WO2022017254A1 - 业务模板的生成方法、装置、设备及存储介质 - Google Patents

业务模板的生成方法、装置、设备及存储介质 Download PDF

Info

Publication number
WO2022017254A1
WO2022017254A1 PCT/CN2021/106567 CN2021106567W WO2022017254A1 WO 2022017254 A1 WO2022017254 A1 WO 2022017254A1 CN 2021106567 W CN2021106567 W CN 2021106567W WO 2022017254 A1 WO2022017254 A1 WO 2022017254A1
Authority
WO
WIPO (PCT)
Prior art keywords
service
template
virtual
domain
network
Prior art date
Application number
PCT/CN2021/106567
Other languages
English (en)
French (fr)
Inventor
张丽雅
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2022017254A1 publication Critical patent/WO2022017254A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0895Configuration of virtualised networks or elements, e.g. virtualised network function or OpenFlow elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/51Discovery or management thereof, e.g. service location protocol [SLP] or web services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0894Policy-based network configuration management

Definitions

  • the present application relates to the field of network technologies, and in particular, to a method, apparatus, device and storage medium for generating a service template.
  • importing the network configuration rules into the automation system usually adopts the method of on-site customization.
  • the network configuration rules are arranged for business to obtain an automated business template, and then the business template is imported into the multi-domain controller corresponding to the business, and the multi-domain controller Perform network configuration according to the service template.
  • the embodiments of the present application provide a method, apparatus, device, and storage medium for generating a service template, which can reduce the difficulty of end-to-end service deployment and improve the efficiency of end-to-end service deployment.
  • the present application provides a method for generating a service template, the method comprising: acquiring a service feature used to describe a service and a network feature used to describe a network bearing the service; According to the network characteristics, the target virtual service design template is determined from the virtual service design template library, and the virtual service design template library includes a plurality of first virtual service design templates, and the target virtual service design template is from the plurality of first virtual service design templates.
  • a virtual service design template according to the target virtual service design template, an instantiated service template is generated, and the instantiated service template is used to configure the network so that the network bears the service.
  • the end-to-end service design of the CFS (customer facing service, user-oriented service) layer is realized by inputting network characteristics, the target virtual service design template is automatically matched, and the instantiated service design template is generated according to the target virtual service design template.
  • the business template realizes the business design of the RFS (resource facing service, resource-oriented service) layer, and does not require users to be familiar with the configuration methods and constraints of each device in the network, which reduces the difficulty of business design and configuration, and reduces the skills of engineers. requirements, reducing the time required to obtain business design templates.
  • the virtual business design template can be reused under similar conditions, which reduces the difficulty of business deployment. For example, when the same service is deployed in different provinces, although some devices are different, the same parts can still be shared.
  • the first virtual service design template includes a feature set; the determining the target virtual service design template from the virtual service design template library according to the service feature and the network feature includes: Matching the service features and the network features with the features in the feature set to obtain the matching degree of each of the first virtual service design templates; according to the matching degree, from each of the first virtual service design templates Determine the target virtual business design template.
  • the target virtual service design template can be determined according to the degree of matching of the first virtual service design template with the network feature and the service feature.
  • the matching of the service feature and the network feature with the feature in the feature set to obtain the matching degree of each of the first virtual service design templates includes: for any 1.
  • the first virtual service design template is to match at least some of the service features and the network features with the features in the feature set respectively; according to the weights corresponding to the matched features, determine the The matching degree of the first virtual business design template.
  • the matching degree of the first virtual service design template can be determined by the weights corresponding to the matched features.
  • the weights corresponding to the features can be determined according to the importance of satisfying the customer's demands after the service is deployed, so as to satisfy the customer's demands. The higher the probability is, the higher the matching degree of the first virtual service design template corresponding to the service deployment mode is.
  • the generating an instantiated service template according to the target virtual service design template includes: extracting network characteristics of a physical domain in the network; in the target virtual service design template, determining The first virtual domain of the equivalent physical domain, the equivalent physical domain is the physical domain that has the same network characteristics as the corresponding first virtual domain; the first virtual domain in the target virtual service design template is The identifier of the domain is replaced with the identifier of the equivalent physical domain to obtain the instantiated service template.
  • the second virtual domain if there is a second virtual domain without an equivalent physical domain in the target virtual service design template, the second virtual domain and the characteristics corresponding to the second virtual domain.
  • the method further includes: modifying the instantiated business template according to the received instruction.
  • modifying the instantiated service template a service design template consistent with the network structure of the existing network can be obtained.
  • the method further includes: verifying the modified instantiated service template.
  • the verifying the modified instantiated service template includes: determining a boundary point of the service; determining a boundary point and the instantiated service template according to the boundary point and the instantiated service template. The configuration on the boundary point and the service path; comparing the determined configuration with the reference configuration to obtain a verification result.
  • the method further includes: generating a second virtual service design template according to the instantiated service template; adding the second virtual service design template to the virtual service design template library middle.
  • the virtual service design templates in the virtual service design template library can be continuously updated, which increases the possibility that subsequent services can match the target virtual service design template.
  • generating a second virtual service design template according to the instantiated service template includes:
  • the identifier of each physical domain in the instantiated service template is replaced with an identifier of a unique virtual domain to generate a second virtual service design template.
  • the duplicate content in the second virtual service design template can be removed, and the second virtual service design template can be simplified.
  • a device for generating a service template comprising:
  • an acquisition module configured to acquire service characteristics and network characteristics, where the service characteristics are used to describe the service, and the network characteristics are used to describe the network bearing the service;
  • a determination module configured to determine a target virtual service design template from a virtual service design template library according to the service characteristics and the network characteristics, the virtual service design template library includes a plurality of first virtual service design templates, the The target virtual service design template is selected from the plurality of first virtual service design templates;
  • the first generating module is configured to generate an instantiated service template according to the target virtual service design template, where the instantiated service template is used to configure the network so that the network bears the service.
  • the first virtual service design template includes a feature set; the determining module is configured to match the service feature and the network feature with the features in the feature set to obtain The matching degree of each of the first virtual service design templates; according to the matching degree, the target virtual service design template is determined from each of the first virtual service design templates.
  • the determining module is configured to, for any one of the first virtual service design templates, associate at least some of the service features and the network features with the feature set, respectively.
  • the features in the matching are performed; according to the weights corresponding to the matched features, the matching degree of the first virtual service design template is determined.
  • the first generation module is configured to extract network characteristics of each physical domain in the network; in the target virtual service design template, determine a virtual domain with equivalent physical domains, and the The equivalent physical domain is the physical domain that has the same network characteristics as the corresponding virtual domain; the identifier of the virtual domain in the target virtual service design template is replaced with the identifier of the equivalent physical domain, and the result is obtained. Describe the instantiated business template.
  • the first generation module is further configured to delete the second virtual domain without an equivalent physical domain in the target virtual service design template. domain and service features corresponding to the second virtual domain.
  • the device further includes:
  • a modification module configured to modify the instantiated service template according to the received instruction.
  • the device further includes:
  • a verification module configured to verify the modified instantiated business template.
  • the verification module is configured to determine the boundary point of the service; according to the boundary point and the instantiated service template, determine the boundary point and the path of the service configuration; compare the determined configuration with the reference configuration to obtain the verification result.
  • the device further includes:
  • a second generation module configured to generate a second virtual service design template according to the instantiated service template
  • the adding module is used for adding the second virtual service design template to the virtual service design template library.
  • the second generation module is configured to extract the characteristic parameters of the physical domain in the instantiated service template, and obtain the characteristic parameter sets of each of the physical domains; the deleted characteristic parameter sets are the same The physical domain and the corresponding service configuration; replace the identifier of each physical domain in the instantiated service template with the identifier of a unique virtual domain to generate a second virtual service design template.
  • a computer device in a third aspect, includes a processor and a memory, wherein: the memory stores computer instructions, and the processor executes the computer instructions to implement the method of the first aspect and possible implementations thereof.
  • a computer-readable storage medium where computer instructions are stored in the computer-readable storage medium, and when the computer instructions in the computer-readable storage medium are executed by a computer device, the computer device is made to perform the first aspect and the possibility thereof. method of implementation.
  • a computer program product comprising instructions which, when run on a computer device, cause the computer device to perform the method of the above-described first aspect and possible implementations thereof.
  • FIG. 1 is a schematic diagram of a network architecture of an application scenario provided by an exemplary embodiment of the present application
  • FIG. 2 is a schematic diagram of an end-to-end service deployment process provided by an exemplary embodiment of the present application
  • FIG. 3 is a flowchart of a method for generating a business template provided by an exemplary embodiment of the present application
  • FIG. 4 is a schematic structural diagram of an apparatus for generating a service template provided by an exemplary embodiment of the present application
  • FIG. 5 is a schematic structural diagram of a computer device provided by an exemplary embodiment of the present application.
  • FIG. 1 shows a network architecture provided by an embodiment of the present application.
  • the operator network is divided into a multi-domain controller 100, a single-domain controller 200 and a network element (not shown) according to layers.
  • the operator network is divided into multiple domains 300 according to the controllers, each domain 300 corresponds to a single domain controller 200, each single domain controller 200 controls the network elements in the domain 300 to which it belongs, and the multiple single domain controllers 200 are composed of A multi-domain controller 100 controls.
  • the network elements in each domain 300 include PE (provider edge, operator network edge) devices and P (provider, operator network backbone) devices.
  • the PE device is, for example, an edge router of an operator's network, and has an interface connected to a CE (customer edge, user network edge) device.
  • the PE device is responsible for accessing services, and the P device is, for example, a backbone router in the operator's network.
  • the CE device is, for example, a router or switch, or a host. CE devices are directly connected to PE devices in the domain.
  • an end-to-end service is a cross-domain service, that is, a user accesses from PE devices in different domains. That is, cross-domain business passes through at least two different domains. Multiple different domains that cross-domain services pass through may be located in different countries, provinces or cities, the manufacturers of equipment used in each domain may be different, and the technologies used in each domain may also be different.
  • the device used by the domain mainly refers to a single domain controller.
  • end-to-end service 1 passes through three domains, domain C, domain A, and domain D
  • end-to-end service 2 passes through three domains, domain C, domain B, and domain D.
  • domain A uses equipment from manufacturer A
  • domain B uses equipment from manufacturer B
  • domain C uses equipment from manufacturer C
  • domain D uses equipment from manufacturer D.
  • IP CORE core network
  • domain C uses OTN (optical transport network, optical transport network) metropolitan area network technology
  • domain D uses IP metropolitan area network technology.
  • domains refer to physical domains, that is, domains that exist in an actual network.
  • an end-to-end service is a single-domain service, that is, users access from different PE devices in the same domain.
  • services include but are not limited to VPN (virtual private network, virtual private network) services, native ethernet (native ethernet) services, SNC (sub-network connection, sub-network connection) services, and the like.
  • VPN virtual private network, virtual private network
  • native ethernet native ethernet
  • SNC sub-network connection, sub-network connection
  • FIG 2 shows the deployment process of an end-to-end service. As shown in Figure 2, the deployment process is as follows:
  • the apparatus for generating a service template acquires an instantiated service template.
  • the instantiated service template is generated according to the service characteristics of the end-to-end service and the network characteristics of the network in which the end-to-end service is deployed.
  • the multi-domain controller imports the instantiated business template.
  • the multi-domain controller can centrally save the imported instantiated business templates in its own business template library.
  • the multi-domain controller decomposes the end-to-end business into single-domain business according to the business template.
  • the multi-domain controller obtains the basic information of the end-to-end service through the input device, such as the boundary point (that is, the user's access point), the selected service template, etc., and decomposes the end-to-end service into single-domain services according to the service template. , that is, the segmented services of each single domain.
  • the multi-domain controller delivers the single-domain service to the single-domain controller.
  • a multi-domain controller delivers single-domain services to a single-domain controller through an API (application programming interface).
  • API application programming interface
  • a single-domain controller decomposes a single-domain service into a single-site configuration.
  • the station refers to the network element in the domain to which the single domain controller belongs
  • the single station configuration is the configuration of each network element.
  • the single-domain controller decomposes the single-domain service into the configuration of each network element according to the type of each network element in the domain to which it belongs.
  • the single domain controller delivers the single-site configuration to the corresponding network element.
  • each network element is delivered to the corresponding network element, so as to enable the network to carry the service according to the configuration of the network, that is, to deploy the service in the network.
  • FIG. 3 is a flowchart of a method for generating a service template provided by an embodiment of the present application.
  • the method is executed by computer equipment, and when the business design template generated by the business template generating method is suitable for cross-domain business, the computer equipment is a multi-domain controller, or a new device other than the multi-domain controller.
  • the computer device is a single-domain controller, or a newly added device other than the single-domain controller.
  • the method includes the following processes.
  • the service features include but are not limited to: service type, service policy, service parameter, domain connection policy, and so on.
  • the service types include L2VPN services, L3VPN services, OTN client (client) services, and the like.
  • Service policies include but are not limited to address pool policies, QoS (quality of service, quality of service) policies, protection policies, routing policies, and the like.
  • Service parameters include, but are not limited to, bandwidth information and SLA (service-level agreement, service-level agreement) parameters, and the like.
  • Domain connection strategies include but are not limited to VLAN (virtual local area network, virtual local area network) interconnection, ODUk (optical channel data unit-k, optical channel data unit) interconnection, etc.
  • the service type in the service feature refers to the service type of the end-to-end service.
  • the end-to-end service is a combined VPN service.
  • the combined VPN service is composed of one or more segmented VPN services, and each segmented VPN service corresponds to a single-domain service in one domain.
  • the service types of the remaining segmented VPN services are the specific service type or other service types other than the specific service type.
  • a Layer 3 combined VPN service includes multiple segmented VPN services. Among the multiple segmented VPN services, at least one L3VPN service is included, and other segmented VPN services are L2VPN services and Client services.
  • Network characteristics are used to describe the network that carries services, and are mainly used to describe the characteristics of devices in the network topology.
  • the network features include but are not limited to physical domain identifiers, device manufacturer information, device version information, and so on.
  • the network includes at least one physical domain, and each physical domain corresponds to a single domain controller.
  • the characteristics of the device described by the network characteristics mainly refer to the characteristics of a single domain controller in each physical domain.
  • the network may be divided into multiple sub-networks, each sub-network includes at least one physical domain, each physical domain corresponds to a single-domain controller, and the single-domain controller in each sub-network is controlled by a multi-domain controller
  • the characteristics of the device described by the network characteristics include the characteristics of the multi-domain controllers corresponding to each sub-network and the characteristics of the single-domain controller in each sub-network. That is to say, the method provided by the embodiment of the present application is applicable to the network of more layers in addition to the three-layer network in FIG. 1 .
  • the service feature is acquired through an input device.
  • the network characteristics are obtained through the input device, or, from the multi-domain controller.
  • the acquired service features and network features both include at least one feature.
  • the virtual service design template library includes at least one first virtual service design template.
  • the virtual service design template library is preset before executing the method of the embodiment of the present application, and the first virtual service design template in the virtual service design template library can be obtained in at least one of the following ways: one is manual configuration , and the other is obtained by abstracting the instantiated business template.
  • the abstraction method please refer to the related content of 307-308 below, and the detailed description is omitted here.
  • Each first virtual service design template includes a feature set, and the feature set includes a plurality of features.
  • These features include at least one of the following information: information of virtual domains; connection relationship between virtual domains; service configuration of each virtual domain; decomposition strategy.
  • the virtual domain is an abstract subnet, and the information of the virtual domain includes a series of device feature sets, such as device manufacturer, device version, etc., for matching the network topology.
  • connection relationship between virtual domains is to describe the connection protocol between two adjacent domains when services span two or more domains, such as VLAN interconnection.
  • the service configuration of each virtual domain mainly includes the service type and the default configuration of the service type, such as the signal type (signal type) of the Client service, and the VRRP (virtual router redundancy protocol, virtual routing redundancy protocol) switch of the L3VPN.
  • the service type such as the signal type (signal type) of the Client service, and the VRRP (virtual router redundancy protocol, virtual routing redundancy protocol) switch of the L3VPN.
  • Decomposition strategies include, but are not limited to, resource strategies that require automatic allocation. For example, the RD (route-distinguisher, route distinguisher)/RT (route-target, route mark) allocation strategy of the Hubspoke VPN, and the QoS package strategy. If the first virtual service design template includes at least two virtual domains, the decomposition strategy includes an inter-domain decomposition strategy between the at least two virtual domains and an intra-domain decomposition strategy within each virtual domain. If the first virtual service design template includes only one virtual domain, the decomposition strategy only includes the intra-domain decomposition strategy within the virtual domain.
  • connection relationship between virtual domains, the service configuration and decomposition strategy of each virtual domain constitute a service feature set.
  • the union of the service feature set and the device feature set is the feature set of the first virtual service design template.
  • At least one of the information of the virtual domains, the connection relationship between the virtual domains, the service configuration and the decomposition strategy of the virtual domains are different.
  • at least one refers to at least one of any one of these four kinds of information.
  • each virtual domain corresponds to a service type, for example, corresponds to an L3VPN or an L2VPN.
  • Each virtual domain has a unique identifier and a device feature set.
  • the device feature set describes the minimum feature that can distinguish different devices.
  • the minimum feature is the aforementioned device manufacturer and device version.
  • the device feature set corresponding to the virtual domain is valid in one virtual service design template, for example, each virtual service design template includes all the information of the virtual domain.
  • the device feature set corresponding to the virtual domain is valid across templates.
  • the device feature set corresponding to the virtual domain is stored separately, and multiple virtual service design templates include the same virtual domain identifier.
  • Each virtual service design template can call the device feature set of the corresponding virtual domain through the identifier of the virtual domain.
  • determining the target virtual service design template from the virtual service design template library according to the service characteristics and the network characteristics including: matching the service characteristics and network characteristics with the characteristics in the characteristic set to obtain each first virtual service design template.
  • the matching degree; according to the matching degree, the target virtual service design template is determined from each first virtual service design template.
  • matching the service features and network features with the features in the feature set to obtain the matching degree of each first virtual service design template, including: for any of the first virtual service design templates, matching the service features with the network features. At least part of the features in the features are respectively matched with the features in the feature set; the matching degree of the first virtual service design template is determined according to the weights corresponding to the matched features.
  • the weight corresponding to the feature is determined according to the importance of satisfying customer demands after the service is deployed, so that a service deployment mode with a higher probability of satisfying customer demands has a higher matching degree of the first virtual service design template corresponding to the service deployment mode.
  • Matching methods include but are not limited to the following two.
  • the first matching method is a first matching method
  • the matching degree of the first virtual service design template is determined according to the weights corresponding to the matched features.
  • the matching degree of the first virtual service design template is positively correlated with the weighted average value of the weights corresponding to the finally matched features.
  • the priority of the feature corresponds to the type of the feature
  • the acquired priorities of the network feature and the service feature are determined according to the relationship between the type of the feature and the priority.
  • the specified priority is set according to actual needs, for example, the specified priority is the lowest priority, or the specified priority is an intermediate priority determined by comprehensive matching efficiency and matching accuracy.
  • the higher the priority the higher the probability that the service deployment meets the customer's demands.
  • the higher the priority of the feature the greater the corresponding weight of the feature.
  • the device manufacturer, device version, and service type have a higher priority, and the decomposition strategy has a lower priority. Matching according to the priority can reduce the complexity of the matching process and improve the matching efficiency.
  • matching according to the order of feature priorities from high to low is replaced by matching according to the order of feature priorities from low to high, which is not limited in this application.
  • the matching method is illustrated below with an example.
  • the service type of end-to-end service 1 is L3VPN service, covering three physical domains: domain C, domain A, and domain D.
  • the device in domain C is the device of manufacturer C, the version is 3, and the device in domain A is the manufacturer
  • the device of A is version 1
  • the device of domain D is the device of manufacturer D
  • the version is 3.
  • the service type of one domain in the domain C, the domain A and the domain D is the L3VPN service.
  • the input service characteristics include service type: L3VPN, service policy: protection policy, network characteristics: manufacturer C, version 3; manufacturer A, version 1; manufacturer D, version 3.
  • the first first virtual service design module includes a feature set ⁇ [Virtual Domain a, Vendor A, Version 1], [Virtual Domain b, Vendor B, Version 3], [VLAN Interconnection], [L3VPN, Configuration 1], [ Decomposition policy 1] ⁇ , where [virtual domain a, manufacturer A, version 1], [virtual domain b, manufacturer B, version 3] is the information of the virtual domain, [VLAN connection] is the inter-domain connection policy, [L3VPN, Configuration 1] is the business configuration, and [Decomposition strategy 1] is the decomposition strategy.
  • the second first virtual service design module includes feature sets ⁇ [Virtual Domain a, Vendor A, Version 1], [Virtual Domain b, Vendor D, Version 3], [VLAN Interconnection], [L3VPN, Configuration 1], [ Decomposition policy 2] ⁇ , where [virtual domain a, manufacturer A, version 1], [virtual domain b, manufacturer B, version 3] is the information of the virtual domain, [VLAN connection] is the inter-domain connection policy, [L3VPN, , Configuration 1] is the business configuration, and [Decomposition strategy 2] is the decomposition strategy.
  • the priority of the service type is the highest, the priority of the network feature is the second, and the priority of the service policy is the lowest. Matching is performed in order of priority from high to low, and only the features of the first two priorities are matched.
  • the first priority service type L3VPN, weight 100.
  • the second priority network features, weight 100. Since the network includes three physical domains, the weight of each physical domain is 1/3.
  • the characteristics of the first priority are first matched, and both the first virtual service design templates are matched. Then match the characteristics of the second priority, the first first virtual service design template can only correspond to the physical domain with the virtual domain a, and the weight is 100*1/3, and the second first virtual service design template can match two virtual domains, The weight is 100*2/3, the weight of the second first virtual business template is 100+100*2/3, and the weight of the first first virtual business template is: 100+100*1/3, so the second first virtual business template has a weight of 100+100*1/3. Virtual business templates are better matched.
  • matching the network feature with the device feature set in the first virtual service design template to obtain the first degree of matching includes: determining the device feature in the device feature set that matches the network feature; determining The sum of the weights corresponding to the obtained device features is taken as the first matching degree.
  • matching the service feature with the service feature set in the first virtual service design template to obtain a second degree of matching includes: determining the device feature matching the service feature in the service feature set; The sum of the weights is used as the second matching degree.
  • Different types of network features and service features are preset with weights, which are positively correlated with the importance of the corresponding network features and service features to service deployment. That is, the more important network features and service features are to service deployment, the more important the larger the value.
  • the device manufacturer, device version, and service type are the most important for service deployment, and the weight values corresponding to the device manufacturer, device version, and service type are equal and the largest.
  • the sum of the first matching degree and the second matching degree is used as the matching degree of the first virtual service design template.
  • performing matching refers to searching for the same feature in the feature set, and if the same feature exists in the feature set, it means that there is a matching feature.
  • determining the target virtual service design template according to the matching degree includes: taking the first virtual service design template with the highest matching degree as the target virtual service design template. That is, the default target virtual service design template is the first virtual service design template with the highest matching degree.
  • determining the target virtual service design template according to the matching degree includes: sorting the first virtual service design templates in descending order of the matching degree; A virtual service design template; according to a user instruction, a target virtual service design template is selected from several first virtual service design templates.
  • the number of the displayed first virtual service design templates is a set value, such as 5 and so on.
  • the first virtual service design template corresponding to the service design template that requires the least modification after instantiation is selected as the target virtual service design template.
  • the instantiated service template is used to configure the network so that the network bears the service, that is, the service is deployed in the network. For example, according to the flow shown in FIG. 2 , the configuration of the network is completed.
  • the end-to-end service design of the CFS (customer facing service, user-oriented service) layer is realized by inputting network characteristics, the target virtual service design template is automatically matched, and the instantiated service design template is generated according to the target virtual service design template.
  • the business template realizes the business design of the RFS (resource facing service, resource-oriented service) layer, and does not require users to be familiar with the configuration methods and constraints of each device in the network, which reduces the difficulty of business design and configuration, and reduces the skills of engineers. requirements, reducing the time required to obtain business design templates.
  • the virtual business design template can be reused under similar conditions, which reduces the difficulty of business deployment. For example, when the same service is deployed in different provinces, although some devices are different, the same parts can still be shared.
  • 303 includes:
  • step 303 further includes: deleting the second virtual domain and the service feature corresponding to the second virtual domain.
  • Virtual domain A uses equipment from manufacturer A
  • virtual domain B uses equipment from manufacturer B
  • virtual domain C uses equipment from manufacturer C.
  • the physical domain of the equipment of manufacturer A and the physical domain of the equipment of manufacturer B.
  • the matching degree between the physical domain in the physical network and the virtual domain in the target virtual service design template is high, for example, each physical domain has an equivalent virtual domain in the target virtual service design template,
  • the instantiated service template is directly converted according to the target service design template, and there is no need to perform step 304 .
  • the matching degree between the physical domain in the physical network and the virtual domain in the target virtual service design template is relatively low, for example, some physical domains in the physical network are in the target virtual service design template There is no equivalent virtual domain.
  • the template based on the target virtual service design cannot be directly transformed to obtain an instantiated service template matching the existing network. Therefore, the method further includes:
  • the received instruction includes at least one of an addition instruction, a deletion instruction, and a modification instruction.
  • adding a physical domain includes adding a physical domain identifier and features of devices in the physical domain.
  • Deleting a physical domain includes deleting the physical domain identification and the characteristics of the devices within the physical domain.
  • the service feature is the feature in the foregoing service feature set.
  • the method further includes:
  • the verification methods include:
  • the boundary point is the access point of the tenant, that is, the connected PE device;
  • the verification result is passed verification; if the determined configuration is different from the benchmark configuration (including some or all differences), the verification result is failed verification.
  • the boundary point of the service is acquired through the input device.
  • the configuration includes at least one of configuring a command line and configuring parameters.
  • the reference configuration is also obtained through an input device and entered by a technician.
  • the verification result is obtained by manually checking whether the determined configuration meets the requirements.
  • the technician needs to further modify and verify the instantiated business template until the instantiated business template passes the verification.
  • the process of determining the configuration command of the boundary point is the same as the process of determining the network configuration of the actual multi-domain controller and single-domain controller, but the obtained configuration is only used for instantiated The service template is verified and not delivered to the network.
  • the instantiated service template is not verified, and the service deployment is directly performed according to the instantiated service template.
  • a validated instantiated business template is saved in the business template library.
  • Use the business template library to centrally save the instantiated business templates to facilitate unified management of the instantiated business templates. For example, according to actual needs, perform full life cycle management on the instantiated business templates in the business template library. Export, publish, unpublish, delete, etc.
  • the instantiated business template can be abstracted to obtain a new virtual business template.
  • Business design template By abstracting the instantiated service template, a corresponding second virtual service design template is obtained, and the second virtual service design template is added to the virtual service design template library as a new first virtual service design template, so that it is possible to obtain a corresponding second virtual service design template.
  • the virtual service design template in the virtual service design template library is increased by means of self-learning, so that the possibility of matching the target virtual service design template during subsequent service deployment increases.
  • the method also includes:
  • 307 is implemented by:
  • the obtained second virtual service design template has less duplicate content, so as to simplify the second virtual service design template.
  • a new virtual service design template is added to the virtual service design template library by manual configuration. For example, based on expert experience, multiple virtual business design templates are generated and added to the virtual business design template library.
  • the virtual business design templates in the virtual business design template library can be updated.
  • the more virtual business design templates in the virtual business design template library, the subsequent business can match the target business design template.
  • FIG. 4 is a structural diagram of an apparatus for generating a service template provided by an embodiment of the present application.
  • the apparatus can be implemented by software, hardware or a combination of the two to become a part or all of the apparatus.
  • the apparatus provided by the embodiment of the present application can implement the process of FIG. 3 in the embodiment of the present application, and the apparatus includes: an acquisition module 410 , a determination module 420 , and a first generation module 430 .
  • the obtaining module 410 is used to obtain service features and network features, the service features are used to describe the service, and the network features are used to describe the network bearing the service; Determine the target virtual service design template, the virtual service design template library includes a plurality of first virtual service design templates, and the target virtual service design template is selected from a plurality of first virtual service design templates; The service design template generates an instantiated service template, and the instantiated service template is used to configure the network so that the network can carry services.
  • the obtaining module 410 is used for executing 301 in FIG. 3 .
  • the determination module 420 is used to perform 302 in FIG. 3 .
  • the generation module 430 is used to execute 303 in FIG. 3 .
  • the apparatus further includes: a modification module 440, configured to modify the instantiated service template according to the received instruction.
  • a modification module 440 configured to modify the instantiated service template according to the received instruction.
  • the modification module 440 is used to perform 304 in FIG. 3 .
  • the apparatus further includes: a verification module 450, configured to verify the instantiated service template.
  • a verification module 450 configured to verify the instantiated service template.
  • the modification module 440 is used to perform 305 in FIG. 3 .
  • the device further includes:
  • the second generation module 460 is configured to generate a second virtual service design template according to the instantiated service template
  • the adding module 470 is configured to add the second virtual service design template to the virtual service design template library.
  • the second generation module 460 is used to execute 307 in FIG. 3 .
  • the division of modules in the embodiments of the present application is schematic, and is only a logical function division. In actual implementation, there may also be other division methods.
  • the functional modules in the various embodiments of the present application may be integrated into one
  • the processor may also exist physically alone, or two or more modules may be integrated into one module.
  • the above-mentioned integrated modules can be implemented in the form of hardware, and can also be implemented in the form of software function modules.
  • the integrated modules are implemented in the form of software functional modules and sold or used as independent products, they can be stored in a computer-readable storage medium.
  • the technical solutions of the present application can be embodied in the form of software products in essence, or the parts that contribute to the prior art, or all or part of the technical solutions, and the computer software products are stored in a storage medium , including several instructions to make a terminal device (which may be a personal computer, a mobile phone, or a network device, etc.) or a processor (processor) to execute all or part of the steps of the method in each embodiment of the present application.
  • the aforementioned storage medium includes: U disk, mobile hard disk, read-only memory (ROM), random access memory (RAM), magnetic disk or optical disk and other media that can store program codes .
  • the end-to-end service design of the CFS layer is realized by inputting network characteristics
  • the service design of the RFS layer is realized by automatically matching the target virtual service design template, and generating an instantiated service template according to the target virtual service design template.
  • Users are familiar with the configuration methods and constraints of each device in the network, which reduces the difficulty of service design and configuration, reduces the skill requirements for engineers, and reduces the time required to obtain service design templates.
  • the virtual business design template can be reused under similar conditions, which reduces the difficulty of business deployment. For example, when the same service is deployed in different provinces, although some devices are different, the same parts can still be shared.
  • the apparatus for generating a service template provided by the above embodiment when the apparatus for generating a service template provided by the above embodiment generates a service design template, only the division of the above functional modules is used as an example for illustration. Module completion means dividing the internal structure of the device into different functional modules to complete all or part of the functions described above.
  • the apparatus for generating a service template provided by the above embodiment and the embodiment of the method for generating a service template belong to the same concept, and the specific implementation process thereof is detailed in the method embodiment, which will not be repeated here.
  • FIG. 5 exemplarily provides a possible architectural diagram of a computer device 500 .
  • Computer device 500 includes memory 501 , processor 502 , communication interface 503 , and bus 504 .
  • the memory 501 , the processor 502 , and the communication interface 503 are connected to each other through the bus 504 for communication.
  • the memory 501 may be a read only memory (Read Only Memory, ROM), a static storage device, a dynamic storage device, or a random access memory (Random Access Memory, RAM).
  • the memory 501 may store a program, and when the program stored in the memory 501 is executed by the processor 502, the processor 502 and the communication interface 503 are used to execute the method for generating the service template.
  • the memory 501 can also store a data set, for example, a part of the storage resources in the memory 501 is divided into a data set storage module, which is used to store the virtual business design templates in the virtual business design template library and the instantiated data sets in the business design template library. business template.
  • the processor 502 may adopt a general-purpose central processing unit (Central Processing Unit, CPU), a microprocessor, an application specific integrated circuit (Application Specific Integrated Circuit, ASIC), a graphics processor (graphics processing unit, GPU) or one or more integrated circuit.
  • CPU Central Processing Unit
  • ASIC Application Specific Integrated Circuit
  • GPU graphics processing unit
  • the processor 502 may also be an integrated circuit chip with signal processing capability. In the implementation process, part or all of the functions of the apparatus for identifying the operating behavior of the vehicle of the present application may be implemented by hardware integrated logic circuits in the processor 502 or instructions in the form of software.
  • the above-mentioned processor 502 can also be a general-purpose processor, a digital signal processor (Digital Signal Processing, DSP), an application-specific integrated circuit (ASIC), an off-the-shelf programmable gate array (Field Programmable Gate Array, FPGA) or other programmable logic devices. , discrete gate or transistor logic devices, discrete hardware components.
  • DSP Digital Signal Processing
  • ASIC application-specific integrated circuit
  • FPGA Field Programmable Gate Array
  • a general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
  • the steps of the method disclosed in conjunction with the embodiments of the present application may be directly embodied as executed by a hardware decoding processor, or executed by a combination of hardware and software modules in the decoding processor.
  • the software modules may be located in random access memory, flash memory, read-only memory, programmable read-only memory or electrically erasable programmable memory, registers and other storage media mature in the art.
  • the storage medium is located in the memory 501, and the processor 502 reads the information in the memory 501, and completes part of the functions of the apparatus for generating the service template in the embodiment of the present application in combination with its hardware.
  • the communication interface 503 uses a transceiver module such as, but not limited to, a transceiver to enable communication between the computer device 500 and other devices or a communication network. For example, network characteristics can be obtained through the communication interface 503 .
  • Bus 504 may include pathways for communicating information between various components of computer device 500 (eg, memory 501, processor 502, communication interface 503).
  • a computer-readable storage medium is also provided, where computer instructions are stored in the computer-readable storage medium, and when the computer instructions stored in the computer-readable storage medium are executed by a computer device, the computer device is made to execute the above-mentioned The generation method of the provided business template.
  • a computer program product including an instruction is also provided, which, when running on a computer device, causes the computer device to execute the above-mentioned method for generating a business template.
  • the computer program product includes one or more computer instructions, and when the computer program instructions are loaded and executed on a server or terminal, all or part of the processes or functions described in the embodiments of the present application are generated.
  • the computer instructions may be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be downloaded from a website site, computer, server, or data center Transmission to another website site, computer, server, or data center by wire (eg, coaxial cable, optical fiber, digital subscriber line) or wireless (eg, infrared, wireless, microwave, etc.).
  • the computer-readable storage medium may be any available medium that can be accessed by a server or a terminal, or a data storage device such as a server, a data center, or the like that includes the integration of one or more available media.
  • the usable medium may be a magnetic medium (such as a floppy disk, a hard disk, and a magnetic tape, etc.), an optical medium (such as a digital video disk (Digital Video Disk, DVD), etc.), or a semiconductor medium (such as a solid-state disk, etc.).
  • a magnetic medium such as a floppy disk, a hard disk, and a magnetic tape, etc.
  • an optical medium such as a digital video disk (Digital Video Disk, DVD), etc.
  • a semiconductor medium such as a solid-state disk, etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

本申请公开了一种业务模板的生成方法、装置、设备及存储介质,属于网络技术领域。所述方法包括:获取用于描述业务的业务特征和用于描述承载业务的网络的网络特征;根据业务特征和网络特征,从虚拟业务设计模板库中确定目标虚拟业务设计模板,该虚拟业务设计模板库中包括多个第一虚拟业务设计模板,目标虚拟业务设计模板选自这多个第一虚拟业务设计模板;根据目标虚拟业务设计模板,生成实例化的业务模板,该实例化的业务模板用于配置网络使得网络承载该业务。该方法能够自动生成实例化的业务模板,降低端到端业务部署的难度并提高端到端业务部署的效率。

Description

业务模板的生成方法、装置、设备及存储介质
本申请要求于2020年07月22日提交的申请号为202010711021.X、发明名称为“业务模板的生成方法、装置、设备及存储介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及网络技术领域,特别涉及一种业务模板的生成方法、装置、设备及存储介质。
背景技术
随着网络技术的发展,运营商网络复杂度指数级上升,端到端业务往往需要跨多个域。不同的域可能采用不同厂家的设备或者同一厂家但不同版本的设备,使得不同的域内的设备的能力不同,此外,不同的域还可能采用不同技术,因此,端到端业务的部署较为困难。
相关技术中,端到端业务从设计到上线通常需要经过可销售业务设计、现网硬件版本能力分析、网络配置规则设计以及将设计好的网络配置规则导入自动化系统的过程。其中,将网络配置规则导入自动化系统通常是采用现场定制的方式,对网络配置规则进行业务编排,得到自动化的业务模板,然后将业务模板导入该业务对应的多域控制器,由多域控制器根据该业务模板进行网络配置。
对于复杂度较高的网络,完成一种端到端业务的网络配置规则设计需要技术人员掌握在网设备的所有配置方式和约束,为每个域中的设备设计好网络配置规则,实现难度较高,对技术人员的技能要求高并且消耗时间很长。此外,根据网络配置规则现场定制得到业务模板,消耗的时间较长,效率较低。
发明内容
本申请实施例提供了一种业务模板的生成方法、装置、设备及存储介质,能够降低端到端业务部署的难度并提高端到端业务部署的效率。
第一方面,本申请提供了一种业务模板的生成方法,所述方法包括:获取用于描述业务的业务特征和用于描述承载所述业务的网络的网络特征;根据所述业务特征和所述网络特征,从虚拟业务设计模板库中确定目标虚拟业务设计模板,所述虚拟业务设计模板库中包括多个第一虚拟业务设计模板,所述目标虚拟业务设计模板来自所述多个第一虚拟业务设计模板;根据所述目标虚拟业务设计模板,生成实例化的业务模板,所述实例化的业务模板用于配置所述网络使得所述网络承载所述业务。
在本申请实施例中,通过输入网络特征实现CFS(customer facing service,面向用户的服务)层端到端业务设计,通过自动匹配目标虚拟业务设计模板,并根据目标虚拟业务设计模板生成实例化的业务模板,实现RFS(resource facing service,面向资源的服务)层的业务设计,无需用户熟悉网络中每个设备的配置方式和约束,降低了业务设计难度和配置难度,并且降低了对工程师的技能要求,减少了获得业务设计模板所需的时间。
此外,虚拟业务设计模板在相似的条件下可以重复使用,降低了业务部署的复制难度。例如,在相同的业务在不同的省份部署时,虽然部分设备存在差异,但是相同的部分仍然可以共用。
在一种可能的实施方式中,所述第一虚拟业务设计模板包括特征集合;所述根据所述业务特征和网络特征,从虚拟业务设计模板库中确定目标虚拟业务设计模板,包括:将所述业务特征和所述网络特征与所述特征集合中的特征进行匹配,得到各个所述第一虚拟业务设计模板的匹配度;根据所述匹配度,从各个所述第一虚拟业务设计模板中确定所述目标虚拟业务设计模板。
这样,可以通过第一虚拟业务设计模板与网络特征和业务特征的匹配度来确定目标虚拟业务设计模板。
在一种可能的实施方式中,所述将所述业务特征和所述网络特征与所述特征集合中的特征进行匹配,得到各个所述第一虚拟业务设计模板的匹配度,包括:对于任一所述第一虚拟业务设计模板,将所述业务特征和所述网络特征中的至少部分特征,分别与所述特征集合中的特征进行匹配;按照匹配到的特征对应的权重,确定所述第一虚拟业务设计模板的匹配度。
这样,通过匹配到的特征对应的权重,能够确定出第一虚拟业务设计模板的匹配度,这里,特征对应的权重可以根据对于业务部署后满足客户诉求的重要程度来确定,使得满足客户诉求的概率越高的业务部署方式对应的第一虚拟业务设计模板的匹配度越高。
在一种可能的实施方式中,所述根据所述目标虚拟业务设计模板,生成实例化的业务模板,包括:提取所述网络中物理域的网络特征;在目标虚拟业务设计模板中,确定具有等价物理域的第一虚拟域,所述等价物理域为与对应的所述第一虚拟域具有相同的网络特征的所述物理域;将所述目标虚拟业务设计模板中的所述第一虚拟域的标识替换为所述等价物理域的标识,得到所述实例化的业务模板。
可选地,如果目标虚拟业务设计模板中存在没有等价物理域的第二虚拟域,则第二虚拟域和第二虚拟域对应的特征。
在一种可能的实施方式中,在生成实例化的业务模板之后,所述方法还包括:根据接收到的指令,对所述实例化的业务模板进行修改。通过修改实例化的业务模板,可以得到与现网网络结构一致的业务设计模板。
在一种可能的实施方式中,所述方法还包括:对修改后的所述实例化的业务模板进行验证。
在一种可能的实施方式中,所述对修改后的所述实例化的业务模板进行验证,包括:确定所述业务的边界点;根据所述边界点和所述实例化的业务模板,确定所述边界点及所述业务的路径上的配置;将确定出的所述配置与基准配置进行比对,得到验证结果。
在一种可能的实施方式中,所述方法还包括:根据所述实例化的业务模板,生成第二虚拟业务设计模板;将所述第二虚拟业务设计模板添加到所述虚拟业务设计模板库中。
这样,可以不断更新虚拟业务设计模板库中的虚拟业务设计模板,使得后续业务能够匹配到目标虚拟业务设计模板的可能性增大。
在一种可能的实施方式中,所述根据所述实例化的业务模板,生成第二虚拟业务设计模板,包括:
提取所述实例化的业务模板中的每个物理域的特征参数,得到各个所述物理域的特征参 数集;
删除特征参数集相同的所述物理域以及对应的业务配置;
将所述实例化的业务模板中的各个所述物理域的标识均替换为一个唯一的虚拟域的标识,以生成第二虚拟业务设计模板。
通过删除特征参数集相同的物理域,可以去除第二虚拟业务设计模板中的重复内容,简化第二虚拟业务设计模板。
第二方面,提供了一种业务模板的生成装置,该装置包括:
获取模块,用于获取业务特征和网络特征,所述业务特征用于描述业务,所述网络特征用于描述承载所述业务的网络;
确定模块,用于根据所述业务特征和所述网络特征,从虚拟业务设计模板库中确定目标虚拟业务设计模板,所述虚拟业务设计模板库中包括多个第一虚拟业务设计模板,所述目标虚拟业务设计模板选自所述多个第一虚拟业务设计模板;
第一生成模块,用于根据所述目标虚拟业务设计模板,生成实例化的业务模板,所述实例化的业务模板用于配置所述网络使得所述网络承载所述业务。
在一种可能的实施方式中,所述第一虚拟业务设计模板包括特征集合;所述确定模块,用于将所述业务特征和所述网络特征与所述特征集合中的特征进行匹配,得到各个所述第一虚拟业务设计模板的匹配度;根据所述匹配度,从各个所述第一虚拟业务设计模板中确定所述目标虚拟业务设计模板。
在一种可能的实施方式中,所述确定模块,用于对于任一所述第一虚拟业务设计模板,将所述业务特征和所述网络特征中的至少部分特征,分别与所述特征集合中的特征进行匹配;按照匹配到的特征对应的权重,确定所述第一虚拟业务设计模板的匹配度。
在一种可能的实施方式中,所述第一生成模块,用于提取所述网络中每个物理域的网络特征;在目标虚拟业务设计模板中,确定具有等价物理域的虚拟域,所述等价物理域为与对应的所述虚拟域具有相同的网络特征的所述物理域;将所述目标虚拟业务设计模板中的所述虚拟域的标识替换为所述等价物理域的标识,得到所述实例化的业务模板。
可选地,如果目标虚拟业务设计模板中存在没有等价物理域的第二虚拟域,则所述第一生成模块,还用于删除所述目标虚拟业务设计模板中没有等价物理域的第二虚拟域以及所述第二虚拟域对应的业务特征。
在一种可能的实施方式中,所述装置还包括:
修改模块,用于根据接收到的指令,对所述实例化的业务模板进行修改。
在一种可能的实施方式中,所述装置还包括:
验证模块,用于对修改后的所述实例化的业务模板进行验证。
在一种可能的实施方式中,所述验证模块,用于确定所述业务的边界点;根据所述边界点和所述实例化的业务模板,确定所述边界点及所述业务的路径上的配置;将确定出的所述配置与基准配置进行比对,得到验证结果。
在一种可能的实施方式中,所述装置还包括:
第二生成模块,用于根据所述实例化的业务模板,生成第二虚拟业务设计模板;
添加模块,用于将所述第二虚拟业务设计模板添加到所述虚拟业务设计模板库中。
在一种可能的实施方式中,所述第二生成模块,用于提取所述实例化的业务模板中的物 理域的特征参数,得到各个所述物理域的特征参数集;删除特征参数集相同的所述物理域以及对应的业务配置;将所述实例化的业务模板中的各个所述物理域的标识均替换为一个唯一的虚拟域的标识,以生成第二虚拟业务设计模板。
第三方面,提供了一种计算机设备,计算机设备包括处理器和存储器,其中:存储器中存储有计算机指令,处理器执行计算机指令,以实现第一方面及其可能的实现方式的方法。
第四方面,提供了一种计算机可读存储介质,计算机可读存储介质存储有计算机指令,当计算机可读存储介质中的计算机指令被计算机设备执行时,使得计算机设备执行第一方面及其可能的实现方式的方法。
第五方面,提供了一种包含指令的计算机程序产品,当其在计算机设备上运行时,使得计算机设备执行上述第一方面及其可能的实现方式的方法。
附图说明
图1是本申请一个示例性实施例提供的应用场景的网络架构示意图;
图2是本申请一个示例性实施例提供的端到端业务的部署过程的示意图;
图3是本申请一个示例性实施例提供的一种业务模板的生成方法的流程图;
图4是本申请一个示例性实施例提供的一种业务模板的生成装置的结构示意图;
图5是本申请一个示例性实施例提供的一种计算机设备的结构示意图。
具体实施方式
为使本申请的目的、技术方案和优点更加清楚,下面将结合附图对本申请实施方式作进一步地详细描述。
图1显示了本申请实施例提供的一种网络架构。如图1所示,运营商网络按层次分为多域控制器100、单域控制器200和网元(图未示)。该运营商网络按照控制器划分为多个域300,每个域300对应一个单域控制器200,每个单域控制器200控制所属域300内的网元,多个单域控制器200由一个多域控制器100控制。
示例性地,每个域300中的网元包括PE(provider edge,运营商网络边缘)设备和P(provider,运营商网络骨干)设备。PE设备例如是运营商网络的边缘路由器,具有与CE(customer edge,用户网络边缘)设备连接的接口,PE设备负责接入业务,P设备例如是运营商网络中的骨干路由器。CE设备例如是路由器或交换机,或者是一台主机。CE设备与域中的PE设备直接连接。
在一种可能的实施方式中,一条端到端业务为跨域业务,即用户从不同域的PE设备接入。也即是,跨域业务至少经过两个不同的域。跨域业务经过的多个不同域可能位于不同的国家、省份或城市,各个域使用的设备的厂家可能不同,并且各个域使用的技术也可能不同。在本申请实施例中,域使用的设备主要是指单域控制器。
例如图1所示,端到端业务1经过域C、域A和域D三个域,端到端业务2经过域C、域B和域D三个域。其中,域A采用厂家A的设备,域B采用厂家B的设备,域C采用厂家C的设备,域D采用厂家D的设备,可见,这两条端到端业务涉及的各个域使用的设备的厂家不同。此外,域A和域B采用的是IP CORE(核心网)技术,域C采用的是OTN(optical  transport network,光传送网)城域网技术,域D采用的是IP城域网技术,可见,这两条端到端业务涉及的各个域使用的技术也不相同。这里,域指的均为物理域,即实际网络中存在的域。
在另一种可能的实施方式中,一条端到端业务为单域业务,即用户从同一个域的不同PE设备接入。
在本申请实施例中,业务包括但不限于VPN(virtual private network,虚拟专用网络)业务、原生以太网(native ethernet)业务、SNC(sub-network connection,子网络连接)业务等等。下文中,将VPN业务为例进行详细说明。
图2显示了一条端到端业务的部署过程。如图2所示,该部署过程如下:
201:业务模板的生成装置获取实例化的业务模板。
该实例化的业务模板是根据端到端业务的业务特征、以及部署该端到端业务的网络的网络特征生成的。
202:多域控制器导入实例化的业务模板。
可选地,多域控制器可以将导入的实例化的业务模板集中保存在自身的业务模板库中。
203:多域控制器根据业务模板,将端到端业务分解为单域业务。
例如,多域控制器通过输入装置获得端到端业务的基本信息,例如边界点(即用户的接入点)、选择的业务模板等,并根据业务模板将端到端业务分解为单域业务,即各单域的分段业务。
204:多域控制器将单域业务下发给单域控制器。
例如,多域控制器通过API(application programming interface,应用程序接口)将单域业务下发给单域控制器。
205:单域控制器将单域业务分解为单站配置。
这里,站指单域控制器所属域内的网元,单站配置即为每个网元的配置。示例性地,单域控制器根据所属的域内的各个网元的类型,将单域业务分解为每个网元的配置。
206:单域控制器将单站配置下发给对应的网元。
这样,将各个网元的配置下发给对应的网元,从而实现根据对网络的配置,使得该网络承载该业务,即在网络中部署该业务。
可见,业务设计模板对业务在网络中的部署至关重要。
图3是本申请实施例提供的一种业务模板的生成方法的流程图。该方法由计算机设备执行,当该业务模板的生成方法生成的业务设计模板适用于跨域业务时,计算机设备为多域控制器,或者为多域控制器以外的新增设备。当该业务模板的生成方法生成的业务设计模板适用于单域业务时,计算机设备为单域控制器,或者为单域控制器以外的新增设备。参见图3,该方法包括如下几个过程。
301:获取业务特征和网络特征。
业务特征用于描述业务。业务特征包括但不限于:业务类型、业务策略、业务参数、域连接策略等等。
其中,业务类型包括L2VPN业务、L3VPN业务、OTN的客户(client)业务等。业务策略包括但不限于地址池策略、Qos(quality of service,服务质量)策略、保护策略和路由策略等等。业务参数包括但不限于带宽信息和SLA(service-level agreement,服务等级协议)参 数等等。域连接策略包括但不限于VLAN(virtual local area network,虚拟局域网)对接、ODUk(optical channel data unit-k,光通路数据单元)对接等等。
在本申请实施例中,业务特征中的业务类型指端到端业务的业务类型。例如,端到端业务为组合VPN业务。组合VPN业务由一个或多个分段VPN业务组合而成,每个分段VPN业务对应一个域内的单域业务。在一个特定业务类型的组合VPN业务中,只要一个分段VPN业务为该特定业务类型即可,其余分段VPN业务的业务类型是该特定业务类型,或者该特定业务类型以外的其他业务类型。例如,一个三层组合VPN业务包括多个分段VPN业务,这多个分段VPN业务中,至少包括一个L3VPN业务,其他分段VPN业务为L2VPN业务、Client业务等。
网络特征用于描述承载业务的网络,主要用于描述网络拓扑中的设备的特性。网络特征包括但不限于物理域标识、设备厂家信息、设备版本信息等。在本实施例中,网络包括至少一个物理域,每个物理域对应一个单域控制器。网络特征所描述的设备的特性主要是指各个物理域中单域控制器的特性。
在其他实施例中,网络可以分为多个子网络,每个子网络包括至少一个物理域,每个物理域对应一个单域控制器,每个子网络中的单域控制器由一个多域控制器控制,在这种情况下,网络特征所描述的设备的特性,包括各个子网络对应的多域控制器的特性以及各个子网络中单域控制器的特性。也就是说,本申请实施例提供的方法除了适用于图1中的3层次的网络,还适用于更多层次的网络。
示例性地,业务特征通过输入装置获取。网络特征通过输入装置获取,或者,从多域控制器获取。获取到的业务特征和网络特征均包括至少一个特征。
302:根据业务特征和网络特征,从虚拟业务设计模板库中,确定目标虚拟业务设计模板。
示例性地,虚拟业务设计模板库中包括至少一个第一虚拟业务设计模板。这里,虚拟业务设计模板库是在执行本申请实施例的方法之前预先设置的,虚拟业务设计模板库中的第一虚拟业务设计模板可以采用以下方式中的至少一种获得:一种是人工配置,另一种是通过实例化的业务模板抽象化得到,抽象化的方式可以参见下文中307~308相关内容,在此省略详细描述。
每个第一虚拟业务设计模板包括一个特征集合,该特征集合中包括多个特征。这些特征包括以下信息中的至少一种:虚拟域的信息;虚拟域之间的连接关系;每个虚拟域的业务配置;分解策略。
其中,虚拟域是一个抽象的子网,虚拟域的信息包括一系列的设备特征集合,例如,设备厂家、设备版本等,用于匹配网络拓扑。
虚拟域之间的连接关系,是描述业务在跨两个或多个域时的相邻的两个域之间的连接协议,例如VLAN对接等。
每个虚拟域的业务配置主要包括业务类型以及业务类型的默认配置,例如Client业务的signal type(信号类型),L3VPN的VRRP(virtual router redundancy protocol,虚拟路由冗余协议)开关等。
分解策略包括但不限于需要自动分配的资源策略。例如Hubspoke类型的VPN的RD(route-distinguisher,路由区分器)/RT(route-target,路由标记)分配策略,Qos套餐策略等。若该第一虚拟业务设计模板包括至少两个虚拟域,则分解策略包括至少两个虚拟域之间的域 间分解策略以及每个虚拟域内的域内分解策略。若该第一虚拟业务设计模板仅包括一个虚拟域,则分解策略仅包括虚拟域内的域内分解策略。
虚拟域之间的连接关系、每个虚拟域的业务配置和分解策略组成一个业务特征集合。业务特征集合和设备特征集合的并集,即为第一虚拟业务设计模板的特征集合。
不同的第一虚拟业务设计模板中,虚拟域的信息、虚拟域之间的连接关系、虚拟域的业务配置和分解策略中至少一个有所不同。这里,至少一个是指这四种信息中的任意一种信息中的至少一个。
在本申请实施例中,每个虚拟域对应一种业务类型,例如,对应L3VPN或者L2VPN。每个虚拟域均具有唯一的标识和设备特征集合,该设备特征集合描述了能区分不同的设备的最小特征,这里,最小特征即前述设备厂家、设备版本。
在一种可能的实现方式中,虚拟域对应的设备特征集合在一个虚拟业务设计模板内有效,例如,每个虚拟业务设计模板中均包括虚拟域的所有信息。在另一种可能的实施方式中,虚拟域对应的设备特征集合跨模板有效,例如,虚拟域对应的设备特征集合单独保存,多个虚拟业务设计模板中包括相同的虚拟域的标识,这多个虚拟业务设计模板均能够通过该虚拟域的标识调用对应的虚拟域的设备特征集合。
示例性地,根据业务特征和网络特征,从虚拟业务设计模板库中确定目标虚拟业务设计模板,包括:将业务特征和网络特征与特征集合中的特征进行匹配,得到各个第一虚拟业务设计模板的匹配度;根据匹配度,从各个第一虚拟业务设计模板中确定目标虚拟业务设计模板。
示例性地,将业务特征和网络特征与特征集合中的特征进行匹配,得到各个第一虚拟业务设计模板的匹配度,包括:对于任一所述第一虚拟业务设计模板,将业务特征和网络特征中的至少部分特征,分别与特征集合中的特征进行匹配;按照匹配到的特征对应的权重,确定第一虚拟业务设计模板的匹配度。
其中,特征对应的权重根据对于业务部署后满足客户诉求的重要程度来确定,使得满足客户诉求的概率越高的业务部署方式对应的第一虚拟业务设计模板的匹配度越高。
将业务特征和网络特征与特征集合中的特征进行匹配的方式有多种,只要能够将业务特征和网络特征中的至少部分特征,分别与特征集合中的特征进行匹配即可。匹配方式包括但不限于以下两种。
第一种匹配方式:
对于每个第一虚拟业务设计模板,按照业务特征和网络特征中特征的优先级从高到低的顺序,将业务特征和网络特征与特征集合中的特征进行匹配,直至指定优先级的业务特征和网络特征均完成匹配;按照匹配到的特征对应的权重,确定第一虚拟业务设计模板的匹配度。
第一虚拟业务设计模板的匹配度与最终匹配到的特征对应的权重的加权平均值正相关,加权平均值越大,第一虚拟业务设计模板的匹配度越高,加权平均值最大的为匹配度最高的第一虚拟业务设计模板。
在一种可能的实施方式中,特征的优先级与特征的类型对应,获取到的网络特征和业务特征的优先级根据特征的类型与优先级的关系确定。指定优先级根据实际需要设置,例如,指定优先级是最低优先级,或者,指定优先级是综合匹配效率和匹配准确度确定的中间优先级。
这里,优先级越高表示业务部署满足客户诉求的概率越高,同时,特征的优先级越高,该特征对应的权重越大。例如,设备厂家、设备版本和业务类型的优先级较高,分解策略的优先级较低。根据优先级来进行匹配,可以降低匹配过程的复杂度,有利于提高匹配效率。
在其他实施例中,按照特征优先级从高到低的顺序进行匹配替换为按照特征优先级从低到高的顺序进行匹配,本申请对此不做限制。
下面对该匹配方式进行举例说明。
图1中,端到端业务1的业务类型为L3VPN业务,覆盖域C、域A和域D三个物理域,域C的设备为厂家C的设备,版本为3,域A的设备为厂家A的设备,版本为1,域D的设备为厂家D的设备,版本为3。如前所述,对于组合VPN业务,只需要域C、域A和域D中存在一个域的业务类型为L3VPN业务即可。
输入的业务特征包括业务类型:L3VPN,业务策略:保护策略,网络特征:厂家C,版本3;厂家A,版本1;厂家D,版本3。
第一个第一虚拟业务设计模块包括特征集合{[虚拟域a,厂家A,版本1],[虚拟域b,厂家B,版本3],[VLAN对接],[L3VPN,配置1],[分解策略1]},其中,[虚拟域a,厂家A,版本1],[虚拟域b,厂家B,版本3]为虚拟域的信息,[VLAN对接]为域间连接策略,[L3VPN,配置1]为业务配置、[分解策略1]为分解策略。
第二个第一虚拟业务设计模块包括特征集合{[虚拟域a,厂家A,版本1],[虚拟域b,厂家D,版本3],[VLAN对接],[L3VPN,配置1],[分解策略2]},其中,[虚拟域a,厂家A,版本1],[虚拟域b,厂家B,版本3]为虚拟域的信息,[VLAN对接]为域间连接策略,[L3VPN,,配置1]为业务配置,[分解策略2]为分解策略。
按照第一种匹配方式:
业务类型的优先级最高,网络特征的优先级其次,业务策略的优先级最低。按照优先级从高到低的顺序进行匹配,且只匹配前两个优先级的特征。
第一优先级的特征:业务类型L3VPN,权重100。第二优先级的特征:网络特征,权重100。由于网络包括三个物理域,每个物理域的权重占比为1/3。
首先匹配第一优先级的特征,两个第一虚拟业务设计模板都匹配。然后匹配第二优先级的特征,第一个第一虚拟业务设计模板只有虚拟域a能对应物理域,权重100*1/3,第二个第一虚拟业务设计模板能匹配两个虚拟域,权重100*2/3,第二个第一虚拟业务模板权重为100+100*2/3,第一个第一虚拟业务模板权重为:100+100*1/3,因此第二个第一虚拟业务模板的匹配度更高。
第二种匹配方式:
将网络特征与第一虚拟业务设计模板中的设备特征集合进行匹配,得到第一匹配度;将业务特征与第一虚拟业务设计模板中的业务特征集合进行匹配,得到第二匹配度;根据第一匹配度和第二匹配度,得到第一虚拟业务设计模板的匹配度。
在一种可能的实施方式中,将网络特征与第一虚拟业务设计模板中的设备特征集合进行匹配,得到第一匹配度,包括:确定设备特征集合中与网络特征匹配的设备特征;将确定出的设备特征对应的权重之和,作为第一匹配度。
类似地,将业务特征与第一虚拟业务设计模板中的业务特征集合进行匹配,得到第二匹配度,包括:确定业务特征集合中与业务特征匹配的设备特征;将确定出的业务特征对应的 权重之和,作为第二匹配度。
不同种类的网络特征和业务特征分别预先设置有权重,该权重与对应网络特征和业务特征对业务部署的重要程度正相关,也即是,网络特征和业务特征对业务部署越重要,对应的权值越大。例如,在本申请实施例中,设备厂家、设备版本和业务类型对业务的部署最重要,则设备厂家、设备版本和业务类型对应的权重值相等且最大。
在一种可能的实施方式中,将第一匹配度和第二匹配度之和作为第一虚拟业务设计模板的匹配度。
需要说明的是,在前述两种匹配方式中,进行匹配是指在特征集合中查找相同的特征,如果特征集合中存在相同的特征,则表示存在匹配的特征。
在一种可能的实施方式中,根据匹配度,确定目标虚拟业务设计模板,包括:将匹配度最高的第一虚拟业务设计模板作为目标虚拟业务设计模板。也即是,默认目标虚拟业务设计模板为匹配度最高的第一虚拟业务设计模板。
在另一种可能的实施方式中,根据匹配度,确定目标虚拟业务设计模板,包括:按照匹配度从高到低的顺序对第一虚拟业务设计模板进行排序;展示排列在前的若干个第一虚拟业务设计模板;根据用户指令从若干个第一虚拟业务设计模板中,选择目标虚拟业务设计模板。示例性地,展示的第一虚拟业务设计模板的数量为设定值,例如5个等。
示例性地,在展示出的若干个第一虚拟业务设计模板中,选择实例化后需要作出的修改量最少的业务设计模板对应的第一虚拟业务设计模板作为目标虚拟业务设计模板。
303:根据目标虚拟业务设计模板,生成实例化的业务模板。
实例化的业务模板用于配置网络使得网络承载业务,即将业务部署在该网络中。例如,按照图2所示的流程,完成对网络的配置。
在本申请实施例中,通过输入网络特征实现CFS(customer facing service,面向用户的服务)层端到端业务设计,通过自动匹配目标虚拟业务设计模板,并根据目标虚拟业务设计模板生成实例化的业务模板,实现RFS(resource facing service,面向资源的服务)层的业务设计,无需用户熟悉网络中每个设备的配置方式和约束,降低了业务设计难度和配置难度,并且降低了对工程师的技能要求,减少了获得业务设计模板所需的时间。
此外,虚拟业务设计模板在相似的条件下可以重复使用,降低了业务部署的复制难度。例如,在相同的业务在不同的省份部署时,虽然部分设备存在差异,但是相同的部分仍然可以共用。
示例性地,303包括:
3031:提取网络中物理域的网络特征,包括设备厂家、设备版本等。
3032:在目标虚拟业务设计模板中,确定具有等价物理域的第一虚拟域,等价物理域为与对应的第一虚拟域具有相同的网络特征的物理域。
3033:将目标虚拟业务设计模板中的第一虚拟域的标识替换为等价物理域的标识。使得虚拟域对应的配置被复制到物理域上,得到实例化的业务模板。
可选地,若目标虚拟业务设计模板中还存在没有等价物理域的第二虚拟域,则303还包括:删除第二虚拟域以及第二虚拟域对应的业务特征。
例如,目标虚拟业务设计模板中部署了三个虚拟域,虚拟域A采用厂家A的设备,虚拟域B采用厂家B的设备,虚拟域C采用厂家C的设备,而物理域中,仅包括采用厂家A的 设备的物理域和采用厂家B的设备的物理域,此时,表示目标虚拟业务设计模板中虚拟域C不存在等价的物理域,因此,将目标虚拟业务设计模板中,虚拟域C的相关内容删除。
在一种可能的实施方式中,物理网络中的物理域与目标虚拟业务设计模板中虚拟域的匹配度高,例如,每个物理域在目标虚拟业务设计模板中均存在等价的虚拟域,在这种情况下,直接根据目标业务设计模板转化得到实例化的业务模板,无需执行304。
而在另一种可能的实施方式中,物理网络中的物理域与目标虚拟业务设计模板中的虚拟域的匹配度相对较低,例如,物理网络中的部分物理域在目标虚拟业务设计模板中不存在等价的虚拟域,这种情况下,根据目标虚拟业务设计模板无法直接转化得到与现网匹配的实例化的业务模板,因此,该方法还包括:
304:根据接收到的指令,对实例化的业务模板进行修改。
对实例化的业务模板进行修改,包括以下方式中的至少一种:
新增物理域以及物理域对应的业务特征;
删除物理域以及物理域对应的业务特征;
修改物理域对应的业务特征。
相应地,接收到的指令包括,增加指令、删除指令和修改指令中的至少一种。
这里,新增物理域包括增加物理域标识以及物理域内的设备的特征。删除物理域包括删除物理域标识以及物理域内的设备的特征。业务特征为前述业务特征集合中的特征。
可选地,为了保证业务配置后的可靠性,在利用实例化的业务模板对网络进行配置之前,该方法还包括:
305:对实例化的业务模板进行验证。
示例性地,验证方式包括:
确定业务的边界点,该边界点为租户的接入点,即接入的PE设备;
根据业务的边界点和实例化的业务模板,确定边界点及边界点之间的路径上的配置,其中,边界点之间的路径包括业务经过的网元;
将确定出的配置与基准配置进行比对,得到验证结果。
这里,若确定出的配置与基准配置相同,则验证结果为通过验证;若确定出的配置与基准配置不同(包括部分不同或者全部不同),则验证结果为未通过验证。
示例性地,业务的边界点是通过输入装置获取的。配置包括配置命令行、配置参数中的至少一种。示例性地,基准配置也是通过输入装置获取的,由技术人员输入。
在一种可能的实施方式中,通过人工查看确定出的配置是否符合要求,得到验证结果。
在实例化的业务模板未通过验证的情况下,技术人员需要对该实例化的业务模板进行进一步修改和验证,直至该实例化的业务模板通过验证。
这里,根据该边界点和实例化的业务模板,确定边界点的配置命令的过程与实际多域控制器和单域控制器确定网络配置的过程相同,但是,得到的配置仅用于对实例化的业务模板进行验证,并不下发到网络。
可选地,在一些实施方式中,不对实例化的业务模板进行验证,直接根据实例化的业务模板进行业务部署。
306:保存通过验证的实例化的业务模板。
例如,将通过验证的实例化的业务模板保存在业务模板库中。利用业务模板库集中保存 实例化的业务模板,以便于对实例化的业务模板进行统一管理,例如,根据实际需要,对业务模板库中的实例化的业务模板进行全生命周期管理,例如导入、导出、发布、取消发布、删除等。
在一种可能的实施方式中,如果实例化的业务模板不是由目标虚拟业务设计模板直接转化得到的,而是经过了修改的业务模板,那么该实例化的业务模板抽象后能够得到新的虚拟业务设计模板。通过对该实例化的业务模板进行抽象化处理,得到对应的第二虚拟业务设计模板,并将第二虚拟业务设计模板作为新的第一虚拟业务设计模板添加到虚拟业务设计模板库中,能够通过自学习的方式增加虚拟业务设计模板库中的虚拟业务设计模板,使得在后续业务部署时,可能匹配到目标虚拟业务设计模板的可能性增大。在这种情况下,该方法还包括:
307:根据实例化的业务模板,生成第二虚拟业务设计模板。
308:将第二虚拟业务设计模板添加到虚拟业务设计模板库中。
示例性地,307通过以下方式实现:
3071:提取实例化的业务模板中的物理域的特征参数,得到各个物理域的特征参数集,该特征参数集包括物理域中的设备厂家、设备版本、物理域的连接关系。
3072:删除特征参数集相同的物理域以及对应的业务配置。
3073:将实例化的业务模板中的各个物理域的标识均替换为一个唯一的虚拟域的标识,以生成第二虚拟业务设计模板。
通过删除特征参数集相同的物理域,以及对应的业务配置,使得到的第二虚拟业务设计模板中重复内容少,以简化第二虚拟业务设计模板。
需要说明的是,如果实例化的业务模板是由目标虚拟业务设计模板直接转化得到的,未经过修改,则无需执行307~308。
在另一种可能的实施方式中,通过人工配置的方式在虚拟业务设计模板库中添加新的虚拟业务设计模板。例如,根据专家经验,生成多个虚拟业务设计模板添加到虚拟业务设计模板库中。
通过自学习和人工配置的方式,均能更新虚拟业务设计模板库中的虚拟业务设计模板,虚拟业务设计模板库中的虚拟业务设计模板越多,后续业务能够匹配到目标需业务设计模板的可能性越大,有利于实例化的业务模板的自动生成。
图4是本申请实施例提供的业务模板的生成装置的结构图。该装置可以通过软件、硬件或者两者的结合实现成为装置中的部分或者全部。本申请实施例提供的装置能够实现本申请实施例图3的流程,该装置包括:获取模块410、确定模块420和第一生成模块430。
其中,获取模块410用于获取业务特征和网络特征,业务特征用于描述业务,网络特征用于描述承载业务的网络;确定模块420用于根据业务特征和网络特征,从虚拟业务设计模板库中确定目标虚拟业务设计模板,虚拟业务设计模板库中包括多个第一虚拟业务设计模板,目标虚拟业务设计模板选自多个第一虚拟业务设计模板中;第一生成模块430用于根据目标虚拟业务设计模板,生成实例化的业务模板,实例化的业务模板用于配置网络使得网络承载业务。
其中,获取模块410用于执行图3中的301。确定模块420用于执行图3中的302。生成模块430用于执行图3中的303。
在一种可能的实施方式中,该装置还包括:修改模块440,用于根据接收到的指令,对实例化的业务模板进行修改。例如,该修改模块440用于执行图3中的304。
在一种可能的实施方式中,该装置还包括:验证模块450,用于对实例化的业务模板进行验证。例如,该修改模块440用于执行图3中的305。
在一种可能的实施方式中,该装置还包括:
第二生成模块460,用于根据实例化的业务模板,生成第二虚拟业务设计模板;
添加模块470,用于将第二虚拟业务设计模板添加到虚拟业务设计模板库中。
例如,该第二生成模块460用于执行图3中的307。
本申请实施例中对模块的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时也可以有另外的划分方式,另外,在本申请各个实施例中的各功能模块可以集成在一个处理器中,也可以是单独物理存在,也可以两个或两个以上模块集成为一个模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。
该集成的模块如果以软件功能模块的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台终端设备(可以是个人计算机,手机,或者网络设备等)或处理器(processor)执行本申请各个实施例该方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(read-only memory,ROM)、随机存取存储器(random access memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
本申请实施例中,通过输入网络特征实现CFS层端到端业务设计,通过自动匹配目标虚拟业务设计模板,并根据目标虚拟业务设计模板生成实例化的业务模板,实现RFS层的业务设计,无需用户熟悉网络中每个设备的配置方式和约束,降低了业务设计难度和配置难度,并且降低了对工程师的技能要求,减少了获得业务设计模板所需的时间。
此外,虚拟业务设计模板在相似的条件下可以重复使用,降低了业务部署的复制难度。例如,在相同的业务在不同的省份部署时,虽然部分设备存在差异,但是相同的部分仍然可以共用。
需要说明的是:上述实施例提供的业务模板的生成装置在生成业务设计模板时,仅以上述各功能模块的划分进行举例说明,实际应用中,可以根据需要而将上述功能分配由不同的功能模块完成,即将装置的内部结构划分成不同的功能模块,以完成以上描述的全部或者部分功能。另外,上述实施例提供的业务模板的生成装置与业务模板的生成方法实施例属于同一构思,其具体实现过程详见方法实施例,这里不再赘述。
本申请实施例中还提供了一种计算机设备。图5示例性的提供了计算机设备500的一种可能的架构图。
计算机设备500包括存储器501、处理器502、通信接口503以及总线504。其中,存储器501、处理器502、通信接口503通过总线504实现彼此之间的通信连接。
存储器501可以是只读存储器(Read Only Memory,ROM),静态存储设备,动态存储设备或者随机存取存储器(Random Access Memory,RAM)。存储器501可以存储程序,当存储器501中存储的程序被处理器502执行时,处理器502和通信接口503用于执行业务模 板的生成方法。存储器501还可以存储数据集合,例如:存储器501中的一部分存储资源被划分成一个数据集存储模块,用于存储虚拟业务设计模板库中的虚拟业务设计模板以及业务设计模板库中的实例化的业务模板。
处理器502可以采用通用的中央处理器(Central Processing Unit,CPU),微处理器,应用专用集成电路(Application Specific Integrated Circuit,ASIC),图形处理器(graphics processing unit,GPU)或者一个或多个集成电路。
处理器502还可以是一种集成电路芯片,具有信号的处理能力。在实现过程中,本申请的识别车辆的营运行为的装置的部分或全部功能可以通过处理器502中的硬件的集成逻辑电路或者软件形式的指令完成。上述的处理器502还可以是通用处理器、数字信号处理器(Digital Signal Processing,DSP)、专用集成电路(ASIC)、现成可编程门阵列(Field Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。可以实现或者执行本申请上述实施例中的公开的各方法。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本申请实施例所公开的方法的步骤可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器501,处理器502读取存储器501中的信息,结合其硬件完成本申请实施例的业务模板的生成装置的部分功能。
通信接口503使用例如但不限于收发器一类的收发模块,来实现计算机设备500与其他设备或通信网络之间的通信。例如,可以通过通信接口503获取网络特征。
总线504可包括在计算机设备500各个部件(例如,存储器501、处理器502、通信接口503)之间传送信息的通路。
上述各个附图对应的流程的描述各有侧重,某个流程中没有详述的部分,可以参见其他流程的相关描述。
本申请实施例中,还提供了一种计算机可读存储介质,计算机可读存储介质存储有计算机指令,当计算机可读存储介质中存储的计算机指令被计算机设备执行时,使得计算机设备执行上述所提供的业务模板的生成方法。
本申请实施例中,还提供了一种包含指令的计算机程序产品,当其在计算机设备上运行时,使得计算机设备执行上述所提供的业务模板的生成方法。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现,当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令,在服务器或终端上加载和执行所述计算机程序指令时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴光缆、光纤、数字用户线)或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是服务器或终端能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质(如软盘、硬盘和磁带等),也可以是光介质(如数字视盘(Digital Video Disk,DVD)等),或者半导体介质(如固态硬盘等)。

Claims (22)

  1. 一种业务模板的生成方法,其特征在于,所述方法包括:
    获取业务特征和网络特征,所述业务特征用于描述业务,所述网络特征用于描述承载所述业务的网络;
    根据所述业务特征和所述网络特征,从虚拟业务设计模板库中确定目标虚拟业务设计模板,所述虚拟业务设计模板库中包括多个第一虚拟业务设计模板,所述目标虚拟业务设计模板选自所述多个第一虚拟业务设计模板;
    根据所述目标虚拟业务设计模板,生成实例化的业务模板,所述实例化的业务模板用于配置所述网络使得所述网络承载所述业务。
  2. 根据权利要求1所述的方法,其特征在于,所述第一虚拟业务设计模板包括特征集合;
    所述根据所述业务特征和网络特征,从虚拟业务设计模板库中确定目标虚拟业务设计模板,包括:
    将所述业务特征和所述网络特征与所述特征集合中的特征进行匹配,得到各个所述第一虚拟业务设计模板的匹配度;
    根据所述匹配度,从各个所述第一虚拟业务设计模板中确定所述目标虚拟业务设计模板。
  3. 根据权利要求2所述的方法,其特征在于,所述将所述业务特征和所述网络特征与所述特征集合中的特征进行匹配,得到各个所述第一虚拟业务设计模板的匹配度,包括:
    对于任一所述第一虚拟业务设计模板,将所述业务特征和所述网络特征中的至少部分特征,分别与所述特征集合中的特征进行匹配;
    按照匹配到的特征对应的权重,确定所述第一虚拟业务设计模板的匹配度。
  4. 根据权利要求1-3任一项所述的方法,其特征在于,所述根据所述目标虚拟业务设计模板,生成实例化的业务模板,包括:
    提取所述网络中物理域的网络特征;
    在目标虚拟业务设计模板中,确定具有等价物理域的第一虚拟域,所述等价物理域为与对应的所述第一虚拟域具有相同的网络特征的所述物理域;
    将所述目标虚拟业务设计模板中的所述第一虚拟域的标识替换为所述等价物理域的标识,得到所述实例化的业务模板。
  5. 根据权利要求4所述的方法,其特征在于,所述根据所述目标虚拟业务设计模板,生成实例化的业务模板,还包括:
    删除所述目标虚拟业务设计模板中没有等价物理域的第二虚拟域以及所述第二虚拟域对应的特征。
  6. 根据权利要求1-5任一项所述的方法,其特征在于,在生成实例化的业务模板之后,所述方法还包括:
    根据接收到的指令,对所述实例化的业务模板进行修改。
  7. 根据权利要求1-6任一项所述的方法,其特征在于,所述方法还包括:
    对所述实例化的业务模板进行验证。
  8. 根据权利要求7所述的方法,其特征在于,所述对所述实例化的业务模板进行验证, 包括:
    确定所述业务的边界点;
    根据所述边界点和所述实例化的业务模板,确定所述边界点及所述业务的路径上的配置;
    将确定出的所述配置与基准配置进行比对,得到验证结果。
  9. 根据权利要求1-8任一项所述的方法,其特征在于,所述方法还包括:
    根据所述实例化的业务模板,生成第二虚拟业务设计模板;
    将所述第二虚拟业务设计模板添加到所述虚拟业务设计模板库中。
  10. 根据权利要求9所述的方法,其特征在于,所述根据所述实例化的业务模板,生成第二虚拟业务设计模板,包括:
    提取所述实例化的业务模板中的物理域的特征参数,得到各个所述物理域的特征参数集;
    删除特征参数集相同的所述物理域以及对应的业务配置;
    将所述实例化的业务模板中的各个所述物理域的标识均替换为一个唯一的虚拟域的标识,以生成第二虚拟业务设计模板。
  11. 一种业务模板的生成装置,其特征在于,所述装置包括:
    获取模块,用于获取业务特征和网络特征,所述业务特征用于描述业务,所述网络特征用于描述承载所述业务的网络;
    确定模块,用于根据所述业务特征和所述网络特征,从虚拟业务设计模板库中确定目标虚拟业务设计模板,所述虚拟业务设计模板库中包括多个第一虚拟业务设计模板,所述目标虚拟业务设计模板选自所述多个第一虚拟业务设计模板;
    第一生成模块,用于根据所述目标虚拟业务设计模板,生成实例化的业务模板,所述实例化的业务模板用于配置所述网络使得所述网络承载所述业务。
  12. 根据权利要求11所述的装置,其特征在于,所述第一虚拟业务设计模板包括特征集合;
    所述确定模块,用于将所述业务特征和所述网络特征与所述特征集合中的特征进行匹配,得到各个所述第一虚拟业务设计模板的匹配度;
    根据所述匹配度,从各个所述第一虚拟业务设计模板中确定所述目标虚拟业务设计模板。
  13. 根据权利要求12所述的装置,其特征在于,所述确定模块,用于对于任一所述第一虚拟业务设计模板,将所述业务特征和所述网络特征中的至少部分特征,分别与所述特征集合中的特征进行匹配;
    按照匹配到的特征对应的权重,确定所述第一虚拟业务设计模板的匹配度。
  14. 根据权利要求11-13任一项所述的装置,其特征在于,所述第一生成模块,用于提取所述网络中物理域的网络特征;在目标虚拟业务设计模板中,确定具有等价物理域的虚拟域,所述等价物理域为与对应的所述虚拟域具有相同的网络特征的所述物理域;将所述目标虚拟业务设计模板中的所述虚拟域的标识替换为所述等价物理域的标识,得到所述实例化的业务模板。
  15. 根据权利要求14所述的装置,其特征在于,所述第一生成模块,还用于删除所述目标虚拟业务设计模板中没有等价物理域的第二虚拟域以及所述第二虚拟域对应的业务特征。
  16. 根据权利要求11-15任一项所述的装置,其特征在于,所述装置还包括:
    修改模块,用于根据接收到的指令,对所述实例化的业务模板进行修改。
  17. 根据权利要求11-16任一项所述的装置,其特征在于,所述装置还包括:
    验证模块,用于对所述实例化的业务模板进行验证。
  18. 根据权利要求17所述的装置,其特征在于,所述验证模块,用于确定所述业务的边界点;根据所述边界点和所述实例化的业务模板,确定所述边界点及所述业务的路径上的配置;将确定出的所述配置与基准配置进行比对,得到验证结果。
  19. 根据权利要求11-18任一项所述的装置,其特征在于,所述装置还包括:
    第二生成模块,用于根据所述实例化的业务模板,生成第二虚拟业务设计模板;
    添加模块,用于将所述第二虚拟业务设计模板添加到所述虚拟业务设计模板库中。
  20. 根据权利要求19所述的装置,其特征在于,所述第二生成模块,用于
    提取所述实例化的业务模板中的物理域的特征参数,得到各个所述物理域的特征参数集;
    删除特征参数集相同的所述物理域以及对应的业务配置;
    将所述实例化的业务模板中的各个所述物理域的标识均替换为一个唯一的虚拟域的标识,以生成第二虚拟业务设计模板。
  21. 一种计算机设备,其特征在于,所述计算机设备包括处理器和存储器,其中:
    所述存储器中存储有计算机指令;
    所述处理器执行所述计算机指令,以实现所述权利要求1-10中任一项权利要求所述的方法。
  22. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质存储有计算机指令,当所述计算机可读存储介质中的计算机指令被计算机设备执行时,使得所述计算机设备执行所述权利要求1-10中任一项权利要求所述的方法。
PCT/CN2021/106567 2020-07-22 2021-07-15 业务模板的生成方法、装置、设备及存储介质 WO2022017254A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202010711021.X 2020-07-22
CN202010711021.XA CN114050966B (zh) 2020-07-22 2020-07-22 业务模板的生成方法、装置、设备及存储介质

Publications (1)

Publication Number Publication Date
WO2022017254A1 true WO2022017254A1 (zh) 2022-01-27

Family

ID=80204352

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/106567 WO2022017254A1 (zh) 2020-07-22 2021-07-15 业务模板的生成方法、装置、设备及存储介质

Country Status (2)

Country Link
CN (1) CN114050966B (zh)
WO (1) WO2022017254A1 (zh)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180132138A1 (en) * 2016-11-10 2018-05-10 Huawei Technologies Co., Ltd. Systems and methods for network slice service provisioning
US20180139129A1 (en) * 2016-11-15 2018-05-17 At&T Intellectual Property I, L.P. Method and apparatus for dynamic network routing in a software defined network
CN109314887A (zh) * 2016-05-12 2019-02-05 康维达无线有限责任公司 连接到虚拟化的移动核心网络
CN109600768A (zh) * 2017-09-30 2019-04-09 华为技术有限公司 网络切片的管理方法、设备及系统
CN111200859A (zh) * 2018-11-19 2020-05-26 华为技术有限公司 一种网络切片的选择方法、网络设备及终端

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100550781C (zh) * 2007-06-27 2009-10-14 中兴通讯股份有限公司 一种基于模板的抽象配置业务定制方法
US8599720B2 (en) * 2009-06-26 2013-12-03 Qualcomm Incorporated Optimized resource usage with network initiated QoS
KR101814562B1 (ko) * 2014-03-21 2018-01-04 후아웨이 테크놀러지 컴퍼니 리미티드 서비스 할당을 위한 처리 방법 및 관련 장치
CN107147509B (zh) * 2016-03-01 2022-03-11 中兴通讯股份有限公司 虚拟专用网业务实现方法、装置及通信系统
CN105847035B (zh) * 2016-03-16 2019-04-30 中国联合网络通信集团有限公司 一种虚拟化epc系统及业务实例化方法
CN111865653A (zh) * 2016-08-24 2020-10-30 华为技术有限公司 业务编排方法及装置、业务发放方法及装置
CN106385329B (zh) * 2016-08-31 2019-11-26 华为数字技术(成都)有限公司 资源池的处理方法、装置和设备
US20180227856A1 (en) * 2017-02-08 2018-08-09 Qualcomm Incorporated Techniques and apparatuses for predicting traffic to configure user equipment features
CN111416732B (zh) * 2020-02-25 2021-05-28 浪潮思科网络科技有限公司 一种sdn中网络设备扩容自动配置业务的方法及装置

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109314887A (zh) * 2016-05-12 2019-02-05 康维达无线有限责任公司 连接到虚拟化的移动核心网络
US20180132138A1 (en) * 2016-11-10 2018-05-10 Huawei Technologies Co., Ltd. Systems and methods for network slice service provisioning
US20180139129A1 (en) * 2016-11-15 2018-05-17 At&T Intellectual Property I, L.P. Method and apparatus for dynamic network routing in a software defined network
CN109600768A (zh) * 2017-09-30 2019-04-09 华为技术有限公司 网络切片的管理方法、设备及系统
CN111200859A (zh) * 2018-11-19 2020-05-26 华为技术有限公司 一种网络切片的选择方法、网络设备及终端

Also Published As

Publication number Publication date
CN114050966B (zh) 2023-01-06
CN114050966A (zh) 2022-02-15

Similar Documents

Publication Publication Date Title
CN110612702B (zh) 针对不一致的意图规范检查
CN110521169B (zh) 用于服务链的策略保证
CN110754064B (zh) 网络结构中的路由信息的验证
JP6834033B2 (ja) ネットワークスライス管理方法、ユニット、及びシステム
CN110521170B (zh) 网络的静态网络策略分析
CN110710159B (zh) 用于网络配置和故障排除的方法、系统、设备和介质
CN110785964B (zh) 网络中第3层桥接域子网的验证
CN107222324B (zh) 网络服务的业务配置方法和装置
CN110785963B (zh) 从网络收集网络模型和节点信息
CN111034123B (zh) 用于执行网络保证检查的系统、方法及计算机可读介质
CN110754065B (zh) 网络的逻辑级和硬件级之间的网络验证
CN110785965A (zh) 网络中使用虚拟路由转发容器的第3层的验证
CN111684439B (zh) 网络保证数据库版本兼容性
CN109995639B (zh) 一种数据传输方法、装置、交换机及存储介质
CN110800259B (zh) 跨以应用为中心的维度的分布式故障代码聚合
CN113726637B (zh) 一种基于云平台的网络流量透传方法、装置及存储介质
CN111163004B (zh) 服务链数据处理方法、装置和计算机设备
WO2020108443A1 (zh) 一种虚拟化管理方法及装置
US8266303B2 (en) Managing network connections
US8289969B2 (en) Network edge switch configuration based on connection profile
US8856342B2 (en) Efficiently relating adjacent management applications managing a shared infrastructure
WO2022017254A1 (zh) 业务模板的生成方法、装置、设备及存储介质
US9147172B2 (en) Source configuration based on connection profile
US20240007364A1 (en) Method, Apparatus, and System for Deploying Service
US20230105269A1 (en) Virtualized network service deployment method and apparatus

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21846107

Country of ref document: EP

Kind code of ref document: A1