WO2022253190A1 - Procédé et appareil de test de performance de flux de service, et réseau de communication - Google Patents

Procédé et appareil de test de performance de flux de service, et réseau de communication Download PDF

Info

Publication number
WO2022253190A1
WO2022253190A1 PCT/CN2022/096039 CN2022096039W WO2022253190A1 WO 2022253190 A1 WO2022253190 A1 WO 2022253190A1 CN 2022096039 W CN2022096039 W CN 2022096039W WO 2022253190 A1 WO2022253190 A1 WO 2022253190A1
Authority
WO
WIPO (PCT)
Prior art keywords
identifier
application
target
flow
service flow
Prior art date
Application number
PCT/CN2022/096039
Other languages
English (en)
Chinese (zh)
Inventor
彭书萍
杨宏杰
周天然
吴鹏
李振斌
周宇
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2022253190A1 publication Critical patent/WO2022253190A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/302Route determination based on requested QoS
    • H04L45/306Route determination based on the nature of the carried application
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/30Routing of multiclass traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/34Source routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/24Traffic characterised by specific attributes, e.g. priority or QoS
    • H04L47/2475Traffic characterised by specific attributes, e.g. priority or QoS for supporting traffic characterised by the type of applications

Definitions

  • the present application relates to the technical field of communication, and in particular to a method, device and communication network for detecting the performance of a service flow.
  • the head-end network device (also referred to as the head node) of the service flow can encapsulate in-situ flow information telemetry (in-situ flow information telemetry, IFIT) information, the IFIT information includes the flow identification (flow ID) of the service flow.
  • IFIT in-situ flow information telemetry
  • the network device that receives the service message can perform follow-up detection on the service flow based on the IFIT information, and report the follow-up detection result and flow ID to the controller.
  • the controller can further analyze the transmission performance of the service flow based on the flow ID and the result of the follow-up detection.
  • the controller usually performs network transmission performance detection for a single service flow, and the performance detection method is relatively simple.
  • the present application provides a service flow performance detection method, device and communication network, which can solve the technical problem that the service flow performance detection method is relatively single.
  • a packet forwarding method which is applied to a controller in the network, and the method includes: obtaining a first application-aware identifier of the target service flow based on user requirements of the target service flow and transmitting the target service flow The corresponding relationship of the required first network service, and send the corresponding relationship to the second network device, and the corresponding relationship is used for the second network device to determine the service report for forwarding the target service flow based on the first application-aware identifier
  • the first network service of the message that is, the second network device can use the first network service to forward the service message of the target service flow.
  • the controller can establish and deliver the corresponding relationship between the application-aware identifier of the service flow and the network service
  • the network device can directly forward the service packet of the service flow based on the corresponding relationship, and provide specific applications that can satisfy the user requirements corresponding to the application. Therefore, the flexibility of service packet forwarding is effectively improved.
  • the correspondence includes an identifier of the first network service
  • the identifier of the first network service may include: a binding segment identification (binding segment identification, BSID) and/or an identification of a network slice.
  • the BSID may be the BSID of the forwarding path, or may be the BSID of the segment routing (segment routing, SR) policy to which the forwarding path belongs.
  • the first application-aware identifier may include at least one of a user identifier and an application identifier.
  • the user identifier is used to indicate the user to which the target service flow belongs
  • the application identifier is used to indicate the application to which the target service flow belongs.
  • the first application-aware identifier may further include at least one of a flow identifier, a service level agreement (service level agreement, SLA) level, and a service requirement.
  • a service level agreement service level agreement
  • SLA service level agreement
  • the service requirement may be a requirement on performance indicators such as delay and packet loss rate
  • the flow identifier in the first application-aware identifier is also called a session identifier (session ID).
  • the method may further include: sending the first application-aware identifier of the target service flow to the third network device, where the first application-aware identifier is used by the third network device if it determines that the received service flow is the If the target service flow is used, the application-aware identifier of the target service flow is encapsulated in the service packet of the target service flow.
  • the second network device may be an application-aware edge device in the APN.
  • the application-aware edge device After the application-aware edge device encapsulates the application-aware identifier of the target service flow in the service packet of the target service flow, it can facilitate the downstream network device to determine the network service for forwarding the target service flow based on the application-aware identifier, or can When reporting the follow-up detection result of the target service flow, the application awareness identifier of the target service flow is also reported.
  • the method may further include: sending an identifier generation rule to the third network device, so that the third network device generates a second application-aware identifier of the target service flow based on the identifier generation rule, and the second application-aware The identifier is used to match with the first application-aware identifier to determine that the received service flow is the target service flow.
  • the third network device may acquire feature information (such as quintuple or traffic feature information) of the service flow it receives, and process the feature information by using an ID generation rule issued by the controller to generate a second application-aware ID. In this way, it can be ensured that it is accurately matched with the first application-aware identifier issued by the controller, that is, the reliability of identifying the target service flow by the third network device is ensured.
  • feature information such as quintuple or traffic feature information
  • the method may further include: obtaining user requirements of the target service flow through a northbound interface.
  • the controller can obtain the user requirements of the target service flow sent by the service opening system through its northbound interface.
  • the method may further include: receiving a flow-based detection result and a target application-aware identifier sent by the first network device, the target application-aware identifier is an application-aware identifier of the service flow to which the flow-based detection result belongs, and the target application
  • the perception identification is the first application awareness identification, or the second application awareness identification of the target service flow generated by the network device; based on the follow-up detection result and the target application awareness identification, the transmission performance of the target service flow is analyzed.
  • the first network device may be a node in the follow-up detection path of the target service flow.
  • the target application-aware identifier may include one or more identifiers, and the controller can analyze the transmission performance of the service flow at the granularity indicated by at least one of the identifiers, thereby effectively improving the flexibility of detecting and analyzing the transmission performance of the service flow .
  • the method may further include: displaying the performance indicator of the target service flow according to the target granularity, where the performance indicator is used to indicate the transmission performance of the target service flow; wherein the target granularity is at least one of the target application-aware identifiers Identifies the granularity of the indication.
  • the controller displays the performance index according to the granularity indicated by at least one identifier, so not only can the refined display of the performance index be realized, but also the flexible and adjustable display granularity can be realized.
  • the method may further include: determining that the first network service does not meet user requirements of the target service flow based on the transmission performance of the target service flow, and determining that the network service required to transmit the target service flow is the second network service , and send the correspondence between the first application-aware identifier and the second network service to the second network device.
  • the controller can update the network service required for transmitting the target service flow in time, thereby ensuring that the updated network service can meet the transmission performance of the target service flow, thereby ensuring that the target service flow Reliable delivery of streams.
  • the method may further include: sending the upstream of the target service flow to the second network device and/or the first network device Sending policy, where the sending policy is used to instruct to report the follow-up detection result of the target service flow.
  • the controller can make the network device only report the follow-up detection results of key service flows through sending and uploading policies. This not only realizes flexible and adjustable reporting granularity of follow-up detection results, but also effectively reduces the data processing of the controller. pressure.
  • the process of receiving the flow detection result and the target application awareness identifier sent by the first network device may include: receiving the flow detection result, the target application awareness identity and the corresponding flow detection flow sent by the first network device Identification, the flow identification detected with the flow is also called the monitoring flow identification, which can be used to indicate a monitored data flow in the target service flow;
  • the process of analyzing the transmission performance of the target service flow based on the flow detection result and the target application perception identifier may include: determining the target at least one data flow included in the service flow; analyzing the transmission performance of at least one data flow included in the target service flow based on the follow-up detection result.
  • the controller can determine at least one monitored data flow included in the target service flow based on the corresponding relationship between the target application-aware identifier and the flow identifier detected along with the flow, and then analyze the target service flow based on the transmission performance of the at least one data flow transmission performance.
  • the user requirements of the target service flow include one or more of the following requirements: a requirement for a specified forwarding path, a requirement for a specified network slice, and a requirement for a performance index of transmission performance.
  • a packet forwarding method is provided, which is applied to a network device.
  • the method includes: receiving the corresponding relationship between the first application-aware identifier and the first network service sent by the controller in the network, and if the received target service If the flow is the service flow indicated by the first application-aware identifier, then according to the corresponding relationship, the first network service is used to forward the service packet of the target service flow, wherein the first application-aware identifier is determined by the controller based on the service flow Generation of user requirements.
  • the method further includes: obtaining a second application-aware identifier of the target service flow from a service packet of the target service flow; if the second application-aware identifier matches the first application-aware identifier, determining the target The service flow is the service flow indicated by the first application awareness identifier.
  • the service message received by the network device includes in-situ flow information telemetry (IFIT) information, and the flow identification field or reserved field of the IFIT information is encapsulated with the second application Perceptual identity;
  • IFIT in-situ flow information telemetry
  • the second application-aware identifier is encapsulated in a segment routing header (SRH).
  • the second application-aware identifier is encapsulated in the bound segment identifier field of the SRH field.
  • the method further includes: receiving an identifier generation rule sent by the controller; generating a second application-aware identifier of the target service flow based on the identifier generation rule; if the second application-aware identifier is identical to the first application-aware identifier match, it is determined that the target service flow is the service flow indicated by the first application awareness identifier.
  • the service packet received by the network device includes IFIT information; the process of using the first network service to forward the service packet of the target service flow may include: encapsulating the IFIT information in the flow identification field or reserved field The target application-aware identifier; using the first network service to forward the service message encapsulated with the target application-aware identifier.
  • the network device can also encapsulate the application-aware identifier of the service flow in the IFIT information, which improves the flexibility when encapsulating the application-aware identifier.
  • the method may further include: performing follow-up detection on the target service flow based on the follow-up detection information, to obtain follow-up detection information Result: sending the follow-up detection result and the target application-aware ID to the controller, where the target application-aware ID is the first application-aware ID or the second application-aware ID of the target service flow acquired by the network device.
  • the method may further include: receiving the sending strategy of the target service flow sent by the controller, where the sending strategy is used to indicate the reporting of the follow-up detection result of the target service flow; correspondingly, sending the follow-up flow detection result to the controller
  • the process of the detection result and the target application awareness identification may include: sending the flow detection result and the target application awareness identification to the controller based on the indication of the sending policy.
  • the process of sending the flow detection result and the target application perception identifier to the controller may include: sending the flow detection result, the target application perception identifier, and the corresponding flow detection flow identifier to the controller.
  • the flow identification detected along with the flow may be used to indicate a monitored data flow in the target service flow.
  • the controller can know the corresponding relationship between the target application-aware identifier and the flow identifier detected along with the flow, thereby facilitating the controller to analyze the transmission performance of at least one data flow included in the target service flow.
  • a controller in a third aspect, includes:
  • a generating module configured to obtain the correspondence between the first application-aware identifier of the target service flow and the first network service required to transmit the target service flow based on user requirements of the target service flow;
  • a sending module configured to send the corresponding relationship to a second network device, where the corresponding relationship is used by the second network device to determine the first network for forwarding the service packet of the target service flow based on the first application-aware identifier Serve.
  • the correspondence includes an identifier of the first network service, and the identifier of the first network service includes: a binding segment identifier and/or an identifier of a network slice.
  • the first application-aware identifier includes at least one of a user identifier and an application identifier.
  • the first application-aware identifier further includes at least one of a flow identifier, an SLA level, and a service requirement.
  • the sending module is further configured to send an identifier generation rule to the second network device, so that the second network device generates a second application-aware identifier of the target service flow based on the identifier generation rule, and the second application The perception identifier is used to match the first application perception identifier to determine the first network service.
  • the sending module is further configured to send the first application-aware identifier of the target service flow to the third network device, and the first application-aware identifier is used for the third network device if it determines that the received service flow is For the target service flow, the application-aware identifier of the target service flow is encapsulated in the service packet of the target service flow.
  • the controller may further include: an obtaining module, configured to obtain user requirements of the target service flow through a northbound interface.
  • the controller may also include:
  • the receiving module is configured to receive the flow-based detection result and the target application awareness identification sent by the first network device, the target application awareness identification is the application awareness identification of the service flow to which the flow-flow detection result belongs, and the target application awareness identification is the An application-aware identifier or a second application-aware identifier generated by the network device for the target service flow;
  • An analysis module configured to analyze the transmission performance of the target service flow based on the flow-by-flow detection result and the target application perception identification.
  • the controller may also include:
  • the display module is configured to display the performance index of the target service flow according to the target granularity, and the performance index is used to indicate the transmission performance of the target service flow; wherein, the target granularity is the granularity indicated by at least one identifier in the target application-aware identifier.
  • the generating module is further configured to determine that the first network service does not meet the user requirements of the target service flow based on the transmission performance of the target service flow, and determine that the network service required to transmit the target service flow is the second Internet service;
  • the sending module is further configured to send the correspondence between the first application-aware identifier and the second network service to the second network device.
  • the sending module is further configured to send the target service to the second network device and/or the first network device before the receiving module receives the flow detection result and the target application awareness identifier sent by the first network device Flow upload policy, which is used to indicate to report the follow-up detection result of the target service flow.
  • a network device in a fourth aspect, includes:
  • the receiving module is configured to receive the correspondence between the first application-aware identifier and the first network service sent by the controller in the network, wherein the first application-aware identifier is generated by the controller based on user requirements of service flows;
  • the sending module is configured to use the first network service to forward the service packets of the target service flow according to the corresponding relationship if the received target service flow is the service flow indicated by the first application-aware identifier.
  • the network equipment may also include:
  • An obtaining module configured to obtain the second application-aware identifier of the target service flow from the service packet of the target service flow;
  • a determining module configured to determine that the target service flow is the service flow indicated by the first application-aware identifier if the second application-aware identifier matches the first application-aware identifier.
  • the service packet received by the network device includes IFIT information, and the second application-aware identifier is encapsulated in the flow identification field or reserved field of the IFIT information;
  • the second application-aware identifier is encapsulated in the destination address field, HBH, DOH or SRH of the service packet.
  • the second application-aware identifier is encapsulated in the bound segment identifier field of the SRH field.
  • the receiving module can also be used to receive the identification generation rules sent by the controller;
  • the network equipment may also include:
  • a generating module configured to generate a second application-aware identifier of the target service flow based on the identifier generation rule
  • a determining module configured to determine that the target service flow is the service flow indicated by the first application-aware identifier if the second application-aware identifier matches the first application-aware identifier.
  • the service packet received by the network device includes IFIT information; the sending module may be configured to encapsulate the target application-aware identifier in the flow identifier field or reserved field of the IFIT information, and adopt the first The network service forwards the service packet encapsulated with the target application-aware identifier.
  • the network equipment may also include:
  • the detection module is configured to perform follow-up detection on the target service flow based on the follow-up detection information if the service packet of the target service flow received by the network device includes follow-up detection information, and obtain a follow-up detection result;
  • the sending module is further configured to send the follow-up detection result and the target application awareness identifier to the controller, where the target application awareness identifier is the first application awareness identifier or the second application awareness of the target service flow obtained by the network device logo.
  • the receiving module may also be configured to receive the sending strategy of the target service flow sent by the controller, where the sending strategy is used to instruct to report the follow-up detection result of the target service flow;
  • the sending module may be configured to send the follow-up detection result and target application awareness identifier to the controller based on the indication of the sending strategy.
  • a packet forwarding method includes: generating a first application-aware identifier of the target service flow based on user requirements of the target service flow, and sending the first application-aware identifier; wherein, the first application-aware identifier An application-aware identifier is used for the network device to encapsulate the target application-aware identifier in the service packet of the target service flow, and the target application-aware identifier is the first application-aware identifier, or a second application-aware identifier that matches the first application-aware identifier.
  • the first application-aware identifier corresponds to the first network service and is used for the network device to encapsulate the target application-aware identifier in the service packet of the target service flow, it can be ensured that the network device receiving the service packet can use
  • the first network service corresponding to a specific application forwards the service message related to the application, thereby effectively improving the flexibility of service message forwarding.
  • the process of generating the first application-aware identifier of the target service flow based on the user requirements of the target service flow may include: the controller in the network generates an ID of the target service flow based on the acquired user requirements of the target service flow.
  • the first application-aware identifier; correspondingly, the process of sending the first application-aware identifier may include: the controller sends the first application-aware identifier to the third network device, so that the third network device can The target application awareness identifier is encapsulated in the packet.
  • the third network device may be an application-aware edge device in the APN.
  • the application-aware edge device After the application-aware edge device encapsulates the target application-aware identifier in the service packet of the target service flow, it can facilitate the downstream network device to determine the first network service for forwarding the target service flow based on the target application-aware identifier.
  • the method may further include: the controller acquires user requirements of the target service flow through a northbound interface.
  • the controller can acquire the user requirements of the target service flow sent by the service opening system through its northbound interface.
  • the method may further include: the controller determining a first network service required to transmit the target service flow based on user requirements of the target service flow, and sending the first application-aware identifier and The corresponding relationship of the first network service is used for the second network device to determine the first network service for forwarding the service packet of the target service flow based on the first application-aware identifier.
  • the second network device may be a head-end network device (also referred to as a head node) serving the first network.
  • the second network device is a head node of a forwarding path, or a head node of a network slice. It should be understood that the second network device and the third network device may be the same network device, or may be different network devices.
  • the controller can establish and deliver the corresponding relationship between the application-aware identifier of the service flow and the network service
  • the second network device can directly forward the service message of the service flow based on the corresponding relationship, thus effectively improving the flexibility of service message forwarding sex.
  • the method may further include: the controller receiving the flow detection result and the target application awareness identifier sent by the first network device, and analyzing the transmission of the target service flow based on the flow detection result and the target application awareness identifier performance.
  • the first network device may be a node in the follow-up detection path of the target service flow, for example, may be an ingress node, a forwarding node (also called an intermediate node) or an exit node in the follow-up detection path.
  • the target application-aware identifier may be the first application-aware identifier, or may be a second application-aware identifier of the target service flow generated by the network device.
  • the controller can then use at least one of the target application-aware identifiers to indicate The granularity detection and analysis of the transmission performance of the service flow effectively improves the flexibility of detection and analysis of the transmission performance of the service flow.
  • the method may further include: the controller displaying the performance index of the target service flow according to the target granularity, where the performance index is used to indicate the transmission performance of the target service flow; wherein the target granularity is the target application-aware identifier At least one of the identifies the indicated granularity.
  • the controller displays the performance index according to the granularity indicated by at least one identifier, so not only can the refined display of the performance index be realized, but also the flexible and adjustable display granularity can be realized.
  • the process for the controller to receive the follow-up detection result and the target application awareness identifier sent by the first network device may include: the controller receiving the follow-up detection result, the target application awareness identifier and the corresponding follow-up detection result sent by the first network device.
  • the flow identification of the flow detection correspondingly, the controller analyzes the transmission performance of the target service flow based on the flow detection result and the target application awareness identification.
  • the process may include: the controller based on the target application awareness identification and the flow identification Determine the corresponding relationship of the detected flow identifiers, determine at least one data flow included in the target service flow, and then analyze the transmission performance of the at least one data flow included in the target service flow based on the flow-following detection result.
  • the controller can determine at least one monitored data flow included in the target service flow based on the corresponding relationship between the target application-aware identifier and the flow identifier detected along with the flow, and then analyze the target service flow based on the transmission performance of the at least one data flow transmission performance.
  • the method may further include: the controller determines, based on the transmission performance of the target service flow, that the first network service does not meet user requirements of the target service flow, and then determines that the network service required to transmit the target service flow is the second The second network service, and then sending the correspondence between the first application awareness identifier and the second network service to the second network device.
  • the controller can update the network service required for transmitting the target service flow in time, thereby ensuring that the updated network service can meet the transmission performance of the target service flow, thereby ensuring that the target service flow Reliable delivery of streams.
  • the method may further include: the controller sends the third network device and/or the first network device The sending strategy of the target service flow, where the sending strategy is used to indicate to report the follow-up detection result of the target service flow.
  • the controller can make the network device only report the follow-up detection results of key service flows through sending and uploading policies. This not only realizes flexible and adjustable reporting granularity of follow-up detection results, but also effectively reduces the data processing of the controller. pressure.
  • the process of generating the first application-aware identifier of the target service flow may include: the third network device generates the target service flow based on the user requirements of the target service flow sent by the controller.
  • the first application-aware identifier; correspondingly, the process of sending the first application-aware identifier may include: the third network device encapsulates the first application-aware identifier in the service packet of the target service flow, and forwards the encapsulated first application-aware identifier.
  • a service packet with an application-aware identifier may be used to send the first application-aware identifier.
  • the third network device may be an application-aware edge device in the APN.
  • the application-aware edge device generates the first application-aware identifier, and after encapsulating the first application-aware identifier in the service packet of the target service flow, it is convenient for the downstream network device to determine based on the first application-aware identifier for forwarding the target First web service for business flow.
  • the service packet of the target service flow received by the third network device includes follow-up detection information
  • the method may further include: the third network device performs follow-up detection information on the target service flow based on the follow-up detection information. Flow detection, obtaining a flow detection result, and sending the flow detection result and the first application awareness identifier to the controller.
  • the method may further include: the third network device receiving the sending strategy of the target service flow sent by the controller, where the sending strategy is used to indicate to report the follow-up detection result of the target service flow;
  • the process for the third network device to send the flow detection result and the first application awareness identifier to the controller may include: the third network device sends the flow detection result and the flow detection result to the controller based on the indication of the sending policy A first application-aware identifier.
  • the process of the third network device sending the flow detection result and the first application awareness identification to the controller may include: the third network device sending the flow detection result, the first application Awareness identifier and corresponding flow identifier detected along with the flow.
  • the process of the third network device encapsulating the first application-aware identifier in the service packet of the target service flow may include: the flow identifier field or the reserved field of the IFIT information of the service packet by the third network device encapsulating the first application-aware identifier;
  • the third network device encapsulates the first application-aware identifier in the destination address field, HBH, DOH or SRH of the service packet.
  • the first application-aware identifier may be encapsulated in the BSID field of the SRH field.
  • the user requirements of the target service flow include one or more of the following requirements: a requirement for a specified forwarding path, a requirement for a specified network slice, and a requirement for a performance index of transmission performance.
  • the target application-aware identifier includes at least one of a user identifier and an application identifier.
  • the user identifier is used to indicate the user to which the target service flow belongs
  • the application identifier is used to indicate the application to which the target service flow belongs.
  • the target application awareness identifier may also include at least one of flow identifier, SLA level and service requirement.
  • the service requirement may be a requirement on performance indicators such as delay and packet loss rate
  • the flow identifier in the first application-aware identifier is also called a session identifier (session ID).
  • a packet forwarding method which is applied to a network device.
  • the method includes: receiving a first application-aware identifier sent by a controller, where the first application-aware identifier is generated based on a user requirement of a service flow, and the first application-aware identifier is generated based on a user requirement of a service flow, and the first An application-aware identifier corresponds to the first network service, and the first network service satisfies the user requirements of the service flow; if the received target service flow is the service flow indicated by the first application-aware identifier, the target service flow Encapsulating the target application awareness identifier in the service message, and forwarding the service message encapsulated with the target application awareness identifier; wherein, the target application awareness identifier is the first application awareness identifier, or the first application awareness identifier matching the first application awareness identifier.
  • the service packet of the target service flow received by the network device includes follow-up detection information
  • the method may further include: performing follow-up detection on the target service flow based on the follow-up detection information, to obtain follow-up detection information result, and send the on-stream detection result and target application awareness identifier to the controller.
  • the process of sending the flow detection result and the target application awareness identification to the controller may include: sending the flow detection result, the target application awareness identification, and the corresponding flow detection flow identification to the controller .
  • the process of encapsulating the target application-aware identifier in the service packet of the target service flow may include: encapsulating the target application-aware identifier in the flow identifier field or reserved field of the IFIT information of the service packet; or, Encapsulate the target application awareness identifier in the destination address field, HBH, DOH or SRH of the service message.
  • the process of receiving the first application-aware identifier sent by the controller may include: receiving the corresponding relationship between the first application-aware identifier sent by the controller and the first network service; correspondingly, forwarding the package with the target application-aware identifier
  • the process of receiving the service message may include: using the first network service to forward the service message encapsulated with the target application-aware identifier.
  • a message forwarding device comprising:
  • the generating module is configured to generate a first application-aware identifier of the target service flow based on user requirements of the target service flow, and the first application-aware identifier is used for the network device to encapsulate the target application-awareness in the service packet of the target service flow
  • the target application-aware identifier is the first application-aware identifier, or a second application-aware identifier that matches the first application-aware identifier, and the first application-aware identifier corresponds to the first network service, and the first network service Satisfy the user needs of the target business flow;
  • a sending module configured to send the first application-aware identifier, where the first application-aware identifier is used for the network device to forward the service packet of the target service flow by using the first network service.
  • the message forwarding device may be applied to a controller in the network, and the generating module is configured to generate a first application-aware identifier of the target service flow based on the acquired user requirements of the target service flow;
  • the sending module is configured to send the first application-aware identifier to a third network device, so that the third network device encapsulates the target application-aware identifier in a service packet of the target service flow.
  • the device further includes an acquisition module, configured to acquire user requirements of the target service flow through a northbound interface.
  • the generating module is further configured to determine the first network service required to transmit the target service flow based on user requirements of the target service flow;
  • the sending module is further configured to send the correspondence between the first application-aware identifier and the first network service to the second network device, and the correspondence is used for the second network device to determine the service based on the first application-aware identifier.
  • the first network service that forwards the service packets of the target service flow.
  • the device may also include:
  • the receiving module is configured to receive the flow-based detection result and the target application awareness identification sent by the first network device, the target application awareness identification is the application awareness identification of the service flow to which the flow-flow detection result belongs, and the target application awareness identification is the An application-aware identifier or a second application-aware identifier generated by the network device for the target service flow;
  • An analysis module configured to analyze the transmission performance of the target service flow based on the flow-by-flow detection result and the target application-aware identification.
  • the device may also include:
  • the display module is used to display the performance index of the target service flow according to the target granularity, and the performance index is used to indicate the transmission performance of the target service flow; wherein, the target granularity is the granularity indicated by at least one identifier in the target application perception identifier.
  • the receiving module may be configured to receive the follow-up detection result sent by the first network device, the target application perception identifier, and the corresponding flow identifier of the follow-up detection;
  • the analysis module may be configured to determine at least one data flow included in the target service flow based on the corresponding relationship between the target application awareness identifier and the flow identifier detected along with the flow, and analyze the target service flow based on the result of the follow-up detection Transport performance of at least one data stream included.
  • the generation module can also be used to determine that the first network service does not meet the user requirements of the target service flow based on the transmission performance of the target service flow, and then determine that the network service required to transmit the target service flow is the second 2.
  • Network services
  • the sending module may also be configured to send the correspondence between the first application-aware identifier and the second network service to the second network device.
  • the sending module may also be configured to send the target to the third network device and/or the first network device before the receiving module receives the flow detection result and the target application awareness identifier sent by the first network device.
  • the sending policy of the service flow, the sending policy is used to instruct to report the follow-up detection result of the target service flow.
  • the message forwarding device may be applied to a third network device, and the generating module may be configured to generate a first application-aware identifier of the target service flow based on user requirements of the target service flow sent by the controller;
  • the sending module may be configured to encapsulate the first application-aware identifier in a service packet of the target service flow, and forward the service packet encapsulated with the first application-aware identifier.
  • the service packet of the target service flow received by the third network device includes follow-up detection information
  • the apparatus may further include:
  • a detection module configured to perform follow-up detection on the target service flow based on the follow-up detection information, and obtain a follow-up detection result
  • the sending module may also be configured to send the follow-up detection result and the first application awareness identifier to the controller.
  • the device may also include:
  • a receiving module configured to receive the sending policy of the target service flow sent by the controller, where the sending policy is used to instruct to report the follow-up detection result of the target service flow;
  • the sending module may be configured to send the follow-up detection result and the first application awareness identifier to the controller based on the indication of the sending strategy.
  • the sending module may be configured to send the result of the on-stream detection, the first application awareness identifier, and the corresponding on-stream detection flow identifier to the controller.
  • the sending module may be configured to encapsulate the first application-aware identifier in the flow identification field or reserved field of the IFIT information of the service message; or, in the destination address field, HBH, DOH Or encapsulate the first application-aware identifier in the SRH.
  • the user requirements of the target service flow include one or more of the following requirements: a requirement for a specified forwarding path, a requirement for a specified network slice, and a requirement for a performance index of transmission performance.
  • the target application-aware identifier includes at least one of a user identifier and an application identifier.
  • a network device in an eighth aspect, includes:
  • the receiving module is configured to receive the first application-aware identifier sent by the controller, the first application-aware identifier is generated based on the user requirements of the service flow, and the first application-aware identifier corresponds to the first network service, and the first network service satisfies User requirements for the business flow;
  • An encapsulation module configured to encapsulate the target application-aware identifier in the service packet of the target service flow if the received target service flow is the service flow indicated by the first application-aware identifier, and the target application-aware identifier is the first application-aware identifier An application-aware identifier, or a second application-aware identifier that matches the first application-aware identifier;
  • a sending module configured to forward the service message encapsulated with the target application-aware identifier.
  • the service packet of the target service flow received by the network device includes follow-up detection information, and the network device may also include:
  • a detection module configured to perform follow-up detection on the target service flow based on the follow-up detection information, and obtain a follow-up detection result
  • the sending module is further configured to send the follow-up detection result and the target application awareness identifier to the controller.
  • the sending module may be configured to send the result of the on-stream detection, the target application awareness identifier, and the corresponding on-stream detection flow identifier to the controller.
  • the encapsulation module may be used to encapsulate the target application awareness identifier in the flow identification field or reserved field of the IFIT information of the service message; or, in the destination address field, HBH, DOH or The target application-aware identifier is encapsulated in the SRH.
  • the receiving module can be used to receive the corresponding relationship between the first application-aware identifier and the first network service sent by the controller; correspondingly, the sending module can be used to forward the package with The target application perceives and identifies service packets.
  • a method for detecting the performance of a service flow which is applied to a network device, and the method includes: performing follow-up detection on the target service flow to which the service message belongs, based on the follow-up detection information in the service message, Obtain the flow detection result, and send the flow detection result and the target application awareness identification of the target service flow to the controller in the network; wherein, the target application awareness identification is generated based on the user requirements of the target service flow, and the flow flow detection
  • the detection result and target application perception identification are used for the controller to analyze the transmission performance of the target service flow.
  • the controller can further detect at the granularity indicated by at least one identifier in the target application-aware identifier and analyze the transmission performance of the service flow, thereby effectively improving the flexibility of detecting and analyzing the transmission performance of the service flow.
  • the target application-aware identifier is encapsulated in the service message, that is, the network device can directly obtain the target application-aware identifier from the received service message, and the target application-aware identifier can be used to indicate the target service flow The user and/or application it belongs to.
  • the target application-aware identifier may be encapsulated by an upstream node of the network device (such as an application-aware edge device), or may be encapsulated by the application to which the target service flow belongs.
  • the flow detection information is IFIT information
  • the target application awareness identifier is encapsulated in the flow identification field or reserved field of the IFIT information.
  • the network device can obtain the target application awareness identifier synchronously when reading the IFIT information to perform follow-up detection.
  • the target application awareness identifier may also be encapsulated in the destination address field, HBH, DOH or SRH of the service message.
  • the target application awareness identifier may be encapsulated in the BSID field of the SRH field.
  • the method may further include: receiving the correspondence between the first application-aware identifier and the first network service sent by the controller, where the first application-aware identifier is generated by the controller based on the user requirement of the service flow; if The target service flow is the service flow indicated by the first application-aware identifier, and the first network service is used to forward the service packets of the target service flow according to the corresponding relationship.
  • the controller can establish and deliver the corresponding relationship between the application-aware identifier of the service flow and the network service
  • the network device can directly forward the service message of the service flow based on the corresponding relationship, thus effectively improving the flexibility of service message forwarding.
  • the method may further include: receiving an identifier generation rule sent by the controller, and generating a second application-aware identifier of the target service flow based on the identifier generation rule; wherein, the target application-aware identifier is the second application-aware identifier ID or the first application-aware ID of the target service flow sent by the controller.
  • the network device may also generate a second application-aware identifier.
  • the second application-aware identifier can be reported to the controller as the target application-aware identifier; or if the network device also receives the first application-aware identifier of the target service flow issued by the controller, the network device can also determine the second application
  • the perception identifier is matched with the first application perception identifier, and the first application perception identifier is reported to the controller as the target application perception identifier.
  • the flow detection information is IFIT information; the method may also include: encapsulating the target application-aware identifier in the flow identifier field or reserved field of the IFIT information, and forwarding the service report encapsulated with the target application-aware identifier arts.
  • the downstream node of the network device it is convenient for the downstream node of the network device to directly obtain and report the target application awareness identifier from the service message.
  • the method may further include: receiving the sending policy of the target service flow sent by the controller, where the sending policy is used to indicate to report the result of the follow-up detection of the target service flow; correspondingly, the network device reports to the controller
  • the process of sending the on-stream detection result and the target application-aware ID of the target service flow may include: sending the on-stream detection result and the target application-aware ID of the target service flow to the controller based on the indication of the sending strategy.
  • the controller can issue the sending policy of the critical service flow (including the target service flow) to the network device, so that the network device only reports the follow-up detection result of the key service flow, and does not need to report the follow-up detection result of the non-critical service flow .
  • the network device not only the flexible and adjustable reporting granularity of the detection result with the flow is realized, but also the data processing pressure of the controller is effectively reduced.
  • the process of sending the follow-up detection result and the target application-aware identifier of the target service flow to the controller in the network may include: sending the follow-up detection result, the target application-aware identifier of the target service flow to the controller in the network, and Corresponding stream ID detected along with the stream.
  • the flow identification detected along with the flow may be used to indicate a monitored data flow in the target service flow.
  • the controller can know the corresponding relationship between the target application-aware identifier and the flow identifier detected along with the flow, thereby facilitating the controller to analyze the transmission performance of at least one data flow included in the target service flow.
  • the target application-aware identifier includes at least one of a user identifier and an application identifier.
  • the user identifier is used to indicate the user to which the target service flow belongs
  • the application identifier is used to indicate the application to which the target service flow belongs.
  • the target application awareness identifier may also include at least one of flow identifier, SLA level and service requirement.
  • the service requirement may be a requirement on performance indicators such as delay and packet loss rate
  • the flow identifier in the second application-aware identifier is also called a session identifier (session ID).
  • a method for detecting the performance of a service flow is provided, which is applied to a controller in a network, and the method includes: receiving a flow-based detection result and a target application perception identifier sent by a first network device, and the flow-based detection result is The first network device performs follow-up detection on the target service flow, and the target application-aware identifier is generated based on user requirements of the target service flow; based on the follow-up detection result and the target application-aware identifier, the transmission of the target service flow is analyzed performance.
  • the first network device may be a node in the follow-up detection path of the target service flow, for example, may be an ingress node, a forwarding node (also called an intermediate node) or an exit node in the follow-up detection path.
  • the target application-aware identifier includes at least one of a user identifier and an application identifier
  • the method further includes: displaying a performance indicator of the target service flow according to the target granularity, the performance indicator being used to indicate the transmission performance of the target service flow ;
  • the target granularity is the granularity indicated by at least one identifier in the target application-aware identifier.
  • the controller displays the performance index according to the granularity indicated by at least one identifier, so not only can the refined display of the performance index be realized, but also the flexible and adjustable display granularity can be realized.
  • the method may further include: sending an upload policy of the target service flow to the first network device, and the upload policy uses Instructing to report the follow-up detection result of the target service flow.
  • the process of receiving the flow detection result and target application perception identifier sent by the first network device may include: receiving the flow detection result, target application perception identifier and corresponding flow detection flow identifier sent by the first network device
  • the process of analyzing the transmission performance of the target service flow may include: based on the correspondence between the target application-aware identifier and the flow identifier detected with the flow, determining the at least one data flow included in the target service flow; analyzing the transmission performance of at least one data flow included in the target service flow based on the follow-up detection result.
  • the controller can determine at least one monitored data flow included in the target service flow based on the corresponding relationship between the target application-aware identifier and the flow identifier detected along with the flow, and then analyze the target service flow based on the transmission performance of the at least one data flow transmission performance.
  • the method may further include: based on the user requirements of the target service flow, obtaining a correspondence between the first application-aware identifier of the target service flow and the first network service required to transmit the target service flow; The device sends the corresponding relationship, and the corresponding relationship is used for the second network device to determine the first network service for forwarding the service packet of the target service flow based on the first application-aware identifier; wherein the target application-aware identifier is the The first application-aware identifier or the second application-aware identifier of the target service flow generated by the network device.
  • the second network device may be a head-end network device (also referred to as a head node) serving the first network.
  • the second network device is a head node of a forwarding path, or a head node of a network slice. It should be understood that the second network device and the first network device may be the same network device or different network devices.
  • the method may further include: determining that the first network service does not meet user requirements of the target service flow based on the transmission performance of the target service flow, and determining that the network service required to transmit the target service flow is a second network service; Sending the correspondence between the first application-aware identifier and the second network service to the second network device.
  • the controller can update the network service required for transmitting the target service flow in time, thereby ensuring that the updated network service can meet the transmission performance of the target service flow, thereby ensuring that the target service flow Reliable delivery of streams.
  • the method may further include: sending the first application-aware identifier of the target service flow to a third network device.
  • the first application-aware identifier is used for the third network device to encapsulate the application-aware identifier of the target service flow in a service packet of the target service flow if the third network device determines that the received service flow is the target service flow.
  • the third network device may be an application-aware edge device in the APN.
  • the application-aware edge device After the application-aware edge device encapsulates the application-aware identifier of the target service flow in the service packet of the target service flow, it can facilitate the downstream network device to determine the network service for forwarding the target service flow based on the application-aware identifier, or can When reporting the follow-up detection result of the target service flow, the application awareness identifier of the target service flow is also reported.
  • the method may further include: obtaining user requirements of the target service flow through a northbound interface.
  • the controller can acquire the user requirements of the target service flow sent by the service opening system through its northbound interface.
  • the user requirements of the target service flow include one or more of the following requirements: a requirement for a specified forwarding path, a requirement for a specified network slice, and a requirement for a performance index of transmission performance.
  • a network device in an eleventh aspect, includes:
  • the detection module is configured to perform follow-up detection on the target service flow to which the service message belongs based on the follow-up detection information in the service message, and obtain a follow-up detection result;
  • a sending module configured to send the follow-up detection result and the target application-aware identifier of the target service flow to the controller in the network, the target application-aware identifier is generated based on user requirements of the target service flow, the follow-through detection result and the target application
  • the perception identification is used for the controller to analyze the transmission performance of the target service flow.
  • the target application-aware identifier is encapsulated in the service packet, and the target application-aware identifier may be used to indicate the user and/or application to which the target service flow belongs.
  • the flow detection information is IFIT information
  • the target application awareness identifier is encapsulated in the flow identification field or reserved field of the IFIT information.
  • the network equipment may also include:
  • a receiving module configured to receive the correspondence between the first application-aware identifier and the first network service sent by the controller, wherein the first application-aware identifier is generated by the controller based on user requirements of service flows;
  • the sending module is further configured to use the first network service to forward the service packets of the target service flow according to the corresponding relationship if the target service flow is the service flow indicated by the first application-aware identifier.
  • the receiving module can also be used to receive the identification generation rules sent by the controller;
  • the network device may also include: a generating module, configured to generate a second application-aware identifier of the target service flow based on the identifier generation rule;
  • the target application-aware identifier is the second application-aware identifier or the first application-aware identifier of the target service flow sent by the controller.
  • the flow detection information is IFIT information; the network device may also include:
  • An encapsulation module configured to encapsulate the target application-aware identifier in the flow identifier field or reserved field of the IFIT information
  • the sending module is also used to forward the service message encapsulated with the target application-aware identifier.
  • the receiving module may also be configured to receive the sending strategy of the target service flow sent by the controller, where the sending strategy is used to instruct to report the follow-up detection result of the target service flow;
  • the sending module is configured to send the follow-up detection result and the target application awareness identifier of the target service flow to the controller based on the indication of the sending strategy.
  • the sending module may be configured to send the follow-up detection result, the target application-aware identifier of the target service flow, and the corresponding flow identifier of the follow-up detection to the controller in the network.
  • the target application-aware identifier includes at least one of a user identifier and an application identifier.
  • a controller in a twelfth aspect, includes:
  • the receiving module is configured to receive the follow-up detection result and the target application perception identifier sent by the first network device, the follow-up detection result is obtained by the first network device performing follow-up detection on the target service flow, and the target application perception identifier Generation of user requirements based on the target business flow;
  • An analysis module configured to analyze the transmission performance of the target service flow based on the flow-by-flow detection result and the target application-aware identification.
  • the target application-aware identifier includes at least one of a user identifier and an application identifier
  • the controller further includes:
  • the display module is configured to display the performance index of the target service flow according to the target granularity, and the performance index is used to indicate the transmission performance of the target service flow; wherein, the target granularity is the granularity indicated by at least one identifier in the target application-aware identifier.
  • the controller also includes:
  • a sending module configured to send an upload strategy of the target service flow to the first network device before the receiving module receives the follow-up detection result and the target application perception identifier sent by the first network device, the upload strategy is used to indicate Report the follow-up detection result of the target service flow.
  • the receiving module can be used to receive the flow detection result sent by the first network device, the target application perception identifier, and the corresponding flow detection flow identifier; correspondingly, the analysis module can be used to Applying the corresponding relationship between the perception identifier and the flow identifier detected along with the flow, determining at least one data flow included in the target service flow; analyzing the transmission performance of at least one data flow included in the target service flow based on the result of the along-flow detection.
  • the controller also includes:
  • a generating module configured to obtain the correspondence between the first application-aware identifier of the target service flow and the first network service required to transmit the target service flow based on the user requirements of the target service flow;
  • the sending module is further configured to send the corresponding relationship to the second network device, and the corresponding relationship is used for the second network device to determine the first service packet for forwarding the target service flow based on the first application-aware identifier.
  • the target application-aware identifier is the first application-aware identifier or the second application-aware identifier of the target service flow generated by the network device.
  • the generating module is further configured to determine that the first network service does not meet the user requirements of the target service flow based on the transmission performance of the target service flow, and determine that the network service required to transmit the target service flow is the second Internet service;
  • the sending module is further configured to send the correspondence between the first application-aware identifier and the second network service to the second network device.
  • the sending module is further configured to send the first application-aware identifier of the target service flow to a third network device.
  • the controller also includes:
  • the acquisition module is configured to acquire the user requirements of the target service flow through the northbound interface.
  • a controller may include: a memory, a processor, and a computer program stored on the memory and operable on the processor.
  • the processor executes the computer program, the above-mentioned The method applied to the controller provided by any aspect.
  • a network device may include: a memory, a processor, and a computer program stored on the memory and operable on the processor.
  • the processor executes the computer program, the above-mentioned The method applied to network equipment provided by any aspect.
  • a network device may include: a main control board and an interface board, and the interface board may be used to implement the method applied to the network device provided in any one of the above aspects.
  • a network device in a sixteenth aspect, includes: a main control board and an interface board.
  • the main control board includes: a first processor and a first memory.
  • the interface board includes: a second processor, a second memory and an interface card. The main control board and the interface board are coupled.
  • the second memory may be used to store program codes
  • the second processor is used to call the program codes in the second memory, and trigger the interface card to perform the following operations: receiving the first application awareness identifier sent by the controller in the network and the first network service Corresponding relationship, wherein the first application-aware identifier is generated by the controller based on the user requirements of the service flow; if the received target service flow is the service flow indicated by the first application-aware identifier, then according to the corresponding relationship, the The first network service forwards the service packets of the target service flow.
  • a network device in a seventeenth aspect, includes: a main control board and an interface board.
  • the main control board includes: a first processor and a first memory.
  • the interface board includes: a second processor, a second memory and an interface card. The main control board and the interface board are coupled.
  • the first memory may be used to store program codes, and the first processor is used to call the program codes in the first memory to perform the following operations: based on the user requirements of the target service flow sent by the controller, generate the first application awareness of the target service flow identification, and encapsulate the target application-aware identification in the service packet of the target service flow;
  • the second memory may be used to store program codes, and the second processor is used to call the program codes in the second memory to trigger the interface card to perform the following operations: Forwarding the service packet encapsulated with the target application-aware identifier; wherein, the target application-aware identifier is the first application-aware identifier, or a second application-aware identifier that matches the first application-aware identifier, and the first application-aware identifier The identifier corresponds to the first network service, and the first network service satisfies the user requirement of the target service flow.
  • the second processor is used to call the program code in the second memory, and trigger the interface card to perform the following operations: receiving the first application awareness identifier sent by the controller, where the first application awareness identifier is generated based on the user requirement of the service flow, and The first application-aware identifier corresponds to the first network service, and the first network service satisfies the user requirements of the service flow; if the received target service flow is the service flow indicated by the first application-aware identifier, then in the target service Encapsulate the target application-aware identifier in the service message of the flow, and forward the service message encapsulated with the target application-aware identifier; wherein, the target application-aware identifier is the first application-aware identifier, or matches the first application-aware identifier A second application-aware identifier for .
  • a network device in an eighteenth aspect, includes: a main control board and an interface board.
  • the main control board includes: a first processor and a first memory.
  • the interface board includes: a second processor, a second memory and an interface card.
  • the main control board and the interface board are coupled.
  • the first memory may be used to store program codes, and the first processor is used to call the program codes in the first memory to perform the following operations: based on the follow-up detection information in the service message, perform the target service flow to which the service message belongs Follow-the-flow detection, obtain the result of the follow-up detection;
  • the second memory may be used to store program codes
  • the second processor is used to call the program codes in the second memory to trigger the interface card to perform the following operations: send the follow-up detection result and the target application of the target service flow to the controller in the network
  • a perception identification the target application awareness identification is generated based on the user requirements of the target service flow
  • the flow-following detection result and the target application awareness identification are used for the controller to analyze the transmission performance of the target service flow.
  • a computer-readable storage medium where instructions are stored in the computer-readable storage medium, and the instructions are executed by a processor to implement the method provided in any one of the above aspects.
  • a computer program product containing instructions is provided, and when the computer program product is run on a computer, it causes the computer to execute the method provided in any one of the above aspects.
  • a communication network may include: a controller and at least one network device; the controller may implement the method applied to the controller provided in any one of the above aspects, and the network device may implement The method applied to a network device provided by any one of the above aspects.
  • a chip is provided, which can be used to implement the method provided in any one of the above aspects.
  • the present application provides a service flow performance detection method, device, and communication network.
  • the controller can obtain the corresponding relationship between the application-aware identifier of the service flow and the network service required to transmit the service flow, and transfer the service flow The corresponding relationship is sent to the network device. Further, when the network device recognizes that the service flow is the service flow indicated by the application-aware identifier, it can directly use the corresponding network service to forward the packet of the service flow. Since the controller can establish and deliver the corresponding relationship between the application-aware identifier of the service flow and the network service, the network device can directly forward the service message of the service flow based on the corresponding relationship, thus effectively improving the flexibility of service message forwarding.
  • FIG. 1 is a schematic structural diagram of a communication network provided by an embodiment of the present application.
  • FIG. 2 is a flow chart of a message forwarding method provided in an embodiment of the present application
  • FIG. 3 is a schematic diagram of a data structure of an application-aware identifier provided by an embodiment of the present application
  • FIG. 4 is a flow chart of another message forwarding method provided by an embodiment of the present application.
  • FIG. 5 is a flow chart of a method for detecting the performance of a service flow provided by an embodiment of the present application
  • FIG. 6 is a flow chart of another message forwarding method provided by an embodiment of the present application.
  • FIG. 7 is a schematic structural diagram of another communication network provided by an embodiment of the present application.
  • Fig. 8 is a schematic diagram of the data structure of another application-aware identifier provided by the embodiment of the present application.
  • FIG. 9 is a schematic diagram of a data structure of another application-aware identifier provided by an embodiment of the present application.
  • FIG. 10 is a flow chart of another message forwarding method provided by the embodiment of the present application.
  • FIG. 11 is a flow chart of another service flow performance detection method provided by an embodiment of the present application.
  • FIG. 12 is a schematic structural diagram of an IFIT information provided by an embodiment of the present application.
  • Fig. 13 is a schematic structural diagram of a controller provided by an embodiment of the present application.
  • Fig. 14 is a schematic structural diagram of another controller provided by the embodiment of the present application.
  • FIG. 15 is a schematic structural diagram of a network device provided by an embodiment of the present application.
  • FIG. 16 is a schematic structural diagram of another network device provided by an embodiment of the present application.
  • FIG. 17 is a schematic structural diagram of a message forwarding device provided in an embodiment of the present application.
  • FIG. 18 is a schematic structural diagram of another message forwarding device provided by an embodiment of the present application.
  • FIG. 19 is a schematic structural diagram of another message forwarding device provided by an embodiment of the present application.
  • FIG. 20 is a schematic structural diagram of another network device provided by an embodiment of the present application.
  • FIG. 21 is a schematic structural diagram of another network device provided by an embodiment of the present application.
  • FIG. 22 is a schematic structural diagram of another network device provided by the embodiment of the present application.
  • Fig. 23 is a schematic structural diagram of another controller provided by the embodiment of the present application.
  • FIG. 24 is a schematic structural diagram of another message forwarding device provided in the embodiment of the present application.
  • FIG. 25 is a schematic structural diagram of another network device provided by an embodiment of the present application.
  • Fig. 1 is a schematic structural diagram of a communication network provided by an embodiment of the present application.
  • the communication network may include a controller 01 and a plurality of network devices. 5 network devices.
  • a communication connection is established between the controller 01 and at least one network device, and communication connections are established among the plurality of network devices.
  • the controller 01 may be a network controller, such as a software defined network (software defined network, SDN) controller, a network control engine (network control engine, NCE) or a path computation element server (path computation element server, PCE) server) etc.
  • the controller 01 may be a server, or a server cluster composed of several servers, or a cloud computing service center.
  • Each network device may be a device with a packet forwarding function such as a router or a switch, and each network device may also be called a node.
  • the plurality of network devices may include a provider (provider, P) device, a provider edge (provider edge, PE) device, a broadband remote access server (broadband remote access server, BRAS) and a customer premises device (customer premises equipment, CPE), etc.
  • a provider provider edge
  • PE provider edge
  • BRAS broadband remote access server
  • CPE customer premises equipment
  • At least one network device in the communication network can also be connected to the user terminal 03 and used to provide the user terminal 03 with network access services.
  • the user terminal 03 may also be called a host or user equipment.
  • An application program (application, APP) is installed in the user terminal 03, and the plurality of network devices can forward the service flow of the APP.
  • the communication network provided in this embodiment of the present application may be an APN.
  • the APN may be a network based on Internet protocol version 6 (Internet protocol version 6, IPv6), also called APN6.
  • IPv6 Internet protocol version 6
  • the APN may also be a network based on SRv6, multi-protocol label switching (multi-protocol label switching, MPLS) technology or a virtual extended local area network (virtual extensible local area network, VxLAN).
  • SRv6 is an IPv6-based segment routing (segment routing, SR) forwarding technology.
  • the embodiment of the present application provides a packet forwarding method, which can be applied to a communication network such as that shown in FIG. 1 .
  • the method includes:
  • Step 101 the controller obtains a correspondence between a first application-aware identifier of a target service flow and a first network service required for transmitting the target service flow based on user requirements of the target service flow.
  • the user requirement of the target service flow refers to the requirement of the target service flow on the performance of the network service.
  • the user requirement may include one or more of the following requirements: a requirement for a specified forwarding path, a requirement for a specified network slice, and a requirement for a performance index of transmission performance.
  • the performance index of the transmission performance may include delay, bandwidth, packet loss rate, and the like.
  • the user requirement of the target service flow may also include information about the user and/or application to which the target service flow belongs.
  • the controller may generate the first application-aware identifier of the target service flow based on user requirements of the target service flow.
  • 3 is a schematic structural diagram of an application-aware identifier provided by an embodiment of the present application.
  • the first application-aware identifier includes at least one of a user identifier (user ID) and an application identifier (APP ID).
  • the user identifier is used to identify the user to which the target service flow belongs;
  • the application identifier is used to identify the application to which the target service flow belongs.
  • the user to which the target service flow belongs may be a user or a user group.
  • the application to which the target service flow belongs may be an application or an application group.
  • the first application-aware identifier may further include at least one of a flow identifier (flow ID) and an SLA level.
  • flow ID also called session ID
  • SLA level is used to identify the service level of the user to which the target service flow belongs
  • the service grades may include gold, silver, copper, etc., or the service grades may also be distinguished by different colors.
  • the controller may also calculate, based on the user requirement of the target service flow, a first network service that can meet the user requirement, and the first network service may include network slicing and/or a forwarding path.
  • the first network service may include a network slice specified in user requirements or a specified forwarding path.
  • the forwarding path may be an SRv6 path.
  • Step 102 the controller sends the corresponding relationship to the second network device.
  • the second network device may be a head-end network device (also referred to as a head node) serving the first network.
  • the second network device is a head node of a forwarding path, or a head node of a network slice.
  • the first application-aware identifier and its corresponding identifier of the first network service are recorded in the corresponding relationship. If the first network service includes a network slice, the identifier of the first network service includes an identifier of a network slice; if the first network service includes a forwarding path, the identifier of the first network service includes an identifier of a forwarding path.
  • the identifier of the forwarding path may be the BSID of the forwarding path, or may be the BSID of the SR policy to which the forwarding path belongs.
  • Step 103 If the target service flow received by the second network device is the service flow indicated by the first application-aware identifier, use the first network service to forward the service packet of the target service flow according to the corresponding relationship.
  • the second network device can identify the service flow it receives. If the second network device recognizes that the target service flow it receives is the service flow indicated by the first application-aware identifier, it may use the first network service to forward the target service flow according to the correspondence issued by the controller. business message. For example, assuming that the first network service includes an SRv6 path, the second network device may use the SRv6 path to forward the service packet of the target service flow.
  • the second network device can identify the service flow through the application awareness identifier encapsulated in the service packet of the target service flow. If the second network device detects the application awareness identifier encapsulated in the service packet of the target service flow If the identifier matches the first application-aware identifier, it can be determined that the target service flow is the service flow indicated by the first application-aware identifier.
  • the second network device may also identify whether the target service flow is the service flow indicated by the first application-aware identifier by means of packet parsing or traffic feature analysis. For example, the second network device may identify the target service flow by analyzing the four-tuple information, five-tuple information or seven-tuple information of the service packet. Alternatively, the second network device may also use deep packet inspection (deep packet inspection, DPI) technology to analyze the service packets of the target service flow, and then identify whether the target service flow is the service flow indicated by the first application-aware identifier.
  • DPI deep packet inspection
  • the second network device may also use an artificial intelligence (AI) model to analyze the traffic characteristics of the target service flow, and then identify whether the target service flow is the service flow indicated by the first application-aware identifier.
  • AI artificial intelligence
  • the AI model may be delivered by the controller to the second network device.
  • the application-aware identifier of a service flow may also be called an APN identifier, or an APN ID.
  • the controller can obtain the corresponding relationship between the application-aware identifier of the service flow and the network service required to transmit the service flow, and send the corresponding relationship to the Network equipment. Further, when the network device recognizes that the service flow is the service flow indicated by the application-aware identifier, it can directly use the corresponding network service to forward the message of the service flow. Since the controller can establish and deliver the corresponding relationship between the application-aware identifier of the service flow and the network service, the network device can directly forward the service message of the service flow based on the corresponding relationship, thus effectively improving the flexibility of service message forwarding.
  • the embodiment of the present application provides another packet forwarding method, which can be applied to a communication network such as that shown in FIG. 1 , and can be applied to a controller or any network device in the communication network.
  • the method includes:
  • Step 201 based on the user requirements of the target service flow, generate a first application-aware identifier of the target service flow, the first application-aware identifier is used for the network device to encapsulate the target application-aware identifier in the service packet of the target service flow, And the first application awareness identifier corresponds to the first network service.
  • the first network service meets user requirements of the target service flow.
  • the target application-aware identifier may be the first application-aware identifier, or a second application-aware identifier that matches the first application-aware identifier.
  • the controller may generate the first application-aware identifier of the target service flow based on the acquired user requirements of the target service flow.
  • the third network device may generate the first application-aware identifier of the target service flow based on the user requirements of the target service flow issued by the controller.
  • the user requirement of the target service flow refers to the requirement of the target service flow on the performance of the network service, and the user requirement of the target service flow may also include information of the user and/or application to which the target service flow belongs.
  • the first network service may include network slicing and/or forwarding paths. For the structure of the first application-aware identifier, reference may be made to FIG. 3 .
  • Step 202 Send the first application-aware identifier, where the first application-aware identifier is used for the network device to forward the service packet of the target service flow by using the first network service.
  • the controller may send the first application-aware identifier to the third network device.
  • the third network device is an application-aware edge device. If the third network device determines that the received target service flow is the service flow indicated by the first application-aware identifier, it may encapsulate the target application-aware identifier in a service packet of the target service flow.
  • the target application-aware identifier may be the first application-aware identifier, or may be a second application-aware identifier of the target service flow generated by the third network device, where the second application-aware identifier matches the first application-aware identifier. Therefore, it is convenient for the network device downstream of the third network device to determine the first network service for forwarding the target service flow based on the target application-aware identifier, and then use the first network service to forward the service report of the target service flow. arts.
  • the third network device may encapsulate the first application-aware identifier in the service packet of the target service flow, and forward the packet containing the first application to the downstream network device. Perceptually identified service packets.
  • the downstream network device can then determine a first network service for forwarding the target service flow based on the first application-aware identifier, and use the first network service to forward the service packet of the target service flow.
  • the embodiment of the present application provides a packet forwarding method, which can generate a first application-aware identifier based on user requirements of a target service flow. Since the first application-aware identifier corresponds to the first network service and is used for the network device to encapsulate the target application-aware identifier in the service packet of the target service flow, it can be ensured that the network device receiving the service packet can use The corresponding first network service forwards the service message, thereby effectively improving the flexibility of service message forwarding.
  • An embodiment of the present application provides a method for detecting the performance of a service flow, and the method can be applied to a communication network such as that shown in FIG. 1 .
  • the method includes:
  • step 301 the first network device performs follow-up detection on the target service flow to which the service message belongs based on the follow-up detection information in the service message, and obtains a follow-up detection result.
  • the first network device may be a node in the forwarding path of the target service flow, and the first network device may be an ingress (ingress) node, a forwarding (transit) node or exit (egress) node.
  • the follow-up detection result may include measurement results of performance indicators such as time delay and/or packet loss number of the target service flow.
  • the follow-up detection information may be encapsulated in the service message by the entry node of the follow-up detection path of the target service flow, and the entry node may be the upstream node of the first network device, or may also be the First network device. If the first network device is the ingress node, the first network device may encapsulate follow-up detection information in the service packet of the target service flow, and may perform follow-up detection on the target service flow based on the follow-up detection information, Obtain the flow detection result.
  • Step 302 the first network device sends the follow-through detection result and the target application awareness identifier of the target service flow to the controller in the network.
  • the target application-aware identifier is generated based on user requirements of the target service flow, and the follow-through detection result and the target application-aware identifier are used for the controller to analyze the transmission performance of the target service flow.
  • the user requirement of the target service flow refers to the requirement of the target service flow on the performance of the network service.
  • the structure of the target application awareness identification refer to FIG. 3 .
  • the target application-aware identifier is encapsulated in the service packet of the target service flow received by the first network device.
  • the target application-aware identifier may be encapsulated in a service packet by an upstream node of the first network device (for example, an application-aware edge device) or an application to which the target service flow belongs.
  • the target application-aware identifier may be a second application-aware identifier generated by an upstream node or an application to which the target service flow belongs, or may be a first application-aware identifier issued by the controller.
  • the target application-aware identifier of the target service flow is not encapsulated in the service packet of the target service flow received by the first network device.
  • the first network device may generate the second application-aware identifier of the target service flow based on the identifier generation rule issued by the controller.
  • the target application-aware identifier is the second application-aware identifier generated by the first network device.
  • step 303 the controller analyzes the transmission performance of the target service flow based on the flow-by-flow detection result and the target application-aware identification.
  • the controller After the controller receives the follow-up detection result and the target application perception identifier sent by the first network device, it can analyze the transmission performance of the target service flow at a granularity indicated by at least one of the target application perception identifiers.
  • the transmission performance may be represented by performance indicators such as packet loss rate and/or time delay.
  • the controller can receive the flow-based detection results and application-aware identifiers of different service flows reported by different network devices, and the controller can determine the flow-based detection results of the same service flow based on the application-aware identifiers, and then based on One or more follow-up detection results of the same service flow analyze the transmission performance of the service flow.
  • the embodiment of the present application provides a performance detection method of a service flow.
  • the network device reports the follow-up detection result of the target service flow to the controller, it can also report the target application awareness identifier of the target service flow.
  • the controller can then detect and analyze the transmission performance of the service flow at the granularity indicated by at least one of the target application-aware identifiers, thereby effectively improving the flexibility of detecting and analyzing the transmission performance of the service flow.
  • FIG. 6 is a flow chart of another packet forwarding method provided by an embodiment of the present application, and the method can be applied to a communication network such as that shown in FIG. 1 .
  • the method includes:
  • step 401 the controller obtains the user requirements of the target service flow.
  • the user requirement of the target service flow refers to the requirement of the target service flow on the performance of the network service.
  • the user requirement may include one or more of the following requirements: a requirement for a specified forwarding path, a requirement for a specified network slice, and a requirement for a performance index of transmission performance.
  • the performance index of the transmission performance may include delay, bandwidth, packet loss rate, and the like.
  • the user requirement of the target service flow may also include information about the user and/or application to which the target service flow belongs.
  • the controller may obtain the user requirements of the target service flow through its northbound interface (northbound interface).
  • the northbound interface of the controller can be connected with other devices to obtain the user requirements of the target service flow sent by the device.
  • the devices connected to the northbound interface of the controller include but are not limited to frontend, portal, orchestrator, operation support system (operation support system, OSS) or business support system (business support system, BSS) and so on.
  • Step 402 the controller obtains the correspondence between the first application-aware identifier of the target service flow and the first network service required to transmit the target service flow based on the user requirement.
  • the controller may generate the first application-aware identifier of the target service flow based on user requirements of the target service flow.
  • the first application-aware identifier includes at least one of a user identifier and an application identifier.
  • the user identifier is used to identify the user to which the target service flow belongs;
  • the application identifier is used to identify the application to which the target service flow belongs.
  • the user identifier may be an enterprise identifier.
  • the first application-aware identifier may further include at least one of a flow identifier and an SLA level.
  • the flow identifier is used to identify a specific data flow in the application to which the target service flow belongs;
  • the SLA level is used to identify the service level of the user to which the target service flow belongs, and the service level may include gold, silver, copper, etc., or the Service levels can also be distinguished by different colors.
  • the controller may also calculate the first network service that can meet the user's demand based on the user's demand of the target service flow, so as to obtain the correspondence between the first application-aware identifier and the first network service.
  • the first network service may include network slicing and/or forwarding path.
  • the first application-aware identifier and its corresponding first network service identifier may be recorded in the correspondence, that is, the correspondence may be a correspondence between the first application-aware identifier and the first network service identifier.
  • the identifier of the first network service may include an identifier of a network slice.
  • the identifier of the first network service may include an identifier of a forwarding path.
  • the forwarding path may be an SRv6 path
  • the identifier of the forwarding path may be the BSID of the forwarding path, or may be the BSID of the SR policy to which the forwarding path belongs.
  • Step 403 the controller sends the corresponding relationship to the second network device and the third network device respectively.
  • the second network device may be a head-end network device (also referred to as a head node) serving the first network.
  • the second network device is a head node of a forwarding path, or a head node of a network slice.
  • the corresponding relationship is used for the second network device to determine the first network service for forwarding the service packet of the target service flow based on the first application-aware identifier.
  • the third network device may be an application-aware edge device (App-aware edge device) in the ANP network, and the third network device may be a BRAS, a PE device, a CPE or an egress gateway (such as an egress gateway of a park), etc. .
  • the first application awareness identifier in the corresponding relationship is used for the third network device to encapsulate the application awareness of the target service flow in the service packet of the target service flow if the third network device determines that the received service flow is the target service flow
  • the identifier for example, encapsulates the first application-aware identifier.
  • the controller 01 can The corresponding relationship is issued to the network device 02a and the network device 02b respectively.
  • the corresponding relationship issued by the controller 01 may be shown in Table 1.
  • the identifier of the first network service corresponding to the target service flow with the first application perception identifier APN ID1 is BSID1, that is, the first network service assigned by the controller 01 to the target service flow is BSID1 Indicates the SRv6 path.
  • the identifier of the first network service corresponding to the target service flow with the first application-aware identifier APN ID3 is slice-ID1, that is, the first network service assigned by the controller 01 to the target service flow is the network slice indicated by slice-ID1.
  • the first app-aware logo First Web Services logo APN ID1 BSID1 APN ID2 BSID2 APN ID3 slice-ID1
  • the second network device and the third network device may be the same network device, that is, the application-aware edge device is a head-end network device served by the first network.
  • the controller may deliver the correspondence to only one network device. For example, referring to FIG. 7 , assuming that the network device 02a is an application-aware edge device (ie, the third network device), if the network device 02a is also a head-end network device (ie, the second network device) serving the first network, the controller 01 may only deliver the corresponding relationship to the network device 02a.
  • the controller may only issue the third network device (such as the network device 02a shown in FIG.
  • the first application is aware of the identifier without issuing the corresponding relationship.
  • Step 404 the controller sends the identifier generation rule to the third network device.
  • the identifier generation rule may refer to a rule for generating an application-aware identifier of a service flow based on feature information of the service flow.
  • the identifier generation rule is used for the third network device to generate a second application-aware identifier of the target service flow, and the second application-aware identifier is used to match the first application-aware identifier generated by the controller, so that the third network device can determine its Whether the received target service flow is the service flow indicated by the first application awareness identifier.
  • the controller 01 may deliver the identifier generation rule to the network device 02a.
  • Step 405 the third network device generates a second application-aware identifier of the target service flow based on the identifier generation rule.
  • the third network device After receiving the identifier generation rule issued by the controller, the third network device can generate an application-aware identifier for the service flow it receives based on the identifier generation rule.
  • the third network device may obtain the characteristic information of the target service flow it receives, and process the characteristic information by using the identification generation rule to generate the second application-aware identification of the target service flow.
  • the characteristic information may include four-tuple information, five-tuple information or seven-tuple information of the target service flow, or may also include traffic characteristic information (such as packet interval) of the target service flow, or may also Including information obtained based on DPI technology or application identification technology.
  • the third network device may input the traffic feature information of the target service flow into the AI model, so as to obtain the second application-aware identification of the target service flow output by the AI model.
  • the structure of the second application-aware identifier is the same as that of the first application-aware identifier.
  • the third network device can identify the application to which the target service flow belongs based on an application identification technology, and then can generate the application identifier of the application to which the target service flow belongs based on the identifier generation rule.
  • the third network device can determine the user to which the target service flow belongs according to information such as a virtual local area network (virtual local area network, VLAN) or interface of the target service flow, and then can generate an application based on the identifier.
  • the rule generates the user ID of the user to which the target business flow belongs.
  • Step 406 If the second application-aware identifier matches the first application-aware identifier, the third network device encapsulates the target application-aware identifier in the service packet of the target service flow.
  • the third network device detects that the second application-aware identifier of the target service flow generated by it matches the first application-aware identifier sent by the controller, it can be determined that the target service flow is the second application-aware identifier.
  • a service flow indicated by an application-aware identifier Since the second application-aware identifier is generated by the third network device based on the identifier generation rules issued by the controller, it can ensure that it matches the first application-aware identifier issued by the controller exactly, that is, it ensures that the third network device can identify the target reliability of business flow.
  • the third network device may also encapsulate the target application-aware identifier in the service packet of the target service flow.
  • the target application-aware identifier may be the first application-aware identifier issued by the controller, or may be the second application-aware identifier generated by the third network device.
  • the third network device may encapsulate the target application awareness identifier in the destination address field, HBH, DOH or SRH of the service packet.
  • the SRH includes a BSID field
  • the third network device may encapsulate the target application awareness identifier in the BSID field.
  • the third network device may also encapsulate the target application awareness identifier in the flow detection information. For example, if the follow-up flow detection information is IFIT information, the third network device may encapsulate the target application awareness identifier in the flow identification field or reserved field in the IFIT information.
  • the network device 02a may generate the second application-aware identifier of the target service flow based on the identifier generation rule sent by the controller 01 . Assuming that the second application-aware identifier generated by network device 02a is APN ID1, since the second application-aware identifier is the same as the first application-aware identifier APN ID1 in the correspondence shown in Table 1, network device 02a can Encapsulate APN ID1 in the service packet of the For example, the network device 02a may encapsulate APN ID1 in the BSID field of the service message.
  • the structure of the target application-aware identifier encapsulated in the service message can be shown in Figure 3.
  • the target application-aware identifier can include: SLA level, application identifier, user identifier and flow identifier .
  • the structure of the target application-aware identifier encapsulated in the service message may be shown in Figure 8.
  • the target application-aware identifier may include: SLA level, application identifier, user identifier, flow Identification and parameters (arguments) field.
  • the arguments field may indicate the service requirement of the target service flow, for example, may indicate the upper limit of delay and/or upper limit of packet loss rate of the target service flow.
  • the target application awareness identifier may be encapsulated in an arguments field of a segment identifier (segment ID, SID) in the SRv6 message.
  • SID segment ID
  • the SID in the SRv6 packet includes a locator address (locator address) field, a function ID (function ID) field, and an arguments field.
  • the arguments field may encapsulate the target application-aware identifier as shown in Figure 3 or Figure 8.
  • the matching of the second application-aware identifier generated by the third network device with the first application-aware identifier issued by the controller may refer to: the second application-aware identifier is the same as the first application-aware identifier, or may be It means that the second application-aware identifier is different from the first application-aware identifier, but has a certain corresponding relationship.
  • the corresponding relationship between the application-aware IDs can be delivered by the controller, that is, the controller can issue the identification generation rules and the corresponding relationship between the application-aware IDs to ensure that the controller and the network device generate Application-aware identity synchronization.
  • the controller may deliver the correspondence between the first application-aware identifier and other application-aware identifiers that match the first application-aware identifier to the third network device, and the third network device may determine its corresponding relationship based on the correspondence issued by the controller. Whether the generated second application-aware identifier matches the first application-aware identifier.
  • the third network device may also report the difference between the second application-aware identifier and the first application-aware identifier to the controller. correspondence, so that the controller can also learn the application-aware identifier of the target service flow generated on the network device side. For example, assuming that for the service flow of the video conferencing APP, the first application awareness identifier generated by the controller is APN11, and the second application awareness identifier generated by the third network device is APN12, then the second network device can report APN12 and APN11 to the controller. corresponding relationship.
  • Step 407 the third network device forwards the service packet of the target service flow to the second network device.
  • the third network device may forward the service packet encapsulated with the target application awareness identifier to the second network device.
  • the second network device may refer to a head-end network device of the first network service.
  • the third network device 02a may forward the service packet encapsulated with the target application awareness identifier to the second network device 02b.
  • Step 408 If the second network device determines that the received target service flow is the service flow indicated by the first application-aware identifier, then use the first network service to forward the service packet of the target service flow according to the corresponding relationship.
  • the second network device may identify the received service flow based on the application-aware identifier encapsulated in the service packet of the service flow. If the second network device detects that the target application-aware identifier in the service packet of the target service flow matches the first application-aware identifier, it may determine that the target service flow is the service flow indicated by the first application-aware identifier. Further, the second network device can use the first network service to forward the service packet of the target service flow based on the corresponding relationship issued by the controller.
  • the network device 02b i.e., the second network device
  • the network device 02b is based on the APN ID shown in Table 1.
  • the corresponding relationship may determine that the first network service allocated by the controller 01 to the target service flow is the SRv6 path indicated by BSID1. Therefore, the network device 02b can use the SRv6 path indicated by BSID1 to forward the service packet of the target service flow.
  • the controller may only issue the corresponding relationship to the second network device in the above step 403, and the above steps 404 to 406 It can be deleted according to the situation, that is, the third network device does not need to identify the target service flow and encapsulate the target application-aware identifier.
  • the second network device may also identify whether the target service flow is the service flow indicated by the first application-aware identifier by means of packet parsing or traffic feature analysis.
  • the application to which the target service flow belongs can encapsulate the application-aware identifier of the target service flow in the service packet when sending the target service flow
  • the second network device can encapsulate the application-aware identifier based on the application to which the target service flow belongs , identifying whether the target service flow it receives is the service flow indicated by the first application-aware identifier.
  • step 407 can be deleted.
  • step 404 may be executed synchronously with step 403, that is, the controller may deliver the identification generation rule while delivering the corresponding relationship to the second network device (or the third network device).
  • the above step 405 can be deleted according to the situation, that is, the second network device (or the third network device) does not need to generate the second application-aware identifier, but can identify its Whether the received service flow is the service flow indicated by the first application awareness identifier.
  • the above step 406 may also be deleted according to circumstances, that is, the second network device (or the third network device) may also not need to encapsulate the target application awareness identifier in the service packet of the target service flow.
  • the controller can obtain the corresponding relationship between the application-aware identifier of the service flow and the network service required to transmit the service flow, and send the corresponding relationship to the Network equipment. Further, when the network device recognizes that the service flow is the service flow indicated by the application-aware identifier, it can directly use the corresponding network service to forward the message of the service flow. Since the controller can establish and deliver the corresponding relationship between the application-aware identifier of the service flow and the network service, the network device can directly forward the service message of the service flow based on the corresponding relationship, thus effectively improving the flexibility of service message forwarding.
  • FIG. 10 is a flow chart of another packet forwarding method provided by an embodiment of the present application, and the method may be applied to a communication network such as that shown in FIG. 1 or FIG. 7 .
  • the method includes:
  • step 501 the controller obtains the user requirements of the target service flow.
  • the controller may obtain user requirements of the target service flow through a northbound interface.
  • the northbound interface of the controller can communicate with the service development system, and the controller can obtain the user requirements of the target service flow sent by the service development system.
  • the controller can obtain the user requirements of the target service flow sent by the service development system.
  • Step 502 the controller generates a first application-aware identifier of the target service flow based on the user requirement.
  • the first application-aware identifier is used for encapsulation in the service packet of the target service flow, and the first application-aware identifier corresponds to the first network service, for example, corresponds to the identifier of the first network service.
  • the first network service meets user requirements of the target service flow.
  • the first application-aware identifier includes at least one of a user identifier and an application identifier, and may further include at least one of a flow identifier and an SLA level.
  • the first network service may include forwarding paths and/or network slices. For the implementation process of step 502, reference may be made to the related description of step 402 above.
  • Step 503 the controller sends the first application awareness identifier to the third network device.
  • the third network device may be an application-aware edge device in the ANP network, and the third network device may be a BRAS, a PE device, a CPE, or an egress gateway (for example, an egress gateway of a campus), and the like.
  • the first application-aware identifier is used to indicate the user and/or application to which the target service flow belongs, and the first application-aware identifier is used for the third network device to encapsulate in the service packet of the target service flow.
  • Step 504 the controller determines the first network service required to transmit the target service flow based on the user requirement.
  • the controller may calculate, based on the user requirement of the target service flow, a first network service that can meet the user requirement, and the first network service may include network slicing and/or a forwarding path.
  • the first network service may include network slicing and/or a forwarding path.
  • Step 505 the controller sends the correspondence between the first application-aware identifier and the first network service to the second network device.
  • the second network device may refer to the headend network device of the first network service.
  • the corresponding relationship is used for the second network device to determine the first network service for forwarding the service packet of the target service flow based on the first application-aware identifier.
  • the first application-aware identifier and its corresponding first network service identifier may be recorded in the correspondence, that is, the correspondence may be a correspondence between the first application-aware identifier and the first network service identifier.
  • the identifier of the first network service may include an identifier of a network slice.
  • the identifier of the first network service may include an identifier of a forwarding path.
  • the forwarding path may be an SRv6 path
  • the identifier of the forwarding path may be the BSID of the forwarding path, or may be the BSID of the SR policy to which the forwarding path belongs.
  • Step 506 If the target service flow received by the third network device is the service flow indicated by the first application-aware identifier, encapsulate the target application-aware identifier in the service packet of the target service flow.
  • the third network device can identify the service flow it receives. If the third network device recognizes that the target service flow it receives is the service flow indicated by the first application-aware identifier, it may encapsulate the target application-aware identifier in the service packet of the target service flow. Thus, the downstream network device (for example, the second network device) can determine the first network service for forwarding the service packet of the target service flow based on the target application-aware identifier, and/or, can be sent to the controller When reporting the follow-up detection result for the target service flow, the target application awareness identifier is also reported.
  • the downstream network device for example, the second network device
  • the target application-aware identifier may be a first application-aware identifier delivered by the controller, or may be a second application-aware identifier of the target service flow generated by the third network device.
  • the third network device encapsulating the target application-aware identifier in the service packet, reference may be made to the relevant description of step 406 above, and details are not repeated here.
  • the third network device may identify whether the service flow is the service flow indicated by the first application-aware identifier by means of packet parsing or traffic feature analysis. For example, the third network device may identify whether the service flow is the service flow indicated by the first application-aware identifier by analyzing the four-tuple information, five-tuple information or seven-tuple information of the service packet. Alternatively, the third network device may also use the DPI technology to analyze the service packets of the service flow, and then identify whether the service flow is the service flow indicated by the first application-aware identifier. Alternatively, the third network device may also use an AI model to analyze traffic characteristics of the service flow, and then identify whether the service flow is the service flow indicated by the first application-aware identifier.
  • the controller may issue an identifier generation rule synchronously, and the third network device may generate the second application-aware identifier of the target service flow based on the identifier generation rule. If the second application-aware identifier matches the first application-aware identifier, the third network device may determine that the target service flow it receives is the service flow indicated by the first application-aware identifier.
  • the process of the third network device generating the second application-aware identifier based on the identifier generation rule delivered by the controller can refer to the related descriptions of the above step 404 and step 405, which will not be repeated here.
  • Step 507 the third network device forwards the service packet encapsulated with the target application awareness identifier to the second network device.
  • step 507 For the implementation process of step 507, reference may be made to the related description of step 407 above.
  • Step 508 if the second network device determines that the received target service flow is the service flow indicated by the first application-aware identifier, then use the first network service to forward the service packet of the target service flow according to the corresponding relationship.
  • the second network device If the second network device detects that the target application-aware identifier is encapsulated in the service packet of the target service flow, it can use the first network service corresponding to the target application-aware identifier to forward the target service based on the correspondence issued by the controller. flow of business packets.
  • the second network device For the implementation process of step 508, reference may be made to the related description of step 408 above.
  • the controller may also send the obtained user requirements of the target service flow to the third network device.
  • the third network device may generate the first application-aware identifier of the target service flow based on the user requirement sent by the controller. That is, the above step 503 can be deleted, and the third network device can execute the above step 502. For example, both the controller and the third network device can execute step 502 .
  • the embodiment of the present application provides a packet forwarding method, and the controller or the third network device can generate the first application-aware identifier of the target service flow based on user requirements of the target service flow. Since the first application-aware identifier corresponds to the first network service and is used for the network device to encapsulate the target application-aware identifier in the service packet of the target service flow, it can be ensured that the network device receiving the service packet can The corresponding first network service is used to forward the service message, thereby effectively improving the flexibility of service message forwarding.
  • the method provided by the embodiment of the present application can also generate the application-aware identifier of the service flow through the controller or the third network device, thus effectively enriching the generation method of the application-aware identifier.
  • Fig. 11 is a flowchart of another service flow performance detection method provided by the embodiment of the present application. As shown in Fig. 11, the method includes:
  • step 601 the controller obtains the user requirements of the target service flow.
  • Step 602. Based on the user requirement, the controller obtains the correspondence between the first application-aware identifier of the target service flow and the first network service required for transmitting the target service flow.
  • Step 603 the controller sends the corresponding relationship to the second network device and the first network device respectively.
  • Step 604 the controller sends the upload policy of the target service flow to the second network device and/or the first network device.
  • the sending policy is used to indicate to report the result of the follow-up detection of the target service flow.
  • the controller may only detect and analyze the transmission performance of some key service flows (including the target service flow), so as to reduce the data processing pressure of the controller.
  • the controller may send the sending policy of the key service flow to the network device to instruct the network device to report the follow-up detection result of the key service flow, and the follow-up detection result of other non-key service flows does not need to be reported.
  • the first network device may be a node in the forwarding path of the target service flow (for example, the forwarding path in the first network service), and the first network device may be a follower of the target service flow.
  • the first network device and the second network device may be the same network device or different network devices.
  • the upload policy may include values of one or more fields in the application-aware identifier of the target service flow.
  • the upload policy may include one or more of the following information: the application identifier of the application to which the target service flow belongs, the user identifier of the user to which the target service flow belongs, the flow identifier of the target service flow, and the SLA of the target service flow grade.
  • the controller 01 can issue the sending policy of the target service flow to the network devices 02b, 02c, and 02d respectively.
  • Step 605 if the second network device determines that the received target service flow is the service flow indicated by the first application-aware identifier, then use the first network service to forward the service packet of the target service flow according to the corresponding relationship.
  • step 605 For the implementation process of step 605, reference may be made to the related description of step 408 above.
  • step 606 the first network device performs follow-up detection on the target service flow to which the service message belongs based on the follow-up detection information in the service message, and obtains a follow-up detection result.
  • the first network device may receive the service packet of the target service flow forwarded by the second network device. If the service message includes follow-up detection information (for example, IFIT information), the first network device may perform follow-up detection on the target service flow to which the service message belongs based on the follow-up detection information, and obtain a follow-up detection result.
  • the follow-the-flow detection result may include measurement results of performance indicators such as time delay and/or packet loss number of the target service flow.
  • the follow-up detection information may be encapsulated in a service message by an ingress node of the follow-up detection path of the target service flow, and the ingress node may be the third network device, or may be the second network device , or may also be a downstream network device of the second network device, for example, may be the first network device. If the ingress node is the first network device, the first network device can encapsulate the follow-up detection information in the service packet of the target service flow, and can perform follow-up detection on the target service flow based on the follow-up detection information, and obtain Flow detection results.
  • Step 607 the first network device sends the follow-up detection result and target application awareness identifier to the controller based on the indication of the upload policy.
  • the first network device may acquire the target application-aware identifier of the target service flow. If the first network device determines, based on the target application-aware identifier and the sending policy, that the target service flow belongs to a critical service flow that needs to report the follow-up detection result, it may send the follow-up detection result and the follow-up detection result of the target service flow to the controller.
  • the target application-aware identifier may be used to determine, based on the target application-aware identifier and the sending policy.
  • the upload policy of the target service flow may include values of one or more fields in the application-aware identifier of the target service flow.
  • the first network device may detect whether the value of each field in the upload policy matches the value of the corresponding field in the target application-aware identifier. If the value of each field in the sending policy matches the value of the corresponding field in the target application awareness identifier, the first network device can determine that the target service flow belongs to a critical service flow that needs to report The controller reports the follow-up detection result of the target service flow and the target application awareness identification.
  • the first network device obtains the application-aware identifier of a service flow and detects that the value of any field in the upload policy does not match the value of the corresponding field in the application-aware identifier, the first network device The network device can determine that the service flow is not a critical service flow, and thus does not need to report the follow-up detection result and the application-aware identifier of the service flow.
  • the target application-aware identifier of the target service flow acquired by the first network devices 02c and 02d includes a user identifier, and the user identifier is UID1, both the first network devices 02c and 02d can determine that the target service flow belongs to a critical service flow, And it can report the follow-up detection result of the target service flow and the target application awareness identification.
  • the user identifier in the application-aware identifier of a certain service flow obtained by the first network device is UID2, the first network device can determine that the service flow is not a critical service flow, and there is no need to report the follow-up detection result of the service flow and application-aware identification.
  • the first network device can only report the follow-up detection results of key service flows based on the sending policy issued by the controller, and does not need to report the follow-up detection results of non-key service flows, it not only reduces the need for the controller to receive and The amount of processed data of the flow detection results reduces the data processing pressure of the controller, and realizes flexible and adjustable reporting granularity of the flow detection results. In addition, since the amount of data of the follow-up detection result to be reported by the first network device is reduced, the transmission resources occupied by the follow-up detection result can also be effectively reduced.
  • the first network device may acquire the target application-aware identifier of the target service flow from a service packet of the target service flow.
  • the target application-aware identifier may be a first application-aware identifier delivered by the controller, or may be a second application-aware identifier generated by a network device.
  • the target application-aware identifier may be encapsulated in the service packet by the application-aware edge device (that is, the third network device mentioned above).
  • the target service flow may be encapsulated in the service packet by the ingress node of the follow-up detection path of the target service flow.
  • the target service flow may be encapsulated in the service packet by the head-end network device (that is, the second network device mentioned above) served by the first network for forwarding the target service flow.
  • it may also be encapsulated in the service message by the application to which the target service flow belongs.
  • the flow identification field of the IFIT information can be encapsulated with the target application awareness identification, that is, the target application awareness identification can replace FlowMonID in IFIT information.
  • the reserved (reserved) field of the IFIT information may encapsulate the target application awareness identifier, that is, the IFIT information may include both the FlowMonID and the target application awareness identifier.
  • the target application-aware identifier of the target service flow is not encapsulated in the service packet of the target service flow received by the first network device.
  • the controller may also issue an identifier generation rule to the first network device.
  • the first network device After the first network device receives the service packet of the target service flow, it can generate the second application-aware identifier of the target service flow based on the identifier generation rule issued by the controller.
  • the above-mentioned target application-aware The identifier may be a second application-aware identifier generated by the first network device.
  • the process of generating the second application-aware identifier by the first network device may refer to the above-mentioned step 405 .
  • the controller may also deliver the correspondence between the first application-aware identifier and the first network service to the first network device.
  • the first network device may determine that the target service flow is the service flow indicated by the first application-aware identifier through packet parsing or traffic feature analysis. That is, the first network device may determine the application-aware identifier of the target service flow as the first application-aware identifier by means of packet parsing or traffic feature analysis.
  • the above-mentioned target application awareness identifier may also be the first application awareness identifier issued by the controller.
  • the first network device may, after obtaining the target application-aware identifier of the target service flow, The service packet of the target service flow encapsulates the target application-aware identifier, and forwards the service packet encapsulated with the target application-aware identifier.
  • the first network device may encapsulate the target application-aware identifier in the flow identifier field or reserved field of the IFIT information.
  • the first network device may also encapsulate the target application awareness identifier in the destination address field, HBH, DOH or SRH of the service packet.
  • the first network device can also perceive the target application The identifier is taken from the original encapsulation position and re-encapsulated in the stream identifier field or reserved field of the IFIT information. Afterwards, the first network device may forward the re-encapsulated service packet.
  • Step 608 the controller analyzes the transmission performance of the target service flow based on the flow-by-flow detection result and the target application perception identification.
  • the controller after the controller receives the follow-up detection result and the target application perception identifier sent by the first network device, it can analyze the transmission of the target service flow at the granularity indicated by at least one of the target application perception identifiers. performance.
  • the transmission performance may be represented by performance indicators such as packet loss rate and/or time delay.
  • the controller may receive a flow-based detection result reported by at least one first network device in the flow-based detection path of the target service flow, and the controller may analyze the flow-based detection result based on the received at least one flow-based detection result The transmission performance of the target traffic flow.
  • the at least one first network device may include an ingress node, an intermediate node and/or an egress node in the flow detection path.
  • the controller can implement end-to-end detection of the transmission performance of the target service flow; if the at least one first network device includes an ingress node, an intermediate node and the egress node, the controller can implement hop-by-hop detection of the transmission performance of the target service flow.
  • the controller can receive the flow-based detection results and application-aware identifiers of different service flows reported by different network devices, and the controller can determine the flow-based detection results of the same service flow based on the application-aware identifiers, and then based on One or more follow-up detection results of the same service flow analyze the transmission performance of the service flow.
  • the target service flow indicated by the target application-aware identifier may be a specific data flow, or may also be a group of data flows, that is, the target service flow may include multiple data flows.
  • the group of data streams may include data streams of different applications used by the same user, or data streams of different users under the same application. If the target service flow is a group of data flows, the controller can analyze the transmission performance of each data flow in the group of service flows according to the received flow detection results, or can analyze the overall transmission performance of the group of service flows , which can also be called the average transmission performance.
  • the first network device when it sends the result of the follow-up flow detection and the target application awareness identifier to the controller, it may also report the corresponding follow-up flow detection flow identifier together.
  • the flow ID detected along with the flow may be obtained from the information detected along with the flow, for example, the flow ID detected along with the flow may be a monitored flow ID (FlowMonID) in the IFIT information.
  • the flow identifier of the follow-up detection may indicate a monitored data flow in the target service flow, or it may be understood that: the follow-up detection result is a detection result for the data flow indicated by the flow detection flow identifier.
  • the controller can determine at least one data flow included in the target service flow based on the corresponding relationship between the target application-aware identifier and the flow identifier detected along with the flow; The transmission performance of at least one data stream of .
  • the controller can also generate the target application awareness identifier and Correspondence between multiple stream IDs detected along with the stream.
  • the controller may analyze the transmission performance of each monitored data flow included in the target service flow. Afterwards, the controller may also determine the overall transmission performance (for example, the average transmission performance) of the target service flow based on the transmission performance of each monitored data flow. For example, the controller may calculate the packet loss rate of each monitored data flow in the target service flow, and use the average value of the packet loss rates of the monitored data flows as the average packet loss rate of the target service flow.
  • Step 609 the controller displays the performance index of the target service flow according to the target granularity.
  • the performance index is used to indicate the transmission performance of the target service flow, for example, the performance index may include at least one of packet loss rate and time delay.
  • the target granularity is the granularity indicated by at least one identifier in the target application-aware identifier. Since the target application-aware identifier may include at least one of a user identifier and an application identifier, the controller can display service flow performance indicators at the granularity of users and/or applications. If the target application-aware identifier also includes a flow identifier (ie session ID) and an SLA level, the controller can also display the performance indicators of the service flow at the granularity of the flow identifier and/or the SLA level.
  • a flow identifier ie session ID
  • SLA level the controller can also display the performance indicators of the service flow at the granularity of the flow identifier and/or the SLA level.
  • the target granularity can be flexibly configured and adjusted based on requirements of application scenarios, for example, it can be configured and adjusted by operation and maintenance personnel.
  • the controller can display the performance index of at least one service flow of each user in one or more users in units of users. Wherein, for each user, the controller may display the performance indicator of each service flow of the user (for example, the service flow of each application used by the user), or may display the performance indicators of multiple service flows of the user mean.
  • the controller can display the performance index of at least one service flow of each application in one or more applications in units of applications. Wherein, for each application, the controller can display the performance index of each service flow of the application (for example, the service flow of each user using the application), or can display the average value of the performance indicators of multiple service flows of the application .
  • the mean can be an arithmetic mean, a root mean square mean or a weighted mean.
  • the controller can display the performance index of at least one service flow with the same user ID and the same application ID in units of user and application.
  • the controller has acquired the follow-up detection results of three service flows from service flow 1 to service flow 3, and the application-aware identifiers of the three service flows are shown in Table 2. If the target granularity is user granularity, and the user ID of the target user whose performance indicators need to be displayed is UID1, the controller can display the performance indicators of service flow 1 and service flow 2 respectively, or the controller can calculate and display the service flow 1 and service flow 2 The mean value of the performance indicators of service flow 2.
  • the controller can display the performance indicators of service flow 1 and service flow 3 respectively, or the controller can calculate and display the service flow 1 and the mean value of the performance index of service flow 3.
  • the controller can display the performance indicator of the service flow 2.
  • the application-aware identifier of the service flow can include information of multiple different dimensions of the service flow
  • the performance index of the service flow can be displayed at the granularity indicated by the identifier in the application-aware identifier, which can realize the refinement of the performance index Visible.
  • the display granularity of the performance index can also be flexibly adjusted according to requirements, thereby effectively improving the flexibility of displaying the performance index.
  • step 610 if the controller determines that the first network service does not meet the user requirements of the target service flow based on the transmission performance, then determine that the network service required to transmit the target service flow is the second network service.
  • the controller can determine that the target service flow is the first application-aware identifier indicated business flow. Furthermore, the controller can determine the user requirements of the target service flow, and can detect whether the transmission performance meets the user requirements of the target service flow based on the analyzed transmission performance of the target service flow. If the controller determines that the transmission performance of the target service flow does not meet the user requirements of the target service flow, it can also recalculate the second network service that can meet the user requirements of the target service flow, that is, the controller can transfer the network service of the target service flow to The service is updated from the first network service to the second network service.
  • Step 611 the controller sends the correspondence between the first application-aware identifier and the second network service to the second network device.
  • the controller may re-deliver the correspondence between the first application-aware identifier and the second network service to the second network device, for example, may issue the correspondence between the first application-aware identifier and the identifier of the second network service.
  • the second network device After receiving the corresponding relationship, the second network device can use the second network service to forward the service packet of the target service flow.
  • the controller can analyze the transmission performance of the target service flow based on the flow-by-flow detection results during the transmission of the target service flow, and adjust the network service allocated for the target service flow in time based on the transmission performance, thus realizing the network resources
  • the closed-loop dynamic optimization effectively ensures the transmission performance of the target service flow.
  • the controller 01 may issue the correspondence between APN ID1 and BSID2 to the network device 02b.
  • the network device 02b can then use the SRv6 path indicated by BSID2 to forward the service packets of the target service flow.
  • the controller may also send the first application-aware edge device to the third network device.
  • a corresponding relationship between the identifier and the second network service For example, referring to FIG. 1 , the controller 01 may also send the correspondence between the first application awareness identifier and the second network service to the network device 02a.
  • the first network device does not need to detect whether the target service flow belongs to the critical service flow based on the sending policy, but may directly report the follow-up detection result of the target service flow to the controller and the target application-aware identity. That is to say, if the first network device detects that the service packet includes follow-up detection information, it can perform follow-up detection on the service flow to which the service message belongs based on the follow-up detection information, and directly report the follow-up detection information to the controller. The detection result and the application-aware identification of the service flow.
  • the above step 604 may be deleted according to circumstances, that is, the controller does not need to deliver the sending policy of the target service flow.
  • the first network device does not need to detect whether the target service flow is a key service flow based on the sending policy.
  • the first network device may have an application-aware identifier processing function. If the application-aware identifier processing function is enabled, the first network device may detect the target service based on the target application-aware identifier and the sending policy. Whether the flow is a business-critical flow. If the application-aware identifier processing function is not enabled, the first network device does not need to detect whether the target service flow is a critical service flow based on the sending policy.
  • the first network device may enable or disable its application-aware identifier processing function based on the received configuration instruction.
  • the configuration instruction may be delivered by the controller, or may be directly configured by operation and maintenance personnel.
  • the first network device may first detect whether the target service flow is a critical service flow based on the sending policy. If the first network device determines that the target service flow is a key service flow, it may execute the above step 606 to obtain a follow-up detection result of the target service flow. If the first network device determines that the target service flow is not a critical service flow, step 606 does not need to be performed, that is, the first network device does not need to perform follow-up detection on non-critical service flows.
  • the controller may send the sending policy of the target service flow to each node in the follow-up detection path of the target service flow in the above step 601 . Then each node in the flow-following detection path can detect whether the received service flow is a key service flow based on the method shown in step 607 above.
  • the controller may only send the upload policy of the target service flow to the application-aware edge device (that is, the third network device).
  • the third network device can determine that the target service flow belongs to a key service flow that needs to report the result of follow-up detection based on the target application-aware identifier of the target service flow and the sending policy, and can add the Tag information.
  • a network device downstream of the third network device (for example, the first network device) may further determine that the target service flow is a key service flow based on the tag information.
  • the first network device may directly determine whether the service flow to which the service packet belongs is a key service flow based on the tag information in the service packet.
  • the execution order of the steps in the above message forwarding method can be adjusted according to the situation, and the steps can also be increased or decreased according to the situation.
  • the above step 604 can be performed before step 603; or, the above step 609 can be deleted according to the situation; or, the above step 610 and step 611 can be performed before the step 609; or, the above step 610 and step 611 can be according to the situation delete.
  • the embodiment of the present application provides a packet forwarding method.
  • the network device reports the follow-up detection result of the target service flow to the controller, it can also report the target application awareness identifier of the target service flow.
  • the controller can then detect and analyze the transmission performance of the service flow at the granularity indicated by at least one of the target application-aware identifiers, thereby effectively improving the flexibility of detecting and analyzing the transmission performance of the service flow.
  • the controller can also display the performance index of the service flow according to the granularity indicated by at least one of the target application-aware identifiers, the refined and flexible visualization of the performance index is realized.
  • Fig. 13 is a schematic structural diagram of a controller provided by an embodiment of the present application.
  • the controller can be applied to a communication network such as that shown in Fig. 1 or Fig. 7, and can implement the above-mentioned Fig. 2, Fig. 6, Fig. 10 or Fig. Steps performed by the controller in the embodiment shown in 11.
  • the controller includes:
  • the generation module 011 is configured to obtain the correspondence between the first application-aware identifier of the target service flow and the first network service required for transmitting the target service flow based on user requirements of the target service flow.
  • the generating module 011 For the function implementation of the generating module 011, reference may be made to the relevant descriptions of step 101, step 402 or step 602 in the above method embodiments.
  • a sending module 012 configured to send the corresponding relationship to a second network device, where the corresponding relationship is used for the second network device to determine, based on the first application-aware identifier, the first Internet service.
  • the sending module 012 For the function implementation of the sending module 012, reference may be made to the relevant descriptions of step 102, step 403, step 505 or step 603 in the above method embodiments.
  • the correspondence includes an identifier of the first network service, and the identifier of the first network service includes: a binding segment identifier and/or an identifier of a network slice.
  • the first application-aware identifier includes at least one of a user identifier and an application identifier.
  • the first application-aware identifier further includes at least one of a flow identifier, an SLA level, and a service requirement.
  • the sending module 012 is further configured to send an identifier generation rule to the second network device, so that the second network device generates a second application-aware identifier of the target service flow based on the identifier generation rule, and the second The application-aware identifier is used to match the first application-aware identifier to determine the first network service.
  • the function of the sending module 012 reference may also be made to the relevant description of step 404 in the above method embodiment.
  • the sending module 012 is further configured to send the first application-aware identifier of the target service flow to the third network device, and the first application-aware identifier is used by the third network device if it determines that the received service flow For the target service flow, the application-aware identifier of the target service flow is encapsulated in the service packet of the target service flow.
  • the function of the sending module 012 reference may also be made to the relevant description of step 503 in the above method embodiment.
  • the controller may further include: an obtaining module 013, configured to obtain user requirements of the target service flow through a northbound interface.
  • an obtaining module 013 configured to obtain user requirements of the target service flow through a northbound interface.
  • controller may also include:
  • the receiving module 014 is configured to receive the flow detection result sent by the first network device and the target application awareness identification, the target application awareness identification is the application awareness identification of the service flow to which the flow detection result belongs, and the target application awareness identification is the The first application-aware identifier or the second application-aware identifier of the target service flow generated by the network device.
  • the target application awareness identification is the application awareness identification of the service flow to which the flow detection result belongs
  • the target application awareness identification is the The first application-aware identifier or the second application-aware identifier of the target service flow generated by the network device.
  • the analysis module 015 is configured to analyze the transmission performance of the target service flow based on the flow-by-flow detection result and the target application perception identification.
  • the analysis module 015 reference may be made to the relevant description of step 608 in the above method embodiment.
  • the controller may also include:
  • a display module 016 configured to display the performance index of the target service flow according to the target granularity, where the performance index is used to indicate the transmission performance of the target service flow; wherein, the target granularity is the granularity indicated by at least one identifier in the target application perception identifier .
  • step 609 for the function implementation of the display module 016, reference may be made to the relevant description of step 609 in the above method embodiment.
  • the generation module 011 is further configured to determine, based on the transmission performance of the target service flow, that the first network service does not meet the user requirements of the target service flow, and determine that the network service required to transmit the target service flow is the first 2.
  • Network services For the function implementation of the generation module 011, reference may be made to the relevant description of step 610 in the above method embodiment.
  • the sending module 012 is further configured to send the correspondence between the first application awareness identifier and the second network service to the second network device.
  • the function of the sending module 012 reference may also be made to the relevant description of step 611 in the above method embodiment.
  • the sending module 012 is further configured to, before the receiving module 014 receives the flow detection result and target application awareness identifier sent by the first network device, send the The upload policy of the target service flow, which is used to instruct to report the follow-up detection result of the target service flow.
  • the upload policy of the target service flow which is used to instruct to report the follow-up detection result of the target service flow.
  • the receiving module 014 may be configured to receive the flow detection result sent by the first network device, the target application perception identifier, and the corresponding flow detection flow identifier, which is also called the monitored flow identifier , which can be used to indicate a monitored data flow in the target service flow.
  • the analysis module 015 may be configured to determine at least one data flow included in the target service flow based on the corresponding relationship between the target application perception identifier and the flow identifier detected along with the flow; The transmission performance of at least one data stream of .
  • the user requirements of the target service flow include one or more of the following requirements: a requirement for a specified forwarding path, a requirement for a specified network slice, and a requirement for a performance index of transmission performance.
  • the embodiment of the present application provides a controller, which can obtain the correspondence between the application-aware identifier of the service flow and the network service required to transmit the service flow, and deliver the correspondence to the network equipment. Further, when the network device recognizes that the service flow is the service flow indicated by the application-aware identifier, it can directly use the corresponding network service to forward the message of the service flow. Since the controller can establish and deliver the corresponding relationship between the application-aware identifier of the service flow and the network service, the network device can directly forward the service message of the service flow based on the corresponding relationship, thus effectively improving the flexibility of service message forwarding.
  • FIG. 15 is a schematic structural diagram of a network device provided by an embodiment of the present application.
  • the network device can be applied to a communication network such as that shown in FIG. 1 or FIG. 7 .
  • the network device may be the network device 02a, 02c or 02d in FIG. 1 or FIG. 7 , or may be the network device 02b shown in FIG. 1 .
  • the network device may implement the steps performed by at least one network device among the second network device, the third network device, and the first network device in the above embodiments shown in FIG. 2 , FIG. 6 , FIG. 10 or FIG. 11 .
  • the network equipment includes:
  • the receiving module 021 is configured to receive the correspondence between the first application-aware identifier and the first network service sent by the controller in the network, wherein the first application-aware identifier is generated by the controller based on user requirements of service flows.
  • the receiving module 021 reference may be made to the relevant descriptions of step 102, step 403, step 505 or step 603 in the above method embodiments.
  • the sending module 022 is configured to use the first network service to forward the service packets of the target service flow according to the corresponding relationship if the received target service flow is the service flow indicated by the first application-aware identifier.
  • the sending module 022 reference may be made to the relevant descriptions of step 103, step 408, step 508 or step 605 in the above method embodiments.
  • the network device may also include:
  • An obtaining module 023 configured to obtain the second application-aware identifier of the target service flow from the service packet of the target service flow.
  • the determining module 024 is configured to determine that the target service flow is the service flow indicated by the first application-aware identifier if the second application-aware identifier matches the first application-aware identifier.
  • the service message received by the network device includes IFIT information
  • the second application-aware identifier is encapsulated in the flow identification field or reserved field of the IFIT information; or, the destination address field of the service message, the HBH , DOH or SRH to encapsulate the second application-aware identifier.
  • the second application-aware identifier is encapsulated in the BSID field of the SRH field.
  • the receiving module 021 may also be configured to receive the identification generation rule sent by the controller.
  • the receiving module 021 reference may also be made to the relevant description of step 404 in the above method embodiment.
  • the network device may also include:
  • a generating module 025 configured to generate a second application-aware identifier of the target service flow based on the identifier generation rule.
  • the generating module 025 For the function implementation of the generating module 025, reference may be made to the relevant description of step 405 in the above method embodiment.
  • the determining module 024 is configured to determine that the target service flow is the service flow indicated by the first application-aware identifier if the second application-aware identifier matches the first application-aware identifier.
  • the determination module 024 For the function implementation of the determination module 024, reference may be made to the relevant description of step 406 in the above method embodiment.
  • the service packet received by the network device includes IFIT information; the sending module 022 may be configured to encapsulate the target application awareness identifier in the flow identifier field or reserved field of the IFIT information, and adopt the first A network service forwards the service packet encapsulated with the target application-aware identifier.
  • the sending module 022 For the implementation of the function of the sending module 022, reference may also be made to the relevant description of step 406 or step 506 in the above method embodiments.
  • the network device may also include:
  • the detection module 026 is configured to perform follow-up detection on the target service flow based on the follow-up detection information if the service message of the target service flow received by the receiving module 021 includes follow-up detection information, and obtain a follow-up detection result .
  • the detection module 026 For the function implementation of the detection module 026, reference may be made to the relevant description of step 606 in the above method embodiment.
  • the sending module 022 is further configured to send the follow-up detection result and target application awareness identifier to the controller, where the target application awareness identifier is the first application awareness identifier or the second application of the target service flow acquired by the network device Perceptual identity.
  • the target application awareness identifier is the first application awareness identifier or the second application of the target service flow acquired by the network device Perceptual identity.
  • the receiving module 021 may also be configured to receive the sending strategy of the target service flow sent by the controller, where the sending strategy is used to instruct to report the follow-up detection result of the target service flow.
  • the sending strategy is used to instruct to report the follow-up detection result of the target service flow.
  • the sending module 022 may be configured to send the follow-up detection result and target application awareness identifier to the controller based on the indication of the upload strategy.
  • the sending module 022 may be configured to send the follow-up detection result, the target application awareness identifier, and the corresponding follow-up detection flow identifier to the controller.
  • the flow identification detected along with the flow may be used to indicate a monitored data flow in the target service flow.
  • the embodiment of the present application provides a network device, which can receive the correspondence between the application-aware identifier of the service flow delivered by the controller and the network service required to transmit the service flow, and can identify the When the outgoing service flow is the service flow indicated by the application-aware identifier, the corresponding network service is directly used to forward the message of the service flow. Since the controller can establish and deliver the corresponding relationship between the application-aware identifier of the service flow and the network service, the network device can directly forward the service message of the service flow based on the corresponding relationship, thus effectively improving the flexibility of service message forwarding.
  • Fig. 17 is a schematic structural diagram of a message forwarding device provided by an embodiment of the present application.
  • the message forwarding device can be applied to a communication network such as that shown in Fig. 1 or Fig. 7, and can implement the above-mentioned embodiment shown in Fig. 4 in the steps.
  • the message forwarding device includes:
  • the generating module 001 is configured to generate a first application-aware identifier of the target service flow based on user requirements of the target service flow, and the first application-aware identifier is used by the network device to encapsulate the target application-aware identifier in the service packet of the target service flow,
  • the target application-aware identifier is the first application-aware identifier, or a second application-aware identifier that matches the first application-aware identifier, the first application-aware identifier corresponds to a first network service, and the first network service satisfies the target User requirements for business flows.
  • the generating module 001 For the function implementation of the generating module 001, reference may be made to the relevant description of step 201 in the above method embodiment.
  • the sending module 002 is configured to send the first application-aware identifier, and the first application-aware identifier is used for the network device to forward the service packet of the target service flow by using the first network service.
  • the sending module 002 For the function implementation of the sending module 002, reference may be made to the relevant description of step 202 in the above method embodiment.
  • the message forwarding device can be applied to a controller in a communication network such as that shown in FIG. 1 or FIG. 7, and can also implement the above-mentioned embodiment shown in FIG. 6, FIG. Steps performed by the controller.
  • the generating module 001 may be configured to generate a first application-aware identifier of the target service flow based on the acquired user requirements of the target service flow.
  • a first application-aware identifier of the target service flow based on the acquired user requirements of the target service flow.
  • the sending module 002 is configured to send the first application-aware identifier to a third network device, so that the third network device encapsulates the target application-aware identifier in a service packet of the target service flow.
  • the function of the sending module 002 reference may also be made to the relevant description of step 503 in the above method embodiment.
  • the device may also include:
  • the acquisition module 003 is configured to acquire the user requirements of the target service flow through the northbound interface.
  • the acquisition module 003 reference may be made to the relevant descriptions of step 401, step 501 or step 601 in the above method embodiments.
  • the generating module 001 is further configured to determine the first network service required for transmitting the target service flow based on user requirements of the target service flow.
  • the generating module 001 For the function implementation of the generating module 001, reference may also be made to the relevant description of step 503 in the above method embodiment.
  • the sending module 002 is further configured to send the correspondence between the first application-aware identifier and the first network service to the second network device, and the correspondence is used for the second network device to determine based on the first application-aware identifier
  • the first network service for forwarding the service packets of the target service flow.
  • the device may also include:
  • the receiving module 004 is configured to receive the follow-up detection result and target application awareness identifier sent by the first network device.
  • the receiving module 004 For the function implementation of the receiving module 004, reference may be made to the relevant description of step 607 in the above method embodiment.
  • An analysis module 005 configured to analyze the transmission performance of the target service flow based on the flow-by-flow detection result and the target application-aware identification.
  • the analyzing module 005 For the function implementation of the analyzing module 005, reference may be made to the relevant description of step 608 in the above method embodiment.
  • the device may also include:
  • the display module 006 is configured to display the performance index of the target service flow according to the target granularity, and the performance index is used to indicate the transmission performance of the target service flow; wherein, the target granularity is the granularity indicated by at least one identifier in the target application perception identifier.
  • the display module 006 For the function realization of the display module 006, reference may be made to the relevant description of step 609 in the above method embodiment.
  • the receiving module 004 may be configured to receive the flow detection result sent by the first network device, the target application perception identifier, and the corresponding flow detection flow identifier;
  • the analysis module 005 may be configured to determine at least one data flow included in the target service flow based on the corresponding relationship between the target application perception identifier and the flow identifier detected with the flow, and analyze the target service based on the flow detection result The transport capability of at least one data stream included in the flow.
  • the generating module 001 may also be configured to determine that the first network service does not meet the user requirements of the target service flow based on the transmission performance of the target service flow, and determine that the network service required to transmit the target service flow is the second 2.
  • Network services For the function implementation of the generation module 001, reference may also be made to the relevant description of step 610 in the above method embodiment.
  • the sending module 002 may also be configured to send the correspondence between the first application awareness identifier and the second network service to the second network device.
  • the sending module 002 may also be configured to send the correspondence between the first application awareness identifier and the second network service to the second network device.
  • the function of the sending module 002 reference may also be made to the relevant description of step 611 in the above method embodiment.
  • the sending module 002 may also be configured to send the third network device and/or the first network device before the receiving module 004 receives the flow detection result and the target application awareness identifier sent by the first network device.
  • the sending strategy of the target service flow where the sending strategy is used to indicate to report the follow-up detection result of the target service flow.
  • the function of the sending module 002 reference may also be made to the relevant description of step 604 in the above method embodiment.
  • the message forwarding device can be applied to network devices in the communication network shown in Figure 1 or Figure 7, and can also implement the above-mentioned embodiments shown in Figure 6, Figure 10 or Figure 11 Steps performed by at least one network device among the second network device, the third network device, and the first network device.
  • the generating module 001 may be configured to generate a first application-aware identifier of the target service flow based on user requirements of the target service flow sent by the controller.
  • the generating module 001 may also be made to the relevant description of the above-mentioned step 502.
  • the sending module 002 may be configured to encapsulate the first application-aware identifier in a service packet of the target service flow, and forward the service packet encapsulated with the first application-aware identifier.
  • the sending module 002 may also be made to the relevant descriptions of step 506 and step 507 in the above method embodiments.
  • the apparatus may further include:
  • the detection module 007 is configured to perform follow-up detection on the target service flow based on the follow-up detection information, and obtain a follow-up detection result.
  • the detection module 007 For the function implementation of the detection module 007, reference may be made to the relevant description of step 606 in the above method embodiment.
  • the sending module 002 may also be configured to send the follow-up detection result and the first application awareness identifier to the controller.
  • the sending module 002 may also be configured to send the follow-up detection result and the first application awareness identifier to the controller.
  • the function of the sending module 002 reference may also be made to the relevant description of step 607 in the above method embodiment.
  • the device may also include:
  • the receiving module 008 is configured to receive the sending strategy of the target service flow sent by the controller, where the sending strategy is used to instruct to report the follow-up detection result of the target service flow.
  • the sending strategy is used to instruct to report the follow-up detection result of the target service flow.
  • the sending module 002 may be configured to send the follow-up detection result and the first application awareness identifier to the controller based on the indication of the sending strategy.
  • the sending module 002 may be configured to send the follow-up detection result, the first application-aware identifier, and a corresponding follow-up detection flow identifier to the controller.
  • the sending module 002 may be configured to encapsulate the first application-aware identifier in the flow identification field or reserved field of the IFIT information of the service message; or, in the destination address field, HBH, The first application-aware identifier is encapsulated in the DOH or SRH.
  • the user requirements of the target service flow include one or more of the following requirements: a requirement for a specified forwarding path, a requirement for a specified network slice, and a requirement for a performance index of transmission performance.
  • the target application-aware identifier includes at least one of a user identifier and an application identifier.
  • the embodiment of the present application provides a packet forwarding device, which can generate a first application-aware identifier based on user requirements of a target service flow. Since the first application-aware identifier corresponds to the first network service and is used for encapsulation in the service packet of the target service flow, it can be ensured that the network device receiving the service packet can use the corresponding first network service to The service message is forwarded, thereby effectively improving the flexibility of service message forwarding.
  • FIG. 20 is a schematic structural diagram of a network device provided by an embodiment of the present application.
  • the network device can be applied to a communication network such as that shown in FIG. 1 or FIG. 7 .
  • the network device may be the network device 02a, 02c or 02d in FIG. 1 or FIG. 7 , or may be the network device 02b shown in FIG. 1 .
  • the network device can implement the steps in the embodiment shown in FIG. 4 above, or implement at least one of the second network device, the third network device, and the first network device in the embodiment shown in FIG. The steps performed by a network device.
  • the network equipment includes:
  • the receiving module 021 is configured to receive the first application-aware identifier sent by the controller, the first application-aware identifier is generated based on the user requirements of the service flow, and the first application-aware identifier corresponds to the first network service, and the first network service Satisfy the user needs of the business flow.
  • the receiving module 021 For the function implementation of the receiving module 021, reference may be made to the relevant description of step 503 in the above method embodiment.
  • the encapsulating module 027 is configured to encapsulate the target application-aware identifier in the service packet of the target service flow if the received target service flow is the service flow indicated by the first application-aware identifier, and the target application-aware identifier is the first application-aware identifier An application-aware identifier, or a second application-aware identifier that matches the first application-aware identifier.
  • the encapsulation module 027 For the function implementation of the encapsulation module 027, reference may be made to the relevant description of step 506 in the above method embodiment.
  • the sending module 022 is configured to forward the service message encapsulated with the target application-aware identifier.
  • the function of the sending module 022 reference may be made to the relevant description of step 507 in the above method embodiment.
  • the service packet of the target service flow received by the network device includes follow-up detection information, as shown in FIG. 20, the network device may also include:
  • the detection module 026 is configured to perform flow detection on the target service flow based on the flow detection information, and obtain a flow detection result; the function implementation of the detection module 026 can refer to the relevant description of step 606 in the above method embodiment.
  • the sending module 022 is further configured to send the follow-up detection result and the target application awareness identifier to the controller.
  • the function of the sending module 022 reference may be made to the relevant description of step 607 in the above method embodiment.
  • the sending module 022 may be configured to send the follow-up detection result, the target application awareness identifier, and the corresponding follow-up detection flow identifier to the controller.
  • the encapsulation module 027 may be used to encapsulate the target application awareness identifier in the flow identification field or reserved field of the IFIT information of the service message; or, in the destination address field, HBH, DOH Or encapsulate the target application-aware identifier in the SRH.
  • the receiving module 021 may be configured to receive the correspondence between the first application-aware identifier and the first network service sent by the controller; the function realization of the receiving module 021 may also refer to step 403, Related description of step 505 or step 603.
  • the sending module 022 may be configured to use the first network service to forward the service message encapsulated with the target application awareness identifier.
  • the sending module 022 reference may be made to the relevant descriptions of step 408, step 508 or step 605 in the above method embodiments.
  • the embodiment of the present application provides a network device that can receive the first application-aware identifier of the target service flow issued by the controller, and encapsulate the first application-aware identifier in the service packet of the target service flow.
  • An application-aware identifier Since the first application-aware identifier corresponds to the first network service, it can be ensured that the network device that receives the service message can use the corresponding first network service to forward the service message, thereby effectively improving the efficiency of service message forwarding. flexibility.
  • FIG. 21 is a schematic structural diagram of a network device provided by an embodiment of the present application.
  • the network device can be applied to a communication network such as that shown in FIG. 1 or FIG. 7 .
  • the network device may be the network device 02a, 02c or 02d in FIG. 1 or FIG. 7 , or may be the network device 02b shown in FIG. 1 .
  • the network device may implement the steps performed by at least one network device among the second network device, the third network device, and the first network device in the above embodiments shown in FIG. 5 , FIG. 6 , FIG. 10 or FIG. 11 .
  • the network equipment includes:
  • the detection module 026 is configured to perform follow-up detection on the target service flow to which the service message belongs based on the follow-up detection information in the service message, and obtain a follow-up detection result.
  • the detection module 026 reference may be made to the relevant descriptions of step 301 and step 606 in the above method embodiments.
  • the sending module 022 is configured to send the follow-up detection result and the target application-aware identifier of the target service flow to the controller in the network, the target application-aware identifier is generated based on user requirements of the target service flow, the follow-up detection result and the target application-aware identifier of the target service flow
  • the target application awareness identification is used for the controller to analyze the transmission performance of the target service flow.
  • the target application-aware identifier is encapsulated in the service message, and the target application-aware identifier is used to indicate the user and/or application to which the target service flow belongs.
  • the flow detection information is IFIT information
  • the target application awareness identifier is encapsulated in the flow identification field or reserved field of the IFIT information.
  • the network device may also include:
  • the receiving module 021 is configured to receive the correspondence between the first application-aware identifier and the first network service sent by the controller, wherein the first application-aware identifier is generated by the controller based on user requirements of service flows.
  • the receiving module 021 reference may be made to the relevant descriptions of step 403, step 505 or step 603 in the above method embodiments.
  • the sending module 022 is further configured to use the first network service to forward the service packets of the target service flow according to the corresponding relationship if the target service flow is the service flow indicated by the first application-aware identifier.
  • the sending module 022 reference may be made to the relevant descriptions of step 408, step 508 or step 605 in the above method embodiments.
  • the receiving module 021 may also be configured to receive the identification generation rule sent by the controller.
  • the receiving module 021 reference may also be made to the relevant description of step 404 in the above method embodiment.
  • a generating module 025 configured to generate a second application-aware identifier of the target service flow based on the identifier generation rule; wherein, the target application-aware identifier is the second application-aware identifier or the first application-aware identifier of the target service flow sent by the controller. App-aware identification.
  • the generating module 025 For the function implementation of the generating module 025, reference may be made to the relevant description of step 405 in the above method embodiment.
  • the flow detection information is IFIT information; as shown in Figure 22, the network device may also include:
  • An encapsulation module 027 configured to encapsulate the target application-aware identifier in the flow identifier field or reserved field of the IFIT information.
  • the encapsulation module 027 For the function implementation of the encapsulation module 027, reference may be made to the relevant description of step 506 in the above method embodiment.
  • the sending module 022 may also be configured to forward the service message encapsulated with the target application-aware identifier.
  • the sending module 022 reference may also be made to the relevant description of step 507 in the above method embodiment.
  • the receiving module 021 may also be configured to receive the sending policy of the target service flow sent by the controller, where the sending policy is used to indicate to report the result of the follow-up detection of the target service flow; the receiving module 021
  • the implementation of the function can also refer to the relevant description of step 604 in the above method embodiment.
  • the sending module 022 is configured to send the follow-up detection result and the target application awareness identifier of the target service flow to the controller based on the indication of the sending strategy.
  • the sending module 022 may be configured to send the follow-up detection result, the target application-aware identifier of the target service flow, and the corresponding flow identifier of the follow-up detection to the controller in the network.
  • the target application-aware identifier includes at least one of a user identifier and an application identifier.
  • the embodiment of the present application provides a network device, which can also report the target application awareness identifier of the target service flow when reporting the follow-up detection result of the target service flow to the controller.
  • the controller can then detect and analyze the transmission performance of the service flow at the granularity indicated by at least one of the target application-aware identifiers, thereby effectively improving the flexibility of detecting and analyzing the transmission performance of the service flow.
  • Fig. 23 is a schematic structural diagram of another controller provided by the embodiment of the present application. This controller can be applied to the communication network shown in Fig. 1 or Fig. 7, and can realize the above-mentioned Fig. 5, Fig. 6, Fig. 10 or The steps performed by the controller in the embodiment shown in FIG. 11 .
  • the controller includes:
  • the receiving module 014 is configured to receive the follow-up detection result and the target application perception identifier sent by the first network device, the follow-up detection result is obtained by the first network device performing follow-up detection on the target service flow, and the target application perception The identification is generated based on the user requirements of the target business flow.
  • the receiving module 014 For the function implementation of the receiving module 014, reference may be made to the relevant description of step 607 in the above method embodiment.
  • the analysis module 015 is configured to analyze the transmission performance of the target service flow based on the flow-by-flow detection result and the target application perception identification.
  • the analysis module 015 reference may be made to the relevant description of step 608 in the above method embodiment.
  • the target application-aware identifier includes at least one of a user identifier and an application identifier.
  • the controller may further include:
  • the display module 016 is configured to display the performance index of the target service flow according to the target granularity, and the performance index is used to indicate the transmission performance of the target service flow; wherein, the target granularity is the granularity indicated by at least one identifier in the target application perception identifier.
  • the display module 016 For the function implementation of the display module 016, reference may be made to the relevant description of step 609 in the above method embodiment.
  • controller may also include:
  • the sending module 012 is configured to send the upload strategy of the target service flow to the first network device before the receiving module 014 receives the follow-up detection result and the target application perception identifier sent by the first network device, and the upload strategy uses Instructing to report the follow-up detection result of the target service flow.
  • the function of the sending module 012 reference may also be made to the relevant description of step 604 in the above method embodiment.
  • the receiving module 011 may be configured to receive the flow detection result sent by the first network device, the target application perception identifier and the corresponding flow detection flow identifier; correspondingly, the analysis module 012 may be used to Determining at least one data flow included in the target service flow based on the corresponding relationship between the target application-aware identifier and the flow identifier detected with the flow; analyzing the transmission performance of at least one data flow included in the target service flow based on the flow-based detection result .
  • the controller may also include:
  • the generating module 011 is configured to obtain a correspondence between a first application-aware identifier of the target service flow and a first network service required for transmitting the target service flow based on user requirements of the target service flow.
  • a first application-aware identifier of the target service flow and a first network service required for transmitting the target service flow based on user requirements of the target service flow.
  • the sending module 012 is further configured to send the corresponding relationship to the second network device, and the corresponding relationship is used for the second network device to determine the first service packet for forwarding the target service flow based on the first application-aware identifier.
  • a network service wherein, the target application-aware identifier is the first application-aware identifier or the second application-aware identifier of the target service flow generated by the network device.
  • the generation module 011 is further configured to determine that the network service required to transmit the target service flow is For the second network service; the function implementation of the generation module 011 can refer to the relevant description of step 610 in the above method embodiment.
  • the sending module 012 is further configured to send the correspondence between the first application awareness identifier and the second network service to the second network device.
  • the function of the sending module 012 reference may also be made to the relevant description of step 611 in the above method embodiment.
  • the sending module 012 is further configured to send the first application-aware identifier of the target service flow to a third network device.
  • the sending module 012 reference may also be made to the relevant description of step 503 in the above method embodiment.
  • controller may also include:
  • An acquisition module 013 configured to acquire user requirements of the target service flow through a northbound interface.
  • the acquisition module 013 reference may be made to the relevant descriptions of step 401, step 501 or step 601 in the above method embodiments.
  • the embodiment of the present application provides a controller, which can receive the target application of the target service flow reported by the network device when receiving the follow-up detection result of the target service flow reported by the network device. Perceptual identity. Therefore, the controller can detect and analyze the transmission performance of the service flow at the granularity indicated by at least one of the target application-aware identifiers, thereby effectively improving the flexibility of detecting and analyzing the transmission performance of the service flow.
  • controller, network equipment and message forwarding device can all be realized by an application-specific integrated circuit (ASIC), or a programmable logic device (programmable logic device, PLD)
  • PLD programmable logic device
  • the above-mentioned PLD can be a complex programmable logic device (complex programmable logical device, CPLD), a field-programmable gate array (field-programmable gate array, FPGA), a general array logic (generic array logic, GAL) or any combination thereof.
  • the packet forwarding method provided by the foregoing method embodiment may also be realized by software.
  • each module in the foregoing controller and network device may also be a software module.
  • FIG. 24 is a schematic structural diagram of another packet forwarding device provided by an embodiment of the present application.
  • the message forwarding device can be applied to a controller or a network device in the communication network shown in FIG. 1 or FIG. 7 .
  • the packet forwarding device may include: a processor 701 , a memory 702 , a network interface 703 and a bus 704 .
  • the bus 704 is used to connect the processor 701 , the memory 702 and the network interface 703 .
  • the communication connection with other devices can be realized through the network interface 703 (which may be wired or wireless).
  • a computer program 7021 is stored in the memory 702, and the computer program 7021 is used to realize various application functions.
  • programs corresponding to these software modules may be stored in the memory 702 of the network device.
  • the processor 701 may be a CPU, and the processor 701 may also be other general-purpose processors, digital signal processors (DSPs), application specific integrated circuits (ASICs), field programmable gate arrays ( FPGA), GPU or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc.
  • DSPs digital signal processors
  • ASICs application specific integrated circuits
  • FPGA field programmable gate arrays
  • GPU GPU or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc.
  • a general purpose processor may be a microprocessor or any conventional processor or the like.
  • Memory 702 can be volatile memory or nonvolatile memory, or can include both volatile and nonvolatile memory.
  • the non-volatile memory can be read-only memory (read-only memory, ROM), programmable read-only memory (programmable ROM, PROM), erasable programmable read-only memory (erasable PROM, EPROM), electrically programmable Erases programmable read-only memory (electrically EPROM, EEPROM) or flash memory.
  • Volatile memory can be random access memory (RAM), which acts as external cache memory.
  • RAM random access memory
  • SRAM static random access memory
  • DRAM dynamic random access memory
  • SDRAM synchronous dynamic random access memory
  • Double data rate synchronous dynamic random access memory double data rate SDRAM, DDR SDRAM
  • enhanced SDRAM enhanced synchronous dynamic random access memory
  • SLDRAM synchronous connection dynamic random access memory
  • direct rambus RAM direct rambus RAM
  • bus 704 may also include a power bus, a control bus, a status signal bus, and the like. However, for clarity of illustration, the various buses are labeled as bus 704 in the figure.
  • the processor 701 may be configured to obtain the correspondence between the first application-aware identifier of the target service flow and the first network service required to transmit the target service flow based on the user requirements of the target service flow, and send the request to the second
  • the second network device sends the corresponding relationship, and the corresponding relationship is used for the second network device to determine the first network service for forwarding the service packet of the target service flow based on the first application-aware identifier.
  • the processor 701 may be configured to obtain the correspondence between the first application-aware identifier of the target service flow and the first network service required to transmit the target service flow based on the user requirements of the target service flow, and send the request to the second
  • the second network device sends the corresponding relationship, and the corresponding relationship is used for the second network device to determine the first network service for forwarding the service packet of the target service flow based on the first application-aware identifier.
  • the processor 701 may be configured to obtain the correspondence between the first application-aware identifier of the target service flow
  • the processor 701 may be configured to receive the correspondence between the first application-aware identifier and the first network service sent by the controller in the network, and if the received target service flow is indicated by the first application-aware identifier For the service flow, according to the corresponding relationship, the first network service is used to forward the service packet of the target service flow; wherein, the first application awareness identifier is generated by the controller based on user requirements of the service flow.
  • the processor 701 For the detailed processing process of the processor 701, reference may be made to the foregoing method embodiments. For example, you can refer to the detailed description of step 103 in the embodiment shown in FIG. 2, or you can refer to the detailed description of step 405 to step 408 in the embodiment shown in FIG. For the detailed description of 508, or refer to the detailed description of step 606 to step 607 in the embodiment shown in FIG. 11 , details are not repeated here.
  • the processor 701 may be configured to generate a first application-aware identifier of the target service flow based on user requirements of the target service flow, and send the first application-aware identifier; wherein, the first application-aware identifier is used for The target application-aware identifier of the target service flow is encapsulated by the network device in the service packet of the target service flow, and the target application-aware identifier is the first application-aware identifier, or the second application-aware identifier of the target service flow generated by the network device An identifier; the first application-aware identifier corresponds to a first network service, and the first application-aware identifier is used for a network device to use the first network service to forward the service packet of the target service flow, and the first network service satisfies the User requirements for the target business flow.
  • step 201 and step 202 in the embodiment shown in FIG. 2 may refer to the steps executed by the controller or any network device in the embodiment shown in FIG. 6, FIG. 10 or FIG. Let me repeat.
  • the processor 701 may be configured to receive a first application-aware identifier sent by the controller, where the first application-aware identifier is generated based on a user requirement of a service flow, and the first application-aware identifier corresponds to a first network service, The first network service meets the user requirements of the service flow; if the received target service flow is the service flow indicated by the first application-aware identifier, encapsulating the target application-aware identifier in the service packet of the target service flow, and Forwarding the service packet encapsulated with the target application-aware identifier, where the target application-aware identifier is the first application-aware identifier, or a second application-aware identifier matching the first application-aware identifier.
  • the processor 701 can be configured to perform follow-up detection on the target service flow to which the service message belongs based on the follow-up detection information in the service message, obtain the follow-up detection result, and send the follow-up detection result to the controller in the network Sending the detection result with the flow and the target application awareness identification of the target service flow; wherein the target application awareness identification is generated based on the user requirements of the target service flow, and the flow detection result and the target application awareness identification are used for the controller Analyze the transmission performance of the target traffic flow.
  • steps 506 to 508 or refer to the detailed descriptions of steps 606 to 607 in the embodiment shown in FIG. 11 , details are not repeated here.
  • the processor 701 may be configured to receive the follow-up detection result and the target application awareness identifier sent by the first network device, the follow-up detection result is obtained by the first network device performing follow-up detection on the target service flow , the target application-aware identifier is generated based on user requirements of the target service flow; based on the flow-with-flow detection result and the target application-aware identifier, the transmission performance of the target service flow is analyzed.
  • the processor 701 For the detailed processing process of the processor 701, reference may be made to the foregoing method embodiments. For example, you can refer to the detailed description of step 303 in the embodiment shown in FIG. 5, or you can refer to the detailed description of step 401 to step 404 in the embodiment shown in FIG. For the detailed description of 505, you may refer to the detailed descriptions of steps 601 to 604 and steps 608 to 611 in the embodiment shown in FIG. 11 , which will not be repeated here.
  • FIG. 25 is a schematic structural diagram of another network device provided by an embodiment of the present application.
  • the network device can be applied to a communication network such as that shown in FIG. 1 or FIG. 7 .
  • the network device may be the network device 02a, 02c or 02d in FIG. 1 or FIG. 7 , or may be the network device 02b shown in FIG. 1 .
  • the network device may include: a main control board 801 and at least one interface board (an interface board is also called a line card or a service board), for example, an interface board 802 and an interface board 803 are shown in FIG. 25 .
  • a switching fabric board 804 may be included, and the switching fabric board 804 is used to complete data exchange between the interface boards.
  • the main control board 801 is used to complete functions such as system management, equipment maintenance, and protocol processing.
  • the interface boards 802 and 603 are used to provide various service interfaces (for example, POS interface, GE interface, ATM interface, etc.), and implement packet forwarding.
  • the main control board 801, the interface board 802, and the interface board 803 are connected to the system backplane through a system bus to realize intercommunication.
  • the interface board 802 includes one or more CPUs 8021 .
  • the central processing unit 8021 is used for controlling and managing the interface board 802, communicating with the central processing unit 8011 on the main control board 801, and forwarding and processing messages.
  • the forwarding entry storage 8024 on the interface board 802 is used to store forwarding entries, and the central processing unit 8021 can forward packets by looking up the forwarding entries stored in the forwarding entry storage 8024 .
  • the interface board 802 includes one or more physical interface cards 6023 for receiving the message sent by the previous hop node, and sending the processed message to the next hop node according to the instructions of the central processing unit 8021 .
  • the specific implementation process will not be described one by one here.
  • the specific functions of the central processing unit 8021 are also not repeated here one by one.
  • the receiving module 021 and the sending module 022 in the network device can be located in the interface board 802, and the obtaining module 023, the determining module 024, the generating module 025, the detecting module 026 and the packaging module 027 can be located in the main control board 801 middle.
  • FIG. 25 multiple interface boards are included in this embodiment, and a distributed forwarding mechanism is adopted.
  • the structure of the interface board 803 is basically the same as that of the interface board 802, and the interface board 803
  • the operations on the interface board 802 are basically similar to those of the interface board 802, and will not be repeated for brevity.
  • the central processing unit 8021 and/or network processor 8022 in the interface board 802 in FIG. For the so-called forwarding plane, special hardware or chip processing is adopted.
  • the central processing unit 8021 and/or the network processor 8022 may also use a general-purpose processor, such as a general-purpose CPU, to implement the functions described above.
  • main control boards 801 there may be one or more main control boards 801, and when there are multiple main control boards, it may include an active main control board and a standby main control board.
  • interface boards There may be one or more interface boards. The stronger the data processing capability of the device, the more interface boards it provides.
  • the multiple interface boards can communicate through one or more switching fabric boards, and when there are multiple interface boards, they can jointly implement load sharing and redundant backup.
  • the device does not need a switching network board, and the interface board undertakes the processing function of the service data of the entire system.
  • the device includes multiple interface boards, which can realize data exchange between multiple interface boards through the switching network board, and provide large-capacity data exchange and processing capabilities. Therefore, the data access and processing capabilities of network devices with a distributed architecture are greater than those with a centralized architecture. Which architecture to use depends on the specific networking deployment scenario, and there is no limitation here.
  • the memory 8012 and the memory 8024 can be read-only memory (read-only memory, ROM) or other types of static storage devices that can store static information and instructions, random access memory (random access memory, RAM) Or other types of dynamic storage devices that can store information and instructions can also be electrically erasable programmable read-only memory (EEPROM), compact disc read-only memory (CD- ROM) or other optical disc storage, optical disc storage (including compact discs, laser discs, optical discs, digital versatile discs, Blu-ray discs, etc.), magnetic discs or other magnetic storage devices, or can be used to carry or store desired program code and any other medium that can be accessed by a computer, but is not limited thereto.
  • ROM read-only memory
  • RAM random access memory
  • EEPROM electrically erasable programmable read-only memory
  • CD- ROM compact disc read-only memory
  • optical disc storage including compact discs, laser discs, optical discs, digital versatile discs, Blu-ray discs, etc.
  • the memory 8024 in the interface board 802 may exist independently and be connected to the central processing unit 8021 through a communication bus; or, the memory 8024 may also be integrated with the central processing unit 8021 .
  • the memory 8012 in the main control board 801 may exist independently and be connected to the central processing unit 8011 through a communication bus; or, the memory 8012 may also be integrated with the central processing unit 8011 .
  • the memory 8024 is used to store program codes, which are executed under the control of the CPU 8021
  • the memory 8012 is used to store program codes, which are executed under the control of the CPU 8011 .
  • the central processing unit 8021 and/or the central processing unit 8011 may implement the method for forwarding packets using network devices provided in the foregoing embodiments by executing program codes.
  • the program code stored in the memory 8024 and/or the memory 8012 may include one or more software modules.
  • the one or more software modules may be the functional modules provided in the above-mentioned embodiments shown in any one of Fig. 15 to Fig. 17 and Fig. 19 to Fig. 22 .
  • the physical interface card 6023 may use any device such as a transceiver for communicating with other devices or communication networks, such as Ethernet, radio access network (radio access network, RAN), wireless local area network (wireless local area networks, WLAN), etc.
  • a transceiver for communicating with other devices or communication networks, such as Ethernet, radio access network (radio access network, RAN), wireless local area network (wireless local area networks, WLAN), etc.
  • the embodiment of the present application also provides a computer-readable storage medium, where instructions are stored in the computer-readable storage medium, and the instruction is executed by a processor to implement the method performed by the controller or the network device provided in the above method embodiments.
  • the embodiment of the present application also provides a computer program product containing instructions, and when the computer program product is run on a computer, it causes the computer to execute the method performed by the controller or the network device provided in the above method embodiments.
  • the embodiment of the present application also provides a communication network.
  • the communication network includes: a controller 01 and at least one network device.
  • FIG. 1 shows five network devices from network device 02a to network device 02e
  • FIG. 7 shows network device 02a and four network devices from network device 02c to 02e.
  • controller 01 may implement the steps performed by the controller in the above method embodiments
  • the network device may implement the steps performed by any network device in the above method embodiments.
  • the controller 01 may be the controller shown in FIG. 13 , FIG. 14 , FIG. 23 or FIG. 24 , or may include the message forwarding device shown in FIG. 17 or FIG. 18 .
  • the at least one network device may include the network device shown in any one of Fig. 15, Fig. 16, Fig. 20 to Fig. 22, and Fig. 24, or may include the packet forwarding apparatus shown in Fig. 17 or Fig. 19 .
  • the communication network may be APN.
  • the embodiment of the present application also provides a chip, which can be used to implement the method performed by the controller or the network device provided in the above method embodiment.
  • the above-mentioned embodiments may be implemented in whole or in part by software, hardware, firmware or other arbitrary combinations.
  • the above-described embodiments may be implemented in whole or in part in the form of computer program products.
  • the computer program product includes one or more computer instructions. When the computer program instructions are loaded or executed on the computer, the processes or functions according to the embodiments of the present application will be generated in whole or in part.
  • the computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable devices.
  • the computer instructions may be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted from a website, computer, server or data center Transmission to another website site, computer, server, or data center by wired (eg, coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (eg, infrared, wireless, microwave, etc.).
  • the computer-readable storage medium may be any available medium that can be accessed by a computer, or a data storage device such as a server or a data center that includes one or more sets of available media.
  • the available media may be magnetic media (eg, floppy disk, hard disk, magnetic tape), optical media (eg, DVD), or semiconductor media.
  • the semiconductor medium may be a solid state drive (SSD).

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

La présente demande se rapporte au domaine technique des communications. Sont divulgués dans la présente demande un procédé et un appareil de test de performance de flux de service, et un réseau de communication. Dans les solutions divulguées dans la présente demande, lorsqu'un dispositif de réseau rapporte un résultat de test de flux in situ d'un flux de service cible à un contrôleur, une identification de perception d'application cible du flux de service cible peut être rapportée en même temps. Le contrôleur peut ensuite tester et analyser la performance de transmission d'un flux de service selon la granularité indiquée par au moins une identification dans l'identification de perception d'application cible, ce qui permet d'améliorer efficacement la flexibilité lorsque la performance de transmission du flux de service est testée et analysée.
PCT/CN2022/096039 2021-06-04 2022-05-30 Procédé et appareil de test de performance de flux de service, et réseau de communication WO2022253190A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110625887.3 2021-06-04
CN202110625887.3A CN115442299A (zh) 2021-06-04 2021-06-04 业务流的性能检测方法、装置及通信网络

Publications (1)

Publication Number Publication Date
WO2022253190A1 true WO2022253190A1 (fr) 2022-12-08

Family

ID=84271622

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/096039 WO2022253190A1 (fr) 2021-06-04 2022-05-30 Procédé et appareil de test de performance de flux de service, et réseau de communication

Country Status (2)

Country Link
CN (1) CN115442299A (fr)
WO (1) WO2022253190A1 (fr)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160173390A1 (en) * 2013-07-31 2016-06-16 Telefonaktiebolaget L M Ericsson (Publ) Confidence degree of data packet flow classification
CN110971445A (zh) * 2019-09-24 2020-04-07 华为技术有限公司 一种网络的oam方法及装置
CN111953553A (zh) * 2019-05-16 2020-11-17 华为技术有限公司 一种报文的检测方法、设备及系统
CN112398557A (zh) * 2019-08-16 2021-02-23 华为技术有限公司 时延统计方法、装置、存储介质及系统

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160173390A1 (en) * 2013-07-31 2016-06-16 Telefonaktiebolaget L M Ericsson (Publ) Confidence degree of data packet flow classification
CN111953553A (zh) * 2019-05-16 2020-11-17 华为技术有限公司 一种报文的检测方法、设备及系统
CN112398557A (zh) * 2019-08-16 2021-02-23 华为技术有限公司 时延统计方法、装置、存储介质及系统
CN110971445A (zh) * 2019-09-24 2020-04-07 华为技术有限公司 一种网络的oam方法及装置

Also Published As

Publication number Publication date
CN115442299A (zh) 2022-12-06

Similar Documents

Publication Publication Date Title
US10148492B2 (en) Data center bridging network configuration and management
US20220217070A1 (en) Network OAM Method and Apparatus
CN108243106A (zh) 控制网络切片的方法、转发设备、控制设备和通信系统
US20220217051A1 (en) Method, Device, and System for Determining Required Bandwidth for Data Stream Transmission
US9197516B2 (en) In-service throughput testing in distributed router/switch architectures
US20110176551A1 (en) Information Handling System Data Center Bridging Features with Defined Application Environments
CN109714238A (zh) 一种用于实现虚拟机间通信的方法及设备
US20150036510A1 (en) Method and device for measuring ethernet performance
US20170310581A1 (en) Communication Network, Communication Network Management Method, and Management System
US20220263765A1 (en) Service Traffic Adjustment Method and Apparatus
WO2018223825A1 (fr) Procédé et dispositif de traitement de flux de données
WO2022233297A1 (fr) Réseau en nuage, système de mesure pour réseau en nuage, et procédé, dispositif et support de stockage
US20160248652A1 (en) System and method for classifying and managing applications over compressed or encrypted traffic
US20230006884A1 (en) Providing Interface Between Network Management and Slice Management
US20230318970A1 (en) Packet Processing Method and Apparatus
WO2022253190A1 (fr) Procédé et appareil de test de performance de flux de service, et réseau de communication
WO2022253194A1 (fr) Procédé et appareil de renvoi de paquet, et réseau de communication
WO2022253192A1 (fr) Procédé et appareil de transfert de message, et réseau de communication
CN115842757A (zh) 随流检测方法、装置、设备、系统及存储介质
CN109995606B (zh) 虚拟化深度包检测vDPI流量控制方法及网元设备
WO2020155941A1 (fr) Procédé d'ordonnancement des messages, dispositif associé et support de stockage informatique
WO2022166582A1 (fr) Procédé de gestion de réseau, appareil, dispositif, et support de stockage lisible par ordinateur
CN113938534B (zh) 协同方法及装置
WO2022001581A1 (fr) Réseau, et procédé et appareil de transmission de données
WO2023174287A1 (fr) Procédé et appareil d'analyse de retard temporel

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22815235

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE