WO2022001164A1 - 业务流配置方法、设备及存储介质 - Google Patents

业务流配置方法、设备及存储介质 Download PDF

Info

Publication number
WO2022001164A1
WO2022001164A1 PCT/CN2021/080010 CN2021080010W WO2022001164A1 WO 2022001164 A1 WO2022001164 A1 WO 2022001164A1 CN 2021080010 W CN2021080010 W CN 2021080010W WO 2022001164 A1 WO2022001164 A1 WO 2022001164A1
Authority
WO
WIPO (PCT)
Prior art keywords
network
information
packet
cpe
controller
Prior art date
Application number
PCT/CN2021/080010
Other languages
English (en)
French (fr)
Inventor
周瑾
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2022001164A1 publication Critical patent/WO2022001164A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/24Traffic characterised by specific attributes, e.g. priority or QoS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/16Central resource management; Negotiation of resources or communication parameters, e.g. negotiating bandwidth or QoS [Quality of Service]
    • H04W28/18Negotiating wireless communication parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2212/00Encapsulation of packets

Definitions

  • the present application relates to the field of communications, for example, to a service flow configuration method, device and storage medium
  • the client's network usually has specific requirements for some services along with the development of services in the network. For example, for Some services have deterministic requirements. Therefore, it is necessary to implement services that provide specific service flows on the basis of network services.
  • the present application provides a service flow configuration method, device and storage medium, which can introduce part of the traffic in the first network into the second network.
  • An embodiment of the present application provides a service flow configuration method, the method is applied to a first network controller, and the method includes:
  • To the first gateway (Gate Way, GW) closest to the first PE device in the first network configure the encapsulation capability of the second network message; Receive the second network message sent by the second network controller Path information; determine the second GW closest to the second PE device in the first network, and configure the second network packet processing capability for the second GW; deliver the first traffic flow to the first GW rule, and deliver a second traffic diversion rule to the second GW, where the first traffic diversion rule carries the path information and is used to instruct the first GW to encapsulate the first network packet output by the first CPE as the first traffic diversion rule.
  • the second traffic diversion rule is used to instruct the second GW Replace the second network packet output by the second PE device with the first network packet, and divert traffic to the second CPE.
  • the embodiment of the present application further provides a service flow configuration method, the method is applied to the second network controller, and the method includes:
  • the first PE device closest to a CPE select the second PE device closest to the second CPE in the first network; receive a service request sent by the first network controller, where the service request carries the first PE device and the information of the second PE device and service requirement information; determining the path of the second network packet in the second network based on the service requirement information and the information of the first PE device and the second PE device information, and send the path information to the first network controller.
  • the embodiment of the present application also provides a service flow configuration device, the device includes a memory, a processor, a program stored on the memory and executable on the processor, and a program for implementing the processor and the processor.
  • a data bus connecting and communicating between the memories, the program implements the method provided by the present application when the program is executed by the processor.
  • the embodiments of the present application further provide a storage medium for computer-readable storage, wherein the storage medium stores one or more programs, and the one or more programs can be executed by one or more processors, method provided in this application.
  • the technical solutions provided by the embodiments of the present application select the first PE device in the second network that is closest to the first CPE and the second PE device that is closest to the second CPE, and analyze the first GW closest to the first PE device.
  • Configure the encapsulation capability of the second network packet and configure the processing of the second network packet on the second GW by determining the path information of the second network packet in the second network and determining the second GW closest to the second PE device Capability, by issuing a first traffic diversion rule to the first GW and a second traffic diversion rule to the second GW, where the first traffic diversion rule is used to instruct the first GW to export the first network of the first CPE
  • the packet is encapsulated as a second network packet and diverted to the first PE device and instructs the second network packet to be transmitted in the second network based on the path information, and the second traffic diversion rule is used to instruct the second GW to transfer the
  • the second network packet output by the second PE device is replaced with the first network packet, and the
  • the encapsulation capability of network packets and the delivery of the first traffic diversion rule, and by configuring the second GW's processing capability of the second network packet and the delivery of the second traffic diversion rule, part of the traffic in the first network can be diverted to the second GW.
  • the services of the second network can be provided in the second network, which facilitates the flexible migration and deployment of the network.
  • 1a is a networking diagram of an SD-WAN provided by an embodiment of the present application.
  • FIG. 1b is a flowchart of a service flow configuration method provided by an embodiment of the present application.
  • FIG. 2 is a flowchart of a service flow configuration method provided by an embodiment of the present application
  • FIG. 3 is a flowchart of a service flow configuration method provided by an embodiment of the present application.
  • FIG. 4 is a flowchart of a service flow configuration method provided by an embodiment of the present application.
  • FIG. 5 is a structural block diagram of a service flow configuration apparatus provided by an embodiment of the present application.
  • FIG. 6 is a structural block diagram of a service flow configuration apparatus provided by an embodiment of the present application.
  • FIG. 7 is a schematic structural diagram of a service flow configuration device provided by an embodiment of the present application.
  • the client's network usually has specific requirements for some services along with the development of services in the network. For example, for Some services have deterministic requirements, so it is necessary to implement services that provide specific service flows on the basis of network services.
  • SD-WAN Software Defined Wide Area Network
  • CPE Customer Premises Equipment
  • SD-WAN deploys CPE on the client side.
  • SD-WAN gateway is usually deployed on the service presentation node (Point of Present, POP) of the backbone network to access Multi-Protocol Label Switching (Multi-Protocol Label Switching). Label Switching, MPLS) network.
  • SD-WAN gateways are usually deployed in software on Provider Edge (PE) devices. The networking is shown in Figure 1a.
  • Deterministic Network is a three-layer network based on Internet Protocol (IP)/MPLS proposed by the Internet Engineering Task Force (IETF) in 2015.
  • IP Internet Protocol
  • MPLS proposed by the Internet Engineering Task Force (IETF) in 2015.
  • IP Internet Protocol
  • IETF Internet Engineering Task Force
  • Fig. 1b is a flowchart of a service flow configuration method provided by an embodiment of the present application.
  • the method may be executed by a service flow configuration apparatus, and the apparatus may be implemented by software and/or hardware, and the apparatus may be configured in On the first network controller, the method can be applied to a scenario in which part of the traffic of the first network is introduced into the second network.
  • the method provided by this embodiment of the present application includes the following steps:
  • S110 Select a first operator edge PE device in the second network that is closest to the first client device CPE in the first network, and select a second CPE in the second network that is closest to the second CPE in the first network PE equipment.
  • the first network may be SD-WAN or other networks
  • the second network may be DetNet or other networks.
  • the selecting the first operator edge PE device in the second network closest to the first customer premises equipment CPE in the first network, and selecting the second CPE in the first network includes: receiving edge topology information of the second network sent by the second network controller; selecting the first PE device closest to the first CPE based on the edge topology information, and selecting a second PE device closest to the second CPE.
  • the first PE device that is closest to the first CPE may be the PE device that is the closest to the first CPE, or may also be the PE device that has the least number of hops to the first CPE.
  • the second PE device that is closest to the second CPE may be the PE device that is closest to the second CPE or has the least number of hops.
  • S120 Configure a packet encapsulation capability of the second network for the first gateway GW in the first network that is closest to the first PE device.
  • the first gateway GW may be an SD-WAN gateway, and the first gateway may be deployed on the first PE device as a logical block, or may be deployed on other devices and separated from the first PE device .
  • the first GW closest to the first PE device may be the gateway closest to the first PE device, or may also be the gateway with the fewest hops to the first PE device.
  • configuring the encapsulation capability of the second network packet on the first GW may be configuring the first GW with the capability of encapsulating the first network packet into the second network packet.
  • S130 Receive path information of the second network packet sent by the second network controller.
  • the receiving path information of the second network packet sent by the second network controller includes: sending a service request to the second network controller, wherein the service request carries all the information of the first PE device, the second PE device and the service requirement information, the service request is used to instruct the second network controller based on the service requirement information, the first PE device and the second PE device determine the path information of the second network packet; and receive the path information sent by the second network controller.
  • the first network controller may send a service request to the second network controller, and the service request carries the information of the first PE device, the second PE device, and the service requirement information, and the second network controller receives the service request, based on the service
  • the service requirement information in the request and the information of the first PE device and the second PE device determine the path information of the second network packet, the second network controller sends the path information to the first network controller, and the first network controller receives the path information.
  • the path information received by the first network controller may be identification information of the path.
  • sending the service request to the second network controller includes: sending the service request configured based on the YANG model to the second network controller.
  • the service requirement information includes: traffic characteristic information cyclic interval, maximum number of packets per cyclic interval, maximum packet length, minimum bandwidth, maximum delay, maximum tolerable delay, Maximum packet loss rate, maximum tolerable packet loss rate and maximum tolerable out-of-order.
  • S140 Determine the second GW closest to the second PE device in the first network, and configure the second GW with the processing capability of the second network packet.
  • the second GW may be deployed on the second PE device as a logical component, or may be deployed on other devices, separate from the second PE device.
  • the second GW closest to the second PE device may be the closest gateway to the second PE, or the gateway with the fewest hops.
  • configuring the second GW with the capability of processing the second network packet may include configuring the second GW with the capability of converting the second network packet into the first network packet.
  • S150 Deliver a first traffic diversion rule to the first GW, and deliver a second traffic diversion rule to the second GW, where the first traffic diversion rule carries the path information and is used to instruct the first GW to transfer the first traffic
  • the first network packet output by the CPE is encapsulated as a second network packet, and the traffic is diverted to the first PE device, and the second network packet is instructed to be transmitted on the second network based on the path information, and the second traffic diversion
  • the rule is used to instruct the second GW to replace the second network packet output by the second PE device with the first network packet, and divert traffic to the second CPE.
  • the first traffic diversion rule carries the path information
  • the first gateway can encapsulate the first network packet output by the first CPE into a second network packet based on the first traffic diversion rule, and divert traffic to the first network packet.
  • the second network packet is transmitted in the second network based on the path information carried in the first traffic diversion rule until it is transmitted to the second PE device.
  • the first GW when a first network packet with a service flow is to be sent from the first CPE to the first GW, the first GW will encapsulate the packet into a second network packet and forward it to the first GW.
  • the first PE device in the second network performs processing, and the first PE device forwards the second network packet to the second PE that is the output node in the corresponding second network according to the path information of the second network packet determined in the second network device, and then the second PE device forwards the second network packet to the second GW, and the second GW restores the second network packet to the original first network packet, and finally forwards it to the corresponding second CPE.
  • the second GW is configured with the processing capability of the second network packet.
  • the second network packet is encapsulated into a second network packet, and the traffic is diverted to the first PE device, and the second network packet is instructed to be transmitted in the second network based on the path information.
  • the second traffic diversion rule is used to instruct the second GW Replace the second network packet output by the second PE device with the first network packet, and divert the traffic to the second CPE; that is, by selecting the first PE device and the second PE device in the second network, receive path information of the second network packet, and select the first GW closest to the first PE device in the first network, and select the second GW closest to the second PE device in the first network, and The GW configures the encapsulation capability of the second network packet and delivers the first traffic diversion rule, and configures the second network packet processing capability and delivers the second traffic diversion rule to the second GW, so that part of the traffic in the first network can be Introduced into the second network, the services of the second network can be provided in the second network, which facilitates the flexible migration and deployment of the network.
  • the first network includes a software-defined wide area network (SD-WAN), the first network controller includes an SD-WAN controller, and the first network packet includes an SD-WAN packet; the second network packet includes an SD-WAN packet.
  • the network includes a deterministic network DetNet, and the second network message includes a DetNet message.
  • the SD-WAN packet includes a pure IP packet, or an Internet Protocol Security (Internet Protocol Security, IPSEC) packet, and the IPSEC packet includes a transport mode IPSEC packet, or a tunnel mode packet IPSEC packets.
  • Internet Protocol Security Internet Protocol Security
  • the method further includes:
  • the IPSEC encryption template is used to instruct the CPE device to select corresponding key information for its own WAN interface based on the IPSEC encryption module, and
  • the key information is sent to the first network controller; the key information sent by each CPE device is received, and the key information is distributed to each CPE device, and the key information is used to indicate the CPE device.
  • create an IPSEC session wherein, creating an IPSEC session can indicate that the CPE device can transmit IPSEC packets.
  • the method further includes:
  • the level of the first network packet is configured, and the security level is set for the tunnel between the WAN interfaces of the CPE device.
  • FIG. 2 is a flowchart of a service flow configuration method provided by an embodiment of the present application.
  • the first network may be SD-WAN
  • the second network may be DetNet, that is, the method provided by this embodiment. Applied to the scenario of migrating part of SD-WAN traffic into DetNet.
  • the method provided by the embodiment of the present application includes the following steps:
  • S210 Receive edge topology information of DetNet sent by the DetNet controller.
  • S220 Select a first PE device closest to the first CPE and a second PE device closest to the second CPE in DetNet based on the edge topology information.
  • S230 Configure the encapsulation capability of DetNet packets for the first gateway GW in the SD-WAN that is closest to the first PE device.
  • S240 Send a service request to the DetNet controller, where the service request carries information of the first PE device, the second PE device, and service requirement information, and the service request is used to instruct the DetNet controller based on The service requirement information and the information of the first PE device determine the path information of the DetNet message.
  • S250 Receive the path information sent by the DetNet controller.
  • S260 Determine the second GW closest to the second PE device in the SD-WAN, and configure the processing capability of DetNet packets for the second GW.
  • S270 Deliver a first traffic diversion rule to the first GW, and deliver a second traffic diversion rule to the second GW, where the first traffic diversion rule carries the path information and is used to instruct the first GW to use the first traffic diversion rule
  • the SD-WAN packet output by the CPE is encapsulated as a DetNet packet, and the traffic is diverted to the first PE device and instructs the DetNet packet to be transmitted in DetNet based on the path information.
  • the second traffic diversion rule is used to indicate The second GW replaces the DetNet packet output by the second PE device with an SD-WAN packet, and diverts traffic to the second CPE.
  • FIG. 3 is a flowchart of a service flow configuration method provided by an embodiment of the present application.
  • the method may be executed by a service flow configuration apparatus, and the apparatus may be implemented by software and/or hardware, and the apparatus may be configured in On the second network controller, the method can be applied to a scenario in which part of the traffic of the first network is introduced into the second network.
  • the method provided by this embodiment of the present application includes the following steps:
  • S310 Send the edge topology information of the second network to the first network controller, where the edge topology information is used to instruct the first network controller to select the first network from the second network based on the edge topology information
  • the first PE device that is closest to the first CPE of the first network, and the second PE device that is closest to the second CPE in the first network is selected.
  • the second network controller may report edge topology information of the second network to the first network controller, and the first network controller selects the closest CPE to the first CPE in the first network based on the edge topology information.
  • a first PE device in the second network and selecting a second PE device closest to the second CPE in the first network.
  • the first PE device that is closest to the first CPE may be the PE device that is closest to the first CPE or has the least hop count.
  • the second PE device that is closest to the second CPE may be the closest to the second CPE or The PE device with the least hop count.
  • S320 Receive a service request sent by the first network controller, where the service request carries information of the first PE device, the second PE device, and service requirement information.
  • the first network controller sends a service request to the second network controller, and the second network controller receives the service request, where the service request carries the information of the first PE device, the second PE device, and the service Request information.
  • the service requirement information includes: traffic characteristic information cyclic interval, maximum number of packets per cyclic interval, maximum packet length, minimum bandwidth, maximum delay, maximum tolerable delay, Maximum packet loss rate, maximum tolerable packet loss rate and maximum tolerable out-of-order.
  • S330 Determine the path information of the second network packet in the second network based on the service requirement information and the information of the first PE device and the second PE device, and send the path information to the the first network controller.
  • the second network controller determines the path information of the second network packet based on the service requirement information in the service request and the information of the first PE device and the second PE device, and the second network controller sends the path information To the first network controller, the first network controller receives the path information and executes the subsequent steps, as described in the above-mentioned embodiments.
  • the first network includes SD-WAN; the first network controller includes an SD-WAN controller, the second network includes DetNet, and the second network controller includes DetNet controller.
  • FIG. 4 is a flowchart of a service flow configuration method provided by an embodiment of the present application. As shown in FIG. 4 , the method provided by this embodiment includes the following steps:
  • the DetNet controller sends the edge topology information of DetNet to the SD-WAN controller.
  • FIG. 1a For the networking of SD-WAN, refer to Figure 1a.
  • the SD-WAN controller interacts with the DetNet controller, and the DetNet controller reports the edge topology information of DetNet.
  • the structure in the networking involved in the following execution steps can be referred to FIG. 1a.
  • S420 The SD-WAN controller receives the edge topology information of DetNet sent by the DetNet controller.
  • the SD-WAN controller selects a first PE device connected to the first CPE in DetNet based on the edge topology information, and selects a second PE device connected to the second CPE.
  • the SD-WAN controller configures the encapsulation capability of DetNet packets for the first gateway GW in the SD-WAN that is closest to the first PE device.
  • the SD-WAN controller sends a service request to the DetNet controller, wherein the service request carries the information of the first PE device, the second PE device, and service requirement information.
  • the DetNet controller determines the path information of the second network packet in the second network based on the service requirement information and the information of the first PE device and the second PE device, and converts the path information to the second network packet. Sent to the SD-WAN controller.
  • the second PE device acts as an output node in the path information
  • the first PE device acts as an input node in the path information
  • the service requirement information needs to be delivered, that is, the cyclic interval of traffic characteristic information, the maximum number of packets per cyclic interval, the maximum packet length, the minimum bandwidth, the maximum Delay, maximum tolerable delay, maximum packet loss rate, maximum tolerable packet loss rate and maximum tolerable out-of-order, so as to allocate resources to calculate paths.
  • the SD-WAN controller can configure business requests to the DetNet controller through the YANG model. After the DetNet controller receives the service request, it will calculate a DetNet deterministic path according to the service requirement information in the service request. The DetNet controller reports the calculated flow-identifier (Identifier, ID) (identity of a deterministic path) service flow to the SD-WAN controller.
  • S470 The SD-WAN controller receives the path information sent by the DetNet controller.
  • the SD-WAN controller determines the second GW closest to the second PE device in the SD-WAN, and configures the processing capability of DetNet packets for the second GW.
  • the SD-WAN controller After receiving the information reported by the DetNet controller, the SD-WAN controller calculates the second GW closest to the second PE device of DetNet, and installs DetNet packet processing on the corresponding second GW ability.
  • the SD-WAN controller issues a first traffic diversion rule to the first GW, and issues a second traffic diversion rule to the second GW, where the first traffic diversion rule carries the path information and is used to indicate the first traffic diversion rule.
  • a GW encapsulates the SD-WAN packet output by the first CPE into a DetNet packet, diverts traffic to the first PE device, and instructs the DetNet packet to be transmitted in DetNet based on the path information, and the second A traffic diversion rule, used to instruct the second GW to replace the DetNet packet output by the second PE device with an SD-WAN packet, and divert traffic to the second CPE.
  • the SD-WAN controller issues the first traffic diversion rule to the first GW, diverts the packet traffic to the first PE device, and transmits it in DetNet based on the path information.
  • the SD-WAN controller issues the second traffic diversion rule to the second GW, strips off the corresponding DetNet packet encapsulation header, and replaces it with pure SD-WAN packets.
  • the SD-WAN controller can issue the first traffic diversion rule through the YANG model of the network configuration (network configuration, netconf) protocol, or through the Border Gateway Protocol (Border Gateway Protocol, BGP).
  • SD-WAN packets can be pure IP packets, and the matching rule information includes source IP, destination IP, source port, destination port, protocol type, and Differentiated Services Code Point (DSCP) value. It may also be an IPSEC packet, and the security parameter index (Security Parameter Index, SPI) values for different tunnel levels are also different.
  • the BGP flow specification flow specification, flowspec
  • flowspec can be extended.
  • SD-WAN packets are IPSEC packets in transport mode.
  • SD-WAN packet is an IPSEC packet in tunnel mode
  • an IPSEC encryption template is preset on each CPE.
  • Each CPE selects the corresponding key information for its own WAN port according to its own needs, and sends the key information number (egSPI) of the selected WAN port to the SD-WAN controller, and the SD-WAN controller records each key locally.
  • the key information number of the CPE, and the key information number is sent to other CPEs.
  • the SD-WAN controller defines the level of service flow (which can be SD-WAN packets), and sets different security levels for different tunnels between WAN interfaces between CPE devices.
  • the DetNet controller actively connects to the SD-WAN controller, and can report the transmission capability of DetNet and the topology information of the DetNet edge network by means of BGP-Link State (LS). to the SD-WAN controller.
  • BGP-Link State LS
  • the SD-WAN controller selects the first PE device in the nearest DetNet for the first CPE and the second CPE of the nearest DetNet for the second CPE according to the network edge topology information of DetNet reported by the DetNet controller in step (4).
  • the PE device will load the encapsulation capability of the DetNet message on the corresponding nearest first gateway.
  • the SD-WAN controller sends a service request to the DetNet controller.
  • the service request carries information of the first PE device, the second PE device, and service requirement information.
  • the service requirement information that needs to be delivered may include the cyclic interval of flow characteristic information, the maximum number of packets per cyclic interval, the maximum packet length, the minimum bandwidth, The maximum delay, the maximum tolerable delay, the maximum packet loss rate, the maximum tolerable packet loss rate and the maximum tolerable out-of-order, allocate resources to calculate paths.
  • the SD-WAN controller can configure business requests to the DetNet controller through the YANG model.
  • the DetNet controller After the DetNet controller receives the service request, it will calculate a DetNet deterministic path according to the service requirement information and the information of the first PE device and the second PE device. The DetNet controller reports the calculated flow-ID (identity of the deterministic path) to the SD-WAN controller.
  • the SD-WAN controller After receiving the information reported by the DetNet controller in step (6), the SD-WAN controller calculates the second GW closest to the second PE device in DetNet, and installs the DetNet report on the corresponding second GW text processing capability.
  • the SD-WAN controller issues the first traffic diversion rule to the first GW, and diverts the packet traffic to the first PE device. It can be delivered through the YANG model of netconf or through BGP.
  • SD-WAN packets can be pure IP packets, and the matching rule information includes source IP, destination IP, source port, destination port, protocol type, DSCP value, and IPSECSPI.
  • the SD-WAN controller sets the corresponding behavior, that is, diverts the packets to the corresponding DetNet after the packets match, and sets the flow-ID of the corresponding DetNet previously reported by the DetNet controller to the SD-WAN controller.
  • the SD-WAN controller issues the second traffic diversion rule to the second GW, strips off the corresponding DetNet packet encapsulation header, and replaces it with a pure SD-WAN packet.
  • the first GW When a packet with a real deterministic service is to be sent from the first CPE to the first GW, the first GW will encapsulate the packet as a DetNet packet and forward it to the first PE device in the DetNet domain for processing , the first PE device forwards the DetNet message to the second PE device of the corresponding output node in the DetNet according to the deterministic path in the DetNet, and then the second PE device forwards the DetNet message to the second GW, where the DetNet message is at the second GW.
  • the outer tunnel header is decompressed and restored to the original SD-WAN packet, which is finally forwarded to the corresponding second CPE.
  • the method provided by the embodiment of the present application can provide DetNet service in the SD-WAN network, and the method is also applicable to the dynamic migration of the current packet flow to other networks in the SD-WAN network, and the operator no longer perceives the customer end services, facilitating flexible network migration and deployment.
  • FIG. 5 is a structural block diagram of a service configuration apparatus provided by the present application.
  • the apparatus may be configured in a first network controller.
  • the apparatus 500 includes: a selection module 510 and a first configuration module 520 , a receiving module 530 , a second configuration module 540 and a sending module 550 .
  • a selection module 510 configured to select a first operator edge PE device in the second network closest to the first customer premises equipment CPE in the first network, and to select a second operator edge PE device closest to the second CPE in the first network
  • the second PE device in the network the first configuration module 520 is configured to configure the encapsulation capability of the second network packet for the first gateway GW in the first network that is closest to the first PE device;
  • the receiving module 530 is set as the path information of the second network packet sent by the second network controller;
  • the second configuration module 540 is set to determine the second GW closest to the second PE device in the first network, and configure the second network packet processing capability for the second GW;
  • the issuing module 550 is configured to issue a first traffic diversion rule to the first GW, and a second traffic diversion rule to the second GW,
  • the first traffic diversion rule carries the path information and is used to instruct the first GW to encapsulate the first network packet output by the first CPE into a second network packet, and divert
  • the selection module 510 is configured to:
  • edge topology information of a second network sent by a second network controller receiving edge topology information of a second network sent by a second network controller; selecting a first PE device closest to the first CPE based on the edge topology information, and selecting a second PE device closest to the second CPE .
  • the receiving module 530 is configured to:
  • the network controller determines the path information of the second network packet based on the service requirement information and the information of the first PE device and the second PE device; and receives the path information sent by the second network controller.
  • sending the service request to the second network controller includes:
  • a service request configured based on the YANG model is sent to the second network controller.
  • the first network includes a software-defined wide area network (SD-WAN), the first network controller includes an SD-WAN controller, and the first network packet includes an SD-WAN packet; the second network packet includes an SD-WAN packet.
  • the network includes a deterministic network DetNet, and the second network message includes a DetNet message.
  • the business requirement information includes:
  • Traffic characteristic information cyclic interval maximum number of packets per cyclic interval, maximum packet length, minimum bandwidth, maximum delay, maximum tolerable delay, maximum packet loss rate, maximum tolerable packet loss rate and maximum tolerable out-of-order .
  • the SD-WAN packet includes an SD-WAN unencrypted packet, or an Internet Protocol Security IPSEC packet, and the IPSEC packet includes a transport mode IPSEC packet, or a tunnel mode IPSEC packet Arts.
  • the apparatus further includes:
  • the template sending module is configured to send a preset IPSEC encryption template to each CPE device in the first network, and the IPSEC encryption template is used to instruct the CPE device to select a corresponding WAN interface based on the IPSEC encryption module. and send the key information to the first network controller;
  • the session creation module is configured to receive the key information sent by each CPE device, and distribute the key information to each CPE equipment, the key information is used to instruct the CPE equipment to create an IPSEC session.
  • the apparatus further includes a level configuration module, configured to configure the level of the first network packet, and set a security level for the tunnel between the WAN interfaces of the CPE device.
  • the above apparatus can execute the method provided by any embodiment of the present application, and has functional modules and effects corresponding to the execution method.
  • the apparatus 600 may be configured with a second network controller, and the apparatus 600 includes an information sending module 610 , a request receiving module 620 and an information determining module 630 .
  • the information sending module 610 is configured to send edge topology information of the second network to the first network controller, where the edge topology information is used to instruct the first network controller to select a connection with the first network based on the edge topology information
  • the first PE device in the second network closest to the first CPE in the first network selects the second PE device closest to the second CPE in the first network
  • the request receiving module 620 is configured to receive the first network controller
  • the service request sent, the service request carries the information of the first PE device and the second PE device and service requirement information
  • the information determination module 630 is configured to be based on the service requirement information and the first PE device and the service requirement information. and the information of the second PE device, determine the path information of the second network packet in the second network, and send the path information to the first network controller.
  • the first network includes SD-WAN; the first network controller includes an SD-WAN controller, the second network includes DetNet, and the second network controller includes DetNet controller.
  • the above apparatus can execute the method provided by any embodiment of the present application, and has functional modules and effects corresponding to the execution method.
  • FIG. 7 is a schematic structural diagram of a service flow configuration device provided by an embodiment of the present application.
  • the device provided by the present application includes one or more A processor 121 and a memory 122; the number of processors 121 in the device can be one or more, and one processor 121 is taken as an example in FIG. 7; the memory 122 is used to store one or more programs; the one or more programs Executed by the one or more processors 121, so that the one or more processors 121 implement the methods described in the embodiments of the present application.
  • the device also includes: a communication device 123 , an input device 124 and an output device 125 .
  • the processor 121 , the memory 122 , the communication device 123 , the input device 124 , and the output device 125 in the device may be connected by a bus or in other ways, and the connection by a bus is taken as an example in FIG. 7 .
  • the input device 124 may be used to receive input numerical or character information, and to generate key signal input related to user settings and function control of the device.
  • the output device 125 may include a display device such as a display screen.
  • the communication device 123 may include a receiver and a transmitter.
  • the communication device 123 is configured to transmit and receive information according to the control of the processor 121 .
  • the memory 122 can be configured to store software programs, computer-executable programs, and modules, such as program instructions/modules corresponding to the timing parameter determination method described in the embodiments of the present application (for example, as shown in FIG. 5 ).
  • the memory 122 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created according to the use of the device, and the like.
  • memory 122 may include high-speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device.
  • memory 122 may include memory located remotely from processor 121, which may be connected to the device through a network. Examples of such networks include, but are not limited to, the Internet, an intranet, a local area network, a mobile communication network, and combinations thereof.
  • An embodiment of the present application provides a computer-readable storage medium, where one or more programs are stored in the computer-readable storage medium, and the one or more programs can be executed by one or more processors as follows:
  • the second GW issues a second traffic diversion rule, wherein the first traffic diversion rule carries the path information and is used to instruct the first GW to encapsulate the first network packet output by the first CPE into a second network packet, and divert traffic to the first PE device and instruct the second network packet to be transmitted in the second network based on the path information.
  • the second traffic diversion rule is used to instruct the second GW to transfer the second traffic to the second network.
  • the second network packet output by the PE device is replaced with the first network packet, and the traffic is diverted to the second CPE.
  • the first PE device in the second network selects the second PE device closest to the second CPE in the first network; receives a service request sent by the first network controller, where the service request carries the first PE device and the information of the second PE device and service requirement information; determining the path of the second network packet in the second network based on the service requirement information and the information of the first PE device and the second PE device information, and send the path information to the first network controller.
  • the division between functional modules/units mentioned in the above description does not necessarily correspond to the division of physical components; for example, one physical component may have multiple functions, or one function or step may be composed of several physical components Components execute cooperatively.
  • Some or all physical components may be implemented as software executed by a processor, such as a central processing unit, digital signal processor or microprocessor, or as hardware, or as an integrated circuit, such as an application specific integrated circuit .
  • Such software may be distributed on computer-readable media, which may include computer storage media (or non-transitory media) and communication media (or transitory media).
  • Computer storage media includes volatile and nonvolatile, removable and non-removable implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data medium.
  • Computer storage media include but are not limited to random access memory (Random Access Memory, RAM), read-only memory (Read-Only Memory, ROM), electrically erasable programmable read-only memory (Electrically Erasable Programmable Read-Only Memory, EEPROM) , Flash memory or other memory technology, Compact Disc Read-Only Memory (CD-ROM), Digital Versatile Disc (DVD) or other optical disk storage, magnetic cartridge, tape, disk storage or other magnetic A storage device, or any other medium that can be used to store desired information and that can be accessed by a computer.
  • Communication media typically embodies computer readable instructions, data structures, program modules, or other data in a modulated data signal such as a carrier wave or other transport mechanism, and can include any information delivery media.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Quality & Reliability (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

本文公开了一种业务流配置方法、设备及存储介质。该方法包括:选择与第一网络中的第一CPE最近的第二网络中的第一PE设备,选择与第一网络中的第二CPE最近的第二网络中的第二PE设备;对与第一PE设备最近的第一GW,配置第二网络报文的封装能力;接收第二网络报文的路径信息;确定与第二PE设备最近的第二GW,对第二GW配置第二网络报文的处理能力;向第一GW下发第一引流规则,向第二GW下发第二引流规则,第一引流规则携带路径信息,用于指示第一GW将第一CPE输出的第一网络报文封装为第二网络报文,引流至第一PE设备以及指示第二网络报文基于路径信息在第二网络中传输,第二引流规则,用于指示第二GW将第二网络报文替换成第一网络报文,引流至第二CPE。

Description

业务流配置方法、设备及存储介质 技术领域
本申请涉及通信领域,例如涉及一种业务流配置方法、设备及存储介质
背景技术
随着物联网和第五代移动通信网络(5th Generation mobile communication networks,5G)的大力发展,客户端的网络也通常会随着网络中业务发展的需求存在部分业务有特定的需求的情况,例如,对部分业务有确定性的需求,因此,有必要实现在网络业务的基础上提供特定业务流的服务。
发明内容
本申请提供了一种业务流配置方法、设备及存储介质,可以将第一网络中的部分流量引入到第二网络中。
本申请实施例提供了一种业务流配置方法,所述方法应用于第一网络控制器,所述方法包括:
选择与第一网络中的第一客户端设备CPE最近的第二网络中的第一运营商边缘PE设备,以及选择与第一网络中的第二CPE最近的第二网络中的第二PE设备;对所述第一网络中的与第一PE设备最近的第一网关(Gate Way,GW),配置第二网络报文的封装能力;接收第二网络控制器发送的第二网络报文的路径信息;在所述第一网络中确定与所述第二PE设备最近的第二GW,并对所述第二GW配置第二网络报文的处理能力;向第一GW下发第一引流规则,并向所述第二GW下发第二引流规则,其中,第一引流规则携带所述路径信息,用于指示所述第一GW将第一CPE输出的第一网络报文封装为第二网络报文,并引流至所述第一PE设备以及指示所述第二网络报文基于所述路径信息在第二网络中传输,所述第二引流规则,用于指示所述第二GW将所述第二PE设备输出的所述第二网络报文替换成第一网络报文,并引流至第二CPE。
本申请实施例还提供了一种业务流配置方法,所述方法应用于第二网络控制器,所述方法包括:
向第一网络控制器发送第二网络的边缘拓扑信息,所述边缘拓扑信息,用于指示所述第一网络控制器基于所述边缘拓扑信息在第二网络中选择与第一网络中的第一CPE最近的第一PE设备,选择与第一网络中的第二CPE最近的第 二PE设备;接收所述第一网络控制器发送的业务请求,所述业务请求中携带第一PE设备和第二PE设备的信息以及业务要求信息;基于所述业务要求信息以及所述第一PE设备和所述第二PE设备的信息,确定在所述第二网络中的第二网络报文的路径信息,并将所述路径信息发送至所述第一网络控制器。
本申请实施例还提供了一种业务流配置设备,所述设备包括存储器、处理器、存储在所述存储器上并可在所述处理器上运行的程序以及用于实现所述处理器和所述存储器之间的连接通信的数据总线,所述程序被所述处理器执行时实现如本申请提供的方法。
本申请实施例还提供了一种存储介质,用于计算机可读存储,其中,所述存储介质存储有一个或者多个程序,所述一个或者多个程序可被一个或者多个处理器执行,以本申请提供的方法。
本申请实施例提供的技术方案,通过选择与第一CPE最近的第二网络中的第一PE设备以及与第二CPE最近的第二PE设备,并对与第一PE设备最近的第一GW配置第二网络报文的封装能力,通过在第二网络中确定第二网络报文的路径信息并确定与第二PE设备最近的第二GW,对第二GW配置第二网络报文的处理能力,通过向第一GW下发第一引流规则,并向第二GW下发第二引流规则,其中,第一引流规则,用于指示所述第一GW将第一CPE输出的第一网络报文封装为第二网络报文,并引流至第一PE设备以及指示第二网络报文基于路径信息在第二网络中传输,第二引流规则,用于指示所述第二GW将所述第二PE设备输出的所述第二网络报文替换成第一网络报文,并引流至第二CPE;即通过选择第二网络中的第一PE设备以及第二PE设备,接收第二网络报文的路径信息,并在第一网络中选择与第一PE设备最近的第一GW,以及在第一网络中选择与第二PE设备最近的第二GW,以及通过对第一GW配置第二网络报文的封装能力和下发第一引流规则,并通过对第二GW配置第二网络报文的处理能力和下发第二引流规则,可以将第一网络中的部分流量引入到第二网络中,可以在第二网络中提供第二网络的服务,方便网络的灵活迁移和部署。
附图说明
图1a是本申请实施例提供的SD-WAN的组网图;
图1b是本申请实施例提供的一种业务流配置方法的流程图;
图2是本申请实施例提供的一种业务流配置方法的流程图;
图3是本申请实施例提供的一种业务流配置方法的流程图;
图4是本申请实施例提供的一种业务流配置方法的流程图;
图5是本申请实施例提供的一种业务流配置装置的结构框图;
图6是本申请实施例提供的一种业务流配置装置的结构框图;
图7是本申请实施例提供的一种业务流配置设备的结构示意图。
具体实施方式
随着物联网和第五代移动通信网络(5th Generation mobile communication networks,5G)的大力发展,客户端的网络也通常会随着网络中业务发展的需求存在部分业务有特定的需求的情况,例如,对部分业务有确定性的需求,因此有必要实现在网络业务的基础上提供特定业务流的服务。
软件定义广域网(Software Defined Wide Area Network,SD-WAN)已普遍应用于企业分支跟企业分支,企业分支跟企业总部之间的网络。SD-WAN是一种overlay上的网络,它通常在企业分支侧部署客户端设备(Customer Premises Equipment,CPE)。
通常SD-WAN是在客户端部署CPE,要实现CPE之间的通信,通常在骨干网的业务呈现节点(Point of Present,POP)上部署SD-WAN网关接入多协议标签交换(Multi-Protocol Label Switching,MPLS)网络。SD-WAN网关通常以软件的方式部署在运营商边缘(Provider Edge,PE)设备上。组网如图1a所示。
确定性网络(Deterministic Network,DetNet)是国际互联网工程任务组(The Internet Engineering Task Force,IETF)于2015年提出的基于互联网协议(Internet Protocol,IP)/MPLS的网络实现的三层网络。随着物联网和5G的大力发展,客户侧的网络也通常会随着业务发展的需求存在部分业务有确定性需求的情况,因此,有必要实现在SD-WAN的网络业务的基础上提供确定性业务流的服务。
图1b是本申请实施例提供的一种业务流配置方法的流程图,所述方法可以由业务流配置装置来执行,所述装置可以由软件和/或硬件来实现,所述装置可以配置在第一网络控制器上,所述方法可以应用于将第一网络的部分流量引入到第二网络中的场景中,如图1b所示,本申请实施例提供的方法包括如下步骤:
S110:选择与第一网络中的第一客户端设备CPE最近的第二网络中的第一运营商边缘PE设备,以及选择与第一网络中的第二CPE最近的第二网络中的第二PE设备。
在本申请实施例中,第一网络可以是SD-WAN,还可以是其他网络,第二网络可以是DetNet,还可以是其他网络。
在一个示例性的实施方式中,所述选择与第一网络中的第一客户端设备CPE最近的第二网络中的第一运营商边缘PE设备,以及选择与第一网络中的第 二CPE最近的第二网络中的第二PE设备,包括:接收第二网络控制器发送的第二网络的边缘拓扑信息;基于所述边缘拓扑信息选择与所述第一CPE最近的第一PE设备,以及选择与所述第二CPE最近的第二PE设备。
与第一CPE最近的第一PE设备可以是与第一CPE距离最近的PE设备,或者也可以是与第一CPE跳数最少的PE设备。相应的,与第二CPE最近的第二PE设备可以是与第二CPE距离最近或者跳数最少的PE设备。
S120:对所述第一网络中的与第一PE设备最近的第一网关GW,配置第二网络报文的封装能力。
在本申请实施例中,第一网关GW可以是SD-WAN网关,第一网关可以作为一个逻辑块部署在第一PE设备上,或者也可以部署在其他设备上,且与第一PE设备分离。
在一个示例性的实施方式中,与第一PE设备最近的第一GW,可以是与第一PE设备距离最近的网关,或者也可以是与第一PE设备的跳数最少的网关。
在一个示例性的实施方式中,对第一GW配置第二网络报文的封装能力,可以是对第一GW配置将第一网络报文封装为第二网络报文的能力。
S130:接收第二网络控制器发送的第二网络报文的路径信息。
在一个示例性的实施方式中,所述接收第二网络控制器发送的的第二网络报文的路径信息,包括:向第二网络控制器发送业务请求,其中,所述业务请求中携带所述第一PE设备、第二PE设备的信息以及业务要求信息,所述业务请求,用于指示所述第二网络控制器基于所述业务要求信息、所述第一PE设备和第二PE设备的信息确定第二网络报文的路径信息;接收所述第二网络控制器发送的所述路径信息。
第一网络控制器可以向第二网络控制器发送业务请求,业务请求中携带第一PE设备、第二PE设备的信息以及业务要求信息,第二网络控制器接收到该业务请求,基于该业务请求中的业务要求信息、第一PE设备和第二PE设备的信息确定第二网络报文的路径信息,第二网络控制器将路径信息发送至第一网络控制器,第一网络控制器接收该路径信息。其中,第一网络控制器接收的路径信息可以是路径的标识信息。
在一个示例性的实施方式中,向第二网络控制器发送业务请求,包括:向第二网络控制器发送基于YANG模型配置的业务请求。
在一个示例性的实施方式中,所述业务要求信息包括:流量特性信息循环间隔、每个循环间隔的最大报文数、最大报文长度、最小带宽、最大时延、最大可容忍时延、最大丢包率,最大可容忍丢包率和最大容忍乱序。
S140:在所述第一网络中确定与所述第二PE设备最近的第二GW,并对所述第二GW配置第二网络报文的处理能力。
在一个示例性的实施方式中,第二GW可以作为逻辑组件部署在第二PE设备上,或者可以部署在其他设备上,且与第二PE设备分离。
在一个示例性的实施方式中,与第二PE设备最近的第二GW可以是与第二PE距离最近,或者跳数最少的网关。
在一个示例的实施方式中,对第二GW配置第二网络报文的处理能力可以包括对第二GW配置可以将第二网络报文转换成第一网络报文的能力。
S150:向第一GW下发第一引流规则,并向所述第二GW下发第二引流规则,其中,第一引流规则携带所述路径信息,用于指示所述第一GW将第一CPE输出的第一网络报文封装为第二网络报文,并引流至第一PE设备,以及指示所述第二网络报文基于所述路径信息在第二网络中传输,所述第二引流规则,用于指示所述第二GW将所述第二PE设备输出的所述第二网络报文替换成第一网络报文,并引流至第二CPE。
在本实施例中,第一引流规则中携带所述路径信息,第一网关可以基于第一引流规则将第一CPE输出的第一网络报文封装为第二网络报文,并引流至第一PE设备,第二网络报文基于第一引流规则中携带的路径信息在第二网络中进行传输,直至传输至第二PE设备。
在本实施例中,在有业务流的第一网络报文要从第一CPE到第一GW的情况下,第一GW就会将此报文封装为第二网络报文,并且转发给第二网络中的第一PE设备处理,第一PE设备根据第二网络中确定的第二网络报文的路径信息将第二网络报文转发到对应的第二网络中作为输出节点的第二PE设备,然后由第二PE设备将第二网络报文转发给第二GW,第二GW将第二网络报文还原成原来的第一网络报文,最终转发到对应的第二CPE上。
本申请实施例提供的方法,通过选择与第一CPE最近的第二网络中的第一PE设备以及与第二CPE最近的第二PE设备,并对与第一PE设备最近的第一GW配置第二网络报文的封装能力,通过在第二网络中确定第二网络报文的路径信息并确定与第二PE设备最近的第二GW,对第二GW配置第二网络报文的处理能力,通过向第一GW下发第一引流规则,并向第二GW下发第二引流规则,其中,第一引流规则,用于指示所述第一GW将第一CPE输出的第一网络报文封装为第二网络报文,并引流至第一PE设备以及指示所述第二网络报文基于所述路径信息在第二网络中传输,第二引流规则,用于指示所述第二GW将所述第二PE设备输出的所述第二网络报文替换成第一网络报文,并引流至第二CPE; 即通过选择第二网络中的第一PE设备以及第二PE设备,接收第二网络报文的路径信息,并在第一网络中选择与第一PE设备最近的第一GW,以及在第一网络中选择与第二PE设备最近的第二GW,以及通过对第一GW配置第二网络报文的封装能力和下发第一引流规则,并通过对第二GW配置第二网络报文的处理能力和下发第二引流规则,可以将第一网络中的部分流量引入到第二网络中,可以在第二网络中提供第二网络的服务,方便网络的灵活迁移和部署。
在一个示例性的实施方式中,第一网络包括软件定义广域网SD-WAN,所述第一网络控制器包括SD-WAN控制器,第一网络报文包括SD-WAN报文;所述第二网络包括确定性网络DetNet,第二网络报文包括DetNet报文。
在一个示例性的实施方式中,所述SD-WAN报文包括纯IP报文,或者互联网协议安全(Internet Protocol Security,IPSEC)报文,IPSEC报文包括传输模式的IPSEC报文,或者隧道模式的IPSEC报文。
在一个示例性的实施方式中,所述方法还包括:
向所述第一网络中的各个CPE设备发送预置的IPSEC加密模板,所述IPSEC加密模板,用于指示CPE设备基于所述IPSEC加密模块为自身的WAN接口选择对应的密钥信息,并将所述密钥信息发送至所述第一网络控制器;接收各个CPE设备发送的密钥信息,并将所述密钥信息分发至各个CPE设备,所述密钥信息,用于指示CPE设备之间创建IPSEC会话。其中,创建IPSEC会话,可以指示CPE设备可以传输IPSEC报文。
在一个示例性的实施方式中,所述方法还包括:
对所述第一网络报文的等级进行配置,并对CPE设备的WAN接口之间的隧道设置安全等级。
图2是本申请实施例提供的一种业务流配置方法的流程图,在本实施例中,第一网络可以是SD-WAN,第二网络可以是DetNet,即本实施例提供的所述方法应用于将SD-WAN部分流量迁移到DetNet中的场景中。
如图2所示,本申请实施例提供的方法包括如下步骤:
S210:接收DetNet控制器发送的DetNet的边缘拓扑信息。
S220:基于所述边缘拓扑信息在DetNet中选择与所述第一CPE最近的第一PE设备和与第二CPE最近的第二PE设备。
S230:对所述SD-WAN中的与第一PE设备最近的第一网关GW,配置DetNet报文的封装能力。
S240:向DetNet控制器发送业务请求,其中,所述业务请求中携带所述第一PE设备、第二PE设备的信息以及业务要求信息,所述业务请求,用于指示所述DetNet控制器基于所述业务要求信息以及所述第一PE设备的信息确定DetNet报文的路径信息。
S250:接收所述DetNet控制器发送的所述路径信息。
S260:在所述SD-WAN中确定与所述第二PE设备最近的第二GW,并对所述第二GW配置DetNet报文的处理能力。
S270:向第一GW下发第一引流规则,并向所述第二GW下发第二引流规则,其中,第一引流规则携带所述路径信息,用于指示所述第一GW将第一CPE输出的SD-WAN报文封装为DetNet报文,并引流至所述第一PE设备以及指示所述DetNet报文基于所述路径信息在DetNet中传输,所述第二引流规则,用于指示所述第二GW将所述第二PE设备输出的所述DetNet报文替换成SD-WAN报文,并引流至第二CPE。
图3是本申请实施例提供的一种业务流配置方法的流程图,所述方法可以由业务流配置装置来执行,所述装置可以由软件和/或硬件来实现,所述装置可以配置在第二网络控制器上,所述方法可以应用于将第一网络的部分流量引入到第二网络中的场景中,如图3所示,本申请实施例提供的方法包括如下步骤:
S310:向第一网络控制器发送第二网络的边缘拓扑信息,所述边缘拓扑信息,用于指示所述第一网络控制器基于所述边缘拓扑信息在第二网络中选择与第一网络中的第一CPE最近的第一PE设备,选择与第一网络中的第二CPE最近的第二PE设备。
在本实施例中,第二网络控制器可以将第二网络的边缘拓扑信息上报给第一网络控制器,第一网络控制器基于该边缘拓扑信息选择与第一网络中的第一CPE最近的第二网络中的第一PE设备,以及选择与第一网络中的第二CPE最近的第二PE设备。其中,与第一CPE最近的第一PE设备可以是与第一CPE距离最近或者跳数最少的PE设备,相应的,与第二CPE最近的第二PE设备可以是与第二CPE距离最近或者跳数最少的PE设备。
S320:接收所述第一网络控制器发送的业务请求,所述业务请求中携带第一PE设备、第二PE设备的信息以及业务要求信息。
在本实施例中,第一网络控制器向第二网络控制器发送业务请求,第二网络控制器接收该业务请求,其中,业务请求中携带第一PE设备、第二PE设备的信息以及业务要求信息。
在一个示例性的实施方式中,所述业务要求信息包括:流量特性信息循环间隔、每个循环间隔的最大报文数、最大报文长度、最小带宽、最大时延、最大可容忍时延、最大丢包率,最大可容忍丢包率和最大容忍乱序。
S330:基于所述业务要求信息、所述第一PE设备和第二PE设备的信息,确定在所述第二网络中的第二网络报文的路径信息,并将所述路径信息发送至所述第一网络控制器。
在本实施例中,第二网络控制器基于业务请求中的业务要求信息、第一PE设备和第二PE设备的信息确定第二网络报文的路径信息,第二网络控制器将路径信息发送至第一网络控制器,第一网络控制器接收该路径信息,执行后续的步骤,可以详见上述的实施例。
在一个示例性的实施方式中,所述第一网络包括SD-WAN;所述第一网络控制器包括SD-WAN控制器,所述第二网络包括DetNet,所述第二网络控制器包括DetNet控制器。
图4是本申请实施例提供的一种业务流配置方法的流程图,如图4所示,本实施例提供的方法包括如下步骤:
S410:DetNet控制器向SD-WAN控制器发送DetNet的边缘拓扑信息。
SD-WAN的组网可以参考图1a,SD-WAN控制器和DetNet控制器交互,DetNet控制器上报DetNet的边缘拓扑信息。其中,下述执行步骤中涉及的组网中结构情况可以参考图1a。
S420:SD-WAN控制器接收DetNet控制器发送的DetNet的边缘拓扑信息。
S430:SD-WAN控制器基于所述边缘拓扑信息在DetNet中选择与所述第一CPE连接的第一PE设备,选择与所述第二CPE连接的第二PE设备。
S440:SD-WAN控制器对所述SD-WAN中的与第一PE设备最近的第一网关GW,配置DetNet报文的封装能力。
S450:SD-WAN控制器向DetNet控制器发送业务请求,其中,所述业务请求中携带所述第一PE设备、第二PE设备的信息以及业务要求信息。
S460:DetNet控制器基于所述业务要求信息、所述第一PE设备和第二PE设备的信息,确定在所述第二网络中的第二网络报文的路径信息,并将所述路径信息发送至所述SD-WAN控制器。
第二PE设备作为所述路径信息中的输出节点,所述第一PE设备作为所述路径信息中的输入节点。
可以根据草案draft-ietf-detnet-flow-information-model中描述,需要下发业务要求信息,即流量特性信息循环间隔、每个循环间隔的最大报文数、最大报文长度、最小带宽、最大时延、最大可容忍时延、最大丢包率,最大可容忍丢包率和最大容忍乱序,从而分配资源计算路径。SD-WAN控制器可通过YANG模型将业务请求配置到DetNet控制器。DetNet控制器收到该业务请求后,会根据业务请求中的业务要求信息计算出一条DetNet的确定性路径。DetNet控制器将计算出flow-标识(Identifier,ID)(确定性路径的标识)业务流报给SD-WAN控制器。
S470:SD-WAN控制器接收所述DetNet控制器发送的所述路径信息。
S480:SD-WAN控制器在SD-WAN中确定与第二PE设备最近的第二GW,并对所述第二GW配置DetNet报文的处理能力。
在本实施例中,SD-WAN控制器在接收到DetNet控制器上报的信息后,计算出离DetNet的第二PE设备最近的第二GW,并在对应的第二GW上安装DetNet报文处理能力。
S490:SD-WAN控制器向第一GW下发第一引流规则,并向所述第二GW下发第二引流规则,其中,第一引流规则携带所述路径信息,用于指示所述第一GW将第一CPE输出的SD-WAN报文封装为DetNet报文,并引流至所述第一PE设备以及指示所述DetNet报文基于所述路径信息在DetNet中进行传输,所述第二引流规则,用于指示所述第二GW将所述第二PE设备输出的所述DetNet报文替换成SD-WAN报文,并引流至第二CPE。
在本实施例中,SD-WAN控制器下发第一引流规则到第一GW上,将报文流量引流到第一PE设备上,并基于路径信息在DetNet中传输。SD-WAN控制器下发第二引流规则到第二GW上,将对应的DetNet报文封装头剥掉,替换成纯SD-WAN的报文。
SD-WAN控制器可以通过网络配置(network configuration,netconf)协议的YANG模型下发第一引流规则,也可以通过边界网关协议(Border Gateway Protocol,BGP)下发。SD-WAN报文可以是纯IP报文,匹配规则信息包括源IP、目的IP、源端口、目的端口、协议类型、差分服务代码点(Differentiated Services CodePoint,DSCP)值。也有可能是IPSEC报文,针对不同的隧道等级的安全参数索引(Security Parameter Index,SPI)值也不同。此时可以扩展BGP流规格(flow specification,flowspec)。
在SD-WAN报文是传输模式的IPSEC报文的情况下。
在rfc5575bis的网络层可达信息(Network Layer Reachability Information, NLRI)Value Encoding中扩展type 13-IpsecSpi
Encoding:<type(1octet),[op,value]+>
定义一个列表{operator,value}对用来匹配IpsecSpi,Value可以被编码为4-byte。
在SD-WAN报文是隧道模式的IPSEC报文的情况下:
按照草案draft-ietf-idr-flowspec-nvo3中描述的信息匹配外层IP头,隧道头认证头标(Authentication Header,AH)或封装安全载荷(Encapsulating Security Payload,ESP)或者AH+ESP匹配。
在draft-ietf-idr-flowspec-nvo3中,增加扩展:
Type 6-IPsec-Spi
Encoding:<type(1octet),[op,value]+>
定义一个列表{operator,value}对用来匹配IpsecSpi。Value可以被编码为4-byte。
并设置对应的行为,即在报文匹配后将报文引流到对应的DetNet中,设置之前由DetNet控制器上报到SD-WAN控制器的对应的DetNet中的flow-ID。
本申请实施例提供的技术方案包括如下步骤:
(1)在SD-WAN中,在各个CPE上预置IPSEC加密模板。由各个CPE根据自己的需求为自身的WAN口选择对应的密钥信息,并将选择的WAN口的密钥信息编号(e.g.SPI)发送给SD-WAN控制器,SD-WAN控制器本地记录各个CPE的密钥信息编号,并将该密钥信息编号发送给其他CPE。
(2)CPE之间根据SD-WAN控制器下发的密钥信息编号在各个WAN口上建立IPSEC会话。
(3)SD-WAN控制器定义业务流(可以是SD-WAN报文)的等级,并对CPE设备的之间的WAN接口之间的不同隧道设置不同的安全等级。
(4)部署DetNet成功后,DetNet控制器主动连接SD-WAN控制器,可以通过BGP-链路状态(Link State,LS)的方式,上报具有DetNet的传输能力,并上报DetNet边缘网络的拓扑信息到SD-WAN控制器。
(5)SD-WAN控制器根据步骤(4)DetNet控制器上报的DetNet的网络边缘拓扑信息,为第一CPE选择最近的DetNet中的第一PE设备和第二CPE选择最近的DetNet的第二PE设备,并将对应的最近的第一网关上加载DetNet报文 的封装能力。
(6)SD-WAN控制器下发业务请求给DetNet控制器。该业务请求中携带第一PE设备、第二PE设备的信息和业务要求信息。根据草案draft-ietf-detnet-flow-information-model中描述,需要下发的业务要求信息可以包括,流量特性信息循环间隔、每个循环间隔的最大报文数、最大报文长度、最小带宽、最大时延、最大可容忍时延、最大丢包率,最大可容忍丢包率和最大容忍乱序,分配资源计算路径。SD-WAN控制器可通过YANG模型将业务请求配置到DetNet控制器。
DetNet控制器收到业务请求后,会根据业务要求信息、第一PE设备和第二PE设备的信息计算出一条DetNet的确定性路径。DetNet控制器将计算出的flow-ID(确定性路径的标识)上报给SD-WAN控制器。
(7)SD-WAN控制器在收到步骤(6)中DetNet控制器上报的信息后,计算出离DetNet中第二PE设备最近的第二GW,并在对应的第二GW上安装DetNet报文处理能力。
(8)SD-WAN控制器下发第一引流规则到第一GW上,将报文流量引流到第一PE设备上。可以通过netconf的YANG模型下发,也可以通过BGP下发。SD-WAN报文可以是纯IP报文,匹配规则信息包括源IP、目的IP、源端口、目的端口、协议类型、DSCP值,IPSECSPI。SD-WAN控制器并设置对应的行为,即在报文匹配后将报文引流到对应的DetNet中,设置之前由DetNet控制器上报到SD-WAN控制器的对应的DetNet的flow-ID。
(9)SD-WAN控制器下发第二引流规则到第二GW上,将对应的DetNet报文封装头剥掉,替换成纯SD-WAN报文。
(10)当真正有确定性业务的报文要从第一CPE到第一GW时,第一GW就会将此报文封装为DetNet报文,并且转发给DetNet域中的第一PE设备处理,第一PE设备根据DetNet内的确定性路径转发到对应的DetNet内的输出节点第二PE设备,然后由第二PE设备将DetNet报文转发给第二GW,在第二GW处DetNet报文将解外层隧道头,并还原成原来的SD-WAN报文,最终转发到对应的第二CPE上。
本申请实施例提供的方法,可以在SD-WAN的网络提供DetNet服务,该方法同样适用于在SD-WAN的网络中将当前的报文流动态迁移到其他网络,运营商不再感知到客户端的业务,方便网络的灵活迁移和部署。
图5是本申请提供的一种业务配置装置的结构框图,所述装置可以配置在 第一网络控制器中,如图5所示,所述装置500包括:选择模块510、第一配置模块520、接收模块530、第二配置模块540和下发模块550。
选择模块510,被设置为选择与第一网络中的第一客户端设备CPE最近的第二网络中的第一运营商边缘PE设备,以及选择与第一网络中的第二CPE最近的第二网络中的第二PE设备;第一配置模块520,被设置为对所述第一网络中的与第一PE设备最近的第一网关GW,配置第二网络报文的封装能力;接收模块530,被设置为第二网络控制器发送的第二网络报文的路径信息;第二配置模块540,被设置为在所述第一网络中确定与所述第二PE设备最近的第二GW,并对所述第二GW配置第二网络报文的处理能力;下发模块550,被设置为向第一GW下发第一引流规则,并向所述第二GW下发第二引流规则,其中,第一引流规则携带所述路径信息,用于指示所述第一GW将第一CPE输出的第一网络报文封装为第二网络报文,并引流至所述第一PE设备以及指示所述第二网络报文基于所述路径信息在第二网络中传输,所述第二引流规则,用于指示所述第二GW将所述第二PE设备输出的所述第二网络报文替换成第一网络报文,并引流至第二CPE。
在一个示例性的实施方式中,选择模块510,被设置为:
接收第二网络控制器发送的第二网络的边缘拓扑信息;基于所述边缘拓扑信息选择与所述第一CPE最近的第一PE设备,以及选择与所述第二CPE最近的第二PE设备。
在一个示例性的实施方式中,接收模块530,被设置为:
向第二网络控制器发送业务请求,其中,所述业务请求中携带所述第一PE设备、所述第二PE设备的信息以及业务要求信息,所述业务请求,用于指示所述第二网络控制器基于所述业务要求信息、所述第一PE设备和所述第二PE设备的信息确定第二网络报文的路径信息;接收所述第二网络控制器发送的所述路径信息。
在一个示例性的实施方式中,向第二网络控制器发送业务请求,包括:
向第二网络控制器发送基于YANG模型配置的业务请求。
在一个示例性的实施方式中,第一网络包括软件定义广域网SD-WAN,所述第一网络控制器包括SD-WAN控制器,第一网络报文包括SD-WAN报文;所述第二网络包括确定性网络DetNet,第二网络报文包括DetNet报文。
在一个示例性的实施方式中,所述业务要求信息包括:
流量特性信息循环间隔、每个循环间隔的最大报文数、最大报文长度、最小带宽、最大时延、最大可容忍时延、最大丢包率,最大可容忍丢包率和最大 容忍乱序。
在一个示例性的实施方式中,所述SD-WAN报文包括SD-WAN非加密报文,或者互联网协议安全IPSEC报文,IPSEC报文包括传输模式的IPSEC报文,或者隧道模式的IPSEC报文。
在一个示例性的实施方式中,所述装置还包括:
模板发送模块,被设置为向所述第一网络中的各个CPE设备发送预置的IPSEC加密模板,所述IPSEC加密模板,用于指示CPE设备基于所述IPSEC加密模块为自身的WAN接口选择对应的密钥信息,并将所述密钥信息发送至所述第一网络控制器;会话创建模块,被设置为接收各个CPE设备发送的密钥信息,并将所述密钥信息分发至各个CPE设备,所述密钥信息,用于指示CPE设备之间创建IPSEC会话。
在一个示例性的实施方式中,所述装置还包括等级配置模块,被设置为对所述第一网络报文的等级进行配置,并对CPE设备的WAN接口之间的隧道设置安全等级。
上述装置可执行本申请任意实施例所提供的方法,具备执行方法相应的功能模块和效果。
图6是本申请实施例提供的一种业务流配置装置的结构框图,所述装置600可以配置第二网络控制器,所述装置600包括信息发送模块610,请求接收模块620和信息确定模块630。
信息发送模块610,被设置为向第一网络控制器发送第二网络的边缘拓扑信息,所述边缘拓扑信息,用于指示所述第一网络控制器基于所述边缘拓扑信息选择与第一网络中的第一CPE最近的第二网络中的第一PE设备,选择与第一网络中的第二CPE最近的第二PE设备;请求接收模块620,被设置为接收所述第一网络控制器发送的业务请求,所述业务请求中携带第一PE设备和第二PE设备的信息以及业务要求信息;信息确定模块630,被设置为基于所述业务要求信息以及所述第一PE设备和所述第二PE设备的信息,确定在所述第二网络中的第二网络报文的路径信息,并将所述路径信息发送至所述第一网络控制器。
在一个示例性的实施方式中,所述第一网络包括SD-WAN;所述第一网络控制器包括SD-WAN控制器,所述第二网络包括DetNet,所述第二网络控制器包括DetNet控制器。
上述装置可执行本申请任意实施例所提供的方法,具备执行方法相应的功能模块和效果。
本申请实施例还提供了一种业务流配置设备,图7是本申请实施例提供的一种业务流配置设备的结构示意图,如图7所示,本申请提供的设备,包括一个或多个处理器121和存储器122;该设备中的处理器121可以是一个或多个,图7中以一个处理器121为例;存储器122用于存储一个或多个程序;所述一个或多个程序被所述一个或多个处理器121执行,使得所述一个或多个处理器121实现如本申请实施例中所述的方法。
设备还包括:通信装置123、输入装置124和输出装置125。
设备中的处理器121、存储器122、通信装置123、输入装置124和输出装置125可以通过总线或其他方式连接,图7中以通过总线连接为例。
输入装置124可用于接收输入的数字或字符信息,以及产生与设备的用户设置以及功能控制有关的按键信号输入。输出装置125可包括显示屏等显示设备。
通信装置123可以包括接收器和发送器。通信装置123设置为根据处理器121的控制进行信息收发通信。
存储器122作为一种计算机可读存储介质,可设置为存储软件程序、计算机可执行程序以及模块,如本申请实施例所述定时参量确定方法对应的程序指令/模块(例如,附图5所示的选择模块510、第一配置模块520、接收模块530、第二配置模块540和下发模块550,或者附图6所示的信息发送模块610,请求接收模块620和信息确定模块630)。存储器122可包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序;存储数据区可存储根据设备的使用所创建的数据等。此外,存储器122可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他非易失性固态存储器件。在一些实例中,存储器122可包括相对于处理器121远程设置的存储器,这些远程存储器可以通过网络连接至设备。上述网络的实例包括但不限于互联网、企业内部网、局域网、移动通信网及其组合。
本申请实施例提出一种计算机可读存储介质,该计算机可读存储介质存储有一个或者多个程序,该一个或者多个程序可被一个或者多个处理器执行如下步骤:
选择与第一网络中的第一客户端设备CPE最近的第二网络中的第一运营商边缘PE设备,以及选择与第一网络中的第二CPE最近的第二网络中的第二PE 设备;对所述第一网络中的与第一PE设备最近的第一网关GW,配置第二网络报文的封装能力;接收第二网络控制器发送的第二网络报文的路径信息;在所述第一网络中确定与所述第二PE设备最近的第二GW,并对所述第二GW配置第二网络报文的处理能力;向第一GW下发第一引流规则,并向所述第二GW下发第二引流规则,其中,第一引流规则携带所述路径信息,用于指示所述第一GW将第一CPE输出的第一网络报文封装为第二网络报文,并引流至所述第一PE设备以及指示所述第二网络报文基于所述路径信息在第二网络中传输,所述第二引流规则,用于指示所述第二GW将所述第二PE设备输出的所述第二网络报文替换成第一网络报文,并引流至第二CPE。
或者执行如下步骤:
向第一网络控制器发送第二网络的边缘拓扑信息,所述边缘拓扑信息,用于指示所述第一网络控制器基于所述边缘拓扑信息选择与第一网络中的第一CPE最近的第二网络中的第一PE设备,选择与第一网络中的第二CPE最近的第二PE设备;接收所述第一网络控制器发送的业务请求,所述业务请求中携带第一PE设备和第二PE设备的信息以及业务要求信息;基于所述业务要求信息以及所述第一PE设备和所述第二PE设备的信息,确定在所述第二网络中的第二网络报文的路径信息,并将所述路径信息发送至所述第一网络控制器。
上文中所公开方法中的全部或某些步骤、系统、设备中的功能模块/单元可以被实施为软件、固件、硬件及其适当的组合。
在硬件实施方式中,在以上描述中提及的功能模块/单元之间的划分不一定对应于物理组件的划分;例如,一个物理组件可以具有多个功能,或者一个功能或步骤可以由若干物理组件合作执行。某些物理组件或所有物理组件可以被实施为由处理器,如中央处理器、数字信号处理器或微处理器执行的软件,或者被实施为硬件,或者被实施为集成电路,如专用集成电路。这样的软件可以分布在计算机可读介质上,计算机可读介质可以包括计算机存储介质(或非暂时性介质)和通信介质(或暂时性介质)。术语计算机存储介质包括在用于存储信息(诸如计算机可读指令、数据结构、程序模块或其他数据)的任何方法或技术中实施的易失性和非易失性、可移除和不可移除介质。计算机存储介质包括但不限于随机存取存储器(Random Access Memory,RAM)、只读存储器(Read-Only Memory,ROM)、带电可擦可编程只读存储器(Electrically Erasable Programmable Read-Only Memory,EEPROM)、闪存或其他存储器技术、光盘只读存储器(Compact Disc Read-Only Memory,CD-ROM)、数字多功能盘(Digital Versatile Disc,DVD)或其他光盘存储、磁盒、磁带、磁盘存储或其他磁存储装置、或者可以用于存储期望的信息并且可以被计算机访问的任何其他的介质。 通信介质通常包含计算机可读指令、数据结构、程序模块或者诸如载波或其他传输机制之类的调制数据信号中的其他数据,并且可包括任何信息递送介质。

Claims (13)

  1. 一种业务流配置方法,应用于第一网络控制器,包括:
    选择与第一网络中的第一客户端设备CPE之间的距离最近的或者跳数最少的第二网络中的第一运营商边缘PE设备,以及选择与所述第一网络中的第二CPE之间的距离最近的或者跳数最少的所述第二网络中的第二PE设备;
    对所述第一网络中的与所述第一PE设备之间的距离最近的或者跳数最少的第一网关GW,配置第二网络报文的封装能力;
    接收第二网络控制器发送的所述第二网络报文的路径信息;
    在所述第一网络中确定与所述第二PE设备之间的距离最近的或者跳数最少的第二GW,并对所述第二GW配置所述第二网络报文的处理能力;
    向所述第一GW下发第一引流规则,并向所述第二GW下发第二引流规则,其中,第一引流规则携带所述路径信息,用于指示所述第一GW将第一CPE输出的第一网络报文封装为所述第二网络报文,并引流至所述第一PE设备以及指示所述第二网络报文基于所述路径信息在所述第二网络中传输,所述第二引流规则,用于指示所述第二GW将所述第二PE设备输出的所述第二网络报文替换成所述第一网络报文,并引流至所述第二CPE。
  2. 根据权利要求1所述的方法,其中,所述选择与第一网络中的第一CPE之间的距离最近的或者跳数最少的第二网络中的第一PE设备,以及选择与所述第一网络中的第二CPE之间的距离最近的或者跳数最少的所述第二网络中的第二PE设备,包括:
    接收所述第二网络控制器发送的所述第二网络的边缘拓扑信息;
    基于所述边缘拓扑信息选择与所述第一CPE之间的距离最近的或者跳数最少的所述第一PE设备,以及选择与所述第二CPE之间的距离最近的或者跳数最少的所述第二PE设备。
  3. 根据权利要求1所述的方法,其中,所述接收第二网络控制器发送的所述第二网络报文的路径信息,包括:
    向所述第二网络控制器发送业务请求,其中,所述业务请求中携带所述第一PE设备的信息、所述第二PE设备的信息以及业务要求信息,所述业务请求,用于指示所述第二网络控制器基于所述业务要求信息、所述第一PE设备的信息和所述第二PE设备的信息确定所述第二网络报文的路径信息;
    接收所述第二网络控制器发送的所述路径信息。
  4. 根据权利要求3所述的方法,其中,所述向第二网络控制器发送业务请求,包括:
    向所述第二网络控制器发送基于YANG模型配置的业务请求。
  5. 根据权利要求1-4任一项所述的方法,其中,
    所述第一网络包括软件定义广域网SD-WAN,所述第一网络控制器包括SD-WAN控制器,所述第一网络报文包括SD-WAN报文;
    所述第二网络包括确定性网络DetNet,所述第二网络报文包括DetNet报文。
  6. 根据权利要求3所述的方法,其中,所述业务要求信息包括:
    流量特性信息循环间隔、每个循环间隔的最大报文数、最大报文长度、最小带宽、最大时延、最大可容忍时延、最大丢包率,最大可容忍丢包率和最大容忍乱序。
  7. 根据权利要求5所述的方法,其中,所述SD-WAN报文包括SD-WAN非加密报文,或者互联网协议安全IPSEC报文,所述IPSEC报文包括传输模式的IPSEC报文,或者隧道模式的IPSEC报文。
  8. 根据权利要求7所述的方法,还包括:
    向所述第一网络中的多个CPE设备中的每个CPE设备发送预置的IPSEC加密模板,所述IPSEC加密模板,用于指示所述每个CPE设备基于所述IPSEC加密模块为自身的WAN接口选择对应的密钥信息,并将所述密钥信息发送至所述第一网络控制器;
    接收每个CPE设备发送的密钥信息,并将所述密钥信息分发至所述多个CPE设备中除所述每个CPE设备外的CPE设备,所述密钥信息,用于指示所述多个CPE设备之间创建IPSEC会话。
  9. 根据权利要求8所述的方法,还包括:
    对所述第一网络报文的等级进行配置,并对所述多个CPE设备的WAN接口之间的隧道设置安全等级。
  10. 一种业务流配置方法,应用于第二网络控制器,包括:
    向第一网络控制器发送第二网络的边缘拓扑信息,所述边缘拓扑信息,用于指示所述第一网络控制器基于所述边缘拓扑信息选择与第一网络中的第一客户端设备CPE之间的距离最近的或者跳数最少的所述第二网络中的第一运营商边缘PE设备,选择与所述第一网络中的第二CPE之间的距离最近的或者跳数最少的第二PE设备;
    接收所述第一网络控制器发送的业务请求,所述业务请求中携带第一PE设备的信息、第二PE设备的信息以及业务要求信息;
    基于所述业务要求信息、所述第一PE设备的信息和所述第二PE设备的信息,确定在所述第二网络中的第二网络报文的路径信息,并将所述路径信息发送至所述第一网络控制器。
  11. 根据权利要求10所述的方法,其中,
    所述第一网络包括软件定义广域网SD-WAN;所述第一网络控制器包括SD-WAN控制器;
    所述第二网络包括确定性网络DetNet,所述第二网络控制器包括DetNet控制器。
  12. 一种业务流配置设备,包括存储器、处理器、存储在所述存储器上并可在所述处理器上运行的程序以及设置为实现所述处理器和所述存储器之间的连接通信的数据总线,所述程序被所述处理器执行时实现如权利要求1-11任一项所述的业务流配置方法。
  13. 一种存储介质,被设置为计算机可读存储,其中,所述存储介质存储有至少一个程序,所述至少一个程序可被至少一个处理器执行,以实现权利要求1-11中任一项所述的业务流配置方法。
PCT/CN2021/080010 2020-06-30 2021-03-10 业务流配置方法、设备及存储介质 WO2022001164A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202010622465.6 2020-06-30
CN202010622465.6A CN112511458A (zh) 2020-06-30 2020-06-30 一种业务流配置方法、设备及存储介质

Publications (1)

Publication Number Publication Date
WO2022001164A1 true WO2022001164A1 (zh) 2022-01-06

Family

ID=74953507

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/080010 WO2022001164A1 (zh) 2020-06-30 2021-03-10 业务流配置方法、设备及存储介质

Country Status (2)

Country Link
CN (1) CN112511458A (zh)
WO (1) WO2022001164A1 (zh)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103688510A (zh) * 2013-09-13 2014-03-26 华为技术有限公司 跨网通信方法及装置
EP3410656A1 (en) * 2017-05-31 2018-12-05 Juniper Networks, Inc. Routing protocol signaling of multiple next hops and their relationship
CN109923838A (zh) * 2017-05-22 2019-06-21 华为技术有限公司 桥接远程孤岛的弹性vpn
US20190372891A1 (en) * 2016-05-24 2019-12-05 Level 3 Communications, Llc Route selection system for a communication network and method of operating the same
CN111245715A (zh) * 2019-12-31 2020-06-05 亚信科技(中国)有限公司 报文传输方法和系统

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103688510A (zh) * 2013-09-13 2014-03-26 华为技术有限公司 跨网通信方法及装置
US20190372891A1 (en) * 2016-05-24 2019-12-05 Level 3 Communications, Llc Route selection system for a communication network and method of operating the same
CN109923838A (zh) * 2017-05-22 2019-06-21 华为技术有限公司 桥接远程孤岛的弹性vpn
EP3410656A1 (en) * 2017-05-31 2018-12-05 Juniper Networks, Inc. Routing protocol signaling of multiple next hops and their relationship
CN111245715A (zh) * 2019-12-31 2020-06-05 亚信科技(中国)有限公司 报文传输方法和系统

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
N. FINN HUAWEI P. THUBERT CISCO B. VARGA J. FARKAS ERICSSON: "Deterministic Networking Architecture; draft-ietf-detnet-architecture-10.txt", DETERMINISTIC NETWORKING ARCHITECTURE; DRAFT-IETF-DETNET-ARCHITECTURE-10.TXT; INTERNET-DRAFT: DETNET, INTERNET ENGINEERING TASK FORCE, IETF; STANDARDWORKINGDRAFT, INTERNET SOCIETY (ISOC) 4, RUE DES FALAISES CH- 1205 GENEVA, SWITZERLAND, no. 10, 19 December 2018 (2018-12-19), Internet Society (ISOC) 4, rue des Falaises CH- 1205 Geneva, Switzerland , pages 1 - 42, XP015130346 *

Also Published As

Publication number Publication date
CN112511458A (zh) 2021-03-16

Similar Documents

Publication Publication Date Title
US8837300B2 (en) Managing trace requests over tunneled links
US11431526B2 (en) Deterministic forwarding across L2 and L3 networks
EP2747355B1 (en) Aggregation network with centralized control
US7710902B2 (en) Path diversity for customer-to-customer traffic
US8155000B2 (en) Technique for enabling traffic engineering on CE-CE paths across a provider network
EP1585263B1 (en) Method for managing communications in an access network
US20160006614A1 (en) Source Routing Using Path Computation Elements
US7486659B1 (en) Method and apparatus for exchanging routing information between virtual private network sites
CN111245715B (zh) 报文传输方法和系统
US20130322253A1 (en) System and method for inter-domain rsvp-te lsp load balancing
US9917871B2 (en) Optimizing media bitrate with explicit network feedback on one client only
CN111555982B (zh) 一种基于IPv6扩展头的报文智能选路的方法和系统
US9172638B2 (en) Global IP-based service-oriented network architecture
CN111726294A (zh) 流规则发送的方法、路径计算单元和路径计算客户端
CN109788018B (zh) 跨域的业务互通方法、网络设备及存储介质
US8804749B2 (en) Mechanism for updating parameters of a session set up through a virtual circuit
CN112585910B (zh) 在广域网中建立安全、低延迟、优化路径的方法和装置
CN113472622A (zh) 一种网络中传输业务的方法和设备
WO2022001164A1 (zh) 业务流配置方法、设备及存储介质
CN109302504B (zh) Ptn中控制信令通道的建立方法、ptn网元及存储介质
US9225664B2 (en) System and method for aggregating pseudowires
CN107317753B (zh) 双向转发检测bfd会话建立的方法、装置和系统
WO2011120471A2 (zh) 用于数据传输的方法、网络设备和系统
WO2023103504A1 (zh) 链路检测方法、公网节点和存储介质
Zhang et al. LDP Extensions for UNI 1.0

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 22/05/2023)

122 Ep: pct application non-entry in european phase

Ref document number: 21832488

Country of ref document: EP

Kind code of ref document: A1