WO2022253192A1 - 报文转发方法、装置及通信网络 - Google Patents

报文转发方法、装置及通信网络 Download PDF

Info

Publication number
WO2022253192A1
WO2022253192A1 PCT/CN2022/096044 CN2022096044W WO2022253192A1 WO 2022253192 A1 WO2022253192 A1 WO 2022253192A1 CN 2022096044 W CN2022096044 W CN 2022096044W WO 2022253192 A1 WO2022253192 A1 WO 2022253192A1
Authority
WO
WIPO (PCT)
Prior art keywords
application
identifier
target
service flow
flow
Prior art date
Application number
PCT/CN2022/096044
Other languages
English (en)
French (fr)
Inventor
彭书萍
杨宏杰
周天然
吴鹏
李振斌
周宇
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2022253192A1 publication Critical patent/WO2022253192A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/302Route determination based on requested QoS
    • H04L45/306Route determination based on the nature of the carried application
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/50Circuit switching systems, i.e. systems in which the path is physically permanent during the communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/30Routing of multiclass traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/34Source routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/24Traffic characterised by specific attributes, e.g. priority or QoS
    • H04L47/2475Traffic characterised by specific attributes, e.g. priority or QoS for supporting traffic characterised by the type of applications

Definitions

  • the present application relates to the technical field of communication, and in particular to a message forwarding method, device and communication network.
  • an application installed in a user terminal can generate application awareness information, and encapsulate the application awareness information in a service message.
  • API application aware networking
  • a network device in the APN After a network device in the APN receives a service message carrying application-aware information, it can forward the service message in a forwarding manner that can guarantee requirements according to the application-aware information.
  • the forwarding mode of the service message is relatively simple.
  • the present application provides a message forwarding method, device and communication network, which can solve the technical problem of relatively single forwarding mode of service messages.
  • a packet forwarding method which is applied to a controller in the network, and the method includes: obtaining a first application-aware identifier of the target service flow based on user requirements of the target service flow and transmitting the target service flow The corresponding relationship of the required first network service, and send the corresponding relationship to the second network device, and the corresponding relationship is used for the second network device to determine the service report for forwarding the target service flow based on the first application-aware identifier
  • the first network service of the message that is, the second network device can use the first network service to forward the service message of the target service flow.
  • the controller can establish and deliver the corresponding relationship between the application-aware identifier of the service flow and the network service
  • the network device can directly forward the service packet of the service flow based on the corresponding relationship, and provide specific applications that can satisfy the user requirements corresponding to the application. Therefore, the flexibility of service packet forwarding is effectively improved.
  • the correspondence includes an identifier of the first network service
  • the identifier of the first network service may include: a binding segment identification (binding segment identification, BSID) and/or an identification of a network slice.
  • the BSID may be the BSID of the forwarding path, or may be the BSID of the segment routing (segment routing, SR) policy to which the forwarding path belongs.
  • the first application-aware identifier may include at least one of a user identifier and an application identifier.
  • the user identifier is used to indicate the user to which the target service flow belongs
  • the application identifier is used to indicate the application to which the target service flow belongs.
  • the first application-aware identifier may further include at least one of a flow identifier, a service level agreement (service level agreement, SLA) level, and a service requirement.
  • a service level agreement service level agreement
  • SLA service level agreement
  • the service requirement may be a requirement on performance indicators such as delay and packet loss rate
  • the flow identifier in the first application-aware identifier is also called a session identifier (session ID).
  • the method may further include: sending the first application-aware identifier of the target service flow to the first network device, where the first application-aware identifier is used by the first network device if it determines that the received service flow is the If the target service flow is used, the application-aware identifier of the target service flow is encapsulated in the service packet of the target service flow.
  • the second network device may be an application-aware edge device in the APN.
  • the application-aware edge device After the application-aware edge device encapsulates the application-aware identifier of the target service flow in the service packet of the target service flow, it can facilitate the downstream network device to determine the network service for forwarding the target service flow based on the application-aware identifier, or can When reporting the follow-up detection result of the target service flow, the application awareness identifier of the target service flow is also reported.
  • the method may further include: sending an identifier generation rule to the first network device, so that the first network device generates a second application-aware identifier of the target service flow based on the identifier generation rule, and the second application-aware The identifier is used to match with the first application-aware identifier to determine that the received service flow is the target service flow.
  • the first network device may obtain feature information (such as quintuple or traffic feature information) of the service flow it receives, and process the feature information by using an ID generation rule issued by the controller to generate a second application-aware ID. In this way, it can be ensured that it exactly matches with the first application-aware identifier issued by the controller, that is, the reliability of identifying the target service flow by the first network device is ensured.
  • feature information such as quintuple or traffic feature information
  • the method may further include: obtaining user requirements of the target service flow through a northbound interface.
  • the controller can obtain the user requirements of the target service flow sent by the service opening system through its northbound interface.
  • the method may further include: receiving a flow-based detection result and a target application-aware identifier sent by a third network device, the target application-aware identifier is an application-aware identifier of the service flow to which the flow-based detection result belongs, and the target application
  • the perception identification is the first application awareness identification, or the second application awareness identification of the target service flow generated by the network device; based on the follow-up detection result and the target application awareness identification, the transmission performance of the target service flow is analyzed.
  • the third network device may be a node in the follow-up detection path of the target service flow.
  • the target application-aware identifier may include one or more identifiers, and the controller can analyze the transmission performance of the service flow at the granularity indicated by at least one of the identifiers, thereby effectively improving the flexibility of detecting and analyzing the transmission performance of the service flow .
  • the method may further include: displaying the performance indicator of the target service flow according to the target granularity, where the performance indicator is used to indicate the transmission performance of the target service flow; wherein the target granularity is at least one of the target application-aware identifiers Identifies the granularity of the indication.
  • the controller displays the performance index according to the granularity indicated by at least one identifier, so not only can the refined display of the performance index be realized, but also the flexible and adjustable display granularity can be realized.
  • the method may further include: determining that the first network service does not meet user requirements of the target service flow based on the transmission performance of the target service flow, and determining that the network service required to transmit the target service flow is the second network service , and send the correspondence between the first application-aware identifier and the second network service to the second network device.
  • the controller can update the network service required for transmitting the target service flow in time, thereby ensuring that the updated network service can meet the transmission performance of the target service flow, thereby ensuring that the target service flow Reliable delivery of streams.
  • the method may further include: sending the upstream of the target service flow to the second network device and/or the third network device Sending policy, where the sending policy is used to instruct to report the follow-up detection result of the target service flow.
  • the controller can make the network device only report the follow-up detection results of key service flows through sending and uploading policies. This not only realizes flexible and adjustable reporting granularity of follow-up detection results, but also effectively reduces the data processing of the controller. pressure.
  • the process of receiving the flow detection result and the target application awareness identifier sent by the third network device may include: receiving the flow detection result, the target application awareness identifier and the corresponding flow detection flow sent by the third network device Identification, the flow identification detected with the flow is also called the monitoring flow identification, which can be used to indicate a monitored data flow in the target service flow;
  • the process of analyzing the transmission performance of the target service flow based on the flow detection result and the target application perception identifier may include: determining the target at least one data flow included in the service flow; analyzing the transmission performance of at least one data flow included in the target service flow based on the follow-up detection result.
  • the controller can determine at least one monitored data flow included in the target service flow based on the corresponding relationship between the target application-aware identifier and the flow identifier detected along with the flow, and then analyze the target service flow based on the transmission performance of the at least one data flow transmission performance.
  • the user requirements of the target service flow include one or more of the following requirements: a requirement for a specified forwarding path, a requirement for a specified network slice, and a requirement for a performance index of transmission performance.
  • a packet forwarding method is provided, which is applied to a network device.
  • the method includes: receiving the corresponding relationship between the first application-aware identifier and the first network service sent by the controller in the network, and if the received target service If the flow is the service flow indicated by the first application-aware identifier, then according to the corresponding relationship, the first network service is used to forward the service packet of the target service flow, wherein the first application-aware identifier is determined by the controller based on the service flow Generation of user requirements.
  • the method further includes: obtaining a second application-aware identifier of the target service flow from a service packet of the target service flow; if the second application-aware identifier matches the first application-aware identifier, determining the target The service flow is the service flow indicated by the first application awareness identifier.
  • the service message received by the network device includes in-situ flow information telemetry (IFIT) information, and the flow identification field or reserved field of the IFIT information is encapsulated with the second application Perceptual identity;
  • IFIT in-situ flow information telemetry
  • the second application-aware identifier is encapsulated in a segment routing header (SRH).
  • the second application-aware identifier is encapsulated in the bound segment identifier field of the SRH field.
  • the method further includes: receiving an identifier generation rule sent by the controller; generating a second application-aware identifier of the target service flow based on the identifier generation rule; if the second application-aware identifier is identical to the first application-aware identifier match, it is determined that the target service flow is the service flow indicated by the first application awareness identifier.
  • the service packet received by the network device includes IFIT information; the process of using the first network service to forward the service packet of the target service flow may include: encapsulating the IFIT information in the flow identification field or reserved field The target application-aware identifier; using the first network service to forward the service message encapsulated with the target application-aware identifier.
  • the network device can also encapsulate the application-aware identifier of the service flow in the IFIT information, which improves the flexibility when encapsulating the application-aware identifier.
  • the method may further include: performing follow-up detection on the target service flow based on the follow-up detection information, to obtain follow-up detection information Result: sending the follow-up detection result and the target application-aware ID to the controller, where the target application-aware ID is the first application-aware ID or the second application-aware ID of the target service flow acquired by the network device.
  • the method may further include: receiving the sending strategy of the target service flow sent by the controller, where the sending strategy is used to indicate the reporting of the follow-up detection result of the target service flow; correspondingly, sending the follow-up flow detection result to the controller
  • the process of the detection result and the target application awareness identification may include: sending the flow detection result and the target application awareness identification to the controller based on the indication of the sending policy.
  • the process of sending the flow detection result and the target application perception identifier to the controller may include: sending the flow detection result, the target application perception identifier, and the corresponding flow detection flow identifier to the controller.
  • the flow identification detected along with the flow may be used to indicate a monitored data flow in the target service flow.
  • the controller can know the corresponding relationship between the target application-aware identifier and the flow identifier detected along with the flow, thereby facilitating the controller to analyze the transmission performance of at least one data flow included in the target service flow.
  • a controller in a third aspect, includes:
  • a generating module configured to obtain the correspondence between the first application-aware identifier of the target service flow and the first network service required to transmit the target service flow based on the user requirements of the target service flow;
  • a sending module configured to send the corresponding relationship to a second network device, where the corresponding relationship is used by the second network device to determine the first network for forwarding the service packet of the target service flow based on the first application-aware identifier Serve.
  • the correspondence includes an identifier of the first network service, and the identifier of the first network service includes: a binding segment identifier and/or an identifier of a network slice.
  • the first application-aware identifier includes at least one of a user identifier and an application identifier.
  • the first application-aware identifier further includes at least one of a flow identifier, an SLA level, and a service requirement.
  • the sending module is further configured to send an identifier generation rule to the second network device, so that the second network device generates a second application-aware identifier of the target service flow based on the identifier generation rule, and the second application The perception identifier is used to match the first application perception identifier to determine the first network service.
  • the sending module is further configured to send the first application-aware identifier of the target service flow to the first network device, and the first application-aware identifier is used by the first network device if it determines that the received service flow is For the target service flow, the application-aware identifier of the target service flow is encapsulated in the service packet of the target service flow.
  • the controller may further include: an obtaining module, configured to obtain user requirements of the target service flow through a northbound interface.
  • the controller may also include:
  • the receiving module is configured to receive the flow detection result sent by the third network device and the target application awareness identification, the target application awareness identification is the application awareness identification of the service flow to which the flow detection result belongs, and the target application awareness identification is the first An application-aware identifier or a second application-aware identifier generated by the network device for the target service flow;
  • An analysis module configured to analyze the transmission performance of the target service flow based on the flow-by-flow detection result and the target application perception identification.
  • the controller may also include:
  • the display module is configured to display the performance index of the target service flow according to the target granularity, and the performance index is used to indicate the transmission performance of the target service flow; wherein, the target granularity is the granularity indicated by at least one identifier in the target application-aware identifier.
  • the generating module is further configured to determine that the first network service does not meet the user requirements of the target service flow based on the transmission performance of the target service flow, and determine that the network service required to transmit the target service flow is the second Internet service;
  • the sending module is further configured to send the correspondence between the first application-aware identifier and the second network service to the second network device.
  • the sending module is further configured to send the target service to the second network device and/or the third network device before the receiving module receives the flow detection result and the target application awareness identifier sent by the third network device Flow upload policy, which is used to indicate to report the follow-up detection result of the target service flow.
  • a network device in a fourth aspect, includes:
  • the receiving module is configured to receive the correspondence between the first application-aware identifier and the first network service sent by the controller in the network, wherein the first application-aware identifier is generated by the controller based on user requirements of service flows;
  • the sending module is configured to use the first network service to forward the service packets of the target service flow according to the corresponding relationship if the received target service flow is the service flow indicated by the first application-aware identifier.
  • the network equipment may also include:
  • An obtaining module configured to obtain the second application-aware identifier of the target service flow from the service packet of the target service flow;
  • a determining module configured to determine that the target service flow is the service flow indicated by the first application-aware identifier if the second application-aware identifier matches the first application-aware identifier.
  • the service message received by the network device includes IFIT information, and the second application-aware identifier is encapsulated in the flow identification field or the reserved field of the IFIT information;
  • the second application-aware identifier is encapsulated in the destination address field, HBH, DOH or SRH of the service message.
  • the second application-aware identifier is encapsulated in the bound segment identifier field of the SRH field.
  • the receiving module can also be used to receive the identification generation rules sent by the controller;
  • the network equipment may also include:
  • a generating module configured to generate a second application-aware identifier of the target service flow based on the identifier generation rule
  • a determining module configured to determine that the target service flow is the service flow indicated by the first application-aware identifier if the second application-aware identifier matches the first application-aware identifier.
  • the service packet received by the network device includes IFIT information; the sending module may be configured to encapsulate the target application-aware identifier in the flow identifier field or reserved field of the IFIT information, and adopt the first The network service forwards the service packet encapsulated with the target application-aware identifier.
  • the network equipment may also include:
  • the detection module is configured to perform follow-up detection on the target service flow based on the follow-up detection information if the service packet of the target service flow received by the network device includes follow-up detection information, and obtain a follow-up detection result;
  • the sending module is further configured to send the follow-up detection result and the target application awareness identifier to the controller, where the target application awareness identifier is the first application awareness identifier or the second application awareness of the target service flow obtained by the network device logo.
  • the receiving module may also be configured to receive the sending strategy of the target service flow sent by the controller, where the sending strategy is used to instruct to report the follow-up detection result of the target service flow;
  • the sending module may be configured to send the follow-up detection result and target application awareness identifier to the controller based on the indication of the sending strategy.
  • a packet forwarding method includes: generating a first application-aware identifier of the target service flow based on user requirements of the target service flow, and sending the first application-aware identifier; wherein, the first application-aware identifier An application-aware identifier is used for the network device to encapsulate the target application-aware identifier in the service packet of the target service flow, and the target application-aware identifier is the first application-aware identifier, or a second application-aware identifier that matches the first application-aware identifier.
  • the first application-aware identifier corresponds to the first network service and is used for the network device to encapsulate the target application-aware identifier in the service packet of the target service flow, it can be ensured that the network device receiving the service packet can use
  • the first network service corresponding to a specific application forwards the service message related to the application, thereby effectively improving the flexibility of service message forwarding.
  • the process of generating the first application-aware identifier of the target service flow based on the user requirements of the target service flow may include: the controller in the network generates an ID of the target service flow based on the acquired user requirements of the target service flow.
  • the first application-aware identifier; correspondingly, the process of sending the first application-aware identifier may include: the controller sends the first application-aware identifier to the first network device, so that the first network device can The target application awareness identifier is encapsulated in the message.
  • the first network device may be an application-aware edge device in the APN.
  • the application-aware edge device After the application-aware edge device encapsulates the target application-aware identifier in the service packet of the target service flow, it can facilitate a downstream network device to determine the first network service for forwarding the target service flow based on the target application-aware identifier.
  • the method may further include: the controller acquires user requirements of the target service flow through a northbound interface.
  • the controller can acquire the user requirements of the target service flow sent by the service opening system through its northbound interface.
  • the method may further include: the controller determining a first network service required to transmit the target service flow based on user requirements of the target service flow, and sending the first application-aware identifier and The corresponding relationship of the first network service is used for the second network device to determine the first network service for forwarding the service packet of the target service flow based on the first application-aware identifier.
  • the second network device may be a head-end network device (also referred to as a head node) serving the first network.
  • the second network device is a head node of a forwarding path, or a head node of a network slice. It should be understood that the second network device and the first network device may be the same network device or different network devices.
  • the controller can establish and deliver the corresponding relationship between the application-aware identifier of the service flow and the network service
  • the second network device can directly forward the service message of the service flow based on the corresponding relationship, thus effectively improving the flexibility of service message forwarding sex.
  • the method may further include: the controller receiving the follow-up detection result and the target application awareness identifier sent by the third network device, and analyzing the transmission of the target service flow based on the follow-up detection result and the target application awareness identifier performance.
  • the third network device may be a node in the follow-up detection path of the target service flow, for example, may be an ingress node, a forwarding node (also called an intermediate node) or an exit node in the follow-up detection path.
  • the target application-aware identifier may be the first application-aware identifier, or may be a second application-aware identifier of the target service flow generated by the network device.
  • the controller can then use at least one identifier in the target application-aware identifier to indicate The granularity detection and analysis of the transmission performance of the service flow effectively improves the flexibility of detection and analysis of the transmission performance of the service flow.
  • the method may further include: the controller displaying the performance index of the target service flow according to the target granularity, where the performance index is used to indicate the transmission performance of the target service flow; wherein the target granularity is the target application-aware identifier At least one of the identifies the indicated granularity.
  • the controller displays the performance index according to the granularity indicated by at least one identifier, so not only can the refined display of the performance index be realized, but also the flexible and adjustable display granularity can be realized.
  • the process for the controller to receive the follow-up detection result and the target application awareness identifier sent by the third network device may include: the controller receiving the follow-up detection result, the target application awareness identifier and the corresponding follow-up detection result sent by the third network device.
  • the flow identification of the flow detection correspondingly, the controller analyzes the transmission performance of the target service flow based on the flow detection result and the target application awareness identification.
  • the process may include: the controller based on the target application awareness identification and the flow identification Determine the corresponding relationship of the detected flow identifiers, determine at least one data flow included in the target service flow, and then analyze the transmission performance of the at least one data flow included in the target service flow based on the flow-following detection result.
  • the controller can determine at least one monitored data flow included in the target service flow based on the corresponding relationship between the target application-aware identifier and the flow identifier detected along with the flow, and then analyze the target service flow based on the transmission performance of the at least one data flow transmission performance.
  • the method may further include: the controller determines, based on the transmission performance of the target service flow, that the first network service does not meet user requirements of the target service flow, and then determines that the network service required to transmit the target service flow is the second The second network service, and then sending the correspondence between the first application awareness identifier and the second network service to the second network device.
  • the controller can update the network service required for transmitting the target service flow in time, thereby ensuring that the updated network service can meet the transmission performance of the target service flow, thereby ensuring that the target service flow Reliable delivery of streams.
  • the method may further include: the controller sends the first network device and/or the third network device The sending strategy of the target service flow, where the sending strategy is used to indicate to report the follow-up detection result of the target service flow.
  • the controller can make the network device only report the follow-up detection results of key service flows through sending and uploading policies. This not only realizes flexible and adjustable reporting granularity of follow-up detection results, but also effectively reduces the data processing of the controller. pressure.
  • the process of generating the first application-aware identifier of the target service flow may include: the first network device generates the target service flow based on the user requirements of the target service flow sent by the controller.
  • the first application-aware identifier; correspondingly, the process of sending the first application-aware identifier may include: the first network device encapsulates the first application-aware identifier in the service packet of the target service flow, and forwards the encapsulated first application-aware identifier.
  • a service packet with an application-aware identifier may be used to send the first application-aware identifier.
  • the first network device may be an application-aware edge device in the APN.
  • the application-aware edge device generates the first application-aware identifier, and after encapsulating the first application-aware identifier in the service packet of the target service flow, it is convenient for the downstream network device to determine based on the first application-aware identifier for forwarding the target First web service for business flow.
  • the service packet of the target service flow received by the first network device includes follow-up detection information
  • the method may further include: the first network device performs follow-up detection information on the target service flow based on the follow-up detection information. Flow detection, obtaining a flow detection result, and sending the flow detection result and the first application awareness identifier to the controller.
  • the method may further include: the first network device receiving the sending strategy of the target service flow sent by the controller, where the sending strategy is used to indicate to report the follow-up detection result of the target service flow;
  • a process for a network device to send the flow detection result and the first application-aware identifier to the controller may include: the first network device sends the flow detection result and the A first application-aware identifier.
  • the process of the first network device sending the follow-up detection result and the first application awareness identification to the controller may include: the first network device sends the follow-up detection result, the first application Awareness identifier and corresponding flow identifier detected along with the flow.
  • the process of the first network device encapsulating the first application-aware identifier in the service packet of the target service flow may include: the flow identifier field or reserved field of the IFIT information of the service packet by the first network device encapsulating the first application-aware identifier;
  • the first network device encapsulates the first application-aware identifier in the destination address field, HBH, DOH or SRH of the service packet.
  • the first application-aware identifier may be encapsulated in the BSID field of the SRH field.
  • the user requirements of the target service flow include one or more of the following requirements: a requirement for a specified forwarding path, a requirement for a specified network slice, and a requirement for a performance index of transmission performance.
  • the target application-aware identifier includes at least one of a user identifier and an application identifier.
  • the user identifier is used to indicate the user to which the target service flow belongs
  • the application identifier is used to indicate the application to which the target service flow belongs.
  • the target application awareness identifier may also include at least one of flow identifier, SLA level and service requirement.
  • the service requirement may be a requirement on performance indicators such as delay and packet loss rate
  • the flow identifier in the first application-aware identifier is also called a session identifier (session ID).
  • a packet forwarding method which is applied to a network device.
  • the method includes: receiving a first application-aware identifier sent by a controller, where the first application-aware identifier is generated based on a user requirement of a service flow, and the first application-aware identifier is generated based on a user requirement of a service flow, and the first An application-aware identifier corresponds to the first network service, and the first network service satisfies the user requirements of the service flow; if the received target service flow is the service flow indicated by the first application-aware identifier, the target service flow Encapsulating the target application awareness identifier in the service message, and forwarding the service message encapsulated with the target application awareness identifier; wherein, the target application awareness identifier is the first application awareness identifier, or the first application awareness identifier matching the first application awareness identifier.
  • the service packet of the target service flow received by the network device includes follow-up detection information
  • the method may further include: performing follow-up detection on the target service flow based on the follow-up detection information, to obtain follow-up detection information result, and send the on-stream detection result and target application awareness identifier to the controller.
  • the process of sending the flow detection result and the target application awareness identification to the controller may include: sending the flow detection result, the target application awareness identification, and the corresponding flow detection flow identification to the controller .
  • the process of encapsulating the target application-aware identifier in the service packet of the target service flow may include: encapsulating the target application-aware identifier in the flow identifier field or reserved field of the IFIT information of the service packet; or, Encapsulate the target application awareness identifier in the destination address field, HBH, DOH or SRH of the service message.
  • the process of receiving the first application-aware identifier sent by the controller may include: receiving the corresponding relationship between the first application-aware identifier sent by the controller and the first network service; correspondingly, forwarding the package with the target application-aware identifier
  • the process of receiving the service message may include: using the first network service to forward the service message encapsulated with the target application-aware identifier.
  • a message forwarding device comprising:
  • the generating module is configured to generate a first application-aware identifier of the target service flow based on user requirements of the target service flow, and the first application-aware identifier is used for the network device to encapsulate the target application-awareness in the service packet of the target service flow
  • the target application-aware identifier is the first application-aware identifier, or a second application-aware identifier that matches the first application-aware identifier, and the first application-aware identifier corresponds to the first network service, and the first network service Satisfy the user needs of the target business flow;
  • a sending module configured to send the first application-aware identifier, where the first application-aware identifier is used for the network device to forward the service packet of the target service flow by using the first network service.
  • the message forwarding device may be applied to a controller in the network, and the generating module is configured to generate a first application-aware identifier of the target service flow based on the acquired user requirements of the target service flow;
  • the sending module is configured to send the first application-aware identifier to the first network device, so that the first network device encapsulates the target application-aware identifier in the service packet of the target service flow.
  • the device further includes an acquisition module, configured to acquire user requirements of the target service flow through a northbound interface.
  • the generating module is further configured to determine the first network service required to transmit the target service flow based on user requirements of the target service flow;
  • the sending module is further configured to send the correspondence between the first application-aware identifier and the first network service to the second network device, and the correspondence is used for the second network device to determine the service based on the first application-aware identifier.
  • the first network service that forwards the service packets of the target service flow.
  • the device may also include:
  • the receiving module is configured to receive the flow detection result sent by the third network device and the target application awareness identification, the target application awareness identification is the application awareness identification of the service flow to which the flow detection result belongs, and the target application awareness identification is the first An application-aware identifier or a second application-aware identifier generated by the network device for the target service flow;
  • An analysis module configured to analyze the transmission performance of the target service flow based on the flow-by-flow detection result and the target application-aware identification.
  • the device may also include:
  • the display module is configured to display the performance index of the target service flow according to the target granularity, and the performance index is used to indicate the transmission performance of the target service flow; wherein, the target granularity is the granularity indicated by at least one identifier in the target application-aware identifier.
  • the receiving module may be configured to receive the follow-up detection result sent by the third network device, the target application perception identifier, and the corresponding flow identifier of the follow-up detection;
  • the analysis module may be configured to determine at least one data flow included in the target service flow based on the corresponding relationship between the target application awareness identifier and the flow identifier detected along with the flow, and analyze the target service flow based on the result of the follow-up detection Transport performance of at least one data stream included.
  • the generation module can also be used to determine that the first network service does not meet the user requirements of the target service flow based on the transmission performance of the target service flow, and then determine that the network service required to transmit the target service flow is the second 2.
  • Network services
  • the sending module may also be configured to send the correspondence between the first application-aware identifier and the second network service to the second network device.
  • the sending module may also be configured to send the target to the first network device and/or the third network device before the receiving module receives the flow detection result and the target application awareness identifier sent by the third network device
  • the sending policy of the service flow, the sending policy is used to instruct to report the follow-up detection result of the target service flow.
  • the message forwarding device may be applied to the first network device, and the generating module may be configured to generate a first application-aware identifier of the target service flow based on user requirements of the target service flow sent by the controller;
  • the sending module may be configured to encapsulate the first application-aware identifier in a service packet of the target service flow, and forward the service packet encapsulated with the first application-aware identifier.
  • the service packet of the target service flow received by the first network device includes follow-up detection information
  • the apparatus may further include:
  • a detection module configured to perform follow-up detection on the target service flow based on the follow-up detection information, and obtain a follow-up detection result
  • the sending module may also be configured to send the follow-up detection result and the first application awareness identifier to the controller.
  • the device may also include:
  • a receiving module configured to receive the sending policy of the target service flow sent by the controller, where the sending policy is used to instruct to report the follow-up detection result of the target service flow;
  • the sending module may be configured to send the follow-up detection result and the first application awareness identifier to the controller based on the indication of the sending strategy.
  • the sending module may be configured to send the result of the on-stream detection, the first application awareness identifier, and the corresponding on-stream detection flow identifier to the controller.
  • the sending module may be configured to encapsulate the first application-aware identifier in the flow identification field or reserved field of the IFIT information of the service message; or, in the destination address field, HBH, DOH Or encapsulate the first application-aware identifier in the SRH.
  • the user requirements of the target service flow include one or more of the following requirements: a requirement for a specified forwarding path, a requirement for a specified network slice, and a requirement for a performance index of transmission performance.
  • the target application-aware identifier includes at least one of a user identifier and an application identifier.
  • a network device in an eighth aspect, includes:
  • the receiving module is configured to receive the first application-aware identifier sent by the controller, the first application-aware identifier is generated based on the user requirements of the service flow, and the first application-aware identifier corresponds to the first network service, and the first network service satisfies User requirements for the business flow;
  • An encapsulation module configured to encapsulate the target application-aware identifier in the service packet of the target service flow if the received target service flow is the service flow indicated by the first application-aware identifier, and the target application-aware identifier is the first application-aware identifier an application-aware identifier, or a second application-aware identifier that matches the first application-aware identifier;
  • a sending module configured to forward the service message encapsulated with the target application-aware identifier.
  • the service message of the target service flow received by the network device includes flow detection information, and the network device may also include:
  • a detection module configured to perform follow-up detection on the target service flow based on the follow-up detection information, and obtain a follow-up detection result
  • the sending module is further configured to send the follow-up detection result and the target application awareness identifier to the controller.
  • the sending module may be configured to send the result of the on-stream detection, the target application awareness identifier, and the corresponding on-stream detection flow identifier to the controller.
  • the encapsulation module may be used to encapsulate the target application awareness identifier in the flow identification field or reserved field of the IFIT information of the service message; or, in the destination address field, HBH, DOH or The target application-aware identifier is encapsulated in the SRH.
  • the receiving module can be used to receive the corresponding relationship between the first application-aware identifier and the first network service sent by the controller; correspondingly, the sending module can be used to forward the package with The target application perceives and identifies service packets.
  • a method for detecting the performance of a service flow which is applied to a network device, and the method includes: performing follow-up detection on the target service flow to which the service message belongs, based on the follow-up detection information in the service message, Obtain the flow detection result, and send the flow detection result and the target application awareness identification of the target service flow to the controller in the network; wherein, the target application awareness identification is generated based on the user requirements of the target service flow, and the flow flow detection
  • the detection result and target application perception identification are used for the controller to analyze the transmission performance of the target service flow.
  • the controller can further detect at the granularity indicated by at least one identifier in the target application-aware identifier and analyze the transmission performance of the service flow, thereby effectively improving the flexibility of detecting and analyzing the transmission performance of the service flow.
  • the target application-aware identifier is encapsulated in the service message, that is, the network device can directly obtain the target application-aware identifier from the received service message, and the target application-aware identifier can be used to indicate the target service flow The user and/or application it belongs to.
  • the target application-aware identifier may be encapsulated by an upstream node of the network device (such as an application-aware edge device), or may be encapsulated by the application to which the target service flow belongs.
  • the flow detection information is IFIT information
  • the target application awareness identifier is encapsulated in the flow identification field or reserved field of the IFIT information.
  • the network device can obtain the target application awareness identifier synchronously when reading the IFIT information to perform follow-up detection.
  • the target application awareness identifier may also be encapsulated in the destination address field, HBH, DOH or SRH of the service message.
  • the target application awareness identifier may be encapsulated in the BSID field of the SRH field.
  • the method may further include: receiving the correspondence between the first application-aware identifier and the first network service sent by the controller, where the first application-aware identifier is generated by the controller based on the user requirement of the service flow; if The target service flow is the service flow indicated by the first application-aware identifier, and the first network service is used to forward the service packets of the target service flow according to the corresponding relationship.
  • the controller can establish and deliver the corresponding relationship between the application-aware identifier of the service flow and the network service
  • the network device can directly forward the service message of the service flow based on the corresponding relationship, thus effectively improving the flexibility of service message forwarding.
  • the method may further include: receiving an identifier generation rule sent by the controller, and generating a second application-aware identifier of the target service flow based on the identifier generation rule; wherein, the target application-aware identifier is the second application-aware identifier ID or the first application-aware ID of the target service flow sent by the controller.
  • the network device may also generate a second application-aware identifier.
  • the second application-aware identifier can be reported to the controller as the target application-aware identifier; or if the network device also receives the first application-aware identifier of the target service flow issued by the controller, the network device can also determine the second application
  • the perception identifier is matched with the first application perception identifier, and the first application perception identifier is reported to the controller as the target application perception identifier.
  • the flow detection information is IFIT information; the method may also include: encapsulating the target application-aware identifier in the flow identifier field or reserved field of the IFIT information, and forwarding the service report encapsulated with the target application-aware identifier arts.
  • the downstream node of the network device it is convenient for the downstream node of the network device to directly obtain and report the target application awareness identifier from the service message.
  • the method may further include: receiving the sending policy of the target service flow sent by the controller, where the sending policy is used to indicate to report the result of the follow-up detection of the target service flow; correspondingly, the network device reports to the controller
  • the process of sending the on-stream detection result and the target application-aware ID of the target service flow may include: sending the on-stream detection result and the target application-aware ID of the target service flow to the controller based on the indication of the sending strategy.
  • the controller can issue the sending policy of the critical service flow (including the target service flow) to the network device, so that the network device only reports the follow-up detection result of the key service flow, and does not need to report the follow-up detection result of the non-critical service flow .
  • the network device not only the flexible and adjustable reporting granularity of the detection result with the flow is realized, but also the data processing pressure of the controller is effectively reduced.
  • the process of sending the follow-up detection result and the target application-aware identifier of the target service flow to the controller in the network may include: sending the follow-up detection result, the target application-aware identifier of the target service flow to the controller in the network, and Corresponding stream ID detected along with the stream.
  • the flow identification detected along with the flow may be used to indicate a monitored data flow in the target service flow.
  • the controller can know the corresponding relationship between the target application-aware identifier and the flow identifier detected along with the flow, thereby facilitating the controller to analyze the transmission performance of at least one data flow included in the target service flow.
  • the target application-aware identifier includes at least one of a user identifier and an application identifier.
  • the user identifier is used to indicate the user to which the target service flow belongs
  • the application identifier is used to indicate the application to which the target service flow belongs.
  • the target application awareness identifier may also include at least one of flow identifier, SLA level and service requirement.
  • the service requirement may be a requirement on performance indicators such as delay and packet loss rate
  • the flow identifier in the second application-aware identifier is also called a session identifier (session ID).
  • a method for detecting the performance of a service flow is provided, which is applied to a controller in the network, and the method includes: receiving a flow-based detection result and a target application perception identifier sent by a third network device, the flow-based detection result is The third network device detects the target service flow along with the flow, and the target application-aware identifier is generated based on user requirements of the target service flow; based on the follow-up detection result and the target application-aware identifier, the transmission of the target service flow is analyzed performance.
  • the third network device may be a node in the follow-up detection path of the target service flow, for example, may be an ingress node, a forwarding node (also called an intermediate node) or an exit node in the follow-up detection path.
  • the target application-aware identifier includes at least one of a user identifier and an application identifier
  • the method further includes: displaying a performance indicator of the target service flow according to the target granularity, the performance indicator being used to indicate the transmission performance of the target service flow ;
  • the target granularity is the granularity indicated by at least one identifier in the target application-aware identifier.
  • the controller displays the performance index according to the granularity indicated by at least one identifier, so not only can the refined display of the performance index be realized, but also the flexible and adjustable display granularity can be realized.
  • the method may further include: sending an upload policy of the target service flow to the third network device, where the upload policy uses Instructing to report the follow-up detection result of the target service flow.
  • the process of receiving the flow detection result and the target application perception identifier sent by the third network device may include: receiving the flow detection result, the target application perception identifier and the corresponding flow detection flow identifier sent by the third network device
  • the process of analyzing the transmission performance of the target service flow may include: based on the correspondence between the target application-aware identifier and the flow identifier detected with the flow, determining the at least one data flow included in the target service flow; analyzing the transmission performance of at least one data flow included in the target service flow based on the follow-up detection result.
  • the controller can determine at least one monitored data flow included in the target service flow based on the corresponding relationship between the target application-aware identifier and the flow identifier detected along with the flow, and then analyze the target service flow based on the transmission performance of the at least one data flow transmission performance.
  • the method may further include: based on the user requirements of the target service flow, obtaining a correspondence between the first application-aware identifier of the target service flow and the first network service required to transmit the target service flow; The device sends the corresponding relationship, and the corresponding relationship is used for the second network device to determine the first network service for forwarding the service packet of the target service flow based on the first application-aware identifier; wherein the target application-aware identifier is the The first application-aware identifier or the second application-aware identifier of the target service flow generated by the network device.
  • the second network device may be a head-end network device (also referred to as a head node) serving the first network.
  • the second network device is a head node of a forwarding path, or a head node of a network slice. It should be understood that the second network device and the third network device may be the same network device, or may be different network devices.
  • the method may further include: determining that the first network service does not meet user requirements of the target service flow based on the transmission performance of the target service flow, and determining that the network service required to transmit the target service flow is a second network service; Sending the correspondence between the first application-aware identifier and the second network service to the second network device.
  • the controller can update the network service required for transmitting the target service flow in time, thereby ensuring that the updated network service can meet the transmission performance of the target service flow, thereby ensuring that the target service flow Reliable delivery of streams.
  • the method may further include: sending the first application-aware identifier of the target service flow to the first network device.
  • the first application-aware identifier is used for the first network device to encapsulate the application-aware identifier of the target service flow in a service packet of the target service flow if the first network device determines that the received service flow is the target service flow.
  • the third network device may be an application-aware edge device in the APN.
  • the application-aware edge device After the application-aware edge device encapsulates the application-aware identifier of the target service flow in the service packet of the target service flow, it can facilitate the downstream network device to determine the network service for forwarding the target service flow based on the application-aware identifier, or can When reporting the follow-up detection result of the target service flow, the application awareness identifier of the target service flow is also reported.
  • the method may further include: obtaining user requirements of the target service flow through a northbound interface.
  • the controller can acquire the user requirements of the target service flow sent by the service opening system through its northbound interface.
  • the user requirements of the target service flow include one or more of the following requirements: a requirement for a specified forwarding path, a requirement for a specified network slice, and a requirement for a performance index of transmission performance.
  • a network device in an eleventh aspect, includes:
  • the detection module is configured to perform follow-up detection on the target service flow to which the service message belongs based on the follow-up detection information in the service message, and obtain a follow-up detection result;
  • a sending module configured to send the follow-up detection result and the target application-aware identifier of the target service flow to the controller in the network, the target application-aware identifier is generated based on user requirements of the target service flow, the follow-through detection result and the target application
  • the perception identification is used for the controller to analyze the transmission performance of the target service flow.
  • the target application-aware identifier is encapsulated in the service packet, and the target application-aware identifier may be used to indicate the user and/or application to which the target service flow belongs.
  • the flow detection information is IFIT information
  • the target application awareness identifier is encapsulated in the flow identification field or reserved field of the IFIT information.
  • the network equipment may also include:
  • a receiving module configured to receive the correspondence between the first application-aware identifier and the first network service sent by the controller, wherein the first application-aware identifier is generated by the controller based on user requirements of service flows;
  • the sending module is further configured to use the first network service to forward the service packets of the target service flow according to the corresponding relationship if the target service flow is the service flow indicated by the first application-aware identifier.
  • the receiving module can also be used to receive the identification generation rules sent by the controller;
  • the network device may also include: a generating module, configured to generate a second application-aware identifier of the target service flow based on the identifier generation rule;
  • the target application-aware identifier is the second application-aware identifier or the first application-aware identifier of the target service flow sent by the controller.
  • the flow detection information is IFIT information; the network device may also include:
  • An encapsulation module configured to encapsulate the target application-aware identifier in the flow identifier field or reserved field of the IFIT information
  • the sending module is also used to forward the service message encapsulated with the target application-aware identifier.
  • the receiving module may also be configured to receive the sending strategy of the target service flow sent by the controller, where the sending strategy is used to instruct to report the follow-up detection result of the target service flow;
  • the sending module is configured to send the follow-up detection result and the target application awareness identifier of the target service flow to the controller based on the indication of the sending policy.
  • the sending module may be configured to send the follow-up detection result, the target application-aware identifier of the target service flow, and the corresponding flow identifier of the follow-up detection to the controller in the network.
  • the target application-aware identifier includes at least one of a user identifier and an application identifier.
  • a controller in a twelfth aspect, includes:
  • the receiving module is configured to receive the follow-up detection result and the target application perception identifier sent by the third network device, the follow-up detection result is obtained by the third network device performing follow-up detection on the target service flow, and the target application perception identifier Generation of user requirements based on the target business flow;
  • An analysis module configured to analyze the transmission performance of the target service flow based on the flow-by-flow detection result and the target application-aware identification.
  • the target application-aware identifier includes at least one of a user identifier and an application identifier
  • the controller further includes:
  • the display module is configured to display the performance index of the target service flow according to the target granularity, and the performance index is used to indicate the transmission performance of the target service flow; wherein, the target granularity is the granularity indicated by at least one identifier in the target application-aware identifier.
  • the controller also includes:
  • the sending module is configured to send the upload policy of the target service flow to the third network device before the receiving module receives the follow-up detection result and the target application perception identifier sent by the third network device, and the upload policy is used to indicate Report the follow-up detection result of the target service flow.
  • the receiving module can be used to receive the flow detection result sent by the third network device, the target application awareness identification and the corresponding flow identification of the flow detection; correspondingly, the analysis module can be used to Applying the corresponding relationship between the perception identifier and the flow identifier detected along with the flow, determining at least one data flow included in the target service flow; analyzing the transmission performance of at least one data flow included in the target service flow based on the result of the along-flow detection.
  • the controller also includes:
  • a generating module configured to obtain the correspondence between the first application-aware identifier of the target service flow and the first network service required to transmit the target service flow based on the user requirements of the target service flow;
  • the sending module is further configured to send the corresponding relationship to the second network device, and the corresponding relationship is used for the second network device to determine the first service packet for forwarding the target service flow based on the first application-aware identifier.
  • the target application-aware identifier is the first application-aware identifier or the second application-aware identifier of the target service flow generated by the network device.
  • the generating module is further configured to determine that the first network service does not meet the user requirements of the target service flow based on the transmission performance of the target service flow, and determine that the network service required to transmit the target service flow is the second Internet service;
  • the sending module is further configured to send the correspondence between the first application-aware identifier and the second network service to the second network device.
  • the sending module is further configured to send the first application-aware identifier of the target service flow to the first network device.
  • the controller also includes:
  • the acquisition module is configured to acquire the user requirements of the target service flow through the northbound interface.
  • a controller may include: a memory, a processor, and a computer program stored on the memory and operable on the processor.
  • the processor executes the computer program, the above-mentioned The method applied to the controller provided by any aspect.
  • a network device may include: a memory, a processor, and a computer program stored on the memory and operable on the processor.
  • the processor executes the computer program, the above-mentioned The method applied to network equipment provided by any aspect.
  • a network device may include: a main control board and an interface board, and the interface board may be used to implement the method applied to the network device provided in any one of the above aspects.
  • a network device in a sixteenth aspect, includes: a main control board and an interface board.
  • the main control board includes: a first processor and a first memory.
  • the interface board includes: a second processor, a second memory and an interface card. The main control board and the interface board are coupled.
  • the second memory may be used to store program codes
  • the second processor is used to call the program codes in the second memory, and trigger the interface card to perform the following operations: receiving the first application awareness identifier sent by the controller in the network and the first network service Corresponding relationship, wherein the first application-aware identifier is generated by the controller based on the user requirements of the service flow; if the received target service flow is the service flow indicated by the first application-aware identifier, then according to the corresponding relationship, the The first network service forwards the service packets of the target service flow.
  • a network device in a seventeenth aspect, includes: a main control board and an interface board.
  • the main control board includes: a first processor and a first memory.
  • the interface board includes: a second processor, a second memory and an interface card. The main control board and the interface board are coupled.
  • the first memory may be used to store program codes, and the first processor is used to call the program codes in the first memory to perform the following operations: based on the user requirements of the target service flow sent by the controller, generate the first application awareness of the target service flow identification, and encapsulate the target application-aware identification in the service packet of the target service flow;
  • the second memory may be used to store program codes, and the second processor may be used to call the program codes in the second memory to trigger the interface card to perform the following operations: Forwarding the service packet encapsulated with the target application-aware identifier; wherein, the target application-aware identifier is the first application-aware identifier, or a second application-aware identifier that matches the first application-aware identifier, and the first application-aware identifier The identifier corresponds to the first network service, and the first network service satisfies the user requirement of the target service flow.
  • the second processor is used to call the program code in the second memory, and trigger the interface card to perform the following operations: receiving the first application awareness identifier sent by the controller, where the first application awareness identifier is generated based on the user requirement of the service flow, and The first application-aware identifier corresponds to the first network service, and the first network service satisfies the user requirements of the service flow; if the received target service flow is the service flow indicated by the first application-aware identifier, then in the target service Encapsulate the target application-aware identifier in the service message of the flow, and forward the service message encapsulated with the target application-aware identifier; wherein, the target application-aware identifier is the first application-aware identifier, or matches the first application-aware identifier A second application-aware identifier for .
  • a network device in an eighteenth aspect, includes: a main control board and an interface board.
  • the main control board includes: a first processor and a first memory.
  • the interface board includes: a second processor, a second memory and an interface card.
  • the main control board and the interface board are coupled.
  • the first memory may be used to store program codes, and the first processor is used to call the program codes in the first memory to perform the following operations: based on the follow-up detection information in the service message, perform the target service flow to which the service message belongs Follow-the-flow detection, obtain the result of the follow-up detection;
  • the second memory may be used to store program codes
  • the second processor is used to call the program codes in the second memory to trigger the interface card to perform the following operations: send the follow-up detection result and the target application of the target service flow to the controller in the network
  • a perception identification the target application awareness identification is generated based on the user requirements of the target service flow
  • the flow-following detection result and the target application awareness identification are used for the controller to analyze the transmission performance of the target service flow.
  • a computer-readable storage medium where instructions are stored in the computer-readable storage medium, and the instructions are executed by a processor to implement the method provided in any one of the above aspects.
  • a computer program product containing instructions is provided, and when the computer program product is run on a computer, it causes the computer to execute the method provided in any one of the above aspects.
  • a communication network may include: a controller and at least one network device; the controller may implement the method applied to the controller provided in any one of the above aspects, and the network device may implement The method applied to a network device provided by any one of the above aspects.
  • a chip is provided, which can be used to implement the method provided in any one of the above aspects.
  • the present application provides a message forwarding method, device, and communication network.
  • the controller can obtain the correspondence between the application-aware identifier of the service flow and the network service required to transmit the service flow, and store the corresponding relationship Send it to the network device.
  • the network device recognizes that the service flow is the service flow indicated by the application-aware identifier, it can directly use the corresponding network service to forward the message of the service flow. Since the controller can establish and deliver the corresponding relationship between the application-aware identifier of the service flow and the network service, the network device can directly forward the service message of the service flow based on the corresponding relationship, thus effectively improving the flexibility of service message forwarding.
  • FIG. 1 is a schematic structural diagram of a communication network provided by an embodiment of the present application.
  • FIG. 2 is a flow chart of a message forwarding method provided in an embodiment of the present application
  • FIG. 3 is a schematic diagram of a data structure of an application-aware identifier provided by an embodiment of the present application
  • FIG. 4 is a flow chart of another message forwarding method provided by an embodiment of the present application.
  • FIG. 5 is a flow chart of a method for detecting the performance of a service flow provided by an embodiment of the present application
  • FIG. 6 is a flow chart of another message forwarding method provided by an embodiment of the present application.
  • FIG. 7 is a schematic structural diagram of another communication network provided by an embodiment of the present application.
  • Fig. 8 is a schematic diagram of the data structure of another application-aware identifier provided by the embodiment of the present application.
  • FIG. 9 is a schematic diagram of a data structure of another application-aware identifier provided by an embodiment of the present application.
  • FIG. 10 is a flow chart of another message forwarding method provided by the embodiment of the present application.
  • FIG. 11 is a flow chart of another service flow performance detection method provided by an embodiment of the present application.
  • FIG. 12 is a schematic structural diagram of an IFIT information provided by an embodiment of the present application.
  • Fig. 13 is a schematic structural diagram of a controller provided by an embodiment of the present application.
  • Fig. 14 is a schematic structural diagram of another controller provided by the embodiment of the present application.
  • FIG. 15 is a schematic structural diagram of a network device provided by an embodiment of the present application.
  • FIG. 16 is a schematic structural diagram of another network device provided by an embodiment of the present application.
  • FIG. 17 is a schematic structural diagram of a message forwarding device provided in an embodiment of the present application.
  • FIG. 18 is a schematic structural diagram of another message forwarding device provided by an embodiment of the present application.
  • FIG. 19 is a schematic structural diagram of another message forwarding device provided by an embodiment of the present application.
  • FIG. 20 is a schematic structural diagram of another network device provided by an embodiment of the present application.
  • FIG. 21 is a schematic structural diagram of another network device provided by an embodiment of the present application.
  • FIG. 22 is a schematic structural diagram of another network device provided by the embodiment of the present application.
  • Fig. 23 is a schematic structural diagram of another controller provided by the embodiment of the present application.
  • FIG. 24 is a schematic structural diagram of another message forwarding device provided in the embodiment of the present application.
  • FIG. 25 is a schematic structural diagram of another network device provided by an embodiment of the present application.
  • Fig. 1 is a schematic structural diagram of a communication network provided by an embodiment of the present application.
  • the communication network may include a controller 01 and a plurality of network devices. 5 network devices.
  • a communication connection is established between the controller 01 and at least one network device, and communication connections are established among the plurality of network devices.
  • the controller 01 may be a network controller, such as a software defined network (software defined network, SDN) controller, a network control engine (network control engine, NCE) or a path computation element server (path computation element server, PCE) server) etc.
  • the controller 01 may be a server, or a server cluster composed of several servers, or a cloud computing service center.
  • Each network device may be a device with a packet forwarding function such as a router or a switch, and each network device may also be called a node.
  • the plurality of network devices may include a provider (provider, P) device, a provider edge (provider edge, PE) device, a broadband remote access server (broadband remote access server, BRAS) and a customer premises device (customer premises equipment, CPE), etc.
  • a provider provider edge
  • PE provider edge
  • BRAS broadband remote access server
  • CPE customer premises equipment
  • At least one network device in the communication network can also be connected to the user terminal 03 and used to provide the user terminal 03 with network access services.
  • the user terminal 03 may also be called a host or user equipment.
  • An application program (application, APP) is installed in the user terminal 03, and the plurality of network devices can forward the service flow of the APP.
  • the communication network provided in this embodiment of the present application may be an APN.
  • the APN may be a network based on Internet protocol version 6 (Internet protocol version 6, IPv6), also called APN6.
  • IPv6 Internet protocol version 6
  • the APN may also be a network based on SRv6, multi-protocol label switching (multi-protocol label switching, MPLS) technology or a virtual extended local area network (virtual extensible local area network, VxLAN).
  • SRv6 is an IPv6-based segment routing (segment routing, SR) forwarding technology.
  • the embodiment of the present application provides a packet forwarding method, which can be applied to a communication network such as that shown in FIG. 1 .
  • the method includes:
  • Step 101 the controller obtains a correspondence between a first application-aware identifier of a target service flow and a first network service required for transmitting the target service flow based on user requirements of the target service flow.
  • the user requirement of the target service flow refers to the requirement of the target service flow on the performance of the network service.
  • the user requirement may include one or more of the following requirements: a requirement for a specified forwarding path, a requirement for a specified network slice, and a requirement for a performance index of transmission performance.
  • the performance index of the transmission performance may include delay, bandwidth, packet loss rate, and the like.
  • the user requirement of the target service flow may also include information about the user and/or application to which the target service flow belongs.
  • the controller may generate the first application-aware identifier of the target service flow based on user requirements of the target service flow.
  • 3 is a schematic structural diagram of an application-aware identifier provided by an embodiment of the present application.
  • the first application-aware identifier includes at least one of a user identifier (user ID) and an application identifier (APP ID).
  • the user identifier is used to identify the user to which the target service flow belongs;
  • the application identifier is used to identify the application to which the target service flow belongs.
  • the user to which the target service flow belongs may be a user or a user group.
  • the application to which the target service flow belongs may be an application or an application group.
  • the first application-aware identifier may further include at least one of a flow identifier (flow ID) and an SLA level.
  • flow ID also called session ID
  • SLA level is used to identify the service level of the user to which the target service flow belongs
  • the service grades may include gold, silver, copper, etc., or the service grades may also be distinguished by different colors.
  • the controller may also calculate, based on the user requirement of the target service flow, a first network service that can meet the user requirement, and the first network service may include network slicing and/or a forwarding path.
  • the first network service may include a network slice specified in user requirements or a specified forwarding path.
  • the forwarding path may be an SRv6 path.
  • Step 102 the controller sends the corresponding relationship to the second network device.
  • the second network device may be a head-end network device (also referred to as a head node) serving the first network.
  • the second network device is a head node of a forwarding path, or a head node of a network slice.
  • the first application-aware identifier and its corresponding identifier of the first network service are recorded in the corresponding relationship. If the first network service includes a network slice, the identifier of the first network service includes an identifier of a network slice; if the first network service includes a forwarding path, the identifier of the first network service includes an identifier of a forwarding path.
  • the identifier of the forwarding path may be the BSID of the forwarding path, or may be the BSID of the SR policy to which the forwarding path belongs.
  • Step 103 If the target service flow received by the second network device is the service flow indicated by the first application-aware identifier, use the first network service to forward the service packet of the target service flow according to the corresponding relationship.
  • the second network device can identify the service flow it receives. If the second network device recognizes that the target service flow it receives is the service flow indicated by the first application-aware identifier, it may use the first network service to forward the target service flow according to the correspondence issued by the controller. business message. For example, assuming that the first network service includes an SRv6 path, the second network device may use the SRv6 path to forward the service packet of the target service flow.
  • the second network device can identify the service flow through the application awareness identifier encapsulated in the service packet of the target service flow. If the second network device detects the application awareness identifier encapsulated in the service packet of the target service flow If the identifier matches the first application-aware identifier, it can be determined that the target service flow is the service flow indicated by the first application-aware identifier.
  • the second network device may also identify whether the target service flow is the service flow indicated by the first application-aware identifier by means of packet parsing or traffic feature analysis. For example, the second network device may identify the target service flow by analyzing the four-tuple information, five-tuple information or seven-tuple information of the service packet. Or, the second network device may also use deep packet inspection (deep packet inspection, DPI) technology to analyze the service packets of the target service flow, and then identify whether the target service flow is the service flow indicated by the first application-aware identifier.
  • DPI deep packet inspection
  • the second network device may also use an artificial intelligence (AI) model to analyze the traffic characteristics of the target service flow, and then identify whether the target service flow is the service flow indicated by the first application-aware identifier.
  • AI artificial intelligence
  • the AI model may be delivered by the controller to the second network device.
  • the application-aware identifier of a service flow may also be called an APN identifier, or an APN ID.
  • the controller can obtain the corresponding relationship between the application-aware identifier of the service flow and the network service required to transmit the service flow, and send the corresponding relationship to the Network equipment. Further, when the network device recognizes that the service flow is the service flow indicated by the application-aware identifier, it can directly use the corresponding network service to forward the message of the service flow. Since the controller can establish and deliver the corresponding relationship between the application-aware identifier of the service flow and the network service, the network device can directly forward the service message of the service flow based on the corresponding relationship, thus effectively improving the flexibility of service message forwarding.
  • the embodiment of the present application provides another packet forwarding method, which can be applied to a communication network such as that shown in FIG. 1 , and can be applied to a controller or any network device in the communication network.
  • the method includes:
  • Step 201 based on the user requirements of the target service flow, generate a first application-aware identifier of the target service flow, the first application-aware identifier is used for the network device to encapsulate the target application-aware identifier in the service packet of the target service flow, And the first application awareness identifier corresponds to the first network service.
  • the first network service meets user requirements of the target service flow.
  • the target application-aware identifier may be the first application-aware identifier, or a second application-aware identifier that matches the first application-aware identifier.
  • the controller may generate the first application-aware identifier of the target service flow based on the acquired user requirements of the target service flow.
  • the first network device may generate the first application-aware identifier of the target service flow based on the user requirements of the target service flow issued by the controller.
  • the user requirement of the target service flow refers to the requirement of the target service flow on the performance of the network service, and the user requirement of the target service flow may also include information of the user and/or application to which the target service flow belongs.
  • the first network service may include network slicing and/or forwarding paths. For the structure of the first application-aware identifier, reference may be made to FIG. 3 .
  • Step 202 Send the first application-aware identifier, where the first application-aware identifier is used for the network device to forward the service packet of the target service flow by using the first network service.
  • the controller may send the first application-aware identifier to the first network device.
  • the first network device is an application-aware edge device. If the first network device determines that the received target service flow is the service flow indicated by the first application-aware identifier, it may encapsulate the target application-aware identifier in a service packet of the target service flow.
  • the target application-aware identifier may be the first application-aware identifier, or may be a second application-aware identifier of the target service flow generated by the first network device, where the second application-aware identifier matches the first application-aware identifier. Therefore, it is convenient for the network device downstream of the first network device to determine the first network service for forwarding the target service flow based on the target application-aware identifier, and then use the first network service to forward the service report of the target service flow. arts.
  • the first network device may encapsulate the first application-aware identifier in the service packet of the target service flow, and forward the packet containing the first application to the downstream network device. Perceptually identified service packets.
  • the downstream network device can then determine a first network service for forwarding the target service flow based on the first application-aware identifier, and use the first network service to forward the service packet of the target service flow.
  • the embodiment of the present application provides a packet forwarding method, which can generate a first application-aware identifier based on user requirements of a target service flow. Since the first application-aware identifier corresponds to the first network service and is used for the network device to encapsulate the target application-aware identifier in the service packet of the target service flow, it can be ensured that the network device receiving the service packet can use The corresponding first network service forwards the service message, thereby effectively improving the flexibility of service message forwarding.
  • An embodiment of the present application provides a method for detecting the performance of a service flow, and the method can be applied to a communication network such as that shown in FIG. 1 .
  • the method includes:
  • step 301 the third network device performs follow-up detection on the target service flow to which the service message belongs based on the follow-up detection information in the service message, and obtains a follow-up detection result.
  • the third network device may be a node in the forwarding path of the target service flow, and the third network device may be an ingress (ingress) node, a forwarding (transit) node or exit (egress) node.
  • the follow-up detection result may include measurement results of performance indicators such as time delay and/or packet loss number of the target service flow.
  • the follow-up detection information may be encapsulated in the service message by an entry node of the follow-up detection path of the target service flow, and the entry node may be an upstream node of the third network device, or may also be the A third network device. If the third network device is the ingress node, the third network device may encapsulate follow-up detection information in the service packet of the target service flow, and may perform follow-up detection on the target service flow based on the follow-up detection information, Obtain the flow detection result.
  • Step 302 the third network device sends the follow-through detection result and the target application awareness identifier of the target service flow to the controller in the network.
  • the target application-aware identifier is generated based on user requirements of the target service flow, and the follow-through detection result and the target application-aware identifier are used for the controller to analyze the transmission performance of the target service flow.
  • the user requirement of the target service flow refers to the requirement of the target service flow on the performance of the network service.
  • the structure of the target application awareness identification refer to FIG. 3 .
  • the target application-aware identifier is encapsulated in the service packet of the target service flow received by the third network device.
  • the target application-aware identifier may be encapsulated in a service packet by an upstream node of the third network device (for example, an application-aware edge device) or an application to which the target service flow belongs.
  • the target application-aware identifier may be a second application-aware identifier generated by an upstream node or an application to which the target service flow belongs, or may be a first application-aware identifier issued by the controller.
  • the target application-aware identifier of the target service flow is not encapsulated in the service packet of the target service flow received by the third network device.
  • the third network device may generate the second application-aware identifier of the target service flow based on the identifier generation rule issued by the controller.
  • the target application-aware identifier is the second application-aware identifier generated by the third network device.
  • step 303 the controller analyzes the transmission performance of the target service flow based on the flow-by-flow detection result and the target application-aware identification.
  • the controller After the controller receives the follow-up detection result and the target application perception identifier sent by the third network device, it can analyze the transmission performance of the target service flow at a granularity indicated by at least one of the target application perception identifiers.
  • the transmission performance may be represented by performance indicators such as packet loss rate and/or time delay.
  • the controller can receive the flow-based detection results and application-aware identifiers of different service flows reported by different network devices, and the controller can determine the flow-based detection results of the same service flow based on the application-aware identifiers, and then based on One or more follow-up detection results of the same service flow analyze the transmission performance of the service flow.
  • the embodiment of the present application provides a performance detection method of a service flow.
  • the network device reports the follow-up detection result of the target service flow to the controller, it can also report the target application awareness identifier of the target service flow.
  • the controller can then detect and analyze the transmission performance of the service flow at the granularity indicated by at least one of the target application-aware identifiers, thereby effectively improving the flexibility of detecting and analyzing the transmission performance of the service flow.
  • FIG. 6 is a flow chart of another packet forwarding method provided by an embodiment of the present application, and the method can be applied to a communication network such as that shown in FIG. 1 .
  • the method includes:
  • step 401 the controller obtains the user requirements of the target service flow.
  • the user requirement of the target service flow refers to the requirement of the target service flow on the performance of the network service.
  • the user requirement may include one or more of the following requirements: a requirement for a specified forwarding path, a requirement for a specified network slice, and a requirement for a performance index of transmission performance.
  • the performance index of the transmission performance may include delay, bandwidth, packet loss rate, and the like.
  • the user requirement of the target service flow may also include information about the user and/or application to which the target service flow belongs.
  • the controller may obtain the user requirements of the target service flow through its northbound interface (northbound interface).
  • the northbound interface of the controller can be connected with other devices to obtain the user requirements of the target service flow sent by the device.
  • the devices connected to the northbound interface of the controller include but are not limited to frontend, portal, orchestrator, operation support system (operation support system, OSS) or business support system (business support system, BSS) and so on.
  • Step 402 the controller obtains the correspondence between the first application-aware identifier of the target service flow and the first network service required to transmit the target service flow based on the user requirement.
  • the controller may generate the first application-aware identifier of the target service flow based on user requirements of the target service flow.
  • the first application-aware identifier includes at least one of a user identifier and an application identifier.
  • the user identifier is used to identify the user to which the target service flow belongs;
  • the application identifier is used to identify the application to which the target service flow belongs.
  • the user identifier may be an enterprise identifier.
  • the first application-aware identifier may further include at least one of a flow identifier and an SLA level.
  • the flow identifier is used to identify a specific data flow in the application to which the target service flow belongs;
  • the SLA level is used to identify the service level of the user to which the target service flow belongs, and the service level may include gold, silver, copper, etc., or the Service levels can also be distinguished by different colors.
  • the controller may also calculate the first network service that can meet the user's demand based on the user's demand of the target service flow, so as to obtain the correspondence between the first application-aware identifier and the first network service.
  • the first network service may include network slicing and/or forwarding paths.
  • the first application-aware identifier and its corresponding first network service identifier may be recorded in the correspondence, that is, the correspondence may be a correspondence between the first application-aware identifier and the first network service identifier.
  • the identifier of the first network service may include an identifier of a network slice.
  • the identifier of the first network service may include an identifier of a forwarding path.
  • the forwarding path may be an SRv6 path
  • the identifier of the forwarding path may be the BSID of the forwarding path, or may be the BSID of the SR policy to which the forwarding path belongs.
  • Step 403 the controller sends the corresponding relationship to the second network device and the first network device respectively.
  • the second network device may be a head-end network device (also referred to as a head node) serving the first network.
  • the second network device is a head node of a forwarding path, or a head node of a network slice.
  • the corresponding relationship is used for the second network device to determine the first network service for forwarding the service packet of the target service flow based on the first application-aware identifier.
  • the first network device may be an application-aware edge device (App-aware edge device) in the ANP network, and the first network device may be a BRAS, a PE device, a CPE or an egress gateway (such as an egress gateway of a park), etc. .
  • the first application awareness identifier in the corresponding relationship is used for the first network device to encapsulate the application awareness of the target service flow in the service packet of the target service flow if the first network device determines that the received service flow is the target service flow
  • the identifier for example, encapsulates the first application-aware identifier.
  • the controller 01 can The corresponding relationship is issued to the network device 02a and the network device 02b respectively.
  • the corresponding relationship issued by the controller 01 may be shown in Table 1.
  • the identifier of the first network service corresponding to the target service flow with the first application perception identifier APN ID1 is BSID1, that is, the first network service assigned by the controller 01 to the target service flow is BSID1 Indicates the SRv6 path.
  • the identifier of the first network service corresponding to the target service flow with the first application-aware identifier APN ID3 is slice-ID1, that is, the first network service assigned by the controller 01 to the target service flow is the network slice indicated by slice-ID1.
  • the first app-aware logo First Web Services logo APN ID1 BSID1 APN ID2 BSID2 APN ID3 slice-ID1
  • the second network device and the first network device may be the same network device, that is, the application-aware edge device is a head-end network device served by the first network.
  • the controller may deliver the correspondence to only one network device. For example, referring to FIG. 7 , assuming that the network device 02a is an application-aware edge device (ie, the first network device), if the network device 02a is also a head-end network device (ie, the second network device) serving the first network, the controller 01 may only deliver the corresponding relationship to the network device 02a.
  • the controller may only issue the first network device (such as the network device 02a shown in FIG.
  • the first application is aware of the identifier without issuing the corresponding relationship.
  • Step 404 the controller sends the identifier generation rule to the first network device.
  • the identifier generation rule may refer to a rule for generating an application-aware identifier of a service flow based on feature information of the service flow.
  • the identifier generation rule is used for the first network device to generate a second application-aware identifier of the target service flow, and the second application-aware identifier is used to match the first application-aware identifier generated by the controller, so that the first network device can determine its Whether the received target service flow is the service flow indicated by the first application awareness identifier.
  • the controller 01 may deliver the identifier generation rule to the network device 02a.
  • Step 405 the first network device generates a second application-aware identifier of the target service flow based on the identifier generation rule.
  • the first network device After the first network device receives the identifier generation rule issued by the controller, it can generate an application-aware identifier for the service flow it receives based on the identifier generation rule.
  • the first network device may obtain characteristic information of the target service flow it receives, and process the characteristic information by using the identification generation rule to generate a second application-aware identification of the target service flow.
  • the characteristic information may include four-tuple information, five-tuple information or seven-tuple information of the target service flow, or may also include traffic characteristic information (such as packet interval) of the target service flow, or may also Including information obtained based on DPI technology or application identification technology.
  • the first network device may input the traffic characteristic information of the target service flow into the AI model, so as to obtain the second application-aware identification of the target service flow output by the AI model.
  • the structure of the second application-aware identifier is the same as that of the first application-aware identifier. If the first application-aware identifier includes an application identifier, the first network device can identify the application to which the target service flow belongs based on an application identification technology, and then can generate the application identifier of the application to which the target service flow belongs based on the identifier generation rule. If the first application-aware identifier includes a user identifier, the first network device can determine the user to which the target service flow belongs according to information such as a virtual local area network (virtual local area network, VLAN) or interface of the target service flow, and then can generate an application based on the identifier. The rule generates the user ID of the user to which the target business flow belongs.
  • VLAN virtual local area network
  • Step 406 If the second application-aware identifier matches the first application-aware identifier, the first network device encapsulates the target application-aware identifier in the service packet of the target service flow.
  • the first network device detects that the second application-aware identifier of the target service flow generated by it matches the first application-aware identifier issued by the controller, it can be determined that the target service flow is the second application-aware identifier.
  • a service flow indicated by an application-aware identifier Since the second application-aware identifier is generated by the first network device based on the identifier generation rule issued by the controller, it can ensure that it matches the first application-aware identifier issued by the controller exactly, that is, it ensures that the first network device identifies the target reliability of business flow.
  • the first network device may also encapsulate the target application-aware identifier in the service packet of the target service flow.
  • the target application-aware identifier may be the first application-aware identifier delivered by the controller, or may be the second application-aware identifier generated by the first network device.
  • the first network device may encapsulate the target application awareness identifier in the destination address field, HBH, DOH or SRH of the service packet.
  • the SRH includes a BSID field, and the first network device may encapsulate the target application awareness identifier in the BSID field.
  • the first network device may also encapsulate the target application awareness identifier in the flow detection information.
  • the flow detection information is IFIT information
  • the first network device may encapsulate the target application awareness identifier in the flow identifier field or reserved field in the IFIT information.
  • the network device 02a may generate the second application-aware identifier of the target service flow based on the identifier generation rule sent by the controller 01 . Assuming that the second application-aware identifier generated by network device 02a is APN ID1, since the second application-aware identifier is the same as the first application-aware identifier APN ID1 in the correspondence shown in Table 1, network device 02a can Encapsulate APN ID1 in the service packet of the For example, the network device 02a may encapsulate APN ID1 in the BSID field of the service message.
  • the structure of the target application-aware identifier encapsulated in the service message can be shown in Figure 3.
  • the target application-aware identifier can include: SLA level, application identifier, user identifier and flow identifier .
  • the structure of the target application-aware identifier encapsulated in the service message may be shown in Figure 8.
  • the target application-aware identifier may include: SLA level, application identifier, user identifier, flow Identification and parameters (arguments) field.
  • the arguments field may indicate the service requirement of the target service flow, for example, may indicate the upper limit of delay and/or upper limit of packet loss rate of the target service flow.
  • the target application awareness identifier may be encapsulated in an arguments field of a segment identifier (segment ID, SID) in the SRv6 message.
  • SID segment ID
  • the SID in the SRv6 packet includes a locator address (locator address) field, a function ID (function ID) field, and an arguments field.
  • the arguments field may encapsulate the target application-aware identifier as shown in FIG. 3 or FIG. 8 .
  • the matching of the second application-aware identifier generated by the first network device with the first application-aware identifier issued by the controller may refer to: the second application-aware identifier is the same as the first application-aware identifier, or may be It means that the second application-aware identifier is different from the first application-aware identifier, but has a certain corresponding relationship.
  • the corresponding relationship between the application-aware IDs can be delivered by the controller, that is, the controller can issue the identification generation rules and the corresponding relationship between the application-aware IDs to ensure that the controller and the network device generate Application-aware identity synchronization.
  • the controller may deliver the correspondence between the first application-aware identifier and other application-aware identifiers that match the first application-aware identifier to the first network device, and the first network device may determine its corresponding relationship based on the correspondence issued by the controller. Whether the generated second application-aware identifier matches the first application-aware identifier.
  • the first network device may also report the difference between the second application-aware identifier and the first application-aware identifier to the controller. correspondence, so that the controller can also learn the application-aware identifier of the target service flow generated on the network device side. For example, assuming that for the service flow of a video conferencing APP, the first application awareness identifier generated by the controller is APN11, and the second application awareness identifier generated by the first network device is APN12, then the second network device can report APN12 and APN11 to the controller. corresponding relationship.
  • Step 407 the first network device forwards the service packet of the target service flow to the second network device.
  • the first network device may forward the service packet encapsulated with the target application awareness identifier to the second network device.
  • the second network device may refer to a head-end network device of the first network service.
  • the first network device 02a may forward the service packet encapsulated with the target application-aware identifier to the second network device 02b.
  • Step 408 If the second network device determines that the received target service flow is the service flow indicated by the first application-aware identifier, then use the first network service to forward the service packet of the target service flow according to the corresponding relationship.
  • the second network device may identify the received service flow based on the application-aware identifier encapsulated in the service packet of the service flow. If the second network device detects that the target application-aware identifier in the service packet of the target service flow matches the first application-aware identifier, it may determine that the target service flow is the service flow indicated by the first application-aware identifier. Further, the second network device can use the first network service to forward the service packet of the target service flow based on the corresponding relationship issued by the controller.
  • the network device 02b i.e., the second network device
  • the network device 02b is based on the APN ID shown in Table 1.
  • the corresponding relationship may determine that the first network service allocated by the controller 01 to the target service flow is the SRv6 path indicated by BSID1. Therefore, the network device 02b can use the SRv6 path indicated by BSID1 to forward the service packet of the target service flow.
  • the controller may only issue the corresponding relationship to the second network device in the above step 403, and the above step 404 to step 406 It can be deleted according to the situation, that is, the first network device does not need to identify the target service flow and encapsulate the target application-aware identifier.
  • the second network device may also identify whether the target service flow is the service flow indicated by the first application-aware identifier by means of packet parsing or traffic feature analysis.
  • the application to which the target service flow belongs can encapsulate the application-aware identifier of the target service flow in the service packet when sending the target service flow
  • the second network device can encapsulate the application-aware identifier based on the application to which the target service flow belongs , identifying whether the target service flow it receives is the service flow indicated by the first application-aware identifier.
  • the above step 407 can be deleted.
  • the above step 404 may be executed synchronously with step 403, that is, the controller may issue the identification generation rule while issuing the corresponding relationship to the second network device (or the first network device).
  • the above step 405 can be deleted according to the situation, that is, the second network device (or the first network device) does not need to generate the second application-aware identifier, but can identify its Whether the received service flow is the service flow indicated by the first application awareness identifier.
  • the above step 406 may also be deleted according to circumstances, that is, the second network device (or the first network device) may also not need to encapsulate the target application awareness identifier in the service packet of the target service flow.
  • the controller can obtain the corresponding relationship between the application-aware identifier of the service flow and the network service required to transmit the service flow, and send the corresponding relationship to the Network equipment. Further, when the network device recognizes that the service flow is the service flow indicated by the application-aware identifier, it can directly use the corresponding network service to forward the message of the service flow. Since the controller can establish and deliver the corresponding relationship between the application-aware identifier of the service flow and the network service, the network device can directly forward the service message of the service flow based on the corresponding relationship, thus effectively improving the flexibility of service message forwarding.
  • FIG. 10 is a flow chart of another packet forwarding method provided by an embodiment of the present application, and the method may be applied to a communication network such as that shown in FIG. 1 or FIG. 7 .
  • the method includes:
  • step 501 the controller obtains the user requirements of the target service flow.
  • the controller may obtain user requirements of the target service flow through a northbound interface.
  • the northbound interface of the controller can communicate with the service development system, and the controller can obtain the user requirements of the target service flow sent by the service development system.
  • the controller can obtain the user requirements of the target service flow sent by the service development system.
  • Step 502 the controller generates a first application-aware identifier of the target service flow based on the user requirement.
  • the first application-aware identifier is used for encapsulation in the service packet of the target service flow, and the first application-aware identifier corresponds to the first network service, for example, corresponds to the identifier of the first network service.
  • the first network service meets user requirements of the target service flow.
  • the first application-aware identifier includes at least one of a user identifier and an application identifier, and may further include at least one of a flow identifier and an SLA level.
  • the first network service may include forwarding paths and/or network slices. For the implementation process of step 502, reference may be made to the related description of step 402 above.
  • Step 503 the controller sends the first application awareness identifier to the first network device.
  • the first network device may be an application-aware edge device in the ANP network, and the first network device may be a BRAS, a PE device, a CPE, or an egress gateway (for example, an egress gateway of a campus), and the like.
  • the first application-aware identifier is used to indicate the user and/or application to which the target service flow belongs, and the first application-aware identifier is used for the first network device to encapsulate in the service packet of the target service flow.
  • Step 504 the controller determines the first network service required to transmit the target service flow based on the user requirement.
  • the controller may calculate, based on the user requirement of the target service flow, a first network service that can meet the user requirement, and the first network service may include network slicing and/or a forwarding path.
  • the first network service may include network slicing and/or a forwarding path.
  • Step 505 the controller sends the correspondence between the first application-aware identifier and the first network service to the second network device.
  • the second network device may refer to the headend network device of the first network service.
  • the corresponding relationship is used for the second network device to determine the first network service for forwarding the service packet of the target service flow based on the first application-aware identifier.
  • the first application-aware identifier and its corresponding first network service identifier may be recorded in the correspondence, that is, the correspondence may be a correspondence between the first application-aware identifier and the first network service identifier.
  • the identifier of the first network service may include an identifier of a network slice.
  • the identifier of the first network service may include an identifier of a forwarding path.
  • the forwarding path may be an SRv6 path
  • the identifier of the forwarding path may be the BSID of the forwarding path, or may be the BSID of the SR policy to which the forwarding path belongs.
  • Step 506 If the target service flow received by the first network device is the service flow indicated by the first application-aware identifier, encapsulate the target application-aware identifier in the service packet of the target service flow.
  • the first network device can identify the service flow it receives. If the first network device recognizes that the target service flow it receives is the service flow indicated by the first application-aware identifier, it may encapsulate the target application-aware identifier in the service packet of the target service flow. Thus, the downstream network device (for example, the second network device) can determine the first network service for forwarding the service packet of the target service flow based on the target application-aware identifier, and/or, can be sent to the controller When reporting the follow-up detection result for the target service flow, the target application awareness identifier is also reported.
  • the downstream network device for example, the second network device
  • the target application-aware identifier may be a first application-aware identifier issued by the controller, or may be a second application-aware identifier of the target service flow generated by the first network device.
  • the first network device encapsulating the target application-aware identifier in the service packet reference may be made to the relevant description of step 406 above, and details are not repeated here.
  • the first network device may identify whether the service flow is the service flow indicated by the first application-aware identifier by means of packet parsing or traffic feature analysis. For example, the first network device may identify whether the service flow is the service flow indicated by the first application-aware identifier by analyzing the four-tuple information, five-tuple information or seven-tuple information of the service packet. Alternatively, the first network device may also use the DPI technology to analyze the service packets of the service flow, and then identify whether the service flow is the service flow indicated by the first application-aware identifier. Alternatively, the first network device may also use an AI model to analyze traffic characteristics of the service flow, and then identify whether the service flow is the service flow indicated by the first application-aware identifier.
  • the controller may issue an identifier generation rule synchronously, and the first network device may generate the second application-aware identifier of the target service flow based on the identifier generation rule. If the second application-aware identifier matches the first application-aware identifier, the first network device may determine that the target service flow it receives is the service flow indicated by the first application-aware identifier. For the process of the first network device generating the second application-aware identifier based on the identifier generation rule delivered by the controller, reference may be made to the relevant descriptions of the above step 404 and step 405, which will not be repeated here.
  • Step 507 the first network device forwards the service packet encapsulated with the target application awareness identifier to the second network device.
  • step 507 For the implementation process of step 507, reference may be made to the related description of step 407 above.
  • Step 508 if the second network device determines that the received target service flow is the service flow indicated by the first application-aware identifier, then use the first network service to forward the service packet of the target service flow according to the corresponding relationship.
  • the second network device If the second network device detects that the target application-aware identifier is encapsulated in the service packet of the target service flow, it can use the first network service corresponding to the target application-aware identifier to forward the target service based on the correspondence issued by the controller. flow of business packets.
  • the second network device For the implementation process of step 508, reference may be made to the related description of step 408 above.
  • the controller may also send the acquired user requirements of the target service flow to the first network device.
  • the first network device may generate the first application-aware identifier of the target service flow based on the user requirement sent by the controller. That is, the above step 503 can be deleted, and the first network device can execute the above step 502. For example, both the controller and the first network device can execute step 502 .
  • the embodiment of the present application provides a packet forwarding method, and the controller or the first network device can generate the first application-aware identifier of the target service flow based on user requirements of the target service flow. Since the first application-aware identifier corresponds to the first network service and is used for the network device to encapsulate the target application-aware identifier in the service packet of the target service flow, it can be ensured that the network device receiving the service packet can The corresponding first network service is used to forward the service message, thereby effectively improving the flexibility of service message forwarding.
  • the method provided in the embodiment of the present application can also generate the application-aware identifier of the service flow through the controller or the first network device, thus effectively enriching the generation method of the application-aware identifier.
  • Fig. 11 is a flowchart of another service flow performance detection method provided by the embodiment of the present application. As shown in Fig. 11, the method includes:
  • step 601 the controller obtains the user requirements of the target service flow.
  • Step 602. Based on the user requirement, the controller obtains the correspondence between the first application-aware identifier of the target service flow and the first network service required for transmitting the target service flow.
  • Step 603 the controller sends the corresponding relationship to the second network device and the third network device respectively.
  • Step 604 the controller sends the upload policy of the target service flow to the second network device and/or the third network device.
  • the sending policy is used to indicate to report the follow-up detection result of the target service flow.
  • the controller may only detect and analyze the transmission performance of some key service flows (including the target service flow), so as to reduce the data processing pressure of the controller.
  • the controller may send the sending policy of the key service flow to the network device to instruct the network device to report the follow-up detection result of the key service flow, and the follow-up detection result of other non-key service flows does not need to be reported.
  • the third network device may be a node in the forwarding path of the target service flow (for example, the forwarding path in the first network service), and the third network device may be a follower of the target service flow The ingress node, forwarding node, or egress node of the flow detection path.
  • the third network device and the second network device may be the same network device or different network devices.
  • the upload policy may include values of one or more fields in the application-aware identifier of the target service flow.
  • the upload policy may include one or more of the following information: the application identifier of the application to which the target service flow belongs, the user identifier of the user to which the target service flow belongs, the flow identifier of the target service flow, and the SLA of the target service flow grade.
  • the controller 01 can issue the sending policy of the target service flow to the network devices 02b, 02c and 02d respectively .
  • Step 605 if the second network device determines that the received target service flow is the service flow indicated by the first application-aware identifier, then use the first network service to forward the service packet of the target service flow according to the corresponding relationship.
  • step 605 For the implementation process of step 605, reference may be made to the related description of step 408 above.
  • step 606 the third network device performs follow-up detection on the target service flow to which the service message belongs based on the follow-up detection information in the service message, and obtains a follow-up detection result.
  • the third network device may receive the service packet of the target service flow forwarded by the second network device. If the service message includes follow-up detection information (such as IFIT information), the third network device may perform follow-up detection on the target service flow to which the service message belongs based on the follow-up detection information, and obtain a follow-up detection result.
  • the follow-the-flow detection result may include measurement results of performance indicators such as time delay and/or packet loss number of the target service flow.
  • the follow-up detection information may be encapsulated in the service message by an entry node of the follow-up detection path of the target service flow, and the entry node may be the first network device, or may be the second network device , or may also be a downstream network device of the second network device, for example, may be the third network device. If the ingress node is the third network device, the third network device can encapsulate the follow-up detection information in the service packet of the target service flow, and can perform follow-up detection on the target service flow based on the follow-up detection information, and obtain Flow detection results.
  • Step 607 the third network device sends the follow-up detection result and target application awareness identifier to the controller based on the indication of the upload policy.
  • the third network device may obtain the target application awareness identifier of the target service flow. If the third network device determines, based on the target application-aware identifier and the sending policy, that the target service flow belongs to a critical service flow that needs to report the follow-up detection result, it may send the follow-up detection result and the follow-up detection result of the target service flow to the controller.
  • the target application-aware identifier may be obtained from the third network device.
  • the upload policy of the target service flow may include the values of one or more fields in the application-aware identifier of the target service flow.
  • the third network device may detect whether the value of each field in the upload policy matches the value of the corresponding field in the target application-aware identifier. If the value of each field in the sending policy matches the value of the corresponding field in the target application awareness identifier, the third network device can determine that the target service flow belongs to a critical service flow that needs to report The controller reports the follow-up detection result of the target service flow and the target application awareness identification.
  • the third network device obtains the application-aware identifier of a service flow and detects that the value of any field in the upload policy does not match the value of the corresponding field in the application-aware identifier, the third network device The network device can determine that the service flow is not a critical service flow, and thus does not need to report the follow-up detection result and the application-aware identifier of the service flow.
  • the third network device can only report the follow-up detection results of key service flows based on the sending policy issued by the controller, and does not need to report the follow-up detection results of non-key service flows, it not only reduces the need for the controller to receive and The amount of processed data of the flow detection results reduces the data processing pressure of the controller, and realizes flexible and adjustable reporting granularity of the flow detection results. In addition, since the amount of data of the follow-up detection result to be reported by the third network device is reduced, the transmission resources occupied by the follow-up detection result can also be effectively reduced.
  • the third network device may acquire the target application-aware identifier of the target service flow from a service packet of the target service flow.
  • the target application-aware identifier may be a first application-aware identifier delivered by the controller, or may be a second application-aware identifier generated by a network device.
  • the target application-aware identifier may be encapsulated in the service packet by the application-aware edge device (that is, the first network device mentioned above).
  • the target service flow may be encapsulated in the service packet by the ingress node of the follow-up detection path of the target service flow.
  • the target service flow may be encapsulated in the service packet by the head-end network device (that is, the second network device mentioned above) served by the first network for forwarding the target service flow.
  • it may also be encapsulated in the service message by the application to which the target service flow belongs.
  • the flow identification field of the IFIT information can be encapsulated with the target application awareness identification, that is, the target application awareness identification can replace FlowMonID in IFIT information.
  • the reserved (reserved) field of the IFIT information may encapsulate the target application awareness identifier, that is, the IFIT information may include both the FlowMonID and the target application awareness identifier.
  • the target application-aware identifier of the target service flow is not encapsulated in the service packet of the target service flow received by the third network device.
  • the controller may also deliver the identifier generation rule to the third network device.
  • the third network device After the third network device receives the service packet of the target service flow, it can generate the second application-aware identifier of the target service flow based on the identifier generation rule issued by the controller.
  • the above-mentioned target application-aware The identifier may be a second application-aware identifier generated by the third network device. For the process of generating the second application-aware identifier by the third network device, reference may be made to step 405 above.
  • the controller may also deliver the correspondence between the first application awareness identifier and the first network service to the third network device.
  • the third network device may determine that the target service flow is the service flow indicated by the first application-aware identifier through packet parsing or traffic feature analysis. That is, the third network device may determine the application-aware identifier of the target service flow as the first application-aware identifier by means of packet parsing or traffic feature analysis.
  • the above-mentioned target application awareness identifier may also be the first application awareness identifier issued by the controller.
  • the third network device may, after obtaining the target application awareness identifier of the target service flow, The service packet of the target service flow encapsulates the target application-aware identifier, and forwards the service packet encapsulated with the target application-aware identifier.
  • the third network device may encapsulate the target application-aware identifier in the flow identifier field or reserved field of the IFIT information.
  • the third network device may also encapsulate the target application awareness identifier in the destination address field, HBH, DOH or SRH of the service packet.
  • the third network device can also perceive the target application The identifier is taken from the original encapsulation position and re-encapsulated in the stream identifier field or reserved field of the IFIT information. Afterwards, the third network device may forward the re-encapsulated service packet.
  • Step 608 the controller analyzes the transmission performance of the target service flow based on the flow-by-flow detection result and the target application perception identification.
  • the controller after the controller receives the follow-up detection result and the target application awareness identifier sent by the third network device, it can analyze the transmission of the target service flow at the granularity indicated by at least one of the target application awareness identifiers. performance.
  • the transmission performance may be represented by performance indicators such as packet loss rate and/or time delay.
  • the controller may receive a flow-based detection result reported by at least one third network device in the flow-based detection path of the target service flow, and the controller may analyze the flow-based detection result based on at least one received flow-based detection result The transmission performance of the target traffic flow.
  • the at least one third network device may include an ingress node, an intermediate node and/or an egress node in the flow detection path.
  • the controller can implement end-to-end detection of the transmission performance of the target service flow; if the at least one third network device includes an ingress node, an intermediate node and the egress node, the controller can implement hop-by-hop detection of the transmission performance of the target service flow.
  • the controller can receive the flow-based detection results and application-aware identifiers of different service flows reported by different network devices, and the controller can determine the flow-based detection results of the same service flow based on the application-aware identifiers, and then based on One or more follow-up detection results of the same service flow analyze the transmission performance of the service flow.
  • the target service flow indicated by the target application-aware identifier may be a specific data flow, or may also be a group of data flows, that is, the target service flow may include multiple data flows.
  • the group of data streams may include data streams of different applications used by the same user, or data streams of different users under the same application. If the target service flow is a group of data flows, the controller can analyze the transmission performance of each data flow in the group of service flows according to the received flow detection results, or can analyze the overall transmission performance of the group of service flows , which can also be called the average transmission performance.
  • the third network device when it sends the result of the follow-up flow detection and the target application awareness identifier to the controller, it may also report the corresponding follow-up flow detection flow identifier.
  • the flow ID detected along with the flow may be obtained from the information detected along with the flow, for example, the flow ID detected along with the flow may be a monitored flow ID (FlowMonID) in the IFIT information.
  • the flow identifier of the follow-up detection may indicate a monitored data flow in the target service flow, or it may be understood that: the follow-up detection result is a detection result for the data flow indicated by the flow detection flow identifier.
  • the controller can determine at least one data flow included in the target service flow based on the corresponding relationship between the target application-aware identifier and the flow identifier detected along with the flow; The transmission performance of at least one data stream of .
  • the controller can also generate the target application awareness identifier and Correspondence between multiple stream IDs detected along with the stream.
  • the controller may analyze the transmission performance of each monitored data flow included in the target service flow. Afterwards, the controller may also determine the overall transmission performance (for example, the average transmission performance) of the target service flow based on the transmission performance of each monitored data flow. For example, the controller may calculate the packet loss rate of each monitored data flow in the target service flow, and use the average value of the packet loss rates of the monitored data flows as the average packet loss rate of the target service flow.
  • Step 609 the controller displays the performance index of the target service flow according to the target granularity.
  • the performance index is used to indicate the transmission performance of the target service flow, for example, the performance index may include at least one of packet loss rate and time delay.
  • the target granularity is the granularity indicated by at least one identifier in the target application-aware identifier. Since the target application-aware identifier may include at least one of a user identifier and an application identifier, the controller can display service flow performance indicators at the granularity of users and/or applications. If the target application-aware identifier also includes a flow identifier (ie session ID) and an SLA level, the controller can also display the performance indicators of the service flow at the granularity of the flow identifier and/or the SLA level.
  • a flow identifier ie session ID
  • SLA level the controller can also display the performance indicators of the service flow at the granularity of the flow identifier and/or the SLA level.
  • the target granularity can be flexibly configured and adjusted based on requirements of application scenarios, for example, it can be configured and adjusted by operation and maintenance personnel.
  • the controller can display the performance index of at least one service flow of each user in one or more users in units of users. Wherein, for each user, the controller may display the performance indicator of each service flow of the user (for example, the service flow of each application used by the user), or may display the performance indicators of multiple service flows of the user mean.
  • the controller can display the performance index of at least one service flow of each application in one or more applications in units of applications. Wherein, for each application, the controller can display the performance index of each service flow of the application (for example, the service flow of each user using the application), or can display the average value of the performance indicators of multiple service flows of the application .
  • the mean can be an arithmetic mean, a root mean square mean or a weighted mean.
  • the controller can display the performance index of at least one service flow with the same user ID and the same application ID in units of user and application.
  • the controller has acquired the follow-up detection results of three service flows from service flow 1 to service flow 3, and the application-aware identifiers of the three service flows are shown in Table 2. If the target granularity is user granularity, and the user ID of the target user whose performance indicators need to be displayed is UID1, the controller can display the performance indicators of service flow 1 and service flow 2 respectively, or the controller can calculate and display the service flow 1 and service flow 2 The mean value of the performance indicators of service flow 2.
  • the controller can display the performance indicators of service flow 1 and service flow 3 respectively, or the controller can calculate and display the service flow 1 and the mean value of the performance index of service flow 3.
  • the controller can display the performance indicator of the service flow 2.
  • the application-aware identifier of the service flow can include information of multiple different dimensions of the service flow
  • the performance index of the service flow can be displayed at the granularity indicated by the identifier in the application-aware identifier, which can realize the refinement of the performance index Visible.
  • the display granularity of the performance index can also be flexibly adjusted according to requirements, thereby effectively improving the flexibility of displaying the performance index.
  • step 610 if the controller determines that the first network service does not meet the user requirements of the target service flow based on the transmission performance, then determine that the network service required to transmit the target service flow is the second network service.
  • the controller can determine that the target service flow is the first application-aware identifier indicated business flow. Furthermore, the controller can determine the user requirements of the target service flow, and can detect whether the transmission performance meets the user requirements of the target service flow based on the analyzed transmission performance of the target service flow. If the controller determines that the transmission performance of the target service flow does not meet the user requirements of the target service flow, it can also recalculate the second network service that can meet the user requirements of the target service flow, that is, the controller can transfer the network service of the target service flow to The service is updated from the first network service to the second network service.
  • Step 611 the controller sends the correspondence between the first application-aware identifier and the second network service to the second network device.
  • the controller may re-deliver the correspondence between the first application-aware identifier and the second network service to the second network device, for example, may issue the correspondence between the first application-aware identifier and the identifier of the second network service.
  • the second network device After receiving the corresponding relationship, the second network device can use the second network service to forward the service packet of the target service flow.
  • the controller can analyze the transmission performance of the target service flow based on the flow-by-flow detection results during the transmission of the target service flow, and adjust the network service allocated for the target service flow in time based on the transmission performance, thus realizing the network resources
  • the closed-loop dynamic optimization effectively ensures the transmission performance of the target service flow.
  • the controller 01 may issue the correspondence between APN ID1 and BSID2 to the network device 02b.
  • the network device 02b can then use the SRv6 path indicated by BSID2 to forward the service packets of the target service flow.
  • the controller may also send the first application-aware edge device to the first network device.
  • a corresponding relationship between the identifier and the second network service For example, referring to FIG. 1 , the controller 01 may also send the correspondence between the first application awareness identifier and the second network service to the network device 02a.
  • the third network device does not need to detect whether the target service flow belongs to the critical service flow based on the sending policy, but may directly report the follow-up detection result of the target service flow to the controller and the target application-aware identity. That is to say, if the third network device detects that the service packet includes follow-up detection information, it can perform follow-up detection on the service flow to which the service message belongs based on the follow-up detection information, and directly report the follow-up detection information to the controller. The detection result and the application-aware identification of the service flow.
  • the above step 604 may be deleted according to circumstances, that is, the controller does not need to deliver the sending policy of the target service flow.
  • the third network device does not need to detect whether the target service flow is a key service flow based on the sending policy.
  • the third network device may have an application-aware identifier processing function. If the application-aware identifier processing function is enabled, the third network device may detect the target service based on the target application-aware identifier and the sending policy. Whether the flow is a business-critical flow. If the application-aware identifier processing function is not enabled, the third network device does not need to detect whether the target service flow is a critical service flow based on the sending policy.
  • the third network device may enable or disable its application-aware identifier processing function based on the received configuration instruction.
  • the configuration instruction may be delivered by the controller, or may be directly configured by operation and maintenance personnel.
  • the third network device may first detect whether the target service flow is a critical service flow based on the sending policy. If the third network device determines that the target service flow is a key service flow, it may perform the above step 606 to obtain a follow-up detection result of the target service flow. If the third network device determines that the target service flow is not a critical service flow, step 606 does not need to be performed, that is, the third network device does not need to perform follow-up detection on non-critical service flows.
  • the controller may send the sending policy of the target service flow to each node in the follow-up detection path of the target service flow in the above step 601 . Then each node in the flow-following detection path can detect whether the received service flow is a key service flow based on the method shown in step 607 above.
  • the controller may only send the upload policy of the target service flow to the application-aware edge device (that is, the first network device).
  • the first network device may determine that the target service flow belongs to a key service flow that needs to report the result of follow-up detection based on the target application-aware identifier of the target service flow and the sending policy, and may add Tag information.
  • a network device downstream of the first network device (for example, a third network device) may further determine that the target service flow is a key service flow based on the tag information.
  • the third network device may directly determine whether the service flow to which the service packet belongs is a key service flow based on the tag information in the service packet.
  • the execution order of the steps in the above message forwarding method can be adjusted according to the situation, and the steps can also be increased or decreased according to the situation.
  • the above step 604 can be performed before step 603; or, the above step 609 can be deleted according to the situation; or, the above step 610 and step 611 can be performed before the step 609; or, the above step 610 and step 611 can be according to the situation delete.
  • the embodiment of the present application provides a packet forwarding method.
  • the network device reports the follow-up detection result of the target service flow to the controller, it can also report the target application awareness identifier of the target service flow.
  • the controller can then detect and analyze the transmission performance of the service flow at the granularity indicated by at least one of the target application-aware identifiers, thereby effectively improving the flexibility of detecting and analyzing the transmission performance of the service flow.
  • the controller can also display the performance index of the service flow according to the granularity indicated by at least one of the target application-aware identifiers, the refined and flexible visualization of the performance index is realized.
  • Fig. 13 is a schematic structural diagram of a controller provided by an embodiment of the present application.
  • the controller can be applied to a communication network such as that shown in Fig. 1 or Fig. 7, and can implement the above-mentioned Fig. 2, Fig. 6, Fig. 10 or Fig. Steps performed by the controller in the embodiment shown in 11.
  • the controller includes:
  • the generation module 011 is configured to obtain the correspondence between the first application-aware identifier of the target service flow and the first network service required for transmitting the target service flow based on user requirements of the target service flow.
  • the generating module 011 For the function implementation of the generating module 011, reference may be made to the relevant descriptions of step 101, step 402 or step 602 in the above method embodiments.
  • a sending module 012 configured to send the corresponding relationship to a second network device, where the corresponding relationship is used for the second network device to determine, based on the first application-aware identifier, the first Internet service.
  • the sending module 012 For the function implementation of the sending module 012, reference may be made to the relevant descriptions of step 102, step 403, step 505 or step 603 in the above method embodiments.
  • the correspondence includes an identifier of the first network service, and the identifier of the first network service includes: a binding segment identifier and/or an identifier of a network slice.
  • the first application-aware identifier includes at least one of a user identifier and an application identifier.
  • the first application-aware identifier further includes at least one of a flow identifier, an SLA level, and a service requirement.
  • the sending module 012 is further configured to send an identifier generation rule to the second network device, so that the second network device generates a second application-aware identifier of the target service flow based on the identifier generation rule, and the second The application-aware identifier is used to match the first application-aware identifier to determine the first network service.
  • the function of the sending module 012 reference may also be made to the relevant description of step 404 in the above method embodiment.
  • the sending module 012 is further configured to send the first application-aware identifier of the target service flow to the first network device, and the first application-aware identifier is used by the first network device if it determines that the received service flow For the target service flow, the application-aware identifier of the target service flow is encapsulated in the service packet of the target service flow.
  • the function of the sending module 012 reference may also be made to the relevant description of step 503 in the above method embodiment.
  • the controller may further include: an obtaining module 013, configured to obtain user requirements of the target service flow through a northbound interface.
  • an obtaining module 013 configured to obtain user requirements of the target service flow through a northbound interface.
  • controller may also include:
  • the receiving module 014 is configured to receive the flow detection result sent by the third network device and the target application awareness identification, the target application awareness identification is the application awareness identification of the service flow to which the flow detection result belongs, and the target application awareness identification is the The first application-aware identifier or the second application-aware identifier of the target service flow generated by the network device.
  • the target application awareness identification is the application awareness identification of the service flow to which the flow detection result belongs
  • the target application awareness identification is the The first application-aware identifier or the second application-aware identifier of the target service flow generated by the network device.
  • the analysis module 015 is configured to analyze the transmission performance of the target service flow based on the flow-by-flow detection result and the target application perception identification.
  • the analysis module 015 reference may be made to the relevant description of step 608 in the above method embodiment.
  • the controller may also include:
  • a display module 016 configured to display the performance index of the target service flow according to the target granularity, where the performance index is used to indicate the transmission performance of the target service flow; wherein, the target granularity is the granularity indicated by at least one identifier in the target application perception identifier .
  • step 609 for the function implementation of the display module 016, reference may be made to the relevant description of step 609 in the above method embodiment.
  • the generation module 011 is further configured to determine, based on the transmission performance of the target service flow, that the first network service does not meet the user requirements of the target service flow, and determine that the network service required to transmit the target service flow is the first 2.
  • Network services For the function implementation of the generation module 011, reference may be made to the relevant description of step 610 in the above method embodiment.
  • the sending module 012 is further configured to send the correspondence between the first application awareness identifier and the second network service to the second network device.
  • the function of the sending module 012 reference may also be made to the relevant description of step 611 in the above method embodiment.
  • the sending module 012 is further configured to, before the receiving module 014 receives the flow detection result and target application awareness identifier sent by the third network device, send the The upload policy of the target service flow, which is used to instruct to report the follow-up detection result of the target service flow.
  • the upload policy of the target service flow which is used to instruct to report the follow-up detection result of the target service flow.
  • the receiving module 014 may be configured to receive the flow detection result sent by the third network device, the target application perception identifier and the corresponding flow detection flow identifier, which is also called the monitoring flow identifier , which can be used to indicate a monitored data flow in the target service flow.
  • the analysis module 015 may be configured to determine at least one data flow included in the target service flow based on the corresponding relationship between the target application perception identifier and the flow identifier detected along with the flow; The transmission performance of at least one data stream of .
  • the user requirements of the target service flow include one or more of the following requirements: a requirement for a specified forwarding path, a requirement for a specified network slice, and a requirement for a performance index of transmission performance.
  • the embodiment of the present application provides a controller, which can obtain the correspondence between the application-aware identifier of the service flow and the network service required to transmit the service flow, and deliver the correspondence to the network equipment. Further, when the network device recognizes that the service flow is the service flow indicated by the application-aware identifier, it can directly use the corresponding network service to forward the message of the service flow. Since the controller can establish and deliver the corresponding relationship between the application-aware identifier of the service flow and the network service, the network device can directly forward the service message of the service flow based on the corresponding relationship, thus effectively improving the flexibility of service message forwarding.
  • FIG. 15 is a schematic structural diagram of a network device provided by an embodiment of the present application.
  • the network device can be applied to a communication network such as that shown in FIG. 1 or FIG. 7 .
  • the network device may be the network device 02a, 02c or 02d in FIG. 1 or FIG. 7 , or may be the network device 02b shown in FIG. 1 .
  • the network device may implement the steps performed by at least one network device among the second network device, the first network device, and the third network device in the above embodiments shown in FIG. 2 , FIG. 6 , FIG. 10 or FIG. 11 .
  • the network equipment includes:
  • the receiving module 021 is configured to receive the correspondence between the first application-aware identifier and the first network service sent by the controller in the network, wherein the first application-aware identifier is generated by the controller based on user requirements of service flows.
  • the receiving module 021 reference may be made to the relevant descriptions of step 102, step 403, step 505 or step 603 in the above method embodiments.
  • the sending module 022 is configured to use the first network service to forward the service packets of the target service flow according to the corresponding relationship if the received target service flow is the service flow indicated by the first application-aware identifier.
  • the sending module 022 reference may be made to the relevant descriptions of step 103, step 408, step 508 or step 605 in the above method embodiments.
  • the network device may also include:
  • An obtaining module 023 configured to obtain the second application-aware identifier of the target service flow from the service packet of the target service flow.
  • the determining module 024 is configured to determine that the target service flow is the service flow indicated by the first application-aware identifier if the second application-aware identifier matches the first application-aware identifier.
  • the service message received by the network device includes IFIT information
  • the second application-aware identifier is encapsulated in the flow identification field or reserved field of the IFIT information; or, the destination address field of the service message, the HBH , DOH or SRH to encapsulate the second application-aware identifier.
  • the second application-aware identifier is encapsulated in the BSID field of the SRH field.
  • the receiving module 021 may also be configured to receive the identification generation rule sent by the controller.
  • the receiving module 021 reference may also be made to the relevant description of step 404 in the above method embodiment.
  • the network device may also include:
  • a generating module 025 configured to generate a second application-aware identifier of the target service flow based on the identifier generation rule.
  • the generating module 025 For the function implementation of the generating module 025, reference may be made to the relevant description of step 405 in the above method embodiment.
  • the determining module 024 is configured to determine that the target service flow is the service flow indicated by the first application-aware identifier if the second application-aware identifier matches the first application-aware identifier.
  • the determination module 024 For the function implementation of the determination module 024, reference may be made to the relevant description of step 406 in the above method embodiment.
  • the service packet received by the network device includes IFIT information; the sending module 022 may be configured to encapsulate the target application awareness identifier in the flow identifier field or reserved field of the IFIT information, and adopt the first A network service forwards the service packet encapsulated with the target application-aware identifier.
  • the function implementation of the sending module 022 can also refer to the related description of step 406 or step 506 in the above method embodiment.
  • the network device may also include:
  • the detection module 026 is configured to perform follow-up detection on the target service flow based on the follow-up detection information if the service message of the target service flow received by the receiving module 021 includes follow-up detection information, and obtain a follow-up detection result .
  • the detection module 026 For the function implementation of the detection module 026, reference may be made to the relevant description of step 606 in the above method embodiment.
  • the sending module 022 is further configured to send the follow-up detection result and target application awareness identifier to the controller, where the target application awareness identifier is the first application awareness identifier or the second application of the target service flow acquired by the network device Perceptual identity.
  • the target application awareness identifier is the first application awareness identifier or the second application of the target service flow acquired by the network device Perceptual identity.
  • the receiving module 021 may also be configured to receive the sending strategy of the target service flow sent by the controller, where the sending strategy is used to instruct to report the follow-up detection result of the target service flow.
  • the sending strategy is used to instruct to report the follow-up detection result of the target service flow.
  • the sending module 022 may be configured to send the follow-up detection result and target application awareness identifier to the controller based on the indication of the upload strategy.
  • the sending module 022 may be configured to send the follow-up detection result, the target application awareness identifier, and the corresponding follow-up detection flow identifier to the controller.
  • the flow identification detected along with the flow may be used to indicate a monitored data flow in the target service flow.
  • the embodiment of the present application provides a network device, which can receive the correspondence between the application-aware identifier of the service flow delivered by the controller and the network service required to transmit the service flow, and can identify the When the outgoing service flow is the service flow indicated by the application-aware identifier, the corresponding network service is directly used to forward the message of the service flow. Since the controller can establish and deliver the corresponding relationship between the application-aware identifier of the service flow and the network service, the network device can directly forward the service message of the service flow based on the corresponding relationship, thus effectively improving the flexibility of service message forwarding.
  • Fig. 17 is a schematic structural diagram of a message forwarding device provided by an embodiment of the present application.
  • the message forwarding device can be applied to a communication network such as that shown in Fig. 1 or Fig. 7, and can implement the above-mentioned embodiment shown in Fig. 4 in the steps.
  • the message forwarding device includes:
  • the generating module 001 is configured to generate a first application-aware identifier of the target service flow based on user requirements of the target service flow, and the first application-aware identifier is used by the network device to encapsulate the target application-aware identifier in the service packet of the target service flow,
  • the target application-aware identifier is the first application-aware identifier, or a second application-aware identifier that matches the first application-aware identifier, the first application-aware identifier corresponds to a first network service, and the first network service satisfies the target User requirements for business flows.
  • the generating module 001 For the function implementation of the generating module 001, reference may be made to the relevant description of step 201 in the above method embodiment.
  • the sending module 002 is configured to send the first application-aware identifier, and the first application-aware identifier is used for the network device to forward the service packet of the target service flow by using the first network service.
  • the sending module 002 For the function implementation of the sending module 002, reference may be made to the relevant description of step 202 in the above method embodiment.
  • the message forwarding device can be applied to a controller in a communication network such as that shown in FIG. 1 or FIG. 7, and can also implement the above-mentioned embodiment shown in FIG. 6, FIG. Steps performed by the controller.
  • the generating module 001 may be configured to generate a first application-aware identifier of the target service flow based on the acquired user requirements of the target service flow.
  • a first application-aware identifier of the target service flow based on the acquired user requirements of the target service flow.
  • the sending module 002 is configured to send the first application-aware identifier to the first network device, so that the first network device encapsulates the target application-aware identifier in a service packet of the target service flow.
  • the function implementation of the sending module 002 can also refer to the relevant description of step 503 in the above method embodiment.
  • the device may also include:
  • the acquisition module 003 is configured to acquire the user requirements of the target service flow through the northbound interface.
  • the acquisition module 003 reference may be made to the relevant descriptions of step 401, step 501 or step 601 in the above method embodiments.
  • the generating module 001 is further configured to determine the first network service required for transmitting the target service flow based on user requirements of the target service flow.
  • the generating module 001 For the function implementation of the generating module 001, reference may also be made to the relevant description of step 503 in the above method embodiment.
  • the sending module 002 is further configured to send the correspondence between the first application-aware identifier and the first network service to the second network device, and the correspondence is used for the second network device to determine based on the first application-aware identifier
  • the first network service for forwarding the service packets of the target service flow.
  • the device may also include:
  • the receiving module 004 is configured to receive the follow-up detection result and target application awareness identifier sent by the third network device.
  • the receiving module 004 For the function implementation of the receiving module 004, reference may be made to the relevant description of step 607 in the above method embodiment.
  • An analysis module 005 configured to analyze the transmission performance of the target service flow based on the flow-by-flow detection result and the target application-aware identification.
  • the analyzing module 005 For the function implementation of the analyzing module 005, reference may be made to the relevant description of step 608 in the above method embodiment.
  • the device may also include:
  • the display module 006 is configured to display the performance index of the target service flow according to the target granularity, and the performance index is used to indicate the transmission performance of the target service flow; wherein, the target granularity is the granularity indicated by at least one identifier in the target application perception identifier.
  • the display module 006 For the function realization of the display module 006, reference may be made to the relevant description of step 609 in the above method embodiment.
  • the receiving module 004 may be configured to receive the flow detection result sent by the third network device, the target application perception identifier and the corresponding flow detection flow identifier;
  • the analysis module 005 may be configured to determine at least one data flow included in the target service flow based on the corresponding relationship between the target application perception identifier and the flow identifier detected with the flow, and analyze the target service based on the flow detection result The transport capability of at least one data stream included in the flow.
  • the generating module 001 may also be configured to determine that the first network service does not meet the user requirements of the target service flow based on the transmission performance of the target service flow, and determine that the network service required to transmit the target service flow is the second 2.
  • Network services For the function implementation of the generation module 001, reference may also be made to the relevant description of step 610 in the above method embodiment.
  • the sending module 002 may also be configured to send the correspondence between the first application-aware identifier and the second network service to the second network device.
  • the sending module 002 may also be configured to send the correspondence between the first application-aware identifier and the second network service to the second network device.
  • the function of the sending module 002 reference may also be made to the relevant description of step 611 in the above method embodiment.
  • the sending module 002 may also be configured to send the first network device and/or the third network device before the receiving module 004 receives the flow detection result and the target application awareness identifier sent by the third network device.
  • the sending strategy of the target service flow where the sending strategy is used to indicate to report the follow-up detection result of the target service flow.
  • the function of the sending module 002 reference may also be made to the relevant description of step 604 in the above method embodiment.
  • the message forwarding device can be applied to network devices in the communication network shown in Figure 1 or Figure 7, and can also implement the above-mentioned embodiments shown in Figure 6, Figure 10 or Figure 11 Steps performed by at least one network device among the second network device, the first network device, and the third network device.
  • the generating module 001 may be configured to generate a first application-aware identifier of the target service flow based on user requirements of the target service flow sent by the controller.
  • the generating module 001 may also be made to the relevant description of the above-mentioned step 502.
  • the sending module 002 may be configured to encapsulate the first application-aware identifier in the service packet of the target service flow, and forward the service packet encapsulated with the first application-aware identifier.
  • the function of the sending module 002 reference may also be made to the relevant descriptions of step 506 and step 507 in the above method embodiments.
  • the apparatus may further include:
  • the detection module 007 is configured to perform follow-up detection on the target service flow based on the follow-up detection information, and obtain a follow-up detection result.
  • the detection module 007 For the function realization of the detection module 007, reference may be made to the relevant description of step 606 in the above method embodiment.
  • the sending module 002 may also be configured to send the follow-up detection result and the first application awareness identifier to the controller.
  • the sending module 002 may also be configured to send the follow-up detection result and the first application awareness identifier to the controller.
  • the function of the sending module 002 reference may also be made to the relevant description of step 607 in the above method embodiment.
  • the device may also include:
  • the receiving module 008 is configured to receive the sending strategy of the target service flow sent by the controller, where the sending strategy is used to instruct to report the follow-up detection result of the target service flow.
  • the sending strategy is used to instruct to report the follow-up detection result of the target service flow.
  • the sending module 002 may be configured to send the follow-up detection result and the first application awareness identifier to the controller based on the indication of the sending strategy.
  • the sending module 002 may be configured to send the follow-up detection result, the first application-aware identifier, and a corresponding follow-up detection flow identifier to the controller.
  • the sending module 002 may be configured to encapsulate the first application-aware identifier in the flow identification field or reserved field of the IFIT information of the service message; or, in the destination address field, HBH, The first application-aware identifier is encapsulated in the DOH or SRH.
  • the user requirements of the target service flow include one or more of the following requirements: a requirement for a specified forwarding path, a requirement for a specified network slice, and a requirement for a performance index of transmission performance.
  • the target application-aware identifier includes at least one of a user identifier and an application identifier.
  • the embodiment of the present application provides a packet forwarding device, which can generate a first application-aware identifier based on user requirements of a target service flow. Since the first application-aware identifier corresponds to the first network service and is used for encapsulation in the service packet of the target service flow, it can be ensured that the network device receiving the service packet can use the corresponding first network service to The service message is forwarded, thereby effectively improving the flexibility of service message forwarding.
  • FIG. 20 is a schematic structural diagram of a network device provided by an embodiment of the present application.
  • the network device can be applied to a communication network such as that shown in FIG. 1 or FIG. 7 .
  • the network device may be the network device 02a, 02c or 02d in FIG. 1 or FIG. 7 , or may be the network device 02b shown in FIG. 1 .
  • the network device can implement the steps in the embodiment shown in FIG. 4 above, or implement at least one of the second network device, the first network device, and the third network device in the embodiment shown in FIG. The steps performed by a network device.
  • the network equipment includes:
  • the receiving module 021 is configured to receive the first application-aware identifier sent by the controller, the first application-aware identifier is generated based on the user requirements of the service flow, and the first application-aware identifier corresponds to the first network service, and the first network service Satisfy the user needs of the business flow.
  • the receiving module 021 For the function implementation of the receiving module 021, reference may be made to the relevant description of step 503 in the above method embodiment.
  • the encapsulating module 027 is configured to encapsulate the target application-aware identifier in the service packet of the target service flow if the received target service flow is the service flow indicated by the first application-aware identifier, and the target application-aware identifier is the first application-aware identifier An application-aware identifier, or a second application-aware identifier that matches the first application-aware identifier.
  • the encapsulation module 027 For the function implementation of the encapsulation module 027, reference may be made to the relevant description of step 506 in the above method embodiment.
  • the sending module 022 is configured to forward the service message encapsulated with the target application-aware identifier.
  • the function of the sending module 022 reference may be made to the relevant description of step 507 in the above method embodiment.
  • the service packet of the target service flow received by the network device includes follow-up detection information, as shown in FIG. 20, the network device may also include:
  • the detection module 026 is configured to perform flow detection on the target service flow based on the flow detection information, and obtain a flow detection result; the function implementation of the detection module 026 can refer to the relevant description of step 606 in the above method embodiment.
  • the sending module 022 is further configured to send the follow-up detection result and the target application awareness identifier to the controller.
  • the function of the sending module 022 reference may be made to the relevant description of step 607 in the above method embodiment.
  • the sending module 022 may be configured to send the follow-up detection result, the target application awareness identifier, and the corresponding follow-up detection flow identifier to the controller.
  • the encapsulation module 027 may be used to encapsulate the target application awareness identifier in the flow identification field or reserved field of the IFIT information of the service message; or, in the destination address field, HBH, DOH Or encapsulate the target application-aware identifier in the SRH.
  • the receiving module 021 may be configured to receive the correspondence between the first application-aware identifier and the first network service sent by the controller; the function realization of the receiving module 021 may also refer to step 403, Related description of step 505 or step 603.
  • the sending module 022 may be configured to use the first network service to forward the service message encapsulated with the target application awareness identifier.
  • the sending module 022 reference may be made to the relevant descriptions of step 408, step 508 or step 605 in the above method embodiments.
  • the embodiment of the present application provides a network device that can receive the first application-aware identifier of the target service flow issued by the controller, and encapsulate the first application-aware identifier in the service packet of the target service flow.
  • An application-aware identifier Since the first application-aware identifier corresponds to the first network service, it can be ensured that the network device that receives the service message can use the corresponding first network service to forward the service message, thereby effectively improving the efficiency of service message forwarding. flexibility.
  • FIG. 21 is a schematic structural diagram of a network device provided by an embodiment of the present application.
  • the network device can be applied to a communication network such as that shown in FIG. 1 or FIG. 7 .
  • the network device may be the network device 02a, 02c or 02d in FIG. 1 or FIG. 7 , or may be the network device 02b shown in FIG. 1 .
  • the network device may implement the steps performed by at least one network device among the second network device, the first network device, and the third network device in the above embodiments shown in FIG. 5 , FIG. 6 , FIG. 10 or FIG. 11 .
  • the network equipment includes:
  • the detection module 026 is configured to perform follow-up detection on the target service flow to which the service message belongs based on the follow-up detection information in the service message, and obtain a follow-up detection result.
  • the detection module 026 reference may be made to the relevant descriptions of step 301 and step 606 in the above method embodiments.
  • the sending module 022 is configured to send the follow-up detection result and the target application-aware identifier of the target service flow to the controller in the network, the target application-aware identifier is generated based on user requirements of the target service flow, the follow-up detection result and the target application-aware identifier of the target service flow
  • the target application awareness identification is used for the controller to analyze the transmission performance of the target service flow.
  • the target application-aware identifier is encapsulated in the service message, and the target application-aware identifier is used to indicate the user and/or application to which the target service flow belongs.
  • the flow detection information is IFIT information
  • the target application awareness identifier is encapsulated in the flow identification field or reserved field of the IFIT information.
  • the network device may also include:
  • the receiving module 021 is configured to receive the correspondence between the first application-aware identifier and the first network service sent by the controller, wherein the first application-aware identifier is generated by the controller based on user requirements of service flows.
  • the receiving module 021 reference may be made to the relevant descriptions of step 403, step 505 or step 603 in the above method embodiments.
  • the sending module 022 is further configured to use the first network service to forward the service packets of the target service flow according to the corresponding relationship if the target service flow is the service flow indicated by the first application-aware identifier.
  • the sending module 022 reference may be made to the relevant descriptions of step 408, step 508 or step 605 in the above method embodiments.
  • the receiving module 021 may also be configured to receive the identification generation rule sent by the controller.
  • the receiving module 021 reference may also be made to the relevant description of step 404 in the above method embodiment.
  • a generating module 025 configured to generate a second application-aware identifier of the target service flow based on the identifier generation rule; wherein, the target application-aware identifier is the second application-aware identifier or the first application-aware identifier of the target service flow sent by the controller. App-aware identification.
  • the generating module 025 For the function implementation of the generating module 025, reference may be made to the relevant description of step 405 in the above method embodiment.
  • the flow detection information is IFIT information; as shown in Figure 22, the network device may also include:
  • An encapsulation module 027 configured to encapsulate the target application-aware identifier in the flow identifier field or reserved field of the IFIT information.
  • the encapsulation module 027 For the function implementation of the encapsulation module 027, reference may be made to the relevant description of step 506 in the above method embodiment.
  • the sending module 022 may also be configured to forward the service message encapsulated with the target application-aware identifier.
  • the sending module 022 reference may also be made to the relevant description of step 507 in the above method embodiment.
  • the receiving module 021 may also be configured to receive the sending policy of the target service flow sent by the controller, where the sending policy is used to indicate to report the result of the follow-up detection of the target service flow; the receiving module 021
  • the implementation of the function can also refer to the relevant description of step 604 in the above method embodiment.
  • the sending module 022 is configured to send the follow-up detection result and the target application awareness identifier of the target service flow to the controller based on the indication of the sending strategy.
  • the sending module 022 may be configured to send the follow-up detection result, the target application-aware identifier of the target service flow, and the corresponding flow identifier of the follow-up detection to the controller in the network.
  • the target application-aware identifier includes at least one of a user identifier and an application identifier.
  • the embodiment of the present application provides a network device, which can also report the target application awareness identifier of the target service flow when reporting the follow-up detection result of the target service flow to the controller.
  • the controller can then detect and analyze the transmission performance of the service flow at the granularity indicated by at least one of the target application-aware identifiers, thereby effectively improving the flexibility of detecting and analyzing the transmission performance of the service flow.
  • Fig. 23 is a schematic structural diagram of another controller provided by the embodiment of the present application. This controller can be applied to the communication network shown in Fig. 1 or Fig. 7, and can realize the above-mentioned Fig. 5, Fig. 6, Fig. 10 or The steps performed by the controller in the embodiment shown in FIG. 11 .
  • the controller includes:
  • the receiving module 014 is configured to receive the follow-up detection result and the target application awareness identifier sent by the third network device, the follow-up detection result is obtained by the follow-up detection of the target service flow by the third network device, and the target application perceives The identification is generated based on the user requirements of the target business flow.
  • the receiving module 014 For the function implementation of the receiving module 014, reference may be made to the relevant description of step 607 in the above method embodiment.
  • the analysis module 015 is configured to analyze the transmission performance of the target service flow based on the flow-by-flow detection result and the target application perception identification.
  • the analysis module 015 reference may be made to the relevant description of step 608 in the above method embodiment.
  • the target application-aware identifier includes at least one of a user identifier and an application identifier.
  • the controller may further include:
  • the display module 016 is configured to display the performance index of the target service flow according to the target granularity, and the performance index is used to indicate the transmission performance of the target service flow; wherein, the target granularity is the granularity indicated by at least one identifier in the target application perception identifier.
  • the display module 016 For the function implementation of the display module 016, reference may be made to the relevant description of step 609 in the above method embodiment.
  • controller may also include:
  • the sending module 012 is configured to send the upload strategy of the target service flow to the third network device before the receiving module 014 receives the follow-up detection result and the target application perception identifier sent by the third network device, and the upload strategy uses Instructing to report the follow-up detection result of the target service flow.
  • the function of the sending module 012 reference may also be made to the relevant description of step 604 in the above method embodiment.
  • the receiving module 011 may be configured to receive the flow detection result sent by the third network device, the target application perception identifier, and the corresponding flow detection flow identifier; correspondingly, the analysis module 012 may be used to Determining at least one data flow included in the target service flow based on the corresponding relationship between the target application-aware identifier and the flow identifier detected with the flow; analyzing the transmission performance of at least one data flow included in the target service flow based on the flow-based detection result .
  • the controller may also include:
  • the generating module 011 is configured to obtain a correspondence between a first application-aware identifier of the target service flow and a first network service required for transmitting the target service flow based on user requirements of the target service flow.
  • a first application-aware identifier of the target service flow and a first network service required for transmitting the target service flow based on user requirements of the target service flow.
  • the sending module 012 is further configured to send the corresponding relationship to the second network device, and the corresponding relationship is used for the second network device to determine the first service packet for forwarding the target service flow based on the first application-aware identifier.
  • a network service wherein, the target application-aware identifier is the first application-aware identifier or the second application-aware identifier of the target service flow generated by the network device.
  • the generation module 011 is further configured to determine that the network service required to transmit the target service flow is For the second network service; the function implementation of the generation module 011 can refer to the relevant description of step 610 in the above method embodiment.
  • the sending module 012 is further configured to send the correspondence between the first application awareness identifier and the second network service to the second network device.
  • the function of the sending module 012 reference may also be made to the relevant description of step 611 in the above method embodiment.
  • the sending module 012 is further configured to send the first application-aware identifier of the target service flow to the first network device.
  • the sending module 012 reference may also be made to the relevant description of step 503 in the above method embodiment.
  • controller may also include:
  • An acquisition module 013 configured to acquire user requirements of the target service flow through a northbound interface.
  • the acquisition module 013 reference may be made to the relevant descriptions of step 401, step 501 or step 601 in the above method embodiments.
  • the embodiment of the present application provides a controller, which can receive the target application of the target service flow reported by the network device when receiving the follow-up detection result of the target service flow reported by the network device. Perceptual identity. Therefore, the controller can detect and analyze the transmission performance of the service flow at the granularity indicated by at least one of the target application-aware identifiers, thereby effectively improving the flexibility of detecting and analyzing the transmission performance of the service flow.
  • controller, network equipment and message forwarding device can all be realized by an application-specific integrated circuit (ASIC), or a programmable logic device (programmable logic device, PLD)
  • PLD programmable logic device
  • the above-mentioned PLD can be a complex programmable logic device (complex programmable logical device, CPLD), a field-programmable gate array (field-programmable gate array, FPGA), a general array logic (generic array logic, GAL) or any combination thereof.
  • the packet forwarding method provided by the foregoing method embodiment may also be realized by software.
  • each module in the foregoing controller and network device may also be a software module.
  • FIG. 24 is a schematic structural diagram of another packet forwarding device provided by an embodiment of the present application.
  • the message forwarding device can be applied to a controller or a network device in the communication network shown in FIG. 1 or FIG. 7 .
  • the packet forwarding device may include: a processor 701 , a memory 702 , a network interface 703 and a bus 704 .
  • the bus 704 is used to connect the processor 701 , the memory 702 and the network interface 703 .
  • the communication connection with other devices can be realized through the network interface 703 (which may be wired or wireless).
  • a computer program 7021 is stored in the memory 702, and the computer program 7021 is used to realize various application functions.
  • programs corresponding to these software modules may be stored in the memory 702 of the network device.
  • the processor 701 may be a CPU, and the processor 701 may also be other general-purpose processors, digital signal processors (DSPs), application specific integrated circuits (ASICs), field programmable gate arrays ( FPGA), GPU or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc.
  • DSPs digital signal processors
  • ASICs application specific integrated circuits
  • FPGA field programmable gate arrays
  • GPU GPU or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc.
  • a general purpose processor may be a microprocessor or any conventional processor or the like.
  • Memory 702 can be volatile memory or nonvolatile memory, or can include both volatile and nonvolatile memory.
  • the non-volatile memory can be read-only memory (read-only memory, ROM), programmable read-only memory (programmable ROM, PROM), erasable programmable read-only memory (erasable PROM, EPROM), electrically programmable Erases programmable read-only memory (electrically EPROM, EEPROM) or flash memory.
  • Volatile memory can be random access memory (RAM), which acts as external cache memory.
  • RAM random access memory
  • SRAM static random access memory
  • DRAM dynamic random access memory
  • SDRAM synchronous dynamic random access memory
  • Double data rate synchronous dynamic random access memory double data rate SDRAM, DDR SDRAM
  • enhanced SDRAM enhanced synchronous dynamic random access memory
  • SLDRAM synchronous connection dynamic random access memory
  • direct rambus RAM direct rambus RAM
  • bus 704 may also include a power bus, a control bus, a status signal bus, and the like. However, for clarity of illustration, the various buses are labeled as bus 704 in the figure.
  • the processor 701 may be configured to obtain the correspondence between the first application-aware identifier of the target service flow and the first network service required to transmit the target service flow based on the user requirements of the target service flow, and send the request to the second
  • the second network device sends the corresponding relationship, and the corresponding relationship is used for the second network device to determine the first network service for forwarding the service packet of the target service flow based on the first application-aware identifier.
  • the processor 701 may be configured to obtain the correspondence between the first application-aware identifier of the target service flow and the first network service required to transmit the target service flow based on the user requirements of the target service flow, and send the request to the second
  • the second network device sends the corresponding relationship, and the corresponding relationship is used for the second network device to determine the first network service for forwarding the service packet of the target service flow based on the first application-aware identifier.
  • steps 501 to 505 or refer to the detailed descriptions of steps 601 to 604 and steps 608 to 611
  • the processor 701 may be configured to receive the correspondence between the first application-aware identifier and the first network service sent by the controller in the network, and if the received target service flow is indicated by the first application-aware identifier For the service flow, according to the corresponding relationship, the first network service is used to forward the service packet of the target service flow; wherein, the first application awareness identifier is generated by the controller based on user requirements of the service flow.
  • the processor 701 For the detailed processing process of the processor 701, reference may be made to the foregoing method embodiments. For example, you can refer to the detailed description of step 103 in the embodiment shown in FIG. 2, or you can refer to the detailed description of step 405 to step 408 in the embodiment shown in FIG. For the detailed description of 508, or refer to the detailed description of step 606 to step 607 in the embodiment shown in FIG. 11 , details are not repeated here.
  • the processor 701 may be configured to generate a first application-aware identifier of the target service flow based on user requirements of the target service flow, and send the first application-aware identifier; wherein, the first application-aware identifier is used for The target application-aware identifier of the target service flow is encapsulated by the network device in the service packet of the target service flow, and the target application-aware identifier is the first application-aware identifier, or the second application-aware identifier of the target service flow generated by the network device An identifier; the first application-aware identifier corresponds to a first network service, and the first application-aware identifier is used for a network device to use the first network service to forward the service packet of the target service flow, and the first network service satisfies the User requirements for the target business flow.
  • step 201 and step 202 in the embodiment shown in FIG. 2 may refer to the steps executed by the controller or any network device in the embodiment shown in FIG. 6, FIG. 10 or FIG. Let me repeat.
  • the processor 701 may be configured to receive a first application-aware identifier sent by the controller, where the first application-aware identifier is generated based on a user requirement of a service flow, and the first application-aware identifier corresponds to a first network service, The first network service meets the user requirements of the service flow; if the received target service flow is the service flow indicated by the first application-aware identifier, encapsulating the target application-aware identifier in the service packet of the target service flow, and Forwarding the service packet encapsulated with the target application-aware identifier, where the target application-aware identifier is the first application-aware identifier, or a second application-aware identifier matching the first application-aware identifier.
  • the processor 701 can be configured to perform follow-up detection on the target service flow to which the service message belongs based on the follow-up detection information in the service message, obtain the follow-up detection result, and send the follow-up detection result to the controller in the network Sending the detection result with the flow and the target application awareness identification of the target service flow; wherein the target application awareness identification is generated based on the user requirements of the target service flow, and the flow detection result and the target application awareness identification are used for the controller Analyze the transmission performance of the target traffic flow.
  • steps 506 to 508 or refer to the detailed descriptions of steps 606 to 607 in the embodiment shown in FIG. 11 , details are not repeated here.
  • the processor 701 may be configured to receive the follow-up detection result and the target application awareness identifier sent by the third network device, where the follow-up detection result is obtained by the follow-up detection of the target service flow by the third network device , the target application-aware identifier is generated based on user requirements of the target service flow; based on the flow-with-flow detection result and the target application-aware identifier, the transmission performance of the target service flow is analyzed.
  • the processor 701 For the detailed processing process of the processor 701, reference may be made to the foregoing method embodiments. For example, you can refer to the detailed description of step 303 in the embodiment shown in FIG. 5, or you can refer to the detailed description of step 401 to step 404 in the embodiment shown in FIG. For the detailed description of 505, you may refer to the detailed descriptions of steps 601 to 604 and steps 608 to 611 in the embodiment shown in FIG. 11 , which will not be repeated here.
  • FIG. 25 is a schematic structural diagram of another network device provided by an embodiment of the present application.
  • the network device can be applied to a communication network such as that shown in FIG. 1 or FIG. 7 .
  • the network device may be the network device 02a, 02c or 02d in FIG. 1 or FIG. 7 , or may be the network device 02b shown in FIG. 1 .
  • the network device may include: a main control board 801 and at least one interface board (an interface board is also called a line card or a service board), for example, an interface board 802 and an interface board 803 are shown in FIG. 25 .
  • a switching fabric board 804 may be included, and the switching fabric board 804 is used to complete data exchange between the interface boards.
  • the main control board 801 is used to complete functions such as system management, equipment maintenance, and protocol processing.
  • the interface boards 802 and 603 are used to provide various service interfaces (for example, POS interface, GE interface, ATM interface, etc.), and implement packet forwarding.
  • the main control board 801, the interface board 802, and the interface board 803 are connected to the system backplane through a system bus to realize intercommunication.
  • the interface board 802 includes one or more CPUs 8021 .
  • the central processing unit 8021 is used for controlling and managing the interface board 802, communicating with the central processing unit 8011 on the main control board 801, and forwarding and processing messages.
  • the forwarding entry storage 8024 on the interface board 802 is used to store forwarding entries, and the central processing unit 8021 can forward packets by looking up the forwarding entries stored in the forwarding entry storage 8024 .
  • the interface board 802 includes one or more physical interface cards 6023 for receiving the message sent by the previous hop node, and sending the processed message to the next hop node according to the instructions of the central processing unit 8021 .
  • the specific implementation process will not be described one by one here.
  • the specific functions of the central processing unit 8021 are also not repeated here one by one.
  • the receiving module 021 and the sending module 022 in the network device can be located in the interface board 802, and the obtaining module 023, the determining module 024, the generating module 025, the detecting module 026 and the packaging module 027 can be located in the main control board 801 middle.
  • FIG. 25 multiple interface boards are included in this embodiment, and a distributed forwarding mechanism is adopted.
  • the structure of the interface board 803 is basically the same as that of the interface board 802, and the interface board 803
  • the operations on the interface board 802 are basically similar to those of the interface board 802, and will not be repeated for brevity.
  • the central processing unit 8021 and/or network processor 8022 in the interface board 802 in FIG. For the so-called forwarding plane, special hardware or chip processing is adopted.
  • the central processing unit 8021 and/or the network processor 8022 may also use a general-purpose processor, such as a general-purpose CPU, to implement the functions described above.
  • main control boards 801 there may be one or more main control boards 801, and when there are multiple main control boards, it may include an active main control board and a standby main control board.
  • interface boards There may be one or more interface boards. The stronger the data processing capability of the device, the more interface boards it provides.
  • the multiple interface boards can communicate through one or more switching fabric boards, and when there are multiple interface boards, they can jointly implement load sharing and redundant backup.
  • the device does not need a switching network board, and the interface board undertakes the processing function of the service data of the entire system.
  • the device includes multiple interface boards, which can realize data exchange between multiple interface boards through the switching network board, and provide large-capacity data exchange and processing capabilities. Therefore, the data access and processing capabilities of network devices with a distributed architecture are greater than those with a centralized architecture. Which architecture to use depends on the specific networking deployment scenario, and there is no limitation here.
  • the memory 8012 and the memory 8024 can be read-only memory (read-only memory, ROM) or other types of static storage devices that can store static information and instructions, random access memory (random access memory, RAM) Or other types of dynamic storage devices that can store information and instructions can also be electrically erasable programmable read-only memory (EEPROM), compact disc read-only memory (CD- ROM) or other optical disc storage, optical disc storage (including compact discs, laser discs, optical discs, digital versatile discs, Blu-ray discs, etc.), magnetic discs or other magnetic storage devices, or can be used to carry or store desired program code and any other medium that can be accessed by a computer, but is not limited thereto.
  • ROM read-only memory
  • RAM random access memory
  • EEPROM electrically erasable programmable read-only memory
  • CD- ROM compact disc read-only memory
  • optical disc storage including compact discs, laser discs, optical discs, digital versatile discs, Blu-ray discs, etc.
  • the memory 8024 in the interface board 802 may exist independently and be connected to the central processing unit 8021 through a communication bus; or, the memory 8024 may also be integrated with the central processing unit 8021 .
  • the memory 8012 in the main control board 801 can exist independently and be connected with the central processing unit 8011 through a communication bus; or, the memory 8012 can also be integrated with the central processing unit 8011.
  • the memory 8024 is used to store program codes, which are executed under the control of the CPU 8021
  • the memory 8012 is used to store program codes, which are executed under the control of the CPU 8011 .
  • the central processing unit 8021 and/or the central processing unit 8011 may implement the method for forwarding packets using network devices provided in the foregoing embodiments by executing program codes.
  • the program code stored in the memory 8024 and/or the memory 8012 may include one or more software modules.
  • the one or more software modules may be the functional modules provided in the above-mentioned embodiments shown in any one of Fig. 15 to Fig. 17 and Fig. 19 to Fig. 22 .
  • the physical interface card 6023 may use any device such as a transceiver for communicating with other devices or communication networks, such as Ethernet, radio access network (radio access network, RAN), wireless local area network (wireless local area networks, WLAN), etc.
  • a transceiver for communicating with other devices or communication networks, such as Ethernet, radio access network (radio access network, RAN), wireless local area network (wireless local area networks, WLAN), etc.
  • the embodiment of the present application also provides a computer-readable storage medium, where instructions are stored in the computer-readable storage medium, and the instruction is executed by a processor to implement the method performed by the controller or the network device provided in the above method embodiments.
  • the embodiment of the present application also provides a computer program product containing instructions, and when the computer program product is run on a computer, it causes the computer to execute the method performed by the controller or the network device provided in the above method embodiments.
  • the embodiment of the present application also provides a communication network.
  • the communication network includes: a controller 01 and at least one network device.
  • FIG. 1 shows five network devices from network device 02a to network device 02e
  • FIG. 7 shows network device 02a and four network devices from network device 02c to 02e.
  • controller 01 may implement the steps performed by the controller in the above method embodiments
  • the network device may implement the steps performed by any network device in the above method embodiments.
  • the controller 01 may be the controller shown in FIG. 13 , FIG. 14 , FIG. 23 or FIG. 24 , or may include the message forwarding device shown in FIG. 17 or FIG. 18 .
  • the at least one network device may include the network device shown in any one of Fig. 15, Fig. 16, Fig. 20 to Fig. 22, and Fig. 24, or may include the packet forwarding apparatus shown in Fig. 17 or Fig. 19 .
  • the communication network may be APN.
  • the embodiment of the present application also provides a chip, which can be used to implement the method performed by the controller or the network device provided in the above method embodiment.
  • the above-mentioned embodiments may be implemented in whole or in part by software, hardware, firmware or other arbitrary combinations.
  • the above-described embodiments may be implemented in whole or in part in the form of computer program products.
  • the computer program product includes one or more computer instructions. When the computer program instructions are loaded or executed on the computer, the processes or functions according to the embodiments of the present application will be generated in whole or in part.
  • the computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable devices.
  • the computer instructions may be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted from a website, computer, server or data center Transmission to another website site, computer, server, or data center by wired (eg, coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (eg, infrared, wireless, microwave, etc.).
  • the computer-readable storage medium may be any available medium that can be accessed by a computer, or a data storage device such as a server or a data center that includes one or more sets of available media.
  • the available media may be magnetic media (eg, floppy disk, hard disk, magnetic tape), optical media (eg, DVD), or semiconductor media.
  • the semiconductor medium may be a solid state drive (SSD).

Abstract

本申请提供了一种报文转发方法、装置及通信网络,属于通信技术领域。本申请提供的方案能够基于目标业务流的用户需求生成第一应用感知标识。由于该第一应用感知标识与第一网络服务对应,且用于封装在该目标业务流的业务报文中,因此可以确保接收到该业务报文的网络设备可以采用对应的第一网络服务来转发该业务报文,从而有效提高了业务报文转发的灵活性。

Description

报文转发方法、装置及通信网络
本申请要求于2021年6月4日提交的申请号为202110624470.5、发明名称为“报文转发方法、装置及通信网络”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及通信技术领域,特别涉及一种报文转发方法、装置及通信网络。
背景技术
在应用感知网络(application aware networking,APN)中,用户终端中安装的应用可以生成应用感知信息,并在其业务报文中封装该应用感知信息。
APN中的网络设备接收到携带有应用感知信息的业务报文后,可以根据该应用感知信息采用能够保障需求的转发方式来转发该业务报文。但是,该业务报文的转发方式较为单一。
发明内容
本申请提供了一种报文转发方法、装置及通信网络,可以解决业务报文的转发方式较为单一的技术问题。
第一方面,提供了一种报文转发方法,应用于网络中的控制器,该方法包括:基于目标业务流的用户需求,获得该目标业务流的第一应用感知标识与传输该目标业务流所需的第一网络服务的对应关系,并向第二网络设备发送该对应关系,该对应关系用于供第二网络设备基于该第一应用感知标识确定用于转发该目标业务流的业务报文的第一网络服务,即第二网络设备可以采用该第一网络服务转发该目标业务流的业务报文。
由于控制器可以建立并下发业务流的应用感知标识与网络服务的对应关系,使得网络设备可以直接基于该对应关系转发业务流的业务报文,针对具体应用提供能够满足该应用所对应的用户需求的网络服务,因此有效提高了业务报文转发的灵活性。
可选地,该对应关系中包括该第一网络服务的标识,该第一网络服务的标识可以包括:绑定段标识(binding segment identification,BSID)和/或网络切片的标识。其中,该BSID可以为转发路径的BSID,或者可以是转发路径所属的段路由(segment routing,SR)策略的BSID。
可选地,该第一应用感知标识可以包括用户标识和应用标识中的至少一个。其中,用户标识用于指示该目标业务流所属的用户,应用标识用于指示该目标业务流所属的应用。
可选地,该第一应用感知标识还可以包括流标识、服务等级协议(service level agreement,SLA)级别和服务需求中的至少一个。其中,该服务需求可以是对时延和丢包率等性能指标的需求,该第一应用感知标识中的流标识也称为会话标识(session ID)。
可选地,该方法还可以包括:向第一网络设备发送该目标业务流的第一应用感知标识,该第一应用感知标识用于供该第一网络设备若确定接收到的业务流为该目标业务流,则在该目标业务流的业务报文中封装该目标业务流的应用感知标识。
其中,该第二网设备可以为APN中的应用感知边缘设备。该应用感知边缘设备在目标业务流的业务报文中封装目标业务流的应用感知标识后,可以便于下游的网络设备基于该应用感知标识确定用于转发该目标业务流的网络服务,或者可以在上报该目标业务流的随流检测结果时,一同上报该目标业务流的应用感知标识。
可选地,该方法还可以包括:向该第一网络设备发送标识生成规则,以供该第一网络设备基于该标识生成规则生成该目标业务流的第二应用感知标识,该第二应用感知标识用于与该第一应用感知标识匹配以确定接收到的业务流为该目标业务流。
第一网络设备可以获取其接收到的业务流的特征信息(例如五元组或流量特征信息),并采用控制器下发的标识生成规则对该特征信息进行处理以生成第二应用感知标识。由此,可以确保与控制器下发的第一应用感知标识准确匹配,即确保了第一网络设备识别目标业务流的可靠性。
可选地,该方法还可以包括:通过北向接口获取该目标业务流的用户需求。例如,控制器可以通过其北向接口获取服开系统发送的该目标业务流的用户需求。
可选地,该方法还可以包括:接收第三网络设备发送的随流检测结果和目标应用感知标识,该目标应用感知标识为该随流检测结果所属业务流的应用感知标识,且该目标应用感知标识为该第一应用感知标识,或者为网络设备生成的目标业务流的第二应用感知标识;基于该随流检测结果和目标应用感知标识,分析该目标业务流的传输性能。
其中,该第三网络设备可以是该目标业务流的随流检测路径中的节点。该目标应用感知标识中可以包括一个或多个标识,控制器能够以其中至少一个标识指示的粒度分析业务流的传输性能,从而有效提高了对业务流的传输性能进行检测和分析时的灵活性。
可选地,该方法还可以包括:按照目标粒度显示该目标业务流的性能指标,该性能指标用于指示该目标业务流的传输性能;其中,该目标粒度为该目标应用感知标识中至少一个标识指示的粒度。
由于目标应用感知标识中可以包括一个或多个标识,控制器按照至少一个标识指示的粒度显示性能指标,因此不仅可以实现性能指标的精细化显示,还能实现显示粒度的灵活可调。
可选地,该方法还可以包括:基于该目标业务流的传输性能确定该第一网络服务不满足该目标业务流的用户需求,确定传输该目标业务流所需的网络服务为第二网络服务,并向该第二网络设备发送该第一应用感知标识与该第二网络服务的对应关系。
控制器能够基于监测到的目标业务流的传输性能,及时更新传输该目标业务流所需的网络服务,由此可以确保更新后的网络服务能够满足目标业务流的传输性能,进而确保了目标业务流的可靠传输。
可选地,在接收第三网络设备发送的随流检测结果和目标应用感知标识之前,该方法还可以包括:向该第二网络设备和/或该第三网络设备发送该目标业务流的上送策略,该上送策略用于指示上报该目标业务流的随流检测结果。
控制器可以通过下发上送策略,使得网络设备仅上报关键业务流的随流检测结果,由此不仅实现了随流检测结果的上报粒度的灵活可调,而且有效降低了控制器的数据处理压力。
可选地,接收第三网络设备发送的随流检测结果和目标应用感知标识的过程可以,包括:接收第三网络设备发送的随流检测结果、目标应用感知标识以及对应的随流检测的流标识,该随流检测的流标识也称为监控流标识,其可以用于指示目标业务流中被监测的一条数据流;
相应的,基于所述随流检测结果和所述目标应用感知标识,分析该目标业务流的传输性能的过程可以包括:基于目标应用感知标识与随流检测的流标识的对应关系,确定该目标业务流包括的至少一条数据流;基于该随流检测结果,分析该目标业务流包括的至少一条数据流的传输性能。
控制器基于目标应用感知标识与随流检测的流标识的对应关系,可以确定出目标业务流 包括的至少一条被监测的数据流,进而可以基于该至少一条数据流的传输性能分析出目标业务流的传输性能。
可选地,该目标业务流的用户需求包括下述需求中的一种或多种:对指定转发路径的需求,对指定网络切片的需求,对传输性能的性能指标的需求。
第二方面,提供了一种报文转发方法,应用于网络设备,该方法包括:接收网络中的控制器发送的第一应用感知标识与第一网络服务的对应关系,若接收到的目标业务流为该第一应用感知标识指示的业务流,则根据该对应关系,采用该第一网络服务转发该目标业务流的业务报文,其中该第一应用感知标识由该控制器基于业务流的用户需求生成。
可选地,该方法还包括:从目标业务流的业务报文中获取该目标业务流的第二应用感知标识;若该第二应用感知标识与该第一应用感知标识匹配,则确定该目标业务流为该第一应用感知标识指示的业务流。
可选地,该网络设备接收到的该业务报文中包括带内流信息测量(in-situ flow information telemetry,IFIT)信息,该IFIT信息的流标识字段或保留字段中封装有该第二应用感知标识;
或者,该业务报文的目的地址(destination address,DA)字段、逐跳选项头(hop-by-hop option header,HBH)、目的地选项头(destination option header,DOH)或分段路由头(segment routing header,SRH)中封装该第二应用感知标识。
可选地,该SRH字段的绑定段标识字段中封装有该第二应用感知标识。
可选地,该方法还包括:接收该控制器发送的标识生成规则;基于该标识生成规则生成该目标业务流的第二应用感知标识;若该第二应用感知标识与该第一应用感知标识匹配,则确定该目标业务流为该第一应用感知标识指示的业务流。
可选地,该网络设备接收到的业务报文中包括IFIT信息;采用该第一网络服务转发该目标业务流的业务报文的过程可以包括:在IFIT信息的流标识字段或保留字段中封装该目标应用感知标识;采用该第一网络服务转发封装有该目标应用感知标识的业务报文。
网络设备还可以在IFIT信息中封装业务流的应用感知标识,提高了应用感知标识封装时的灵活性。
可选地,若网络设备接收到的目标业务流的业务报文中包括随流检测信息,则该方法还可以包括:基于该随流检测信息对目标业务流进行随流检测,得到随流检测结果;向控制器发送该随流检测结果和目标应用感知标识,该目标应用感知标识为该第一应用感知标识或该网络设备获取到的目标业务流的第二应用感知标识。
可选地,该方法还可以包括:接收控制器发送的目标业务流的上送策略,该上送策略用于指示上报目标业务流的随流检测结果;相应的,向控制器发送该随流检测结果和目标应用感知标识的过程可以包括:基于该上送策略的指示,向控制器发送该随流检测结果和目标应用感知标识。
可选地,向控制器发送随流检测结果和目标应用感知标识的过程可以包括:向控制器发送随流检测结果、目标应用感知标识以及对应的随流检测的流标识。其中,该随流检测的流标识可以用于指示目标业务流中被监测的一条数据流。由此,控制器即可获知目标应用感知标识与随流检测的流标识的对应关系,进而便于控制器分析该目标业务流所包括的至少一条数据流的传输性能。
第三方面,提供了一种控制器,该控制器包括:
生成模块,用于基于目标业务流的用户需求,获得该目标业务流的第一应用感知标识与传 输该目标业务流所需的第一网络服务的对应关系;
发送模块,用于向第二网络设备发送该对应关系,该对应关系用于供该第二网络设备基于该第一应用感知标识确定用于转发该目标业务流的业务报文的该第一网络服务。
可选地,该对应关系中包括该第一网络服务的标识,该第一网络服务的标识包括:绑定段标识和/或网络切片的标识。
可选地,该第一应用感知标识包括用户标识和应用标识中的至少一个。
可选地,该第一应用感知标识还包括流标识、SLA级别和服务需求中的至少一个。
可选地,该发送模块,还用于向该第二网络设备发送标识生成规则,以供该第二网络设备基于该标识生成规则生成该目标业务流的第二应用感知标识,该第二应用感知标识用于与该第一应用感知标识匹配以确定该第一网络服务。
可选地,该发送模块,还用于向第一网络设备发送该目标业务流的第一应用感知标识,该第一应用感知标识用于供该第一网络设备若确定接收到的业务流为该目标业务流,则在该目标业务流的业务报文中封装该目标业务流的应用感知标识。
可选地,该控制器还可以包括:获取模块,用于通过北向接口获取该目标业务流的用户需求。
可选地,该控制器还可以包括:
接收模块,用于接收第三网络设备发送的随流检测结果和目标应用感知标识,该目标应用感知标识为该随流检测结果所属业务流的应用感知标识,且该目标应用感知标识为该第一应用感知标识或网络设备生成的该目标业务流的第二应用感知标识;
分析模块,用于基于该随流检测结果和目标应用感知标识分析该目标业务流的传输性能。
可选地,该控制器还可以包括:
显示模块,用于按照目标粒度显示该目标业务流的性能指标,该性能指标用于指示该目标业务流的传输性能;其中,该目标粒度为该目标应用感知标识中至少一个标识指示的粒度。
可选地,该生成模块,还用于基于该目标业务流的传输性能确定该第一网络服务不满足该目标业务流的用户需求,以及确定传输该目标业务流所需的网络服务为第二网络服务;
该发送模块,还用于向该第二网络设备发送该第一应用感知标识与该第二网络服务的对应关系。
可选地,该发送模块,还用于在该接收模块接收第三网络设备发送的随流检测结果和目标应用感知标识之前,向该第二网络设备和/或第三网络设备发送该目标业务流的上送策略,该上送策略用于指示上报该目标业务流的随流检测结果。
第四方面,提供了一种网络设备,该网络设备包括:
接收模块,用于接收网络中的控制器发送的第一应用感知标识与第一网络服务的对应关系,其中,该第一应用感知标识由该控制器基于业务流的用户需求生成;
发送模块,用于若接收到的目标业务流为该第一应用感知标识指示的业务流,则根据该对应关系,采用该第一网络服务转发该目标业务流的业务报文。
可选地,该网络设备还可以包括:
获取模块,用于从该目标业务流的业务报文中获取该目标业务流的第二应用感知标识;
确定模块,用于若该第二应用感知标识与该第一应用感知标识匹配,则确定该目标业务流为该第一应用感知标识指示的业务流。
可选地,该网络设备接收到的该业务报文中包括IFIT信息,该IFIT信息的流标识字段或保 留字段中封装有该第二应用感知标识;
或者,该业务报文的目的地址字段、HBH、DOH或SRH中封装该第二应用感知标识。
可选地,该SRH字段的绑定段标识字段中封装有该第二应用感知标识。
可选地,该接收模块,还可以用于接收该控制器发送的标识生成规则;
该网络设备还可以包括:
生成模块,用于基于该标识生成规则生成该目标业务流的第二应用感知标识;
确定模块,用于若该第二应用感知标识与该第一应用感知标识匹配,则确定该目标业务流为该第一应用感知标识指示的业务流。
可选地,该网络设备接收到的该业务报文中包括IFIT信息;该发送模块,可以用于在该IFIT信息的流标识字段或保留字段中封装该目标应用感知标识,以及采用该第一网络服务转发封装有该目标应用感知标识的业务报文。
可选地,该网络设备还可以包括:
检测模块,用于若该网络设备接收到的目标业务流的业务报文中包括随流检测信息,则基于该随流检测信息对该目标业务流进行随流检测,得到随流检测结果;
该发送模块,还用于向控制器发送该随流检测结果和目标应用感知标识,该目标应用感知标识为该第一应用感知标识或该网络设备获取到的该目标业务流的第二应用感知标识。
可选地,该接收模块,还可以用于接收该控制器发送的该目标业务流的上送策略,该上送策略用于指示上报该目标业务流的随流检测结果;
该发送模块,可以用于基于该上送策略的指示,向该控制器发送该随流检测结果和目标应用感知标识。
第五方面,提供了一种报文转发方法,该方法包括:基于目标业务流的用户需求,生成该目标业务流的第一应用感知标识,并发送该第一应用感知标识;其中,该第一应用感知标识用于供网络设备在该目标业务流的业务报文中封装目标应用感知标识,该目标应用感知标识为该第一应用感知标识,或与该第一应用感知标识匹配的第二应用感知标识,且该第一应用感知标识与第一网络服务对应,第一应用感知标识用于供网络设备采用对应的第一网络服务转发该目标业务流的业务报文,该第一网络服务满足该目标业务流的用户需求。
由于该第一应用感知标识与第一网络服务对应,且用于供网络设备在该目标业务流的业务报文中封装目标应用感知标识,因此可以确保接收到该业务报文的网络设备可以采用具体应用对应的第一网络服务来转发该应用相关的业务报文,从而有效提高了业务报文转发的灵活性。
可选地,基于目标业务流的用户需求,生成该目标业务流的第一应用感知标识的过程可以包括:网络中的控制器基于获取到的目标业务流的用户需求,生成该目标业务流的第一应用感知标识;相应的,发送该第一应用感知标识的过程可以包括:该控制器向第一网络设备发送该第一应用感知标识,以使得该第一网络设备在目标业务流的业务报文中封装该目标应用感知标识。
其中,该第一网络设备可以为APN中的应用感知边缘设备。该应用感知边缘设备在目标业务流的业务报文中封装目标应用感知标识后,可以便于下游的网络设备基于该目标应用感知标识确定用于转发该目标业务流的第一网络服务。
可选地,该方法还可以包括:该控制器通过北向接口获取目标业务流的用户需求。例如,控制器可以通过其北向接口获取服开系统发送的该目标业务流的用户需求。
可选地,该方法还可以包括:该控制器基于该目标业务流的用户需求,确定传输该目标业务流所需的第一网络服务,并向第二网络设备发送该第一应用感知标识与该第一网络服务的对应关系,该对应关系用于供第二网络设备基于该第一应用感知标识确定用于转发该目标业务流的业务报文的第一网络服务。
其中,该第二网络设备可以为第一网络服务的头端网络设备(也称为头节点)。例如,该第二网络设备为转发路径的头节点,或者为网络切片的头节点。应理解,该第二网络设备与第一网络设备可以是同一网络设备,也可以是不同的网络设备。
由于控制器可以建立并下发业务流的应用感知标识与网络服务的对应关系,使得第二网络设备可以直接基于该对应关系转发业务流的业务报文,因此有效提高了业务报文转发的灵活性。
可选地,该方法还可以包括:该控制器接收第三网络设备发送的随流检测结果和目标应用感知标识,并基于该随流检测结果和目标应用感知标识,分析该目标业务流的传输性能。
其中,该第三网络设备可以为目标业务流的随流检测路径中的节点,例如可以是随流检测路径中的入口节点、转发节点(也可以称为中间节点)或出口节点。该目标应用感知标识可以为该第一应用感知标识,或者可以是网络设备生成的该目标业务流的第二应用感知标识。
由于该第三网络设备在向控制器上报目标业务流的随流检测结果时,可以一同上报该目标业务流的目标应用感知标识,因此控制器进而能够以该目标应用感知标识中至少一个标识指示的粒度检测和分析业务流的传输性能,由此有效提高了对业务流的传输性能进行检测和分析时的灵活性。
可选地,该方法还可以包括:该控制器按照目标粒度显示该目标业务流的性能指标,该性能指标用于指示该目标业务流的传输性能;其中,该目标粒度为该目标应用感知标识中至少一个标识指示的粒度。
由于目标应用感知标识中可以包括一个或多个标识,控制器按照至少一个标识指示的粒度显示性能指标,因此不仅可以实现性能指标的精细化显示,还能实现显示粒度的灵活可调。
可选地,控制器接收第三网络设备发送的随流检测结果和目标应用感知标识的过程可以包括:该控制器接收第三网络设备发送的随流检测结果、目标应用感知标识以及对应的随流检测的流标识;相应的,控制器基于该随流检测结果和该目标应用感知标识,分析该目标业务流的传输性能的过程可以包括:该控制器基于该目标应用感知标识与该随流检测的流标识的对应关系,确定该目标业务流包括的至少一条数据流,进而基于该随流检测结果,分析该目标业务流包括的至少一条数据流的传输性能。
控制器基于目标应用感知标识与随流检测的流标识的对应关系,可以确定出目标业务流包括的至少一条被监测的数据流,进而可以基于该至少一条数据流的传输性能分析出目标业务流的传输性能。
可选地,该方法还可以包括:该控制器基于该目标业务流的传输性能确定该第一网络服务不满足目标业务流的用户需求,进而确定传输该目标业务流所需的网络服务为第二网络服务,进而向第二网络设备发送该第一应用感知标识与该第二网络服务的对应关系。
控制器能够基于监测到的目标业务流的传输性能,及时更新传输该目标业务流所需的网络服务,由此可以确保更新后的网络服务能够满足目标业务流的传输性能,进而确保了目标业务流的可靠传输。
可选地,在该控制器接收第三网络设备发送的随流检测结果和目标应用感知标识之前,该 方法还可以包括:该控制器向该第一网络设备和/或该第三网络设备发送该目标业务流的上送策略,该上送策略用于指示上报该目标业务流的随流检测结果。
控制器可以通过下发上送策略,使得网络设备仅上报关键业务流的随流检测结果,由此不仅实现了随流检测结果的上报粒度的灵活可调,而且有效降低了控制器的数据处理压力。
可选地,基于目标业务流的用户需求,生成该目标业务流的第一应用感知标识的过程可以包括:第一网络设备基于控制器发送的目标业务流的用户需求,生成该目标业务流的第一应用感知标识;相应的,发送该第一应用感知标识的过程可以包括:该第一网络设备在该目标业务流的业务报文中封装该第一应用感知标识,并转发封装有该第一应用感知标识的业务报文。
该第一网络设备可以为APN中的应用感知边缘设备。该应用感知边缘设备生成第一应用感知标识,并在目标业务流的业务报文中封装该第一应用感知标识后,可以便于下游的网络设备基于该第一应用感知标识确定用于转发该目标业务流的第一网络服务。
可选地,该第一网络设备接收到的目标业务流的业务报文中包括随流检测信息,该方法还可以包括:该第一网络设备基于该随流检测信息对该目标业务流进行随流检测,得到随流检测结果,并向该控制器发送该随流检测结果和该第一应用感知标识。
可选地,该方法还可以包括:该第一网络设备接收该控制器发送的该目标业务流的上送策略,该上送策略用于指示上报该目标业务流的随流检测结果;该第一网络设备向该控制器发送该随流检测结果和该第一应用感知标识的过程可以包括:该第一网络设备基于该上送策略的指示,向该控制器发送该随流检测结果和该第一应用感知标识。
可选地,该第一网络设备向该控制器发送该随流检测结果和该第一应用感知标识的过程可以包括:该第一网络设备向控制器发送该随流检测结果、该第一应用感知标识以及对应的随流检测的流标识。
可选地,该第一网络设备在目标业务流的业务报文中封装该第一应用感知标识的过程可以包括:该第一网络设备在该业务报文的IFIT信息的流标识字段或保留字段中封装该第一应用感知标识;
或者,该第一网络设备在该业务报文的目的地址字段、HBH、DOH或SRH中封装该第一应用感知标识。例如,可以在该SRH字段的BSID字段中封装第一应用感知标识。
可选地,该目标业务流的用户需求包括下述需求中的一种或多种:对指定转发路径的需求,对指定网络切片的需求,对传输性能的性能指标的需求。
可选地,该目标应用感知标识包括用户标识和应用标识中的至少一个。其中,用户标识用于指示该目标业务流所属的用户,应用标识用于指示该目标业务流所属的应用。
可选地,该目标应用感知标识还可以包括流标识、SLA级别和服务需求中的至少一个。其中,该服务需求可以是对时延和丢包率等性能指标的需求,该第一应用感知标识中的流标识也称为会话标识(session ID)。
第六方面,提供了一种报文转发方法,应用于网络设备,该方法包括:接收控制器发送的第一应用感知标识,该第一应用感知标识基于业务流的用户需求生成,且该第一应用感知标识与第一网络服务对应,该第一网络服务满足该业务流的用户需求;若接收到的目标业务流为该第一应用感知标识指示的业务流,则在该目标业务流的业务报文中封装目标应用感知标识,并转发封装有该目标应用感知标识的业务报文;其中,该目标应用感知标识为该第一应用感知标识,或与该第一应用感知标识匹配的第二应用感知标识。
可选地,该网络设备接收到的目标业务流的业务报文中包括随流检测信息,该方法还可以包括:基于该随流检测信息对该目标业务流进行随流检测,得到随流检测结果,并向该控制器发送该随流检测结果和目标应用感知标识。
可选地,向该控制器发送该随流检测结果和该目标应用感知标识的过程可以包括:向该控制器发送该随流检测结果、该目标应用感知标识以及对应的随流检测的流标识。
可选地,在该目标业务流的业务报文中封装该目标应用感知标识的过程可以包括:在该业务报文的IFIT信息的流标识字段或保留字段中封装该目标应用感知标识;或者,在该业务报文的目的地址字段、HBH、DOH或SRH中封装该目标应用感知标识。
可选地,接收控制器发送的第一应用感知标识的过程可以包括:接收控制器发送的第一应用感知标识与该第一网络服务的对应关系;相应的,转发封装有该目标应用感知标识的业务报文的过程可以包括:采用该第一网络服务转发封装有目标应用感知标识的业务报文。
第七方面,提供了一种报文转发装置,该装置包括:
生成模块,用于基于目标业务流的用户需求,生成该目标业务流的第一应用感知标识,该第一应用感知标识用于供网络设备在该目标业务流的业务报文中封装目标应用感知标识,该目标应用感知标识为该第一应用感知标识,或与该第一应用感知标识匹配的第二应用感知标识,且该第一应用感知标识与第一网络服务对应,该第一网络服务满足该目标业务流的用户需求;
发送模块,用于发送该第一应用感知标识,该第一应用感知标识用于供网络设备采用该第一网络服务转发该目标业务流的业务报文。
可选地,该报文转发装置可以应用于网络中的控制器,该生成模块,用于基于获取到的目标业务流的用户需求,生成该目标业务流的第一应用感知标识;
该发送模块,用于向第一网络设备发送该第一应用感知标识,以使得该第一网络设备在该目标业务流的业务报文中封装该目标应用感知标识。
可选地,该装置还包括获取模块,用于通过北向接口获取该目标业务流的用户需求。
可选地,该生成模块,还用于基于该目标业务流的用户需求,确定传输该目标业务流所需的该第一网络服务;
该发送模块,还用于向第二网络设备发送该第一应用感知标识与该第一网络服务的对应关系,该对应关系用于供该第二网络设备基于该第一应用感知标识确定用于转发该目标业务流的业务报文的该第一网络服务。
可选地,该装置还可以包括:
接收模块,用于接收第三网络设备发送的随流检测结果和目标应用感知标识,该目标应用感知标识为该随流检测结果所属业务流的应用感知标识,且该目标应用感知标识为该第一应用感知标识或网络设备生成的该目标业务流的第二应用感知标识;
分析模块,用于基于该随流检测结果和该目标应用感知标识,分析该目标业务流的传输性能。
可选地,该装置还可以包括:
显示模块,用于按照目标粒度显示该目标业务流的性能指标,该性能指标用于指示该目标业务流的传输性能;其中,该目标粒度为该目标应用感知标识中至少一个标识指示的粒度。
可选地,该接收模块,可以用于接收第三网络设备发送的随流检测结果、目标应用感知标识以及对应的随流检测的流标识;
该分析模块,可以用于基于该目标应用感知标识与该随流检测的流标识的对应关系,确定该目标业务流包括的至少一条数据流,以及基于该随流检测结果,分析该目标业务流包括的至少一条数据流的传输性能。
可选地,该生成模块,还可以用于基于该目标业务流的传输性能确定该第一网络服务不满足该目标业务流的用户需求,进而确定传输该目标业务流所需的网络服务为第二网络服务;
该发送模块,还可以用于向第二网络设备发送该第一应用感知标识与该第二网络服务的对应关系。
可选地,该发送模块,还可以用于在接收模块接收第三网络设备发送的随流检测结果和目标应用感知标识之前,向该第一网络设备和/或该第三网络设备发送该目标业务流的上送策略,该上送策略用于指示上报该目标业务流的随流检测结果。
可选地,该报文转发装置可以应用于第一网络设备,该生成模块,可以用于基于控制器发送的目标业务流的用户需求,生成该目标业务流的第一应用感知标识;
该发送模块,可以用于在该目标业务流的业务报文中封装该第一应用感知标识,并转发封装有该第一应用感知标识的业务报文。
可选地,该第一网络设备接收到的该目标业务流的业务报文中包括随流检测信息,该装置还可以包括:
检测模块,用于基于该随流检测信息对该目标业务流进行随流检测,得到随流检测结果;
该发送模块,还可以用于向该控制器发送该随流检测结果和该第一应用感知标识。
可选地,该装置还可以包括:
接收模块,用于接收该控制器发送的该目标业务流的上送策略,该上送策略用于指示上报该目标业务流的随流检测结果;
该发送模块,可以用于基于该上送策略的指示,向控制器发送该随流检测结果和该第一应用感知标识。
可选地,该发送模块,可以用于向控制器发送该随流检测结果、该第一应用感知标识以及对应的随流检测的流标识。
可选地,该发送模块,可以用于在该业务报文的IFIT信息的流标识字段或保留字段中封装该第一应用感知标识;或者,在该业务报文的目的地址字段、HBH、DOH或SRH中封装该第一应用感知标识。
可选地,该目标业务流的用户需求包括下述需求中的一种或多种:对指定转发路径的需求,对指定网络切片的需求,对传输性能的性能指标的需求。
可选地,该目标应用感知标识包括用户标识和应用标识中的至少一个。
第八方面,提供了一种网络设备,该网络设备包括:
接收模块,用于接收控制器发送的第一应用感知标识,该第一应用感知标识基于业务流的用户需求生成,且该第一应用感知标识与第一网络服务对应,该第一网络服务满足该业务流的用户需求;
封装模块,用于若接收到的目标业务流为该第一应用感知标识指示的业务流,则在该目标业务流的业务报文中封装目标应用感知标识,该目标应用感知标识为该第一应用感知标识,或与该第一应用感知标识匹配的第二应用感知标识;
发送模块,用于转发封装有该目标应用感知标识的业务报文。
可选地,该网络设备接收到的目标业务流的业务报文中包括随流检测信息,该网络设备还 可以包括:
检测模块,用于基于该随流检测信息对该目标业务流进行随流检测,得到随流检测结果;
该发送模块,还用于向控制器发送该随流检测结果和该目标应用感知标识。
可选地,该发送模块,可以用于向控制器发送该随流检测结果、该目标应用感知标识以及对应的随流检测的流标识。
可选地,该封装模块,可以用于在该业务报文的IFIT信息的流标识字段或保留字段中封装该目标应用感知标识;或者,在该业务报文的目的地址字段、HBH、DOH或SRH中封装该目标应用感知标识。
可选地,该接收模块,可以用于接收控制器发送的第一应用感知标识与该第一网络服务的对应关系;相应的,该发送模块,可以用于采用该第一网络服务转发封装有目标应用感知标识的业务报文。
第九方面,提供了一种业务流的性能检测方法,应用于网络设备,该方法包括:基于业务报文中的随流检测信息,对该业务报文所属的目标业务流进行随流检测,得到随流检测结果,并向网络中的控制器发送该随流检测结果和该目标业务流的目标应用感知标识;其中,该目标应用感知标识基于该目标业务流的用户需求生成,该随流检测结果和目标应用感知标识用于供该控制器分析目标业务流的传输性能。
由于网络设备在向控制器上报目标业务流的随流检测结果时,可以一同上报该目标业务流的目标应用感知标识,因此控制器进而能够以该目标应用感知标识中至少一个标识指示的粒度检测和分析业务流的传输性能,由此有效提高了对业务流的传输性能进行检测和分析时的灵活性。
可选地,该业务报文中封装有该目标应用感知标识,即网络设备可以直接从其接收到的业务报文中获取该目标应用感知标识,该目标应用感知标识可以用于指示目标业务流所属的用户和/或应用。
其中,该目标应用感知标识可以是网络设备的上游节点(例如应用感知边缘设备)封装的,或者可以是由该目标业务流所属的应用封装的。
可选地,该随流检测信息为IFIT信息,该IFIT信息的流标识字段或保留字段中封装有该目标应用感知标识。
通过在IFIT信息中封装目标应用感知标识,可以使得网络设备在读取该IFIT信息以进行随流检测时,同步获取到目标应用感知标识。
或者,该目标应用感知标识还可以封装在业务报文的目的地址字段、HBH、DOH或SRH中。例如,该目标应用感知标识可以封装在该SRH字段的BSID字段中。
可选地,该方法还可以包括:接收控制器发送的第一应用感知标识与第一网络服务的对应关系,其中,该第一应用感知标识由该控制器基于业务流的用户需求生成;若该目标业务流为该第一应用感知标识指示的业务流,则根据该对应关系,采用该第一网络服务转发该目标业务流的业务报文。
由于控制器可以建立并下发业务流的应用感知标识与网络服务的对应关系,使得网络设备可以直接基于该对应关系转发业务流的业务报文,因此有效提高了业务报文转发的灵活性。
可选地,该方法还可以包括:接收控制器发送的标识生成规则,并基于该标识生成规则生成该目标业务流的第二应用感知标识;其中,该目标应用感知标识为该第二应用感知标识或该控制器发送的该目标业务流的第一应用感知标识。
对于接收到的业务报文中未封装感知应用标识的场景,网络设备还可以生成第二应用感知标识。该第二应用感知标识可以作为目标应用感知标识上报至控制器;或者若网络设备还接收到了控制器下发的目标业务流的第一应用感知标识,则网络设备还可以在确定该第二应用感知标识与第一应用感知标识匹配,将该第一应用感知标识作为目标应用感知标识上报至控制器。
可选地,该随流检测信息为IFIT信息;该方法还可以包括:在该IFIT信息的流标识字段或保留字段中封装该目标应用感知标识,并转发封装有该目标应用感知标识的业务报文。由此可以便于网络设备的下游节点能够直接从业务报文中获取并上报该目标应用感知标识。
可选地,该方法还可以包括:接收控制器发送的该目标业务流的上送策略,该上送策略用于指示上报该目标业务流的随流检测结果;相应的,网络设备向控制器发送该随流检测结果和目标业务流的目标应用感知标识的过程可以包括:基于该上送策略的指示,向控制器发送该随流检测结果和该目标业务流的目标应用感知标识。
控制器可以向网络设备下发关键业务流(包括该目标业务流)的上送策略,使得网络设备仅上报该关键业务流的随流检测结果,而无需上报非关键业务流的随流检测结果。由此不仅实现了随流检测结果的上报粒度的灵活可调,而且有效降低了控制器的数据处理压力。
可选地,向网络中的控制器发送随流检测结果和目标业务流的目标应用感知标识的过程可以包括:向网络中的控制器发送随流检测结果、目标业务流的目标应用感知标识以及对应的随流检测的流标识。
其中,该随流检测的流标识可以用于指示目标业务流中被监测的一条数据流。由此,控制器即可获知目标应用感知标识与随流检测的流标识的对应关系,进而便于控制器分析该目标业务流所包括的至少一条数据流的传输性能。
可选地,该目标应用感知标识包括用户标识和应用标识中的至少一个。其中,用户标识用于指示该目标业务流所属的用户,应用标识用于指示该目标业务流所属的应用。
可选地,该目标应用感知标识还可以包括流标识、SLA级别和服务需求中的至少一个。其中,该服务需求可以是对时延和丢包率等性能指标的需求,该第二应用感知标识中的流标识也称为会话标识(session ID)。
第十方面,提供了一种业务流的性能检测方法,应用于网络中的控制器,该方法包括:接收第三网络设备发送的随流检测结果和目标应用感知标识,该随流检测结果是该第三网络设备对该目标业务流进行随流检测得到的,该目标应用感知标识基于目标业务流的用户需求生成;基于该随流检测结果和目标应用感知标识,分析该目标业务流的传输性能。
其中,该第三网络设备可以为该目标业务流的随流检测路径中的节点,例如可以是随流检测路径中的入口节点、转发节点(也可以称为中间节点)或出口节点。
可选地,该目标应用感知标识包括用户标识和应用标识中的至少一个,该方法还包括:按照目标粒度显示该目标业务流的性能指标,该性能指标用于指示该目标业务流的传输性能;其中,该目标粒度为目标应用感知标识中至少一个标识指示的粒度。
由于目标应用感知标识中可以包括一个或多个标识,控制器按照至少一个标识指示的粒度显示性能指标,因此不仅可以实现性能指标的精细化显示,还能实现显示粒度的灵活可调。
可选地,在接收第三网络设备发送的随流检测结果和目标应用感知标识之前,该方法可以还包括:向该第三网络设备发送该目标业务流的上送策略,该上送策略用于指示上报该目标业务流的随流检测结果。
可选地,接收第三网络设备发送的随流检测结果和目标应用感知标识的过程可以包括:接收第三网络设备发送的随流检测结果、目标应用感知标识以及对应的随流检测的流标识;相应的,基于该随流检测结果和该目标应用感知标识,分析该目标业务流的传输性能的过程可以包括:基于该目标应用感知标识与该随流检测的流标识的对应关系,确定该目标业务流包括的至少一条数据流;基于该随流检测结果,分析该目标业务流包括的至少一条数据流的传输性能。
控制器基于目标应用感知标识与随流检测的流标识的对应关系,可以确定出目标业务流包括的至少一条被监测的数据流,进而可以基于该至少一条数据流的传输性能分析出目标业务流的传输性能。
可选地,该方法还可以包括:基于该目标业务流的用户需求,获得目标业务流的第一应用感知标识与传输该目标业务流所需的第一网络服务的对应关系;向第二网络设备发送该对应关系,该对应关系用于供第二网络设备基于该第一应用感知标识确定用于转发该目标业务流的业务报文的第一网络服务;其中,该目标应用感知标识为该第一应用感知标识或网络设备生成的该目标业务流的第二应用感知标识。
其中,该第二网络设备可以为第一网络服务的头端网络设备(也称为头节点)。例如,该第二网络设备为转发路径的头节点,或者为网络切片的头节点。应理解,该第二网络设备与第三网络设备可以是同一网络设备,也可以是不同的网络设备。
可选地,该方法还可以包括:基于该目标业务流的传输性能确定该第一网络服务不满足目标业务流的用户需求,确定传输该目标业务流所需的网络服务为第二网络服务;向该第二网络设备发送该第一应用感知标识与第二网络服务的对应关系。
控制器能够基于监测到的目标业务流的传输性能,及时更新传输该目标业务流所需的网络服务,由此可以确保更新后的网络服务能够满足目标业务流的传输性能,进而确保了目标业务流的可靠传输。
可选地,该方法还可以包括:向第一网络设备发送该目标业务流的第一应用感知标识。该第一应用感知标识用于供该第一网络设备若确定接收到的业务流为该目标业务流,则在该目标业务流的业务报文中封装该目标业务流的应用感知标识。
其中,该第三网设备可以为APN中的应用感知边缘设备。该应用感知边缘设备在目标业务流的业务报文中封装目标业务流的应用感知标识后,可以便于下游的网络设备基于该应用感知标识确定用于转发该目标业务流的网络服务,或者可以在上报该目标业务流的随流检测结果时,一同上报该目标业务流的应用感知标识。
可选地,该方法还可以包括:通过北向接口获取该目标业务流的用户需求。例如,控制器可以通过其北向接口获取服开系统发送的该目标业务流的用户需求。
可选地,该目标业务流的用户需求包括下述需求中的一种或多种:对指定转发路径的需求,对指定网络切片的需求,对传输性能的性能指标的需求。
第十一方面,提供了一种网络设备,该网络设备包括:
检测模块,用于基于业务报文中的随流检测信息,对该业务报文所属的目标业务流进行随流检测,得到随流检测结果;
发送模块,用于向网络中的控制器发送该随流检测结果和该目标业务流的目标应用感知标识,该目标应用感知标识基于目标业务流的用户需求生成,该随流检测结果和目标应用感知标识用于供控制器分析该目标业务流的传输性能。
可选地,该业务报文中封装有该目标应用感知标识,该目标应用感知标识可以用于指示目标业务流所属的用户和/或应用。
可选地,该随流检测信息为IFIT信息,该IFIT信息的流标识字段或保留字段中封装有该目标应用感知标识。
可选地,该网络设备还可以包括:
接收模块,用于接收该控制器发送的第一应用感知标识与第一网络服务的对应关系,其中,该第一应用感知标识由该控制器基于业务流的用户需求生成;
该发送模块,还用于若该目标业务流为该第一应用感知标识指示的业务流,则根据该对应关系,采用该第一网络服务转发该目标业务流的业务报文。
可选地,接收模块,还可以用于接收该控制器发送的标识生成规则;
该网络设备还可以包括:生成模块,用于基于该标识生成规则生成该目标业务流的第二应用感知标识;
其中,该目标应用感知标识为该第二应用感知标识或该控制器发送的该目标业务流的第一应用感知标识。
可选地,该随流检测信息为IFIT信息;该网络设备还可以包括:
封装模块,用于在该IFIT信息的流标识字段或保留字段中封装该目标应用感知标识;
该发送模块,还用于转发封装有该目标应用感知标识的业务报文。
可选地,该接收模块,还可以用于接收该控制器发送的该目标业务流的上送策略,该上送策略用于指示上报该目标业务流的随流检测结果;
该发送模块,用于基于该上送策略的指示,向控制器发送该随流检测结果和该目标业务流的目标应用感知标识。
可选地,该发送模块,可以用于向网络中的控制器发送随流检测结果、目标业务流的目标应用感知标识以及对应的随流检测的流标识。
可选地,该目标应用感知标识包括用户标识和应用标识中的至少一个。
第十二方面,提供了一种控制器,该控制器包括:
接收模块,用于接收第三网络设备发送的随流检测结果和目标应用感知标识,该随流检测结果是该第三网络设备对该目标业务流进行随流检测得到的,该目标应用感知标识基于该目标业务流的用户需求生成;
分析模块,用于基于该随流检测结果和该目标应用感知标识,分析该目标业务流的传输性能。
可选地,该目标应用感知标识包括用户标识和应用标识中的至少一个,该控制器还包括:
显示模块,用于按照目标粒度显示该目标业务流的性能指标,该性能指标用于指示该目标业务流的传输性能;其中,该目标粒度为该目标应用感知标识中至少一个标识指示的粒度。
可选地,该控制器还包括:
发送模块,用于在该接收模块接收第三网络设备发送的随流检测结果和目标应用感知标识之前,向该第三网络设备发送该目标业务流的上送策略,该上送策略用于指示上报该目标业务流的随流检测结果。
可选地,该接收模块,可以用于接收第三网络设备发送的随流检测结果、目标应用感知标识以及对应的随流检测的流标识;相应的,该分析模块,可以用于基于该目标应用感知标识与该随流检测的流标识的对应关系,确定该目标业务流包括的至少一条数据流;基于该随流 检测结果,分析该目标业务流包括的至少一条数据流的传输性能。
可选地,该控制器还包括:
生成模块,用于基于该目标业务流的用户需求,获得该目标业务流的第一应用感知标识与传输该目标业务流所需的第一网络服务的对应关系;
该发送模块,还用于向第二网络设备发送该对应关系,该对应关系用于供该第二网络设备基于该第一应用感知标识确定用于转发该目标业务流的业务报文的该第一网络服务;
其中,该目标应用感知标识为该第一应用感知标识或网络设备生成的该目标业务流的第二应用感知标识。
可选地,该生成模块,还用于基于该目标业务流的传输性能确定该第一网络服务不满足该目标业务流的用户需求,以及确定传输该目标业务流所需的网络服务为第二网络服务;
该发送模块,还用于向该第二网络设备发送该第一应用感知标识与该第二网络服务的对应关系。
可选地,该发送模块还用于向第一网络设备发送该目标业务流的第一应用感知标识。
可选地,该控制器还包括:
获取模块,用于通过北向接口获取该目标业务流的用户需求。
第十三方面,提供了一种控制器,该控制器可以包括:存储器,处理器及存储在该存储器上并可在该处理器上运行的计算机程序,该处理器执行该计算机程序时实现上述任一方面所提供的应用于控制器的方法。
第十四方面,提供了一种网络设备,该网络设备可以包括:存储器,处理器及存储在该存储器上并可在该处理器上运行的计算机程序,该处理器执行该计算机程序时实现上述任一方面所提供的应用于网络设备的方法。
第十五方面,提供了一种网络设备,该网络设备可以包括:主控板和接口板,该接口板可以用于实现上述任一方面所提供的应用于网络设备的方法。
第十六方面,提供了一种网络设备,该网络设备包括:主控板和接口板。主控板包括:第一处理器和第一存储器。接口板包括:第二处理器、第二存储器和接口卡。主控板和接口板耦合。第二存储器可以用于存储程序代码,第二处理器用于调用第二存储器中的程序代码,触发接口卡执行如下操作:接收网络中的控制器发送的第一应用感知标识与第一网络服务的对应关系,其中,该第一应用感知标识由该控制器基于业务流的用户需求生成;若接收到的目标业务流为该第一应用感知标识指示的业务流,则根据该对应关系,采用该第一网络服务转发该目标业务流的业务报文。
第十七方面,提供了一种网络设备,该网络设备包括:主控板和接口板。主控板包括:第一处理器和第一存储器。接口板包括:第二处理器、第二存储器和接口卡。主控板和接口板耦合。第一存储器可以用于存储程序代码,第一处理器用于调用第一存储器中的程序代码以执行如下操作:基于控制器发送的目标业务流的用户需求,生成该目标业务流的第一应用感知标识,并在该目标业务流的业务报文中封装目标应用感知标识;第二存储器可以用于存储程序代码,第二处理器用于调用第二存储器中的程序代码,触发接口卡执行如下操作:转发封装有该目标应用感知标识的业务报文;其中,该目标应用感知标识为该第一应用感知标识,或与该第一应用感知标识匹配的第二应用感知标识,且该第一应用感知标识与第一网络服务对应,该第一网络服务满足该目标业务流的用户需求。
或者,该第二处理器用于调用第二存储器中的程序代码,触发接口卡执行如下操作:接收 控制器发送的第一应用感知标识,该第一应用感知标识基于业务流的用户需求生成,且该第一应用感知标识与第一网络服务对应,该第一网络服务满足该业务流的用户需求;若接收到的目标业务流为该第一应用感知标识指示的业务流,则在该目标业务流的业务报文中封装目标应用感知标识,并转发封装有该目标应用感知标识的业务报文;其中,该目标应用感知标识为该第一应用感知标识,或与该第一应用感知标识匹配的第二应用感知标识。
第十八方面,提供了一种网络设备,该网络设备包括:主控板和接口板。主控板包括:第一处理器和第一存储器。接口板包括:第二处理器、第二存储器和接口卡。主控板和接口板耦合。第一存储器可以用于存储程序代码,第一处理器用于调用第一存储器中的程序代码以执行如下操作:基于业务报文中的随流检测信息,对该业务报文所属的目标业务流进行随流检测,得到随流检测结果;
第二存储器可以用于存储程序代码,第二处理器用于调用第二存储器中的程序代码,触发接口卡执行如下操作:向网络中的控制器发送该随流检测结果和目标业务流的目标应用感知标识,该目标应用感知标识基于目标业务流的用户需求生成,该随流检测结果和目标应用感知标识用于供控制器分析该目标业务流的传输性能。
第十九方面,提供了一种计算机可读存储介质,该计算机可读存储介质中存储有指令,该指令由处理器执行以实现上述任一方面所提供的方法。
第二十方面,提供了一种包含指令的计算机程序产品,当该计算机程序产品在计算机上运行时,使得计算机执行上述任一方面所提供的方法。
第二十一方面,提供了一种通信网络,该通信网络可以包括:控制器和至少一个网络设备;该控制器可以实现上述任一方面提供的应用于控制器的方法,该网络设备可以实现上述任一方面提供的应用于网络设备的方法。
第二十二方面,提供了一种芯片,该芯片可以用于实现上述任一方面所提供的方法。
综上所述,本申请提供了一种报文转发方法、装置及通信网络,控制器可以获取业务流的应用感知标识与传输该业务流所需的网络服务的对应关系,并将该对应关系下发至网络设备。网络设备进而可以在识别出业务流为该应用感知标识指示的业务流时,直接采用对应的网络服务转发该业务流的报文。由于控制器可以建立并下发业务流的应用感知标识与网络服务的对应关系,使得网络设备可以直接基于该对应关系转发业务流的业务报文,因此有效提高了业务报文转发的灵活性。
附图说明
图1是本申请实施例提供的一种通信网络的结构示意图;
图2是本申请实施例提供的一种报文转发方法的流程图;
图3是本申请实施例提供的一种应用感知标识的数据结构示意图;
图4是本申请实施例提供的另一种报文转发方法的流程图;
图5是本申请实施例提供的一种业务流的性能检测方法的流程图;
图6是本申请实施例提供的又一种报文转发方法的流程图;
图7是本申请实施例提供的另一种通信网络的结构示意图;
图8是本申请实施例提供的另一种应用感知标识的数据结构示意图;
图9是本申请实施例提供的又一种应用感知标识的数据结构示意图;
图10是本申请实施例提供的再一种报文转发方法的流程图;
图11是本申请实施例提供的另一种业务流的性能检测方法的流程图;
图12是本申请实施例提供的一种IFIT信息的结构示意图;
图13是本申请实施例提供的一种控制器的结构示意图;
图14是本申请实施例提供的另一种控制器的结构示意图;
图15是本申请实施例提供的一种网络设备的结构示意图;
图16是本申请实施例提供的另一种网络设备的结构示意图;
图17是本申请实施例提供的一种报文转发装置的结构示意图;
图18是本申请实施例提供的另一种报文转发装置的结构示意图;
图19是本申请实施例提供的又一种报文转发装置的结构示意图;
图20是本申请实施例提供的又一种网络设备的结构示意图;
图21是本申请实施例提供的再一种网络设备的结构示意图;
图22是本申请实施例提供的再一种网络设备的结构示意图;
图23是本申请实施例提供的又一种控制器的结构示意图;
图24是本申请实施例提供的再一种报文转发装置的结构示意图;
图25是本申请实施例提供的再一种网络设备的结构示意图。
具体实施方式
下面结合附图详细介绍本申请实施例提供的报文转发方法、装置及通信网络。
图1是本申请实施例提供的一种通信网络的结构示意图,如图1所示,该通信网络可以包括控制器01和多个网络设备,例如图1中示意性示出了02a至02e共5个网络设备。该控制器01与至少一个网络设备之间建立有通信连接,该多个网络设备之间建立有通信连接。
其中,该控制器01可以为网络控制器,例如可以为软件定义网络(software defined network,SDN)控制器,网络控制引擎(network control engine,NCE)或者路径计算单元服务器(path computation element server,PCE server)等。并且,该控制器01可以为一台服务器,或者由若干台服务器组成的服务器集群,或者是一个云计算服务中心。每个网络设备可以为路由器或交换机等具备报文转发功能的设备,且每个网络设备也可以称为节点。
可选地,该多个网络设备可以包括运营商(provider,P)设备、运营商边缘(provider edge,PE)设备、宽带远程接入服务器(broadband remote access server,BRAS)和用户驻地设备(customer premises equipment,CPE)等。
参考图1,该通信网络中的至少一个网络设备(例如PE设备或CPE)还可以与用户终端03连接,并用于为用户终端03提供网络接入服务。该用户终端03也可以称为主机或用户设备。该用户终端03中安装有应用程序(application,APP),该多个网络设备可以转发该APP的业务流。
可以理解的是,本申请实施例提供的通信网络可以为APN。例如,该APN可以是基于互联网协议第6版(Internet protocol version 6,IPv6)的网络,也称为APN6。或者,该APN还可以是基于SRv6、多协议标签交换(multi-protocol label switching,MPLS)技术或者虚拟扩展局域网(virtual extensible local area network,VxLAN)的网络。其中,SRv6是一种基于IPv6的段路由(segment routing,SR)转发技术。
本申请实施例提供了一种报文转发方法,该方法可以应用于诸如图1所示的通信网络。参 考图2,该方法包括:
步骤101、控制器基于目标业务流的用户需求,获得目标业务流的第一应用感知标识与传输该目标业务流所需的第一网络服务的对应关系。
该目标业务流的用户需求是指目标业务流对网络服务的性能的需求。例如,该用户需求可以包括下述需求中的一种或多种:对指定转发路径的需求,对指定网络切片的需求,对传输性能的性能指标的需求。其中,传输性能的性能指标可以包括时延、带宽和丢包率等。并且,该目标业务流的用户需求还可以包括该目标业务流所属的用户和/或应用的信息。
控制器可以基于该目标业务流的用户需求生成该目标业务流的第一应用感知标识。图3是本申请实施例提供的一种应用感知标识的结构示意图,如图3所示,该第一应用感知标识包括用户标识(user ID)和应用标识(APP ID)中的至少一个。其中,该用户标识用于标识该目标业务流所属的用户;该应用标识用于标识该目标业务流所属的应用。应理解,目标业务流所属的用户可以是一个用户,也可以是一个用户组。目标业务流所属的应用可以是一个应用,也可以是一个应用组。
继续参考图3,该第一应用感知标识还可以包括流标识(flow ID)和SLA等级中的至少一个。其中,流标识(也称为session ID)用于标识目标业务流所属应用中的一条特定的流(即一个具体的会话);该SLA等级用于标识该目标业务流所属用户的服务等级,该服务等级可以包括金、银和铜等,或者该服务等级还可以采用不同的颜色(color)区分。
控制器还可以基于该目标业务流的用户需求,计算得到能够满足该用户需求的第一网络服务,该第一网络服务可以包括网络切片和/或转发路径。例如,该第一网络服务可以包括用户需求中指定的网络切片或指定的转发路径。其中,该转发路径可以为SRv6路径。
步骤102、控制器向第二网络设备发送该对应关系。
该对应关系用于供第二网络设备基于该第一应用感知标识确定用于转发该目标业务流的业务报文的第一网络服务。其中,该第二网络设备可以为第一网络服务的头端网络设备(也称为头节点)。例如,该第二网络设备为转发路径的头节点,或者为网络切片的头节点。
可选地,该对应关系中记录有第一应用感知标识及其对应的第一网络服务的标识。若该第一网络服务包括网络切片,则该第一网络服务的标识包括网络切片的标识;若该第一网络服务包括转发路径,则该第一网络服务的标识包括转发路径的标识。其中,该转发路径的标识可以为转发路径的BSID,或者可以是该转发路径所属的SR策略的BSID。
步骤103、若第二网络设备接收到的目标业务流为该第一应用感知标识指示的业务流,则根据该对应关系,采用该第一网络服务转发该目标业务流的业务报文。
第二网络设备可以识别其接收到的业务流。若第二网络设备识别出其接收到的目标业务流即为该第一应用感知标识指示的业务流,则可以根据控制器下发的对应关系,采用该第一网络服务转发该目标业务流的业务报文。例如,假设该第一网络服务包括SRv6路径,则第二网络设备可以采用该SRv6路径转发目标业务流的业务报文。
作为一种可能的示例,第二网络设备可以通过目标业务流的业务报文中封装的应用感知标识来识别业务流,若第二网络设备检测到目标业务流的业务报文中封装的应用感知标识与该第一应用感知标识匹配,则可以确定该目标业务流即为第一应用感知标识指示的业务流。
作为另一种可能的示例,第二网络设备还可以通过报文解析或流量特征分析的方式来识别目标业务流是否为第一应用感知标识指示的业务流。例如,第二网络设备可以通过分析业务报文的四元组信息、五元组信息或七元组信息来识别目标业务流。或者,第二网络设备还 可以采用深度包检测(deep packet inspection,DPI)技术分析目标业务流的业务报文,进而识别该目标业务流是否为第一应用感知标识指示的业务流。又或者,该第二网络设备还可以采用人工智能(artificial intelligence,AI)模型分析目标业务流的流量特征,进而识别该目标业务流是否为第一应用感知标识指示的业务流。其中,该AI模型可以是控制器下发至第二网络设备的。
可以理解的是,在本申请实施例中,业务流的应用感知标识也可以称为APN标识,或者APN ID。
综上所述,本申请实施例提供了一种报文转发方法,控制器可以获取业务流的应用感知标识与传输该业务流所需的网络服务的对应关系,并将该对应关系下发至网络设备。网络设备进而可以在识别出业务流为该应用感知标识指示的业务流时,直接采用对应的网络服务转发该业务流的报文。由于控制器可以建立并下发业务流的应用感知标识与网络服务的对应关系,使得网络设备可以直接基于该对应关系转发业务流的业务报文,因此有效提高了业务报文转发的灵活性。
本申请实施例提供了另一种报文转发方法,该方法可以应用于诸如图1所示的通信网络,且可以应用于该通信网络中的控制器或任一网络设备。参考图4,该方法包括:
步骤201、基于目标业务流的用户需求,生成该目标业务流的第一应用感知标识,该第一应用感知标识用于供网络设备在该目标业务流的业务报文中封装目标应用感知标识,且该第一应用感知标识与第一网络服务对应。
该第一网络服务满足该目标业务流的用户需求。该目标应用感知标识可以为该第一应用感知标识,或与该第一应用感知标识匹配的第二应用感知标识。在本申请实施例中,控制器可以基于其获取到的目标业务流的用户需求,生成该目标业务流的第一应用感知标识。或者,第一网络设备可以基于控制器下发的目标业务流的用户需求,生成该目标业务流的第一应用感知标识。
其中,该目标业务流的用户需求是指目标业务流对网络服务的性能的需求,且该目标业务流的用户需求还可以包括该目标业务流所属的用户和/或应用的信息。该第一网络服务可以包括网络切片和/或转发路径。该第一应用感知标识的结构可以参考图3。
步骤202、发送该第一应用感知标识,该第一应用感知标识用于供网络设备采用该第一网络服务转发该目标业务流的业务报文。
若该第一应用感知标识由控制器生成,则控制器可以向第一网络设备发送该第一应用感知标识。该第一网络设备为应用感知边缘设备。该第一网络设备若确定接收到的目标业务流为该第一应用感知标识指示的业务流,则可以在目标业务流的业务报文中封装目标应用感知标识。该目标应用感知标识可以是该第一应用感知标识,或者可以是该第一网络设备生成的目标业务流的第二应用感知标识,该第二应用感知标识与该第一应用感知标识匹配。由此,可以便于该第一网络设备的下游的网络设备基于该目标应用感知标识确定用于转发该目标业务流的第一网络服务,进而采用该第一网络服务转发该目标业务流的业务报文。
若该第一应用感知标识由第一网络设备生成,则该第一网络设备可以在目标业务流的业务报文中封装第一应用感知标识,并向下游的网络设备转发封装有该第一应用感知标识的业务报文。该下游的网络设备进而可以基于该第一应用感知标识确定用于转发该目标业务流的第一网络服务,并采用该第一网络服务转发该目标业务流的业务报文。
综上所述,本申请实施例提供了一种报文转发方法,该方法能够基于目标业务流的用户需求生成第一应用感知标识。由于该第一应用感知标识与第一网络服务对应,且用于供网络设备在该目标业务流的业务报文中封装目标应用感知标识,因此可以确保接收到该业务报文的网络设备可以采用对应的第一网络服务来转发该业务报文,从而有效提高了业务报文转发的灵活性。
本申请实施例提供了一种业务流的性能检测方法,该方法可以应用于诸如图1所示的通信网络。参考图5,该方法包括:
步骤301、第三网络设备基于业务报文中的随流检测信息,对该业务报文所属的目标业务流进行随流检测,得到随流检测结果。
在本申请实施例中,该第三网络设备可以是该目标业务流的转发路径中的节点,且该第三网络设备可以为该目标业务流的随流检测路径的入口(ingress)节点、转发(transit)节点或出口(egress)节点。该随流检测结果可以包括对目标业务流的时延和/或丢包数等性能指标的测量结果。
可以理解的是,该随流检测信息可以是目标业务流的随流检测路径的入口节点封装在业务报文中的,该入口节点可以为该第三网络设备的上游节点,或者也可以为该第三网络设备。若该第三网络设备即为入口节点,则该第三网络设备可以在目标业务流的业务报文中封装随流检测信息,并可以基于该随流检测信息对目标业务流进行随流检测,得到随流检测结果。
步骤302、第三网络设备向网络中的控制器发送该随流检测结果和该目标业务流的目标应用感知标识。
该目标应用感知标识基于目标业务流的用户需求生成,该随流检测结果和该目标应用感知标识用于供控制器分析该目标业务流的传输性能。其中,该目标业务流的用户需求是指目标业务流对网络服务的性能的需求。该目标应用感知标识的结构可以参考图3。
作为一种可能的实现方式,第三网络设备接收到的目标业务流的业务报文中封装有该目标应用感知标识。该目标应用感知标识可以是由第三网络设备的上游节点(例如应用感知边缘设备)或该目标业务流所属的应用封装在业务报文中的。并且,该目标应用感知标识可以是上游节点或目标业务流所属的应用生成的第二应用感知标识,或者可以是控制器下发的第一应用感知标识。
作为另一种可能的实现方式,第三网络设备接收到的目标业务流的业务报文中未封装该目标业务流的目标应用感知标识。在该实现方式中,第三网络设备可以基于控制器下发的标识生成规则,生成该目标业务流的第二应用感知标识。相应的,该目标应用感知标识即为该第三网络设备生成的第二应用感知标识。
步骤303、控制器基于该随流检测结果和该目标应用感知标识,分析该目标业务流的传输性能。
控制器接收到第三网络设备发送的随流检测结果和目标应用感知标识后,能够以该目标应用感知标识中至少一个标识指示的粒度,分析该目标业务流的传输性能。其中,该传输性能可以采用丢包率和/或时延等性能指标来表示。
可以理解的是,控制器可以接收到不同网络设备上报的不同业务流的随流检测结果和应用感知标识,该控制器可以基于该应用感知标识确定同一业务流的随流检测结果,进而可以基于同一业务流的一个或多个随流检测结果分析该业务流的传输性能。
综上所述,本申请实施例提供了一种业务流的性能检测方法,网络设备在向控制器上报目标业务流的随流检测结果时,可以一同上报该目标业务流的目标应用感知标识。控制器进而能够以该目标应用感知标识中至少一个标识指示的粒度检测和分析业务流的传输性能,由此有效提高了对业务流的传输性能进行检测和分析时的灵活性。
图6是本申请实施例提供的又一种报文转发方法的流程图,该方法可以应用于诸如图1所示的通信网络。参考图6,该方法包括:
步骤401、控制器获取目标业务流的用户需求。
该目标业务流的用户需求是指目标业务流对网络服务的性能的需求。例如,该用户需求可以包括下述需求中的一种或多种:对指定转发路径的需求,对指定网络切片的需求,对传输性能的性能指标的需求。其中,传输性能的性能指标可以包括时延、带宽和丢包率等。并且,该目标业务流的用户需求还可以包括该目标业务流所属的用户和/或应用的信息。
在本申请实施例中,控制器可以通过其北向接口(northbound interface)获取该目标业务流的用户需求。例如,控制器的北向接口可以与其他设备连接以获取该设备发送的目标业务流的用户需求。具体的,该控制器的北向接口连接的设备包括但不限于服开系统(frontend)、站点(portal)、编排器、运营支撑系统(operation support system,OSS)或业务支撑系统(business support system,BSS)等。
步骤402、控制器基于该用户需求,获得该目标业务流的第一应用感知标识与传输该目标业务流所需的第一网络服务的对应关系。
控制器可以基于该目标业务流的用户需求生成该目标业务流的第一应用感知标识。如图3所示,该第一应用感知标识包括用户标识和应用标识中的至少一个。其中,该用户标识用于标识该目标业务流所属的用户;该应用标识用于标识该目标业务流所属的应用。示例的,假设该目标业务流所属的应用为企业应用,则该用户标识可以为企业的标识。
继续参考图3,该第一应用感知标识还可以包括流标识和SLA等级中的至少一个。其中,流标识用于标识目标业务流所属应用中的一条特定的数据流;该SLA等级用于标识该目标业务流所属用户的服务等级,该服务等级可以包括金、银和铜等,或者该服务等级还可以采用不同的颜色区分。
控制器还可以基于该目标业务流的用户需求,计算得到能够满足该用户需求的第一网络服务,从而得到该第一应用感知标识与第一网络服务的对应关系。其中,该第一网络服务可以包括网络切片和/或转发路径。
可以理解的是,该对应关系中可以记录第一应用感知标识及其对应的第一网络服务的标识,即该对应关系可以为第一应用感知标识与第一网络服务的标识的对应关系。若该第一网络服务包括网络切片,则该第一网络服务的标识可以包括网络切片的标识。若该第一网络服务包括转发路径,则该第一网络服务的标识可以包括转发路径的标识。其中,该转发路径可以为SRv6路径,该转发路径的标识可以为转发路径的BSID,或者可以是该转发路径所属的SR策略的BSID。
步骤403、控制器分别向第二网络设备和第一网络设备发送该对应关系。
其中,该第二网络设备可以为第一网络服务的头端网络设备(也称为头节点)。例如,该第二网络设备为转发路径的头节点,或者为网络切片的头节点。该对应关系用于供第二网络设备基于该第一应用感知标识确定转发该目标业务流的业务报文的第一网络服务。
该第一网络设备可以为ANP网络中的应用感知边缘设备(App-aware edge device),且该第一网络设备可以为BRAS、PE设备、CPE或者出口网关(例如某个园区的出口网关)等。该对应关系中的第一应用感知标识用于供该第一网络设备若确定接收到的业务流为该目标业务流,则在该目标业务流的业务报文中封装该目标业务流的应用感知标识,例如封装该第一应用感知标识。
示例的,参考图1,假设网络设备02a为应用感知边缘设备(即第一网络设备),网络设备02b为第一网络服务的头端网络设备(即第二网络设备),则控制器01可以分别向网络设备02a和网络设备02b下发对应关系。该控制器01下发的对应关系可以如表1所示。参考表1,该对应关系中,第一应用感知标识为APN ID1的目标业务流所对应的第一网络服务的标识为BSID1,即控制器01为该目标业务流分配的第一网络服务为BSID1指示的SRv6路径。第一应用感知标识为APN ID3的目标业务流所对应的第一网络服务的标识为slice-ID1,即控制器01为该目标业务流分配的第一网络服务为slice-ID1指示的网络切片。
表1
第一应用感知标识 第一网络服务的标识
APN ID1 BSID1
APN ID2 BSID2
APN ID3 slice-ID1
可以理解的是,该第二网络设备和第一网络设备可以为同一个网络设备,即该应用感知边缘设备即为第一网络服务的头端网络设备。在该场景中,控制器可以仅向一个网络设备下发该对应关系。例如,参考图7,假设网络设备02a为应用感知边缘设备(即第一网络设备),若该网络设备02a也为第一网络服务的头端网络设备(即第二网络设备),则控制器01可以仅向该网络设备02a下发对应关系。
还可以理解的是,对于该第二网络设备和第一网络设备为不同的网络设备的场景,控制器也可以仅向该第一网络设备(例如图1所示的网络设备02a)下发该第一应用感知标识,而无需下发该对应关系。
步骤404、控制器向第一网络设备发送标识生成规则。
该标识生成规则可以是指基于业务流的特征信息生成业务流的应用感知标识的规则。该标识生成规则用于供第一网络设备生成该目标业务流的第二应用感知标识,该第二应用感知标识用于与控制器生成的第一应用感知标识匹配,以便第一网络设备确定其接收到的目标业务流是否为该第一应用感知标识指示的业务流。
示例的,如图1所示,控制器01可以向网络设备02a下发该标识生成规则。
步骤405、第一网络设备基于该标识生成规则生成目标业务流的第二应用感知标识。
第一网络设备接收到控制器下发的标识生成规则后,即可基于该标识生成规则为其接收到的业务流生成应用感知标识。在本申请实施例中,第一网络设备可以获取其接收到的目标业务流的特征信息,并采用该标识生成规则对该特征信息进行处理,以生成目标业务流的第二应用感知标识。其中,该特征信息可以包括目标业务流的四元组信息、五元组信息或七元组信息等信息,或者还可以包括目标业务流的流量特征信息(例如报文间隔),又或者还可以包括基于DPI技术或应用识别技术获取到的信息。
示例的,假设该标识生成规则为AI模型,则第一网络设备可以将目标业务流的流量特征 信息输入至AI模型,从而得到该AI模型输出的该目标业务流的第二应用感知标识。
可以理解的是,该第二应用感知标识的结构与该第一应用感知标识的结构相同。若该第一应用感知标识包括应用标识,则该第一网络设备可以基于应用识别技术识别该目标业务流所属的应用,进而可以基于该标识生成规则生成该目标业务流所属应用的应用标识。若该第一应用感知标识包括用户标识,则第一网络设备可以根据目标业务流的虚拟局域网(virtual local area network,VLAN)或接口等信息确定该目标业务流所属用户,进而可以基于该标识生成规则生成该目标业务流所属用户的用户标识。
步骤406、若该第二应用感知标识与第一应用感知标识匹配,则第一网络设备在该目标业务流的业务报文中封装目标应用感知标识。
在本申请实施例中,若第一网络设备检测到其生成的目标业务流的第二应用感知标识与控制器下发的第一应用感知标识匹配,则可以确定该目标业务流即为该第一应用感知标识指示的业务流。由于该第二应用感知标识是第一网络设备基于控制器下发的标识生成规则生成的,因此可以确保与控制器下发的第一应用感知标识准确匹配,即确保了第一网络设备识别目标业务流的可靠性。
第一网络设备作为应用感知边缘设备,还可以在该目标业务流的业务报文中封装目标应用感知标识。该目标应用感知标识可以为控制器下发的第一应用感知标识,或者可以为该第一网络设备生成的该第二应用感知标识。
可选地,第一网络设备可以在业务报文的目的地址字段、HBH、DOH或SRH中封装该目标应用感知标识。例如,该SRH中包括BSID字段,第一网络设备可以在该BSID字段中封装该目标应用感知标识。
或者,若该第一网络设备接收到的业务报文中包括随流检测信息,则第一网络设备还可以在该随流检测信息中封装目标应用感知标识。例如,若该随流检测信息为IFIT信息,则第一网络设备可以在IFIT信息中的流标识字段或保留字段中封装该目标应用感知标识。
示例的,如图1所示,网络设备02a可以基于控制器01下发的标识生成规则生成目标业务流的第二应用感知标识。假设网络设备02a生成的第二应用感知标识为APN ID1,则由于该第二应用感知标识与表1所示对应关系中的第一应用感知标识APN ID1相同,因此网络设备02a可以在目标业务流的业务报文中封装APN ID1。例如,该网络设备02a可以在业务报文的BSID字段中封装APN ID1。
作为一种可能的示例,该业务报文中封装的目标应用感知标识的结构可以如图3所示,参考图3,该目标应用感知标识可以包括:SLA等级、应用标识、用户标识和流标识。
作为另一种可能的示例,该业务报文中封装的目标应用感知标识的结构可以如图8所示,参考图8,该目标应用感知标识可以包括:SLA等级、应用标识、用户标识、流标识和参数(arguments)字段。其中,该arguments字段可以指示该目标业务流的服务需求,例如可以指示该目标业务流的时延上限和/或丢包率上限。
作为又一种可能的示例,目标应用感知标识可以封装在SRv6报文中的段标识(segment ID,SID)的arguments字段中。如图9所示,SRv6报文中的SID包括定位地址(locator address)字段、功能标识(function ID)字段以及arguments字段。该arguments字段可以封装如图3或如图8所示的目标应用感知标识。
关于应用感知标识的相关解释可参考草案:draft-li-6man-app-aware-ipv6-network-03,该草案中的相关内容可以通过引用结合在本申请实施例中。
可以理解的是,该第一网络设备生成的第二应用感知标识与该控制器下发的第一应用感知标识匹配可以是指:第二应用感知标识与第一应用感知标识相同,或者可以是指该第二应用感知标识与第一应用感知标识不同,但具有一定的对应关系。
其中,应用感知标识之间的对应关系可以是控制器下发的,即控制器可以通过下发标识生成规则,以及下发应用感知标识之间的对应关系,以确保控制器和网络设备生成的应用感知标识同步。例如,控制器可以向第一网络设备下发第一应用感知标识以及与该第一应用感知标识匹配的其他应用感知标识的对应关系,第一网络设备可以基控制器下发的对应关系确定其生成的第二应用感知标识是否与该第一应用感知标识匹配。
还可以理解的是,若第一网络设备生成的第二应用感知标识与第一应用感知标识不同,则第一网络设备还可以向控制器上报该第二应用感知标识与第一应用感知标识的对应关系,以便控制器也能够获知网络设备侧生成的目标业务流的应用感知标识。例如,假设对于视频会议APP的业务流,控制器生成的第一应用感知标识为APN11,第一网络设备生成的第二应用感知标识为APN12,则第二网设备可以向控制器上报APN12与APN11的对应关系。
步骤407、第一网络设备向第二网络设备转发该目标业务流的业务报文。
第一网络设备可以向第二网络设备转发封装有目标应用感知标识的业务报文。其中,该第二网络设备可以是指该第一网络服务的头端网络设备。
示例的,参考图1,第一网络设备02a可以向第二网络设备02b转发封装有目标应用感知标识的业务报文。
步骤408、第二网络设备若确定接收到的目标业务流为该第一应用感知标识指示的业务流,则根据该对应关系,采用该第一网络服务转发该目标业务流的业务报文。
第二网络设备可以基于业务流的业务报文中封装的应用感知标识来识别其接收到的业务流。若第二网络设备检测到目标业务流的业务报文中的目标应用感知标识与该第一应用感知标识匹配,则可以确定该目标业务流即为第一应用感知标识指示的业务流。进而,该第二网络设备即可基于控制器下发的对应关系,采用该第一网络服务转发该目标业务流的业务报文。
示例的,参考图1,假设网络设备02b(即第二网络设备)接收到的目标业务流的业务报文中封装的目标应用感知标识为APN ID1,则该网络设备02b基于表1所示的对应关系可以确定控制器01为该目标业务流分配的第一网络服务为BSID1指示的SRv6路径。因此,该网络设备02b可以采用BSID1指示的SRv6路径转发该目标业务流的业务报文。
可以理解的是,对于该第一网络设备和第二网络设备为不同网络设备的场景,控制器在上述步骤403中可以仅向第二网络设备下发该对应关系,且上述步骤404至步骤406可以根据情况删除,即第一网络设备无需识别目标业务流并封装该目标应用感知标识。相应的,第二网络设备还可以通过报文解析或流量特征分析的方式来识别目标业务流是否为第一应用感知标识指示的业务流。或者,该目标业务流所属的应用在发送该目标业务流时即可在业务报文中封装该目标业务流的应用感知标识,第二网络设备可以基于目标业务流所属的应用封装的应用感知标识,识别其接收到的目标业务流是否为该为第一应用感知标识指示的业务流。
还可以理解的是,对于该第一网络设备和第二网络设备为同一网络设备的场景,上述步骤407可以删除。或者,上述步骤404可以与步骤403同步执行,即控制器可以在向第二网络设备(或第一网络设备)下发对应关系的同时,下发该标识生成规则。又或者,上述步骤405可以根据情况删除,即第二网络设备(或第一网络设备)也可以无需生成该第二应用感知标识,而是可以通过报文解析或流量特征分析的方式来识别其接收到的业务流是否为第一应用感知 标识指示的业务流。再或者,上述步骤406也可以根据情况删除,即第二网络设备(或第一网络设备)也可以无需在目标业务流的业务报文中封装目标应用感知标识。
综上所述,本申请实施例提供了一种报文转发方法,控制器可以获取业务流的应用感知标识与传输该业务流所需的网络服务的对应关系,并将该对应关系下发至网络设备。网络设备进而可以在识别出业务流为该应用感知标识指示的业务流时,直接采用对应的网络服务转发该业务流的报文。由于控制器可以建立并下发业务流的应用感知标识与网络服务的对应关系,使得网络设备可以直接基于该对应关系转发业务流的业务报文,因此有效提高了业务报文转发的灵活性。
图10是本申请实施例提供的另一种报文转发方法的流程图,该方法可以应用于诸如图1或图7所示的通信网络。参考图10,该方法包括:
步骤501、控制器获取目标业务流的用户需求。
在本申请实施例中,控制器可以通过北向接口获取该目标业务流的用户需求。例如,控制器的北向接口可以与服开系统,控制器可以获取该服开系统发送的目标业务流的用户需求。该步骤501的实现过程可以参考上述步骤401的相关描述。
步骤502、控制器基于该用户需求,生成该目标业务流的第一应用感知标识。
该第一应用感知标识用于封装在该目标业务流的业务报文中,且该第一应用感知标识与第一网络服务对应,例如与第一网络服务的标识对应。该第一网络服务满足该目标业务流的用户需求。其中,该第一应用感知标识包括用户标识和应用标识中的至少一个,且还可以包括流标识和SLA等级中的至少一个。该第一网络服务可以包括转发路径和/或网络切片。该步骤502的实现过程可以参考上述步骤402的相关描述。
步骤503、控制器向第一网络设备发送该第一应用感知标识。
该第一网络设备可以为ANP网络中的应用感知边缘设备,且该第一网络设备可以为BRAS、PE设备、CPE或者出口网关(例如某个园区的出口网关)等。该第一应用感知标识用于指示该目标业务流所属的用户和/或应用,且该第一应用感知标识用于供第一网络设备封装在该目标业务流的业务报文中。
步骤504、控制器基于该用户需求,确定传输该目标业务流所需的第一网络服务。
控制器可以基于该目标业务流的用户需求,计算得到能够满足该用户需求的第一网络服务,该第一网络服务可以包括网络切片和/或转发路径。该步骤504的实现过程可以参考上述步骤402的相关描述。
步骤505、控制器向第二网络设备发送该第一应用感知标识与第一网络服务的对应关系。
该第二网络设备可以是指该第一网络服务的头端网络设备。该对应关系用于供该第二网络设备基于该第一应用感知标识确定用于转发该目标业务流的业务报文的第一网络服务。
可以理解的是,该对应关系中可以记录第一应用感知标识及其对应的第一网络服务的标识,即该对应关系可以为第一应用感知标识与第一网络服务的标识的对应关系。若该第一网络服务包括网络切片,则该第一网络服务的标识可以包括网络切片的标识。若该第一网络服务包括转发路径,则该第一网络服务的标识可以包括转发路径的标识。其中,该转发路径可以为SRv6路径,该转发路径的标识可以为转发路径的BSID,或者可以是该转发路径所属的SR策略的BSID。
步骤506、若第一网络设备接收到的目标业务流为该第一应用感知标识指示的业务流,则 在该目标业务流的业务报文中封装目标应用感知标识。
第一网络设备可以识别其接收到的业务流。若第一网络设备识别出其接收到的目标业务流即为该第一应用感知标识指示的业务流,则可以在该目标业务流的业务报文中封装目标应用感知标识。由此,可以使得下游的网络设备(例如第二网络设备)可以基于该目标应用感知标识确定用于转发该目标业务流的业务报文的第一网络服务,和/或,可以在向控制器上报针对该目标业务流的随流检测结果时一同上报该目标应用感知标识。
其中,该目标应用感知标识可以是控制器下发的第一应用感知标识,或者,可以是该第一网络设备生成的该目标业务流的第二应用感知标识。第一网络设备在业务报文中封装该目标应用感知标识的过程可以参考上述步骤406的相关描述,此处不再赘述。
作为一种可能的示例,该第一网络设备可以通过报文解析或流量特征分析的方式来识别业务流是否为第一应用感知标识指示的业务流。例如,第一网络设备可以通过分析业务报文的四元组信息、五元组信息或七元组信息来识别业务流是否为第一应用感知标识指示的业务流。或者,第一网络设备还可以采用DPI技术分析业务流的业务报文,进而识别该业务流是否为第一应用感知标识指示的业务流。又或者,该第一网络设备还可以采用AI模型分析业务流的流量特征,进而识别该业务流是否为第一应用感知标识指示的业务流。
作为另一种可能的示例,控制器在上述步骤503中可以同步下发标识生成规则,第一网络设备可以基于该标识生成规则生成目标业务流的第二应用感知标识。若该第二应用感知标识与该第一应用感知标识匹配,则第一网络设备可以确定其接收到的目标业务流即为该第一应用感知标识指示的业务流。其中,第一网络设备基于控制器下发的标识生成规则生成第二应用感知标识的过程可以参考上述步骤404和步骤405的相关描述,此处不再赘述。
步骤507、第一网络设备向第二网络设备转发封装有该目标应用感知标识的业务报文。
该步骤507的实现过程可以参考上述步骤407的相关描述。
步骤508、第二网络设备若确定接收到的目标业务流为该第一应用感知标识指示的业务流,则根据该对应关系,采用该第一网络服务转发该目标业务流的业务报文。
第二网络设备若检测到目标业务流的业务报文中封装有目标应用感知标识,则可以基于控制器下发的对应关系,采用与该目标应用感知标识对应的第一网络服务转发该目标业务流的业务报文。该步骤508的实现过程可以参考上述步骤408的相关描述。
可以理解的是,在上述步骤501之后,控制器还可以将其获取到的目标业务流的用户需求发送至第一网络设备。相应的,第一网络设备可以基于该控制器发送的用户需求生成该目标业务流的第一应用感知标识。也即是,上述步骤503可以删除,且第一网络设备可以执行上述步骤502。例如,控制器和第一网络设备均可以执行该步骤502。
综上所述,本申请实施例提供了一种报文转发方法,控制器或第一网络设备可以基于目标业务流的用户需求生成该目标业务流的第一应用感知标识。由于该第一应用感知标识与第一网络服务对应,且用于供网络设备在该目标业务流的业务报文中封装目标应用感知标识,由此可以确保接收到该业务报文的网络设备可以采用对应的第一网络服务来转发该业务报文,从而有效提高了业务报文转发的灵活性。此外,本申请实施例提供的方法还可以通过控制器或第一网络设备生成业务流的应用感知标识,因此有效丰富了该应用感知标识的生成方式。
图11是本申请实施例提供的另一种业务流的性能检测方法的流程图,如图11所示,该方法包括:
步骤601、控制器获取目标业务流的用户需求。
步骤602、控制器基于该用户需求,获得该目标业务流的第一应用感知标识与传输该目标业务流所需的第一网络服务的对应关系。
步骤603、控制器分别向第二网络设备和第三网络设备发送该对应关系。
上述步骤601至步骤603的实现过程可以参考上述步骤401至步骤403的相关描述,或者,可以参考步骤501、步骤502、步骤504和步骤505的相关描述。
步骤604、控制器向第二网络设备和/或第三网络设备发送目标业务流的上送策略。
其中,该上送策略用于指示上报该目标业务流的随流检测结果。在本申请实施例中,控制器可以仅对部分关键业务流(包括该目标业务流)的传输性能进行检测和分析,以降低控制器的数据处理压力。相应的,控制器可以向网络设备发送该关键业务流的上送策略,以指示网络设备上报关键业务流的随流检测结果,其他非关键业务流的随流检测结则无需上报。
在本申请实施例中,该第三网络设备可以是该目标业务流的转发路径(例如第一网络服务中的转发路径)中的节点,且该第三网络设备可以为该目标业务流的随流检测路径的入口节点、转发节点或出口节点。并且,该第三网络设备与第二网络设备可以是同一网络设备,也可以是不同的网络设备。
可选地,该上送策略可以包括目标业务流的应用感知标识中的一个或多个字段的值。例如,该上送策略可以包括下述信息中的一种或多种:目标业务流所属应用的应用标识,目标业务流所属用户的用户标识,目标业务流的流标识,以及目标业务流的SLA等级。
示例的,参考图1,假设第二网络设备为02b,第三网络设备包括02c和02d,则该控制器01可以分别向网络设备为02b、02c和02d下发该目标业务流的上送策略。
步骤605、第二网络设备若确定接收到的目标业务流为该第一应用感知标识指示的业务流,则根据该对应关系,采用该第一网络服务转发该目标业务流的业务报文。
该步骤605的实现过程可以参考上述步骤408的相关描述。
步骤606、第三网络设备基于业务报文中的随流检测信息,对该业务报文所属的目标业务流进行随流检测,得到随流检测结果。
在本申请实施例中,第三网络设备可以接收到第二网络设备转发的目标业务流的业务报文。若该业务报文中包括随流检测信息(例如IFIT信息),则第三网络设备可以基于该随流检测信息对该业务报文所属的目标业务流进行随流检测,得到随流检测结果。其中,该随流检测结果可以包括对目标业务流的时延和/或丢包数等性能指标的测量结果。
可以理解的是,该随流检测信息可以为目标业务流的随流检测路径的入口节点封装在业务报文中的,该入口节点可以为该第一网络设备,或者可以为该第二网络设备,又或者还可以为该第二网络设备的下游网络设备,例如可以是该第三网络设备。若该入口节点为第三网络设备,则该第三网络设备可以在目标业务流的业务报文中封装随流检测信息,并可以基于该随流检测信息对目标业务流进行随流检测,得到随流检测结果。
步骤607、第三网络设备基于该上送策略的指示,向控制器发送随流检测结果和目标应用感知标识。
在本申请实施例中,第三网络设备可以获取该目标业务流的目标应用感知标识。第三网络设备若基于该目标应用感知标识和该上送策略,确定该目标业务流属于需上报随流检测结果的关键业务流,则可以向控制器发送该目标业务流的随流检测结果和该目标应用感知标识。
可选地,该目标业务流的上送策略可以包括目标业务流的应用感知标识中的一个或多个 字段的值。第三网络设备获取到目标业务流的目标应用感知标识后,可以检测上送策略中每个字段的值与该目标应用感知标识中对应字段的值是否匹配。若上送策略中每个字段的值均与该目标应用感知标识中对应字段的值匹配,则第三网络设备可以确定该目标业务流属于需上报随流检测结果的关键业务流,并向控制器上报该目标业务流的随流检测结果和目标应用感知标识。
可以理解的是,若第三网络设备获取到某个业务流的应用感知标识后,检测到该上送策略中任一字段的值与该应用感知标识中对应字段的值不匹配,则第三网络设备可以确定该业务流不为关键业务流,进而无需上报该业务流的随流检测结果和应用感知标识。
示例的,参考图1,假设该上送策略包括:用户标识=UID1。若第三网络设备02c和02d获取到的目标业务流的目标应用感知标识包括用户标识,且该用户标识为UID1,则第三网络设备02c和02d均可以确定该目标业务流属于关键业务流,并可以上报该目标业务流的随流检测结果和目标应用感知标识。若第三网络设备获取到的某个业务流的应用感知标识中的用户标识为UID2,则第三网络设备可以确定该业务流不为关键业务流,进而无需报该业务流的随流检测结果和应用感知标识。
由于第三网络设备可以基于控制器下发的上送策略,仅上报关键业务流的随流检测结果,且无需上报非关键业务流的随流检测结果,因此不仅降低了控制器所需接收和处理的随流检测结果的数据量,即降低了控制器的数据处理压力,而且实现了随流检测结果的上报粒度的灵活可调。又由于第三网络设备所需上报的随流检测结果的数据量降低,因此还能有效降低随流检测结果占用的传输资源。
作为一种可能的实现方式,第三网络设备可以从目标业务流的业务报文中获取该目标业务流的目标应用感知标识。该目标应用感知标识可以是控制器下发的第一应用感知标识,或者可以是网络设备生成的第二应用感知标识。
在该实现方式中,该目标应用感知标识可以由应用感知边缘设备(即上文所述的第一网络设备)封装在业务报文中。或者,可以由该目标业务流的随流检测路径的入口节点封装在业务报文中。又或者,可以由用于转发该目标业务流的第一网络服务的头端网络设备(即上文所述的第二网络设备)封装在业务报文中。再或者,还可以由该目标业务流所属的应用封装在业务报文中。
可选地,若该业务报文中的随流检测信息为IFIT信息,则如图12所示,该IFIT信息的流标识字段可以封装有该目标应用感知标识,即该目标应用感知标识可以替代IFIT信息中的FlowMonID。或者,该IFIT信息的保留(reserved)字段中可以封装有该目标应用感知标识,即该IFIT信息可以即包括FlowMonID,也包括目标应用感知标识。
作为另一种可能的实现方式,第三网络设备接收到的目标业务流的业务报文中未封装该目标业务流的目标应用感知标识。在该实现方式中,控制器还可以向第三网络设备下发标识生成规则。第三网络设备接收到该目标业务流的业务报文后,可以基于该控制器下发的标识生成规则生成该目标业务流的第二应用感知标识,相应的,上文所述的目标应用感知标识可以为该第三网络设备生成的第二应用感知标识。其中,第三网络设备生成第二应用感知标识的过程可以参考上述步骤405。
或者,控制器还可以向第三网络设备下发第一应用感知标识与第一网络服务的对应关系。第三网络设备接收到该目标业务流的业务报文后,可以通过报文解析或流量特征分析的方式确定该目标业务流为该第一应用感知标识指示的业务流。也即是,第三网络设备可以通过报 文解析或流量特征分析的方式确定该目标业务流的应用感知标识为该第一应用感知标识。相应的,上文所述的目标应用感知标识还可以为该控制器下发的第一应用感知标识。
可以理解的是,若第三网络设备接收到的目标业务流的业务报文中未封装目标应用感知标识,则该第三网络设备在获取到该目标业务流的目标应用感知标识后,可以在该目标业务流的业务报文中封装该目标应用感知标识,并转发封装有该目标应用感知标识的业务报文。
示例的,假设第三网络设备接收到的目标业务流的业务报文中包括IFIT信息,则该第三网络设备可以在IFIT信息的流标识字段或保留字段中封装该目标应用感知标识。当然,该第三网络设备还可以在业务报文的目的地址字段、HBH、DOH或SRH中封装该目标应用感知标识。
还可以理解的是,若该第三网络设备接收到的业务报文中的目标应用感知标识封装在目的地址字段、HBH、DOH或SRH中,则该第三网络设备还可以将该目标应用感知标识从原封装位置取出,并重新封装在IFIT信息的流标识字段或保留字段中。之后,该第三网络设备可以转发该重新封装后的业务报文。
步骤608、控制器基于该随流检测结果和目标应用感知标识,分析目标业务流的传输性能。
在本申请实施例中,控制器接收到第三网络设备发送的随流检测结果和目标应用感知标识后,能够以该目标应用感知标识中至少一个标识指示的粒度,分析该目标业务流的传输性能。其中,该传输性能可以采用丢包率和/或时延等性能指标来表示。
在随流检测场景中,控制器可以接收到该目标业务流的随流检测路径中至少一个第三网络设备上报的随流检测结果,控制器可以基于接收到的至少一个随流检测结果分析该目标业务流的传输性能。其中,该至少一个第三网络设备可以包括随流检测路径中的入口节点、中间节点和/或出口节点。
例如,若该至少一个第三网络设备包括入口节点和出口节点,则控制器可以实现对该目标业务流的传输性能的端到端检测;若该至少一个第三网络设备包括入口节点、中间节点和出口节点,则控制器可以实现对该目标业务流的传输性能的逐跳检测。
可以理解的是,控制器可以接收到不同网络设备上报的不同业务流的随流检测结果和应用感知标识,该控制器可以基于该应用感知标识确定同一业务流的随流检测结果,进而可以基于同一业务流的一个或多个随流检测结果分析该业务流的传输性能。
还可以理解的是,该目标应用感知标识指示的目标业务流可以是一条特定的数据流,或者也可以是一组数据流,即该目标业务流可以包括多条数据流。例如,该一组数据流可以包括同一用户所使用的不同应用的数据流,或者同一应用下不同用户的数据流。若该目标业务流为一组数据流,则控制器可以根据接收到的随流检测结果分析该一组业务流中各条数据流的传输性能,或者可以分析该一组业务流的整体传输性能,也可以称为平均传输性能。
可选地,在上述步骤607中,第三网络设备在向控制器发送随流检测结果和目标应用感知标识时,还可以一同上报对应的随流检测的流标识。该随流检测的流标识可以是从随流检测信息中获取到的,例如,该随流检测的流标识可以为IFIT信息中的监控流标识(FlowMonID)。该随流检测的流标识可以指示该目标业务流中被监测的一条数据流,或者可以理解为:该随流检测结果为针对该随流检测的流标识所指示的数据流的检测结果。
相应的,控制器即可基于目标应用感知标识与随流检测的流标识的对应关系,确定该目标业务流包括的至少一条数据流;进而可以基于该随流检测结果,分析该目标业务流包括的至少一条数据流的传输性能。
对于该目标业务流包括多条被监测的数据流的场景,由于每条被监测数据流均具有唯一 的随流检测的流标识(例如FlowMonID),因此控制器中还可以生成目标应用感知标识与多个随流检测的流标识的对应关系。控制器在分析目标业务流的传输性能时,可以分析该目标业务流所包括的每条被监测的数据流的传输性能。之后,该控制器还可以基于各条被监测的数据流的传输性能,确定该目标业务流的整体传输性能(例如平均传输性能)。示例的,控制器可以计算目标业务流中每条被监测的数据流的丢包率,并将该各条被监测的数据流的丢包率的均值作为该目标业务流的平均丢包率。
步骤609、控制器按照目标粒度显示该目标业务流的性能指标。
其中,该性能指标用于指示目标业务流的传输性能,例如,该性能指标可以包括丢包率和时延中的至少一个。该目标粒度为该目标应用感知标识中至少一个标识指示的粒度。由于该目标应用感知标识可以包括用户标识和应用标识中的至少一个,因此该控制器能够以用户和/或应用为粒度显示业务流的性能指标。若该目标应用感知标识还包括流标识(即session ID)和SLA等级,则该控制器还能够以流标识和/或SLA等级为粒度显示业务流的性能指标。
可以理解的是,该目标粒度可以基于应用场景的需求灵活配置和调节,例如可以由运维人员配置和调节。
若该目标粒度为用户粒度,则控制器能够以用户为单位,显示一个或多个用户中每个用户的至少一条业务流的性能指标。其中,对于每个用户,控制器可以显示该用户的每条业务流(例如该用户所使用的每个应用的业务流)的性能指标,或者可以显示该用户的多条业务流的性能指标的均值。
若该目标粒度为应用粒度,则控制器能够以应用为单位,显示一个或多个应用中每个应用的至少一条业务流的性能指标。其中,对于每个应用,控制器可以显示该应用的每条业务流(例如使用该应用的每个用户的业务流)的性能指标,或者可以显示该应用的多条业务流的性能指标的均值。该均值可以是算术平均值、均方根平均值或加权平均值。
若该目标粒度为用户+应用粒度,则控制器能够以用户和应用为单位,显示用户标识相同,且应用标识相同的至少一条业务流的性能指标。
示例的,假设控制器获取到了业务流1至业务流3共三条业务流的随流检测结果,该三条业务流的应用感知标识如表2所示。若目标粒度为用户粒度,且需显示性能指标的目标用户的用户标识为UID1,则控制器可以分别显示业务流1和业务流2的性能指标,或者控制器可以计算并显示该业务流1和业务流2的性能指标的均值。
若该目标粒度为应用粒度,且需显示性能指标的目标应用的应用标识为AID1,则控制器可以分别显示业务流1和业务流3的性能指标,或者控制器可以计算并显示该业务流1和业务流3的性能指标的均值。
若该目标粒度为用户+应用粒度,且需显示性能指标的业务流的用户标识为UID1,应用标识为AID2,则控制器可以显示业务流2的性能指标。
表2
Figure PCTCN2022096044-appb-000001
基于上述分析可知,由于业务流的应用感知标识可以包括业务流的多个不同维度的信息,因此以该应用感知标识中的标识指示的粒度显示业务流的性能指标,可以实现性能指标的精细化可视。并且,该性能指标的显示粒度还可以根据需求灵活调节,从而有效提高了性能指标显示的灵活性。
步骤610、控制器若基于该传输性能确定第一网络服务不满足目标业务流的用户需求,则确定传输目标业务流所需的网络服务为第二网络服务。
在本申请实施例中,由于第三网络设备上报的目标业务流的目标应用感知标识与控制器生成的第一应用感知标识匹配,因此控制器可以确定该目标业务流即为第一应用感知标识指示的业务流。进而,控制器可以确定出该目标业务流的用户需求,并可以基于分析得到的目标业务流的传输性能,检测该传输性能是否满足该目标业务流的用户需求。若控制器确定该目标业务流的传输性能不满足目标业务流的用户需求,则还可以重新计算能够满足该目标业务流的用户需求的第二网络服务,即控制器可以将目标业务流的网络服务由第一网络服务更新为第二网络服务。
可以理解的是,若控制器确定该目标业务流的传输性能满足该目标业务流的用户需求,则无需更新用于传输该目标业务流的网络服务。
步骤611、控制器向第二网络设备发送该第一应用感知标识与第二网络服务的对应关系。
控制器可以重新向第二网络设备下发该第一应用感知标识与第二网络服务的对应关系,例如可以下发该第一应用感知标识与第二网络服务的标识的对应关系。第二网络设备接收到该对应关系后,即可采用第二网络服务转发该目标业务流的业务报文。
由于控制器可以在目标业务流传输的过程中,基于随流检测结果分析该目标业务流的传输性能,并基于该传输性能及时调整为该目标业务流分配的网络服务,由此实现了网络资源的闭环动态调优,有效确保了该目标业务流的传输性能。
示例的,假设目标业务流的第一应用感知标识为APN ID1,第一网络服务的标识为BSID1,控制器重新计算出的第二网络服务为BSID2指示的SRv6路径。则参考图1,控制器01可以向网络设备02b下发APN ID1与BSID2的对应关系。网络设备02b后续即可采用BSID2指示的SRv6路径转发目标业务流的业务报文。
可以理解的是,对于该第二网络设备与应用感知边缘设备(即上文所述的第一网络设备)为不同设备的场景,该控制器还可以向该第一网络设备发送第一应用感知标识与第二网络服务的对应关系。例如,参考图1,控制器01还可以向网络设备02a发送该第一应用感知标识与第二网络服务的对应关系。
可选地,在上述步骤607中,该第三网络设备也可以无需基于该上送策略检测目标业务流是否属于关键业务流,而是可以直接向控制器上报该目标业务流的随流检测结果和该目标应用感知标识。也即是,第三网络设备若检测到业务报文中包括随流检测信息,则可以基于该随流检测信息对业务报文所属的业务流进行随流检测,并直接向控制器上报随流检测结果和该业务流的应用感知标识。
作为一种可能的示例,上述步骤604可以根据情况删除,即控制器无需下发目标业务流的上送策略。相应的,第三网络设备也就无需基于该上送策略检测目标业务流是否属于关键业务流。
作为另一种可能的示例,该第三网络设备可以具有应用感知标识处理功能,若该应用感知 标识处理功能启用,则第三网络设备可以基于目标应用感知标识和该上送策略,检测目标业务流是否属于关键业务流。若该应用感知标识处理功能未启用,则第三网络设备无需基于该上送策略检测目标业务流是否属于关键业务流。
可选地,该第三网络设备可以基于接收到的配置指令启用或关闭其应用感知标识处理功能。其中,该配置指令可以由控制器下发,或者可以由运维人员直接配置。
还可以理解的是,第三网络设备在接收到目标业务流的业务报文后,还可以先基于该上送策略检测该目标业务流是否为关键业务流。第三网络设备若确定该目标业务流为关键业务流,则可以执行上述步骤606以获取该目标业务流的随流检测结果。第三网络设备若确定该目标业务流不为关键业务流,则无需执行该步骤606,即第三网络设备无需对非关键业务流进行随流检测。
还可以理解的是,作为一种可能的实现方式中,控制器在上述步骤601中可以向目标业务流的随流检测路径中的每个节点均发送该目标业务流的上送策略。则该随流检测路径中的每个节点均可以基于上述步骤607所示的方法检测接收到的业务流是否为关键业务流。
作为另一种可能的实现方式中,控制器可以仅向应用感知边缘设备(即第一网络设备)发送该目标业务流的上送策略。第一网络设备可以基于目标业务流的目标应用感知标识和该上送策略,确定该目标业务流属于需上报随流检测结果的关键业务流,并可以在该目标业务流的业务报文中添加标记信息。第一网络设备的下游的网络设备(例如第三网络设备)进而可以基于该标记信息确定该目标业务流为关键业务流。相应的,在该实现方式中,第三网络设备可以直接基于业务报文中的标记信息确定该业务报文所属的业务流是否为关键业务流。
还可以理解的是,上述报文转发方法中各步骤的执行顺序可以根据情况调节,步骤也可以根据情况增减。例如,上述步骤604可以在步骤603之前执行;或者,上述步骤609可以根据情况删除;又或者,上述步骤610和步骤611可以在步骤609之前执行;再或者,上述步骤610和步骤611可以根据情况删除。
综上所述,本申请实施例提供了一种报文转发方法,网络设备在向控制器上报目标业务流的随流检测结果时,可以一同上报该目标业务流的目标应用感知标识。控制器进而能够以该目标应用感知标识中至少一个标识指示的粒度检测和分析业务流的传输性能,由此有效提高了对业务流的传输性能进行检测和分析时的灵活性。并且,由于该控制器还可以按照该目标应用感知标识中至少一个标识指示的粒度显示业务流的性能指标,由此实现了性能指标的精细化灵活可视。
图13是本申请实施例提供的一种控制器的结构示意图,该控制器可以应用于诸如图1或图7所示的通信网络中,且可以实现上述图2、图6、图10或图11所示实施例中由控制器执行的步骤。参考图13,该控制器包括:
生成模块011,用于基于目标业务流的用户需求,获得该目标业务流的第一应用感知标识与传输该目标业务流所需的第一网络服务的对应关系。该生成模块011的功能实现可以参考上述方法实施例中步骤101、步骤402或步骤602的相关描述。
发送模块012,用于向第二网络设备发送该对应关系,该对应关系用于供该第二网络设备基于该第一应用感知标识确定用于转发该目标业务流的业务报文的该第一网络服务。该发送模块012的功能实现可以参考上述方法实施例中步骤102、步骤403、步骤505或步骤603的相关描述。
可选地,该对应关系中包括该第一网络服务的标识,该第一网络服务的标识包括:绑定段标识和/或网络切片的标识。
可选地,该第一应用感知标识包括用户标识和应用标识中的至少一个。
可选地,该第一应用感知标识还包括流标识、SLA级别和服务需求中的至少一个。
可选地,该发送模块012,还用于向该第二网络设备发送标识生成规则,以供该第二网络设备基于该标识生成规则生成该目标业务流的第二应用感知标识,该第二应用感知标识用于与该第一应用感知标识匹配以确定该第一网络服务。该发送模块012的功能实现还可以参考上述方法实施例中步骤404的相关描述。
可选地,该发送模块012,还用于向第一网络设备发送该目标业务流的第一应用感知标识,该第一应用感知标识用于供该第一网络设备若确定接收到的业务流为该目标业务流,则在该目标业务流的业务报文中封装该目标业务流的应用感知标识。该发送模块012的功能实现还可以参考上述方法实施例中步骤503的相关描述。
可选地,如图14所示,该控制器还可以包括:获取模块013,用于通过北向接口获取该目标业务流的用户需求。该获取模块013的功能实现可以参考上述方法实施例中步骤401、步骤501或步骤601的相关描述。
可选地,继续参考图14,该控制器还可以包括:
接收模块014,用于接收第三网络设备发送的随流检测结果和目标应用感知标识,该目标应用感知标识为该随流检测结果所属业务流的应用感知标识,且该目标应用感知标识为该第一应用感知标识或网络设备生成的该目标业务流的第二应用感知标识。该接收模块014的功能实现可以参考上述方法实施例中步骤607的相关描述。
分析模块015,用于基于该随流检测结果和该目标应用感知标识,分析该目标业务流的传输性能。该分析模块015的功能实现可以参考上述方法实施例中步骤608的相关描述。
可选地,如图14所示,该控制器还可以包括:
显示模块016,用于按照目标粒度显示该目标业务流的性能指标,该性能指标用于指示该目标业务流的传输性能;其中,该目标粒度为该目标应用感知标识中至少一个标识指示的粒度。
该显示模块016的功能实现可以参考上述方法实施例中步骤609的相关描述。
可选地,该生成模块011,还用于基于该目标业务流的传输性能确定该第一网络服务不满足该目标业务流的用户需求,以及确定传输该目标业务流所需的网络服务为第二网络服务。该生成模块011的功能实现可以参考上述方法实施例中步骤610的相关描述。
该发送模块012,还用于向该第二网络设备发送该第一应用感知标识与该第二网络服务的对应关系。该发送模块012的功能实现还可以参考上述方法实施例中步骤611的相关描述。
可选地,该发送模块012,还用于在该接收模块014接收第三网络设备发送的随流检测结果和目标应用感知标识之前,向该第二网络设备和/或第三网络设备发送该目标业务流的上送策略,该上送策略用于指示上报该目标业务流的随流检测结果。该发送模块012的功能实现还可以参考上述方法实施例中步骤604的相关描述。
可选地,该接收模块014可以用于接收第三网络设备发送的随流检测结果、目标应用感知标识以及对应的随流检测的流标识,该随流检测的流标识也称为监控流标识,其可以用于指示目标业务流中被监测的一条数据流。
该分析模块015,可以用于基于目标应用感知标识与随流检测的流标识的对应关系,确定 该目标业务流包括的至少一条数据流;以及基于该随流检测结果,分析该目标业务流包括的至少一条数据流的传输性能。
可选地,该目标业务流的用户需求包括下述需求中的一种或多种:对指定转发路径的需求,对指定网络切片的需求,对传输性能的性能指标的需求。
综上所述,本申请实施例提供了一种控制器,该控制器可以获取业务流的应用感知标识与传输该业务流所需的网络服务的对应关系,并将该对应关系下发至网络设备。网络设备进而可以在识别出业务流为该应用感知标识指示的业务流时,直接采用对应的网络服务转发该业务流的报文。由于控制器可以建立并下发业务流的应用感知标识与网络服务的对应关系,使得网络设备可以直接基于该对应关系转发业务流的业务报文,因此有效提高了业务报文转发的灵活性。
图15是本申请实施例提供的一种网络设备的结构示意图,该网络设备可以应用于诸如图1或图7所示的通信网络中。例如,该网络设备可以为图1或图7中的网络设备02a、02c或02d,或者可以为图1所示的网络设备02b。并且,该网络设备可以实现上述图2、图6、图10或图11所示实施例中由第二网络设备、第一网络设备和第三网络设备中至少一个网络设备执行的步骤。参考图15,该网络设备包括:
接收模块021,用于接收网络中的控制器发送的第一应用感知标识与第一网络服务的对应关系,其中,该第一应用感知标识由该控制器基于业务流的用户需求生成。该接收模块021的功能实现可以参考上述方法实施例中步骤102、步骤403、步骤505或步骤603的相关描述。
发送模块022,用于若接收到的目标业务流为该第一应用感知标识指示的业务流,则根据该对应关系,采用该第一网络服务转发该目标业务流的业务报文。该发送模块022的功能实现可以参考上述方法实施例中步骤103、步骤408、步骤508或步骤605的相关描述。
可选地,如图16所示,该网络设备还可以包括:
获取模块023,用于从该目标业务流的业务报文中获取该目标业务流的第二应用感知标识。
确定模块024,用于若该第二应用感知标识与该第一应用感知标识匹配,则确定该目标业务流为该第一应用感知标识指示的业务流。
可选地,该网络设备接收到的业务报文中包括IFIT信息,该IFIT信息的流标识字段或保留字段中封装有该第二应用感知标识;或者,该业务报文的目的地址字段、HBH、DOH或SRH中封装该第二应用感知标识。
可选地,该SRH字段的BSID字段中封装有该第二应用感知标识。
可选地,该接收模块021,还可以用于接收该控制器发送的标识生成规则。该接收模块021的功能实现还可以参考上述方法实施例中步骤404的相关描述。
继续参考图16,该网络设备还可以包括:
生成模块025,用于基于该标识生成规则生成该目标业务流的第二应用感知标识。该生成模块025的功能实现可以参考上述方法实施例中步骤405的相关描述。
确定模块024,用于若该第二应用感知标识与该第一应用感知标识匹配,则确定该目标业务流为该第一应用感知标识指示的业务流。该确定模块024的功能实现可以参考上述方法实施例中步骤406的相关描述。
可选地,该网络设备接收到的该业务报文中包括IFIT信息;该发送模块022,可以用于在该IFIT信息的流标识字段或保留字段中封装该目标应用感知标识,以及采用该第一网络服务转发封装有该目标应用感知标识的业务报文。该发送模块022的功能实现还可以参考上述方法 实施例中步骤406或步骤506的相关描述。
可选地,如图16所示,该网络设备还可以包括:
检测模块026,用于若该接收模块021接收到的目标业务流的业务报文中包括随流检测信息,则基于该随流检测信息对该目标业务流进行随流检测,得到随流检测结果。该检测模块026的功能实现可以参考上述方法实施例中步骤606的相关描述。
该发送模块022,还用于向控制器发送该随流检测结果和目标应用感知标识,该目标应用感知标识为该第一应用感知标识或该网络设备获取到的该目标业务流的第二应用感知标识。该发送模块022的功能实现还可以参考上述方法实施例中步骤607的相关描述。
可选地,该接收模块021,还可以用于接收该控制器发送的该目标业务流的上送策略,该上送策略用于指示上报该目标业务流的随流检测结。该接收模块021的功能实现还可以参考上述方法实施例中步骤604的相关描述。
该发送模块022,可以用于基于该上送策略的指示,向该控制器发送该随流检测结果和目标应用感知标识。
可选地,该发送模块022,可以用于向控制器发送随流检测结果、目标应用感知标识以及对应的随流检测的流标识。其中,该随流检测的流标识可以用于指示目标业务流中被监测的一条数据流。
综上所述,本申请实施例提供了一种网络设备,该网络设备可以接收控制器下发的业务流的应用感知标识与传输该业务流所需的网络服务的对应关系,并可以在识别出业务流为该应用感知标识指示的业务流时,直接采用对应的网络服务转发该业务流的报文。由于控制器可以建立并下发业务流的应用感知标识与网络服务的对应关系,使得网络设备可以直接基于该对应关系转发业务流的业务报文,因此有效提高了业务报文转发的灵活性。
图17是本申请实施例提供的一种报文转发装置的结构示意图,该报文转发装置可以应用于诸如图1或图7所示的通信网络中,且可以实现上述图4所示实施例中的步骤。参考图17,该报文转发装置包括:
生成模块001,用于基于目标业务流的用户需求,生成该目标业务流的第一应用感知标识,该第一应用感知标识供网络设备在目标业务流的业务报文中封装目标应用感知标识,该目标应用感知标识为该第一应用感知标识,或与该第一应用感知标识匹配的第二应用感知标识,该第一应用感知标识与第一网络服务对应,该第一网络服务满足该目标业务流的用户需求。该生成模块001的功能实现可以参考上述方法实施例中步骤201的相关描述。
发送模块002,用于发送该第一应用感知标识,该第一应用感知标识用于供网络设备采用该第一网络服务转发该目标业务流的业务报文。该发送模块002的功能实现可以参考上述方法实施例中步骤202的相关描述。
作为一种可能的实现方式,该报文转发装置可以应用于诸如图1或图7所示的通信网络中的控制器,且还可以实现上述图6、图10或图11所示实施例中由控制器执行的步骤。
该生成模块001,可以用于基于获取到的目标业务流的用户需求,生成该目标业务流的第一应用感知标识。该生成模块001的功能实现还可以参考上述方法实施例中步骤402,步骤502或步骤602的相关描述。
该发送模块002,用于向第一网络设备发送该第一应用感知标识,以使得该第一网络设备在该目标业务流的业务报文中封装该目标应用感知标识。该发送模块002的功能实现还可以参 考上述方法实施例中步骤503的相关描述。
可选地,如图18所示,该装置还可以包括:
获取模块003,用于通过北向接口获取该目标业务流的用户需求。该获取模块003的功能实现可以参考上述方法实施例中步骤401、步骤501或步骤601的相关描述。
可选地,该生成模块001,还用于基于该目标业务流的用户需求,确定传输该目标业务流所需的该第一网络服务。该生成模块001的功能实现还可以参考上述方法实施例中步骤503的相关描述。
该发送模块002,还用于向第二网络设备发送该第一应用感知标识与该第一网络服务的对应关系,该对应关系用于供该第二网络设备基于该第一应用感知标识确定用于转发该目标业务流的业务报文的该第一网络服务。该发送模块002的功能实现还可以参考上述方法实施例中步骤403,步骤505或步骤603的相关描述。
可选地,继续参考图18,该装置还可以包括:
接收模块004,用于接收第三网络设备发送的随流检测结果和目标应用感知标识。该接收模块004的功能实现可以参考上述方法实施例中步骤607的相关描述。
分析模块005,用于基于该随流检测结果和该目标应用感知标识,分析该目标业务流的传输性能。该分析模块005的功能实现可以参考上述方法实施例中步骤608的相关描述。
可选地,如图18所示,该装置还可以包括:
显示模块006,用于按照目标粒度显示该目标业务流的性能指标,该性能指标用于指示目标业务流的传输性能;其中,该目标粒度为该目标应用感知标识中至少一个标识指示的粒度。该显示模块006的功能实现可以参考上述方法实施例中步骤609的相关描述。
可选地,该接收模块004,可以用于接收第三网络设备发送的随流检测结果、目标应用感知标识以及对应的随流检测的流标识;
该分析模块005,可以用于基于该目标应用感知标识与该随流检测的流标识的对应关系,确定该目标业务流包括的至少一条数据流,以及基于该随流检测结果,分析该目标业务流包括的至少一条数据流的传输性能。
可选地,该生成模块001,还可以用于基于该目标业务流的传输性能确定该第一网络服务不满足目标业务流的用户需求,以及确定传输该目标业务流所需的网络服务为第二网络服务。该生成模块001的功能实现还可以参考上述方法实施例中步骤610的相关描述。
该发送模块002,还可以用于向第二网络设备发送该第一应用感知标识与该第二网络服务的对应关系。该发送模块002的功能实现还可以参考上述方法实施例中步骤611的相关描述。
可选地,该发送模块002,还可以用于在接收模块004接收第三网络设备发送的随流检测结果和目标应用感知标识之前,向该第一网络设备和/或该第三网络设备发送该目标业务流的上送策略,该上送策略用于指示上报该目标业务流的随流检测结果。该发送模块002的功能实现还可以参考上述方法实施例中步骤604的相关描述。
作为另一种可能的实现方式,该报文转发装置可以应用于诸如图1或图7所示的通信网络中的网络设备,且还可以实现上述图6、图10或图11所示实施例中由第二网络设备、第一网络设备和第三网络设备中至少一个网络设备执行的步骤。
该生成模块001,可以用于基于控制器发送的目标业务流的用户需求,生成该目标业务流的第一应用感知标识。该生成模块001的功能实现还可以参考上述步骤502的相关描述。
该发送模块002,可以用于在该目标业务流的业务报文中封装该第一应用感知标识,并转 发封装有该第一应用感知标识的业务报文。该发送模块002的功能实现还可以参考上述方法实施例中步骤506和步骤507的相关描述。
可选地,该第一网络设备接收到的该目标业务流的业务报文中包括随流检测信息,如图19所示,该装置还可以包括:
检测模块007,用于基于该随流检测信息对目标业务流进行随流检测,得到随流检测结果。该检测模块007的功能实现可以参考上述方法实施例中步骤606的相关描述。
该发送模块002,还可以用于向该控制器发送该随流检测结果和该第一应用感知标识。该发送模块002的功能实现还可以参考上述方法实施例中步骤607的相关描述。
可选地,继续参考图19,该装置还可以包括:
接收模块008,用于接收该控制器发送的该目标业务流的上送策略,该上送策略用于指示上报该目标业务流的随流检测结果。该接收模块008的功能实现还可以参考上述方法实施例中步骤604的相关描述。
该发送模块002,可以用于基于该上送策略的指示,向该控制器发送该随流检测结果和该第一应用感知标识。
可选地,该发送模块002,可以用于向该控制器发送该随流检测结果、该第一应用感知标识以及对应的随流检测的流标识。
可选地,该发送模块002,可以用于在该业务报文的IFIT信息的流标识字段或保留字段中封装该第一应用感知标识;或者,在该业务报文的目的地址字段、HBH、DOH或SRH中封装该第一应用感知标识。
可选地,该目标业务流的用户需求包括下述需求中的一种或多种:对指定转发路径的需求,对指定网络切片的需求,对传输性能的性能指标的需求。
可选地,该目标应用感知标识包括用户标识和应用标识中的至少一个。
综上所述,本申请实施例提供了一种报文转发装置,该报文转发装置能够基于目标业务流的用户需求生成第一应用感知标识。由于该第一应用感知标识与第一网络服务对应,且用于封装在该目标业务流的业务报文中,因此可以确保接收到该业务报文的网络设备可以采用对应的第一网络服务来转发该业务报文,从而有效提高了业务报文转发的灵活性。
图20是本申请实施例提供的一种网络设备的结构示意图,该网络设备可以应用于诸如图1或图7所示的通信网络中。例如,该网络设备可以为图1或图7中的网络设备02a、02c或02d,或者可以为图1所示的网络设备02b。并且,该网络设备可以实现上述图4所示实施例中的步骤,或者实现图6、图10或图11所示实施例中由第二网络设备、第一网络设备和第三网络设备中至少一个网络设备执行的步骤。参考图20,该网络设备包括:
接收模块021,用于接收控制器发送的第一应用感知标识,该第一应用感知标识基于业务流的用户需求生成,且该第一应用感知标识与第一网络服务对应,该第一网络服务满足该业务流的用户需求。该接收模块021的功能实现可以参考上述方法实施例中步骤503的相关描述。
封装模块027,用于若接收到的目标业务流为该第一应用感知标识指示的业务流,则在该目标业务流的业务报文中封装目标应用感知标识,该目标应用感知标识为第一应用感知标识,或与该第一应用感知标识匹配的第二应用感知标识。该封装模块027的功能实现可以参考上述方法实施例中步骤506的相关描述。
发送模块022,用于转发封装有该目标应用感知标识的业务报文。该发送模块022的功能实现可以参考上述方法实施例中步骤507的相关描述。
可选地,该网络设备接收到的该目标业务流的业务报文中包括随流检测信息,如图20所示,该网络设备还可以包括:
检测模块026,用于基于该随流检测信息对该目标业务流进行随流检测,得到随流检测结果;该检测模块026的功能实现可以参考上述方法实施例中步骤606的相关描述。
该发送模块022,还用于向控制器发送该随流检测结果和该目标应用感知标识。该发送模块022的功能实现可以参考上述方法实施例中步骤607的相关描述。
可选地,该发送模块022,可以用于向控制器发送该随流检测结果、该目标应用感知标识以及对应的随流检测的流标识。
可选地,该封装模块027,可以用于在该业务报文的IFIT信息的流标识字段或保留字段中封装该目标应用感知标识;或者,在该业务报文的目的地址字段、HBH、DOH或SRH中封装该目标应用感知标识。
可选地,该接收模块021,可以用于接收控制器发送的第一应用感知标识与该第一网络服务的对应关系;该接收模块021的功能实现还可以参考上述方法实施例中步骤403、步骤505或步骤603的相关描述。
相应的,该发送模块022,可以用于采用该第一网络服务转发封装有目标应用感知标识的业务报文。该发送模块022的功能实现可以参考上述方法实施例中步骤408、步骤508或步骤605的相关描述。
综上所述,本申请实施例提供了一种网络设备,该网络设备可以接收控制器下发的目标业务流的第一应用感知标识,并在该目标业务流的业务报文中封装该第一应用感知标识。由于该第一应用感知标识与第一网络服务对应,因此可以确保接收到该业务报文的网络设备可以采用对应的第一网络服务来转发该业务报文,从而有效提高了业务报文转发的灵活性。
图21是本申请实施例提供的一种网络设备的结构示意图,该网络设备可以应用于诸如图1或图7所示的通信网络中。例如,该网络设备可以为图1或图7中的网络设备02a、02c或02d,或者可以为图1所示的网络设备02b。并且,该网络设备可以实现上述图5、图6、图10或图11所示实施例中由第二网络设备、第一网络设备和第三网络设备中至少一个网络设备执行的步骤。参考图21,该网络设备包括:
检测模块026,用于基于业务报文中的随流检测信息,对该业务报文所属的目标业务流进行随流检测,得到随流检测结果。该检测模块026的功能实现可以参考上述方法实施例中步骤301和步骤606的相关描述。
发送模块022,用于向网络中的控制器发送该随流检测结果和该目标业务流的目标应用感知标识,该目标应用感知标识基于该目标业务流的用户需求生成,该随流检测结果和该目标应用感知标识用于供该控制器分析该目标业务流的传输性能。该发送模块022的功能实现可以参考上述方法实施例中步骤303和步骤607的相关描述。
可选地,该业务报文中封装有该目标应用感知标识,该目标应用感知标识用于指示目标业务流所属的用户和/或应用。
可选地,该随流检测信息为IFIT信息,该IFIT信息的流标识字段或保留字段中封装有该目标应用感知标识。
可选地,如图22所示,该网络设备还可以包括:
接收模块021,用于接收该控制器发送的第一应用感知标识与第一网络服务的对应关系, 其中,该第一应用感知标识由该控制器基于业务流的用户需求生成。该接收模块021的功能实现可以参考上述方法实施例中步骤403、步骤505或步骤603的相关描述。
该发送模块022,还用于若该目标业务流为该第一应用感知标识指示的业务流,则根据该对应关系,采用该第一网络服务转发该目标业务流的业务报文。该发送模块022的功能实现可以参考上述方法实施例中步骤408、步骤508或步骤605的相关描述。
可选地,该接收模块021,还可以用于接收该控制器发送的标识生成规则。该接收模块021的功能实现还可以参考上述方法实施例中步骤404的相关描述。
生成模块025,用于基于该标识生成规则生成该目标业务流的第二应用感知标识;其中,该目标应用感知标识为该第二应用感知标识或该控制器发送的该目标业务流的第一应用感知标识。该生成模块025的功能实现可以参考上述方法实施例中步骤405的相关描述。
可选地,该随流检测信息为IFIT信息;如图22所示,该网络设备还可以包括:
封装模块027,用于在该IFIT信息的流标识字段或保留字段中封装该目标应用感知标识。该封装模块027的功能实现可以参考上述方法实施例中步骤506的相关描述。
该发送模块022,还可以用于转发封装有该目标应用感知标识的业务报文。该发送模块022的功能实现还可以参考上述方法实施例中步骤507的相关描述。
可选地,该接收模块021,还可以用于接收该控制器发送的该目标业务流的上送策略,该上送策略用于指示上报该目标业务流的随流检测结果;该接收模块021的功能实现还可以参考上述方法实施例中步骤604的相关描述。
该发送模块022,用于基于该上送策略的指示,向控制器发送该随流检测结果和该目标业务流的目标应用感知标识。
可选地,该发送模块022,可以用于向网络中的控制器发送随流检测结果、目标业务流的目标应用感知标识以及对应的随流检测的流标识。
可选地,该目标应用感知标识包括用户标识和应用标识中的至少一个。
综上所述,本申请实施例提供了一种网络设备,该网络设备在向控制器上报目标业务流的随流检测结果时,可以一同上报该目标业务流的目标应用感知标识。控制器进而能够以该目标应用感知标识中至少一个标识指示的粒度检测和分析业务流的传输性能,由此有效提高了对业务流的传输性能进行检测和分析时的灵活性。
图23是本申请实施例提供的又一种控制器的结构示意图,该控制器可以应用于诸如图1或图7所示的通信网络中,且可以实现上述图5、图6、图10或图11所示实施例中由控制器执行的步骤。参考图23,该控制器包括:
接收模块014,用于接收第三网络设备发送的随流检测结果和目标应用感知标识,该随流检测结果是该第三网络设备对该目标业务流进行随流检测得到的,该目标应用感知标识基于该目标业务流的用户需求生成。该接收模块014的功能实现可以参考上述方法实施例中步骤607的相关描述。
分析模块015,用于基于该随流检测结果和该目标应用感知标识,分析该目标业务流的传输性能。该分析模块015的功能实现可以参考上述方法实施例中步骤608的相关描述。
可选地,该目标应用感知标识包括用户标识和应用标识中的至少一个,如图14所示,该控制器还可以包括:
显示模块016,用于按照目标粒度显示该目标业务流的性能指标,该性能指标用于指示该目标业务流的传输性能;其中,该目标粒度为目标应用感知标识中至少一个标识指示的粒度。 该显示模块016的功能实现可以参考上述方法实施例中步骤609的相关描述。
可选地,继续参考图14,该控制器还可以包括:
发送模块012,用于在该接收模块014接收第三网络设备发送的随流检测结果和目标应用感知标识之前,向该第三网络设备发送该目标业务流的上送策略,该上送策略用于指示上报该目标业务流的随流检测结果。该发送模块012的功能实现还可以参考上述方法实施例中步骤604的相关描述。
可选地,该接收模块011,可以用于接收第三网络设备发送的随流检测结果、目标应用感知标识以及对应的随流检测的流标识;相应的,该分析模块012,可以用于基于该目标应用感知标识与该随流检测的流标识的对应关系,确定该目标业务流包括的至少一条数据流;基于该随流检测结果,分析该目标业务流包括的至少一条数据流的传输性能。
可选地,如图14所示,该控制器还可以包括:
生成模块011,用于基于该目标业务流的用户需求,获得该目标业务流的第一应用感知标识与传输该目标业务流所需的第一网络服务的对应关系。该生成模块011的功能实现可以参考上述方法实施例中步骤402或步骤602的相关描述。
该发送模块012,还用于向第二网络设备发送该对应关系,该对应关系用于供第二网络设备基于该第一应用感知标识确定用于转发该目标业务流的业务报文的该第一网络服务;其中,该目标应用感知标识为该第一应用感知标识或网络设备生成的该目标业务流的第二应用感知标识。该发送模块012的功能实现可以参考上述方法实施例中步骤403、步骤505或步骤603的相关描述。
可选地,该生成模块011,还用于若基于该目标业务流的传输性能确定该第一网络服务不满足该目标业务流的用户需求,则确定传输该目标业务流所需的网络服务为第二网络服务;该生成模块011的功能实现可以参考上述方法实施例中步骤610的相关描述。
该发送模块012,还用于向第二网络设备发送该第一应用感知标识与该第二网络服务的对应关系。该发送模块012的功能实现还可以参考上述方法实施例中步骤611的相关描述。
可选地,该发送模块012还用于向第一网络设备发送该目标业务流的第一应用感知标识。该发送模块012的功能实现还可以参考上述方法实施例中步骤503的相关描述。
可选地,参考图14,该控制器还可以包括:
获取模块013,用于通过北向接口获取该目标业务流的用户需求。该获取模块013的功能实现可以参考上述方法实施例中步骤401、步骤501或步骤601的相关描述。
综上所述,本申请实施例提供了一种控制器,该控制器在接收网络设备上报的目标业务流的随流检测结果时,可以接收到该网络设备一同上报的目标业务流的目标应用感知标识。由此,该控制器能够以目标应用感知标识中至少一个标识指示的粒度检测和分析业务流的传输性能,从而有效提高了对业务流的传输性能进行检测和分析时的灵活性。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上文描述的控制器、网络设备、报文转发装置以及各模块的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
应理解的是,本申请实施例提供的控制器、网络设备和报文转发装置均可以用专用集成电路(application-specific integrated circuit,ASIC)实现,或可编程逻辑器件(programmable logic device,PLD)实现,上述PLD可以是复杂程序逻辑器件(complex programmable logical device,CPLD),现场可编程门阵列(field-programmable gate array,FPGA),通用阵列逻辑(generic  array logic,GAL)或其任意组合。或者,也可以通过软件实现上述方法实施例提供的报文转发方法,当通过软件实现上述方法实施例提供的报文转发方法时,上述控制器和网络设备中的各个模块也可以为软件模块。
图24是本申请实施例提供的再一种报文转发装置的结构示意图,该报文转发装置可以应用于图1或图7所示通信网络中的控制器或网络设备。例如,可以应用于图1或图7中的网络设备02a、02c或02d,或者可以应用于图1所示的网络设备02b。如图24所示,该报文转发装置可以包括:处理器701、存储器702、网络接口703和总线704。其中,总线704用于连接处理器701、存储器702和网络接口703。通过网络接口703(可以是有线或者无线)可以实现与其他设备之间的通信连接。存储器702中存储有计算机程序7021,该计算机程序7021用于实现各种应用功能。当图13至图23所示的各个模块采取软件模块的方式实现时,这些软件模块对应的程序可以存储在网络设备的存储器702中。
应理解,在本申请实施例中,处理器701可以是CPU,该处理器701还可以是其他通用处理器、数字信号处理器(DSP)、专用集成电路(ASIC)、现场可编程门阵列(FPGA)、GPU或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。通用处理器可以是微处理器或者是任何常规的处理器等。
存储器702可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(read-only memory,ROM)、可编程只读存储器(programmable ROM,PROM)、可擦除可编程只读存储器(erasable PROM,EPROM)、电可擦除可编程只读存储器(electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(random access memory,RAM),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如静态随机存取存储器(static RAM,SRAM)、动态随机存取存储器(DRAM)、同步动态随机存取存储器(synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(double data rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(synchlink DRAM,SLDRAM)和直接内存总线随机存取存储器(direct rambus RAM,DR RAM)。
总线704除包括数据总线之外,还可以包括电源总线、控制总线和状态信号总线等。但是为了清楚说明起见,在图中将各种总线都标为总线704。
第一方面,该处理器701可以用于基于目标业务流的用户需求,获得该目标业务流的第一应用感知标识与传输该目标业务流所需的第一网络服务的对应关系,以及向第二网络设备发送该对应关系,该对应关系用于供该第二网络设备基于该第一应用感知标识确定用于转发该目标业务流的业务报文的该第一网络服务。该处理器701的详细处理过程可以参考上述方法实施例。例如,可以参考图2所示实施例中步骤101和步骤102的详细描述,或者可以参考图6所示实施例中步骤401至步骤404的详细描述,或者可以参考图10所示实施例中步骤501至步骤505的详细描述,或者可以参考图11所示实施例中步骤601至步骤604,以及步骤608至步骤611的详细描述,这里不再赘述。
第二方面,该处理器701可以用于接收网络中的控制器发送的第一应用感知标识与第一网络服务的对应关系,以及若接收到的目标业务流为该第一应用感知标识指示的业务流,则根据该对应关系,采用该第一网络服务转发该目标业务流的业务报文;其中,该第一应用感知 标识由该控制器基于业务流的用户需求生成。该处理器701的详细处理过程可以参考上述方法实施例。例如,可以参考图2所示实施例中步骤103的详细描述,或者可以参考图6所示实施例中步骤405至步骤408的详细描述,或者可以参考图10所示实施例中步骤506至步骤508的详细描述,或者可以参考图11所示实施例中步骤606至步骤607的详细描述,这里不再赘述。
第三方面,该处理器701可以用于基于目标业务流的用户需求,生成该目标业务流的第一应用感知标识,并发送该第一应用感知标识;其中,该第一应用感知标识用于供网络设备在该目标业务流的业务报文中封装该目标业务流的目标应用感知标识,该目标应用感知标识为第一应用感知标识,或网络设备生成的该目标业务流的第二应用感知标识;该第一应用感知标识与第一网络服务对应,第一应用感知标识用于供网络设备采用所述第一网络服务转发所述目标业务流的业务报文,该第一网络服务满足该目标业务流的用户需求。该处理器701的详细处理过程可以参考上述方法实施例。例如,可以参考图2所示实施例中步骤201和步骤202的详细描述,或者可以参考图6、图10或图11所示实施例中由控制器或任一网络设备执行的步骤,这里不再赘述。
第四方面,该处理器701可以用于接收控制器发送的第一应用感知标识,该第一应用感知标识基于业务流的用户需求生成,且该第一应用感知标识与第一网络服务对应,该第一网络服务满足该业务流的用户需求;若接收到的目标业务流为该第一应用感知标识指示的业务流,则在该目标业务流的业务报文中封装目标应用感知标识,并转发封装有该目标应用感知标识的业务报文,该目标应用感知标识为第一应用感知标识,或与该第一应用感知标识匹配的第二应用感知标识。该处理器701的详细处理过程可以参考上述方法实施例。例如,可以参考图6所示实施例中步骤405至步骤408的详细描述,或者可以参考图10所示实施例中步骤506至步骤508的详细描述,或者还可以参考图11所示实施例中步骤606至步骤607的详细描述,这里不再赘述。
第五方面,该处理器701可以用于基于业务报文中的随流检测信息,对该业务报文所属的目标业务流进行随流检测,得到随流检测结果,并向网络中的控制器发送该随流检测结果和该目标业务流的目标应用感知标识;其中,该目标应用感知标识基于该目标业务流的用户需求生成,该随流检测结果和目标应用感知标识用于供该控制器分析目标业务流的传输性能。例如,可以参考图5所示实施例中步骤301和步骤302的详细描述,或者可以参考图6所示实施例中步骤405至步骤408的详细描述,或者可以参考图10所示实施例中步骤506至步骤508的详细描述,或者可以参考图11所示实施例中步骤606至步骤607的详细描述,这里不再赘述。
第六方面,该处理器701可以用于接收第三网络设备发送的随流检测结果和目标应用感知标识,该随流检测结果是该第三网络设备对该目标业务流进行随流检测得到的,该目标应用感知标识基于目标业务流的用户需求生成;基于该随流检测结果和目标应用感知标识,分析该目标业务流的传输性能。该处理器701的详细处理过程可以参考上述方法实施例。例如,可以参考图5所示实施例中步骤303的详细描述,或者可以参考图6所示实施例中步骤401至步骤404的详细描述,或者可以参考图10所示实施例中步骤501至步骤505的详细描述,或者可以参考图11所示实施例中步骤601至步骤604,以及步骤608至步骤611的详细描述,这里不再赘述。
图25是本申请实施例提供的再一种网络设备的结构示意图,该网络设备可以应用于诸如图1或图7所示的通信网络中。例如,该网络设备可以为图1或图7中的网络设备02a、02c或02d,或者可以为图1所示的网络设备02b。如图25所示,该网络设备可以包括:主控板801和至少一 个接口板(接口板也称为线卡或业务板),例如图25中示出了接口板802和接口板803。多个接口板的情况下可以包括交换网板804,该交换网板804用于完成各接口板之间的数据交换。
主控板801用于完成系统管理、设备维护、协议处理等功能。接口板802和603用于提供各种业务接口(例如,POS接口、GE接口、ATM接口等),并实现报文的转发。主控板801上主要有3类功能单元:系统管理控制单元、系统时钟单元和系统维护单元。主控板801、接口板802以及接口板803之间通过系统总线与系统背板相连实现互通。接口板802上包括一个或多个中央处理器8021。中央处理器8021用于对接口板802进行控制管理并与主控板801上的中央处理器8011进行通信,以及用于报文的转发处理。接口板802上的转发表项存储器8024用于存储转发表项,中央处理器8021可以通过查找转发表项存储器8024中存储的转发表项进行报文的转发。
该接口板802包括一个或多个物理接口卡6023用于接收上一跳节点发送的报文,并根据中央处理器8021的指示向下一跳节点发送处理后的报文。具体实现过程这里不再逐一赘述。所述中央处理器8021的具体功能这里同样不再逐一赘述。
可以理解的是,该网络设备中的接收模块021和发送模块022可以位于接口板802中,获取模块023、确定模块024、生成模块025、检测模块026和封装模块027则可以位于主控板801中。
还可以理解,如图25所示,本实施例中包括多个接口板,采用分布式的转发机制,这种机制下,接口板803的结构与接口板802的结构基本相同,且接口板803上的操作与所述接口板802的操作基本相似,为了简洁,不再赘述。此外,可以理解的是,图25中的接口板802中的中央处理器8021和/或网络处理器8022可以是专用硬件或芯片,如可以采用专用集成电路来实现上述功能,这种实现方式即为通常所说的转发面采用专用硬件或芯片处理的方式。在另外的实施方式中,所述中央处理器8021和/或网络处理器8022也可以采用通用的处理器,如通用的CPU来实现以上描述的功能。
此外应理解的是,主控板801可能有一块或多块,有多块的时候可以包括主用主控板和备用主控板。接口板可能有一块或多块,该设备的数据处理能力越强,提供的接口板越多。多块接口板的情况下,该多块接口板之间可以通过一块或多块交换网板通信,有多块的时候可以共同实现负荷分担冗余备份。在集中式转发架构下,该设备可以不需要交换网板,接口板承担整个系统的业务数据的处理功能。在分布式转发架构下,该设备包括多块接口板,可以通过交换网板实现多块接口板之间的数据交换,提供大容量的数据交换和处理能力。所以,分布式架构的网络设备的数据接入和处理能力要大于集中式架构的设备。具体采用哪种架构,取决于具体的组网部署场景,此处不做任何限定。
具体的实施例中,存储器8012和存储器8024可以是只读存储器(read-only memory,ROM)或可存储静态信息和指令的其它类型的静态存储设备,随机存取存储器(random access memory,RAM)或者可存储信息和指令的其它类型的动态存储设备,也可以是电可擦可编程只读存储器(electrically erasable programmable read-only memory,EEPROM)、只读光盘(compact disc read-only Memory,CD-ROM)或其它光盘存储、光碟存储(包括压缩光碟、激光碟、光碟、数字通用光碟、蓝光光碟等)、磁盘或者其它磁存储设备、或者能够用于携带或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其它介质,但不限于此。接口板802中的存储器8024可以是独立存在,并通过通信总线与中央处理器8021相连接;或者,存储器8024也可以和中央处理器8021集成在一起。主控板801中的存储器8012可以是独立存在,并通过通信总线与中央处理器8011相连接;或者,存储器8012也可以和中 央处理器8011集成在一起。
存储器8024用于存储程序代码,并由中央处理器8021来控制执行,存储器8012用于存储程序代码,并由中央处理器8011来控制执行。该中央处理器8021和/或中央处理器8011可以通过执行程序代码来实现上述实施例所提供的应用网络设备的报文转发方法。存储器8024和/或存储器8012存储的程序代码中可以包括一个或多个软件模块。这一个或多个软件模块可以为上述图15至图17,以及图19至图22中任一附图所示实施例中提供的功能模块。
具体实施例中,该物理接口卡6023,可以是使用任何收发器一类的装置,用于与其它设备或通信网络通信,如以太网,无线接入网(radio access network,RAN),无线局域网(wireless local area networks,WLAN)等。
本申请实施例还提供了一种计算机可读存储介质,该计算机可读存储介质中存储有指令,该指令由处理器执行以实现上述方法实施例提供的由控制器或网络设备执行的方法。
本申请实施例还提供了一种包含指令的计算机程序产品,当该计算机程序产品在计算机上运行时,使得计算机执行上述方法实施例提供的由控制器或网络设备执行的方法。
本申请实施例还提供了一种通信网络,如图1和图7所示,该通信网络包括:控制器01以及至少一个网络设备。例如,图1中示出了网络设备02a至网络设备02e共5个网络设备,图7中示出了网络设备02a,以及网络设备02c至02e共4个网络设备。
其中,该控制器01可以实现上述方法实施例中由控制器执行的步骤,该网络设备可以实现上述方法实施例中由任一网络设备执行的步骤。
可选地,该控制器01可以为如图13、图14、图23或图24所示的控制器,或者可以包括图17或图18所示的报文转发装置。该至少一个网络设备可以包括如图15、图16、图20至图22以及图24任一附图所示的网络设备,或者可以包括图17或图19所示的报文转发装置。
可选地,通信网络可以为APN。
本申请实施例还提供了一种芯片,该芯片可以用于实现上述方法实施例提供的由控制器或网络设备执行的方法。
上述实施例,可以全部或部分地通过软件、硬件、固件或其他任意组合来实现。当使用软件实现时,上述实施例可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载或执行所述计算机程序指令时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机可以为通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集合的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质。半导体介质可以是固态硬盘(solid state drive,SSD)。
本申请中术语“至少一个”的含义是指一个或多个,本申请中术语“多个”的含义是指两个或两个以上,例如,多个节点是指两个或两个以上的节点。本文中术语“系统”和“网络”经常可互换使用。在本文中提及的“和/或”,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。字符“/”一般表示前后关联对 象是一种“或”的关系。
以上所述,仅为本申请的可选实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到各种等效的修改或替换,这些修改或替换都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以权利要求的保护范围为准。

Claims (25)

  1. 一种报文转发方法,其特征在于,所述方法包括:
    基于目标业务流的用户需求,生成所述目标业务流的第一应用感知标识,所述第一应用感知标识用于供网络设备在所述目标业务流的业务报文中封装目标应用感知标识,所述目标应用感知标识为所述第一应用感知标识,或与所述第一应用感知标识匹配的第二应用感知标识,所述第一应用感知标识与第一网络服务对应,所述第一网络服务满足所述目标业务流的用户需求;
    发送所述第一应用感知标识。
  2. 根据权利要求1所述的方法,其特征在于,所述基于目标业务流的用户需求,生成所述目标业务流的第一应用感知标识,包括:
    网络中的控制器基于获取到的目标业务流的用户需求,生成所述目标业务流的第一应用感知标识;
    所述发送所述第一应用感知标识,包括:所述控制器向第一网络设备发送所述第一应用感知标识,以使得所述第一网络设备在所述目标业务流的业务报文中封装所述目标应用感知标识。
  3. 根据权利要求2所述的方法,其特征在于,所述方法还包括:
    所述控制器通过北向接口获取所述目标业务流的用户需求。
  4. 根据权利要求2或3所述的方法,其特征在于,所述方法还包括:
    所述控制器基于所述目标业务流的用户需求,确定传输所述目标业务流所需的第一网络服务;
    所述控制器向第二网络设备发送所述第一应用感知标识与所述第一网络服务的对应关系,所述对应关系用于供所述第二网络设备基于所述第一应用感知标识确定用于转发所述目标业务流的业务报文的所述第一网络服务。
  5. 根据权利要求2至4任一所述的方法,其特征在于,所述方法还包括:
    所述控制器接收第三网络设备发送的随流检测结果和所述目标应用感知标识;
    所述控制器基于所述随流检测结果和所述目标应用感知标识,分析所述目标业务流的传输性能。
  6. 根据权利要求5所述的方法,其特征在于,所述方法还包括:
    所述控制器按照目标粒度显示所述目标业务流的性能指标,所述性能指标用于指示所述目标业务流的传输性能;
    其中,所述目标粒度为所述目标应用感知标识中至少一个标识指示的粒度。
  7. 根据权利要求5或6所述的方法,其特征在于,所述控制器接收第三网络设备发送的随流检测结果和所述目标应用感知标识,包括:所述控制器接收第三网络设备发送的随流检测结果、所述目标应用感知标识以及对应的随流检测的流标识;
    所述控制器基于所述随流检测结果和所述目标应用感知标识,分析所述目标业务流的传输性能,包括:
    所述控制器基于所述目标应用感知标识与所述随流检测的流标识的对应关系,确定所述目标业务流包括的至少一条数据流;
    所述控制器基于所述随流检测结果,分析所述目标业务流包括的至少一条数据流的传输性能。
  8. 根据权利要求5至7任一所述的方法,其特征在于,所述方法还包括:
    所述控制器基于所述目标业务流的传输性能确定所述第一网络服务不满足所述目标业务流的用户需求;
    所述控制器确定传输所述目标业务流所需的网络服务为第二网络服务;
    所述控制器向第二网络设备发送所述第一应用感知标识与所述第二网络服务的对应关系。
  9. 根据权利要求5至8任一所述的方法,其特征在于,在所述控制器接收第三网络设备发送的随流检测结果和所述目标应用感知标识之前,所述方法还包括:
    所述控制器向所述第一网络设备和/或所述第三网络设备发送所述目标业务流的上送策略,所述上送策略用于指示上报所述目标业务流的随流检测结果。
  10. 根据权利要求1所述的方法,其特征在于,所述基于目标业务流的用户需求,生成所述目标业务流的第一应用感知标识,包括:第一网络设备基于控制器发送的目标业务流的用户需求,生成所述目标业务流的第一应用感知标识;
    所述发送所述第一应用感知标识,包括:
    所述第一网络设备在所述目标业务流的业务报文中封装所述第一应用感知标识;
    所述第一网络设备转发封装有所述第一应用感知标识的业务报文。
  11. 根据权利要求10所述的方法,其特征在于,所述第一网络设备接收到的所述目标业务流的业务报文中包括随流检测信息,所述方法还包括:
    所述第一网络设备基于所述随流检测信息对所述目标业务流进行随流检测,得到随流检测结果;
    所述第一网络设备向所述控制器发送所述随流检测结果和所述第一应用感知标识。
  12. 根据权利要求11所述的方法,其特征在于,所述方法还包括:所述第一网络设备接收所述控制器发送的所述目标业务流的上送策略,所述上送策略用于指示上报所述目标业务流的随流检测结果;
    所述第一网络设备向所述控制器发送所述随流检测结果和所述第一应用感知标识,包括:所述第一网络设备基于所述上送策略的指示,向所述控制器发送所述随流检测结果和所述第一应用感知标识。
  13. 根据权利要求11或12所述的方法,其特征在于,所述第一网络设备向所述控制器发送所述随流检测结果和所述第一应用感知标识,包括:
    所述第一网络设备向所述控制器发送所述随流检测结果、所述第一应用感知标识以及对应的随流检测的流标识。
  14. 根据权利要求10至13任一所述的方法,其特征在于,所述第一网络设备在所述目标业务流的业务报文中封装所述第一应用感知标识,包括:
    所述第一网络设备在所述业务报文的带内流信息测量IFIT信息的流标识字段或保留字段中封装所述第一应用感知标识;
    或者,所述第一网络设备在所述业务报文的目的地址字段、逐跳选项头HBH、目的地选项头DOH或分段路由头SRH中封装所述第一应用感知标识。
  15. 根据权利要求1至14任一所述的方法,其特征在于,所述目标业务流的用户需求包括下述需求中的一种或多种:对指定转发路径的需求,对指定网络切片的需求,对传输性能的性能指标的需求。
  16. 根据权利要求1至15任一所述的方法,其特征在于,所述目标应用感知标识包括用户标识和应用标识中的至少一个。
  17. 一种报文转发方法,其特征在于,应用于网络设备,所述方法包括:
    接收控制器发送的第一应用感知标识,所述第一应用感知标识基于业务流的用户需求生成,且所述第一应用感知标识与网络服务对应,所述网络服务满足所述业务流的用户需求;
    若接收到的目标业务流为所述第一应用感知标识指示的业务流,则在所述目标业务流的业务报文中封装目标应用感知标识,所述目标应用感知标识为所述第一应用感知标识,或与所述第一应用感知标识匹配的第二应用感知标识;
    转发封装有所述目标应用感知标识的业务报文。
  18. 根据权利要求17所述的方法,其特征在于,所述网络设备接收到的所述目标业务流的业务报文中包括随流检测信息,所述方法还包括:
    基于所述随流检测信息对所述目标业务流进行随流检测,得到随流检测结果;
    向所述控制器发送所述随流检测结果和所述目标应用感知标识。
  19. 根据权利要求17所述的方法,其特征在于,所述向所述控制器发送所述随流检测结果和所述目标应用感知标识,包括:
    向所述控制器发送所述随流检测结果、所述目标应用感知标识以及对应的随流检测的流标识。
  20. 根据权利要求17至19任一所述的方法,其特征在于,所述在所述目标业务流的业务报文中封装所述目标应用感知标识,包括:
    在所述业务报文的带内流信息测量IFIT信息的流标识字段或保留字段中封装所述目标应用感知标识;
    或者,在所述业务报文的目的地址字段、逐跳选项头HBH、目的地选项头DOH或分段路 由头SRH中封装所述目标应用感知标识。
  21. 根据权利要求17至20任一所述的方法,其特征在于,所述接收控制器发送的第一应用感知标识,包括:接收控制器发送的第一应用感知标识与所述第一网络服务的对应关系;
    所述转发封装有所述目标应用感知标识的业务报文,包括:采用所述第一网络服务转发封装有所述目标应用感知标识的业务报文。
  22. 一种报文转发装置,其特征在于,所述装置包括存储器,处理器及存储在所述存储器上并可在所述处理器上运行的计算机程序,所述处理器执行所述计算机程序时实现如权利要求1至16任一所述的方法。
  23. 一种网络设备,其特征在于,所述网络设备包括存储器,处理器及存储在所述存储器上并可在所述处理器上运行的计算机程序,所述处理器执行所述计算机程序时实现如权利要求17至21任一所述的方法。
  24. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质中存储有指令,所述指令由处理器执行以实现如权利要求1至21任一所述的方法。
  25. 一种通信网络,其特征在于,所述通信网络包括:控制器和网络设备;
    其中,所述控制器用于实现权利要求1至9任一所述的方法;
    所述网络设备用于实现权利要求10至16任一所述的方法,或者,用于实现权利要求17至21任一所述的方法。
PCT/CN2022/096044 2021-06-04 2022-05-30 报文转发方法、装置及通信网络 WO2022253192A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110624470.5A CN115442298A (zh) 2021-06-04 2021-06-04 报文转发方法、装置及通信网络
CN202110624470.5 2021-06-04

Publications (1)

Publication Number Publication Date
WO2022253192A1 true WO2022253192A1 (zh) 2022-12-08

Family

ID=84272262

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/096044 WO2022253192A1 (zh) 2021-06-04 2022-05-30 报文转发方法、装置及通信网络

Country Status (2)

Country Link
CN (1) CN115442298A (zh)
WO (1) WO2022253192A1 (zh)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107154917A (zh) * 2016-03-03 2017-09-12 华为技术有限公司 数据传输方法及服务器
CN111049757A (zh) * 2018-10-12 2020-04-21 华为技术有限公司 一种业务流处理方法及装置
US20200328978A1 (en) * 2019-04-12 2020-10-15 Cisco Technology, Inc. Dynamic policy implementation for application-aware routing based on granular business insights
CN112637183A (zh) * 2020-12-18 2021-04-09 支付宝(杭州)信息技术有限公司 数据报文的传输方法和装置

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107154917A (zh) * 2016-03-03 2017-09-12 华为技术有限公司 数据传输方法及服务器
CN111049757A (zh) * 2018-10-12 2020-04-21 华为技术有限公司 一种业务流处理方法及装置
US20200328978A1 (en) * 2019-04-12 2020-10-15 Cisco Technology, Inc. Dynamic policy implementation for application-aware routing based on granular business insights
CN112637183A (zh) * 2020-12-18 2021-04-09 支付宝(杭州)信息技术有限公司 数据报文的传输方法和装置

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Z. LI S. PENG HUAWEI TECHNOLOGIES C. LI C. XIE CHINA TELECOM D. VOYER BELL CANADA X. LI TSINGHUA UNIVERSITY P. LIU CHINA MOBILE C.: "Application-aware IPv6 Networking (APN6) Encapsulation; draft-li-6man-app-aware-ipv6-network-02.txt", APPLICATION-AWARE IPV6 NETWORKING (APN6) ENCAPSULATION; DRAFT-LI-6MAN-APP-AWARE-IPV6-NETWORK-02.TXT; INTERNET-DRAFT: NETWORK WORKING GROUP, INTERNET ENGINEERING TASK FORCE, IETF; STANDARDWORKINGDRAFT, INTERNET SOCIETY (ISOC) 4, RUE DES FALAISES CH- 1, no. 02, 3 July 2020 (2020-07-03), Internet Society (ISOC) 4, rue des Falaises CH- 1205 Geneva, Switzerland , pages 1 - 16, XP015140373 *

Also Published As

Publication number Publication date
CN115442298A (zh) 2022-12-06

Similar Documents

Publication Publication Date Title
US20220103477A1 (en) Packet processing method for implementing qos guarantee, device, and system
US20210105153A1 (en) Method for Generating Forwarding Information, Controller, and Service Forwarding Entity
US10148492B2 (en) Data center bridging network configuration and management
US20170373966A1 (en) Packet Transmission Method, Node, Path Management Server and Storage Medium
US20190199642A1 (en) Method and Apparatus for Processing Low-Latency Service Flow
US20220217051A1 (en) Method, Device, and System for Determining Required Bandwidth for Data Stream Transmission
US9197516B2 (en) In-service throughput testing in distributed router/switch architectures
US20110176551A1 (en) Information Handling System Data Center Bridging Features with Defined Application Environments
CN109714238A (zh) 一种用于实现虚拟机间通信的方法及设备
US20170310581A1 (en) Communication Network, Communication Network Management Method, and Management System
CN109787823B (zh) 服务质量QoS标记方法、装置及存储介质
US20230006884A1 (en) Providing Interface Between Network Management and Slice Management
US20220263765A1 (en) Service Traffic Adjustment Method and Apparatus
WO2018223825A1 (zh) 数据流的处理方法和设备
US20160248652A1 (en) System and method for classifying and managing applications over compressed or encrypted traffic
US20230318970A1 (en) Packet Processing Method and Apparatus
WO2020155941A1 (zh) 一种报文调度方法、相关设备及计算机存储介质
WO2022253192A1 (zh) 报文转发方法、装置及通信网络
WO2022253194A1 (zh) 报文转发方法、装置及通信网络
WO2020114083A1 (zh) 一种ioam信息的处理方法和装置
WO2022253190A1 (zh) 业务流的性能检测方法、装置及通信网络
CN115811494A (zh) 用于sd-wan服务的自动基于应用的多路径路由
WO2022222750A1 (zh) 报文转发方法、装置、网络设备及存储介质
CN109995606B (zh) 虚拟化深度包检测vDPI流量控制方法及网元设备
CN113938534B (zh) 协同方法及装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22815237

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE