WO2023016248A1 - 数据中心的云网络和运营商网络互通的方法和通信装置 - Google Patents

数据中心的云网络和运营商网络互通的方法和通信装置 Download PDF

Info

Publication number
WO2023016248A1
WO2023016248A1 PCT/CN2022/107946 CN2022107946W WO2023016248A1 WO 2023016248 A1 WO2023016248 A1 WO 2023016248A1 CN 2022107946 W CN2022107946 W CN 2022107946W WO 2023016248 A1 WO2023016248 A1 WO 2023016248A1
Authority
WO
WIPO (PCT)
Prior art keywords
network
layer
configuration
user plane
network element
Prior art date
Application number
PCT/CN2022/107946
Other languages
English (en)
French (fr)
Inventor
兰庆龙
章宇
姚弋宇
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2023016248A1 publication Critical patent/WO2023016248A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/10Flow control between communication endpoints

Definitions

  • the present application relates to wireless communication technologies, and more specifically, to a method, a communication device and a communication system for intercommunication between a cloud network of a data center and an operator network.
  • the service in order to improve service quality and user experience, computing resources are gradually moved down to the edge of the network to provide high-speed, high-bandwidth, and low-latency communication capabilities close to users.
  • the service Since the service is deployed in the data center, mobile terminal access to the service needs to go through two parts: the operator's network and the network of the data center.
  • the network of the data center is provided by the cloud platform, and the network of the operator is provided by a user plane function (UPF) device of the operator.
  • UPF user plane function
  • the network of the general cloud platform follows the standard model of the cloud platform in the industry, which is usually the OpenStack Neutron model at present, and the operator network provides network functions according to the 3rd generation partnership project (3rd generation partnership project, 3GPP) standard.
  • 3rd generation partnership project 3rd generation partnership project, 3GPP
  • Neutron is the component responsible for providing network services in the OpenStack project.
  • the design goal of Neutron is to realize "network as a service (networking as a service)”.
  • the design follows the principle of realizing network virtualization based on software defined network (SDN), and makes full use of the Linux system in its implementation.
  • SDN software defined network
  • various network-related technologies are configured and used independently.
  • the present application provides a method for intercommunication between a cloud network of a data center and an operator network, so as to improve the utilization efficiency of network resources.
  • a method for interworking between a cloud network of a data center and an operator network is provided.
  • a management component is deployed in the data center, and the management component includes a user plane functional network element control module.
  • the method includes:
  • the user plane functional network element control module receives the first configuration information from the cloud network, wherein the first configuration information is used for the configuration of the Layer 2 network of the operator network, and the first configuration information includes the configuration information of the Layer 2 network of the operator network. flow table and/or configuration;
  • the user plane functional network element control module converts the first configuration information into a first configuration command recognizable by the user plane functional network element of the operator network;
  • the user plane functional network element control module sends the first configuration command to the user plane functional network element
  • the user plane functional network element control module receives second configuration information from the cloud network, wherein the second configuration information is used for configuring network model objects;
  • the user plane functional network element control module converts the second configuration information into a second configuration command recognizable by the user plane functional network element
  • the user plane functional network element control module sends the second configuration command to the user plane functional network element.
  • the network model objects from layer 2 to layer 7 are uniformly provided by the user plane functional network elements, and the user plane functional network elements are configured and managed through the user plane functional network element control module, and the operator network and data center
  • the network model of the network is unified as the Neutron model.
  • the user plane functional network element control module receives configuration information for creating network model objects based on the Neutron model from the cloud network of the data center, and converts these configuration information into configuration commands that can be recognized by the user plane functional network elements , and then forward the configuration command to the functional network element of the user plane for execution, and complete the configuration of the network model object.
  • This solution removes the resources of network nodes in the data center and some hardware resources, and also removes the management components of the user plane functional network elements in the operator network, which can improve the efficiency of network resource usage.
  • this solution can also reduce network traffic bypass and reduce traffic bandwidth consumption.
  • the user plane function network element control module receives the first configuration information and/or the second configuration information from the cloud network through the C-N interface.
  • the C-N interface is used to transfer parameter information of the network model object from the cloud network to the operator network.
  • the newly added user plane function network element control module and the providing modules of each network model object of the data center network pass The C-N interface implements the transfer of parameters of these network model objects between the data center network and the operator network.
  • the user plane functional network element control module sends the first configuration command and/or the second configuration command to the user plane functional network element through the C-U interface.
  • the C-U interface is used to realize the configuration and/or control of the functional network elements of the user plane.
  • the newly added user plane function network element control module implements configuration and/or control of the user plane function network element through the C-U interface.
  • the network model object is a virtual router
  • the second configuration information carries first binding information
  • the first binding information indicates that the virtual router is bound to the cloud network , where the virtual router belongs to the three-layer network model object
  • the method also includes:
  • the user plane functional network element control module receives third configuration information from the cloud network, where the third configuration information includes parameter information of the virtual router;
  • the user plane functional network element control module converts the third configuration information into a third configuration command recognizable by the user plane functional network element
  • the user plane functional network element control module sends the third configuration command to the user plane functional network element
  • the user plane functional network element control module converts the second configuration information into a second configuration command recognizable by the user plane functional network element in the operator network, including:
  • the user plane functional network element converts the first binding information into a second configuration command recognizable by the user plane functional network element in the operator network.
  • the user plane functional network element control module completes the configuration of the Layer 2 network and the Layer 3 network from the data center cloud network to the operator network, and dynamically implements the operator network on the user plane functional network element.
  • the intercommunication between the network and the Layer 2 network of the data center network can also provide the function of a router, that is, provide the ability of a Layer 3 gateway to the outside world.
  • the network model object is a virtual firewall
  • the second configuration information carries parameter information and second binding information of the virtual firewall
  • the second binding information indicates that the The virtual firewall is bound to the created virtual router, where the virtual firewall belongs to the three-layer network model object
  • the user plane functional network element control module converts the second configuration information into a second configuration command recognizable by the user plane functional network element in the operator network, including:
  • the user plane functional network element converts the parameter information of the virtual firewall and the second binding information into a second configuration command recognizable by the user plane functional network element in the operator network.
  • the virtual firewall is configured as needed according to the configuration information of the port used by the virtual machine, so as to realize the ability of the cloud network where the port used by the virtual machine is filtered by the firewall.
  • the network model object is an elastic IP
  • the second configuration information carries parameter information of the elastic IP and third binding information
  • the third binding information indicates that the elastic IP
  • the IP is bound to the cloud network, where the elastic IP belongs to the three-layer network model object;
  • the method also includes:
  • the user plane functional network element control module receives a first request message from the cloud network for applying for an elastic IP address, and the first request message is used to apply for an elastic IP address of the operator network;
  • the user plane functional network element control module sends a second request message to the user plane functional network element, and the second request message is used to request the elastic IP address of the operator network;
  • the user plane functional network element control module receives elastic IP address list information from the user plane functional network element, and the elastic IP address list information indicates one or more elastic IP addresses;
  • the user plane functional network element control module converts the second configuration information into a second configuration command recognizable by the user plane functional network element in the operator network, including:
  • the user plane functional network element converts the parameter information of the elastic IP and the third binding information into a second configuration command recognizable by the user plane functional network element in the operator network.
  • the elastic IP (elastic IP, EIP) in this application is also called elastic public network IP.
  • an elastic IP can be applied for in the data center, so that the terminal device on the wireless side can directly access the application of the data center through the elastic IP address.
  • the network model object is a virtual load balancing LB
  • the second configuration information carries the parameter information of the virtual load balancing LB and the fourth binding information, and the fourth binding The information indicates that the virtual load balancing LB is bound to the cloud network, wherein the virtual LB belongs to the four-layer to seven-layer network model object;
  • the user plane functional network element control module converts the second configuration information into a second configuration command recognizable by the user plane functional network element in the operator network, including:
  • the user plane functional network element converts the parameter information of the virtual load balancing LB and the fourth binding information into a second configuration command recognizable by the user plane functional network element in the operator network.
  • a virtual load balancing LB can be configured on demand in the data center network to provide load sharing capabilities for the created network.
  • a method for intercommunication between a cloud network of a data center and an operator network includes:
  • the user plane functional network element of the operator network receives the first configuration command from the user plane functional network element control module.
  • the first configuration command is used for the configuration of the Layer 2 network of the operator network.
  • the first configuration command includes the operator network The flow table and/or configuration of the Layer 2 network;
  • the user plane functional network element configures the Layer 2 network of the operator network according to the first configuration command
  • the user plane functional network element receives a second configuration command from the user plane functional network element control module, and the second configuration command is used to configure the network model object;
  • the user plane functional network element configures the network model object according to the second configuration command.
  • the user plane functional network element receives the first configuration command and/or the second configuration command from the user plane functional network element control module through the C-U interface, wherein , the C-U interface is used to realize the configuration and/or control of the user plane function network element by the user plane function network element control module.
  • the second configuration command is used to configure a virtual router
  • the network model object is the virtual router
  • the second configuration command carries the first binding information
  • the first binding The specified information indicates that the virtual router is bound to the cloud network, wherein the virtual router belongs to a three-layer network model object;
  • the method also includes:
  • the user plane functional network element receives a third configuration command from the user plane functional network element control module, the third configuration command is used to request configuration of the virtual router, and the third configuration command includes parameter information of the virtual router;
  • the user plane functional network element executes the third configuration command
  • the user plane functional network element configures the network model object according to the second configuration command, including:
  • the user plane functional network element configures the virtual router according to the second configuration command.
  • the second configuration command is used to configure a virtual firewall
  • the network model object is the virtual firewall
  • the second configuration information carries the parameter information of the virtual firewall and the second Binding information
  • the second binding information indicates that the virtual firewall is bound to the created virtual router, wherein the virtual firewall belongs to a three-layer network model object
  • the user plane functional network element configures the network model object according to the second configuration command, including:
  • the user plane functional network element configures the virtual firewall according to the second configuration command.
  • the second configuration command is used to configure the elastic IP
  • the network model object is the elastic IP
  • the second configuration information carries the parameter information of the elastic IP and the third binding information
  • the third binding information indicates that the elastic IP is bound to the cloud network, wherein the elastic IP belongs to a three-layer network model object;
  • the method also includes:
  • the user plane functional network element receives a second request message for applying for an elastic IP address from the user plane functional network element control module, and the request message is used to apply for an elastic IP address of the operator network;
  • the user plane functional network element sends elastic IP address list information to the user plane functional network element control module, and the elastic IP address list information indicates one or more elastic IP addresses;
  • the user plane functional network element configures the network model object according to the second configuration command, including:
  • the user plane functional network element configures the elastic IP according to the second configuration command.
  • the second configuration command is used to configure the virtual LB
  • the network model object is a virtual load balancing LB
  • the second configuration information carries the parameter information of the virtual load balancing LB and The fourth binding information, the fourth binding information indicates that the virtual load balancing LB is bound to the cloud network, wherein the virtual load balancing LB belongs to four to seven layer network model objects;
  • the user plane functional network element configures the network model object according to the second configuration command, including:
  • the user plane functional network element configures the virtual load balancing LB according to the second configuration command.
  • a method for intercommunication between a cloud network of a data center and an operator network is provided.
  • the cloud network deploys a layer-2 network module and a layer-2 agent execution module.
  • the method includes:
  • the layer-2 proxy execution module receives a configuration request from the layer-2 network module, and the configuration request is used to request configuration of the layer-2 network of the operator network and the layer-2 network of the cloud network;
  • the Layer 2 agent execution module sends the first configuration information to the user plane functional network element control module, wherein the first configuration information is used for the configuration of the Layer 2 network of the operator network, and the first configuration information includes the operator network The flow table and/or configuration of the Layer 2 network;
  • the layer-2 network proxy module configures the layer-2 network of the cloud network based on the configuration request.
  • the layer-2 proxy execution module sends the first configuration information to the user plane functional network element control module through the C-N interface, wherein the C-N interface is used for network model objects The transfer of parameter information from the cloud network to the operator network.
  • the cloud network further includes a soft forwarding module and/or a networking device management module,
  • the Layer 2 proxy execution module configures the Layer 2 network of the cloud network based on the configuration request, including:
  • the layer-2 proxy execution module sends the flow table and/or configuration of the layer-2 network of the cloud network to the soft forwarding module, so as to complete the configuration of the layer-2 network of the cloud network; or,
  • the two-layer agent execution module sends the flow table and/or configuration of the two-layer network of the cloud network to the networking equipment management module, so that the hardware switch of the cloud network is configured by the networking equipment management module to complete the cloud network.
  • Layer 2 network configuration
  • a method for interworking between the cloud network of the data center and the operator network is provided.
  • the cloud network is deployed with three-layer network modules.
  • the method includes:
  • the three-layer network module receives the online notification of the virtual machine of the cloud network
  • the three-layer network module sends the second configuration information to the user plane functional network element control module based on the online notification of the virtual machine of the cloud network, and the second configuration information is used to configure the network model object in the cloud network.
  • the network model object is a virtual router
  • the second configuration information carries first binding information
  • the first binding information indicates that the virtual router is bound to the cloud network
  • the three-layer network module receives the creation request from the API of the cloud network, and the creation request is used to request the creation of a virtual router;
  • the layer-3 network module sends third configuration information to the user plane functional network element control module, the third configuration information includes parameter information of the virtual router, and the third configuration information is used for configuring the virtual router.
  • the network model object is an elastic IP
  • the second configuration information carries the parameter information of the virtual elastic IP and the third binding information
  • the third binding information indicates elastic
  • the IP is bound to the cloud network, and the method also includes:
  • the three-layer network module sends a first request message to the user plane functional network element control module, and the first request message is used to apply for an elastic IP address of the operator network;
  • the Layer 3 network module receives a message that the elastic IP address application is successful from the user plane functional network element control module.
  • a communication system architecture is provided.
  • the communication system architecture can be applied to a cloud network of a data center.
  • the communication system architecture includes:
  • Layer 2 network module used to provide Layer 2 network model objects
  • Three-layer network module used to provide three-layer network model objects
  • Layer 4 to layer 7 network modules are used to provide layer 4 to layer 7 network model objects
  • the user plane functional network element control module is used to receive configuration information from a layer 2 network module, a layer 3 network module or a layer 4 to 7 network module, and convert the configuration information into an identifiable user plane functional network element of the operator network configuration command, and sending the configuration command to the user plane functional network element, where the configuration information is used to request the creation of a network model object;
  • the layer-2 network module, layer-3 network module or layer-4 to layer-7 network module communicates with the user plane functional network element control module through the C-N interface;
  • the user plane functional network element control module communicates with the user plane functional network element through the C-U interface.
  • the C-N interface is used to transmit the parameter information of the network model object from the cloud network to the operator network.
  • the C-U interface is used to realize the configuration and/or control of the user plane functional network element by the user plane functional network element control module.
  • the cloud network includes the above-mentioned layer-2 network modules, layer-3 network modules and layer-4 to layer-7 network modules.
  • the communication system architecture further includes:
  • the two-layer proxy execution module is used to receive the configuration request from the two-layer network module, and send the flow table and/or configuration of the two-layer network of the cloud network to the soft forwarding module based on the configuration request;
  • the soft forwarding module is used to realize the forwarding function of the layer 2 network of the cloud network according to the flow table and/or configuration of the layer 2 network of the cloud network.
  • the communication system architecture further includes:
  • the networking device management module is used to receive the configuration request from the layer 2 network module, and configure the hardware switch of the cloud network based on the configuration request, so as to realize the function of the layer 2 network of the cloud network.
  • the network model object is one or more of the following:
  • Network subnet, port, virtual router, virtual firewall, elastic IP, and virtual load balance (vLB).
  • vLB virtual load balance
  • a communication device in a sixth aspect, has a function of implementing any one of the first aspect to the fourth aspect, or a method in any possible implementation manner of any one of these aspects.
  • the functions described above may be implemented by hardware, or may be implemented by executing corresponding software on the hardware.
  • the hardware or software includes one or more units corresponding to the above functions.
  • a communication device including a processor and a memory.
  • a transceiver may also be included.
  • the memory is used to store computer programs
  • the processor is used to call and run the computer programs stored in the memory, and control the transceiver to send and receive signals, so that the communication device performs any one of the first to fourth aspects, or these aspects A method in any possible implementation of any aspect.
  • a communication device including a processor and a communication interface
  • the communication interface is used to receive data and/or information, and transmit the received data and/or information to the processor
  • the processor processes the data and/or information /or information
  • the communication interface is also used to output data and/or information processed by the processor, so that any aspect of the first aspect to the fourth aspect, or any aspect of any of these aspects is possible
  • the method in the implementation of is executed.
  • a computer-readable storage medium stores computer instructions, and when the computer instructions are run on a computer, any one of the first to fourth aspects, or these A method in any possible implementation of any of the aspects is performed.
  • a computer program product includes computer program code, and when the computer program code is run on a computer, any one of the first to fourth aspects, or any of these aspects A method in any possible implementation of any aspect is performed.
  • a communication system in an eleventh aspect, includes a user plane functional network element control module and a user plane functional network element.
  • the user plane functional network element control module may perform the method in the first aspect, or any possible implementation method in the first aspect; the user plane functional network element may perform the method in the second aspect, or the second Any possible implementation method in the aspect.
  • the system further includes a layer-2 agent execution module and a layer-3 network module, and the layer-2 agent execution module can execute the method as in the third aspect , or any possible implementation method in the third aspect; the three-layer network module may execute the method in the fourth aspect, or any possible implementation method in the fourth aspect.
  • FIG. 1 is a schematic diagram of an application process for a terminal device on a wireless side to access a data center.
  • FIG. 2 is a schematic diagram of a communication system architecture provided by the present application.
  • FIG. 3 is a schematic diagram of a service flow path at the operator side when the technical solution of the present application is adopted.
  • FIG. 4 is a schematic flowchart of a method for interworking between a cloud network of a data center and an operator network provided by the present application.
  • FIG. 5 is a schematic flowchart of a method for creating a virtual router provided by the present application.
  • FIG. 6 is a schematic flowchart of a method for creating a virtual firewall provided by the present application.
  • FIG. 7 is a schematic flowchart of a method for creating an elastic IP provided by the present application.
  • FIG. 8 is a schematic flowchart of a method for creating a virtual load balancer provided by the present application.
  • FIG. 9 is a schematic diagram of the application of the technical solution provided by the present application to an APP for a wireless terminal device to access a data center.
  • Fig. 10 is a schematic block diagram of a communication device provided in this application.
  • FIG. 11 is a schematic structural diagram of a communication device provided in the present application.
  • At least one means one or more, and “multiple” means two or more.
  • “And/or” describes the association relationship of associated objects, indicating that there may be three types of relationships, for example, A and/or B, which can mean: A exists alone, A and B exist simultaneously, and B exists alone, where A, B can be singular or plural.
  • the character “/” generally indicates that the contextual objects are an “or” relationship.
  • “At least one of the following” or similar expressions refer to any combination of these items, including any combination of single or plural items.
  • At least one item (piece) of a, b, or c can represent: a, b, c, a-b, a-c, b-c, or a-b-c, where a, b, c can be single or multiple .
  • the network architecture and business scenarios described in the embodiments of the present application are for more clearly illustrating the technical solutions of the embodiments of the present application, and do not constitute limitations on the technical solutions provided by the embodiments of the present application.
  • the technical solutions provided by the embodiments of this application are also applicable to similar technical problems.
  • FIG. 1 is a schematic diagram of an application process for a terminal device on a wireless side to access a data center.
  • the provider edge (PE) equipment is the router equipment of the operator's fixed network. Outside the data center, the next hop accesses the edge data center.
  • EOR (end of row) or TOR (top of rack) is a switch device in the data center for network interconnection in the data center.
  • a physical firewall (Firewall) and a virtual firewall (vFirewall) respectively represent a physical entity and virtual software that provide firewall functions.
  • the user plane function (UPF) is a wireless-side user traffic forwarding device, which is used to forward wireless-side user traffic.
  • the network node is the network forwarding entity of the edge data center, realizing the function of the router.
  • the host is the server that deploys the application (APP) in the edge data center.
  • U2020 is a UPF management software that provides a management model and manages UPF business activities.
  • Neutron is a data center network management software that provides a management model and manages the network behavior of the data center.
  • UPF is the access network element of the operator's wireless terminal equipment.
  • the APP is some information technology (information technology, IT) application, for example, a live broadcast service, a content delivery network (content delivery network, CDN) service, and the like.
  • UPF is controlled by the U2020, which imports traffic from the wireless side to the UPF and then publishes it to the PE side, as shown in 1 in Figure 1.
  • the APP network is controlled by Neutron, and the traffic is forwarded from the data center to the PE side, as shown in 2 in Figure 1. Both the wireless side and the data center network are published to the public network PE side, and the network dynamic routing is reachable on the public network PE side for network intercommunication.
  • the data center network follows the industry cloud platform standard model (usually the OpenStack Neutron model), and the carrier network follows the 3rd generation partnership project (3rd generation partnership project) , 3GPP) standard provides network functions. These two networks are currently independently configured and used. When interworking, network configuration needs to be performed on the gateway.
  • the three-layer network (also denoted as L3) is configured with Internet protocol (internet protocol, IP) reachable to meet the needs of mobile terminal traffic to data. Central application access.
  • the network model objects can also be called network model capabilities, and the specific network model capabilities can be provided by the network A function whose realization depends on different layers in the network model.
  • the firewall function needs to be realized by relying on the three-layer network model in the network model, so the firewall function can be called a three-layer network model.
  • the firewall function Take the firewall function as an example.
  • the UPF provides the firewall function
  • the data center network also provides the firewall function.
  • the network functions of the two networks are duplicated.
  • the network model of the core network is not unified with that of the data center network, it cannot direct communication. That is to say, in the prior art, when the terminal equipment on the wireless side accesses the cloud network of the data center, the service traffic needs to pass through the operator's network and the cloud network, and the path of the service traffic is seriously detoured.
  • the carrier network and the cloud network of the data center provide the same network functions (for example, the routing function of the Layer 3 gateway, the elastic IP function) and some hardware resources with the same functions.
  • the network function and some hardware resources with the same function cause the business traffic to be processed repeatedly, resulting in low network business processing efficiency and low edge resource usage efficiency.
  • the present application provides a method for intercommunication between an operator network and a cloud network of a data center, which can reduce path detours of service traffic (or in other words, network traffic). At the same time, it can also improve the service processing efficiency of the network and the utilization efficiency of edge resources.
  • the cloud network of the data center is also sometimes referred to as a data center network or a cloud network.
  • FIG. 2 is a schematic diagram of a system architecture 100 of a data center cloud network provided by the present application.
  • the description of each module in Figure 2 is as follows:
  • Application programming interface (application programming interface, API), for providing the uniform interface of described cloud network;
  • the Layer 2 network module is used to provide Layer 2 network model objects, such as networks, subnets or ports, etc., and is responsible for delivering to the Layer 2 agent execution module for execution, so as to realize the configuration to the soft forwarding module or networking device management module or flow table;
  • the three-layer network module is used to provide three-layer network model objects, such as routers, firewalls, or elastic Internet protocol (internet protocol, IP), etc., and is responsible for sending them to UPF for adaptation management, and UPF completes the three-layer network model provision of objects;
  • three-layer network model objects such as routers, firewalls, or elastic Internet protocol (internet protocol, IP), etc.
  • the four-layer to seven-layer network module is used to provide four-layer to seven-layer network model objects, such as domain name system (domain name system, DNS), load balance (load balance, LB), etc., which can be managed by UPF adaptation or directly by Hardware adaptation management implementation;
  • domain name system domain name system
  • load balance load balance
  • the foregoing network module objects may also be called network functions, for example, a Layer 2 network module is used to provide Layer 2 network functions, and a Layer 3 network module is used to provide Layer 3 network functions, etc., which are not limited.
  • the user plane functional network element control module is used to control the user plane functional network elements and provide general management and control functions for the intercommunication between the cloud network and the operator network.
  • this module can be used to receive The configuration information used to create the network model object of the module or the four-layer to seven-layer network module, and convert these configuration information into configuration commands that can be recognized by the user plane functional network element and send them to the user plane functional network element.
  • the user plane functional network element in this application may be a UPF
  • the user plane functional network element control module may be a UPF control module.
  • the layer 2 proxy execution module is used to receive the request from the layer 2 network module, and locally deliver the flow table and/or configure it to the soft forwarding module, so as to realize the forwarding function of the layer 2 network of the data center network;
  • the function of the soft forwarding module is to realize the network forwarding capability of virtual devices, such as open source virtual switch (open vSwitch, OVS) and single root I/O virtualization (single root I/O virtualization, SR-IOV).
  • virtual devices such as open source virtual switch (open vSwitch, OVS) and single root I/O virtualization (single root I/O virtualization, SR-IOV).
  • the C-N interface is used to transfer the parameter information of the network model object from the cloud network to the operator network.
  • the C-N interface is the interface from Neutron to the UPF control module, which realizes the parameter transfer of the Neutron model;
  • the C-U interface is used to realize the configuration and/or interface control of the UPF by the UPF control module.
  • the system architecture 100 may include a networking device management module.
  • the networking device management module is used to receive the configuration request from the layer-2 network module, and complete the configuration of the hardware switch, so as to realize the forwarding function of the layer-2 network of the data center network.
  • the network device management module can be deployed without deploying the Layer 2 proxy execution module and the soft forwarding module.
  • the networking device management module configures the hardware switch based on the configuration request of the layer-2 network module, so as to realize the forwarding function of the layer-2 network of the data center network.
  • system architecture 100 also shows user plane function network elements of the operator network.
  • the user plane network element is mainly used to forward user data packets according to routing rules.
  • the user plane functional network element may be a UPF.
  • UPF is a network element for wireless side users such as terminal equipment to access the core network, and is used to receive configuration commands from the UPF control module and execute the configuration commands to configure network model objects.
  • a management component is deployed in a data center, and the management component may include a UPF control module, and the UPF control module and Neutron implement configuration of network functions.
  • Neutron is a component responsible for providing network services in the OpenStack project, and it implements resource management under network virtualization based on the idea of software-defined networking.
  • the design goal of Neutron is to realize "network as a service (networking as a service)".
  • the design follows the principle of realizing network virtualization based on software defined network (SDN), and makes full use of the Linux system in its implementation.
  • SDN software defined network
  • various network-related technologies Specifically, Neutron is a network management component of the cloud platform, in which various network models (or called network model objects) are abstracted.
  • Layer 2 network capabilities may include network, subnet, port
  • Layer 3 network capabilities may include virtual router (vRouter), virtual firewall (vFirwall), elastic IP (floating IP), or Layer 4 to Layer 7 network capabilities, For example, load balance (loadbalance), domain name system (domain name system, DNS), etc.
  • the UPF uniformly provides the L3-L7 soft network node functions of the network, releasing the resources of the original data center network nodes and some hardware resources, such as firewall resources.
  • the above-mentioned network element or function may be a network element in a hardware device, or a software function running on dedicated hardware, or a virtualization function instantiated on a platform (for example, a cloud platform).
  • the above-mentioned network elements or functions can be divided into one or more services, and further, services that exist independently of network functions may also appear.
  • an instance of the above-mentioned function, or an instance of a service included in the above-mentioned function, or a service instance existing independently of the network function may be referred to as a service instance.
  • the names of the above-mentioned modules or network elements may change, which is not limited in this embodiment of the present application.
  • the user plane network element may be a user plane function (user plane function, UPF) network element, in future communication such as 6G communication, the user plane network element can still be a UPF network element, or have other names.
  • FIG. 3 is a schematic diagram of a service flow path at the operator side when the technical solution of the present application is adopted. It can be seen that since UPF can provide the network functions from layer 3 to layer 7, compared with Figure 1, the network functions deployed on the network nodes of the data center can be released. In addition, the hardware firewall resources of the data center are also released. , the virtual firewall provided by UPF provides the function of firewall filtering. In addition, this solution also releases the UPF management component, namely U2020.
  • FIG. 4 is a schematic flowchart of a network interworking method provided by the present application. The method may include the steps of:
  • the user plane function network element control module receives first configuration information from the cloud network.
  • the first configuration information is used for the configuration of the Layer 2 network of the operator network, and the first configuration information includes the flow table and/or configuration of the Layer 2 network of the operator network.
  • the user plane functional network element control module converts the first configuration information into a first configuration command recognizable by the user plane functional network element of the operator network.
  • the user plane functional network element control module sends the first configuration command to the user plane functional network element.
  • the user plane functional network element receives the first configuration command from the user plane functional network element control module.
  • the user plane functional network element configures a Layer 2 network of the user plane functional network element according to the first configuration command.
  • the user plane functional network element executes the first configuration command to complete the configuration of the Layer 2 network of the operator network. That is, in this application, the Layer 2 network of the user plane functional network element refers to the Layer 2 network of the operator network.
  • the user plane function network element control module receives second configuration information from the cloud network.
  • the second configuration information is used for configuration of the network model object.
  • the second configuration information is used to create a specified network model object.
  • the specified network model object may be one or more of a virtual router, a virtual firewall, a virtual elastic IP, and a virtual load balancer.
  • the user plane functional network element control module converts the second configuration information into a second configuration command recognizable by the user plane functional network element.
  • the user plane functional network element control module sends the second configuration command to the user plane functional network element.
  • the user plane functional network element receives the second configuration command from the user plane functional network element control module.
  • the user plane functional network element configures the network model object according to the second configuration command.
  • the management component includes a user plane functional network element control module, and the user plane functional network element control module receives the configuration information of the network model object based on the neutron model from the cloud network , and convert the configuration information into a configuration command recognizable by the user plane functional network element, and then send the configuration command to the user plane functional network element for execution, so as to configure the network model object.
  • the cloud network and carrier network use a unified Neutron model, which can provide layer-2 to layer-7 network model objects, such as networks, subnets, ports, routers, firewalls, elastic IPs, and virtual load balancing LBs.
  • the network management component (for example, UPF control module) deployed in the cloud network is responsible for unified management of the Neutron model and the UPF in the operator network, and the UPF provides entities of these network model objects.
  • the network management component manages the network capabilities of the second to seventh layers of the UPF, and integrates these network capabilities into the data center
  • the network functions deployed on the network nodes of the data center for example, layer 3 to layer 7 network functions
  • some hardware resources in the operator's network for example, hardware firewall resources
  • the network model object in the method shown in Figure 4 may include one or more of the following:
  • Network subnet, port, virtual router, virtual firewall, elastic IP or virtual LB.
  • the network model object may be a virtual router, a virtual firewall, an elastic IP or a virtual LB.
  • FIG. 5 is a schematic flowchart of a method for creating a virtual router provided by the present application.
  • the method may include the steps of:
  • the API receives a first creation request, where the first creation request is used to request creation of the network where the APP is located, and the subnet and port of the network.
  • the first creation request may come from an administrator or a tenant.
  • the API sends configuration information of the network, subnet, and port to the layer-2 network module, and the layer-2 network module receives the configuration information of the network, subnet, and port.
  • the Layer 2 network module returns a message that the creation is successful.
  • the Layer 2 network module Before the Layer 2 network module returns the message of successful creation, it stores the configuration information of the network, subnet and port in storage.
  • the API receives a second creation request, where the second creation request is used to request creation of a virtual router.
  • the API sends a third creation request to the layer-3 network module, where the third creation request includes parameter information of the virtual router, and the third creation request is used to request creation of the virtual router.
  • the three-layer network module receives the third creation request, obtains the parameter information of the virtual router, and stores the parameter information of the virtual router in a library.
  • the parameter information of the virtual router mainly includes the name, identifier (identifier, ID), description, status information, vpn-target, etc. of the virtual router.
  • the UPF control module acquires third configuration information from the layer-3 network module.
  • the third configuration information includes parameter information of the virtual router.
  • the UPF control module sends a third configuration command to the UPF.
  • the UPF control module After the UPF control module acquires the third configuration information, it stores the third configuration information in a repository. It can be understood that the carrier network and the cloud network are different networks, and the UPF in the carrier network may not be able to recognize the information in the cloud network. Then the UPF control module converts the third configuration information into a third configuration command recognizable by the UPF, and then sends the third configuration command to the UPF. Wherein, the third configuration command is used to configure the virtual router. Among them, the functions of the UPF control modules in this application are similar, and they all have the function of converting received configuration information into configuration commands recognizable by UPF.
  • the UPF control module may send the third configuration command to the UPF in various ways.
  • the UPF control module may issue the third configuration command to the UPF through an interface, man machine language (man machine language, MML) or secure shell protocol (secure shell, SSH), API interface call, and the like.
  • MML man machine language
  • secure shell protocol secure shell, SSH
  • API interface call and the like.
  • the UPF executes the third configuration command.
  • the third configuration command may include the following content:
  • the content of the third configuration command is only an example, and the present application does not make any limitation on the form of the third configuration command, as long as it can have the function of configuring a virtual router. Examples of configuration commands in other embodiments below are also similar.
  • the action of the UPF executing the third configuration command may be that the UPF runs the command code in the third configuration command to configure the virtual router.
  • the actions "executed" by the UPF in other implementations reference can be made to the description in this approach, and details will not be repeated here.
  • the UPF returns a successful delivery message.
  • the administrator or tenant binds the virtual machine used by the APP to the created network, including assigning the virtual machine a port of the created network.
  • the created network is also the cloud network of the data center, which is also the cloud network to which the APP is bound.
  • the API receives the notification that the virtual machine is powered on.
  • the API sends a virtual machine online notification to the layer-2 network module and the layer-3 network module.
  • the Layer 2 network module implements the forwarding function of the local Layer 2 network through the Layer 2 agent execution module and the soft forwarding module, thereby completing the configuration of the local Layer 2 network.
  • the layer-2 network module configures the hardware switch through the networking device management module, and also realizes the configuration of the forwarding function of the local layer-2 network.
  • the layer-2 network module After receiving the notification that the virtual machine is online, the layer-2 network module sends a configuration request to the layer-2 proxy execution module, as in step 411 .
  • the Layer 2 network module sends a configuration request to the Layer 2 proxy execution module, where the configuration request is used to request configuration of the Layer 2 network of the operator network and the Layer 2 network of the created network.
  • the configuration request carries the flow table and/or configuration of the local Layer 2 network, and also includes configuration information of the virtual machine, and the configuration information of the virtual machine mainly includes ports used by the virtual machine. It should be understood that the port used by the virtual machine is the port of the network created in the above steps 401-403.
  • the layer-2 agent execution module here is specifically the layer-2 agent execution module of the host where the virtual machine is located.
  • the Layer 2 proxy execution module Based on the configuration request, the Layer 2 proxy execution module sends first configuration information to the UPF control module, where the first configuration information is used to request configuration of a Layer 2 network of the UPF.
  • the first configuration information includes the flow table and/or configuration of the Layer 2 network of the UPF.
  • the Layer 2 network of the UPF refers to the Layer 2 network of the operator network.
  • the UPF control module receives the first configuration information, and converts the first configuration information into a first configuration command recognizable by the UPF.
  • the UPF control module sends a first configuration command to the UPF.
  • the UPF receives the first configuration command and executes the first configuration command.
  • the UPF returns a message that the configuration of the Layer 2 network of the UPF is completed.
  • the UPF control module returns a message that the configuration of the UPF layer-2 network is completed to the layer-2 proxy execution module.
  • the Layer 2 proxy execution module sends a configuration request to the soft forwarding module, where the configuration request is used to request configuration of the local Layer 2 network.
  • the local Layer 2 network mentioned here refers to the network created in the above steps 401-403, or the cloud network of the data center, that is, the Layer 2 network of the virtual machine.
  • the soft forwarding module returns a message that the configuration of the local Layer 2 network is completed to the Layer 2 proxy execution module.
  • the Layer 2 agent execution module returns a message that the configuration of the local Layer 2 network is completed to the Layer 2 network module.
  • the layer-3 network module After receiving the notification that the virtual machine is online, the layer-3 network module sends second configuration information to the UPF control module, where the second configuration information is used to configure the virtual router.
  • the second configuration information carries the binding information of the virtual router and the cloud network (hereinafter referred to as the first binding information).
  • the first binding information indicates that the virtual router is bound to the created network (that is, the cloud network of the data center).
  • the first binding information includes cloud network information and virtual router information.
  • the information of the cloud network includes, for example: an ID of the cloud network, a virtual local area network (virtual local area network, vlan) or a virtual extended local area network (virtual eXtential local area network, vxlan) corresponding to the cloud network, and the like.
  • the information of the virtual router includes the name and/or ID of the virtual router. It can be understood that the establishment of the binding between the virtual router and the created network (that is, the cloud network of the data center) is realized through the name (and/or ID) of the virtual router and the information of the cloud network.
  • the UPF control module receives the second configuration information, and converts the second configuration information into a second configuration command recognizable by the UPF.
  • the UPF control module sends a second configuration command to the UPF.
  • the UPF receives the second configuration command from the UPF control module, and executes the second configuration command.
  • the second configuration command may include the following content:
  • VLANTYPEVID "xxx"
  • IFNAME "aaa”
  • the UPF returns a message that the configuration of the virtual router is completed.
  • the virtual router belongs to the three-layer network model object, and the configuration of the virtual router is completed, that is, the three-layer network configuration is executed successfully.
  • the layer-2 network module returns a message that the virtual machine goes online successfully to the API.
  • the API returns a message that the virtual machine is powered on successfully to the administrator or the tenant.
  • the UPF control module completes the configuration of the network where the APP is located (that is, the cloud network of the data center) to the second-tier network and the third-tier network of the UPF, and realizes dynamically on the UPF and the APP where the The intercommunication of the two-layer network of the network.
  • the created network can provide a Layer 3 gateway capability (or in other words, a routing function) based on the virtual router.
  • FIG. 6 is a schematic flowchart of a method for creating a virtual firewall provided by the present application.
  • the method may include the steps of:
  • the API receives a first creation request.
  • the first creation request is used to request the network where the APP is located, and the subnet and port of the network.
  • the API sends configuration information of the network, subnet, and port to the Layer 2 network module.
  • the Layer 2 network module returns a message that the creation is successful.
  • the layer 2 network module saves the configuration information of the network, subnet and port before returning the creation success message.
  • the administrator or tenant creates a virtual firewall as required, and correspondingly, the API receives a request for creating a virtual firewall, as in step 504 .
  • the API receives the second creation request.
  • the second creation request is used to request to create a virtual firewall.
  • the API sends a third creation request to the three-layer network module.
  • the third creation request is used to request creation of a virtual firewall, and the third creation request includes parameter information of the virtual firewall.
  • the three-layer network module receives the third creation request, obtains the parameter information of the virtual firewall, and stores the parameter information of the virtual firewall.
  • the layer-3 network module returns a message that the virtual firewall is created successfully.
  • the API sends a virtual machine online notification to the layer-2 network module and the layer-3 network module.
  • the layer 2 network module receives the notification that the virtual machine goes online.
  • the layer-2 network module sends a configuration request to the layer-2 proxy execution module of the host where the virtual machine is located.
  • the configuration request is used to request configuration of the Layer 2 network of the operator network and the local Layer 2 network.
  • the configuration request includes the flow table and/or configuration of the local Layer 2 network.
  • the configuration of the local Layer 2 network includes configuration information of the virtual machine, and the configuration information of the virtual machine mainly includes ports of the created network (that is, the cloud network) used by the virtual machine.
  • the layer-2 proxy execution module sends the first configuration information to the UPF control module.
  • the first configuration information is used to request the configuration of the Layer 2 network of the UPF.
  • the first configuration information includes the flow table and/or configuration of the Layer 2 network of the UPF.
  • the UPF control module receives the first configuration information, and converts the first configuration information into a first configuration command recognizable by the UPF.
  • the UPF control module sends a first configuration command to the UPF.
  • the UPF receives and executes the first configuration command, that is, the UPF configures a layer 2 network of the UPF.
  • the UPF returns a message that the configuration of the Layer 2 network of the UPF is completed.
  • the UPF control module returns a message that the configuration of the UPF layer-2 network is completed to the layer-2 proxy execution module.
  • the Layer 2 proxy execution module sends the flow table and/or configuration of the local Layer 2 network to the soft forwarding module.
  • the flow table and/or configuration of the local layer 2 network are used for the soft forwarding module to configure the local layer 2 network.
  • the soft forwarding module returns a message that the configuration of the local Layer 2 network is completed.
  • the layer-3 network module After receiving the notification that the virtual machine is online, the layer-3 network module sends second configuration information to the UPF control module, where the second configuration information is used for configuring the virtual firewall.
  • the second configuration information includes parameter information of the virtual firewall and binding information of the virtual firewall and the created virtual router (hereinafter referred to as second binding information).
  • the second binding information may include port information of the created virtual router.
  • the virtual router is bound to the created network.
  • the virtual firewall needs to be bound to the created virtual router.
  • the UPF control module receives the second configuration information, and converts the second configuration information into a second configuration command recognizable by the UPF.
  • the UPF control module sends the second configuration command to the UPF.
  • the UPF receives and executes the second configuration command.
  • the second configuration command may include the following content:
  • the UPF returns a message that the configuration of the virtual firewall is completed.
  • the virtual firewall belongs to the three-layer network model object, and the configuration of the virtual firewall is completed, that is, the three-layer network configuration is executed successfully.
  • the layer-2 network module returns a message that the virtual machine goes online successfully to the API.
  • the API returns a message that the virtual machine is powered on successfully.
  • the UPF control module completes the configuration from the cloud network of the data center to the Layer 2 network and Layer 3 network of the UPF.
  • a virtual firewall is created on demand, so that the network (that is, the cloud network of the data center) where the port used by the virtual machine is located passes through The ability of firewall filtering.
  • FIG. 7 is a schematic flowchart of a method for creating an elastic IP provided by the present application.
  • the method may include the steps of:
  • the administrator or tenant creates the network where the APP is located, as well as the subnet and port of the network.
  • the API receives a first creation request.
  • a first create request is used to request the creation of networks, subnets and ports.
  • the API sends configuration information of the network, subnet, and port to the Layer 2 network module.
  • the Layer 2 network module receives configuration information of the network, subnet and port, and stores the configuration information of the network, subnet and port.
  • the Layer 2 network module returns a message that the creation is successful.
  • the API receives the second creation request.
  • the second create request is used to request to create a virtual router.
  • the API sends a third creation request to the three-layer network module.
  • the third creation request includes parameter information of the virtual router, and the third creation request is used to request creation of the virtual router.
  • the three-layer network module receives the third creation request, obtains the parameter information of the virtual router, and stores the parameter information of the virtual router.
  • the layer-3 network module returns a message that the virtual router is created successfully.
  • the API receives a fourth creation request.
  • the fourth create request is used to request to create an EIP.
  • the API sends a fifth creation request to the layer-3 network module.
  • the fifth creation request is used to request to create an EIP.
  • the layer-3 network module sends a first request message to the UPF control module.
  • the first request message is used to apply for an elastic IP address of the operator network.
  • the UPF control module sends a second request message to the UPF.
  • the second request message is used to apply for an elastic IP address of the operator network.
  • the UPF sends elastic IP address list information to the UPF control module.
  • the elastic IP address list information indicates one or more elastic IP addresses.
  • the UPF control module sends a message that the application of the elastic IP address is successful to the three-layer network module.
  • the API sends a virtual machine online notification to the layer-2 network module and the layer-3 network module.
  • the Layer 2 network module sends first configuration information to the UPF control module, where the first configuration information is used to request configuration of the Layer 2 network of the UPF.
  • the first configuration information includes the flow table and/or configuration of the Layer 2 network of the UPF.
  • the UPF control module sends a first configuration command to the UPF.
  • the UPF control module converts the first configuration information into a first configuration command recognizable by the UPF, and sends the first configuration command to the UPF.
  • the UPF receives and executes the first configuration command.
  • the UPF returns a message that the configuration of the Layer 2 network of the UPF is completed.
  • the UPF control module returns a message that the configuration of the UPF layer-2 network is completed to the layer-2 proxy execution module.
  • step 616 may also be performed.
  • the Layer 2 network module delivers the flow table and/or configuration of the local Layer 2 network to the networking device management module.
  • the configuration of the local Layer 2 network includes configuration information of the virtual machine, and the configuration information of the virtual machine mainly includes the ports of the created network used by the virtual machine.
  • the networking device management module configures the hardware switch of the local layer 2 network according to the flow table and/or configuration of the local layer 2 network.
  • the networking device management module returns a message that the local Layer 2 network configuration is successful.
  • the local Layer 2 network is also the Layer 2 network of the virtual machine, or in other words, the Layer 2 network of the cloud network of the created data center, and also refers to the network where the APP to be accessed by the wireless side terminal device is located.
  • the Layer 2 network module receives the notification that the virtual machine is online, it sends the configuration information of the virtual machine to the networking device management module, and the networking device management module controls the hardware switch to configure the Layer 2 network of the virtual machine only as a a specific realization.
  • the Layer 2 network module can also send the configuration information of the virtual machine to the Layer 2 agent execution module of the host where the virtual machine is located, and the two The layer proxy execution module sends the flow table and/or configuration of the layer 2 network of the virtual machine to the soft forwarding module, and can also complete the configuration of the layer 2 network of the virtual machine, which is not limited.
  • the layer 2 network of the virtual machine is communicated with the layer 2 network of the UPF.
  • the layer-3 network module sends the second configuration information to the UPF control module.
  • the second configuration information includes the parameter information of the elastic IP, the binding information (hereinafter referred to as the third binding information) of the elastic IP and the created network (that is, the cloud network of the data center), and the third binding information Indicates that the elastic IP is bound to the created cloud network.
  • the third binding information may include the ID of the cloud network, the vlan or vxlan corresponding to the cloud network, and the like.
  • the parameter information of the elastic IP includes, for example, the address of the elastic IP and the IP address information of the small network of the agent. It should be understood that the IP address of the small network of the agent refers to the port of the network created in steps 601-603, that is, the port used by the virtual machine.
  • the UPF control module receives second configuration information.
  • the layer-3 network module sends the second configuration information to the adaptation layer of the UPF control module.
  • the UPF control module (specifically, its adaptation layer) receives the second configuration information, and converts the second configuration information into a second configuration command recognizable by the UPF.
  • the UPF control module sends a second configuration command to the UPF.
  • the UPF receives and executes the second configuration command.
  • the second configuration command may include the following content:
  • the UPF returns a message that the configuration of the virtual elastic IP is completed.
  • the virtual elastic IP belongs to the three-layer network model object, and the configuration of the virtual elastic IP is completed, that is, the three-layer network configuration is executed successfully.
  • the layer-2 network module returns a message that the virtual machine goes online successfully to the API.
  • the API returns a message that the virtual machine is powered on successfully to the administrator or the tenant.
  • the UPF control module completes the configuration from the cloud network of the data center to the Layer 2 network and Layer 3 network of the UPF.
  • you can apply for an elastic IP in the data center so that the wireless side terminal device can directly access the APP in the data center through the elastic IP address.
  • FIG. 4 For other beneficial effects of the method, reference may be made to the description of the beneficial effects of the method shown in FIG. 4 , which will not be repeated here.
  • FIG. 8 is a schematic flowchart of a method for creating a virtual load balance provided by the present application.
  • the administrator or tenant creates the network where the APP is located, as well as the subnet and port of the network.
  • the method may include the steps of:
  • the API receives a first creation request.
  • a first create request is used to request the creation of networks, subnets and ports.
  • the API sends configuration information of the network, subnet, and port to the Layer 2 network module.
  • the Layer 2 network module receives configuration information of the network, subnet and port, and stores the configuration information of the network, subnet and port.
  • the Layer 2 network module sends a message that the creation is successful.
  • the API receives the second creation request.
  • the second create request is used to request to create a virtual LB.
  • the API sends a third creation request to the layer-4 to layer-7 network modules.
  • the third create request is used to request to create a virtual LB.
  • the third creation request includes parameter information of the virtual LB.
  • the layer 4 to layer 7 network modules receive the third creation request, obtain the parameter information of the virtual LB, and store the parameter information of the virtual LB.
  • the layer-4 to layer-7 network module sends a message that the virtual LB is created successfully.
  • start the virtual machine used by the APP trigger the virtual machine to go online, that is, send a request to the API to start the virtual machine.
  • the API sends a virtual machine online notification to the layer-2 network module and the layer-3 network module.
  • the layer-2 network module sends a configuration request to the layer-2 proxy execution module of the host where the virtual machine is located.
  • the configuration request includes the flow table and/or configuration of the local Layer 2 network.
  • the configuration of the local Layer 2 network includes configuration information of the virtual machine, for example, ports used by the virtual machine.
  • the layer-2 agent module sends the first configuration information to the UPF control module.
  • the first configuration information is used for the configuration of the Layer 2 network of the UPF.
  • the first configuration information includes the flow table and/or configuration of the Layer 2 network of the UPF.
  • the UPF control module receives the first configuration information, and converts the first configuration information into a first configuration command recognizable by the UPF.
  • the UPF control module sends a first configuration command to the UPF.
  • the UPF receives and executes the first configuration command.
  • the UPF sends a message that the configuration of the UPF layer-2 network is completed to the layer-2 proxy execution module.
  • the layer-2 proxy execution module requests the soft forwarding module to configure a local layer-2 network.
  • the Layer 2 proxy execution module sends the flow table and/or configuration of the local Layer 2 network to the soft forwarding module, and the soft forwarding module realizes the configuration of the local Layer 2 network.
  • the soft forwarding module receives the flow table and/or configuration of the local Layer 2 network, and configures the local Layer 2 network according to the flow table and/or configuration of the local Layer 2 network.
  • the soft forwarding module executes and returns a message that the configuration of the local Layer 2 network is completed to the Layer 2 agent.
  • the Layer 2 proxy execution module returns a message that the local Layer 2 network configuration is executed successfully to the Layer 2 network module.
  • the layer 2 network of the virtual machine communicates with the layer 2 network of the UPF.
  • the layer-3 network module After receiving the notification that the virtual machine is online, the layer-3 network module sends second configuration information to the UPF control module, where the second configuration information is used to configure the virtual LB.
  • the second configuration information includes the parameter information of the virtual load balancing LB and the binding information (hereinafter referred to as the fourth binding information) between the virtual load balancing LB and the created network (that is, the cloud network).
  • the specified information indicates that the virtual LB is bound to the cloud network.
  • the fourth binding information may include the ID of the cloud network, the vlan or vxlan corresponding to the cloud network, and the like.
  • the UPF control module receives the second configuration information, and converts the second configuration information into a second configuration command recognizable by the UPF.
  • the UPF control module sends the second configuration command to the UPF.
  • the second configuration command may include the following content:
  • the UPF sends a message that the configuration of the virtual LB is completed to the UPF control module.
  • the UPF executes the second configuration command, it sends a message that the configuration of the virtual LB is completed to the UPF control module.
  • the virtual LB belongs to the four-layer to seven-layer network model object, and the configuration of the virtual LB is completed, that is, the four-layer to seven-layer network configuration is executed successfully.
  • the layer-2 network module returns a message that the virtual machine goes online successfully to the API.
  • the API returns a message that the virtual machine is powered on successfully.
  • the UPF control module completes the configuration from the cloud network of the data center to the Layer 2 network and Layer 3 network of the UPF.
  • the virtual LB can be configured on-demand in the data center network to provide the load sharing capability for the created network.
  • FIG. 9 is a schematic diagram of the application of the technical solution provided by the present application to an APP for a wireless terminal device to access a data center.
  • the Neutron model is usually used on the management side, and the UPF uniformly provides L3-L7 network model objects. Therefore, the network node resources and some hardware resources of the data center network can be released, such as the hardware firewall resources shown in FIG. 1 .
  • the network management capability of the original UPF management component U2020 is removed, and the end-to-end (end to end, E2E) service capability is independently activated by tenants or administrators, which reduces the detour of service traffic paths and improves the network performance. processing efficiency. At the same time, it also improves the utilization efficiency of edge network resources.
  • FIG. 9 shows three servers, which are a virtualized server 1, a server 2, and a bare metal server 3, respectively.
  • business software 1 is deployed on server 1
  • business software 2 is deployed on server 3 .
  • the UPF control module receives the request for creating a network model object from the Neutron model, converts the parameter information of the network model object carried in the request into a configuration command recognizable by UPF, and then sends the configuration command to UPF .
  • UPF executes the configuration command to complete the configuration of the network model object, thereby providing corresponding network functions, such as firewall functions, layer-3 gateway routing functions, and load balancing functions.
  • the terminal equipment on the wireless side accesses the business software (for example, business software 1) in the data center
  • the management side of this application since the management side of this application only provides one model of Neutron, and the UPF provides L3-L7 network model objects, thereby avoiding repeated network function, which improves the efficiency of network resource usage.
  • the detour of network traffic is also reduced, and the consumption of traffic bandwidth is reduced.
  • the UPF control module in FIG. 9 includes the API of the UPF control module, which is different from the API of the data center network.
  • FIG. 10 is a schematic block diagram of a communication device provided in this application.
  • a communication device 1000 includes a processing unit 1100 , a receiving unit 1200 and a sending unit 1300 .
  • the communication device 1000 may correspond to the user plane function network element control module or the UPF control module in the foregoing embodiments of the present application.
  • the processing unit 1100 is used to control and manage the actions of the user plane functional network element control module or the UPF control module.
  • the receiving unit 1200 and the sending unit 1300 are used to support the user plane functional network element control module or the UPF control module to send or receive information/data (for specific description, refer to the above method embodiments). details as follows:
  • Each unit of the communication device 1000 is used to realize the following functions:
  • the receiving unit 1200 is configured to receive first configuration information from the cloud network, wherein the first configuration information is used for the configuration of the Layer 2 network of the operator network, and the first configuration information includes the first configuration information of the operator network The flow table and/or configuration of the Layer 2 network;
  • a processing unit 1100 configured to convert the first configuration information into a first configuration command recognizable by a user plane functional network element of the operator network;
  • a sending unit 1300 configured to send the first configuration command to the user plane functional network element
  • the receiving unit 1200 is further configured to receive second configuration information from the cloud network, where the second configuration information is used for configuring network model objects;
  • the processing unit 1100 is further configured to convert the second configuration information into a second configuration command recognizable by the user plane functional network element;
  • the sending unit 1300 is further configured to send the second configuration command to the user plane functional network element.
  • the network model object is one or more of the following:
  • Network subnet, port, virtual router, virtual firewall, elastic IP and virtual load balancing LB.
  • the receiving unit 1200 receives the first configuration information and/or the second configuration information from the cloud network through a C-N interface.
  • the C-N interface is used for transferring parameter information of the network model object from the cloud network to the operator network.
  • the sending unit 1300 sends the first configuration command and/or the second configuration command to the user plane functional network element through a C-U interface.
  • the C-U interface is used to implement the configuration and/or control of the user plane function network element.
  • the network model object is the virtual router
  • the second configuration information carries first binding information
  • the first binding information indicates that the virtual router and the cloud network Binding, wherein the virtual router belongs to a layer-3 network model object
  • the receiving unit 1200 is further configured to receive third configuration information from the cloud network, where the third configuration information includes parameter information of the virtual router;
  • the processing unit 1100 is further configured to convert the third configuration information into a third configuration command recognizable by the user plane functional network element;
  • the sending unit 1300 is further configured to send the third configuration command to the user plane functional network element;
  • the processing unit 1100 is specifically configured to convert the first binding information into the second configuration command recognizable by a user plane functional network element in the operator.
  • the network model object is the virtual firewall
  • the second configuration information carries parameter information and second binding information of the virtual firewall, and the second binding information Instruct the virtual firewall to be bound to the created virtual router, where the virtual firewall belongs to a three-layer network model object;
  • the processing unit 1100 is further configured to convert the parameter information of the virtual firewall and the second binding information into the second configuration command recognizable by the user plane functional network element in the operator.
  • the network model object is the elastic IP
  • the second configuration information carries parameter information of the elastic IP and third binding information
  • the third binding information indicates the The elastic IP is bound to the cloud network, wherein the elastic IP belongs to a three-layer network model object;
  • the receiving unit 1200 is further configured to receive a first request message from the cloud network for applying for an elastic IP address, where the first request message is used to apply for an elastic IP address of the operator network;
  • the sending unit 1300 is further configured to send a second request message to the user plane functional network element, where the second request message is used to request the elastic IP address of the operator network;
  • the receiving unit 1200 is further configured to receive elastic IP address list information from the user plane functional network element, where the elastic IP address list information indicates one or more elastic IP addresses
  • the processing unit 1100 is specifically configured to convert the parameter information of the elastic IP and the third binding information into the second configuration command recognizable by the user plane function network element in the operator.
  • the network model object is the virtual LB
  • the second configuration information carries parameter information of the virtual LB and fourth binding information
  • the fourth binding information indicates the The virtual LB is bound to the cloud network, wherein the virtual LB belongs to layer 4 to layer 7 network model objects;
  • the processing unit 1100 is further configured to convert the parameter information of the virtual LB and the fourth binding information into the second configuration command recognizable by a user plane functional network element in the operator.
  • the communication device 1000 may correspond to a user plane function network element or UPF in this embodiment of the present application.
  • Each unit of the communication device 1000 is used to realize the following functions:
  • the receiving unit 1200 is configured to receive a first configuration command from the user plane functional network element control module, the first configuration command is used for the configuration of the Layer 2 network of the operator network, and the first configuration command includes The flow table and/or configuration of the Layer 2 network of the operator network;
  • the processing unit 1100 is configured to configure a Layer 2 network of the operator network according to the first configuration command
  • the receiving unit 1200 is further configured to receive a second configuration command from the user plane functional network element control module, where the second configuration command is used for configuring a network model object;
  • the processing unit 1100 is further configured to configure the network model object according to the second configuration command.
  • the network model object is one or more of the following:
  • Network subnet, port, virtual router, virtual firewall, elastic IP and virtual load balancing LB.
  • the receiving unit 1200 receives the first configuration command and/or the second configuration command from the user plane functional network element control module through a C-U interface.
  • the C-U interface is used to configure and/or control the user plane function network element.
  • the second configuration command is used to configure the virtual router
  • the network model object is the virtual router
  • the second configuration command carries the first binding information
  • the first binding information indicates that the virtual router is bound to the cloud network, where the virtual router belongs to a three-layer network model object;
  • the processing unit 1100 is specifically configured to configure the virtual router according to the second configuration command
  • the receiving unit 1200 is further configured to receive a third configuration command from the user plane functional network element control module, the third configuration command is used to request configuration of the virtual router, and the third configuration command includes Parameter information of the virtual router;
  • processing unit 1100 is further configured to execute the third configuration command.
  • the network model object is the virtual firewall
  • the second configuration information carries parameter information and second binding information of the virtual firewall, and the second binding information Instruct the virtual firewall to be bound to the created virtual router, where the virtual firewall belongs to a three-layer network model object;
  • the processing unit 1100 is specifically configured to configure the virtual firewall according to the second configuration command.
  • the network model object is the elastic IP
  • the second configuration information carries parameter information and third binding information of the elastic IP
  • the third binding information Indicate that the elastic IP is bound to the cloud network, where the elastic IP belongs to a three-layer network model object
  • the processing unit 1100 is specifically configured to configure the elastic IP according to the second configuration command
  • the receiving unit 1200 is further configured to receive a second request message for applying for an elastic IP address from the user plane functional network element control module, where the request message is used to apply for an elastic IP address of the operator network;
  • the sending unit 1300 is further configured to send elastic IP address list information to the user plane functional network element control module, where the elastic IP address list information indicates one or more elastic IP addresses.
  • the network model object is the virtual LB
  • the second configuration information carries parameter information and fourth binding information of the virtual LB, and the fourth binding information indicating that the virtual LB is bound to the cloud network, where the virtual LB belongs to a layer 4 to layer 7 network model object;
  • the processing unit 1100 is specifically configured to configure the virtual LB according to the second configuration command.
  • the communication device 1000 may correspond to the layer-2 proxy execution module in the embodiment of the present application.
  • Each unit of the communication device 1000 is used to realize the following functions:
  • the receiving unit 1200 is configured to receive a configuration request from the Layer 2 network module, where the configuration request is used to request configuration of the Layer 2 network of the operator network and the Layer 2 network of the cloud network;
  • the sending unit 1300 is configured to send first configuration information to the user plane functional network element control module based on the configuration request, where the first configuration information is used for the configuration of the Layer 2 network of the operator network, and the The first configuration information includes the flow table and/or configuration of the Layer 2 network of the operator network;
  • processing unit 1100 is further configured to configure the Layer 2 network of the cloud network based on the configuration request.
  • the sending unit 1300 sends the first configuration information to the user plane functional network element control module through a C-N interface.
  • the C-N interface is used for transferring parameter information of the network model object from the cloud network to the operator network.
  • the processing unit 1100 is configured to, based on the configuration request, control the sending unit 1300 to send the flow table and/or the layer-2 network of the cloud network to the soft forwarding module deployed in the cloud network or configuration, to complete the configuration of the layer 2 network of the cloud network; or,
  • the processing unit 1100 is configured to, based on the configuration request, control the sending unit 1300 to send the flow table and/or configuration of the Layer 2 network of the cloud network to the networking device management module deployed in the cloud network, so that the networking device
  • the management module configures the hardware switches of the cloud network to complete the configuration of the layer 2 network of the cloud network.
  • the communication device 1000 may correspond to the three-layer network module in the embodiment of the present application.
  • Each unit of the communication device 1000 is used to realize the following functions:
  • the receiving unit 1200 is configured to receive the online notification of the virtual machine of the cloud network
  • the sending unit 1300 is configured to send second configuration information to the user plane functional network element control module based on the online notification of the virtual machine, where the second configuration information is used to configure a network model object in the cloud network.
  • the network model object is one or more of the following:
  • Network subnet, port, virtual router, virtual firewall, elastic IP and virtual load balancing LB.
  • the network model object is the virtual router
  • the second configuration information carries first binding information
  • the first binding information indicates that the virtual router and the Cloud network binding
  • the receiving unit 1200 is further configured to receive a creation request from an API of the cloud network, where the creation request is used to request creation of the virtual router;
  • the sending unit 1300 is further configured to send third configuration information to the user plane functional network element control module, where the third configuration information includes parameter information of the virtual router.
  • the network model object is the elastic IP
  • the second configuration information carries parameter information and third binding information of the virtual elastic IP, and the third binding information indicating that the elastic IP is bound to the cloud network;
  • the receiving unit 1200 is further configured to receive a creation request from an API of the cloud network, where the creation request is used to request creation of the virtual elastic IP;
  • the sending unit 1300 is further configured to send a first request message to the user plane functional network element control module, where the first request message is used to apply for an elastic IP address of the operator network;
  • the receiving unit 1200 is further configured to receive a message of successful application of the elastic IP address from the functional network element control module of the user plane.
  • the receiving unit 1200 and the sending unit 1300 may also be integrated into a transceiver unit, which has the functions of receiving and sending at the same time, which is not limited here.
  • the processing unit 1100 is configured to perform processing and/or operations implemented internally by corresponding modules except for the actions of sending and receiving.
  • the receiving unit 1200 is configured to perform an action of receiving
  • the sending unit 1300 is configured to perform an action of sending.
  • the "corresponding modules" described in the above device embodiments may be the user plane function network element control module (for example, UPF control module), user plane function network element (for example, UPF) in each embodiment of the present application , a layer-2 proxy execution module or a layer-3 network module.
  • UPF control module for example, UPF control module
  • UPF user plane function network element
  • UPF user plane function network element
  • FIG. 11 is a schematic structural diagram of a communication device provided in the present application.
  • the communication device 10 includes: one or more processors 11 , one or more memories 12 and one or more communication interfaces 13 .
  • the processor 11 is used to control the communication interface 13 to send and receive signals
  • the memory 12 is used to store a computer program
  • the processor 11 is used to call and run the computer program from the memory 12, so that the communication device 10 executes the method described in each method embodiment of the present application. The processing performed by the corresponding module.
  • the processor 11 may have the functions of the processing unit 1100 shown in FIG. 10
  • the communication interface 13 may have the functions of the receiving unit 1200 and/or the sending unit 1300 shown in FIG. 10 .
  • the processor 11 may be used to perform processing or operations internally performed by the communication device, and the communication interface 13 is used to perform sending and/or receiving operations by the communication device.
  • the dotted box behind the device indicates that there may be more than one device.
  • the communication device shown in FIG. 11 may be a UPF control module, a UPF, a layer-2 agent execution module or a layer-3 network module in various embodiments of the present application.
  • the memory and the processor in the foregoing apparatus embodiments may be physically independent units, or the memory and the processor may also be integrated together, which is not limited herein.
  • the present application also provides a computer-readable storage medium, the computer-readable storage medium stores computer instructions, and when the computer instructions are run on the computer, the operations performed by the corresponding modules in each method embodiment of the present application are and/or processing is performed.
  • the present application also provides a computer program product.
  • the computer program product includes computer program codes or instructions. When the computer program codes or instructions are run on a computer, the operations performed by the corresponding modules in each method embodiment of the present application and/or or processing is performed.
  • the present application also provides a chip, the chip includes a processor, the memory for storing computer programs is set independently of the chip, and the processor is used for executing the computer programs stored in the memory, so that the communication device installed with the chip Execute the operations and/or processing performed by the corresponding modules in any one method embodiment.
  • the chip may further include a communication interface.
  • the communication interface may be an input/output interface, or an interface circuit or the like.
  • the chip may further include the memory.
  • processors there may be one or more processors, one or more memories, and one or more memories.
  • the present application also provides a communication device (for example, it may be a chip or a chip system), including a processor and a communication interface, the communication interface is used to receive (or be referred to as input) data and/or information, and will receive The received data and/or information are transmitted to the processor, and the processor processes the data and/or information, and the communication interface is also used to output (or be referred to as output) the data and/or processed by the processor or information, so that the operations and/or processing performed by the corresponding modules in any one method embodiment are executed.
  • a communication device for example, it may be a chip or a chip system
  • the communication interface is used to receive (or be referred to as input) data and/or information, and will receive The received data and/or information are transmitted to the processor, and the processor processes the data and/or information, and the communication interface is also used to output (or be referred to as output) the data and/or processed by the processor or information, so that the operations and/or processing performed by the corresponding modules in any one
  • the present application also provides a communication device, including at least one processor, the at least one processor is coupled to at least one memory, and the at least one processor is configured to execute computer programs or instructions stored in the at least one memory,
  • the communication device is made to perform the operations and/or processes performed by the corresponding modules in any one method embodiment.
  • the present application also provides a communication device, including a processor and a memory.
  • a transceiver may also be included.
  • the memory is used to store computer programs
  • the processor is used to call and run the computer programs stored in the memory, and control the transceiver to send and receive signals, so that the communication device performs the operations and/or processing performed by the corresponding modules in any method embodiment .
  • the present application provides a communication system architecture.
  • the communication system architecture can be applied to a cloud network of a data center.
  • the communication system architecture reference may be made to the system architecture 100 shown in FIG. 2 and its description, which will not be repeated here.
  • corresponding module may refer to any one of the UPF control module, UPF, layer-2 agent execution module, and layer-3 network module in the method embodiment of the present application.
  • the memory in the embodiments of the present application may be a volatile memory or a nonvolatile memory, or may include both volatile and nonvolatile memories.
  • the non-volatile memory can be read-only memory (read-only memory, ROM), programmable read-only memory (programmable ROM, PROM), erasable programmable read-only memory (erasable PROM, EPROM), electrically programmable Erases programmable read-only memory (electrically EPROM, EEPROM) or flash memory.
  • the volatile memory can be random access memory (RAM), which acts as external cache memory.
  • RAM random access memory
  • SRAM static random access memory
  • DRAM dynamic random access memory
  • DRAM synchronous dynamic random access memory
  • SDRAM double data rate synchronous dynamic random access memory
  • ESDRAM enhanced synchronous dynamic random access memory
  • SLDRAM direct memory bus random access memory
  • direct rambus RAM direct rambus RAM
  • the methods provided in the foregoing embodiments may be implemented in whole or in part by software, hardware, firmware or any combination thereof.
  • software When implemented using software, it may be implemented in whole or in part in the form of a computer program product.
  • the computer program product may comprise one or more computer instructions.
  • the computer program instructions When the computer program instructions are loaded and executed on the computer, the processes or functions according to the embodiments of the present application will be generated in whole or in part.
  • the computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable devices.
  • the computer instructions may be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted from a website, computer, server, or data center Transmission to another website site, computer, server, or data center by wired (such as coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (such as infrared, wireless, microwave, etc.).
  • the computer-readable storage medium may be any available medium that can be accessed by a computer, or a data storage device such as a server or a data center integrated with one or more available media.
  • numbers such as “first” and “second” are used to distinguish the same or similar items with basically the same function and effect.
  • the first configuration information and the second configuration information are only used to distinguish different configuration information, and the sequence thereof is not limited.
  • numbers such as “first” and “second” do not limit the number and execution order, and words such as “first” and “second” do not necessarily mean that they are different.
  • the disclosed systems, devices and methods may be implemented in other ways.
  • the device embodiments described above are only illustrative.
  • the division of the units is only a logical function division. In actual implementation, there may be other division methods.
  • multiple units or components can be combined or May be integrated into another system, or some features may be ignored, or not implemented.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be through some interfaces, and the indirect coupling or communication connection of devices or units may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components shown as units may or may not be physical units, that is, they may be located in one place, or may be distributed to multiple network units. Part or all of the units can be selected according to actual needs to achieve the purpose of the solution of this embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, each unit may exist separately physically, or two or more units may be integrated into one unit.
  • the functions described above are realized in the form of software function units and sold or used as independent products, they can be stored in a computer-readable storage medium.
  • the technical solution of the present application is essentially or the part that contributes to the prior art or the part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, including Several instructions are used to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the methods described in the various embodiments of the present application.
  • the aforementioned storage media include: U disk, mobile hard disk, read-only memory (read-only memory, ROM), random access memory (random access memory, RAM), magnetic disk or optical disc, etc., which can store program codes. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

本申请提供了一种数据中心的云网络和运营商网络互通的方法、通信装置和系统,该系统包括:用于提供二层网络模型对象的二层网络模块;用于提供三层网络模型对象的三层网络模块;用于提供四至七层网络模型对象的四至七层网络模块;用户面功能网元控制模块接收来自于二层网络模块、三层网络模块或四至七层网络模块的请求创建网络模型对象的配置信息,并将这些配置信息转换为运营商网络的用户面功能网元可识别的配置命令,并将配置命令发送给用户面功能网元,由用户面功能网元执行该配置命令,以配置相应的网络模型对象。本申请提供的方法可以提升网络资源的使用效率,减少网络流量绕行,减少流量带宽消耗。

Description

数据中心的云网络和运营商网络互通的方法和通信装置
本申请要求于2021年08月13日提交国家知识产权局、申请号为202110928948.3、申请名称为“数据中心的云网络和运营商网络互通的方法和通信装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及无线通信技术,更具体地,涉及一种数据中心的云网络和运营商网络互通的方法、通信装置和通信系统。
背景技术
在移动网络的场景下,为了提升业务质量和用户体验,计算资源逐渐下移到网络边缘,贴近用户提供高速、高带宽、低时延的通信能力。由于业务部署在数据中心,移动终端访问业务需要经过运营商网络和数据中心的网络两部分。其中,数据中心的网络由云平台提供,运营商网络由运营商用户面功能(user plane function,UPF)设备提供。
上述的两种网络有不同的运营主体和使用方式。具体地,一般云平台的网络遵循业界云平台标准模型,目前通常为OpenStack Neutron模型,而运营商网络遵循第三代合作伙伴计划(3rd generation partnership project,3GPP)标准提供网络功能。其中,Neutron是OpenStack项目中负责提供网络服务的组件,它基于软件定义网络的思想,实现了网络虚拟化下的资源管理。Neutron的设计目标是实现“网络即服务(networking as a service)”,在设计上遵循了基于软件定义网络(software defined network,SDN)实现网络虚拟化的原则,在实现上充分利用了Linux系统上的各种网络相关的技术。这两种网络是独立的配置以及使用的。无线侧终端设备访问数据中心的应用(application,APP)的访问时,网络流量需要经过运营商网络和数据中心的网络节点,网络流量的绕行严重,网络流量带宽的消耗大。
发明内容
本申请提供一种数据中心的云网络和运营商网络互通的方法,用于能够提升网络资源的使用效率。
第一方面,提供了一种数据中心的云网络和运营商网络互通的方法,数据中心中部署有管理组件,该管理组件包括用户面功能网元控制模块,该方法包括:
用户面功能网元控制模块接收来自于云网络的第一配置信息,其中,第一配置信息用于运营商网络的二层网络的配置,第一配置信息中包含运营商网络的二层网络的流表和/或配置;
用户面功能网元控制模块将第一配置信息转换为运营商网络的用户面功能网元可识别的第一配置命令;
用户面功能网元控制模块将第一配置命令发送至用户面功能网元;
用户面功能网元控制模块接收来自于云网络的第二配置信息,其中,第二配置信息用于网络模型对象的配置;
用户面功能网元控制模块将第二配置信息转换为用户面功能网元可识别的第二配置命令;
用户面功能网元控制模块将第二配置命令发送至用户面功能网元。
在本申请中,由用户面功能网元统一提供二层至七层的网络模型对象,并通过用户面功能网元控制模块对用户面功能网元进行配置和管理,将运营商网络和数据中心网络的网络模型统一为Neutron模型。具体地,用户面功能网元控制模块接收来自于数据中心的云网络的基于Neutron模型的用于创建网络模型对象的配置信息,并将这些配置信息转换为用户面功能网元可识别的配置命令,再将该配置命令转发至用户面功能网元执行,完成网络模型对象的配置。该方案去除了数据中心的网络节点的资源以及部分硬件资源,同时也去除了运营商网络中用户面功能网元的管理组件,能够提升网络资源的使用效率。
此外,该方案还可以减少网络流量绕行,减少流量带宽消耗。
结合第一方面,在第一方面的某些实现方式中,用户面功能网元控制模块是通过C-N接口接收来自于云网络的第一配置信息和/或第二配置信息的。
其中,C-N接口用于网络模型对象的参数信息从云网络到运营商网络的传递。
在本申请中,新增的用户面功能网元控制模块和数据中心网络的各网络模型对象的提供模块(例如,二层网络模块、三层网络模块,或四至七层网络模块)之间通过C-N接口,实现这些网络模型对象的参数在数据中心网络和运营商网络之间的传递。
结合第一方面,在第一方面的某些实现方式中,用户面功能网元控制模块是通过C-U接口将第一配置命令和/或第二配置命令发送至用户面功能网元的。
其中,C-U接口用于实现对用户面功能网元的配置和/或控制。具体地,新增的用户面功能网元控制模块通过C-U接口实现对用户面功能网元的配置和/或控制。
结合第一方面,在第一方面的某些实现方式中,该网络模型对象为虚拟路由器,第二配置信息中携带第一绑定信息,第一绑定信息指示该虚拟路由器和云网络绑定,其中,虚拟路由器属于三层网络模型对象;
以及,该方法还包括:
用户面功能网元控制模块接收来自于云网络的第三配置信息,第三配置信息包括该虚拟路由器的参数信息;
用户面功能网元控制模块将第三配置信息转换为用户面功能网元可识别的第三配置命令;
用户面功能网元控制模块将第三配置命令发送至用户面功能网元;
用户面功能网元控制模块将第二配置信息转换为运营商网络中的用户面功能网元可识别的第二配置命令,包括:
用户面功能网元将该第一绑定信息转换为运营商网络中的用户面功能网元可识别的第二配置命令。
在该实现方式中,虚拟机上线之后,用户面功能网元控制模块完成数据中心云网络到运营商网络的二层网络和三层网络的配置,在用户面功能网元上动态实现了运营商网络和 数据中心网络的二层网络的互通,并可以提供路由器的功能,也即对外提供三层网关能力。
结合第一方面,在第一方面的某些实现方式中,该网络模型对象为虚拟防火墙,第二配置信息中携带该虚拟防火墙的参数信息和第二绑定信息,第二绑定信息指示该虚拟防火墙和已创建的虚拟路由器绑定,其中,虚拟防火墙属于三层网络模型对象;
用户面功能网元控制模块将第二配置信息转换为运营商网络中的用户面功能网元可识别的第二配置命令,包括:
用户面功能网元将该虚拟防火墙的参数信息和第二绑定信息转换为运营商网络中的用户面功能网元可识别的第二配置命令。
在该实现方式中,虚拟机上线之后,根据虚拟机所使用的端口的配置信息,按需对虚拟防火墙进行配置,实现虚拟机所使用的端口所在的云网络经过防火墙过滤的能力。
结合第一方面,在第一方面的某些实现方式中,该网络模型对象为弹性IP,第二配置信息中携带弹性IP的参数信息和第三绑定信息,第三绑定信息指示该弹性IP和云网络绑定,其中,弹性IP属于三层网络模型对象;
以及,该方法还包括:
用户面功能网元控制模块接收来自于云网络的申请弹性IP地址的第一请求消息,第一请求消息用于申请运营商网络的弹性IP地址;
用户面功能网元控制模块向用户面功能网元发送第二请求消息,第二请求消息用于请求运营商网络的弹性IP地址;
用户面功能网元控制模块接收来自于用户面功能网元的弹性IP地址列表信息,弹性IP地址列表信息指示一个或多个弹性IP地址;
用户面功能网元控制模块将第二配置信息转换为运营商网络中的用户面功能网元可识别的第二配置命令,包括:
用户面功能网元将弹性IP的参数信息和第三绑定信息转换为运营商网络中的用户面功能网元可识别的第二配置命令。
可替换地,本申请中的弹性IP(elastic IP,EIP)也称弹性公网IP。
在该实现方式中,采用本申请的网络互通的方法,完成弹性IP的创建之后,就可以在数据中心申请弹性IP,实现无线侧终端设备直接通过弹性IP地址访问数据中心的应用。
结合第一方面,在第一方面的某些实现方式中,该网络模型对象为虚拟负载均衡LB,第二配置信息中携带虚拟负载均衡LB的参数信息和第四绑定信息,第四绑定信息指示该虚拟负载均衡LB和云网络绑定,其中,虚拟LB属于四至七层网络模型对象;
用户面功能网元控制模块将第二配置信息转换为运营商网络中的用户面功能网元可识别的第二配置命令,包括:
用户面功能网元将虚拟负载均衡LB的参数信息和第四绑定信息转换为运营商网络中的用户面功能网元可识别的第二配置命令。
在该实现方式中,采用本申请的网络互通的方法,完成虚拟LB的创建之后,可以在数据中心网络中按需配置虚拟负载均衡LB,为创建的网络提供负载分担的能力。
第二方面,提供了一种数据中心的云网络和运营商网络互通的方法,该方法包括:
运营商网络的用户面功能网元接收来自于用户面功能网元控制模块的第一配置命令,第一配置命令用于运营商网络的二层网络的配置,第一配置命令中包含运营商网络的二层 网络的流表和/或配置;
用户面功能网元根据第一配置命令配置运营商网络的二层网络;
用户面功能网元接收来自于用户面功能网元控制模块的第二配置命令,第二配置命令用于网络模型对象的配置;
用户面功能网元根据第二配置命令,配置该网络模型对象。
结合第二方面,在第一方面的某些实现方式中,用户面功能网元是通过C-U接口接收来自于用户面功能网元控制模块的第一配置命令和/或第二配置命令的,其中,所述C-U接口用于实现用户面功能网元控制模块对用户面功能网元的配置和/或控制。
结合第二方面,在第一方面的某些实现方式中,第二配置命令用于配置虚拟路由器,该网络模型对象为该虚拟路由器,第二配置命令中携带第一绑定信息,第一绑定信息指示该虚拟路由器和云网络绑定,其中,该虚拟路由器属于三层网络模型对象;
以及,该方法还包括:
用户面功能网元接收来自于用户面功能网元控制模块的第三配置命令,第三配置命令用于请求配置该虚拟路由器,第三配置命令中包含该虚拟路由器的参数信息;
用户面功能网元执行第三配置命令;
用户面功能网元根据第二配置命令配置该网络模型对象,包括:
用户面功能网元根据第二配置命令配置该虚拟路由器。
结合第二方面,在第一方面的某些实现方式中,第二配置命令用于配置虚拟防火墙,该网络模型对象为该虚拟防火墙,第二配置信息中携带该虚拟防火墙的参数信息和第二绑定信息,第二绑定信息指示该虚拟防火墙和已创建的虚拟路由器绑定,其中,虚拟防火墙属于三层网络模型对象;
用户面功能网元根据第二配置命令配置该网络模型对象,包括:
用户面功能网元根据第二配置命令配置该虚拟防火墙。
结合第二方面,在第一方面的某些实现方式中,第二配置命令用于配置弹性IP,该网络模型对象为弹性IP,第二配置信息中携带弹性IP的参数信息和第三绑定信息,第三绑定信息指示该弹性IP和云网络绑定,其中,弹性IP属于三层网络模型对象;
以及,该方法还包括:
用户面功能网元接收来自于用户面功能网元控制模块的申请弹性IP地址的第二请求消息,请求消息用于申请运营商网络的弹性IP地址;
用户面功能网元向用户面功能网元控制模块发送弹性IP地址列表信息,弹性IP地址列表信息指示一个或多个弹性IP地址;
用户面功能网元根据第二配置命令配置该网络模型对象,包括:
用户面功能网元根据第二配置命令配置该弹性IP。
结合第二方面,在第一方面的某些实现方式中,第二配置命令用于配置虚拟LB,该网络模型对象为虚拟负载均衡LB,第二配置信息中携带虚拟负载均衡LB的参数信息和第四绑定信息,第四绑定信息指示该虚拟负载均衡LB和云网络绑定,其中,虚拟负载均衡LB属于四至七层网络模型对象;
用户面功能网元根据第二配置命令配置该网络模型对象,包括:
用户面功能网元根据第二配置命令配置该虚拟负载均衡LB。
第三方面,提供一种数据中心的云网络和运营商网络互通的方法,云网络部署二层网络模块和二层代理执行模块,该方法包括:
二层代理执行模块接收来自于二层网络模块的配置请求,该配置请求用于请求配置运营商网络的二层网络和云网络的二层网络;
二层代理执行模块基于该配置请求,向用户面功能网元控制模块发送第一配置信息,其中,第一配置信息用于运营商网络的二层网络的配置,第一配置信息包括运营商网络的二层网络的流表和/或配置;
二层网络代理模块基于该配置请求,配置云网络的二层网络。
结合第三方面,在第三方面的某些实现方式中,二层代理执行模块是通过C-N接口向用户面功能网元控制模块发送第一配置信息的,其中,C-N接口用于网络模型对象的参数信息从云网络到运营商网络的传递。
结合第三方面,在第三方面的某些实现方式中,云网络还包括软转发模块和/或组网设备管理模块,
二层代理执行模块基于该配置请求,配置云网络的二层网络,包括:
二层代理执行模块基于该配置请求,向软转发模块发送云网络的二层网络的流表和/或配置,以完成云网络的二层网络的配置;或者,
二层代理执行模块基于该配置请求,向组网设备管理模块发送云网络的二层网络的流表和/或配置,以由组网设备管理模块配置云网络的硬件交换机,以完成云网络的二层网络的配置。
第四方面,提供一种数据中心的云网络和运营商网络互通的方法,云网络部署有三层网络模块,该方法包括:
三层网络模块接收云网络的虚拟机的上线的通知;
三层网络模块基于云网络的虚拟机的上线的通知,向用户面功能网元控制模块发送第二配置信息,第二配置信息用于在该云网络中配置网络模型对象。
结合第四方面,在第四方面的某些实现方式中,该网络模型对象为虚拟路由器,第二配置信息中携带第一绑定信息,第一绑定信息指示虚拟路由器和云网络绑定,该方法还包括:
三层网络模块接收来自于云网络的API的创建请求,创建请求用于请求创建虚拟路由器;
三层网络模块向用户面功能网元控制模块发送第三配置信息,第三配置信息包括该虚拟路由器的参数信息,第三配置信息用于虚拟路由器的配置。
结合第四方面,在第四方面的某些实现方式中,该网络模型对象为弹性IP,第二配置信息中携带虚拟弹性IP的参数信息和第三绑定信息,第三绑定信息指示弹性IP和云网络绑定,该方法还包括:
三层网络模块向用户面功能网元控制模块发送第一请求消息,第一请求消息用于申请运营商网络的弹性IP地址;
三层网络模块接收来自于所述用户面功能网元控制模块的弹性IP地址申请成功的消息。
第五方面,提供了一种通信系统架构,示例性地,该通信系统架构可以应用于数据中 心的云网络中。该通信系统架构包括:
二层网络模块,用于提供二层网络模型对象;
三层网络模块,用于提供三层网络模型对象;
四至七层网络模块,用于提供四至七层网络模型对象;
用户面功能网元控制模块,用于接收来自于二层网络模块、三层网络模块或四至七层网络模块的配置信息,并将该配置信息转换为运营商网络的用户面功能网元可识别的配置命令,以及将该配置命令发送给用户面功能网元,其中,该配置信息用于请求创建网络模型对象;
其中,二层网络模块、三层网络模块或四至七层网络模块与用户面功能网元控制模块之间通过C-N接口通信;
用户面功能网元控制模块与用户面功能网元之间通过C-U接口通信。
具体地,C-N接口用于该网络模型对象的参数信息从云网络到运营商网络的传递。C-U接口用于实现用户面功能网元控制模块对用户面功能网元的配置和/或控制。
此外,云网络包括上述二层网络模块、三层网络模块和四至七层网络模块。
结合第五方面,在第五方面的某些实现方式中,该通信系统架构还包括:
二层代理执行模块和软转发模块,
其中,二层代理执行模块用于接收来自于二层网络模块的配置请求,并基于该配置请求向软转发模块发送云网络的二层网络的流表和/或配置;
软转发模块用于根据云网络的二层网络的流表和/或配置,实现云网络的二层网络的转发功能。
结合第五方面,在第五方面的某些实现方式中,该通信系统架构还包括:
组网设备管理模块,
其中,组网设备管理模块用于接收来自于二层网络模块的配置请求,并基于该配置请求配置云网络的硬件交换机,以实现云网络的二层网络的能。
在上述各方面的一种实现方式中,该网络模型对象为如下一项或多项:
网络、子网、端口、虚拟路由器、虚拟防火墙、弹性IP以及虚拟负载均衡(virtual loadbalance,vLB)。
第六方面,提供一种通信装置,所述通信装置具有实现第一方面至第四方面的任一方面,或这些方面中的任一方面的任一可能的实现方式中的方法的功能。所述功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。所述硬件或软件包括一个或多个与上述功能相对应的单元。
第七方面,提供一种通信装置,包括处理器和存储器。可选地,还可以包括收发器。其中,存储器用于存储计算机程序,处理器用于调用并运行存储器中存储的计算机程序,并控制收发器收发信号,以使通信装置执行如第一方面至第四方面的任一方面,或这些方面中的任一方面的任一可能的实现方式中的方法。
第八方面,提供一种通信装置,包括处理器和通信接口,该通信接口用于接收数据和/或信息,并将接收到的数据和/或信息传输至处理器,处理器处理该数据和/或信息,以及,通信接口还用于输出经处理器处理之后的数据和/或信息,以使得如第一方面至第四方面的任一方面,或这些方面中任一方面的任一可能的实现方式中的方法被执行。
第九方面,提供一种计算机可读存储介质,该计算机可读存储介质中存储有计算机指令,当计算机指令在计算机上运行时,使得如第一方面至第四方面的任一方面,或这些方面中的任一方面的任一可能的实现方式中的方法被执行。
第十方面,提供一种计算机程序产品,该计算机程序产品包括计算机程序代码,当该计算机程序代码在计算机上运行时,使得如第一方面至第四方面的任一方面,或这些方面中的任一方面的任一可能的实现方式中的方法被执行。
第十一方面,提供一种通信系统,该系统包括用户面功能网元控制模块以及用户面功能网元。该用户面功能网元控制模块可以执行如第一方面的方法,或者该第一方面中的任一可能的实现方法;该用户面功能网元可以执行如第二方面的方法,或者该第二方面中的任一可能的实现方法。
进一步的,结合第十一方面,在第十一方面的某些实现方式中,该系统还包括二层代理执行模块以及三层网络模块,该二层代理执行模块可以执行如第三方面的方法,或者该第三方面中的任一可能的实现方法;该三层网络模块可以执行如第四方面的方法,或者该第四方面中的任一可能的实现方法。
附图说明
图1为无线侧终端设备访问数据中心的应用的过程示意图。
图2为本申请提供的通信系统架构的示意图。
图3为采用本申请的技术方案时运营商侧业务流量路径的示意图。
图4为本申请提供的数据中心的云网络与运营商网络互通的方法的示意性流程图。
图5为本申请提供的创建虚拟路由器的方法的示意性流程图。
图6为本申请提供的创建虚拟防火墙的方法的示意性流程图。
图7为本申请提供的创建弹性IP的方法的示意性流程图。
图8为本申请提供的创建虚拟负载均衡的方法的示意性流程图。
图9为本申请提供的技术方案应用于无线终端设备访问数据中心的APP的示意图。
图10为本申请提供的通信装置的示意性框图。
图11为本申请提供的通信装置的示意性结构图。
具体实施方式
下面将结合附图,对本申请实施例中的技术方案进行描述。
本申请中,“至少一个”是指一个或者多个,“多个”是指两个或两个以上。“和/或”,描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B的情况,其中A,B可以是单数或者复数。字符“/”一般表示前后关联对象是一种“或”的关系。“以下至少一项(个)”或其类似表达,是指的这些项中的任意组合,包括单项(个)或复数项(个)的任意组合。例如,a,b,或c中的至少一项(个),可以表示:a,b,c,a-b,a-c,b-c,或a-b-c,其中a,b,c可以是单个,也可以是多个。
需要说明的是,本申请中,“示例性的”或者“例如”等词用于表示作例子、例证或说明。本申请中被描述为“示例性的”或者“例如”的任何实施例或设计方案不应被解释 为比其他实施例或设计方案更优选或更具优势。确切而言,使用“示例性的”或者“例如”等词旨在以具体方式呈现相关概念。
本申请实施例描述的网络架构以及业务场景是为了更加清楚的说明本申请实施例的技术方案,并不构成对于本申请实施例提供的技术方案的限定,本领域普通技术人员可知,随着网络架构的演变和新业务场景的出现,本申请实施例提供的技术方案对于类似的技术问题,同样适用。
为了便于理解本申请的技术方案,首先对现有的无线侧终端设备访问数据中心的应用的过程进行简单介绍。
参见图1,图1为无线侧终端设备访问数据中心的应用的过程示意图。如图1,运营商边缘(provider edge,PE)设备为运营商固网的路由器设备,在数据中心外,下一跳接入边缘数据中心。EOR(end of row)或TOR(top of rack)为数据中心的交换机设备,用于数据中心内网络互连。物理防火墙(Firewall)和虚拟防火墙(vFirewall)分别为表示提供防火墙功能的物理实体和虚拟软件。用户面功能(user plane function,UPF)为无线侧用户流量转发设备,用于转发无线侧用户流量。网络节点为边缘数据中心的网络转发实体,实现路由器的功能。主机(host)是在边缘数据中心部署应用(application,APP)的服务器。U2020为UPF管理软件,提供管理模型,并管理UPF的业务行为。Neutron为数据中心的网络管理软件,提供管理模型,并管理数据中心的网络行为。在图1中,UPF是运营商的无线终端设备的接入网元。示例性地,APP是一些信息技术(information technology,IT)类应用,例如,直播业务,内容分发网络(content delivery network,CDN)业务,等。无线侧终端设备访问边缘数据中心的APP的路径为:UPF受U2020控制,将流量从无线侧引入到UPF上,并再发布到PE侧,如图1中①所示的业务流量。APP网络受Neutron控制,流量从数据中心转发到PE侧,如图1中②所示的业务流量。无线侧和数据中心的网络均发布到公网PE侧,在公网PE侧网络动态路由可达,进行网络互通。
可以看到,由于运营商网络和数据中心网络有着不同的使用方式,数据中心网络遵循业界云平台标准模型(通常为OpenStack Neutron模型),运营商网络遵循第三代合作伙伴计划(3rd generation partnership project,3GPP)标准提供网络功能。这两种网络目前是独立的配置及使用,互通时需要在网关上进行网络配置将三层网络(也记作L3)配置互联网协议(internet protocol,IP)可达,以满足移动终端流量到数据中心应用的访问。由于边缘数据中心和UPF都具备三层至七层(也即,L3-L7)的网络模型对象,其中,网络模型对象也可以称为网络模型能力,具体网络模型能力可以为该网络可提供的一种功能,其功能的实现需要依赖网络模型中不同的层来实现。例如,防火墙功能需要依赖网络模型中的三层网络模型来实现,因此防火墙功能可以称为三层网络模型。以防火墙功能为例,图1中UPF上提供防火墙功能,同时数据中心网络也提供防火墙功能,两个网络的网络功能重复,但是由于核心网的网络模型与数据中心网络的网络模型不统一,无法直接互通。也就是说,在现有技术中,无线侧终端设备访问数据中心的云网络,业务流量需要经过运营商网络和云网络,业务流量的路径绕行严重。
此外,运营商网络和数据中心的云网络提供相同的网络功能(例如,三层网关的路由功能、弹性IP功能)以及部分具有相同功能的硬件资源,业务流量均经由上述两个网络中相同的网络功能以及部分具有相同功能的硬件资源,导致该业务流量进行了重复的处理, 致使网络的业务处理效率低,同时边缘资源使用效率低。
为此,本申请提供运营商网络和数据中心的云网络互通的方法,可以减少业务流量(或者说,网络流量)的路径的绕行。同时,也可以提升网络的业务处理效率以及边缘资源使用效率。
在本申请中,数据中心的云网络有时也称为数据中心网络或云网络等。
参见图2,图2为本申请提供的数据中心的云网络的系统架构100的示意图。图2中各模块的说明如下:
应用程序接口(application programming interface,API),用于提供所述云网络的统一接口;
二层网络模块,用于提供二层网络模型对象,例如,网络、子网或者端口等,并负责下发到二层代理执行模块执行,以实现到软转发模块或组网设备管理模块的配置或流表;
三层网络模块,用于提供三层网络模型对象,例如,路由器、防火墙或者弹性互联网协议(internet protocol,IP)等,并负责下发到UPF进行适配管理,由UPF来完成三层网络模型对象的提供;
四至七层网络模块,用于提供四层至七层的网络模型对象,例如,域名系统(domain name system,DNS)、负载平衡(load balance,LB)等,可以由UPF适配管理或者直接由硬件适配管理实现;
可替换地,上述网络模块对象也可以称为网络功能,例如,二层网络模块用于提供二层网络功能,三层网络模块用于提供三层网络功能等,不予限定。
用户面功能网元控制模块,用于控制用户面功能网元,为云网络和运营商网络之间的互通,提供总的管理和控制功能,例如,该模块可以用于接收来自于三层网络模块或四至七层网络模块的用于创建网络模型对象的配置信息,并将这些配置信息转换成用户面功能网元可识别的配置命令并下发到用户面功能网元。
示例性地,本申请中的用户面功能网元可以为UPF,该用户面功能网元控制模块可以为UPF控制模块。
二层代理执行模块,用于接收来自于二层网络模块的请求,本地下发流表和/或配置到软转发模块,以实现数据中心网络的二层网络的转发功能;
软转发模块,其功能是实现虚拟设备的网络转发能力,例如,开源虚拟交换机(open vSwitch,OVS)以及单根输入输出虚拟化(single root I/O virtualization,SR-IOV)等。
C-N接口,用于网络模型对象的参数信息从云网络到运营商网络的传递。换句话说,C-N接口为Neutron到UPF控制模块的接口,实现Neutron模型的参数传递;
C-U接口,用于实现UPF控制模块对UPF的配置和/或接口控制。
应理解,在系统架构100中,作为一种可选方案,在系统架构100中在没有部署软转发模块的情况下,系统架构中可以包括组网设备管理模块。
组网设备管理模块,用于接收来自于二层网络模块的配置请求,完成硬件交换机的配置,以实现数据中心网络的二层网络的转发功能。
换句话说,系统架构100中在未部署二层代理执行模块和软转发模块的情况下,可以部署组网设备管理模块。此时,组网设备管理模块基于二层网络模块的配置请求,配置硬件交换机,实现数据中心网络的二层网络的转发功能。
此外,系统架构100中还示出了运营商网络的用户面功能网元。用户面网元,主要用于根据路由规则执行用户数据包的转发。
示例性地,该用户面功能网元可以为UPF。
UPF,是终端设备等无线侧用户接入核心网的网元,用于接收来自于UPF控制模块的配置命令,并执行该配置命令,以配置网络模型对象。
概括地说,在本申请中,在数据中心中部署管理组件,该管理组件可以包括UPF控制模块,由UPF控制模块和Neutron来实现方式网络功能的配置。
应理解,Neutron是OpenStack项目中负责提供网络服务的组件,它基于软件定义网络的思想,实现了网络虚拟化下的资源管理。Neutron的设计目标是实现“网络即服务(networking as a service)”,在设计上遵循了基于软件定义网络(software defined network,SDN)实现网络虚拟化的原则,在实现上充分利用了Linux系统上的各种网络相关的技术。具体地,Neutron为云平台的网络管理组件,其中抽象了各种网络模型(或称为网络模型对象)。示例性地,二层网络能力可以包含网络、子网、端口),三层网络能力可以包含虚拟路由器(vRouter)、虚拟防火墙(vFirwall)、弹性IP(floating IP),或四至七层网络能力,例如,负载均衡(loadbalance)、域名系统(domain name system,DNS)等。
由UPF统一提供网络的L3-L7的软网络节点功能,释放原有的数据中心网络节点的资源和部分硬件资源,例如,防火墙资源。
可以理解的是,上述网元或功能既可以是硬件设备中的网络元件,也可以是在专用硬件上运行软件功能,或者是平台(例如,云平台)上实例化的虚拟化功能。上述网元或功能可划分出一个或多个服务,进一步,还可能会出现独立于网络功能存在的服务。在本申请中,上述功能的实例、或上述功能中包括的服务的实例、或独立于网络功能存在的服务实例均可称为服务实例。
应理解的是,随着通信网络的不断演进,上述模块或者网元的名称可能发生改变,本申请实施例对此不作限定,例如,在5G通信系统中,用户面网元可以是用户面功能(user plane function,UPF)网元,在未来通信如6G通信中,用户面网元仍可以是UPF网元,或者有其它名称。图3为采用本申请的技术方案时运营商侧业务流量路径的示意图。可以看出,由于UPF可以提供三层到七层的网络功能,因此,和图1相比,数据中心的网络节点上部署的网络功能可以被释放,此外,还释放了数据中心的硬件防火墙资源,由UPF提供的虚拟防火墙提供防火墙过滤的功能。另外,该方案还释放了UPF的管理组件,即U2020。
和现有技术相比,无线侧终端设备访问数据中心的云网络时,业务流量不再经过重复的网络功能,使得边缘网络资源的使用效率获得提升。
此外,如图1中所示,现有技术中,无线侧终端设备访问数据中心的应用时,业务流量需要经过核心网的UPF,以及数据中心的网络节点,出现业务流量路径的绕行。
相比之下,如图3所示,在本申请的方案中,无线侧的终端设备访问数据中心的应用时,由于数据中心的网络节点(软网络节点)被释放,业务流量经过UPF而不再经过数据中心的软网络节点(如图3中的所示的路径③),由此可以减少流量带宽的消耗。
下面介绍本申请提供的数据中心的云网络和运营商网络互通的方法。
参见图4,图4为本申请提供的网络互通的方法的示意性流程图。该方法可以包括以 下步骤:
310、用户面功能网元控制模块接收来自于云网络的第一配置信息。
其中,所述第一配置信息用于运营商网络的二层网络的配置,所述第一配置信息中包含所述运营商网络的二层网络的流表和/或配置。
320、用户面功能网元控制模块将第一配置信息转换为运营商网络的用户面功能网元可识别的第一配置命令。
330、用户面功能网元控制模块将第一配置命令发送至用户面功能网元。
相应地,用户面功能网元接收来自于用户面功能网元控制模块的第一配置命令。
340、用户面功能网元根据第一配置命令,配置用户面功能网元的二层网络。
可替换地,用户面功能网元执行第一配置命令,完成运营商网络的二层网络的配置。也即,在本申请中,用户面功能网元的二层网络即是指运营商网络的二层网络。
350、用户面功能网元控制模块接收来自于云网络的第二配置信息。
其中,第二配置信息用于网络模型对象的配置。
示例性地,第二配置信息用于创建一个指定的网络模型对象。例如,该指定的网络模型对象可以为虚拟路由器、虚拟防火墙、虚拟弹性IP以及虚拟负载均衡中的一个或多个。
360、用户面功能网元控制模块将第二配置信息转换为用户面功能网元可识别的第二配置命令。
370、用户面功能网元控制模块将第二配置命令发送至用户面功能网元。相应地,用户面功能网元接收来自于用户面功能网元控制模块的第二配置命令。
380、用户面功能网元根据第二配置命令,配置所述网络模型对象。
本申请的技术方案,通过在数据中心部署一个管理组件,该管理组件包括用户面功能网元控制模块,用户面功能网元控制模块接收来自于云网络的基于neutron模型的网络模型对象的配置信息,并将该配置信息转换为用户面功能网元可识别的配置命令,再将该配置命令发送至用户面功能网元执行,以配置网络模型对象。
也即,云网络和运营商网络使用统一的Neutron模型,Neutron模型可以提供二层至七层的网络模型对象,例如,网络、子网、端口、路由器、防火墙、弹性IP以及虚拟负载均衡LB,由云网络中部署的网络管理组件(例如,UPF控制模块)负责统一管理Neutron模型以及运营商网络中的UPF,由UPF来提供这些网络模型对象的实体。
本申请的技术方案,通过在数据中心增加网络管理组件(例如,UPF控制模块),并由该网络管理组件管理UPF的二层至七层的网络能力,并将这些网络能力融合到数据中心的Neutron模型中,从而可以释放掉数据中心的网络节点上部署的网络功能(例如,三层到七层的网络功能)以及运营商网络中部分硬件资源(例如,硬件防火墙资源),从而降低业务流量的路径的绕行以及提升网络的处理效率。
可选地,图4所示的方法中的网络模型对象可以包括如下一项或多项:
网络、子网、端口、虚拟路由器、虚拟防火墙、弹性IP或虚拟LB。
以上结合图4所示的方法介绍了本申请实施例提供的通信方法的整体流程,下面结合图5-图8详细对图4所示的通信方法在不同的网络模型对象的配置场景下的流程进行详细说明。
示例性地,网络模型对象可以为虚拟路由器、虚拟防火墙、弹性IP或虚拟LB。
(1)创建虚拟路由器
参见图5,图5为本申请提供的创建虚拟路由器的方法的示意性流程图。该方法可以包括以下步骤:
401、API接收第一创建请求,第一创建请求用于请求创建APP所在的网络,以及所述网络的子网和端口。
示例性地,第一创建请求可以来自于管理员或租户。
402、API向二层网络模块发送所述网络、子网和端口的配置信息,二层网络模块接收所述网络、子网和端口的配置信息。
403、二层网络模块返回创建成功的消息。
二层网络模块在返回创建成功的消息之前,将所述网络、子网和端口的配置信息进行存库。
404、API接收第二创建请求,第二创建请求用于请求创建虚拟路由器。
405、API向三层网络模块发送第三创建请求,第三创建请求包含虚拟路由器的参数信息,第三创建请求用于请求创建所述虚拟路由器。
三层网络模块接收第三创建请求,并获取虚拟路由器的参数信息,并将虚拟路由器的参数信息进行存库。
示例性地,虚拟路由器的参数信息主要包括虚拟路由器的名称、标识(identifier,ID)、描述、状态信息、vpn-target等。
406、UPF控制模块从三层网络模块获取第三配置信息。其中,第三配置信息包括虚拟路由器的参数信息。
407、UPF控制模块向UPF发送第三配置命令。
具体地,UPF控制模块在获取到第三配置信息之后,将第三配置信息存库。可以理解的是,运营商网络和云网络为不同的网络,运营商网络中的UPF可能无法识别云网络中的信息。那么UPF控制模块将第三配置信息转换为UPF可识别的第三配置命令,再将第三配置命令发送至UPF。其中,第三配置命令用于配置虚拟路由器。其中,本申请中的UPF控制模块的功能类似,均具有将受到的配置信息转换为UPF可识别的配置命令的功能。
可选地,UPF控制模块可以通过多种方式向UPF发送第三配置命令。示例性地,UPF控制模块可以通过接口、人机语言(man machine language,MML)或安全外壳协议(secure shell,SSH)、API接口调用等方式向UPF下发第三配置命令。
具体的,UPF接收到第三配置命令之后,执行第三配置命令。
示例性地,第三配置命令可以包括如下所示的内容:
VPNINSTAF:VRFNAME=“xxx”
AFTYPE=ipv4uni
应理解,第三配置命令的内容仅是作为示例,本申请对于第三配置命令的形式不作任何限定,只要可以具有配置虚拟路由器的功能即可。以下其它实施例中的配置命令的示例也是类似的。
可以理解的是,UPF执行该第三配置命令的动作可以为,UPF运行该第三配置命令中的命令代码,配置该虚拟路由器。其他实施方式中的UPF“执行”的动作均可以参考该方 式中的描述,不再赘述。
408、UPF返回下发成功的消息。
409、管理员或者租户将APP和上述创建的网络绑定后,开启APP使用的虚拟机。
具体地,管理员或租户将APP所使用的虚拟机和已创建的网络绑定,包括给虚拟机指定已创建的网络的端口。这里,已创建的网络也即数据中心的云网络,也是APP所绑定的云网络。
API接收虚拟机开机的通知。
410、API向二层网络模块和三层网络模块发送虚拟机上线的通知。
可选地,在一种实现中,二层网络模块通过二层代理执行模块和软转发模块来实现本地二层网络的转发功能,从而完成本地二层网络的配置。
在另一种实现中,在没有部署二层代理执行模块和软转发模块的情况下,二层网络模块通过组网设备管理模块配置硬件交换机,也可以实现本地二层网络的转发功能的配置。
示例性地,图5中以前一种实现方式为例进行说明。
二层网络模块在接收虚拟机上线的通知之后,向二层代理执行模块发送配置请求,如步骤411。
411、二层网络模块向二层代理执行模块发送配置请求,该配置请求用于请求配置运营商网络的二层网络和所创建的网络的二层网络。
其中,配置请求中携带本地二层网络的流表和/或配置,还包括虚拟机的配置信息,虚拟机的配置信息主要包括虚拟机使用的端口。应理解,虚拟机使用的端口为上述步骤401-403中创建的网络的端口。
此外,这里的二层代理执行模块具体为虚拟机所在主机的二层代理执行模块。
412、二层代理执行模块基于该配置请求,向UPF控制模块发送第一配置信息,第一配置信息用于请求配置UPF的二层网络。
其中,第一配置信息包括UPF的二层网络的流表和/或配置。
可替换地,UPF的二层网络即是指运营商网络的二层网络。
UPF控制模块接收第一配置信息,并将第一配置信息转换为UPF可识别的第一配置命令。
413、UPF控制模块向UPF发送第一配置命令。
UPF接收第一配置命令,并执行第一配置命令。
414、UPF返回UPF的二层网络配置完成的消息。
进一步地,UPF控制模块向二层代理执行模块返回UPF的二层网络配置完成的消息。
415、二层代理执行模块向软转发模块发送配置请求,该配置请求用于请求配置本地二层网络。
应理解,这里所说的本地二层网络是指上述步骤401-403中创建的网络,或者说数据中心的云网络,也即虚拟机的二层网络。
416、软转发模块向二层代理执行模块返回本地二层网络配置完成的消息。
进一步地,二层代理执行模块向二层网络模块返回本地二层网络配置完成的消息。
417、三层网络模块接收虚拟机上线的通知后,向UPF控制模块发送第二配置信息,第二配置信息用于配置虚拟路由器。
其中,第二配置信息中携带虚拟路由器和云网络的绑定信息(以下称为第一绑定信息)。第一绑定信息指示虚拟路由器和所创建的网络(也即,数据中心的云网络)绑定。
示例性地,第一绑定信息中包括云网络的信息以及虚拟路由器的信息。其中,云网络的信息例如包括:云网络的ID、云网络对应的虚拟局域网(virtual local area network,vlan)或虚拟扩展局域网(virtual eXtential local area network,vxlan)等。例如,虚拟路由器的信息包括虚拟路由器的名称和/或ID。可以理解的是,虚拟路由器和所创建的网络(也即,数据中心的云网络)绑定的建立,是通过虚拟路由器的名称(和/或ID)以及云网络的信息实现的。
UPF控制模块接收第二配置信息,并将第二配置信息转换为UPF可识别的第二配置命令。
418、UPF控制模块向UPF发送第二配置命令。
UPF接收来自于UPF控制模块的第二配置命令,并执行第二配置命令。
示例性地,在该实施例中,第二配置命令可以包括如下所示的内容:
IPBINDVPN:VRFNAME=“xxx”;
IFNAME=“aaa”;
ADD ETHSUBIF:SUBIFTYPE=vlanType;
VLANTYPEVID=“xxx”,IFNAME=“aaa”
419、UPF返回虚拟路由器配置完成的消息。
应理解,虚拟路由器属于三层网络模型对象,虚拟路由器配置完成,也即三层网络配置执行成功。
420、二层网络模块向API返回虚拟机上线成功的消息。
421、API向管理员或租户返回虚拟机开机成功的消息。
按照如上图5的流程,虚拟机上线之后,UPF控制模块完成APP所在网络(也即数据中心的云网络)到UPF的二层网络和三层网络的配置,在UPF上动态实现了和APP所在网络的二层网络的互通。在此基础上,通过创建虚拟路由器,使得所创建的网络可以基于该虚拟路由器提供三层网关能力(或者说,路由功能)。该方法的其它有益效果可以参考图4所示的方法的有益效果的描述,此处不再赘述。
(2)创建虚拟防火墙
参见图6,图6为本申请提供的创建虚拟防火墙的方法的示意性流程图。该方法可以包括以下步骤:
501、API接收第一创建请求。
第一创建请求用于请求APP所在的网络,以及所述网络的子网和端口。
502、API向二层网络模块发送所述网络、子网和端口的配置信息。
503、二层网络模块返回创建成功的消息。
二层网络模块在返回创建成功消息之前,将所述网络、子网以及端口的配置信息进行存库。
管理员或租户按需创建虚拟防火墙,相应地,API接收到请求创建虚拟防火墙的请求,如步骤504。
504、API接收第二创建请求。
例如,第二创建请求用于请求创建虚拟防火墙。
505、API向三层网络模块发送第三创建请求。
例如,第三创建请求用于请求创建虚拟防火墙,第三创建请求中包含虚拟防火墙的参数信息。
例如,三层网络模块接收第三创建请求,并获取虚拟防火墙的参数信息,并将虚拟防火墙的参数信息进行存库。
506、三层网络模块返回虚拟防火墙创建成功的消息。
管理员或租户将APP和上述创建的网络绑定后,开启APP使用的虚拟机,触发虚拟机上线。
507、API向二层网络模块和三层网络模块发送虚拟机上线的通知。
二层网络模块接收虚拟机上线的通知。
508、二层网络模块向该虚拟机所在主机的二层代理执行模块发送配置请求。
其中,配置请求用于请求配置运营商网络的二层网络和本地二层网络。配置请求中包含本地二层网络的流表和/或配置。其中,本地二层网络的配置包括虚拟机的配置信息,虚拟机的配置信息主要包括虚拟机所使用的上述所创建的网络(也即,云网络)的端口。
509、二层代理执行模块向UPF控制模块发送第一配置信息。
例如,第一配置信息用于请求配置UPF的二层网络。
其中,第一配置信息包括UPF的二层网络的流表和/或配置。
例如,UPF控制模块接收第一配置信息,并将第一配置信息转换为UPF可识别的第一配置命令。
510、UPF控制模块向UPF发送第一配置命令。
UPF接收并执行第一配置命令,即UPF配置UPF的二层网络。
511、UPF返回UPF的二层网络配置完成的消息。
进一步地,UPF控制模块向二层代理执行模块返回UPF的二层网络配置完成的消息。
512、二层代理执行模块向软转发模块发送本地二层网络的流表和/或配置。
本地二层网络的流表和/或配置用于软转发模块配置本地二层网络。
513、软转发模块返回本地二层网络配置完成的消息。
通过完成步骤508-513,UPF的二层网络互通实现。
514、三层网络模块接收到虚拟机上线的通知后,向UPF控制模块发送第二配置信息,第二配置信息用于虚拟防火墙的配置。
其中,第二配置信息中包括虚拟防火墙的参数信息以及虚拟防火墙和已创建的虚拟路由器的绑定信息(以下称为第二绑定信息)。第二绑定信息可以包括所述已创建的虚拟路由器的端口信息。
可以发现,在上述创建虚拟路由器的过程中,虚拟路由器和所创建的网络绑定。在创建虚拟防火墙的过程中,虚拟防火墙需要绑定到所创建的虚拟路由器上。
UPF控制模块接收第二配置信息,并将第二配置信息转换为UPF可识别的第二配置命令。
515、UPF控制模块向UPF发送第二配置命令。
相应的,UPF接收并执行第二配置命令。
示例性地,在该实施例中,第二配置命令可以包括如下所示的内容:
RULE:NAME=1;
ACITON=deny;
DESTPORT=80,PROTAL=tcp;
ADD policy:rule=1,2,3.
516、UPF返回虚拟防火墙配置完成的消息。
应理解,虚拟防火墙属于三层网络模型对象,虚拟防火墙配置完成,也即三层网络配置执行成功。
517、二层网络模块向API返回虚拟机上线成功的消息。
518、API返回虚拟机开机成功的消息。
在该实施例中,UPF控制模块完成数据中心的云网络到UPF的二层网络和三层网络的配置。在此基础上,按照如上流程,虚拟机上线之后,根据虚拟机所使用的端口的信息,按需创建虚拟防火墙,实现虚拟机所使用的端口所在的网络(也即数据中心的云网络)经过防火墙过滤的能力。该方法的其它有益效果可以参考图4所示的方法的有益效果的描述,此处不再赘述。
(3)创建弹性IP
参见图7,图7为本申请提供的创建弹性IP的方法的示意性流程图。该方法可以包括以下步骤:
管理员或者租户创建APP所在的网络,以及所述网络的子网、端口。
601、API接收第一创建请求。
例如,第一创建请求用于请求创建网络、子网和端口。
602、API向二层网络模块发送所述网络、子网和端口的配置信息。
相应的,二层网络模块接收所述网络、子网和端口的配置信息,并将所述网络、子网和端口的配置信息进行存库。
603、二层网络模块返回创建成功的消息。
604、API接收第二创建请求。
第二创建请求用于请求创建虚拟路由器。
605、API向三层网络模块发送第三创建请求。
第三创建请求包含虚拟路由器的参数信息,第三创建请求用于请求创建虚拟路由器。
相应的,三层网络模块接收第三创建请求,并获取虚拟路由器的参数信息,并将虚拟路由器的参数信息存库。
606、三层网络模块返回虚拟路由器创建成功的消息。
管理员或租户按需创建弹性IP。由于弹性IP属于公网的公共资源,需要统一分配,因此需要从UPF获取可供分配的弹性IP的列表。
607、API接收第四创建请求。
第四创建请求用于请求创建弹性IP。
608、API向三层网络模块发送第五创建请求。
第五创建请求用于请求创建弹性IP。
609、三层网络模块向UPF控制模块发送第一请求消息。
第一请求消息用于申请运营商网络的弹性IP地址。
610、UPF控制模块向UPF发送第二请求消息。
第二请求消息用于申请运营商网络的弹性IP地址。
611、UPF向UPF控制模块发送弹性IP地址列表信息。
该弹性IP地址列表信息指示一个或多个弹性IP地址。
进一步地,UPF控制模块向三层网络模块发送弹性IP地址申请成功的消息。
管理员或租户将APP和创建的网络绑定后,开启APP使用的虚拟机,触发虚拟机上线。
612、API向二层网络模块和三层网络模块发送虚拟机上线的通知。
613、二层网络模块向UPF控制模块发送第一配置信息,第一配置信息用于请求配置UPF的二层网络。
其中,第一配置信息包括UPF的二层网络的流表和/或配置。
614、UPF控制模块向UPF发送第一配置命令。
UPF控制模块将第一配置信息转换为UPF可识别的第一配置命令,并将第一配置命令发送至UPF。
相应的,UPF接收并执行第一配置命令。
615、UPF返回UPF的二层网络配置完成的消息。
进一步地,UPF控制模块向二层代理执行模块返回UPF的二层网络配置完成的消息。
此外,二层网络模块接收到虚拟机上线的通知后,还可以执行步骤616。
616、二层网络模块将本地二层网络的流表和/或配置下发到组网设备管理模块。
应理解,本地二层网络的配置包括虚拟机的配置信息,虚拟机的配置信息主要包括虚拟机使用的所创建的网络的端口。
组网设备管理模块根据本地二层网络的流表和/或配置,配置本地二层网络的硬件交换机。
617、组网设备管理模块返回本地二层网络配置成功的消息。
应理解,本地二层网络也即虚拟机的二层网络,也或者说,所创建的数据中心的云网络的二层网络,同时也是指无线侧终端设备要访问的APP所在的网络。
此外,二层网络模块接收到虚拟机上线的通知之后,将虚拟机的配置信息下发到组网设备管理模块,由组网设备管理模块控制硬件交换机配置虚拟机的二层网络仅是作为一种具体实现。上文已经介绍过,在另一种实现中,二层网络模块接收到虚拟机上线的通知之后,也可以将虚拟机的配置信息下发到虚拟机所在主机的二层代理执行模块,由二层代理执行模块向软转发模块下发虚拟机的二层网络的流表和/或配置,也可以完成虚拟机的二层网络的配置,不作限定。
经过步骤613-617,使得虚拟机的二层网络到UPF的二层网络互通。
618、三层网络模块向UPF控制模块发送第二配置信息。
其中,第二配置信息包括弹性IP的参数信息、弹性IP和所创建的网络(也即,数据中心的云网络)的绑定信息(以下称为第三绑定信息),第三绑定信息指示弹性IP和所创建的云网络绑定。
示例性地,第三绑定信息可以包括所述云网络的ID、所述云网络对应的vlan或vxlan 等。弹性IP的参数信息例如包括弹性IP的地址、代理的小网的IP地址信息。应理解,代理的小网的IP地址是指步骤601-603中所创建的网络的端口,也即虚拟机使用的端口。
UPF控制模块接收第二配置信息。
具体地,在步骤618中,三层网络模块将第二配置信息发送到UPF控制模块的适配层。
UPF控制模块(具体可以为其适配层)接收第二配置信息,并将第二配置信息转换为UPF可识别的第二配置命令。
619、UPF控制模块向UPF发送第二配置命令。
相应的,UPF接收并执行第二配置命令。
示例性地,在该实施例中,第二配置命令可以包括如下所示的内容:
SNAT:SOURCEIP=192.168.1.3;
DESTIP=10.0.0.3;
ADD DNAT:SOURCEIP=10.0.0.3;
DESTIP=192.168.1.3.
620、UPF返回虚拟弹性IP配置完成的消息。
应理解,虚拟弹性IP属于三层网络模型对象,虚拟弹性IP配置完成,也即三层网络配置执行成功。
621、二层网络模块向API返回虚拟机上线成功的消息。
622、API向管理员或租户返回虚拟机开机成功的消息。
在该实施例中,UPF控制模块完成数据中心的云网络到UPF的二层网络和三层网络的配置。在此基础上,完成弹性IP的创建之后,就可以在数据中心申请弹性IP,实现无线侧终端设备直接通过弹性IP地址访问数据中心的APP。该方法的其他有益效果可以参考图4所示的方法的有益效果的描述,此处不再赘述。
(4)创建虚拟负载平衡
参见图8,图8为本申请提供的创建虚拟负载平衡的方法的示意性流程图。
管理员或者租户创建APP所在的网络,以及所述网络的子网、端口。
该方法可以包括以下步骤:
701、API接收第一创建请求。
例如,第一创建请求用于请求创建网络、子网和端口。
702、API向二层网络模块发送所述网络、子网和端口的配置信息。
二层网络模块接收所述网络、子网和端口的配置信息,并将所述网络、子网和端口的配置信息进行存库。
703、二层网络模块发送创建成功的消息。
704、API接收第二创建请求。
第二创建请求用于请求创建虚拟LB。
705、API向四至七层网络模块发送第三创建请求。
第三创建请求用于请求创建虚拟LB。其中,第三创建请求包含虚拟LB的参数信息。
四至七层网络模块接收第三创建请求,并获取虚拟LB的参数信息,并将虚拟LB的参数信息存库。
706、四至七层网络模块发送虚拟LB创建成功的消息。
管理员或租户将APP和上述创建的网络绑定后,开启APP使用的虚拟机,触发虚拟机上线,也即向API发送虚拟机开机的请求。
707、API向二层网络模块和三层网络模块发送虚拟机上线的通知。
708、二层网络模块向虚拟机所在主机的二层代理执行模块发送配置请求。
其中,配置请求中包含本地二层网络的流表和/或配置。本地二层网络的配置包括虚拟机的配置信息,例如,虚拟机使用的端口。
709、二层代理模块向UPF控制模块发送第一配置信息。
第一配置信息用于UPF的二层网络的配置。其中,第一配置信息包括UPF的二层网络的流表和/或配置。
UPF控制模块接收第一配置信息,并将第一配置信息转换为UPF可识别的第一配置命令。
710、UPF控制模块向UPF发送第一配置命令。
UPF接收并执行第一配置命令。
711、UPF向二层代理执行模块发送UPF的二层网络配置完成的消息。
712、二层代理执行模块请求软转发模块配置本地二层网络。
例如,二层代理执行模块向软转发模块发送本地二层网络的流表和/或配置,由软转发模块实现本地二层网络的配置。
例如,软转发模块接收本地二层网络的流表和/或配置,并根据本地二层网络的流表和/或配置,配置本地二层网络。
713、软转发模块向二层代理执行返回本地二层网络配置完成的消息。
进一步地,二层代理执行模块向二层网络模块返回本地二层网络配置执行成功的消息。
通过完成步骤708-713,虚拟机的二层网络到UPF的二层网络互通。
714、三层网络模块接收到虚拟机上线的通知后,向UPF控制模块发送第二配置信息,第二配置信息用于配置虚拟LB。
其中,第二配置信息中包括虚拟负载均衡LB的参数信息以及虚拟负载均衡LB和所创建的网络(也即,云网络)的绑定信息(以下称为第四绑定信息),第四绑定信息指示虚拟LB和云网络绑定。示例性地,第四绑定信息可以包括所述云网络的ID、所述云网络对应的vlan或vxlan等。
UPF控制模块接收第二配置信息,并将第二配置信息转换为UPF可识别的第二配置命令。
715、UPF控制模块将第二配置命令下发到UPF。
示例性地,在该实施例中,第二配置命令可以包括如下所示的内容:
POOL:ALGO=ROUND_ROBIN,
protocol=TCP
ADD LISTENER:PORT=8004
716、UPF向UPF控制模块发送虚拟LB配置完成的消息。
例如,UPF执行第二配置命令后,向UPF控制模块发送虚拟LB配置完成的消息。
应理解,虚拟LB属于四至七层网络模型对象,虚拟LB配置完成,也即四至七层网 络配置执行成功。
717、二层网络模块向API返回虚拟机上线成功的消息。
718、API返回虚拟机开机成功的消息。
在该实施例中,UPF控制模块完成数据中心的云网络到UPF的二层网络和三层网络的配置。在此基础上,完成虚拟LB的创建之后,可以在数据中心网络中按需配置虚拟LB,为创建的网络提供负载分担的能力。该方法的其他有益效果可以参考图4所示的方法的有益效果的描述,此处不再赘述。
以上对本申请提供的运营商网络和数据中心的云网络互通的方法进行了详细说明,下面介绍本申请提供的通信装置。
参见图9,图9为本申请提供的技术方案应用于无线终端设备访问数据中心的APP的示意图。如图9,在本申请的方案中,在管理侧,通常使用Neutron模型,由UPF统一提供L3-L7的网络模型对象。因此,可以释放数据中心网络的网络节点的资源和部分硬件资源,如图1中所示的硬件防火墙资源。并且,去除了原有的UPF的管理组件U2020的网络管理能力,由租户或者管理员独立开通端到端(end to end,E2E)业务能力,降低了业务流量的路径的绕行以及提升了网络的处理效率。同时,也提升了边缘网络资源的使用效率。
示例性地,图9中示出了3个服务器,分别为虚拟化的服务器1、服务器2,以及裸机服务器3。作为一个示例,服务器1上部署有业务软件1,服务器3上部署有业务软件2。UPF控制模块接收来自于Neutron模型的用于请求创建网络模型对象的请求,并将该请求中携带的该网络模型对象的参数信息转换为UPF可识别的配置命令,再将该配置命令发送至UPF。UPF执行该配置命令,完成该网络模型对象的配置,由此可以提供相应的网络功能,例如,防火墙的功能,三层网关的路由功能、负载均衡的功能等。无线侧终端设备访问数据中心的业务软件(例如,业务软件1)时,由于本申请的管理侧仅提供Neutron一种模型,并由UPF提供L3-L7的网络模型对象,从而避免了重复的网络功能,提升了网络资源的使用效率。此外,也减少了网络流量的绕行,降低流量带宽的消耗。
此外,应注意,图9中UPF控制模块中包含UPF控制模块的API,与数据中心网络的API相区别。
参见图10,图10为本申请提供的通信装置的示意性框图。如图10,通信装置1000包括处理单元1100、接收单元1200和发送单元1300。
可选地,通信装置1000可以对应本申请上述实施例中的用户面功能网元控制模块或UPF控制模块。处理单元1100用于对用户面功能网元控制模块或UPF控制模块的动作进行控制管理,例如,处理模块401用于执行用户面功能网元控制模块或UPF控制模块进行信息/数据处理的步骤(具体描述的内容可以参见上述方法实施例)。接收单元1200和发送单元1300用于支持用户面功能网元控制模块或UPF控制模块进行信息/数据发送或者接收的步骤(具体描述的内容可以参见上述方法实施例)。具体如下:
通信装置1000的各单元用于实现如下功能:
接收单元1200,用于接收来自于云网络的第一配置信息,其中,所述第一配置信息用于运营商网络的二层网络的配置,所述第一配置信息中包含所述运营商网络的二层网络的流表和/或配置;
处理单元1100,用于将所述第一配置信息转换为所述运营商网络的用户面功能网元可识别的第一配置命令;
发送单元1300,用于将所述第一配置命令发送至所述用户面功能网元;
接收单元1200,还用于接收来自于所述云网络的第二配置信息,其中,所述第二配置信息用于网络模型对象的配置;
处理单元1100,还用于将所述第二配置信息转换为所述用户面功能网元可识别的第二配置命令;
发送单元1300,还用于将所述第二配置命令发送至所述用户面功能网元。
可选地,在一些实现方式中,所述网络模型对象为如下一项或多项:
网络、子网、端口、虚拟路由器、虚拟防火墙、弹性IP以及虚拟负载均衡LB。
可选地,在一些实现方式中,接收单元1200是通过C-N接口接收来自于所述云网络的所述第一配置信息和/或所述第二配置信息的。
其中,所述C-N接口用于所述网络模型对象的参数信息从所述云网络到所述运营商网络的传递。
可选地,在一些实现方式中,发送单元1300是通过C-U接口将所述第一配置命令和/或所述第二配置命令发送至所述用户面功能网元的。
其中,所述C-U接口用于实现所述对所述用户面功能网元的配置和/或控制。
可选地,在一些实现方式中,所述网络模型对象为所述虚拟路由器,所述第二配置信息中携带第一绑定信息,第一绑定信息指示所述虚拟路由器和所述云网络绑定,其中,所述虚拟路由器属于三层网络模型对象;
以及,接收单元1200,还用于收来自于所述云网络的第三配置信息,所述第三配置信息包括所述虚拟路由器的参数信息;
处理单元1100,还用于将所述第三配置信息转换为所述用户面功能网元可识别的第三配置命令;
发送单元1300,还用于将所述第三配置命令发送至所述用户面功能网元;
处理单元1100,具体用于将所述第一绑定信息转换为所述运营商中的用户面功能网元可识别的所述第二配置命令。
可选地,在一些实现方式中,所述网络模型对象为所述虚拟防火墙,所述第二配置信息中携带所述虚拟防火墙的参数信息和第二绑定信息,所述第二绑定信息指示所述虚拟防火墙和已创建的虚拟路由器绑定,其中,所述虚拟防火墙属于三层网络模型对象;
处理单元1100,还用于将所述虚拟防火墙的参数信息和所述第二绑定信息转换为所述运营商中的用户面功能网元可识别的所述第二配置命令。
可选地,在一些实现方式中,所述网络模型对象为所述弹性IP,所述第二配置信息中携带所述弹性IP的参数信息和第三绑定信息,第三绑定信息指示所述弹性IP和所述云网络绑定,其中,所述弹性IP属于三层网络模型对象;
以及,接收单元1200,还用于接收来自于所述云网络的申请弹性IP地址的第一请求消息,所述第一请求消息用于申请所述运营商网络的弹性IP地址;
发送单元1300,还用于向所述用户面功能网元发送第二请求消息,所述第二请求消息用于请求所述运营商网络的弹性IP地址;
接收单元1200,还用于接收来自于所述用户面功能网元的弹性IP地址列表信息,所述弹性IP地址列表信息指示一个或多个弹性IP地址
处理单元1100,具体用于将所述弹性IP的参数信息和所述第三绑定信息转换为所述运营商中的用户面功能网元可识别的所述第二配置命令。
可选地,在一些实现方式中,所述网络模型对象为所述虚拟LB,所述第二配置信息中携带所述虚拟LB的参数信息和第四绑定信息,第四绑定信息指示所述虚拟LB和所述云网络绑定,其中,所述虚拟LB属于四至七层网络模型对象;
处理单元1100,还用于将所述虚拟LB的参数信息和所述第四绑定信息转换为所述运营商中的用户面功能网元可识别的所述第二配置命令。
可选地,通信装置1000可以对应本申请实施例中的用户面功能网元或UPF。
通信装置1000的各单元用于实现如下功能:
接收单元1200,用于接收来自于用户面功能网元控制模块的第一配置命令,所述第一配置命令用于所述运营商网络的二层网络的配置,所述第一配置命令中包含所述运营商网络的二层网络的流表和/或配置;
处理单元1100,用于根据所述第一配置命令,配置所述运营商网络的二层网络;
接收单元1200,还用于接收来自于所述用户面功能网元控制模块的第二配置命令,所述第二配置命令用于网络模型对象的配置;
处理单元1100,还用于根据所述第二配置命令,配置所述网络模型对象。
可选地,在一些实现方式中,所述网络模型对象为如下一项或多项:
网络、子网、端口、虚拟路由器、虚拟防火墙、弹性IP以及虚拟负载均衡LB。
可选地,在一些实现方式中,接收单元1200是通过C-U接口接收来自于所述用户面功能网元控制模块的第一配置命令和/或所述第二配置命令的。
其中,所述C-U接口用于实现对所述用户面功能网元的配置和/或控制。
可选地,在一些实现方式中,所述第二配置命令用于所述虚拟路由器的配置,所述网络模型对象为所述虚拟路由器,所述第二配置命令中携带第一绑定信息,第一绑定信息指示所述虚拟路由器和所述云网络绑定,其中,所述虚拟路由器属于三层网络模型对象;
处理单元1100,具体用于根据所述第二配置命令,配置所述虚拟路由器;
以及,接收单元1200,还用于接收来自于所述用户面功能网元控制模块的第三配置命令,所述第三配置命令用于请求配置所述虚拟路由器,所述第三配置命令中包含所述虚拟路由器的参数信息;
以及,处理单元1100,还用于执行所述第三配置命令。
可选地,在一些实现方式中,所述网络模型对象为所述虚拟防火墙,所述第二配置信息中携带所述虚拟防火墙的参数信息和第二绑定信息,所述第二绑定信息指示所述虚拟防火墙和已创建的虚拟路由器绑定,其中,所述虚拟防火墙属于三层网络模型对象;
处理单元1100,具体用于根据所述第二配置命令,配置所述虚拟防火墙。
可选地,在一些实现方式中,所述网络模型对象为所述弹性IP,所述第二配置信息中携带所述弹性IP的参数信息和第三绑定信息,所述第三绑定信息指示所述弹性IP和所述云网络绑定,其中,所述弹性IP属于三层网络模型对象;
处理单元1100,具体用于根据所述第二配置命令,配置所述弹性IP;
以及,接收单元1200,还用于接收来自于所述用户面功能网元控制模块的申请弹性IP地址的第二请求消息,所述请求消息用于申请所述运营商网络的弹性IP地址;
发送单元1300,还用于向所述用户面功能网元控制模块发送弹性IP地址列表信息,所述弹性IP地址列表信息指示一个或多个弹性IP地址。
可选地,在一些实现方式中,所述网络模型对象为所述虚拟LB,所述第二配置信息中携带所述虚拟LB的参数信息和第四绑定信息,所述第四绑定信息指示所述虚拟LB和所述云网络绑定,其中,所述虚拟LB属于四至七层网络模型对象;
处理单元1100,具体用于根据所述第二配置命令,配置所述虚拟LB。
可选地,通信装置1000可以对应本申请实施例中的二层代理执行模块。
通信装置1000的各单元用于实现如下功能:
接收单元1200,用于接收来自于所述二层网络模块的配置请求,所述配置请求用于请求配置运营商网络的二层网络和云网络的二层网络;
发送单元1300,用于基于所述配置请求,向用户面功能网元控制模块发送第一配置信息,其中,所述第一配置信息用于所述运营商网络的二层网络的配置,所述第一配置信息包括所述运营商网络的二层网络的流表和/或配置;
以及,处理单元1100,还用于基于所述配置请求,配置所述云网络的二层网络。
可选地,在一些实现方式中,发送单元1300是通过C-N接口向所述用户面功能网元控制模块发送所述第一配置信息的。
其中,所述C-N接口用于所述网络模型对象的参数信息从所述云网络到所述运营商网络的传递。
可选地,在一些实现方式中,处理单元1100,用于基于所述配置请求,控制发送单元1300向所述云网络部署的软转发模块发送所述云网络的二层网络的流表和/或配置,以完成所述云网络的二层网络的配置;或者,
处理单元1100,用于基于所述配置请求,控制发送单元1300向云网络部署的组网设备管理模块发送所述云网络的二层网络的流表和/或配置,以由所述组网设备管理模块配置所述云网络的硬件交换机,以完成所述云网络的二层网络的配置。
可选地,通信装置1000可以对应本申请实施例中的三层网络模块。
通信装置1000的各单元用于实现如下功能:
接收单元1200,用于接收云网络的虚拟机的上线的通知;
发送单元1300,用于基于所述虚拟机的上线的通知,向用户面功能网元控制模块发送第二配置信息,所述第二配置信息用于在该云网络中配置网络模型对象。
可选地,在一些实现方式中,所述网络模型对象为如下一项或多项:
网络、子网、端口、虚拟路由器、虚拟防火墙、弹性IP以及虚拟负载均衡LB。
可选地,在一些实现方式中,所述网络模型对象为所述虚拟路由器,所述第二配置信息中携带第一绑定信息,所述第一绑定信息指示所述虚拟路由器和所述云网络绑定;
接收单元1200,还用于接收来自于所述云网络的API的创建请求,所述创建请求用于请求创建所述虚拟路由器;
发送单元1300,还用于向所述用户面功能网元控制模块发送第三配置信息,所述第三配置信息包括所述虚拟路由器的参数信息。
可选地,在一些实现方式中,所述网络模型对象为所述弹性IP,所述第二配置信息中携带所述虚拟弹性IP的参数信息和第三绑定信息,所述第三绑定信息指示所述弹性IP和所述云网络绑定;
接收单元1200,还用于接收来自于所述云网络的API的创建请求,所述创建请求用于请求创建所述虚拟弹性IP;
发送单元1300,还用于向所述用户面功能网元控制模块发送第一请求消息,所述第一请求消息用于申请所述运营商网络的弹性IP地址;
接收单元1200,还用于接收来自于用户面功能网元控制模块的弹性IP地址申请成功的消息。
在以上各实现方式中,接收单元1200和发送单元1300也可以集成为一个收发单元,同时具备接收和发送的功能,这里不作限定。
在通信装置1000对应接收端的各实施例中,处理单元1100用于执行除了发送和接收的动作之外由相应模块内部实现的处理和/或操作。接收单元1200用于执行接收的动作,发送单元1300用于执行发送的动作。
可选地,上述装置实施例中所述的“相应模块”可以为本申请各实施例中的用户面功能网元控制模块(例如,UPF控制模块)、用户面功能网元(例如,UPF)、二层代理执行模块或三层网络模块。
参见图11,图11为本申请提供的通信装置的示意性结构图。如图11,通信装置10包括:一个或多个处理器11,一个或多个存储器12以及一个或多个通信接口13。处理器11用于控制通信接口13收发信号,存储器12用于存储计算机程序,处理器11用于从存储器12中调用并运行该计算机程序,以使得通信装置10执行本申请各方法实施例中由相应模块执行的处理。
例如,处理器11可以具有图10中所示的处理单元1100的功能,通信接口13可以具有图10中所示的接收单元1200和/或发送单元1300的功能。具体地,处理器11可以用于执行由通信装置内部执行的处理或操作,通信接口13用于执行由通信装置的发送和/或接收的操作。
其中,图11中器件(例如,处理器、存储器或通信接口)后面的虚线框表示该器件可以为一个以上。
可选地,图11中所示的通信装置可以为本申请各实施例中的UPF控制模块、UPF、二层代理执行模块或三层网络模块。
可选的,上述各装置实施例中的存储器与处理器可以是物理上相互独立的单元,或者,存储器也可以和处理器集成在一起,本文不作限定。
此外,本申请还提供一种计算机可读存储介质,所述计算机可读存储介质中存储有计算机指令,当计算机指令在计算机上运行时,使得本申请各方法实施例中由相应模块执行的操作和/或处理被执行。
此外,本申请还提供一种计算机程序产品,计算机程序产品包括计算机程序代码或指令,当计算机程序代码或指令在计算机上运行时,使得本申请各方法实施例中由相应模块执行的操作和/或处理被执行。
此外,本申请还提供一种芯片,所述芯片包括处理器,用于存储计算机程序的存储器 独立于芯片而设置,处理器用于执行存储器中存储的计算机程序,使得安装有所述芯片的通信设备执行任意一个方法实施例中由相应模块执行的操作和/或处理。
进一步地,所述芯片还可以包括通信接口。所述通信接口可以是输入/输出接口,也可以为接口电路等。进一步地,所述芯片还可以包括所述存储器。
可选地,上述处理器可以为一个或多个,所述存储器可以为一个或多个,所述存储器可以为一个或多个。
此外,本申请还提供一种通信装置(例如,可以为芯片或芯片系统),包括处理器和通信接口,所述通信接口用于接收(或称为输入)数据和/或信息,并将接收到的数据和/或信息传输至所述处理器,所述处理器处理所述数据和/或信息,以及,通信接口还用于输出(或称为输出)经处理器处理之后的数据和/或信息,以使得任意一个方法实施例中由相应模块执行的操作和/或处理被执行。
此外,本申请还提供一种通信装置,包括至少一个处理器,所述至少一个处理器与至少一个存储器耦合,所述至少一个处理器用于执行所述至少一个存储器中存储的计算机程序或指令,使得所述通信装置执行任意一个方法实施例中由相应模块执行的操作和/或处理。
此外,本申请还提供一种通信设备,包括处理器和存储器。可选地,还可以包括收发器。其中,存储器用于存储计算机程序,处理器用于调用并运行存储器中存储的计算机程序,并控制收发器收发信号,以使通信设备执行任意一个方法实施例中由相应模块执行的操作和/或处理。
此外,本申请提供一种通信系统架构,示例性地,该通信系统架构可以应用于数据中心的云网络。该通信系统架构具体可以参见图2中所示的系统架构100及其说明,这里不再赘述。
应理解,上述“相应模块”可以是指本申请方法实施例中的UPF控制模块、UPF、二层代理执行模块、三层网络模块中的任意一个模块。
本申请实施例中的存储器可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(read-only memory,ROM)、可编程只读存储器(programmable ROM,PROM)、可擦除可编程只读存储器(erasable PROM,EPROM)、电可擦除可编程只读存储器(electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(random access memory,RAM),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如静态随机存取存储器(static RAM,SRAM)、动态随机存取存储器(dynamic RAM,DRAM)、同步动态随机存取存储器(synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(double data rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(synchlink DRAM,SLDRAM)和直接内存总线随机存取存储器(direct rambus RAM,DRRAM)。应注意,本文描述的系统和方法的存储器旨在包括但不限于这些和任意其它适合类型的存储器。
上述实施例所提供的方法,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品可以包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令 时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(digital subscriber line,DSL))或无线(例如,红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。
为了便于清楚描述本申请实施例的技术方案,在本申请的实施例中,采用了“第一”、“第二”等编号对功能和作用基本相同的相同项或相似项进行区分。例如,第一配置信息和第二配置信息仅仅是为了区分不同的配置信息,并不对其先后顺序进行限定。本领域技术人员可以理解“第一”、“第二”等编号并不对数量和执行次序进行限定,并且“第一”、“第二”等字样也并不限定一定不同。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不予赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(read-only memory,ROM)、随机存取存储器(random access memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟 悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以权利要求的保护范围为准。

Claims (30)

  1. 一种通信系统架构,其特征在于,包括:
    二层网络模块,用于提供二层网络模型对象;
    三层网络模块,用于提供三层网络模型对象;
    四至七层网络模块,用于提供四至七层网络模型对象;
    用户面功能网元控制模块,用于接收来自于所述二层网络模块、所述三层网络模块或所述四至七层网络模块的配置信息,并将所述配置信息转换为运营商网络的用户面功能网元可识别的配置命令,以及将所述配置命令发送给所述用户面功能网元,其中,所述配置信息用于请求创建网络模型对象;
    其中,所述二层网络模块、所述三层网络模块或所述四至七层网络模块与所述用户面功能网元控制模块之间通过C-N接口通信;
    所述用户面功能网元控制模块与所述用户面功能网元之间通过C-U接口通信。
  2. 如权利要求1所述的通信系统架构,其特征在于,所述通信系统架构还包括:
    二层代理执行模块和软转发模块,
    其中,所述二层代理执行模块用于接收来自于所述二层网络模块的配置请求,并基于所述配置请求向所述软转发模块发送云网络的二层网络的流表和/或配置;
    所述软转发模块用于根据所述云网络的二层网络的流表和/或配置,实现所述云网络的二层网络的转发功能。
  3. 如权利要求1或2所述的系统架构,其特征在于,所述通信系统架构还包括:
    组网设备管理模块,
    其中,所述组网设备管理模块用于接收来自于所述二层网络模块的配置请求,并基于所述配置请求配置所述云网络的硬件交换机,以实现所述云网络的二层网络的转发功能。
  4. 一种数据中心的云网络和运营商网络互通的方法,其特征在于,所述数据中心部署有用户面功能网元控制模块,所述方法包括:
    所述用户面功能网元控制模块接收来自于云网络的第一配置信息,其中,所述第一配置信息用于运营商网络的二层网络的配置,所述第一配置信息中包含所述运营商网络的二层网络的流表和/或配置;
    所述用户面功能网元控制模块将所述第一配置信息转换为所述运营商网络的用户面功能网元可识别的第一配置命令;
    所述用户面功能网元控制模块将所述第一配置命令发送至所述用户面功能网元;
    所述用户面功能网元控制模块接收来自于所述云网络的第二配置信息,其中,所述第二配置信息用于网络模型对象的配置;
    所述用户面功能网元控制模块将所述第二配置信息转换为所述用户面功能网元可识别的第二配置命令;
    所述用户面功能网元控制模块将所述第二配置命令发送至所述用户面功能网元。
  5. 如权利要求4所述的方法,其特征在于,所述用户面功能网元控制模块通过C-N接口接收来自于所述云网络的所述第一配置信息和/或所述第二配置信息。
  6. 如权利要求4或5所述的方法,其特征在于,所述用户面功能网元控制模块通过C-U接口将所述第一配置命令和/或所述第二配置命令发送至所述用户面功能网元。
  7. 如权利要求4-6中任一项所述的方法,其特征在于,所述网络模型对象为如下一项或多项:
    网络、子网、端口、虚拟路由器、虚拟防火墙、弹性互联网协议IP以及虚拟负载均衡LB。
  8. 如权利要求7所述的方法,其特征在于,所述网络模型对象为所述虚拟路由器;
    所述方法还包括:
    所述用户面功能网元控制模块接收来自于所述云网络的第三配置信息,所述第三配置信息用于配置所述虚拟路由器,所述第三配置信息包括所述虚拟路由器的参数信息;
    所述用户面功能网元控制模块将所述第三配置信息中的所述虚拟路由器的参数信息转换为所述用户面功能网元可识别的第三配置命令;
    所述用户面功能网元控制模块将所述第三配置命令发送至所述用户面功能网元;
    以及,所述用户面功能网元控制模块将所述第二配置信息转换为所述运营商网络中的用户面功能网元可识别的第二配置命令,包括:
    所述第二配置信息包括第一绑定信息,所述第一绑定信息指示所述虚拟路由器和所述云网络绑定,所述用户面功能网元控制模块将所述第二配置信息中的所述第一绑定信息转换为所述运营商中的用户面功能网元可识别的所述第二配置命令。
  9. 如权利要求7所述的方法,其特征在于,所述网络模型对象为所述虚拟防火墙;
    所述用户面功能网元控制模块将所述第二配置信息转换为所述运营商网络中的用户面功能网元可识别的第二配置命令,包括:
    所述第二配置信息中携带所述虚拟防火墙的参数信息和第二绑定信息,所述第二绑定信息指示所述虚拟防火墙和已创建的虚拟路由器绑定,所述用户面功能网元控制模块将所述第二配置信息中的所述虚拟防火墙的参数信息和所述第二绑定信息转换为所述运营商中的用户面功能网元可识别的所述第二配置命令。
  10. 如权利要求7所述的方法,其特征在于,所述网络模型对象为所述弹性IP;
    所述方法还包括:
    所述用户面功能网元控制模块接收来自于所述云网络的第一请求消息,所述第一请求消息用于申请所述运营商网络的弹性IP地址;
    所述用户面功能网元控制模块向所述用户面功能网元发送第二请求消息,所述第二请求消息用于请求所述运营商网络的弹性IP地址;
    所述用户面功能网元控制模块接收来自于所述用户面功能网元的弹性IP地址列表信息,所述弹性IP地址列表信息包括一个或多个弹性IP地址;
    以及,所述用户面功能网元控制模块将所述第二配置信息转换为所述运营商网络中的用户面功能网元可识别的第二配置命令,包括:
    所述第二配置信息中携带所述弹性IP的参数信息和第三绑定信息,所述第三绑定信息指示所述弹性IP和所述云网络绑定,所述用户面功能网元控制模块将所述第二配置信息中的所述弹性IP的参数信息和所述第三绑定信息转换为所述运营商中的用户面功能网元可识别的所述第二配置命令。
  11. 如权利要求7所述的方法,其特征在于,所述网络模型对象为所述虚拟负载均衡;
    所述用户面功能网元控制模块将所述第二配置信息转换为所述运营商网络中的用户面功能网元可识别的第二配置命令,包括:
    所述第二配置信息中携带所述虚拟负载均衡的参数信息和第四绑定信息,所述第四绑定信息指示所述虚拟负载均衡和所述云网络绑定,所述用户面功能网元控制模块将所述第二配置信息中的所述虚拟负载均衡的参数信息和所述第四绑定信息转换为所述运营商中的用户面功能网元可识别的所述第二配置命令。
  12. 一种数据中心的云网络和运营商网络互通的方法,其特征在于,所述方法包括:
    运营商网络的用户面功能网元接收来自于用户面功能网元控制模块的第一配置命令,所述第一配置命令中包含所述运营商网络的二层网络的流表和/或配置;
    所述用户面功能网元根据所述第一配置命令配置所述运营商网络的二层网络;
    所述用户面功能网元接收来自于所述用户面功能网元控制模块的第二配置命令,所述第二配置命令用于网络模型对象的配置;
    所述用户面功能网元根据所述第二配置命令,配置所述网络模型对象。
  13. 如权利要求12所述的方法,其特征在于,所述用户面功能网元通过C-U接口接收来自于所述用户面功能网元控制模块的第一配置命令和/或所述第二配置命令。
  14. 如权利要求12或13所述的方法,其特征在于,所述网络模型对象为如下一项或多项:
    网络、子网、端口、虚拟路由器、虚拟防火墙、弹性互联网协议IP以及虚拟负载均衡LB。
  15. 如权利要求14所述的方法,其特征在于,所述网络模型对象为所述虚拟路由器,所述第二配置命令中携带第一绑定信息,所述第一绑定信息指示所述虚拟路由器和所述云网络绑定;
    所述方法还包括:
    所述用户面功能网元接收来自于所述用户面功能网元控制模块的第三配置命令,所述第三配置命令中包含所述虚拟路由器的参数信息,所述第三配置命令用于配置所述虚拟路由器;
    所述用户面功能网元根据所述第三配置命令配置所述虚拟路由器;
    所述用户面功能网元根据所述第二配置命令配置所述网络模型对象,包括:
    所述用户面功能网元根据所述第二配置命令中的第一绑定信息,配置所述虚拟路由器。
  16. 如权利要求14所述的方法,其特征在于,所述网络模型对象为所述虚拟防火墙,所述第二配置信息中携带所述虚拟防火墙的参数信息和第二绑定信息,所述第二绑定信息指示所述虚拟防火墙和已创建的虚拟路由器绑定,其中,所述虚拟防火墙属于三层网络模型对象;
    所述用户面功能网元根据所述第二配置命令配置所述网络模型对象,包括:
    所述用户面功能网元根据所述第二配置命令,配置所述虚拟防火墙。
  17. 如权利要求14所述的方法,其特征在于,所述网络模型对象为所述弹性IP,所述第二配置信息中携带所述弹性IP的参数信息和第三绑定信息,所述第三绑定信息指示所述弹性IP和所述云网络绑定,其中,所述弹性IP属于三层网络模型对象;
    所述用户面功能网元根据所述第二配置命令配置所述网络模型对象,包括:
    所述用户面功能网元根据所述第二配置命令配置所述弹性IP;
    以及,所述方法还包括:
    所述用户面功能网元接收来自于所述用户面功能网元控制模块的申请弹性IP地址的第二请求消息,所述请求消息用于申请所述运营商网络的弹性IP地址;
    所述用户面功能网元向所述用户面功能网元控制模块发送弹性IP地址列表信息,所述弹性IP地址列表信息包括一个或多个弹性IP地址。
  18. 如权利要求14所述的方法,其特征在于,所述网络模型对象为所述虚拟负载均衡,所述第二配置信息中携带所述虚拟负载均衡的参数信息和第四绑定信息,所述第四绑定信息指示所述虚拟负载均衡和所述云网络绑定,其中,所述虚拟负载均衡属于四至七层网络模型对象;
    所述用户面功能网元根据所述第二配置命令配置所述网络模型对象,包括:
    所述用户面功能网元根据所述第二配置命令配置所述虚拟负载均衡。
  19. 一种数据中心的云网络和运营商网络互通的方法,其特征在于,所述云网络部署二层网络模块和二层代理执行模块,所述方法包括:
    所述二层代理执行模块接收来自于所述二层网络模块的配置请求,所述配置请求用于请求配置所述运营商网络的二层网络和所述云网络的二层网络;
    所述二层代理执行模块基于所述配置请求,向用户面功能网元控制模块发送第一配置信息,其中,所述第一配置信息用于所述运营商网络的二层网络的配置,所述第一配置信息包括所述运营商网络的二层网络的流表和/或配置;
    所述二层网络代理模块基于所述配置请求,配置所述云网络的二层网络。
  20. 如权利要求19所述的方法,其特征在于,所述二层代理执行模块通过C-N接口向所述用户面功能网元控制模块发送所述第一配置信息。
  21. 如权利要求19或20所述的方法,其特征在于,所述云网络还包括软转发模块和/或组网设备管理模块,
    所述二层代理执行模块基于所述配置请求,配置所述云网络的二层网络,包括:
    所述二层代理执行模块基于所述配置请求,向所述软转发模块发送所述云网络的二层网络的流表和/或配置,以完成所述云网络的二层网络的配置;或者,
    所述二层代理执行模块基于所述配置请求,向所述组网设备管理模块发送所述云网络的二层网络的流表和/或配置,以由所述组网设备管理模块配置所述云网络的硬件交换机,以完成所述云网络的二层网络的配置。
  22. 一种数据中心的云网络和运营商网络互通的方法,其特征在于,所述云网络部署有三层网络模块,所述方法包括:
    所述三层网络模块接收所述云网络的虚拟机的上线的通知;
    所述三层网络模块基于所述虚拟机的上线的通知,向用户面功能网元控制模块发送第二配置信息,所述第二配置信息用于在所述云网络中配置网络模型对象。
  23. 如权利要求22所述的方法,其特征在于,所述网络模型对象为如下一项或多项:
    虚拟路由器、虚拟防火墙以及弹性互联网协议IP。
  24. 如权利要求22或23所述的方法,其特征在于,所述网络模型对象为所述虚拟路 由器,所述第二配置信息中携带第一绑定信息,所述第一绑定信息指示所述虚拟路由器和所述云网络绑定,所述方法还包括:
    所述三层网络模块接收来自于所述云网络的应用程序接口API的创建请求,所述创建请求用于请求创建所述虚拟路由器;
    所述三层网络模块向所述用户面功能网元控制模块发送第三配置信息,所述第三配置信息包括所述虚拟路由器的参数信息,所述第三配置信息用于所述虚拟路由器的配置。
  25. 如权利要求22或23所述的方法,其特征在于,所述网络模型对象为所述弹性IP,所述第二配置信息中携带所述虚拟弹性IP的参数信息和第三绑定信息,所述第三绑定信息指示所述弹性IP和所述云网络绑定,所述方法还包括:
    所述三层网络模块接收来自于所述云网络的API的创建请求,所述创建请求用于请求创建所述虚拟弹性IP;
    所述三层网络模块向所述用户面功能网元控制模块发送第一请求消息,所述第一请求消息用于申请所述运营商网络的弹性IP地址。
  26. 一种通信装置,其特征在于,包括至少一个处理器,所述至少一个处理器与至少一个存储器耦合,所述至少一个处理器用于执行所述至少一个存储器中存储的计算机程序或指令,以使所述通信装置执行如权利要求4-25中任一项所述的方法。
  27. 一种芯片,其特征在于,包括处理器和通信接口,所述通信接口用于接收数据和/或信息,并将接收到的数据和/或信息传输至所述处理器,所述处理器处理所述数据和/或信息,以执行如权利要求4-25中任一项所述的方法。
  28. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质中存储有计算机指令,当计算机指令在计算机上运行时,使得如权利要求4-25中任一项所述的方法。
  29. 一种计算机程序产品,其特征在于,所述计算机程序产品包括计算机程序代码,当所述计算机程序代码在计算机上运行时,使得如权利要求4-25中任一项所述的方法。
  30. 一种通信装置,用于执行如权利要求4-25中任一项所述的方法。
PCT/CN2022/107946 2021-08-13 2022-07-26 数据中心的云网络和运营商网络互通的方法和通信装置 WO2023016248A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110928948.3A CN115941455A (zh) 2021-08-13 2021-08-13 数据中心的云网络和运营商网络互通的方法和通信装置
CN202110928948.3 2021-08-13

Publications (1)

Publication Number Publication Date
WO2023016248A1 true WO2023016248A1 (zh) 2023-02-16

Family

ID=85199858

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/107946 WO2023016248A1 (zh) 2021-08-13 2022-07-26 数据中心的云网络和运营商网络互通的方法和通信装置

Country Status (2)

Country Link
CN (1) CN115941455A (zh)
WO (1) WO2023016248A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116095080A (zh) * 2023-04-06 2023-05-09 深圳竹云科技股份有限公司 跨云数据互联网络通信方法、装置及系统

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102726021A (zh) * 2009-05-28 2012-10-10 微软公司 灵活的数据中心网络体系结构
CN104144143A (zh) * 2013-05-08 2014-11-12 华为技术有限公司 网络建立的方法及控制设备
CN104521196A (zh) * 2012-06-06 2015-04-15 瞻博网络公司 针对虚拟网络分组流的物理路径确定
CN110769039A (zh) * 2019-10-09 2020-02-07 腾讯科技(深圳)有限公司 资源调度方法及装置、电子设备和计算机可读存储介质
US20200169513A1 (en) * 2017-09-29 2020-05-28 Fungible, Inc. Fabric control protocol for data center networks with packet spraying over multiple alternate data paths

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102726021A (zh) * 2009-05-28 2012-10-10 微软公司 灵活的数据中心网络体系结构
CN104521196A (zh) * 2012-06-06 2015-04-15 瞻博网络公司 针对虚拟网络分组流的物理路径确定
CN104144143A (zh) * 2013-05-08 2014-11-12 华为技术有限公司 网络建立的方法及控制设备
US20200169513A1 (en) * 2017-09-29 2020-05-28 Fungible, Inc. Fabric control protocol for data center networks with packet spraying over multiple alternate data paths
CN110769039A (zh) * 2019-10-09 2020-02-07 腾讯科技(深圳)有限公司 资源调度方法及装置、电子设备和计算机可读存储介质

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116095080A (zh) * 2023-04-06 2023-05-09 深圳竹云科技股份有限公司 跨云数据互联网络通信方法、装置及系统
CN116095080B (zh) * 2023-04-06 2023-06-09 深圳竹云科技股份有限公司 跨云数据互联网络通信方法、装置及系统

Also Published As

Publication number Publication date
CN115941455A (zh) 2023-04-07

Similar Documents

Publication Publication Date Title
CA3106407C (en) Multi-cloud connectivity using srv6 and bgp
US9876756B2 (en) Network access method and device for equipment
US9979605B2 (en) Virtualization mapping
CN106953788B (zh) 一种虚拟网络控制器及控制方法
US9692696B2 (en) Managing data flows in overlay networks
US8484353B1 (en) Resource placement templates for virtual networks
CN103997414B (zh) 生成配置信息的方法和网络控制单元
CN105850102B (zh) 服务链的控制
KR101478475B1 (ko) 컴퓨터 시스템 및 컴퓨터 시스템에 있어서의 통신 방법
US20150124823A1 (en) Tenant dhcp in an overlay network
EP2439637A1 (en) Method and system of providing access to a virtual machine distributed in a hybrid cloud network
Alshaer An overview of network virtualization and cloud network as a service
WO2016180181A1 (zh) 业务功能的部署方法及装置
WO2018093615A1 (en) Flow sate transfer for live migration of virtual machine
CA2968964A1 (en) Source ip address transparency systems and methods
EP3588875B1 (en) Web services across virtual routing and forwarding
WO2015192563A1 (zh) 一种实现负载均衡的方法、装置及负载均衡服务系统
WO2018019299A1 (zh) 一种虚拟宽带接入方法、控制器和系统
CN103595551B (zh) 基于mqc实现网络虚拟化的网络管理方法和装置
WO2023016248A1 (zh) 数据中心的云网络和运营商网络互通的方法和通信装置
JP2023546775A (ja) インライン・トランスペアレント・コンピュータ・ネットワーキングデバイスの仮想化のための方法およびシステム
WO2024002101A1 (zh) 报文传输方法、装置、相关设备及存储介质
WO2024037619A1 (zh) 一种基于云计算技术的虚拟实例创建方法和云管理平台
CN117478457A (zh) 数据转发方法、装置、通信系统、存储介质及计算机设备
CN118200131A (zh) 实现多网络平面eip功能的方法、系统及sdn控制器

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22855231

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE