检测报文1中。
具体实现时,中间节点1识别出自己并不是转发路径1在检测域的尾节点,则,更新检测报文1为检测报文1’,该检测报文1’中包括随流检测信息1’,随流检测信息1’中 仍然包括指示信息1。此外,当该随流检测为E2E主动随流检测,则,检测报文1’中还包括测量结果0和测量结果1;当随流检测为逐跳主动随流检测,则,检测报文1’中可以不包括测量结果0和测量结果1。
S105,中间节点1沿着转发路径1向中间节点2发送该检测报文1’。
S106,中间节点2根据检测报文1’中的随流检测信息1’,对网络性能进行随流检测。
S107,中间节点2对检测报文1’进行更新,得到检测报文1”,该检测报文1”包括随流检测信息1”。
S108,中间节点2沿着转发路径1向该检测域的尾节点发送该检测报文1”。
需要说明的是,S105、S108的相关概念描述、具体实现以及达到的效果,具体可以参见S102;S106的相关概念描述、具体实现以及达到的效果,具体可以参见S103;S107的相关概念描述、具体实现以及达到的效果,具体可以参见S104。
其中,中间节点2接收到检测报文1’后,中间节点2可以根据检测报文1’中的随流检测信息1’,对网络性能进行测量,获得的测量结果2。
S109,尾节点根据检测报文1”中的随流检测信息1”,对网络性能进行随流检测。
在一些具体的实现方式中,当检测域的尾节点生成检测报文1”后,尾节点可以根据检测报文1”中的随流检测信息1”,对网络性能进行测量,获得的测量结果3。
作为一个示例,尾节点的结构具体可以参见图7所示实施例的网络架构中的尾节点13,该尾节点13除了具有转发器132,还包括用于收集检测报文的收包器131;其中,该转发器132中具有用于实现随流检测的测量模块1321。那么,该尾节点根据检测报文1”中的随流检测信息1”对网络性能进行测量的过程可以包括:S41,尾节点13将接收的检测报文1”传输至转发器132;S42,转发器132识别接收到的检测报文1”为主动随流检测的报文,则,由测量模块1321基于检测报文1”中的随流检测信息1”进行网络性能的测量,获得测量结果3。
S110,尾节点根据检测报文1”中随流检测信息1”所包括的指示信息1,确定不再向其他节点转发该检测报文1”。
在S109之后,为了不让专用于检测的检测报文不流出检测域从而影响提供给用户的业务服务,检测报文1”的随流检测信息1”中携带有指示信息1,用于指示检测域中的尾节点不再向其它节点转发该检测报文1”,那么,在S41~S42对应的例子中,S42之后还可以包括:S43,尾节点13解析检测报文1”获得指示信息1,并确定自身为转发路径1在检测域的尾节点,则,尾节点13可以将检测报文1”进行终结,防止流量发送到检测域之外的网络中。尾节点13终结检测报文1”的实现方式可以是:尾节点13直接将检测报文1”删除;或者,尾节点13终结检测报文1”的实现方式也可以是:尾节点13的转发器132可以将检测报文1”发送给收包器131,由收包器131对检测报文1”进行保存或者删除操作,由于收包器131为该尾节点13内部的模块,不具有和其他节点通信的接口,所以,也可以避免尾节点13将检测报文1”向其他节点继续转发带来的问题。
可见,基于本申请实施例过提供的主动随流检测方法100,通过对目前的随流检测协 议进行扩展,即使在无真实业务流量的网络场景中,检测域的头节点能够自主的生成用于随流检测的检测报文,使得基于随流检测技术对网络性能进行随流测量成为可能。这样,本申请实施例提供的方法相当于提供了一种新的随流检测机制,仅仅需要配置一种扩展的随流检测协议,就既能够完成主动随流检测又能够进行被动随流检测,能够覆盖网络性能检测的各种场景,为网络性能检测提供了便利。而且,该方法100中在采用主动随流检测技术时,头节点生成的检测报文中还需要携带指示信息,用于告知尾节点其接收到的是专门用于网络性能测量的检测报文,指示尾节点不再向其他节点转发该转发报文,如此,使得专门用于测量而非真实业务报文的检测报文被尾节点终结,不会被尾节点转发至检测域以外的其他节点,从而避免了影响为用户提供的真实业务的问题,使得该网络性能检测机制更加智能。
需要说明的是,当控制管理设备经过分析,确定对检测域中转发路径1的网络性能检测通过,则,允许真实业务报文通过该转发路径1进行传输。具体实现时,当头节点接收到真实业务报文1时,确定该真实业务报文1的转发路径为转发路径1,则,将该真实业务报文1通过中间节点1、中间节点2和尾节点,转发出该检测域,并从尾节点转发至该检测域外的其他节点,直至传输至该真实业务报文1的目的节点。
针对从头节点到尾节点具有多条路径待进行网络性能检测的情况,头节点可以基于待检测的转发路径的不同,生成不同的检测报文,分别对不同的待检测转发路径进行网络性能测量,两者的测量过程基本相同且相互独立。
仍然以图3所示的网络场景200为例,本申请还提供了一种主动随流检测方法200,如图6所示,方法200除了执行上述方法100中的S101~S110对转发路径1进行测量之外,还可以包括下述S201~S210,用于对转发路径2进行测量:
S201,检测域中的头节点生成检测报文2,检测报文2包括报文头2和由该头节点生成的模拟业务报文2,报文头2中包括随流检测信息2。
其中,模拟业务报文2与模拟业务报文1类似,也不是用户设备发送的真实业务报文,根据模拟业务报文2所确定的检测报文2在该检测域中的转发路径2用于模拟由用户设备发送的真实业务报文2在该检测域中的转发路径,报文头2中包括随流检测信息2,该随流检测信息2被转发路径2上的节点用于对网络性能进行随流检测,随流检测信息2包括指示信息2,该指示信息2用于指示该检测域中的尾节点不再向其它节点转发检测报文2。
需要说明的是,模拟业务报文2与模拟业务报文1具有不同的协议号、不同的传输控制协议(英文:Transmission Control Protocol,简称:TCP)端口号、不同的用户数据报协议(英文:User Datagram Protocol,简称:UDP)端口号中的至少一个,这样,确定了头节点生成这两个检测报文后针对不同的转发路径进行网络性能测试。例如,模拟业务报文2与模拟业务报文1具有不同的协议号,这样,头节点基于不同的协议号分别确定模拟业务报文1和模拟业务报文2在检测域中不同的转发路径。又例如,模拟业务报文2与模拟业务报文1携带不同的TCP端口号(或UDP端口号),这样,头节点基于不同的TCP端 口号(或UDP端口号)分别确定模拟业务报文1和模拟业务报文2在检测域中不同的转发路径。再例如,模拟业务报文2与模拟业务报文1具有不同的协议号,且携带不同的TCP端口号(或UDP端口号),这样,头节点基于不同的协议号以及TCP端口号(或UDP端口号)分别确定模拟业务报文1和模拟业务报文2在检测域中不同的转发路径。
S202,头节点沿着转发路径2向中间节点3发送该检测报文2。
S203,中间节点3根据检测报文2中的随流检测信息2,对网络性能进行随流检测。
S204,中间节点3对检测报文2进行更新,得到检测报文2’,该检测报文2’包括随流检测信息2’。
S205,中间节点3沿着转发路径2向中间节点4发送该检测报文2’。
S206,中间节点4根据检测报文2’中的随流检测信息2’,对网络性能进行随流检测。
S207,中间节点4对检测报文2’进行更新,得到检测报文2”,该检测报文2”包括随流检测信息2”。
S208,中间节点4沿着转发路径2向该检测域的尾节点发送该检测报文2”。
S209,尾节点根据检测报文2”中的随流检测信息2”,对网络性能进行随流检测。
S210,尾节点根据检测报文2”中随流检测信息2”所包括的指示信息2,确定不再向其他节点转发该检测报文2”。
需要说明的是,S201~S210的相关概念描述、具体实现以及达到的效果,具体可以参见S101~S110,在此不再赘述。
可见,基于本申请实施例过提供的主动随流检测方法200,通过对目前的随流检测协议进行扩展,即使在无真实业务流量的网络场景中,检测域的头节点能够自主的生成用于随流检测的检测报文,使得基于随流检测技术对网络性能进行随流测量成为可能;另外,由于检测报文中携带指示信息,使得专门用于测量而非真实业务报文的检测报文被尾节点终结,不会被尾节点转发至检测域以外的其他节点,从而避免了影响为用户提供的真实业务的问题,使得该网络性能检测机制更加智能。而且,该方法200中可以实现对检测域中头节点和尾节点均相同的多条转发路径进行检测,使得该网络性能检测机制能够适应更多的网络场景,实现检测域中更加完善的网络性能测量。
需要说明的是,当控制管理设备经过分析,确定对检测域中转发路径1和转发路径2的网络性能检测均通过,则,允许真实业务报文通过转发路径1和转发路径2进行传输。具体实现时,当头节点接收到真实业务报文2时,头节点可以根据该真实业务报文2中携带的协议号、TCP端口号、UDP端口号中的至少一个,确定该真实业务报文2的转发路径,并将该真实业务报文2沿着所确定的转发路径传输。一种情况下,如果头节点确定真实业务报文2携带的协议号、TCP端口号和/或、UDP端口号,与检测报文1所携带的协议号、TCP端口号和/或UDP端口号对应相同,则,确定该真实业务报文2的转发路径为转发路径1,将该真实业务报文2通过中间节点1、中间节点2和尾节点,转发出该检测域;另一种情况下,如果头节点确定真实业务报文2携带的协议号、TCP端口号、UDP端口号中的至少一个,与检测报文2所携带的协议号、TCP端口号、UDP端口号中的至少一个均 对应相同,则,确定该真实业务报文2的转发路径为转发路径2,将该真实业务报文2通过中间节点3、中间节点4和尾节点,转发出该检测域。
为了本申请实施例提供的上述方法100、方法200更加清楚,下面以IFIT为例,参见图7所示示意图,介绍在网络场景100中,检测域内各个节点中的内部结构(仅考虑本申请实施例的实施过程中用到的部分),以及主动随流检测过程。
参见图7,该网络中包括控制管理设备100、头节点10、中间节点11、中间节点12和尾节点13,其中,头节点10包括用于生成检测报文的IFIT发包器101、转发器102,该转发器102中包括IFIT测量模块1021;中间节点11中包括转发器112,该转发器112中包括IFIT测量模块1121;中间节点12中包括转发器122,该转发器122中包括IFIT测量模块1221;尾节点13包括用于终结检测报文的IFIT收包器131、转发器132,该转发器132中包括IFIT测量模块1321;控制管理设备100用于收集检测域中各节点的测量结果,并进行分析管理。
在图7所示的网络中配置本申请实施例提供的扩展IFIT协议,如果头节点10->中间节点11->中间节点12->尾节点13的转发路径X上有真实业务流量,则,按照目前的IFIT被动随流检测机制,对该转发路径X在检测域内的节点及链路进行网络性能测量,在此不再赘述;如果该转发路径X上没有真实业务流量(如:各节点刚开通,业务通道配置完成后暂无真实业务报文进入,但需要对新配置通道的网络性能进行测量;又如,头节点和尾节点之间的多条转发路径中,部分路径作为保护路径,通常不会承载真实业务报文,但又需要保护路径的性能指标进行测量),则,可以按照下述S301~S312,对该转发路径X在检测域内的节点及链路进行网络性能测量:
S301,头节点10的IFIT发包器101生成检测报文a,并向转发器102发送该检测报文;其中,检测报文a包括报文头a和模拟业务报文a,报文头a中包括随流检测头a,该随流检测头a中包括指示信息1,该指示信息1用于指示该检测报文a的检测为逐跳主动随流检测,并指示尾节点13不再向其它节点转发检测报文a。
S302,头节点10的转发器102识别该检测报文a的检测为逐跳主动随流检测,则由其中的IFIT测量模块1021基于随流检测头a进行网络性能测量,获得测量结果10,并将测量结果10发送给控制管理设备100。
S303,头节点10的转发器102更新检测报文a,获得检测报文a’,并将检测报文a’发送给中间节点11,其中,该检测报文a’中包括随流检测头a’。
S304,中间节点11的转发器112内的IFIT测量模块1121基于随流检测头a’进行网络性能测量,获得测量结果11,并将测量结果11发送给控制管理设备100。
S305,中间节点11的转发器112更新检测报文a’,获得检测报文a”,并将检测报文a”发送给中间节点12,其中,该检测报文a”中包括随流检测头a”。
S306,中间节点12的转发器122内的IFIT测量模块1221基于随流检测头a”进行网络性能测量,获得测量结果12,并将测量结果12发送给控制管理设备100。
S307,中间节点12的转发器122更新检测报文a”,获得检测报文a”’,并将检测 报文a”’发送给中间节点12,,其中,该检测报文a’”中包括随流检测头a’”。
S308,尾节点13的转发器132内的IFIT测量模块1321基于随流检测头a”’进行网络性能测量,获得测量结果13,并将测量结果13发送给控制管理设备100。
S309,尾节点13根据检测报文a’”中随流检测头a”’所包括的指示信息1,确定不再向其他节点转发该检测报文a’”,并将检测报文a’”发送至尾节点13的IFIT收包器131中。
S310,控制管理设备100基于接收到的测量结果10~测量结果13,分析确定该转发路径X的性能指标,评估是否满足业务承载的需求,如果满足,则确定该转发路径X的测试通过。
当S310中控制管理设备100评估确定该转发路径X能够满足业务承载需求,则,该实施例还可以包括:
S311,头节点10接收真实业务报文b,该真实业务报文b和检测报文a携带中相同的协议号和TCP/UDP端口号;
S312,头节点10确定传输路径经过该转发路径X,沿着转发路径X经过中间节点11、中间节点12和尾节点13转发该真实业务报文b,并从尾节点13将真实业务报文b发送至其他节点,直至传输至该真实业务报文b的目的节点,以为用户提供优质的业务服务。
需要说明的是,本实施例是以IFIT下的逐跳主动随流检测为例进行说明的,其他的协议(如:iOAM)以及检测机制(如:E2E)下的主动随流检测的实现方式均与上述实现方式类似,例如:对于iOAM的情况,各节点中携带的测量模块即为iOAM测量模块,头节点内的发包器即为iOAM发包器,尾节点内的收包器即为iOAM收包器,检测报文中携带的即为iOAM对应的随流检测信息,检测过程基本一致,在此不一一列举。
这样,基于同一个随流检测协议,就可以同时覆盖有真实业务流量的场景以及缺少真实业务流量的场景,实现了仅配置一套测量协议,就能兼容多种网络场景进行网络性能测量,配置简单,兼容性强。
图8示出了本申请实施例中一种主动随流检测的方法400的流程示意图,该方法400应用在随流检测的检测域中,以该检测域的头节点——第一网络节点为执行主体,该主动随流检测的方法400例如可以包括:
S401,第一网络节点生成第一检测报文,该第一网络节点为检测域中的头节点。其中,第一检测报文包括第一报文头和由第一网络节点生成的第一模拟业务报文,第一模拟业务报文不是用户设备发送的真实业务报文,根据第一模拟业务报文所确定的第一检测报文在检测域中的第一转发路径用于模拟由用户设备发送的第一真实业务报文在检测域中的转发路径,第一报文头中包括第一随流检测信息,第一随流检测信息被第一转发路径上的节点用于对网络性能进行随流检测,第一随流检测信息包括第一指示信息,第一指示信息用于指示检测域中的尾节点不再向其它节点转发第一检测报文。
S402,第一网络节点沿着第一转发路径向检测域中的尾节点发送第一检测报文。
可以理解的是,该第一网络节点可以是图2或图3中的头节点,或者,图7中的头节 点10;该第一网络节点执行的操作具体可以参见头节点在方法100、方法200中执行的操作,也可以参见头节点10在图7中执行的相应操作。其中,第一检测报文可以是方法100以及方法200中的检测报文1,那么,第一模拟业务报文可以是方法100以及方法200中的模拟业务报文1,第一报文头可以是方法100以及方法200中的报文头1,第一指示信息可以是方法100以及方法200中的指示信息1,第一转发路径可以是方法100以及方法200中的转发路径1;或者,第一检测报文可以是图7所示方法中的检测报文a,那么,第一模拟业务报文可以是图7所示方法中的模拟业务报文a,第一报文头可以是图7所示方法中的报文头a,第一指示信息可以是图7所示方法中的指示信息a,第一转发路径可以是图7所示方法中的转发路径X。
作为一个示例,第一报文头中可以包括第一随流检测头,该第一随流检测头包括第一指示信息。该第一指示信息为第一随流检测头中包括的至少一个比特位所指示的信息。
作为另一个示例,第一报文头可以包括第一扩展随流检测头,第一扩展随流检测头用于携带第一指示信息,该第一扩展随流检测头的类型字段指示随流检测为主动随流检测。
作为再一个示例,第一报文头可以包括选项OPTION字段,该OPTION字段包括第一指示信息。例如:该第一指示信息为OPTION字段中包括的至少一个比特位所指示的信息。又例如:该第一指示信息为OPTION字段的类型字段所指示的信息,类型字段指示随流检测为主动随流检测。
上述三个示例仅是本申请实施例中在第一检测报文中携带第一指示信息的示例性介绍,包括但不限于上述三种可能的实现方式,其他任何可以用于指示该随流检测为主动随流检测的信息均可以作为本申请实施例中的第一指示信息,任意可以携带该第一指示信息的报文头均可以作为本申请实施例中的第一报文头。
在方法400中,该随流检测可以是IFIT随流检测,或者,也可以是iOAM随流检测,再或者,还可以是INT随流检测。任何随流检测协议均可以通过本申请实施例提供的方法进行扩展,支持本申请实施例提供的主动随流检测方法。
其中,该方法400中,随流检测可以是端到端E2E主动随流检测,也可以是逐跳主动随流检测,具体可以根据随流检测的需求进行灵活设置。
对于S401中第一网络节点生成第一检测报文,具体过程可以包括:第一网络节点生成第一模拟业务报文;第一网络节点对第一模拟业务报文封装第一随流检测信息。具体过程可以参见上述方法100中S11~S12的相关描述。
作为一个示例,该第一模拟业务报文可以为二层报文,该二层报文中包括虚拟局域网VLAN标识,VLAN标识用于标识用户设备所属的VLAN。该方法400还可以包括:第一网络节点接收第一真实业务报文,第一真实业务报文中携带和第一模拟业务报文中相同的所述VLAN标识;那么,第一网络节点沿着第一转发路径向尾节点转发第一真实业务报文。这样,对于专线业务,考虑到二层报文根据其所属的VLAN指导转发,所以,头节点生成的二层模拟业务报文中携带真实业务报文所携带的VLAN标识,模拟二层的真实业务报文进入头节点的入端口,使得模拟业务报文在检测域中按照和真实业务报文相同的转发路径传输,从而使得网络性能测量的测量结果为真实业务报文在该检测域的转发具有真实 参考意义。对于专网业务,考虑到二层报文根据其所属的VLAN和目的MAC地址指导转发,所以,头节点生成的二层模拟业务报文中携带真实业务报文所携带的VLAN标识和目的MAC地址,模拟二层的真实业务报文进入头节点的入端口,使得模拟业务报文在检测域中按照和真实业务报文相同的转发路径传输,从而使得网络性能测量的测量结果为真实业务报文在该检测域的转发具有真实参考意义。
作为另一个示例,该第一模拟业务报文也可以为三层报文,该三层报文包括源互联网协议IP地址和目的IP地址,源IP地址为与第一网络节点用于接收第一真实业务报文的入接口相同网段的IP地址,目的IP地址为与尾节点向用户侧转发第一真实业务报文的出接口相同网段的IP地址。该方法400还可以包括:第一网络节点通过入接口接收第一真实业务报文;第一网络节点沿着第一转发路径向尾节点转发第一真实业务报文。这样,考虑到三层报文根据源IP地址和目的IP地址指导转发,相同网段的源IP地址和相同网段的目的IP地址的报文转发路径一致,所以,头节点生成的三层模拟业务报文中携带的源IP地址和目的IP地址和真实业务报文所携带的源IP地址和目的IP地址所属的网段对应相同,使得模拟业务报文在检测域中按照和真实业务报文相同的转发路径传输,从而使得网络性能测量的测量结果为真实业务报文在该检测域的转发具有真实参考意义。
在另一些具体的实现方式中,该方法400还包括:第一网络节点生成第二检测报文,其中,第一检测报文和第二检测报文具有不同的协议号和/或传输控制协议TCP/用户数据报协议UDP端口号,第二检测报文包括第二报文头和由第一网络节点生成的第二模拟业务报文,根据第二模拟业务报文所确定的第二检测报文在检测域中的第二转发路径用于模拟由用户设备发送的第二真实业务报文在检测域中的转发路径,第二报文头中包括第二随流检测信息,第二随流检测信息被第二转发路径中的节点用于对网络性能进行随流检测,第二随流检测信息包括第二指示信息,第二指示信息用于指示尾节点不再向其它节点转发第二检测报文;第一网络节点沿着第二转发路径向尾节点转发第二检测报文。
该实现方式中,该方法400还可以包括:第一网络节点接收用户设备发送的第二真实业务报文,第二真实业务报文和第二检测报文所携带的协议号和TCP/UDP端口号相同;第一网络节点沿着第二转发路径向尾节点转发第二真实业务报文。
可以理解的是,该实现方式具体可以参见图6所示的方法200,其中,第二检测报文可以是方法200中的检测报文2,那么,第二模拟业务报文可以是方法200中的模拟业务报文2,第二报文头可以是方法200中的报文头2,第二指示信息可以是方法200中的指示信息2,第二转发路径可以是方法200中的转发路径2。这样,该实现方式中可以实现对检测域中头节点和尾节点均相同的多条转发路径进行检测,为需要经过不同转发路径传输的不同真实业务报文在网络中正常传输提供了数据支持,使得该网络性能检测机制能够适应更多的网络场景,实现检测域中更加完善的网络性能测量。
需要说明的是,本申请实施例中的方法400,具体实现方式以及达到的效果可以参见上述图4、图6以及图7所示实施例中的相关说明。
图9示出了本申请实施例中另一种主动随流检测的方法500的流程示意图,该方法500 应用在随流检测的检测域中,以该检测域的头节点之后的任意节点——第二网络节点为执行主体,该主动随流检测的方法500例如可以包括:
S501,检测域中的第二网络节点通过检测域中的第一转发路径接收检测域中的第一网络节点发送的第一检测报文,第一检测报文包括第一报文头和第一模拟业务报文,第一报文头中包括第一随流检测信息,第一随流检测信息包括指示信息,指示信息用于指示检测域中的尾节点不再向其它节点转发第一检测报文,第一模拟业务报文并非用户设备发送的真实业务报文,第一转发路径用于模拟用户设备发送的第一真实业务报文在检测域中的转发路径;
S502,第二网络节点根据第一随流检测信息,对网络性能进行随流检测。
作为一个示例,该第二网络节点可以为检测域中的尾节点,在第二网络节点对网络性能进行检测之后,该方法500还可以包括:根据指示信息,第二网络节点不再向其他节点转发第一检测报文。
其中,该第二网络节点可以是图2或图3中的尾节点,或者,图7中的尾节点13;该第二网络节点执行的操作具体可以参见尾节点在方法100、方法200中执行的操作,也可以参见尾节点13在图7中执行的相应操作。其中,第一检测报文可以是方法100以及方法200中的检测报文1”,那么,第一模拟业务报文可以是方法100以及方法200中的模拟业务报文1”,第一报文头可以是方法100以及方法200中的报文头1”,指示信息可以是方法100以及方法200中的指示信息1,第一转发路径可以是方法100以及方法200中的转发路径1;或者,第一检测报文可以是方法200中的检测报文2”,那么,第一模拟业务报文可以是方法200中的模拟业务报文2”,第一报文头可以是方法200中的报文头2”,指示信息可以是方法200中的指示信息2,第一转发路径可以是方法200中的转发路径2。又或者,第一检测报文可以是图7所示方法中的检测报文a’”,那么,第一模拟业务报文可以是图7所示方法中的模拟业务报文a’”,第一报文头可以是图7所示方法中的报文头a’”,指示信息可以是图7所示方法中的指示信息a,第一转发路径可以是图7所示方法中的转发路径X。
作为另一个示例,该第二网络节点也可以为检测域中的中间节点,该方法500还可以包括:第二网络节点对第一检测报文进行更新,得到第二检测报文,第二检测报文包括第二随流检测信息,第二随流检测信息包括指示信息;第二网络节点沿着第一转发路径向尾节点转发第二检测报文。
其中,该第二网络节点可以是图2中间节点1或中间节点2,或图3中的中间节点1~中间节点4的任意一个,或者,图7中的中间节点11或中间节点12;该第二网络节点执行的操作具体可以参见方法100、方法200以及图7中相应中间节点执行的操作。其中,第二检测报文例如可以是方法100以及方法200中的检测报文1’或检测报文1”,或者,方法200中的检测报文2’或检测报文2”;那么,第二随流检测信息可以是对应的随流检测信息1’或随流检测信息1”或随流检测信息2’或随流检测信息2”,指示信息对应的指示信息1或指示信息2,第一转发路径可以是对应的转发路径1或转发路径2;或者,第二检测报文可以是图7所示方法中的检测报文a’、检测报文a”或检测报文a’”,那么, 第二随流检测信息可以是对应的随流检测信息a’、随流检测信息a”或随流检测信息a’”,指示信息对应的指示信息a,第一转发路径可以是对应的转发路径X。
在一种可能的实现方式中,第一模拟业务报文可以为二层报文,该二层报文中包括虚拟局域网VLAN标识,VLAN标识用于标识用户设备所属的VLAN。那么,第一网络节点从第一端口接收用户设备发送的第一真实业务报文,第一真实业务报文中携带VLAN标识。
在另一种可能的实现方式中,第一模拟业务报文为三层报文,该三层报文中包括源互联网协议IP地址和目的IP地址,源IP地址为检测域中的头节点用于接收用户设备发送的第一真实业务报文的入接口相同网段的IP地址,目的IP地址为尾节点向用户侧转发第一真实业务报文的出接口相同网段的IP地址。
可见,无论是二层报文还是三层报文的场景,本申请实施例均可以使得模拟业务报文在检测域中按照和真实业务报文相同的转发路径传输,从而使得网络性能测量的测量结果为真实业务报文在该检测域的转发具有真实参考意义。
其中,随流检测为IFIT随流检测或iOAM随流检测或INT随流检测。
其中,随流检测为端到端主动随流检测或逐跳主动随流检测。
需要说明的是,本申请实施例中的方法500,具体实现方式以及达到的效果可以参见上述图4、图6、图7以及图8所示实施例中的相关说明。
此外,本申请实施例还提供了一种第一网络设备1000,参见图10所示。该第一网络设备1000包括处理单元1001和发送单元1002。其中,处理单元1001用于执行上述图4、图6所示实施例中头节点执行的处理操作、图7所示实施例中头节点10执行的处理操作、以及图8所示实施例中第一网络节点执行的处理操作;发送单元1002用于执行上述用于执行上述图4、图6所示实施例中头节点执行的发送操作、图7所示实施例中头节点10执行的发送操作、以及图8所示实施例中第一网络节点执行的发送操作。例如:处理单元1001可以执行图4中实施例中的操作:检测域中的头节点生成检测报文1。
此外,本申请实施例还提供了一种第二网络设备1100,参见图11所示。该第二网络设备1100包括接收单元1101、处理单元1102和发送单元1103。其中,接收单元1101用于执行上述图4、图6所示实施例中中间节点1、中间节点2或尾节点点执行的接收操作、图7所示实施例中中间节点11、中间节点12或尾节点13执行的接收操作、以及图9所示实施例中第二网络节点执行的接收操作;发送单元1103用于执行上述图4、图6所示实施例中中间节点1或中间节点2执行的发送操作、图7所示实施例中中间节点11或中间节点12尾节点13执行的发送操作、以及图9所示实施例中第二网络节点(为中间节点时)执行的发送操作;处理单元1102用于执行上述图4、图6所示实施例中中间节点1、中间节点2或尾节点点执行的处理操作、图7所示实施例中中间节点11、中间节点12或尾节点13执行的处理操作、以及图9所示实施例中第二网络节点执行的处理操作。例如:接收单元1101可以执行图4中实施例中的操作:中间节点2接收中间节点1发送的检测报文1’;处理单元1102可以执行图4中实施例中的操作:中间节点2根据检测报文1’中的随流检 测信息1’,对网络性能进行随流检测,以及,中间节点2对检测报文1’进行更新,得到检测报文1”,该检测报文1”包括随流检测信息1”;发送单元1103可以执行图4中实施例中的操作:中间节点2沿着转发路径1向该检测域的尾节点发送该检测报文1”。
此外,本申请实施例还提供了一种第一网络设备1200,参见图12所示。该第一网络设备1200包括第一通信接口1201、第二通信接口1202和处理器1203。其中,第一通信接口1201用于执行前述用于执行上述图4和6所示实施例中头节点、图7所示实施例中头节点10以及图8所示实施例中的第一网络节点执行的接收操作;第二通信接口1202用于执行前述用于执行上述图4和6所示实施例中头节点、图7所示实施例中头节点10以及图8所示实施例中的第一网络节点执行的发送操作;处理器1203用于执行上述图4和6所示实施例中头节点、图7所示实施例中头节点10以及图8所示实施例中的第一网络节点执行的除了接收操作和发送操作之外的其他操作。例如:处理器1202可以执行图4中实施例中的操作:检测域中的头节点生成检测报文1。
此外,本申请实施例还提供了一种第二网络设备1300,参见图13所示。该第二网络设备1300包括第一通信接口1301、第二通信接口1302和处理器1303。其中,第一通信接口1301用于执行前述图4和6所示实施例中中间节点1、中间节点2执行的接收操作,图7所示实施例中中间节点11、中间节点12执行的接收操作,以及图8所示实施例中的第二网络节点(为中间节点时)执行的接收操作;第二通信接口1302用于执行前述图4和6所示实施例中中间节点1、中间节点2执行的发送操作,图7所示实施例中中间节点11、中间节点12执行的发送操作,以及图8所示实施例中的第二网络节点(为中间节点时)执行的发送操作。或者,第一通信接口1301用于执行前述图4和6所示实施例中尾节点执行的接收操作,图7所示实施例中尾节点13执行的接收操作,以及图8所示实施例中的第二网络节点(为尾节点时)执行的接收操作;第二通信接口1302用于执行前述图4和6所示实施例中尾节点执行的发送操作,图7所示实施例中尾节点13执行的发送操作,以及图8所示实施例中的第二网络节点(为尾节点时)执行的发送操作。处理器1302用于执行上述图4和6所示实施例中中间节点1、中间节点2或尾节点执行的除了接收操作和发送操作以外的其他操作,图7所示实施例中中间节点11、中间节点12或尾节点13执行的除了接收操作和发送操作以外的其他操作,以及图8所示实施例中的第二网络节点执行的除了接收操作和发送操作以外的其他操作。例如:处理器1302可以执行图4中实施例中的操作:中间节点2根据检测报文1’中的随流检测信息1’,对网络性能进行随流检测,以及,中间节点2对检测报文1’进行更新,得到检测报文1”,该检测报文1”包括随流检测信息1”。
此外,本申请实施例还提供了一种第一网络设备1400,参见图14所示。该第一网络设备1400包括存储器1401和与存储器1401通信的处理器1402。其中,存储器1401包括计算机可读指令;处理器1402用于执行所述计算机可读指令,使得该第一网络设备1400执行以上图4、图6所示实施例中头节点侧执行的方法,图7所示实施例中头节点10侧执行的方法,以及图8所示实施例中第一网络节点侧执行的方法。
此外,本申请实施例还提供了一种第二网络设备1500,参见图15所示。该第二网络 设备1500包括存储器1501和与存储器1501通信的处理器1502。其中,存储器1501包括计算机可读指令;处理器1502用于执行所述计算机可读指令,使得该第二网络设备1500执行以上图4、图6所示实施例中中间节点1、中间节点2或尾节点侧执行的方法,图7所示实施例中中间节点11、中间节点12或尾节点13侧执行的方法,以及图9所示实施例中第二网络节点侧执行的方法。
可以理解的是,上述实施例中,处理器可以是中央处理器(英文:central processing unit,缩写:CPU),网络处理器(英文:network processor,缩写:NP)或者CPU和NP的组合。处理器还可以是专用集成电路(英文:application-specific integrated circuit,缩写:ASIC),可编程逻辑器件(英文:programmable logic device,缩写:PLD)或其组合。上述PLD可以是复杂可编程逻辑器件(英文:complex programmable logic device,缩写:CPLD),现场可编程逻辑门阵列(英文:field-programmable gate array,缩写:FPGA),通用阵列逻辑(英文:generic array logic,缩写:GAL)或其任意组合。处理器可以是指一个处理器,也可以包括多个处理器。存储器可以包括易失性存储器(英文:volatile memory),例如随机存取存储器(英文:random-access memory,缩写:RAM);存储器也可以包括非易失性存储器(英文:non-volatile memory),例如只读存储器(英文:read-only memory,缩写:ROM),快闪存储器(英文:flash memory),硬盘(英文:hard disk drive,缩写:HDD)或固态硬盘(英文:solid-state drive,缩写:SSD);存储器还可以包括上述种类的存储器的组合。存储器可以是指一个存储器,也可以包括多个存储器。在一个具体实施方式中,存储器中存储有计算机可读指令,所述计算机可读指令包括多个软件模块,例如发送模块,处理模块和接收模块。处理器执行各个软件模块后可以按照各个软件模块的指示进行相应的操作。在本实施例中,一个软件模块所执行的操作实际上是指处理器根据所述软件模块的指示而执行的操作。处理器执行存储器中的计算机可读指令后,可以按照所述计算机可读指令的指示,执行主动随流检测的各网络节点可以执行的全部操作。
可以理解的是,上述实施例中,第一网络设备1200的第二通信接口1202,具体可以被用作第一网络设备1000中的发送单元1002,实现第一网络设备到第二网络设备之间的数据通信;第一网络设备1200的第一通信接口1201,具体可以被用作第一网络设备1000中的接收单元,例如可以用于接收由用户设备发送的第一真实业务报文。同理,第二网络设备1300的第一通信接口1301,具体可以被用作第二网络设备1100中的接收单元1101,实现相邻第二网络设备之间或者第一网络设备到第二网络设备的数据通信;第二网络设备1300的第二通信接口1302,具体可以被用作第二网络设备1100中的发送单元1103,实现相邻第二网络设备之间或者第二网络设备到检测域以外网络设备的数据通信。
此外,本申请实施例还提供了一种通信系统1600,参见图16所示。该通信系统1600包括第一网络设备1601以及第二网络设备1602,其中,第一网络设备1601具体可以是上述第一网络设备1000、第一网络设备1200或第一网络设备1400,第二网络设备1602具体可以是上述第二网络设备1100、第二网络设备1300或第二网络设备1500。
此外,本申请实施例还提供了一种计算机可读存储介质,该计算机可读存储介质中存 储有指令,当其在计算机上运行时,使得所述计算机执行以上图4、图6-图9所示实施例中的所述主动随流检测的方法。
此外,本申请实施例还提供了计算机程序产品,包括计算机程序或计算机可读指令,当所述计算机程序或所述计算机可读指令在计算机上运行时,使得计算机执行前述图4、图6-图9所示实施例中的所述主动随流检测的方法。
需要说明的是,本申请实施例中的“头节点”、“尾节点”是针对随流检测的检测域而言,而“源MAC地址”、“目的MAC地址”、“源IP地址”以及“目的IP地址”则是针对业务报文在整个网络中传输时的源网络节点以及目的网络节点而言的概念,两者在范围上是不同的。
通过以上的实施方式的描述可知,本领域的技术人员可以清楚地了解到上述实施例方法中的全部或部分步骤可借助软件加通用硬件平台的方式来实现。基于这样的理解,本申请的技术方案可以以软件产品的形式体现出来,该计算机软件产品可以存储在存储介质中,如只读存储器(英文:read-only memory,ROM)/RAM、磁碟、光盘等,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者诸如路由器等网络通信设备)执行本申请各个实施例或者实施例的某些部分所述的方法。
本说明书中的各个实施例均采用递进的方式描述,各个实施例之间相同相似的部分互相参见即可,每个实施例重点说明的都是与其他实施例的不同之处。尤其,对于系统实施例和设备实施例而言,由于其基本相似于方法实施例,所以描述得比较简单,相关之处参见方法实施例的部分说明即可。以上所描述的设备及系统实施例仅仅是示意性的,其中作为分离部件说明的模块可以是或者也可以不是物理上分开的,作为模块显示的部件可以是或者也可以不是物理模块,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部模块来实现本实施例方案的目的。本领域普通技术人员在不付出创造性劳动的情况下,即可以理解并实施。
以上所述仅是本申请的优选实施方式,并非用于限定本申请的保护范围。应当指出,对于本技术领域的普通技术人员来说,在不脱离本申请的前提下,还可以作出若干改进和润饰,这些改进和润饰也应视为本申请的保护范围。

Claims (26)

  1. 一种主动随流检测的方法,其特征在于,包括:
    第一网络节点生成第一模拟业务报文,所述第一模拟业务报文不是由用户设备发送的真实业务报文;
    所述第一网络节点生成第一检测报文,所述第一网络节点为检测域中的头节点;所述第一检测报文包括第一报文头和所述第一模拟业务报文,所述第一检测报文在所述检测域中的第一转发路径是所述用户设备发送的第一真实业务报文在所述检测域中的转发路径,所述第一报文头中包括第一随流检测信息,所述第一随流检测信息被所述第一转发路径上的节点用于对网络性能进行随流检测,所述第一随流检测信息包括第一指示信息,所述第一指示信息用于指示所述检测域中的尾节点不再向其它节点转发所述第一检测报文;
    所述第一网络节点沿着所述第一转发路径向所述检测域中的尾节点发送所述第一检测报文。
  2. 根据权利要求1所述的方法,其特征在于,所述第一报文头中包括第一随流检测头,所述第一随流检测头包括所述第一指示信息。
  3. 根据权利要求2所述的方法,其特征在于,所述第一指示信息为所述第一随流检测头中包括的至少一个比特位所指示的信息。
  4. 根据权利要求1所述的方法,其特征在于,所述第一报文头包括第一扩展随流检测头,所述第一扩展随流检测头用于携带所述第一指示信息,所述第一扩展随流检测头的类型字段指示所述随流检测为主动随流检测。
  5. 根据权利要求1所述的方法,其特征在于,所述第一报文头包括选项OPTION字段,所述OPTION字段包括所述第一指示信息。
  6. 根据权利要求5所述的方法,其特征在于,所述第一指示信息为所述OPTION字段中包括的至少一个比特位所指示的信息。
  7. 根据权利要求5或6所述的方法,其特征在于,所述第一指示信息为所述OPTION字段的类型字段所指示的信息,所述类型字段指示所述随流检测为主动随流检测。
  8. 根据权利要求1-7任一项所述的方法,其特征在于,所述随流检测为带内流信息遥测IFIT随流检测或带内操作管理和维护iOAM随流检测或带内网络遥测INT随流检测。
  9. 根据权利要求1-8任一项所述的方法,其特征在于,所述随流检测为端到端主动随流检测或逐跳主动随流检测。
  10. 根据权利要求1-9任一项所述的方法,其特征在于,所述第一模拟业务报文为二层报文,所述二层报文中包括虚拟局域网VLAN标识,所述VLAN标识用于标识所述第一真实业务报文所属的VLAN。
  11. 根据权利要求10所述的方法,其特征在于,所述方法还包括:
    所述第一网络节点接收所述用户设备发送的所述第一真实业务报文,所述第一真实业务报文中携带所述VLAN标识;
    所述第一网络节点沿着所述第一转发路径向所述尾节点转发所述第一真实业务报文。
  12. 根据权利要求1-9任一项所述的方法,其特征在于,所述第一模拟业务报文为三层 报文,所述三层报文包括源互联网协议IP地址和目的IP地址,所述源IP地址为与所述第一网络节点用于接收所述第一真实业务报文的入接口相同网段的IP地址,所述目的IP地址为与所述尾节点向用户侧转发所述第一真实业务报文的出接口相同网段的IP地址。
  13. 根据权利要求1-12任一项所述的方法,其特征在于,所述方法还包括:
    所述第一网络节点生成第二模拟业务报文,所述第二模拟业务报文不是由用户设备发出的真实业务报文;
    所述第一网络节点生成第二检测报文,其中,所述第一检测报文和所述第二检测报文具有不同的协议号和/或传输控制协议TCP/用户数据报协议UDP端口号,所述第二检测报文包括第二报文头和所述第二模拟业务报文,所述第二检测报文在所述检测域中的第二转发路径是所述用户设备发送的第二真实业务报文在所述检测域中的转发路径,所述第二报文头中包括第二随流检测信息,所述第二随流检测信息被所述第二转发路径中的节点用于对网络性能进行随流检测,所述第二随流检测信息包括第二指示信息,所述第二指示信息用于指示所述尾节点不再向其它节点转发所述第二检测报文;
    所述第一网络节点沿着所述第二转发路径向所述尾节点发送所述第二检测报文。
  14. 一种基于随流检测对网络性能进行主动检测的方法,其特征在于,包括:
    检测域中的第二网络节点通过所述检测域中的第一转发路径接收所述检测域中的第一网络节点发送的第一检测报文,所述第一检测报文包括第一报文头和第一模拟业务报文,所述第一报文头中包括第一随流检测信息,所述第一随流检测信息包括指示信息,所述指示信息用于指示所述检测域中的尾节点不再向其它节点转发所述第一检测报文,所述第一模拟业务报文不是用户设备发送的真实业务报文,所述第一转发路径是所述用户设备发送的第一真实业务报文在所述检测域中的转发路径;
    所述第二网络节点根据所述第一随流检测信息,对网络性能进行随流检测。
  15. 根据权利要求14所述的方法,其特征在于,所述第二网络节点为所述检测域中的尾节点,在所述第二网络节点对所述网络性能进行检测之后,所述方法还包括:
    根据所述指示信息,所述第二网络节点不再向其他节点转发所述第一检测报文。
  16. 根据权利要求14所述的方法,其特征在于,所述第二网络节点为所述检测域中的中间节点,所述方法还包括:
    所述第二网络节点对所述第一检测报文进行更新,得到第二检测报文,所述第二检测报文包括第二随流检测信息,所述第二随流检测信息包括所述指示信息;
    所述第二网络节点沿着第一转发路径向所述尾节点转发所述第二检测报文。
  17. 根据权利要求14-16任一项所述的方法,其特征在于,所述第一模拟业务报文为二层报文,所述二层报文中包括虚拟局域网VLAN标识,所述VLAN标识用于标识所述第一真实业务报文所属的VLAN。
  18. 根据权利要求17所述的方法,其特征在于,所述第二网络节点接收所述用户设备发送的所述第一真实业务报文,所述第一真实业务报文中携带所述VLAN标识。
  19. 根据权利要求14-16任一项所述的方法,其特征在于,所述第一模拟业务报文为三层报文,所述三层报文中包括源互联网协议IP地址和目的IP地址,所述源IP地址为所述 检测域中的头节点用于接收所述用户设备发送的所述第一真实业务报文的入接口相同网段的IP地址,所述目的IP地址为所述尾节点向用户侧转发所述第一真实业务报文的出接口相同网段的IP地址。
  20. 根据权利要求14-19任一项所述的方法,其特征在于,所述随流检测为带内流信息遥测IFIT随流检测或带内操作管理和维护iOAM随流检测或带内网络遥测INT随流检测。
  21. 根据权利要求14-20任一项所述的方法,其特征在于,所述随流检测为端到端主动随流检测或逐跳主动随流检测。
  22. 一种网络设备,其特征在于,包括:
    存储器,该存储器包括计算机可读指令;
    与该存储器通信的处理器,所述处理器用于执行所述计算机可读指令,使得所述网络设备用于执行权利要求1-13任一项所述的方法。
  23. 一种网络设备,其特征在于,包括:
    存储器,该存储器包括计算机可读指令;
    与该存储器通信的处理器,所述处理器用于执行所述计算机可读指令,使得所述网络设备用于执行权利要求14-21任一项所述的方法。
  24. 一种计算机可读存储介质,包括计算机可读指令,其特征在于,当所述计算机可读指令在计算机上运行时,使得所述计算机实施权利要求1-21任一项所述的方法。
  25. 一种计算机程序产品,其特征在于,包括计算机程序或计算机可读指令,当所述计算机程序或所述计算机可读指令在计算机上运行时,用于实施权利要求1-21任一项所述的方法。
  26. 一种通信系统,其特征在于,包括权利要求22所述的网络设备和权利要求23所述的网络设备。
PCT/CN2020/116483 2020-01-03 2020-09-21 一种主动随流检测的方法、网络设备以及通信系统 WO2021135414A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP20911127.7A EP4068702A4 (en) 2020-01-03 2020-09-21 ACTIVE FLOW DETECTION METHOD, NETWORK DEVICE AND COMMUNICATION SYSTEM
US17/855,915 US20220337497A1 (en) 2020-01-03 2022-07-01 Active in-situ flow metrics method, network device, and communications system

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
CN202010006017 2020-01-03
CN202010006017.3 2020-01-03
CN202010112503.3 2020-02-24
CN202010112503.3A CN113079091B (zh) 2020-01-03 2020-02-24 一种主动随流检测的方法、网络设备以及通信系统

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US17/855,915 Continuation US20220337497A1 (en) 2020-01-03 2022-07-01 Active in-situ flow metrics method, network device, and communications system

Publications (1)

Publication Number Publication Date
WO2021135414A1 true WO2021135414A1 (zh) 2021-07-08

Family

ID=76609100

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/116483 WO2021135414A1 (zh) 2020-01-03 2020-09-21 一种主动随流检测的方法、网络设备以及通信系统

Country Status (4)

Country Link
US (1) US20220337497A1 (zh)
EP (1) EP4068702A4 (zh)
CN (1) CN113079091B (zh)
WO (1) WO2021135414A1 (zh)

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113382437A (zh) * 2020-03-10 2021-09-10 华为技术有限公司 一种随流检测方法及装置
CN115623504A (zh) * 2021-07-16 2023-01-17 华为技术有限公司 检测数据流的方法及装置
CN113810229B (zh) * 2021-09-16 2023-12-05 烽火通信科技股份有限公司 一种基于时序调度的ioam质量性能数据分析方法和装置
CN116366494A (zh) * 2021-12-28 2023-06-30 中国移动通信有限公司研究院 随流检测方法、装置、网络设备及存储介质
CN114363041B (zh) * 2021-12-31 2023-08-11 河南信大网御科技有限公司 基于动态操作系统指纹及协议指纹的内网防护方法及系统
CN114745302B (zh) * 2022-03-30 2023-09-15 新华三技术有限公司 通信方法及装置
CN114679369B (zh) * 2022-05-10 2023-09-19 中国联合网络通信集团有限公司 数据处理方法、装置、设备、系统及存储介质
WO2024000140A1 (zh) * 2022-06-28 2024-01-04 新华三技术有限公司 报文发送
CN115396336A (zh) * 2022-08-01 2022-11-25 南京网元通信技术有限公司 一种基于软件仿真的mpls vpn集客专线主动测试方法
CN117749670A (zh) * 2022-09-15 2024-03-22 中兴通讯股份有限公司 随流检测的方法、封装节点、检测节点、计算机可读介质
CN115665006B (zh) * 2022-12-21 2023-03-28 新华三信息技术有限公司 一种随流检测方法及装置
CN116668343B (zh) * 2023-07-31 2023-10-31 新华三技术有限公司 一种随流检测方法、装置、设备及存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180288083A1 (en) * 2017-04-03 2018-10-04 Level 3 Communication, Llc Comparing Metrics From Different Data Flows to Detect Flaws in Network Data Collection for Anomaly Detection
CN109743340A (zh) * 2019-04-04 2019-05-10 华为技术有限公司 报文处理的方法和网络装置
WO2019168965A1 (en) * 2018-03-01 2019-09-06 Huawei Technologies Co., Ltd. Packet-programmable statelets
CN110572293A (zh) * 2018-06-06 2019-12-13 华为技术有限公司 一种数据报文的检测方法、设备及系统

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4164352B2 (ja) * 2002-12-10 2008-10-15 株式会社日立製作所 移動端末を収容できるパケット転送装置
CN104753823B (zh) * 2013-12-31 2018-04-10 华为技术有限公司 建立服务质量预留的方法及节点
CN105703967B (zh) * 2014-11-27 2020-02-14 中兴通讯股份有限公司 一种检测标签交换路径连通性的方法及装置
US9992271B2 (en) * 2014-12-01 2018-06-05 Telefonaktiebolaget Lm Ericsson (Publ) ENF selection for NFVI
CN107317696B (zh) * 2016-03-31 2020-09-25 阿里巴巴集团控股有限公司 一种用于确定网络拓扑检测信息的方法与设备
CN107979848B (zh) * 2016-10-25 2023-01-31 中兴通讯股份有限公司 一种备用路径的检测方法及装置
CN107996023B (zh) * 2016-11-23 2020-04-28 华为技术有限公司 监测虚拟网络的方法、设备和虚拟网络系统
US10498639B2 (en) * 2018-03-13 2019-12-03 Futurewei Technologies, Inc. Collecting network OAM flow data using out-of-band messages
US10972381B2 (en) * 2019-04-23 2021-04-06 Cisco Technology, Inc. Network operations reactive to operations data included in seamless bidirectional forwarding detection (S-BFD) packets

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180288083A1 (en) * 2017-04-03 2018-10-04 Level 3 Communication, Llc Comparing Metrics From Different Data Flows to Detect Flaws in Network Data Collection for Anomaly Detection
WO2019168965A1 (en) * 2018-03-01 2019-09-06 Huawei Technologies Co., Ltd. Packet-programmable statelets
CN110572293A (zh) * 2018-06-06 2019-12-13 华为技术有限公司 一种数据报文的检测方法、设备及系统
CN109743340A (zh) * 2019-04-04 2019-05-10 华为技术有限公司 报文处理的方法和网络装置

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
LI SHUPING: "Detection Mechanism of Active and Passive Loops in LAN", TECHNOLOGY AND ECONOMIC GUIDE, vol. 26, no. 18, 1 January 2018 (2018-01-01), pages 37 - 38, XP055828232, ISSN: 2096-1995 *
See also references of EP4068702A4

Also Published As

Publication number Publication date
CN113079091B (zh) 2022-07-22
US20220337497A1 (en) 2022-10-20
EP4068702A1 (en) 2022-10-05
CN113079091A (zh) 2021-07-06
EP4068702A4 (en) 2023-01-25

Similar Documents

Publication Publication Date Title
WO2021135414A1 (zh) 一种主动随流检测的方法、网络设备以及通信系统
US11848757B2 (en) In-situ passive performance measurement in a network environment
US11876883B2 (en) Packet processing method, network node, and system
WO2021170092A1 (zh) 报文处理方法、装置、网络设备及存储介质
EP3306871B1 (en) Method and apparatus for acquiring path information
US20230006906A1 (en) In-situ flow detection method and apparatus
US8774045B2 (en) Packet loss detecting method and apparatus, and router
EP2721777B1 (en) Methods and devices for monitoring a data path
US11870690B2 (en) Packet processing method and apparatus, device, and storage medium
US20220294722A1 (en) Transmission Quality Detection Method, Apparatus, and System, and Storage Medium
US9596167B1 (en) Internet protocol virtual private network service performance monitoring
EP4207647A1 (en) Method for detecting multicast service flow and related apparatus
US20220078106A1 (en) Packet Measurement Method, Device, and System
US9769044B1 (en) Internet protocol service performance monitoring
US20200153834A1 (en) Method, Apparatus, and System for Collecting Access Control List
WO2017000802A1 (zh) 一种业务故障定位方法及装置
KR20140088206A (ko) 네트워크 측정 트리거들을 사용하는 서비스 보장
US9537672B2 (en) Method for managing customer edge device automatically and PE device
US20230318970A1 (en) Packet Processing Method and Apparatus
US20230327983A1 (en) Performance measurement in a segment routing network
US20230379246A1 (en) Method and Apparatus for Performing Protection Switching in Segment Routing SR Network
WO2022116806A1 (zh) 管理隧道的方法、装置及系统
WO2023231438A1 (zh) 报文发送的方法、网络设备及系统
KR20080001071A (ko) 비동기식 전송 모드 기반의 다중 프로토콜 레이블 스위칭통신망에서의 망품질 관리 방법

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20911127

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2020911127

Country of ref document: EP

Effective date: 20220630

NENP Non-entry into the national phase

Ref country code: DE