WO2022227788A1 - 网络切片资源信息的收集方法、装置及存储介质 - Google Patents
网络切片资源信息的收集方法、装置及存储介质 Download PDFInfo
- Publication number
- WO2022227788A1 WO2022227788A1 PCT/CN2022/076083 CN2022076083W WO2022227788A1 WO 2022227788 A1 WO2022227788 A1 WO 2022227788A1 CN 2022076083 W CN2022076083 W CN 2022076083W WO 2022227788 A1 WO2022227788 A1 WO 2022227788A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- resource information
- network
- ioam
- target
- network node
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 98
- 238000012423 maintenance Methods 0.000 claims abstract description 23
- 238000003672 processing method Methods 0.000 claims description 134
- 238000012545 processing Methods 0.000 claims description 70
- 238000003012 network analysis Methods 0.000 claims description 18
- 230000015654 memory Effects 0.000 claims description 17
- 238000004590 computer program Methods 0.000 claims description 13
- 238000010586 diagram Methods 0.000 description 31
- 238000005538 encapsulation Methods 0.000 description 25
- 238000004458 analytical method Methods 0.000 description 14
- 230000006399 behavior Effects 0.000 description 6
- 230000005540 biological transmission Effects 0.000 description 6
- 238000012544 monitoring process Methods 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 4
- 239000000872 buffer Substances 0.000 description 3
- 238000004891 communication Methods 0.000 description 3
- 230000010365 information processing Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000011161 development Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0893—Assignment of logical groups to network elements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0894—Policy-based network configuration management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/22—Parsing or analysis of headers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
- H04W24/02—Arrangements for optimising operational condition
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
- H04W28/16—Central resource management; Negotiation of resources or communication parameters, e.g. negotiating bandwidth or QoS [Quality of Service]
Definitions
- the present disclosure relates to the field of communications, and in particular, to a method, device, storage medium, and electronic device for collecting network slice resource information.
- a network slice is a logical network topology connecting a large number of endpoints, which uses a set of shared or dedicated network resources to meet specific service level objectives (Service Level Objectives, SLOs).
- SLOs Service Level Objectives
- the slice ID here may have different names in different slice technologies, for example, it may also be called a virtual transport network ID or a multi-topology ID, etc.;
- the implementation method is to insert a forwarding ID bound with the slice ID into the data packet.
- the network node associates the data packet with the network slice to which the data packet belongs by forwarding the ID.
- FIG. 1 is a schematic diagram of an IPv6 packet encapsulation format carrying a slice ID in the related art. As shown in FIG. 1 , an IPv6 slice ID is inserted into an IPv6 data packet for a network node to identify the slice to which the packet belongs.
- FIG. 2 is a schematic diagram of the encapsulation format of an IPv6 packet carrying a forwarding ID bound to a slice ID in the related art.
- the IPv6 destination address of the IPv6 data packet is bound to a certain IPv6 slice ID, and The binding relationship has been advertised to each network node through the control plane or the management plane, so that the network node can identify the network slice to which the packet belongs.
- network slicing technology requires network nodes to reserve dedicated forwarding resources for each network slice in the network before forwarding data packets.
- the data packet is forwarded using the forwarding resources reserved for the network slice to which the data packet belongs.
- Embodiments of the present disclosure provide a method, device, storage medium, and electronic device for collecting network slice resource information, so as to at least solve the problem in the related art that network slice resource information cannot be collected effectively.
- a method for collecting network slice resource information including: adding an in-band operation, management and maintenance IOAM header to a data packet to obtain a target data packet, wherein the IOAM
- the header includes first indication information, where the first indication information is used to indicate the resource information of the target network slice that the network node needs to collect; the target data packet is sent to the network node to notify the network node
- the resource information is collected based on the first indication information.
- the first indication information includes a bitmap, wherein the bitmap includes a plurality of bits, and each of the bits in the plurality of bits is used to indicate that the resource information is at least one kind of information.
- the IOAM header further includes an IOAM data type and a processing method, wherein the IOAM data type and processing method are used to instruct the network node to Describe the processing method of resource information processing.
- the IOAM data type and processing method include one of the following: a first IOAM data type and processing method, wherein the first IOAM data type and processing method are used to indicate that the network node is in After the resource information is collected, the process of adding the resource information to the IOAM header of the target data packet is performed, and the processed target data packet is sent to the next network node to indicate the following: A network node uses the same processing method to process the received processed target data packet until the network exit node completes the processing of the received processed target data packet; and instructs the network exit node to process the received processed target data packet.
- All resource information included in the finally obtained processed target data message is reported to the network analysis device; the second IOAM data type and processing method, wherein the second IOAM data type and processing method are used to indicate the network node. After the resource information is collected, the resource information is directly reported to the network analysis device.
- the IOAM header further includes a target identifier, where the target identifier includes at least one of the following: an identifier of the target network slice, a forwarding bound with the identifier of the target network slice logo.
- the method further includes: collecting the resource information based on the first indication information ; Process the resource information according to the processing mode indicated by the IOAM data type and processing mode.
- the resource information includes at least one of the following: first resource information, where the first resource information is used to indicate network node resource information reserved for the target network slice; second resource information , the second resource information is used to indicate the network node resource information actually used by the data packet of the target network slice.
- a method for collecting network slice resource information including: receiving a target data packet sent by a network entry node, wherein the target data packet includes an in-band operation
- the IOAM header is managed and maintained, and the IOAM header includes first indication information, where the first indication information is used to indicate the resource information of the target network slice to be collected; the resource information is collected based on the first indication information.
- the first indication information includes a bitmap, wherein the bitmap includes a plurality of bits, and each of the bits in the plurality of bits is used to indicate that the resource information is at least one kind of information.
- the IOAM header further includes an IOAM data type and a processing mode, wherein the IOAM data type and processing mode are used to indicate that the network node that received the target data packet has collected all the A processing method for processing the resource information after the resource information is described.
- the IOAM data type and processing method include one of the following: a first IOAM data type and processing method, wherein the first IOAM data type and processing method are used to indicate that the network node is in After the resource information is collected, the process of adding the resource information to the IOAM header of the target data packet is performed, and the processed target data packet is sent to the next network node to indicate the following: A network node uses the same processing method to process the received processed target data packet until the network exit node completes the processing of the received processed target data packet; and instructs the network exit node to process the received processed target data packet.
- All resource information included in the finally obtained processed target data message is reported to the network analysis device; the second IOAM data type and processing method, wherein the second IOAM data type and processing method are used to indicate the network node. After the resource information is collected, the resource information is directly reported to the network analysis device.
- the IOAM header further includes a target identifier, where the target identifier includes at least one of the following: an identifier of the target network slice, a forwarding bound with the identifier of the target network slice logo.
- the method further includes: processing the resource information according to the processing mode indicated by the IOAM data type and processing mode .
- the resource information includes at least one of the following: first resource information, where the first resource information is used to indicate network node resource information reserved for the target network slice; second resource information , the second resource information is used to indicate the network node resource information actually used by the data packet of the target network slice.
- an apparatus for collecting network slice resource information including: an adding module configured to add an in-band operation, management and maintenance IOAM header to a data packet to obtain a target data packet document, wherein the IOAM header includes first indication information, and the first indication information is used to indicate the resource information of the target network slice that the network node needs to collect; the sending module is configured to send the target data message to the network node to notify the network node to collect the resource information based on the first indication information.
- an apparatus for collecting network slice resource information including: a receiving module configured to receive a target data packet sent by a network entry node, wherein the target data packet is Including an in-band operation management and maintenance IOAM header, the IOAM header includes first indication information, and the first indication information is used to indicate the resource information of the network slice that needs to be collected; the collection module is set to be based on the first indication information.
- the instruction information collects the resource information.
- a computer-readable storage medium where a computer program is stored in the computer-readable storage medium, wherein the computer program is configured to execute any one of the above when running Steps in Method Examples.
- an electronic device including a memory, a processor, and a computer program stored in the memory and running on the processor, wherein the processor executes any of the foregoing through the computer program.
- FIG. 1 is a schematic diagram of an IPv6 packet encapsulation format carrying a slice ID in the related art
- FIG. 2 is a schematic diagram of an IPv6 packet encapsulation format carrying a forwarding ID bound to a slice ID in the related art
- FIG. 3 is a block diagram of a mobile terminal hardware structure of a method for collecting network slice resource information according to an embodiment of the present disclosure
- FIG. 4 is a flowchart 1 of a method for collecting network slice resource information according to an embodiment of the present disclosure
- FIG. 5 is a schematic diagram of a data packet encapsulation format carrying an IOAM header according to an embodiment of the present disclosure
- FIG. 6 is a schematic diagram of an IOAM header encapsulation format using the first processing method according to an embodiment of the present disclosure
- FIG. 7 is a schematic diagram of an IOAM header encapsulation format using a second processing method according to an embodiment of the present disclosure
- FIG. 8 is a second flowchart of a method for collecting network slice resource information according to an embodiment of the present disclosure
- FIG. 9 is a flowchart of a method for collecting network slice resource information according to a specific embodiment of the present disclosure.
- FIG. 10 is a schematic diagram of an IPv6 packet encapsulation format after adding an IOAM header to a network entry node according to a specific embodiment of the present disclosure
- FIG. 11 is a schematic diagram of an IPv6 packet encapsulation format after a network node adds slice-related resource information according to a specific embodiment of the present disclosure
- FIG. 12 is a schematic diagram of an MPLS packet encapsulation format after adding an IOAM header to a network ingress node according to a specific embodiment of the present disclosure
- FIG. 13 is a schematic diagram of an MPLS packet encapsulation format after a network node adds slice-related resource information according to a specific embodiment of the present disclosure
- FIG. 14 is a schematic diagram of a BIER message encapsulation format after adding an IOAM header to a network entry node according to a specific embodiment of the present disclosure
- FIG. 15 is a schematic diagram of a BIER packet encapsulation format after a network node adds slice-related resource information according to a specific embodiment of the present disclosure
- 16 is a structural block diagram 1 of an apparatus for collecting network slice resource information according to an embodiment of the present disclosure
- FIG. 17 is a second structural block diagram of an apparatus for collecting network slice resource information according to an embodiment of the present disclosure.
- FIG. 3 is a hardware structural block diagram of a mobile terminal of a method for collecting network slice resource information according to an embodiment of the present disclosure.
- the mobile terminal may include one or more (only one is shown in FIG.
- processor 302 may include, but is not limited to, a processing device such as a microprocessor MCU or a programmable logic device FPGA
- the above-mentioned mobile terminal may further include a transmission device 306 and an input/output device 308 configured as a communication function.
- the structure shown in FIG. 3 is only for illustration, and it does not limit the structure of the above-mentioned mobile terminal.
- the mobile terminal may further include more or less components than those shown in FIG. 3 , or have a different configuration than that shown in FIG. 3 .
- the memory 304 may be configured to store computer programs, for example, software programs and modules of application software, such as computer programs corresponding to the method for collecting network slice resource information in the embodiments of the present disclosure. program, so as to execute various functional applications and data processing, that is, to realize the above-mentioned method.
- Memory 304 may include high-speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory.
- the memory 304 may further include memory located remotely from the processor 302, and these remote memories may be connected to the mobile terminal through a network. Examples of such networks include, but are not limited to, the Internet, an intranet, a local area network, a mobile communication network, and combinations thereof.
- Transmission device 306 is arranged to receive or transmit data via a network.
- the specific example of the above-mentioned network may include a wireless network provided by a communication provider of the mobile terminal.
- the transmission device 306 includes a network adapter (Network Interface Controller, NIC for short), which can be connected to other network devices through a base station so as to communicate with the Internet.
- the transmission device 306 may be a radio frequency (Radio Frequency, RF for short) module, which is configured to communicate with the Internet in a wireless manner.
- RF Radio Frequency
- FIG. 4 is a flow chart 1 of a method for collecting network slice resource information according to an embodiment of the present disclosure. As shown in FIG. 4 , the flow includes the following steps:
- Step S402 adding an in-band operation, management and maintenance IOAM header to the data message to obtain a target data message, wherein the IOAM header includes first indication information, and the first indication information is used to indicate the network node The resource information of the target network slice to be collected;
- Step S404 Send the target data packet to the network node to notify the network node to collect the resource information based on the first indication information.
- an in-band operation management and maintenance IOAM header is added to the data message to obtain the target data message, and the IOAM header includes first indication information for indicating the resource information of the target network slice that the network node needs to collect, After the target data packet is sent to the network node, the network node may be notified to collect resource information of the target network slice based on the first indication information carried in the IOAM header.
- the execution subject of the above steps may be a network node, for example, a network entry node, a network intermediate node, a network exit node or other network nodes, and the execution subject of the above steps may also be other processing devices or processing devices with similar processing capabilities. units, etc., but not limited thereto.
- the following takes the network entry node performing the above operation as an example (it is only an exemplary illustration, in actual operation, other devices or modules can also perform the above operation) for description:
- the network entry node may add the in-band operation management and maintenance IOAM header to the data packet to obtain the target data packet.
- FIG. 5 is an embodiment of the present disclosure.
- the IOAM header is a dedicated header embedded in the data packet for network node information collection, and the IOAM header includes first indication information , the first indication information is used to indicate the resource information of the target network slice that needs to be collected by the network node (for example, the network intermediate node B or other network nodes), for example, the network node resources reserved for the target network slice, or the resource information of the target network slice
- the network node resources actually used by the data packet when the network entry node (such as the above network entry node A) sends the target data packet to the network node (such as the above network intermediate node B), the network node can be notified (Such as the above-mentioned network intermediate node
- the first indication information includes a bitmap, wherein the bitmap includes multiple bits, and each of the multiple bits is used to respectively indicate the resource information at least one of the information.
- the above-mentioned IOAM header includes first indication information, and the first indication information includes a bitmap, that is, a series of indication bits.
- the bitmap includes a plurality of bits, wherein each of the plurality of bits is used to indicate at least one kind of information in the resource information, for example, each bit represents a kind of information, when a certain bit When set to 1, it indicates that the network node needs to collect this kind of information corresponding to the bit.
- the IOAM header further includes an IOAM data type and a processing method, wherein the IOAM data type and processing method are used to instruct the network node, after collecting the resource information, to The processing method for processing the resource information.
- the IOAM header further includes an IOAM data type and a processing method, where the IOAM data type and processing method are used to instruct the network node to process the resource information after collecting the resource information.
- the IOAM data type and processing method include one of the following: a first IOAM data type and processing method, wherein the first IOAM data type and processing method are used to indicate the network node After the resource information is collected, the process of adding the resource information to the IOAM header of the target data packet is performed, and the processed target data packet is sent to the next network node to indicate The next network node uses the same processing method to process the received processed target data packet until the network exit node completes the processing of the received processed target data packet; and instruct the network exit node to process the received processed target data packet.
- the IOAM data type and processing method include one of the following: a first IOAM data type and processing method.
- FIG. 6 is a schematic diagram of an IOAM header encapsulation format using the first processing method according to an embodiment of the present disclosure, As shown in Figure 6, if the indication information in the IOAM header indicates that the network node adopts the first processing method, that is, the IOAM data type and processing method indicate that the IOAM header contains hop-by-hop tracking information and adopts the first processing method, that is, each Each network node adds the collected information to the IOAM header, then the network node adds the collected network slice related resource information to the IOAM header, and then forwards the data packet to the next network node, and the next one receives the data packet.
- the indication information in the IOAM header indicates that the network node adopts the first processing method, that is, the IOAM data type and processing method indicate that the IOAM header contains hop-by-hop tracking information and adopts the first processing method, that is, each Each network node adds the collected information to the IOAM header, then the network node adds the collected network slice related resource
- the network node in this article also adds the collected network slice related resource information to the IOAM header until the network exit, if the network exit node receives the processed target data packet, and the indication information in the IOAM header indicates the network node. If the first processing method is adopted, the network exit node first adds the network slice related resource information collected by this node to the IOAM header, and then adds all the resource information carried in the IOAM header (for example, the network slice related information added by each network node). Exported to the network analysis device together with the slice ID or the forwarding ID bound to the slice ID); the second IOAM data type and processing method, FIG.
- FIG. 7 is a schematic diagram of the IOAM header encapsulation format using the second processing method according to an embodiment of the present disclosure, As shown in Figure 7, if the indication information in the IOAM header indicates that the network node adopts the second processing method, the IOAM data type and processing method indicate that the IOAM header contains hop-by-hop tracking information and adopts the second processing method, that is, each The network node directly exports the collected information to the network analyzer without adding it to the IOAM header, then the network node forwards the collected resource information (such as network slice-related resource information and slice ID or bound slice ID) ID) are directly exported to the network analyzer for analysis and processing, and will not be added to the IOAM header.
- the network node collects the resource information of the target network slice and adopts different processing methods to describe the The purpose for which the resource information is processed.
- the IOAM header further includes a target identifier, where the target identifier includes at least one of the following: an identifier of the target network slice, an identifier bound to the identifier of the target network slice Forwarding ID.
- the IOAM header may also optionally include a target identifier.
- the target identifier includes at least one of the following: an identifier of the target network slice, a The forwarding identifier bound to the identifier of the slice achieves the purpose of simplifying the processing process of the network node, and facilitates the network node to directly associate the collected resource information related to the network slice with the network slice ID.
- the method further includes: collecting the resource based on the first indication information information; process the resource information according to the processing mode indicated by the IOAM data type and processing mode.
- the network node such as the above-mentioned network entry node A or other network nodes
- the included first indication information collects the resource information, and processes the resource information according to the processing method indicated by the IOAM data type and processing method included in the IOAM header.
- the resource information includes at least one of the following: first resource information, where the first resource information is used to indicate network node resource information reserved for the target network slice; second resource information information, and the second resource information is used to indicate the network node resource information actually used by the data packet of the target network slice.
- the above resource information includes at least one of the following: first resource information, which is used to indicate network node resource information reserved for the target network slice, for example, the first resource information may be reserved for the target network slice.
- the reserved network node resources may specifically include reserved wavelengths, reserved time slots, reserved bandwidth, reserved buffers, reserved queues, reserved processing priorities or other resource information; the second resource information is used to indicate the Network node resource information actually used by the data packet of the target network slice, for example, the second resource information may be the network node resource actually used by the data packet of the target network slice, specifically including the actually used wavelength, the actual used time slot, Reserved bandwidth used, reserved cache used, actual use queue, actual use processing priority, or other resource information.
- FIG. 8 is a second flowchart of a method for collecting network slice resource information according to an embodiment of the present disclosure. As shown in FIG. 8 , the flow includes the following steps:
- Step S802 Receive a target data packet sent by the network entry node, wherein the target data packet includes an in-band operation, management and maintenance IOAM header, and the IOAM header includes first indication information, and the first indication The information is used to indicate the resource information of the target network slice that needs to be collected;
- Step S804 Collect the resource information based on the first indication information.
- the target data packet sent by the network entry node is received, and the target data packet includes an in-band operation management and maintenance IOAM header, and the IOAM header includes a resource for indicating the target network slice that the network node needs to collect
- the first indication information of the information means that the resource information of the target network slice can be collected based on the first indication information.
- the execution subject of the above steps may be a network node, for example, a network entry node, a network intermediate node, a network exit node or other network nodes, and the execution subject of the above steps may also be other processing devices or processing devices with similar processing capabilities. units, etc., but not limited thereto.
- the following is an example of performing the above operation on an intermediate node of the network (it is only an exemplary illustration, and other devices or modules may also be used to perform the above operation in actual operation) for description:
- a network intermediate node receives a target data packet sent by a network entry node (eg, network entry node A), and the target data packet includes in-band operation management and maintenance IOAM header
- FIG. 5 is a schematic diagram of the encapsulation format of a data packet carrying the IOAM header according to an embodiment of the present disclosure, as shown in FIG.
- the IOAM header is a special header embedded in the data packet for network node information collection part, and the IOAM header includes first indication information that is used to indicate the resource information of the target network slice that the network node needs to collect, and the first indication information is used to indicate that the network node (such as the above-mentioned network intermediate node B or other network nodes) needs to
- the collected resource information of the target network slice for example, the network node resources reserved for the target network slice, or the network node resources actually used by the data packets of the target network slice; node
- the first indication information includes a bitmap, wherein the bitmap includes multiple bits, and each of the multiple bits is used to respectively indicate the resource information at least one of the information.
- the above-mentioned IOAM header includes first indication information, and the first indication information includes a bitmap, that is, a series of indication bits.
- the bitmap includes a plurality of bits, wherein each of the plurality of bits is used to indicate at least one kind of information in the resource information, for example, each bit represents a kind of information, when a certain bit When set to 1, it indicates that the network node needs to collect this kind of information corresponding to the bit.
- the IOAM header further includes an IOAM data type and a processing method, wherein the IOAM data type and processing method are used to indicate that the network node receiving the target data packet is collecting the The processing method of processing the resource information after the resource information.
- the above-mentioned IOAM header further includes the IOAM data type and processing method, and the IOAM data type and processing method are used to indicate the network node (for example, the above-mentioned network intermediate node B or other network node that receives the target data packet) After collecting the above resource information, the network node) processes the above resource information.
- the network node processes the above resource information.
- the IOAM data type and processing method include one of the following: a first IOAM data type and processing method, wherein the first IOAM data type and processing method are used to indicate the network node After the resource information is collected, the process of adding the resource information to the IOAM header of the target data packet is performed, and the processed target data packet is sent to the next network node to indicate The next network node uses the same processing method to process the received processed target data packet until the network exit node completes the processing of the received processed target data packet; and instruct the network exit node to process the received processed target data packet.
- the IOAM data type and processing method include one of the following: a first IOAM data type and processing method.
- FIG. 6 is a schematic diagram of an IOAM header encapsulation format using the first processing method according to an embodiment of the present disclosure, As shown in Figure 6, if the indication information in the IOAM header indicates that the network node adopts the first processing method, that is, the IOAM data type and processing method indicate that the IOAM header contains hop-by-hop tracking information and adopts the first processing method, that is, each Each network node adds the collected information to the IOAM header, then the network node adds the collected network slice related resource information to the IOAM header, and then forwards the data packet to the next network node, and the next one receives the data packet.
- the indication information in the IOAM header indicates that the network node adopts the first processing method, that is, the IOAM data type and processing method indicate that the IOAM header contains hop-by-hop tracking information and adopts the first processing method, that is, each Each network node adds the collected information to the IOAM header, then the network node adds the collected network slice related resource
- the network node in this article also adds the collected network slice related resource information to the IOAM header until the network exit, if the network exit node receives the processed target data packet, and the indication information in the IOAM header indicates the network node. If the first processing method is adopted, the network exit node first adds the network slice related resource information collected by this node to the IOAM header, and then adds all the resource information carried in the IOAM header (for example, the network slice related information added by each network node). Exported to the network analysis device together with the slice ID or the forwarding ID bound to the slice ID); the second IOAM data type and processing method, FIG.
- FIG. 7 is a schematic diagram of the IOAM header encapsulation format using the second processing method according to an embodiment of the present disclosure, As shown in Figure 7, if the indication information in the IOAM header indicates that the network node adopts the second processing method, the IOAM data type and processing method indicate that the IOAM header contains hop-by-hop tracking information and adopts the second processing method, that is, each The network node directly exports the collected information to the network analyzer without adding it to the IOAM header, then the network node forwards the collected resource information (such as network slice-related resource information and slice ID or bound slice ID) ID) are directly exported to the network analyzer for analysis and processing, and will not be added to the IOAM header.
- the network node collects the resource information of the target network slice and adopts different processing methods to describe the The purpose for which the resource information is processed.
- the IOAM header further includes a target identifier, where the target identifier includes at least one of the following: an identifier of the target network slice, an identifier bound to the identifier of the target network slice Forwarding ID.
- the IOAM header may also optionally include a target identifier.
- the target identifier includes at least one of the following: an identifier of the target network slice, a The forwarding identifier bound to the identifier of the slice achieves the purpose of simplifying the processing process of the network node, and facilitates the network node to directly associate the collected resource information related to the network slice with the network slice ID.
- the method further includes: performing processing on the resource information according to the processing method indicated by the IOAM data type and processing method deal with.
- the network intermediate node such as the network intermediate node B
- the network intermediate node B performs a processing operation on the resource. information is processed.
- the resource information includes at least one of the following: first resource information, where the first resource information is used to indicate network node resource information reserved for the target network slice; second resource information information, and the second resource information is used to indicate the network node resource information actually used by the data packet of the target network slice.
- the above resource information includes at least one of the following: first resource information, which is used to indicate network node resource information reserved for the target network slice, for example, the first resource information may be It is the network node resource reserved for the target network slice, which may specifically include reserved wavelength, reserved time slot, reserved bandwidth, reserved cache, reserved queue, reserved processing priority or other resource information; the second resource information , which is used to indicate the network node resource information actually used by the data packet of the target network slice.
- the second resource information may be the network node resource actually used by the data packet of the target network slice, specifically including the actually used wavelength. , the actual used time slot, the used reserved bandwidth, the used reserved buffer, the actual used queue, the actual used processing priority or other resource information.
- FIG. 9 is a flow chart of a method for collecting network slice resource information according to a specific embodiment of the present disclosure. As shown in FIG. 9 , the flow includes the following steps:
- Step S902 the network entry node adds an in-band operation management and maintenance IOAM header to the data packet, wherein the IOAM header is used to instruct the network node to collect network slice-related forwarding information (corresponding to the resource information of the aforementioned network slice);
- Step S904 the network node (for example, the aforementioned network intermediate node) collects network slice-related forwarding information according to the instruction of the IOAM header, and processes the collected network slice-related forwarding information;
- Step S906 the network egress node collects the forwarding information related to the network slice of the node according to the instruction of the IOAM header, strips the IOAM header, and restores the original data packet.
- the network entry node adds the in-band operation management and maintenance IOAM header to the data packet, and the IOAM header is used to indicate the relevant forwarding information of the target network slice that the network node needs to collect.
- the IOAM header collects the network slice-related forwarding information according to the instructions of the IOAM header, process the collected network slice-related forwarding information, and send the processed target data packet to the network egress node.
- the instruction of the IOAM header collects the forwarding information related to the network slice of the node, and strips the IOAM header to restore the original data packet.
- Collect resource information related to network slicing such as reserved bandwidth, reserved cache, used reserved bandwidth, and used reserved cache, in the IPv6 network, and adopts the first processing method of IOAM.
- Step 1001 the network entry node adds an IOAM header to the IPv6 data packet, instructing the network node to collect resource information related to network slices such as reserved bandwidth, reserved cache, used reserved bandwidth, and used reserved cache.
- the IOAM header contains the IOAM data type and processing method, the IOAM data length, the slice ID, and a bitmap.
- the IOAM data type and processing method indicate that the IOAM header contains hop-by-hop tracking information and adopts the first processing method, that is, each network node adds the network information indicated by the IOAM header to the IOAM header;
- the bitmap is also a String indicating bits, each bit represents a kind of information, when a certain bit is set to 1, it indicates that the network node needs to collect this kind of information corresponding to this bit;
- the slice ID indicates which slice is collected related resource information, In this embodiment, the slice ID is equal to 100, that is, the relevant resource information of the slice 100 is collected.
- Fig. 10 is a schematic diagram of an IPv6 packet encapsulation format after adding an IOAM header to a network entry node according to a specific embodiment of the present disclosure. As shown in Fig. 10, four bits are set to 1 in the bitmap included in the IOAM header, and these four bits The information represented are reserved bandwidth, reserved cache, used reserved bandwidth, and used reserved cache.
- Step 1002 after receiving the IPv6 data packet, the network node collects network slice related resource information according to the instruction of the IOAM header carried in the data packet, and processes the collected network slice related resource information according to the instruction of the IOAM header.
- the network node adds the collected network slice-related resource information to the IOAM header according to the instructions of the IOAM header, and then forwards the data packet to the next network node.
- the next network node that receives the data packet also sends the collected network Slice-related resource information is added to the IOAM header until the network exit.
- 11 is a schematic diagram of an IPv6 packet encapsulation format after a network node adds slice-related resource information according to a specific embodiment of the present disclosure. As shown in FIG. 11 , the network node adds the collected information into the IOAM header, and the information includes information about slices. 100 of reserved bandwidth, reserved cache, used reserved bandwidth, and used reserved cache.
- Step 1003 after receiving the IPv6 data packet, the network egress node collects the network slice related resource information of the node according to the instruction of the IOAM header, strips the IOAM header, and restores the original data packet.
- the network exit node first adds the network slice-related resource information collected by this node to the IOAM header, which includes the reserved bandwidth, reserved cache, used reserved bandwidth, and used reserved cache of slice 100, and then sends the IOAM
- the network slice related information added by each network node carried in the header is exported to the network analyzer together with the slice ID, and the IOAM header is stripped to restore the original IPv6 data packet.
- the network slicing-related resource information such as reserved bandwidth, reserved cache, used reserved bandwidth, and used reserved cache, is collected, and the second processing method of IOAM is adopted.
- Step 2001 the network entry node adds an IOAM header to the IPv6 data packet, instructing the network node to collect resource information related to network slices such as reserved bandwidth, reserved cache, used reserved bandwidth, and used reserved cache.
- the IOAM header contains the IOAM data type and processing method, the IOAM data length, the slice ID, and a bitmap.
- the IOAM data type and processing method indicate that the IOAM header contains hop-by-hop tracking information and adopts the second processing method, that is, each network node directly exports the collected network slice-related resource information together with the slice ID to the network analyzer.
- the bit map is also a series of indicator bits, each bit represents a kind of information, when a bit is set to 1, it indicates that the network node needs to collect this kind of information corresponding to the bit; the slice ID indicates the collected information.
- Which slice is the relevant resource information, in this embodiment, the slice ID is equal to 200, that is, the relevant resource information of the slice 200 is collected.
- Step 2002 after receiving the IPv6 data packet, the network node collects network slice related resource information according to the instruction of the IOAM header carried in the data packet, and processes the collected network slice related resource information according to the instruction of the IOAM header.
- the network node directly exports the collected network slice-related resource information together with the slice ID to the network analyzer for analysis and processing, and then forwards the data packet to the next network node.
- the network node also directly exports the collected network slice related resource information together with the slice ID to the network analyzer for analysis and processing until the network exit.
- the resource information related to the network slice includes reserved bandwidth, reserved cache, used reserved bandwidth, and used reserved cache for slice 200, and the slice ID is 200.
- Step 2003 after receiving the IPv6 data message, the network egress node collects the network slice related resource information of the node according to the instruction of the IOAM header, and strips the IOAM header to restore the original data message.
- the network exit node first directly exports the network slice-related resource information collected by the node together with the slice ID to the network analyzer for analysis and processing.
- the reserved cache is used, the slice ID is 200, and the IOAM header is stripped to restore the original IPv6 data packet.
- Step 3001 The network ingress node adds an IOAM header to the MPLS data packet, instructing the network node to collect resource information related to network slices such as reserved bandwidth, reserved cache, used reserved bandwidth, and used reserved cache.
- the IOAM header contains the IOAM data type and processing method, the IOAM data length, the slice ID, and a bitmap.
- the IOAM data type and processing method indicate that the IOAM header contains hop-by-hop tracking information and adopts the first processing method, that is, each network node adds the network information indicated by the IOAM header to the IOAM header;
- the bitmap is also a String indicating bits, each bit represents a kind of information, when a certain bit is set to 1, it indicates that the network node needs to collect this kind of information corresponding to this bit;
- the slice ID indicates which slice is collected related resource information, In this embodiment, the slice ID is equal to 300, that is, the relevant resource information of the slice 300 is collected.
- Fig. 12 is a schematic diagram of an MPLS packet encapsulation format after adding an IOAM header to a network ingress node according to a specific embodiment of the present disclosure. As shown in Fig. 12, four bits are set to 1 in the bitmap included in the IOAM header, and these four bits The information represented are reserved bandwidth, reserved cache, used reserved bandwidth, and used reserved cache.
- Step 3002 after receiving the MPLS data packet, the network node collects network slice related resource information according to the instruction of the IOAM header carried in the data packet, and processes the collected network slice related resource information according to the instruction of the IOAM header.
- the network node adds the collected network slice-related resource information to the IOAM header according to the instructions of the IOAM header, and then forwards the data packet to the next network node.
- the next network node that receives the data packet also sends the collected network Slice-related resource information is added to the IOAM header until the network exit.
- 13 is a schematic diagram of the MPLS packet encapsulation format after the network node adds slice-related resource information according to a specific embodiment of the present disclosure. As shown in FIG. 13 , the network node adds the collected information into the IOAM header, and the information includes information about slices 300 of reserved bandwidth, reserved cache, used reserved bandwidth, and used reserved cache.
- Step 3003 after receiving the MPLS data packet, the network egress node collects the network slice related resource information of the node according to the instruction of the IOAM header, strips the IOAM header, and restores the original data packet.
- the network egress node first adds the network slice-related resource information collected by this node to the IOAM header, which includes the reserved bandwidth, reserved cache, used reserved bandwidth, and used reserved cache of slice 300, and then sends the IOAM to the IOAM header.
- the network slice related information added by each network node carried in the header is exported to the network analyzer together with the slice ID, and the IOAM header is stripped to restore the original MPLS data packet.
- Step 4001 The network entry node adds an IOAM header to the MPLS data packet, instructing the network node to collect resource information related to network slices such as reserved bandwidth, reserved cache, used reserved bandwidth, and used reserved cache.
- the IOAM header contains the IOAM data type and processing method, the IOAM data length, the slice ID, and a bitmap.
- the IOAM data type and processing method indicate that the IOAM header contains hop-by-hop tracking information and adopts the second processing method, that is, each network node directly exports the collected network slice-related resource information together with the slice ID to the network analyzer.
- the bit map is also a series of indicator bits, each bit represents a kind of information, when a bit is set to 1, it indicates that the network node needs to collect this kind of information corresponding to the bit; the slice ID indicates the collected information.
- Which slice is the relevant resource information, in this embodiment, the slice ID is equal to 400, that is, the relevant resource information of the slice 400 is collected.
- Step 4002 after receiving the MPLS data packet, the network node collects network slice related resource information according to the instruction of the IOAM header carried in the data packet, and processes the collected network slice related resource information according to the instruction of the IOAM header.
- the network node directly exports the collected network slice-related resource information together with the slice ID to the network analyzer for analysis and processing, and then forwards the data packet to the next network node.
- the network node also directly exports the collected network slice related resource information together with the slice ID to the network analyzer for analysis and processing until the network exit.
- the resource information related to the network slice includes reserved bandwidth, reserved cache, used reserved bandwidth, and used reserved cache for slice 400, and the slice ID is 400.
- Step 4003 after receiving the MPLS data packet, the network egress node collects the network slicing related resource information of the node according to the instruction of the IOAM header, strips the IOAM header, and restores the original data packet.
- the network exit node first directly exports the network slice-related resource information collected by this node together with the slice ID to the network analyzer for analysis and processing. Use the reserved cache, the slice ID is 400, and then strip the IOAM header to restore the original MPLS data packet.
- Step 5001 The network entry node adds an IOAM header to the BIER data packet, instructing the network node to collect resource information related to network slices such as reserved bandwidth, reserved cache, used reserved bandwidth, and used reserved cache.
- the IOAM header contains the IOAM data type and processing method, the IOAM data length, the slice ID, and a bitmap.
- the IOAM data type and processing method indicate that the IOAM header contains hop-by-hop tracking information and adopts the first processing method, that is, each network node adds the network information indicated by the IOAM header to the IOAM header;
- the bitmap is also a String indicating bits, each bit represents a kind of information, when a certain bit is set to 1, it indicates that the network node needs to collect this kind of information corresponding to this bit;
- the slice ID indicates which slice is collected related resource information, In this embodiment, the slice ID is equal to 500, that is, the relevant resource information of the slice 500 is collected.
- FIG. 14 is a schematic diagram of the encapsulation format of a BIER message after adding an IOAM header to a network entry node according to a specific embodiment of the present disclosure. As shown in FIG. 14 , four bits are set to 1 in the bitmap included in the IOAM header, and these four bits The information represented are reserved bandwidth, reserved cache, used reserved bandwidth, and used reserved cache.
- Step 5002 after receiving the BIER data packet, the network node collects network slice related resource information according to the instruction of the IOAM header carried in the data packet, and processes the collected network slice related resource information according to the instruction of the IOAM header.
- FIG. 15 is a schematic diagram of a BIER packet encapsulation format after a network node adds slice-related resource information according to a specific embodiment of the present disclosure. As shown in Figure 15, the network node adds the collected information into the IOAM header, and the information includes information about slices 500 for Reserved Bandwidth, Reserved Cache, Used Reserved Bandwidth, and Used Reserved Cache.
- Step 5003 after receiving the BIER data message, the network egress node collects the network slice related resource information of the node according to the instruction of the IOAM header, and strips the IOAM header to restore the original data message.
- the network egress node first adds the network slice-related resource information collected by the node to the IOAM header, which includes the reserved bandwidth, reserved cache, used reserved bandwidth, and used reserved cache of slice 500, and then sends the IOAM to the IOAM header.
- the network slice related information added by each network node carried in the header is exported to the network analyzer together with the slice ID, and the IOAM header is stripped to restore the original BIER data packet.
- the network slicing-related resource information such as reserved bandwidth, reserved cache, used reserved bandwidth, and used reserved cache, is collected, and the second processing method of IOAM is adopted.
- Step 6001 the network entry node adds an IOAM header to the BIER data packet, instructing the network node to collect network slice related resource information such as reserved bandwidth, reserved cache, used reserved bandwidth, and used reserved cache.
- the IOAM header contains the IOAM data type and processing method, the IOAM data length, the slice ID, and a bitmap.
- the IOAM data type and processing method indicate that the IOAM header contains hop-by-hop tracking information and adopts the second processing method, that is, each network node directly exports the collected network slice-related resource information together with the slice ID to the network analyzer.
- the bit map is also a series of indicator bits, each bit represents a kind of information, when a bit is set to 1, it indicates that the network node needs to collect this kind of information corresponding to the bit; the slice ID indicates the collected information.
- the slice ID is equal to 600, that is, the relevant resource information of the slice 600 is collected.
- Step 6002 after receiving the BIER data message, the network node collects network slice related resource information according to the instruction of the IOAM header carried by the data message, and processes the collected network slice related resource information according to the instruction of the IOAM header.
- the network node directly exports the collected network slice-related resource information together with the slice ID to the network analyzer for analysis and processing, and then forwards the data packet to the next network node.
- the network node also directly exports the collected network slice related resource information together with the slice ID to the network analyzer for analysis and processing until the network exit.
- the resource information related to the network slice includes reserved bandwidth, reserved cache, used reserved bandwidth, and used reserved cache for slice 600 , and the slice ID is 600 .
- Step 6003 After receiving the BIER data message, the network egress node collects the network slice related resource information of the node according to the instruction of the IOAM header, and strips the IOAM header to restore the original data message.
- the network exit node first directly exports the network slice-related resource information collected by the node together with the slice ID to the network analyzer for analysis and processing.
- the reserved cache is used, the slice ID is 600, and the IOAM header is stripped to restore the original BIER data packet.
- the IOAM header in the prior art is used to carry network slice-related resource information, and optionally a slice ID or a forwarding ID bound to the slice ID.
- the resource information related to network slices includes two types of information, and each type of information specifically includes multiple types of information.
- the first type of information is the network node resources reserved for this network slice, including reserved wavelengths, reserved time slots, reserved bandwidth, reserved caches, reserved queues, and reserved processing priorities;
- the network node resources actually used by the data packets of this network slice include the actual wavelength used, the time slot actually used, the reserved bandwidth used, the reserved buffer used, the queue actually used, and the processing priority actually used.
- the present disclosure can be applied to various data packets such as IPv6 packets, MPLS packets, and BIER packets.
- Table 1 is a glossary of related technical terms, as shown in Table 1:
- FIG. 16 is a structural block diagram 1 of an apparatus for collecting network slice resource information according to an embodiment of the present disclosure. As shown in FIG. 16 , the apparatus includes:
- the adding module 1602 is configured to add an in-band operation, management and maintenance IOAM header to the data packet to obtain the target data packet, wherein the IOAM header includes first indication information, and the first indication information is used for Indicates the resource information of the target network slice that the network node needs to collect;
- the sending module 1604 is configured to send the target data packet to the network node, so as to notify the network node to collect the resource information based on the first indication information.
- the above-mentioned first indication information includes a bitmap, where the bitmap includes multiple bits, and each of the multiple bits is used to indicate that the resource information is at least one kind of information.
- the IOAM header further includes an IOAM data type and a processing method, wherein the IOAM data type and processing method are used to instruct the network node to Describe the processing method of resource information processing.
- the above-mentioned IOAM data type and processing method include one of the following: a first IOAM data type and processing method, wherein the first IOAM data type and processing method are used to indicate that the network node is in After the resource information is collected, the process of adding the resource information to the IOAM header of the target data packet is performed, and the processed target data packet is sent to the next network node to indicate the following: A network node uses the same processing method to process the received processed target data packet until the network exit node completes the processing of the received processed target data packet; and instructs the network exit node to process the received processed target data packet.
- All resource information included in the finally obtained processed target data message is reported to the network analysis device; the second IOAM data type and processing method, wherein the second IOAM data type and processing method are used to indicate the network node. After the resource information is collected, the resource information is directly reported to the network analysis device.
- the above-mentioned IOAM header further includes a target identifier, where the target identifier includes at least one of the following: an identifier of the target network slice, a forwarding bound with the identifier of the target network slice logo.
- the above-mentioned apparatus further includes: a collection module configured to, after adding an in-band operation, management and maintenance IOAM header to the data packet to obtain the target data packet, based on the first indication information Collect the resource information; a first processing module, configured to process the resource information according to the processing mode indicated by the IOAM data type and processing mode.
- the foregoing resource information includes at least one of the following: first resource information, where the first resource information is used to indicate network node resource information reserved for the target network slice; second resource information , the second resource information is used to indicate the network node resource information actually used by the data packet of the target network slice.
- FIG. 17 is a second structural block diagram of an apparatus for collecting network slice resource information according to an embodiment of the present disclosure. As shown in FIG. 17 , the apparatus includes:
- the receiving module 1702 is configured to receive a target data packet sent by a network entry node, wherein the target data packet includes an in-band operation, management and maintenance IOAM header, and the IOAM header includes first indication information, and the The first indication information is used to indicate the resource information of the network slice to be collected;
- the collecting module 1704 is configured to collect the resource information based on the first indication information.
- the above-mentioned first indication information includes a bitmap, where the bitmap includes multiple bits, and each of the multiple bits is used to indicate that the resource information is at least one kind of information.
- the IOAM header further includes an IOAM data type and a processing method, wherein the IOAM data type and processing method are used to indicate that the network node receiving the target data packet has collected all the A processing method for processing the resource information after the resource information is described.
- the above-mentioned IOAM data type and processing method include one of the following: a first IOAM data type and processing method, wherein the first IOAM data type and processing method are used to indicate that the network node is in After the resource information is collected, the process of adding the resource information to the IOAM header of the target data packet is performed, and the processed target data packet is sent to the next network node to indicate the following: A network node uses the same processing method to process the received processed target data packet until the network exit node completes the processing of the received processed target data packet; and instructs the network exit node to process the received processed target data packet.
- All resource information included in the finally obtained processed target data message is reported to the network analysis device; the second IOAM data type and processing method, wherein the second IOAM data type and processing method are used to indicate the network node. After the resource information is collected, the resource information is directly reported to the network analysis device.
- the above-mentioned IOAM header further includes a target identifier, where the target identifier includes at least one of the following: an identifier of the target network slice, a forwarding bound with the identifier of the target network slice logo.
- the above-mentioned apparatus further includes: a second processing module configured to, after collecting the resource information based on the first indication information, follow the processing method indicated by the IOAM data type and processing method The resource information is processed.
- the foregoing resource information includes at least one of the following: first resource information, where the first resource information is used to indicate network node resource information reserved for the target network slice; second resource information , the second resource information is used to indicate the network node resource information actually used by the data packet of the target network slice.
- the above modules can be implemented by software or hardware, and the latter can be implemented in the following ways, but not limited to this: the above modules are all located in the same processor; or, the above modules can be combined in any combination The forms are located in different processors.
- Embodiments of the present disclosure also provide a computer-readable storage medium, where a computer program is stored in the computer-readable storage medium, wherein the computer program is configured to execute the steps in any one of the above method embodiments when running.
- the above-mentioned computer-readable storage medium may include, but is not limited to, a USB flash drive, a read-only memory (Read-Only Memory, referred to as ROM for short), and a random access memory (Random Access Memory, referred to as RAM for short) , mobile hard disk, magnetic disk or CD-ROM and other media that can store computer programs.
- ROM Read-Only Memory
- RAM Random Access Memory
- Embodiments of the present disclosure further provide an electronic device, including a memory and a processor, where a computer program is stored in the memory, and the processor is configured to run the computer program to execute the steps in any of the above method embodiments.
- the above-mentioned electronic device may further include a transmission device and an input-output device, wherein the transmission device is connected to the above-mentioned processor, and the input-output device is connected to the above-mentioned processor.
- modules or steps of the present disclosure can be implemented by a general-purpose computing device, and they can be centralized on a single computing device or distributed in a network composed of multiple computing devices
- they can be implemented in program code executable by a computing device, so that they can be stored in a storage device and executed by the computing device, and in some cases, can be performed in a different order than shown here.
- the described steps, or they are respectively made into individual integrated circuit modules, or a plurality of modules or steps in them are made into a single integrated circuit module to realize.
- the present disclosure is not limited to any particular combination of hardware and software.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Quality & Reliability (AREA)
- Computer Security & Cryptography (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
本公开实施例提供了一种网络切片资源信息的收集方法、装置、存储介质及电子装置,其中,上述方法包括:将带内操作管理维护IOAM头添加至数据报文中,以得到目标数据报文,其中,所述IOAM头中包括有第一指示信息,所述第一指示信息用于指示网络节点需要收集的目标网络切片的资源信息;将所述目标数据报文发送给所述网络节点,以通知所述网络节点基于所述第一指示信息收集所述资源信息。
Description
相关申请的交叉引用
本公开基于2021年4月25日提交的发明名称为“网络切片资源信息的收集方法、装置及存储介质”的中国专利申请CN202110449433.5,并且要求该专利申请的优先权,通过引用将其所公开的内容全部并入本公开。
本公开涉及通信领域,具体而言,涉及一种网络切片资源信息的收集方法、装置、存储介质及电子装置。
随着5G无线网络的大规模部署,用于5G回传网络的网络切片技术也处于快速发展中,根据国际标准组织互联网工程任务组(Internet Engineering Task Force,IETF)的草案draft-ietf-teas-ietf-network-slices的定义,网络切片是一个连接了大量端点的逻辑网络拓扑,该逻辑网络拓扑使用一组共享的或专用的网络资源来满足特定的业务等级目标(Service Level Objectives,SLOs)。网络切片技术在转发平面主要有两种实现方式,第一种实现方式是在数据报文中插入一个专门的切片ID(标识),网络节点在转发数据报文时,通过切片ID来把数据报文与该数据报文所属的网络切片关联起来,这里的切片ID在不同的切片技术中可能有不同的名称,例如也可能被称为虚拟传输网络ID或多拓扑ID,等等;第二种实现方式是在数据报文中插入与切片ID绑定的转发ID,网络节点在转发数据报文时,通过转发ID来把数据报文与该数据报文所属的网络切片关联起来。图1是相关技术中的携带切片ID的IPv6报文封装格式示意图,如图1所示,IPv6切片ID被插入到IPv6数据报文中,用于网络节点识别该报文所属切片。图2是相关技术中的携带与切片ID绑定的转发ID的IPv6报文封装格式示意图,如图2所示,IPv6数据报文的IPv6目的地址是与某个IPv6切片ID绑定的,而且该绑定关系已通过控制平面或管理平面通告到了每一个网络节点,用于网络节点识别该报文所属的网络切片。
无论采用哪种转发平面的实现方式,网络切片技术都要求网络节点在转发数据报文之前,为网络中每一个网络切片预留专用的转发资源,这样在网络节点接收到数据报文之后,就会使用为该数据报文所属的网络切片预留的转发资源,对该数据报文进行转发。但是,目前缺乏一种有效的方法,能够收集网络切片相关资源信息,以实现对网络节点实际转发行为的监控和分析。
针对相关技术中存在的无法有效收集网络切片资源信息的问题,目前尚未提出有效的解决方案。
发明内容
本公开实施例提供了一种网络切片资源信息的收集方法、装置、存储介质及电子装置, 以至少解决相关技术中存在的无法有效收集网络切片资源信息的问题。
根据本公开实施例的一个方面,提供了一种网络切片资源信息的收集方法,包括:将带内操作管理维护IOAM头添加至数据报文中,以得到目标数据报文,其中,所述IOAM头中包括有第一指示信息,所述第一指示信息用于指示网络节点需要收集的目标网络切片的资源信息;将所述目标数据报文发送给所述网络节点,以通知所述网络节点基于所述第一指示信息收集所述资源信息。
在一个示例性实施例中,所述第一指示信息包括比特地图,其中,所述比特地图包含多个比特,多个所述比特中的每个所述比特分别用于指示所述资源信息中的至少一种信息。
在一个示例性实施例中,所述IOAM头中还包括IOAM数据类型和处理方式,其中,所述IOAM数据类型和处理方式用于指示所述网络节点在收集到所述资源信息之后,对所述资源信息进行处理的处理方式。
在一个示例性实施例中,所述IOAM数据类型和处理方式包括以下之一:第一IOAM数据类型和处理方式,其中,所述第一IOAM数据类型和处理方式用于指示所述网络节点在收集到所述资源信息之后,执行将所述资源信息添加到所述目标数据报文的所述IOAM头中的处理,并将处理后的目标数据报文发给下一个网络节点,以指示下一个网络节点采用相同的处理方式对收到的处理后的目标数据报文进行处理,直至网络出口节点对收到的处理后的目标数据报文进行处理完成为止;以及指示所述网络出口节点将最终得到的处理后的目标数据报文中包括的全部资源信息上报给网络分析设备;第二IOAM数据类型和处理方式,其中,所述第二IOAM数据类型和处理方式用于指示所述网络节点在收集到所述资源信息之后,直接将所述资源信息上报给网络分析设备。
在一个示例性实施例中,所述IOAM头中还包括目标标识,其中,所述目标标识包括以下至少之一:所述目标网络切片的标识、与所述目标网络切片的标识绑定的转发标识。
在一个示例性实施例中,在将带内操作管理维护IOAM头添加至数据报文中,以得到目标数据报文之后,所述方法还包括:基于所述第一指示信息收集所述资源信息;按照所述IOAM数据类型和处理方式所指示的所述处理方式对所述资源信息进行处理。
在一个示例性实施例中,所述资源信息包括以下至少之一:第一资源信息,所述第一资源信息用于指示为所述目标网络切片预留的网络节点资源信息;第二资源信息,所述第二资源信息用于指示所述目标网络切片的所述数据报文实际使用的网络节点资源信息。
根据本公开实施例的另一个方面,还提供了一种网络切片资源信息的收集方法,包括:接收网络入口节点发送的目标数据报文,其中,所述目标数据报文中包括有带内操作管理维护IOAM头,所述IOAM头中包括有第一指示信息,所述第一指示信息用于指示需要收集的目标网络切片的资源信息;基于所述第一指示信息收集所述资源信息。
在一个示例性实施例中,所述第一指示信息包括比特地图,其中,所述比特地图包含多个比特,多个所述比特中的每个所述比特分别用于指示所述资源信息中的至少一种信息。
在一个示例性实施例中,所述IOAM头中还包括IOAM数据类型和处理方式,其中,所述IOAM数据类型和处理方式用于指示接收到所述目标数据报文的网络节点在收集到所述资源信息之后,对所述资源信息进行处理的处理方式。
在一个示例性实施例中,所述IOAM数据类型和处理方式包括以下之一:第一IOAM数据类型和处理方式,其中,所述第一IOAM数据类型和处理方式用于指示所述网络节点在收集到 所述资源信息之后,执行将所述资源信息添加到所述目标数据报文的所述IOAM头中的处理,并将处理后的目标数据报文发给下一个网络节点,以指示下一个网络节点采用相同的处理方式对收到的处理后的目标数据报文进行处理,直至网络出口节点对收到的处理后的目标数据报文进行处理完成为止;以及指示所述网络出口节点将最终得到的处理后的目标数据报文中包括的全部资源信息上报给网络分析设备;第二IOAM数据类型和处理方式,其中,所述第二IOAM数据类型和处理方式用于指示所述网络节点在收集到所述资源信息之后,直接将所述资源信息上报给网络分析设备。
在一个示例性实施例中,所述IOAM头中还包括目标标识,其中,所述目标标识包括以下至少之一:所述目标网络切片的标识、与所述目标网络切片的标识绑定的转发标识。
在一个示例性实施例中,在基于所述第一指示信息收集所述资源信息之后,所述方法还包括:按照所述IOAM数据类型和处理方式所指示的处理方式对所述资源信息进行处理。
在一个示例性实施例中,所述资源信息包括以下至少之一:第一资源信息,所述第一资源信息用于指示为所述目标网络切片预留的网络节点资源信息;第二资源信息,所述第二资源信息用于指示所述目标网络切片的所述数据报文实际使用的网络节点资源信息。
根据本公开实施例的又一个方面,还提供了一种网络切片资源信息的收集装置,包括:添加模块,设置为将带内操作管理维护IOAM头添加至数据报文中,以得到目标数据报文,其中,所述IOAM头中包括有第一指示信息,所述第一指示信息用于指示网络节点需要收集的目标网络切片的资源信息;发送模块,设置为将所述目标数据报文发送给所述网络节点,以通知所述网络节点基于所述第一指示信息收集所述资源信息。
根据本公开实施例的又一个方面,还提供了一种网络切片资源信息的收集装置,包括:接收模块,设置为接收网络入口节点发送的目标数据报文,其中,所述目标数据报文中包括有带内操作管理维护IOAM头,所述IOAM头中包括有第一指示信息,所述第一指示信息用于指示需要收集的网络切片的资源信息;收集模块,设置为基于所述第一指示信息收集所述资源信息。
根据本公开实施例的又一个方面,还提供了一种计算机可读的存储介质,该计算机可读的存储介质中存储有计算机程序,其中,该计算机程序被设置为运行时执行上述任一项方法实施例中的步骤。
根据本公开实施例的又一个方面,还提供了一种电子装置,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,其中,上述处理器通过计算机程序执行上述任一项方法实施例中的步骤。
此处所说明的附图用来提供对本公开的进一步理解,构成本申请的一部分,本公开的示例性实施例及其说明用于解释本公开,并不构成对本公开的不当限定。在附图中:
图1是相关技术中的携带切片ID的IPv6报文封装格式示意图;
图2是相关技术中的携带与切片ID绑定的转发ID的IPv6报文封装格式示意图;
图3是本公开实施例的网络切片资源信息的收集方法的移动终端硬件结构框图;
图4是根据本公开实施例的网络切片资源信息的收集方法流程图一;
图5是根据本公开实施例的携带IOAM头的数据报文封装格式示意图;
图6是根据本公开实施例的采用第一种处理方式的IOAM头封装格式示意图;
图7是根据本公开实施例的采用第二种处理方式的IOAM头封装格式示意图;
图8是根据本公开实施例的网络切片资源信息的收集方法流程图二;
图9是根据本公开具体实施例的网络切片资源信息的收集方法流程图;
图10是根据本公开具体实施例的网络入口节点添加IOAM头后的IPv6报文封装格式示意图;
图11是根据本公开具体实施例的网络节点添加切片相关资源信息后的IPv6报文封装格式示意图;
图12是根据本公开具体实施例的网络入口节点添加IOAM头后的MPLS报文封装格式示意图;
图13是根据本公开具体实施例的网络节点添加切片相关资源信息后的MPLS报文封装格式示意图;
图14是根据本公开具体实施例的网络入口节点添加IOAM头后的BIER报文封装格式示意图;
图15是根据本公开具体实施例的网络节点添加切片相关资源信息后的BIER报文封装格式示意图;
图16是根据本公开实施例的网络切片资源信息的收集装置的结构框图一;
图17是根据本公开实施例的网络切片资源信息的收集装置的结构框图二。
为了使本技术领域的人员更好地理解本公开方案,下面将结合本公开实施例中的附图,对本公开实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本公开一部分的实施例,而不是全部的实施例。基于本公开中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都应当属于本公开保护的范围。
需要说明的是,本公开的说明书和权利要求书及上述附图中的术语“第一”、“第二”等是用于区别类似的对象,而不必用于描述特定的顺序或先后次序。应该理解这样使用的数据在适当情况下可以互换,以便这里描述的本公开的实施例能够以除了在这里图示或描述的那些以外的顺序实施。此外,术语“包括”和“具有”以及他们的任何变形,意图在于覆盖不排他的包含,例如,包含了一系列步骤或单元的过程、方法、系统、产品或设备不必限于清楚地列出的那些步骤或单元,而是可包括没有清楚地列出的或对于这些过程、方法、产品或设备固有的其它步骤或单元。
本申请实施例中所提供的方法实施例可以在移动终端、计算机终端或者类似的运算装置中执行。以运行在移动终端上为例,图3是本公开实施例的一种网络切片资源信息的收集方法的移动终端硬件结构框图。如图3所示,移动终端可以包括一个或多个(图3中仅示出一个)处理器302(处理器302可以包括但不限于微处理器MCU或可编程逻辑器件FPGA等的处理装置)和设置为存储数据的存储器304,在一个示例性实施例中,上述移动终端还可以包括设置为通信功能的传输设备306以及输入输出设备308。本领域普通技术人员可以理解,图3所示的结构仅为示意,其并不对上述移动终端的结构造成限定。例如,移动终端还可包括比图3中所示更多或者更少的组件,或者具有与图3所示不同的配置。
存储器304可设置为存储计算机程序,例如,应用软件的软件程序以及模块,如本公开实施例中的网络切片资源信息的收集方法对应的计算机程序,处理器302通过运行存储在存储器304内的计算机程序,从而执行各种功能应用以及数据处理,即实现上述的方法。存储器304可包括高速随机存储器,还可包括非易失性存储器,如一个或者多个磁性存储装置、闪存、或者其他非易失性固态存储器。在一些实例中,存储器304可进一步包括相对于处理器302远程设置的存储器,这些远程存储器可以通过网络连接至移动终端。上述网络的实例包括但不限于互联网、企业内部网、局域网、移动通信网及其组合。
传输设备306设置为经由一个网络接收或者发送数据。上述的网络具体实例可包括移动终端的通信供应商提供的无线网络。在一个实例中,传输设备306包括一个网络适配器(Network Interface Controller,简称为NIC),其可通过基站与其他网络设备相连从而可与互联网进行通讯。在一个实例中,传输设备306可以为射频(Radio Frequency,简称为RF)模块,其设置为通过无线方式与互联网进行通讯。
在本实施例中提供了一种网络切片资源信息的收集方法,图4是根据本公开实施例的网络切片资源信息的收集方法流程图一,如图4所示,该流程包括如下步骤:
步骤S402,将带内操作管理维护IOAM头添加至数据报文中,以得到目标数据报文,其中,所述IOAM头中包括有第一指示信息,所述第一指示信息用于指示网络节点需要收集的目标网络切片的资源信息;
步骤S404,将所述目标数据报文发送给所述网络节点,以通知所述网络节点基于所述第一指示信息收集所述资源信息。
通过上述步骤,通过在数据报文中添加带内操作管理维护IOAM头以得到目标数据报文,而IOAM头中包括有用于指示网络节点需要收集的目标网络切片的资源信息的第一指示信息,当将目标数据报文发送给网络节点后,即可通知网络节点基于IOAM头中携带的第一指示信息来收集目标网络切片的资源信息。采用上述技术方案,解决了相关技术中存在的缺乏一种有效的收集网络切片资源信息的方法的问题,达到了对网络节点实际转发行为进行监控和分析的目的。
其中,上述步骤的执行主体可以为网络节点,例如,网络入口节点、网络中间节点、网络出口节点或其他网络节点等,上述步骤的执行主体还可以是其他的具备类似处理能力的处理设备或处理单元等,但不限于此。下面以网络入口节点执行上述操作为例(仅是一种示例性说明,在实际操作中还可以是其他的设备或模块来执行上述操作)进行说明:
在上述实施例中,网络入口节点(例如网络入口节点A)可将带内操作管理维护IOAM头添加至数据报文中,以得到目标数据报文,图5是根据本公开实施例的携带IOAM头的数据报文封装格式示意图,如图5所示,IOAM头是一种嵌入到数据报文中的用于网络节点信息收集的专用头部,而所述IOAM头中包括有第一指示信息,该第一指示信息用于指示网络节点(例如网络中间节点B或其他网络节点)需要收集的目标网络切片的资源信息,例如,为目标网络切片预留的网络节点资源,或目标网络切片的数据报文实际使用的网络节点资源;当网络入口节点(如上述网络入口节点A)将所述目标数据报文发送给所述网络节点(如上述网络中间节点B)后,即可通知网络节点(如上述网络中间节点B)基于IOAM头中携带的第一指示信息来收集目标网络切片的资源信息。通过实施该技术方案,可有效解决相关技术中存在的缺乏一种有效的收集网络切片资源信息的方法的问题,以实现对网络节点实际转发行为进 行监控和分析的目的。
在一个可选的实施例中,所述第一指示信息包括比特地图,其中,所述比特地图包含多个比特,多个所述比特中的每个所述比特分别用于指示所述资源信息中的至少一种信息。在本实施例中,为了指示网络节点需要收集哪些网络切片相关资源信息,上述IOAM头中包括有第一指示信息,而所述第一指示信息包括比特地图,也即一串指示比特,所述比特地图包含多个比特,其中,多个所述比特中的每个所述比特分别用于指示所述资源信息中的至少一种信息,例如,每个比特代表一种信息,当某个比特置为1时,则指示网络节点需要收集对应于该比特的这种信息,通过本实施例,达到了确定需要收集的网络切片的资源信息的目的,以指示网络节点进行收集。
在一个可选的实施例中,所述IOAM头中还包括IOAM数据类型和处理方式,其中,所述IOAM数据类型和处理方式用于指示所述网络节点在收集到所述资源信息之后,对所述资源信息进行处理的处理方式。在本实施例中,上述IOAM头中还包括IOAM数据类型和处理方式,所述IOAM数据类型和处理方式用于指示上述网络节点在收集到上述资源信息之后,对上述资源信息进行处理的处理方式,可选的,在实际应用中,对资源信息的处理可以有多种不同的处理方式,通过本实施例,达到了指示网络节点在收集到网络切片的资源信息之后对所述资源信息应采取的处理方式的目的。
在一个可选的实施例中,所述IOAM数据类型和处理方式包括以下之一:第一IOAM数据类型和处理方式,其中,所述第一IOAM数据类型和处理方式用于指示所述网络节点在收集到所述资源信息之后,执行将所述资源信息添加到所述目标数据报文的所述IOAM头中的处理,并将处理后的目标数据报文发给下一个网络节点,以指示下一个网络节点采用相同的处理方式对收到的处理后的目标数据报文进行处理,直至网络出口节点对收到的处理后的目标数据报文进行处理完成为止;以及指示所述网络出口节点将最终得到的处理后的目标数据报文中包括的全部资源信息上报给网络分析设备;第二IOAM数据类型和处理方式,其中,所述第二IOAM数据类型和处理方式用于指示所述网络节点在收集到所述资源信息之后,直接将所述资源信息上报给网络分析设备。在本实施例中,所述IOAM数据类型和处理方式包括以下之一:第一IOAM数据类型和处理方式,图6是根据本公开实施例的采用第一种处理方式的IOAM头封装格式示意图,如图6所示,如果IOAM头中的指示信息指示网络节点采用第一种处理方式,即IOAM数据类型和处理方式指示该IOAM头包含逐跳跟踪信息并采用第一种处理方式,也即每个网络节点把收集到的信息添加到IOAM头中,那么网络节点把收集到的网络切片相关资源信息添加到IOAM头中,然后把数据报文往下一个网络节点转发,下一个收到数据报文的网络节点也把收集到的网络切片相关资源信息添加到IOAM头中,直到网络出口处,如果网络出口节点接收到经过处理后的目标数据报文,同时IOAM头中的指示信息指示网络节点采用第一种处理方式,那么网络出口节点先把本节点收集到的网络切片相关资源信息添加到IOAM头中,然后把IOAM头中携带的全部资源信息(例如各网络节点添加的网络切片相关信息与切片ID或绑定切片ID的转发ID)一起导出到网络分析设备;第二IOAM数据类型和处理方式,图7是根据本公开实施例的采用第二种处理方式的IOAM头封装格式示意图,如图7所示,如果IOAM头中的指示信息指示网络节点采用第二种处理方式,IOAM数据类型和处理方式指示该IOAM头包含逐跳跟踪信息并采用第二种处理方式,也即每个网络节点把收集到的信息直接导出到网络分析器,不会添加到IOAM头中,那么网络节点把收集到的所述资源信息(例如网络 切片相关资源信息与切片ID或绑定切片ID的转发ID)一起直接导出到网络分析器进行分析处理,而不会添加到IOAM头中,通过本实施例,实现了由网络节点对目标网络切片的资源信息进行收集并采取不同的处理方式对所述资源信息进行处理的目的。
在一个可选的实施例中,所述IOAM头中还包括目标标识,其中,所述目标标识包括以下至少之一:所述目标网络切片的标识、与所述目标网络切片的标识绑定的转发标识。在本实施例中,上述IOAM头中除了包含比特地图之外,还可选地包括目标标识,例如,所述目标标识包括以下至少之一:所述目标网络切片的标识、与所述目标网络切片的标识绑定的转发标识,达到了简化网络节点的处理过程的目的,方便网络节点直接把收集到的网络切片相关资源信息与网络切片ID关联起来。
在一个可选的实施例中,在将带内操作管理维护IOAM头添加至数据报文中,以得到目标数据报文之后,所述方法还包括:基于所述第一指示信息收集所述资源信息;按照所述IOAM数据类型和处理方式所指示的所述处理方式对所述资源信息进行处理。在本实施例中,在将带内操作管理维护IOAM头添加至数据报文中,以得到目标数据报文之后,网络节点(如上述网络入口节点A或其他网络节点)基于所述IOAM头中包括的第一指示信息收集所述资源信息,并按照所述IOAM头中包括的IOAM数据类型和处理方式所指示的所述处理方式对所述资源信息进行处理。
在一个可选的实施例中,所述资源信息包括以下至少之一:第一资源信息,所述第一资源信息用于指示为所述目标网络切片预留的网络节点资源信息;第二资源信息,所述第二资源信息用于指示所述目标网络切片的所述数据报文实际使用的网络节点资源信息。在本实施例中,上述资源信息包括以下至少之一:第一资源信息,用于指示为所述目标网络切片预留的网络节点资源信息,例如,第一资源信息可以是为目标网络切片预留的网络节点资源,具体可包括预留波长、预留时隙、预留带宽、预留缓存、预留队列、预留处理优先级或其它资源信息;第二资源信息,用于指示所述目标网络切片的所述数据报文实际使用的网络节点资源信息,例如,第二资源信息可以是目标网络切片的数据报文实际使用的网络节点资源,具体包括实际使用波长、实际使用时隙、已使用预留带宽、已使用预留缓存、实际使用队列、实际使用处理优先级或其它资源信息。
在本实施例中还提供了一种网络切片资源信息的收集方法,图8是根据本公开实施例的网络切片资源信息的收集方法流程图二,如图8所示,该流程包括如下步骤:
步骤S802,接收网络入口节点发送的目标数据报文,其中,所述目标数据报文中包括有带内操作管理维护IOAM头,所述IOAM头中包括有第一指示信息,所述第一指示信息用于指示需要收集的目标网络切片的资源信息;
步骤S804,基于所述第一指示信息收集所述资源信息。
通过上述步骤,接收由网络入口节点发送的目标数据报文,且目标数据报文中包括有带内操作管理维护IOAM头,而IOAM头中包括有用于指示网络节点需要收集的目标网络切片的资源信息的第一指示信息,即可基于所述第一指示信息来收集目标网络切片的资源信息。采用上述技术方案,解决了相关技术中存在的缺乏一种有效的收集网络切片资源信息的方法的问题,达到了对网络节点实际转发行为进行监控和分析的目的。
其中,上述步骤的执行主体可以为网络节点,例如,网络入口节点、网络中间节点、网络出口节点或其他网络节点等,上述步骤的执行主体还可以是其他的具备类似处理能力的处 理设备或处理单元等,但不限于此。下面以网络中间节点执行上述操作为例(仅是一种示例性说明,在实际操作中还可以是其他的设备或模块来执行上述操作)进行说明:
在上述实施例中,网络中间节点(例如网络中间节点B)接收到由网络入口节点(如上述网络入口节点A)发送的目标数据报文,且目标数据报文中包括有带内操作管理维护IOAM头,图5是根据本公开实施例的携带IOAM头的数据报文封装格式示意图,如图5所示,IOAM头是一种嵌入到数据报文中的用于网络节点信息收集的专用头部,而IOAM头中包括有用于指示网络节点需要收集的目标网络切片的资源信息的第一指示信息,该第一指示信息用于指示网络节点(例如上述网络中间节点B或其他网络节点)需要收集的目标网络切片的资源信息,例如,为目标网络切片预留的网络节点资源,或目标网络切片的数据报文实际使用的网络节点资源;然后网络节点(例如上述网络中间节点B或其他网络节点)可基于IOAM头中携带的第一指示信息来收集目标网络切片的资源信息。通过实施该技术方案,可有效解决相关技术中存在的缺乏一种有效的收集网络切片资源信息的方法的问题,以实现对网络节点实际转发行为进行监控和分析的目的。
在一个可选的实施例中,所述第一指示信息包括比特地图,其中,所述比特地图包含多个比特,多个所述比特中的每个所述比特分别用于指示所述资源信息中的至少一种信息。在本实施例中,为了指示网络节点需要收集哪些网络切片相关资源信息,上述IOAM头中包括有第一指示信息,而所述第一指示信息包括比特地图,也即一串指示比特,所述比特地图包含多个比特,其中,多个所述比特中的每个所述比特分别用于指示所述资源信息中的至少一种信息,例如,每个比特代表一种信息,当某个比特置为1时,则指示网络节点需要收集对应于该比特的这种信息,通过本实施例,达到了确定需要收集的网络切片的资源信息的目的,以指示网络节点进行收集。
在一个可选的实施例中,所述IOAM头中还包括IOAM数据类型和处理方式,其中,所述IOAM数据类型和处理方式用于指示接收到所述目标数据报文的网络节点在收集到所述资源信息之后,对所述资源信息进行处理的处理方式。在本实施例中,上述IOAM头中还包括IOAM数据类型和处理方式,所述IOAM数据类型和处理方式用于指示接收到所述目标数据报文的网络节点(例如上述网络中间节点B或其他网络节点)在收集到上述资源信息之后,对上述资源信息进行处理的处理方式,可选的,在实际应用中,对资源信息的处理可以有多种不同的处理方式,通过本实施例,达到了指示网络节点在收集到网络切片的资源信息之后对所述资源信息应采取的处理方式的目的。
在一个可选的实施例中,所述IOAM数据类型和处理方式包括以下之一:第一IOAM数据类型和处理方式,其中,所述第一IOAM数据类型和处理方式用于指示所述网络节点在收集到所述资源信息之后,执行将所述资源信息添加到所述目标数据报文的所述IOAM头中的处理,并将处理后的目标数据报文发给下一个网络节点,以指示下一个网络节点采用相同的处理方式对收到的处理后的目标数据报文进行处理,直至网络出口节点对收到的处理后的目标数据报文进行处理完成为止;以及指示所述网络出口节点将最终得到的处理后的目标数据报文中包括的全部资源信息上报给网络分析设备;第二IOAM数据类型和处理方式,其中,所述第二IOAM数据类型和处理方式用于指示所述网络节点在收集到所述资源信息之后,直接将所述资源信息上报给网络分析设备。在本实施例中,所述IOAM数据类型和处理方式包括以下之一:第一IOAM数据类型和处理方式,图6是根据本公开实施例的采用第一种处理方式的IOAM头 封装格式示意图,如图6所示,如果IOAM头中的指示信息指示网络节点采用第一种处理方式,即IOAM数据类型和处理方式指示该IOAM头包含逐跳跟踪信息并采用第一种处理方式,也即每个网络节点把收集到的信息添加到IOAM头中,那么网络节点把收集到的网络切片相关资源信息添加到IOAM头中,然后把数据报文往下一个网络节点转发,下一个收到数据报文的网络节点也把收集到的网络切片相关资源信息添加到IOAM头中,直到网络出口处,如果网络出口节点接收到经过处理后的目标数据报文,同时IOAM头中的指示信息指示网络节点采用第一种处理方式,那么网络出口节点先把本节点收集到的网络切片相关资源信息添加到IOAM头中,然后把IOAM头中携带的全部资源信息(例如各网络节点添加的网络切片相关信息与切片ID或绑定切片ID的转发ID)一起导出到网络分析设备;第二IOAM数据类型和处理方式,图7是根据本公开实施例的采用第二种处理方式的IOAM头封装格式示意图,如图7所示,如果IOAM头中的指示信息指示网络节点采用第二种处理方式,IOAM数据类型和处理方式指示该IOAM头包含逐跳跟踪信息并采用第二种处理方式,也即每个网络节点把收集到的信息直接导出到网络分析器,不会添加到IOAM头中,那么网络节点把收集到的所述资源信息(例如网络切片相关资源信息与切片ID或绑定切片ID的转发ID)一起直接导出到网络分析器进行分析处理,而不会添加到IOAM头中,通过本实施例,实现了由网络节点对目标网络切片的资源信息进行收集并采取不同的处理方式对所述资源信息进行处理的目的。
在一个可选的实施例中,所述IOAM头中还包括目标标识,其中,所述目标标识包括以下至少之一:所述目标网络切片的标识、与所述目标网络切片的标识绑定的转发标识。在本实施例中,上述IOAM头中除了包含比特地图之外,还可选地包括目标标识,例如,所述目标标识包括以下至少之一:所述目标网络切片的标识、与所述目标网络切片的标识绑定的转发标识,达到了简化网络节点的处理过程的目的,方便网络节点直接把收集到的网络切片相关资源信息与网络切片ID关联起来。
在一个可选的实施例中,在基于所述第一指示信息收集所述资源信息之后,所述方法还包括:按照所述IOAM数据类型和处理方式所指示的处理方式对所述资源信息进行处理。在本实施例中,网络中间节点(如上述网络中间节点B)在基于所述第一指示信息收集所述资源信息之后,按照所述IOAM数据类型和处理方式所指示的处理方式对所述资源信息进行处理。
在一个可选的实施例中,所述资源信息包括以下至少之一:第一资源信息,所述第一资源信息用于指示为所述目标网络切片预留的网络节点资源信息;第二资源信息,所述第二资源信息用于指示所述目标网络切片的所述数据报文实际使用的网络节点资源信息。在本实施例中,在本实施例中,上述资源信息包括以下至少之一:第一资源信息,用于指示为所述目标网络切片预留的网络节点资源信息,例如,第一资源信息可以是为目标网络切片预留的网络节点资源,具体可包括预留波长、预留时隙、预留带宽、预留缓存、预留队列、预留处理优先级或其它资源信息;第二资源信息,用于指示所述目标网络切片的所述数据报文实际使用的网络节点资源信息,例如,第二资源信息可以是目标网络切片的数据报文实际使用的网络节点资源,具体包括实际使用波长、实际使用时隙、已使用预留带宽、已使用预留缓存、实际使用队列、实际使用处理优先级或其它资源信息。
下面结合具体实施例对本公开进行具体说明:
图9是根据本公开具体实施例的网络切片资源信息的收集方法流程图,如图9所示,该流程包括如下步骤:
步骤S902,网络入口节点给数据报文添加带内操作管理维护IOAM头,其中,IOAM头用于指示网络节点收集网络切片相关转发信息(对应于前述网络切片的资源信息);
步骤S904,网络节点(例如前述网络中间节点)根据IOAM头的指示收集网络切片相关转发信息,并对收集到的网络切片相关转发信息进行处理;
步骤S906,网络出口节点根据IOAM头的指示收集本节点的网络切片相关转发信息,并剥离IOAM头,恢复原始数据报文。
通过上述步骤,网络入口节点在数据报文中添加带内操作管理维护IOAM头,而IOAM头用于指示网络节点需要收集的目标网络切片的相关转发信息,当网络节点接收到网络入口节点发送的数据报文后,根据IOAM头的指示收集网络切片相关转发信息,并对收集到的网络切片相关转发信息进行处理,并将处理后的目标数据报文发给网络出口节点,网络出口节点再根据IOAM头的指示收集本节点的网络切片相关转发信息,并剥离IOAM头,恢复原始数据报文。通过该技术方案,解决了相关技术中存在的缺乏一种有效的收集网络切片资源信息的方法的问题,达到了对网络节点实际转发行为进行监控和分析的目的。
具体实施例一:
在IPv6网络中收集预留带宽、预留缓存、已使用预留带宽、已使用预留缓存这些网络切片相关资源信息,采用IOAM的第一种处理方式。
步骤1001,网络入口节点给IPv6数据报文添加IOAM头,指示网络节点收集预留带宽、预留缓存、已使用预留带宽、已使用预留缓存这些网络切片相关资源信息。
IOAM头中包含IOAM数据类型和处理方式、IOAM数据长度、切片ID以及一个比特地图。其中,IOAM数据类型和处理方式指示该IOAM头包含逐跳跟踪信息并采用第一种处理方式,也即每个网络节点把IOAM头所指示的网络信息添加到IOAM头中;比特地图也即一串指示比特,每个比特代表一种信息,当某个比特置为1时,则指示网络节点需要收集对应于该比特的这种信息;切片ID指示收集的是哪一个切片的相关资源信息,本实施例中切片ID等于100,也即收集的是切片100的相关资源信息。
图10是根据本公开具体实施例的网络入口节点添加IOAM头后的IPv6报文封装格式示意图,如图10所示,IOAM头中包含的比特地图中有四个比特置1,这四个比特代表的信息分别是预留带宽、预留缓存、已使用预留带宽和已使用预留缓存。
步骤1002,网络节点接收到IPv6数据报文后,根据数据报文携带的IOAM头的指示收集网络切片相关资源信息,并根据IOAM头的指示对收集到的网络切片相关资源信息进行处理。
网络节点根据IOAM头的指示把收集到的网络切片相关资源信息添加到IOAM头中,然后把数据报文往下一个网络节点转发,下一个收到数据报文的网络节点也把收集到的网络切片相关资源信息添加到IOAM头中,直到网络出口处。图11是根据本公开具体实施例的网络节点添加切片相关资源信息后的IPv6报文封装格式示意图,如图11所示,网络节点把收集到的信息添加到IOAM头中,这些信息包括针对切片100的预留带宽、预留缓存、已使用预留带宽和已使用预留缓存。
步骤1003,网络出口节点接收到IPv6数据报文后,根据IOAM头的指示收集本节点的网络切片相关资源信息,并剥离IOAM头,恢复原始数据报文。
网络出口节点先把本节点收集到的网络切片相关资源信息添加到IOAM头中,这些信息包括切片100的预留带宽、预留缓存、已使用预留带宽和已使用预留缓存,然后把IOAM头中携 带的各网络节点添加的网络切片相关信息与切片ID一起导出到网络分析器,并剥离IOAM头,恢复原始IPv6数据报文。
具体实施例二:
在IPv6网络中收集预留带宽、预留缓存、已使用预留带宽、已使用预留缓存这些网络切片相关资源信息,采用IOAM的第二种处理方式。
步骤2001,网络入口节点给IPv6数据报文添加IOAM头,指示网络节点收集预留带宽、预留缓存、已使用预留带宽、已使用预留缓存这些网络切片相关资源信息。
IOAM头中包含IOAM数据类型和处理方式、IOAM数据长度、切片ID以及一个比特地图。其中,IOAM数据类型和处理方式指示该IOAM头包含逐跳跟踪信息并采用第二种处理方式,也即每个网络节点把收集到的网络切片相关资源信息与切片ID一起直接导出到网络分析器进行分析处理;比特地图也即一串指示比特,每个比特代表一种信息,当某个比特置为1时,则指示网络节点需要收集对应于该比特的这种信息;切片ID指示收集的是哪一个切片的相关资源信息,本实施例中切片ID等于200,也即收集的是切片200的相关资源信息。
步骤2002,网络节点接收到IPv6数据报文后,根据数据报文携带的IOAM头的指示收集网络切片相关资源信息,并根据IOAM头的指示对收集到的网络切片相关资源信息进行处理。
网络节点根据IOAM头的指示把收集到的网络切片相关资源信息与切片ID一起直接导出到网络分析器进行分析处理,然后把数据报文往下一个网络节点转发,下一个收到数据报文的网络节点也把收集到的网络切片相关资源信息与切片ID一起直接导出到网络分析器进行分析处理,直到网络出口处。网络切片相关资源信息包括针对切片200的预留带宽、预留缓存、已使用预留带宽和已使用预留缓存,切片ID为200。
步骤2003,网络出口节点接收到IPv6数据报文后,根据IOAM头的指示收集本节点的网络切片相关资源信息,并剥离IOAM头,恢复原始数据报文。
网络出口节点先把本节点收集到的网络切片相关资源信息与切片ID一起直接导出到网络分析器进行分析处理,这些信息包括切片200的预留带宽、预留缓存、已使用预留带宽和已使用预留缓存,切片ID为200,然后剥离IOAM头,恢复原始IPv6数据报文。
具体实施例三:
在MPLS网络中收集预留带宽、预留缓存、已使用预留带宽、已使用预留缓存这些网络切片相关资源信息,采用IOAM的第一种处理方式。
步骤3001,网络入口节点给MPLS数据报文添加IOAM头,指示网络节点收集预留带宽、预留缓存、已使用预留带宽、已使用预留缓存这些网络切片相关资源信息。
IOAM头中包含IOAM数据类型和处理方式、IOAM数据长度、切片ID以及一个比特地图。其中,IOAM数据类型和处理方式指示该IOAM头包含逐跳跟踪信息并采用第一种处理方式,也即每个网络节点把IOAM头所指示的网络信息添加到IOAM头中;比特地图也即一串指示比特,每个比特代表一种信息,当某个比特置为1时,则指示网络节点需要收集对应于该比特的这种信息;切片ID指示收集的是哪一个切片的相关资源信息,本实施例中切片ID等于300,也即收集的是切片300的相关资源信息。
图12是根据本公开具体实施例的网络入口节点添加IOAM头后的MPLS报文封装格式示意图,如图12所示,IOAM头中包含的比特地图中有四个比特置1,这四个比特代表的信息分别是预留带宽、预留缓存、已使用预留带宽和已使用预留缓存。
步骤3002,网络节点接收到MPLS数据报文后,根据数据报文携带的IOAM头的指示收集网络切片相关资源信息,并根据IOAM头的指示对收集到的网络切片相关资源信息进行处理。
网络节点根据IOAM头的指示把收集到的网络切片相关资源信息添加到IOAM头中,然后把数据报文往下一个网络节点转发,下一个收到数据报文的网络节点也把收集到的网络切片相关资源信息添加到IOAM头中,直到网络出口处。图13是根据本公开具体实施例的网络节点添加切片相关资源信息后的MPLS报文封装格式示意图,如图13所示,网络节点把收集到的信息添加到IOAM头中,这些信息包括针对切片300的预留带宽、预留缓存、已使用预留带宽和已使用预留缓存。
步骤3003,网络出口节点接收到MPLS数据报文后,根据IOAM头的指示收集本节点的网络切片相关资源信息,并剥离IOAM头,恢复原始数据报文。
网络出口节点先把本节点收集到的网络切片相关资源信息添加到IOAM头中,这些信息包括切片300的预留带宽、预留缓存、已使用预留带宽和已使用预留缓存,然后把IOAM头中携带的各网络节点添加的网络切片相关信息与切片ID一起导出到网络分析器,并剥离IOAM头,恢复原始MPLS数据报文。
具体实施例四:
在MPLS网络中收集预留带宽、预留缓存、已使用预留带宽、已使用预留缓存这些网络切片相关资源信息,采用IOAM的第二种处理方式。
步骤4001,网络入口节点给MPLS数据报文添加IOAM头,指示网络节点收集预留带宽、预留缓存、已使用预留带宽、已使用预留缓存这些网络切片相关资源信息。
IOAM头中包含IOAM数据类型和处理方式、IOAM数据长度、切片ID以及一个比特地图。其中,IOAM数据类型和处理方式指示该IOAM头包含逐跳跟踪信息并采用第二种处理方式,也即每个网络节点把收集到的网络切片相关资源信息与切片ID一起直接导出到网络分析器进行分析处理;比特地图也即一串指示比特,每个比特代表一种信息,当某个比特置为1时,则指示网络节点需要收集对应于该比特的这种信息;切片ID指示收集的是哪一个切片的相关资源信息,本实施例中切片ID等于400,也即收集的是切片400的相关资源信息。
步骤4002,网络节点接收到MPLS数据报文后,根据数据报文携带的IOAM头的指示收集网络切片相关资源信息,并根据IOAM头的指示对收集到的网络切片相关资源信息进行处理。
网络节点根据IOAM头的指示把收集到的网络切片相关资源信息与切片ID一起直接导出到网络分析器进行分析处理,然后把数据报文往下一个网络节点转发,下一个收到数据报文的网络节点也把收集到的网络切片相关资源信息与切片ID一起直接导出到网络分析器进行分析处理,直到网络出口处。网络切片相关资源信息包括针对切片400的预留带宽、预留缓存、已使用预留带宽和已使用预留缓存,切片ID为400。
步骤4003,网络出口节点接收到MPLS数据报文后,根据IOAM头的指示收集本节点的网络切片相关资源信息,并剥离IOAM头,恢复原始数据报文。
网络出口节点先把本节点收集到的网络切片相关资源信息与切片ID一起直接导出到网络分析器进行分析处理,这些信息包括切片400的预留带宽、预留缓存、已使用预留带宽和已使用预留缓存,切片ID为400,然后剥离IOAM头,恢复原始MPLS数据报文。
具体实施例五:
在BIER网络中收集预留带宽、预留缓存、已使用预留带宽、已使用预留缓存这些网络切 片相关资源信息,采用IOAM的第一种处理方式。
步骤5001,网络入口节点给BIER数据报文添加IOAM头,指示网络节点收集预留带宽、预留缓存、已使用预留带宽、已使用预留缓存这些网络切片相关资源信息。
IOAM头中包含IOAM数据类型和处理方式、IOAM数据长度、切片ID以及一个比特地图。其中,IOAM数据类型和处理方式指示该IOAM头包含逐跳跟踪信息并采用第一种处理方式,也即每个网络节点把IOAM头所指示的网络信息添加到IOAM头中;比特地图也即一串指示比特,每个比特代表一种信息,当某个比特置为1时,则指示网络节点需要收集对应于该比特的这种信息;切片ID指示收集的是哪一个切片的相关资源信息,本实施例中切片ID等于500,也即收集的是切片500的相关资源信息。
图14是根据本公开具体实施例的网络入口节点添加IOAM头后的BIER报文封装格式示意图,如图14所示,IOAM头中包含的比特地图中有四个比特置1,这四个比特代表的信息分别是预留带宽、预留缓存、已使用预留带宽和已使用预留缓存。
步骤5002,网络节点接收到BIER数据报文后,根据数据报文携带的IOAM头的指示收集网络切片相关资源信息,并根据IOAM头的指示对收集到的网络切片相关资源信息进行处理。
网络节点根据IOAM头的指示把收集到的网络切片相关资源信息添加到IOAM头中,然后把数据报文往下一个网络节点转发,下一个收到数据报文的网络节点也把收集到的网络切片相关资源信息添加到IOAM头中,直到网络出口处。图15是根据本公开具体实施例的网络节点添加切片相关资源信息后的BIER报文封装格式示意图,如图15所示,网络节点把收集到的信息添加到IOAM头中,这些信息包括针对切片500的预留带宽、预留缓存、已使用预留带宽和已使用预留缓存。
步骤5003,网络出口节点接收到BIER数据报文后,根据IOAM头的指示收集本节点的网络切片相关资源信息,并剥离IOAM头,恢复原始数据报文。
网络出口节点先把本节点收集到的网络切片相关资源信息添加到IOAM头中,这些信息包括切片500的预留带宽、预留缓存、已使用预留带宽和已使用预留缓存,然后把IOAM头中携带的各网络节点添加的网络切片相关信息与切片ID一起导出到网络分析器,并剥离IOAM头,恢复原始BIER数据报文。
具体实施例六:
在BIER网络中收集预留带宽、预留缓存、已使用预留带宽、已使用预留缓存这些网络切片相关资源信息,采用IOAM的第二种处理方式。
步骤6001,网络入口节点给BIER数据报文添加IOAM头,指示网络节点收集预留带宽、预留缓存、已使用预留带宽、已使用预留缓存这些网络切片相关资源信息。
IOAM头中包含IOAM数据类型和处理方式、IOAM数据长度、切片ID以及一个比特地图。其中,IOAM数据类型和处理方式指示该IOAM头包含逐跳跟踪信息并采用第二种处理方式,也即每个网络节点把收集到的网络切片相关资源信息与切片ID一起直接导出到网络分析器进行分析处理;比特地图也即一串指示比特,每个比特代表一种信息,当某个比特置为1时,则指示网络节点需要收集对应于该比特的这种信息;切片ID指示收集的是哪一个切片的相关资源信息,本实施例中切片ID等于600,也即收集的是切片600的相关资源信息。
步骤6002,网络节点接收到BIER数据报文后,根据数据报文携带的IOAM头的指示收集网络切片相关资源信息,并根据IOAM头的指示对收集到的网络切片相关资源信息进行处 理。
网络节点根据IOAM头的指示把收集到的网络切片相关资源信息与切片ID一起直接导出到网络分析器进行分析处理,然后把数据报文往下一个网络节点转发,下一个收到数据报文的网络节点也把收集到的网络切片相关资源信息与切片ID一起直接导出到网络分析器进行分析处理,直到网络出口处。网络切片相关资源信息包括针对切片600的预留带宽、预留缓存、已使用预留带宽和已使用预留缓存,切片ID为600。
步骤6003,网络出口节点接收到BIER数据报文后,根据IOAM头的指示收集本节点的网络切片相关资源信息,并剥离IOAM头,恢复原始数据报文。
网络出口节点先把本节点收集到的网络切片相关资源信息与切片ID一起直接导出到网络分析器进行分析处理,这些信息包括切片600的预留带宽、预留缓存、已使用预留带宽和已使用预留缓存,切片ID为600,然后剥离IOAM头,恢复原始BIER数据报文。
利用现有技术中的IOAM头携带网络切片相关资源信息,并可选地携带切片ID或绑定切片ID的转发ID。网络切片相关资源信息包括两类信息,每一类信息又具体包含多种信息。第一类信息是为这个网络切片预留的网络节点资源,具体包括预留波长、预留时隙、预留带宽、预留缓存、预留队列、预留处理优先级;第二类是属于这个网络切片的数据报文实际使用的网络节点资源,具体包括实际使用波长、实际使用时隙、已使用预留带宽、已使用预留缓存、实际使用队列、实际使用处理优先级。
本公开可应用于IPv6报文、MPLS报文、BIER报文等各种数据报文。
为了便于理解本公开实施例,特对相关术语的缩写、英文全称及中文释义进行说明,表1为相关技术术语表,如表1所示:
表1
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到根据上述实施例的方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本公开的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端设备(可以是手机,计算机,服务器,或者网络设备等)执行本公开各个实施例的方法。
在本实施例中还提供了一种网络切片资源信息的收集装置,图16是根据本公开实施例的网络切片资源信息的收集装置的结构框图一,如图16所示,该装置包括:
添加模块1602,设置为将带内操作管理维护IOAM头添加至数据报文中,以得到目标数 据报文,其中,所述IOAM头中包括有第一指示信息,所述第一指示信息用于指示网络节点需要收集的目标网络切片的资源信息;
发送模块1604,设置为将所述目标数据报文发送给所述网络节点,以通知所述网络节点基于所述第一指示信息收集所述资源信息。
在一个可选的实施例中,上述第一指示信息包括比特地图,其中,所述比特地图包含多个比特,多个所述比特中的每个所述比特分别用于指示所述资源信息中的至少一种信息。
在一个可选的实施例中,上述IOAM头中还包括IOAM数据类型和处理方式,其中,所述IOAM数据类型和处理方式用于指示所述网络节点在收集到所述资源信息之后,对所述资源信息进行处理的处理方式。
在一个可选的实施例中,上述IOAM数据类型和处理方式包括以下之一:第一IOAM数据类型和处理方式,其中,所述第一IOAM数据类型和处理方式用于指示所述网络节点在收集到所述资源信息之后,执行将所述资源信息添加到所述目标数据报文的所述IOAM头中的处理,并将处理后的目标数据报文发给下一个网络节点,以指示下一个网络节点采用相同的处理方式对收到的处理后的目标数据报文进行处理,直至网络出口节点对收到的处理后的目标数据报文进行处理完成为止;以及指示所述网络出口节点将最终得到的处理后的目标数据报文中包括的全部资源信息上报给网络分析设备;第二IOAM数据类型和处理方式,其中,所述第二IOAM数据类型和处理方式用于指示所述网络节点在收集到所述资源信息之后,直接将所述资源信息上报给网络分析设备。
在一个可选的实施例中,上述IOAM头中还包括目标标识,其中,所述目标标识包括以下至少之一:所述目标网络切片的标识、与所述目标网络切片的标识绑定的转发标识。
在一个可选的实施例中,上述装置还包括:收集模块,设置为在将带内操作管理维护IOAM头添加至数据报文中,以得到目标数据报文之后,基于所述第一指示信息收集所述资源信息;第一处理模块,设置为按照所述IOAM数据类型和处理方式所指示的所述处理方式对所述资源信息进行处理。
在一个可选的实施例中,上述资源信息包括以下至少之一:第一资源信息,所述第一资源信息用于指示为所述目标网络切片预留的网络节点资源信息;第二资源信息,所述第二资源信息用于指示所述目标网络切片的所述数据报文实际使用的网络节点资源信息。
在本实施例中还提供了一种网络切片资源信息的收集装置,图17是根据本公开实施例的网络切片资源信息的收集装置的结构框图二,如图17所示,该装置包括:
接收模块1702,设置为接收网络入口节点发送的目标数据报文,其中,所述目标数据报文中包括有带内操作管理维护IOAM头,所述IOAM头中包括有第一指示信息,所述第一指示信息用于指示需要收集的网络切片的资源信息;
收集模块1704,设置为基于所述第一指示信息收集所述资源信息。
在一个可选的实施例中,上述第一指示信息包括比特地图,其中,所述比特地图包含多个比特,多个所述比特中的每个所述比特分别用于指示所述资源信息中的至少一种信息。
在一个可选的实施例中,上述IOAM头中还包括IOAM数据类型和处理方式,其中,所述IOAM数据类型和处理方式用于指示接收到所述目标数据报文的网络节点在收集到所述资源信息之后,对所述资源信息进行处理的处理方式。
在一个可选的实施例中,上述IOAM数据类型和处理方式包括以下之一:第一IOAM数据 类型和处理方式,其中,所述第一IOAM数据类型和处理方式用于指示所述网络节点在收集到所述资源信息之后,执行将所述资源信息添加到所述目标数据报文的所述IOAM头中的处理,并将处理后的目标数据报文发给下一个网络节点,以指示下一个网络节点采用相同的处理方式对收到的处理后的目标数据报文进行处理,直至网络出口节点对收到的处理后的目标数据报文进行处理完成为止;以及指示所述网络出口节点将最终得到的处理后的目标数据报文中包括的全部资源信息上报给网络分析设备;第二IOAM数据类型和处理方式,其中,所述第二IOAM数据类型和处理方式用于指示所述网络节点在收集到所述资源信息之后,直接将所述资源信息上报给网络分析设备。
在一个可选的实施例中,上述IOAM头中还包括目标标识,其中,所述目标标识包括以下至少之一:所述目标网络切片的标识、与所述目标网络切片的标识绑定的转发标识。
在一个可选的实施例中,上述装置还包括:第二处理模块,设置为在基于所述第一指示信息收集所述资源信息之后,按照所述IOAM数据类型和处理方式所指示的处理方式对所述资源信息进行处理。
在一个可选的实施例中,上述资源信息包括以下至少之一:第一资源信息,所述第一资源信息用于指示为所述目标网络切片预留的网络节点资源信息;第二资源信息,所述第二资源信息用于指示所述目标网络切片的所述数据报文实际使用的网络节点资源信息。
需要说明的是,上述各个模块是可以通过软件或硬件来实现的,对于后者,可以通过以下方式实现,但不限于此:上述模块均位于同一处理器中;或者,上述各个模块以任意组合的形式分别位于不同的处理器中。
本公开的实施例还提供了一种计算机可读存储介质,该计算机可读存储介质中存储有计算机程序,其中,该计算机程序被设置为运行时执行上述任一项方法实施例中的步骤。
在一个示例性实施例中,上述计算机可读存储介质可以包括但不限于:U盘、只读存储器(Read-Only Memory,简称为ROM)、随机存取存储器(Random Access Memory,简称为RAM)、移动硬盘、磁碟或者光盘等各种可以存储计算机程序的介质。
本公开的实施例还提供了一种电子装置,包括存储器和处理器,该存储器中存储有计算机程序,该处理器被设置为运行计算机程序以执行上述任一项方法实施例中的步骤。
在一个示例性实施例中,上述电子装置还可以包括传输设备以及输入输出设备,其中,该传输设备和上述处理器连接,该输入输出设备和上述处理器连接。
本实施例中的具体示例可以参考上述实施例及示例性实施方式中所描述的示例,本实施例在此不再赘述。
显然,本领域的技术人员应该明白,上述的本公开的各模块或各步骤可以用通用的计算装置来实现,它们可以集中在单个的计算装置上,或者分布在多个计算装置所组成的网络上,它们可以用计算装置可执行的程序代码来实现,从而,可以将它们存储在存储装置中由计算装置来执行,并且在某些情况下,可以以不同于此处的顺序执行所示出或描述的步骤,或者将它们分别制作成各个集成电路模块,或者将它们中的多个模块或步骤制作成单个集成电路模块来实现。这样,本公开不限制于任何特定的硬件和软件结合。
以上所述仅为本公开的优选实施例而已,并不用于限制本公开,对于本领域的技术人员来说,本公开可以有各种更改和变化。凡在本公开的原则之内,所作的任何修改、等同替换、改进等,均应包含在本公开的保护范围之内。
Claims (18)
- 一种网络切片资源信息的收集方法,包括:将带内操作管理维护IOAM头添加至数据报文中,以得到目标数据报文,其中,所述IOAM头中包括有第一指示信息,所述第一指示信息用于指示网络节点需要收集的目标网络切片的资源信息;将所述目标数据报文发送给所述网络节点,以通知所述网络节点基于所述第一指示信息收集所述资源信息。
- 根据权利要求1所述的方法,其中,所述第一指示信息包括比特地图,其中,所述比特地图包含多个比特,多个所述比特中的每个所述比特分别用于指示所述资源信息中的至少一种信息。
- 根据权利要求1所述的方法,其中,所述IOAM头中还包括IOAM数据类型和处理方式,其中,所述IOAM数据类型和处理方式用于指示所述网络节点在收集到所述资源信息之后,对所述资源信息进行处理的处理方式。
- 根据权利要求3所述的方法,其中,所述IOAM数据类型和处理方式包括以下之一:第一IOAM数据类型和处理方式,其中,所述第一IOAM数据类型和处理方式用于指示所述网络节点在收集到所述资源信息之后,执行将所述资源信息添加到所述目标数据报文的所述IOAM头中的处理,并将处理后的目标数据报文发给下一个网络节点,以指示下一个网络节点采用相同的处理方式对收到的处理后的目标数据报文进行处理,直至网络出口节点对收到的处理后的目标数据报文进行处理完成为止;以及指示所述网络出口节点将最终得到的处理后的目标数据报文中包括的全部资源信息上报给网络分析设备;第二IOAM数据类型和处理方式,其中,所述第二IOAM数据类型和处理方式用于指示所述网络节点在收集到所述资源信息之后,直接将所述资源信息上报给网络分析设备。
- 根据权利要求1所述的方法,其中,所述IOAM头中还包括目标标识,其中,所述目标标识包括以下至少之一:所述目标网络切片的标识、与所述目标网络切片的标识绑定的转发标识。
- 根据权利要求3所述的方法,其中,在将带内操作管理维护IOAM头添加至数据报文中,以得到目标数据报文之后,所述方法还包括:基于所述第一指示信息收集所述资源信息;按照所述IOAM数据类型和处理方式所指示的所述处理方式对所述资源信息进行处理。
- 根据权利要求1-6中任一项所述的方法,其中,所述资源信息包括以下至少之一:第一资源信息,所述第一资源信息用于指示为所述目标网络切片预留的网络节点资源信息;第二资源信息,所述第二资源信息用于指示所述目标网络切片的所述数据报文实际使 用的网络节点资源信息。
- 一种网络切片资源信息的收集方法,包括:接收网络入口节点发送的目标数据报文,其中,所述目标数据报文中包括有带内操作管理维护IOAM头,所述IOAM头中包括有第一指示信息,所述第一指示信息用于指示需要收集的目标网络切片的资源信息;基于所述第一指示信息收集所述资源信息。
- 根据权利要求8所述的方法,其中,所述第一指示信息包括比特地图,其中,所述比特地图包含多个比特,多个所述比特中的每个所述比特分别用于指示所述资源信息中的至少一种信息。
- 根据权利要求8所述的方法,其中,所述IOAM头中还包括IOAM数据类型和处理方式,其中,所述IOAM数据类型和处理方式用于指示接收到所述目标数据报文的网络节点在收集到所述资源信息之后,对所述资源信息进行处理的处理方式。
- 根据权利要求10所述的方法,其中,所述IOAM数据类型和处理方式包括以下之一:第一IOAM数据类型和处理方式,其中,所述第一IOAM数据类型和处理方式用于指示所述网络节点在收集到所述资源信息之后,执行将所述资源信息添加到所述目标数据报文的所述IOAM头中的处理,并将处理后的目标数据报文发给下一个网络节点,以指示下一个网络节点采用相同的处理方式对收到的处理后的目标数据报文进行处理,直至网络出口节点对收到的处理后的目标数据报文进行处理完成为止;以及指示所述网络出口节点将最终得到的处理后的目标数据报文中包括的全部资源信息上报给网络分析设备;第二IOAM数据类型和处理方式,其中,所述第二IOAM数据类型和处理方式用于指示所述网络节点在收集到所述资源信息之后,直接将所述资源信息上报给网络分析设备。
- 根据权利要求8所述的方法,其中,所述IOAM头中还包括目标标识,其中,所述目标标识包括以下至少之一:所述目标网络切片的标识、与所述目标网络切片的标识绑定的转发标识。
- 根据权利要求10所述的方法,其中,在基于所述第一指示信息收集所述资源信息之后,所述方法还包括:按照所述IOAM数据类型和处理方式所指示的处理方式对所述资源信息进行处理。
- 根据权利要求8-13中任一项所述的方法,其中,所述资源信息包括以下至少之一:第一资源信息,所述第一资源信息用于指示为所述目标网络切片预留的网络节点资源信息;第二资源信息,所述第二资源信息用于指示所述目标网络切片的所述数据报文实际使用的网络节点资源信息。
- 一种网络切片资源信息的收集装置,包括:添加模块,设置为将带内操作管理维护IOAM头添加至数据报文中,以得到目标数据报文,其中,所述IOAM头中包括有第一指示信息,所述第一指示信息用于指示网络节点需要收集的目标网络切片的资源信息;发送模块,设置为将所述目标数据报文发送给所述网络节点,以通知所述网络节点基于所述第一指示信息收集所述资源信息。
- 一种网络切片资源信息的收集装置,包括:接收模块,设置为接收网络入口节点发送的目标数据报文,其中,所述目标数据报文中包括有带内操作管理维护IOAM头,所述IOAM头中包括有第一指示信息,所述第一指示信息用于指示需要收集的网络切片的资源信息;收集模块,设置为基于所述第一指示信息收集所述资源信息。
- 一种计算机可读的存储介质,所述计算机可读的存储介质包括存储的程序,其中,所述程序运行时执行上述权利要求1至7或8至14中任一项所述的方法。
- 一种电子装置,包括存储器和处理器,所述存储器中存储有计算机程序,所述处理器被设置为通过所述计算机程序执行所述权利要求1至7或8至14中任一项所述的方法。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110449433.5A CN115242643A (zh) | 2021-04-25 | 2021-04-25 | 网络切片资源信息的收集方法、装置及存储介质 |
CN202110449433.5 | 2021-04-25 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2022227788A1 true WO2022227788A1 (zh) | 2022-11-03 |
Family
ID=83665779
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2022/076083 WO2022227788A1 (zh) | 2021-04-25 | 2022-02-11 | 网络切片资源信息的收集方法、装置及存储介质 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN115242643A (zh) |
WO (1) | WO2022227788A1 (zh) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108243106A (zh) * | 2016-12-23 | 2018-07-03 | 华为技术有限公司 | 控制网络切片的方法、转发设备、控制设备和通信系统 |
CN110890994A (zh) * | 2018-09-11 | 2020-03-17 | 华为技术有限公司 | 一种报文转发路径的确定方法、设备和系统 |
US20200195568A1 (en) * | 2018-12-17 | 2020-06-18 | Cisco Technology, Inc. | Hardware-friendly mechanisms for in-band oam processing |
CN111385121A (zh) * | 2018-12-29 | 2020-07-07 | 华为技术有限公司 | 一种操作管理维护iOAM报文的传输方法及相应装置 |
CN112104469A (zh) * | 2019-06-17 | 2020-12-18 | 华为技术有限公司 | 数据处理方法及装置 |
US20210105638A1 (en) * | 2018-02-16 | 2021-04-08 | NEC Laboratories Europe GmbH | Network data analytics for oam |
-
2021
- 2021-04-25 CN CN202110449433.5A patent/CN115242643A/zh active Pending
-
2022
- 2022-02-11 WO PCT/CN2022/076083 patent/WO2022227788A1/zh active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108243106A (zh) * | 2016-12-23 | 2018-07-03 | 华为技术有限公司 | 控制网络切片的方法、转发设备、控制设备和通信系统 |
US20210105638A1 (en) * | 2018-02-16 | 2021-04-08 | NEC Laboratories Europe GmbH | Network data analytics for oam |
CN110890994A (zh) * | 2018-09-11 | 2020-03-17 | 华为技术有限公司 | 一种报文转发路径的确定方法、设备和系统 |
US20200195568A1 (en) * | 2018-12-17 | 2020-06-18 | Cisco Technology, Inc. | Hardware-friendly mechanisms for in-band oam processing |
CN111385121A (zh) * | 2018-12-29 | 2020-07-07 | 华为技术有限公司 | 一种操作管理维护iOAM报文的传输方法及相应装置 |
CN112104469A (zh) * | 2019-06-17 | 2020-12-18 | 华为技术有限公司 | 数据处理方法及装置 |
Also Published As
Publication number | Publication date |
---|---|
CN115242643A (zh) | 2022-10-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111431758B (zh) | 云网络设备的测试方法、装置、存储介质和计算机设备 | |
US11272396B2 (en) | Frame aggregation method, network setting frame sending method, and device | |
CN105684382A (zh) | 报文的控制方法、交换机及控制器 | |
WO2020258746A1 (zh) | 数据传输处理方法、装置和通信设备 | |
WO2021128927A1 (zh) | 报文的处理方法及装置、存储介质和电子装置 | |
CN103281257B (zh) | 一种协议报文处理方法和设备 | |
WO2016169121A1 (zh) | 一种链路分析的方法、设备及系统 | |
KR20210151979A (ko) | 메시지 검측 방법, 디바이스, 및 시스템 | |
JP2023514790A (ja) | ネットワーク性能検出方法及び機器、並びにネットワーク装置 | |
WO2022247308A1 (zh) | 流量测量方法、装置及相关设备 | |
WO2024187865A1 (zh) | 数据报文的传输控制方法、系统、装置及非易失性可读存储介质 | |
CN113328956B (zh) | 一种报文处理方法及装置 | |
US20230131149A1 (en) | Location-awareness-based network intermediate device | |
CN105991353A (zh) | 故障定位的方法和装置 | |
US20230327983A1 (en) | Performance measurement in a segment routing network | |
WO2022227788A1 (zh) | 网络切片资源信息的收集方法、装置及存储介质 | |
CN115277504A (zh) | 一种网络流量监控方法、装置和系统 | |
EP4358483A1 (en) | Method and apparatus for determining slice information, and storage medium and electronic apparatus | |
CN111865884A (zh) | 一种报文处理方法、装置及设备 | |
WO2023093227A1 (zh) | 信息的收集方法、装置、存储介质及电子装置 | |
US20210014138A1 (en) | Data transmission method and related apparatus | |
CN109905283A (zh) | 一种流量统计方法、装置及计算机可读存储介质 | |
CN103209124A (zh) | 报文处理方法、装置及系统 | |
CN116319468B (zh) | 网络遥测方法、装置、交换机、网络、电子设备和介质 | |
US20240333824A1 (en) | Service Processing Method, Apparatus, and System |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 22794268 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 22794268 Country of ref document: EP Kind code of ref document: A1 |