WO2023179457A1 - Procédé, appareil et système d'identification de la connexion de service et moyen de stockage - Google Patents

Procédé, appareil et système d'identification de la connexion de service et moyen de stockage Download PDF

Info

Publication number
WO2023179457A1
WO2023179457A1 PCT/CN2023/081997 CN2023081997W WO2023179457A1 WO 2023179457 A1 WO2023179457 A1 WO 2023179457A1 CN 2023081997 W CN2023081997 W CN 2023081997W WO 2023179457 A1 WO2023179457 A1 WO 2023179457A1
Authority
WO
WIPO (PCT)
Prior art keywords
communication device
service
fid
node information
route
Prior art date
Application number
PCT/CN2023/081997
Other languages
English (en)
Chinese (zh)
Inventor
陈新隽
王海波
闫朝阳
胡志波
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from CN202210575954.XA external-priority patent/CN116828024A/zh
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2023179457A1 publication Critical patent/WO2023179457A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions

Definitions

  • the present application relates to the field of communication technology, and in particular to methods, devices, systems and storage media for identifying business connections.
  • one or more service connections can be established between any two communication devices in the communication network, and the service connections can be used to transmit service flows. Therefore, by generating a flow identifier corresponding to the service connection, traffic management of the service flow transmitted by the service connection can be performed.
  • This application provides a method, device, system and storage medium for identifying a business connection, which automatically generates a flow identifier corresponding to the business connection through the route used to establish the business connection.
  • a method for identifying a service connection includes: a first communication device receiving a first route published by a second communication device, the first route being used to establish a connection between the first communication device and the second communication device.
  • the first communication device generates the service based on the node information of the first communication device and the node information of the second communication device carried in the received first route.
  • Connect the corresponding first flow identifier (FID) The first FID is used to identify the first service flow sent by the first communication device to the second communication device.
  • the first FID includes node information of the first communication device and the first communication device. 2. Node information of the communication device.
  • this method In the process of establishing a business connection, this method directly generates an FID corresponding to the business connection based on the route used to establish the business connection, and then uses the FID to identify the business flow transmitted by the business connection.
  • this application does not require static configuration, so the operation of generating the FID is simpler, the workload is smaller, and the generation efficiency is higher.
  • the FID since the FID is generated based on the route for establishing the service connection, the FID can be used not only to identify the service flow transmitted by the service connection, but also to identify the service connection, providing an effective way to identify the service connection.
  • the service connection refers to a connection established between two communication devices for transmitting services.
  • the service connection may also refer to a connection established between two communication devices for transmitting services.
  • a connection of a sub-service a connection can also be called a connection channel. That is to say, the service connection may be a connection channel used to transmit all services between two communication devices, or the service connection may be a connection channel used to transmit one service between two communication devices, or the service connection may be a connection channel used to transmit one service between two communication devices.
  • a service connection is a connection channel used to transmit a sub-service between two communication devices.
  • the first communication device can send the first service flow to the second communication device, and the second communication device can also send the second service flow to the first communication device. Therefore, the The first FID is not only used for identification For the first service flow sent by the first communication device to the second communication device, the first FID may also be used to identify the second service flow sent by the second communication device to the first communication device.
  • the communication device mentioned in this application can be a network device such as a switch or router, or a part of the network device, such as a single board or line card on the network device, or a functional module on the network device. , it can also be a chip used to implement the method of the present application, which is not limited by this application.
  • the transceiver unit used to implement the method may be, for example, an interface circuit of the chip, and the processing unit may be a processing circuit with a processing function in the chip. Connection methods between communication devices include but are not limited to direct connection through Ethernet cables or optical cables.
  • the service connection is a virtual private network (VPN)
  • the first route further includes an identifier of the VPN
  • the first FID further includes an identifier of the VPN.
  • the first service flow identified by the first FID is all the service flows of the VPN transmitted between the first communication device and the second communication device, so that the first FID can identify the VPN.
  • the service connection is a sub-service connection of the VPN, and the sub-service connection is used to transmit the sub-service of the VPN.
  • the first route also includes an identifier of the VPN; then the generated first route
  • the FID also includes the identifier of the VPN and the identifier of the sub-service.
  • the first service flow identified by the first FID is all service flows corresponding to the sub-services of the VPN transmitted between the first communication device and the second communication device, so that the method can identify more fine-grained services. flow.
  • the identifier of the sub-service may be carried in the first route, so that the first communication device obtains the identifier of the sub-service based on the received first route.
  • the first communication device locally stores VPN configuration information, the first communication device determines the VPN based on the received first route, and then obtains the identifier of the sub-service corresponding to the VPN through the locally stored VPN configuration information without going through the first
  • the route carries the identifier of the sub-service, which reduces the amount of data transmitted by the route.
  • the sub-service can be a sub-service of any service type, and the identifier of the sub-service can be the coded value of the differentiated services code point (DSCP), or it can be used to indicate the service type of the sub-service. logo.
  • sub-services can be divided into voice sub-services, video sub-services or text sub-services according to service types. Therefore, applying the method of this application can generate FIDs respectively corresponding to the voice sub-service, video sub-service or text sub-service of the same VPN. Based on the FID of different sub-services, the traffic management of the business flow of each sub-service can be performed respectively. This enables differentiated management of the traffic of different sub-services.
  • This method can generate different FIDs based on different granularities of business connections, so that the generated FIDs can identify business flows of different granularities. Therefore, the identification method of this business connection has high flexibility.
  • the address of the first communication device is a first Internet protocol version 6 (IPv6) address
  • the first IPv6 address includes node information of the first communication device.
  • the first The route includes a second IPv6 address of the second communication device, the second IPv6 address including node information of the second communication device.
  • the node information of the first communication device is the entire content of the first IPv6 address
  • the node information of the second communication device is the entire content of the second IPv6 address
  • the node information of the first communication device is the entire content of the second IPv6 address
  • the node information is part of the first IPv6 address used to identify the first communication device
  • the node information of the second communication device is part of the second IPv6 address used to identify the second communication device.
  • the second IPv6 address included in the first route is a second SRv6 VPN segment identifier (SID).
  • the second SRv6 VPN SID also includes the identifier of the VPN;
  • the second SRv6 VPN SID also includes Including the identifier of the VPN and the identifier of the sub-service of the VPN.
  • the location identifier (locator) field in the second SRv6 VPN SID is used to indicate the node information of the second communication device, and the function (function) field in the SRv6 VPN SID is used to indicate the identity of the VPN.
  • the parameters (arguments, args) field in the SRv6 VPN SID is used to indicate the identity of the VPN sub-service.
  • the first route includes a VXLAN network identifier (VXLAN network identifier, VNI), and the VNI is used to identify the VXLAN tunnel. If the VXLAN tunnel is associated with a VPN, the VNI can also be used to indicate the VPN.
  • VXLAN network identifier VXLAN network identifier
  • This method can be flexibly applied to scenarios such as SRv6 or VXLAN, making this method of identifying business connections broadly versatile.
  • the method further includes: the first communication device sends a first service message to the second communication device, and the first service message belongs to the first service flow, The first service message includes the first FID.
  • the node receiving the first service message can identify the first service flow.
  • the method further includes: the first communication device performs traffic management on the first service flow based on the first FID.
  • traffic management can include but is not limited to traffic detection, traffic statistics, traffic visualization, traffic connection or traffic service quality control, etc.
  • FIDs corresponding to different business connections can be generated. Through the FIDs corresponding to different business connections, traffic management of different business flows can be achieved, the accuracy of traffic management can be improved, and the differentiated management of different business connections can be satisfied. need.
  • the first communication device will also publish a second route to the second communication device.
  • the second route is used to establish a business connection between the first communication device and the second communication device.
  • the second route includes Node information of the first communication device.
  • the first communication device also generates a second FID corresponding to the service connection based on the node information of the first communication device and the node information of the second communication device carried in the first route.
  • the second FID Used to identify the second service flow sent by the second communication device to the first communication device, the second FID also includes node information of the first communication device and node information of the second communication device. Since the first communication device can not only generate the first FID corresponding to the service connection, but also can generate the second FID corresponding to the service connection, the first FID and the second FID can respectively identify the two transmission directions corresponding to the same service connection.
  • Business flow enables more detailed traffic management of the business flow transmitted by the business connection.
  • the method further includes: the first communication device receiving a second service message sent by the second communication device, and the second service message belongs to the second service flow, the second service packet includes the second FID.
  • the first communication device can quickly identify the second service flow according to the second FID in the received second service message.
  • the method further includes: the first communication device performs traffic management on the second service flow based on the second FID.
  • the first communication device respectively performs traffic management on the first service flow based on the first FID, and performs traffic management on the second service flow based on the second FID, and the first service flow and the second service flow are services of the same service connection in different transmission directions. Therefore, this method can meet the differentiated traffic management requirements of business flows in different transmission directions for the same business connection.
  • the method further includes: the first communication device connects Receive a second service message sent by the second communication device, the second service message belongs to the second service flow, the second service message includes node information of the second communication device; the first communication device is based on the node information of the second communication device The mapping relationship with the second FID determines the second FID, and traffic management is performed on the second service flow based on the second FID.
  • This application does not limit the location where the first communication device saves the mapping relationship.
  • the mapping relationship between the node information of the second communication device and the second FID may be saved on the first communication device.
  • the first communication device saves the mapping relationship between the node information of the second communication device and the second FID through virtual routing forwarding (VRF).
  • VRF virtual routing forwarding
  • multiple service connections can be established between two different communication devices, or multiple service connections corresponding to multiple services can be established between two communication devices.
  • the method provided by this application also includes: the first communication device receives a third route published by the second communication device, and the third route is used to establish the first communication device
  • the second service connection with the second communication device includes the node information of the second communication device; the first communication device carries the second route according to the node information of the first communication device and the received third route.
  • the node information of the communication device generates a third FID corresponding to the second service connection.
  • the third FID is used to identify the third service flow sent by the first communication device to the second communication device.
  • the third FID includes the first communication device. node information and node information of the second communication device.
  • the first service connection established based on the first route is a first sub-service connection of the first VPN
  • the second service connection established based on the third route is a second sub-service connection of the first VPN.
  • Service connection, the second sub-service connection is used to transmit the second sub-service of the first VPN
  • the third route also includes the identifier of the first VPN
  • the generated third FID also includes the identifier of the first VPN and the identifier of the second sub-service.
  • the third service flow identified by the third FID is all service flows of the second sub-service of the first VPN transmitted between the first communication device and the second communication device.
  • the FID and the third FID can implement traffic management on the service flows of the first sub-service and the second sub-service of the same first VPN.
  • This application does not limit the number of multiple service connections established between the first communication device and the second communication device.
  • the first communication device and the second communication device can also establish The multiple service connections may be service flows used to transmit different sub-services of the same service.
  • multiple service connections established between the first communication device and the second communication device can also be used to transmit service flows of different services.
  • the first service connection established based on the first route is In the first VPN
  • the second service connection established based on the third route is the second VPN.
  • the third route also includes the identifier of the second VPN;
  • the generated third FID also includes the identifier of the second VPN.
  • the third service flow identified by the third FID is all the service flows of the second VPN transmitted between the first communication device and the second communication device.
  • not only all the service flows of the first VPN but also all the service flows of the second VPN can be transmitted between the first communication device and the second communication device, that is, between the first communication device and the second communication device.
  • Multiple business connections are established between each other.
  • the multiple business connections transmit business flows of different services. Traffic management of the business flows of different services can be implemented through different FIDs.
  • the second service connection established based on the third route is a sub-service connection of the second VPN, and the sub-service connection of the second VPN is used to transmit the sub-service of the second VPN.
  • the third route also includes the identifier of the second VPN; the generated third FID also includes the identifier of the second VPN and the identifier of the sub-service of the second VPN.
  • the third service flow identified by the third FID is all service flows of the sub-services of the second VPN transmitted between the first communication device and the second communication device.
  • the first communication device and the second communication device can not only transmit the first VPN All business flows can also transmit all business flows of sub-services of the second VPN, that is, multiple service connections are established between the first communication device and the second communication device, and the multiple service connections transmit different services or different services.
  • the business flow of the sub-business is to say, the first communication device and the second communication device can not only transmit the first VPN All business flows can also transmit all business flows of sub-services of the second VPN, that is, multiple service connections are established between the first communication device and the second communication device, and the multiple service connections transmit different services or different services.
  • the business flow of the sub-business is to say, the first communication device and the second communication device can not only transmit the first VPN All business flows can also transmit all business flows of sub-services of the second VPN, that is, multiple service connections are established between the first communication device and the second communication device, and the multiple service connections transmit different services or different services.
  • the business flow of the sub-business is to say, the first communication device and the second communication device can not only transmit the
  • the first communication device receives a fourth route published by the third communication device.
  • the fourth route is used to establish a third service connection between the first communication device and the third communication device.
  • the fourth route including node information of the third communication device; the first communication device generates a fourth FID corresponding to the third service connection according to the node information of the first communication device and the node information of the third communication device carried in the fourth route, and the fourth The FID is used to identify the fourth service flow sent by the first communication device to the third communication device.
  • the fourth FID includes node information of the first communication device and node information of the third communication device.
  • the first communication device can not only establish a service connection with the second communication device, but also can establish a service connection with the third communication device, that is, the same communication device can establish a service connection with different communication devices.
  • Establish a business connection and automatically generate the FID corresponding to the business connection during the process of establishing the business connection.
  • the third service connection established based on the fourth route is a third VPN
  • the fourth route further includes an identifier of the third VPN
  • the fourth FID further includes an identifier of the third VPN.
  • the fourth service flow identified by the fourth FID is all the service flows of the third VPN transmitted between the first communication device and the third communication device.
  • the third service connection is a sub-service connection of the third VPN
  • the fourth route also includes the identifier of the third VPN
  • the fourth FID also includes the identifier of the third VPN and the third VPN identifier.
  • the fourth service flow identified by the fourth FID is all service flows of the sub-services of the third VPN transmitted between the first communication device and the third communication device.
  • the third VPN is the same as the above-mentioned first VPN, or the third VPN is different from the above-mentioned first VPN.
  • corresponding FIDs can be generated based on business connections of different granularities established between two communication devices, so that based on the FIDs corresponding to business connections of different granularities, the information transmitted by the business connections can be realized.
  • Business flows are managed at different granularities, which improves the flexibility of traffic management.
  • a method for identifying a business connection includes: a first communication device receiving a first route published by a second communication device, and the first route is used to establish a connection between the first communication device and the second communication device.
  • business connection the first route includes the node information of the second communication device;
  • the first communication device generates the first FID corresponding to the business connection based on the node information of the first communication device and the node information of the second communication device carried in the first route , the first FID is used to identify the first service flow sent by the first communication device to the second communication device, and the first FID includes node information of the first communication device and node information of the second communication device;
  • the second communication device receives the second route published by the first communication device.
  • the second route is used to establish a business connection.
  • the second route includes the node information of the first communication device.
  • the second communication device responds to the node information of the second communication device and the second communication device.
  • the node information of the first communication device carried in the second route generates the first FID.
  • the service connection is a VPN
  • the first route further includes an identifier of the VPN
  • the second route further includes an identifier of the VPN
  • the first FID further includes the The logo of the VPN.
  • the service connection is a sub-service connection of the VPN
  • the sub-service connection is used to transmit the sub-service of the VPN.
  • the first route also includes an identifier of the VPN
  • the The second route also includes the identifier of the VPN
  • the first FID also includes the identifier of the VPN and the identifier of the sub-service.
  • the first route further includes an identifier of the sub-service
  • the second route further includes an identifier of the sub-service
  • the address of the first communication device is a first IPv6 address
  • the first IPv6 address includes node information of the first communication device
  • the first route includes the second the second IPv6 address of the communication device
  • the second IPv6 address includes node information of the second communication device
  • the second route includes the first IPv6 address of the first communication device.
  • the second IPv6 address is a second SRv6 VPN SID
  • the first IPv6 address is a first SRv6 VPN SID
  • the location identification field of the second SRv6 VPN SID is used to indicate the node information of the second communication device, and the function field of the second SRv6 VPN SID is used to indicate the identification of the VPN;
  • the location identification field of the first SRv6 VPN SID is used to indicate the node information of the first communication device, and the function field of the first SRv6 VPN SID is used to indicate the identification of the VPN.
  • the parameter field of the second SRv6 VPN SID is used to indicate the identity of the sub-service of the VPN
  • the parameter field of the first SRv6 VPN SID is used to indicate the sub-service of the VPN. logo.
  • the first route includes a VNI
  • the second route includes a VNI
  • the method further includes: the first communication device generating a second FID corresponding to the service connection based on the node information of the first communication device and the node information of the second communication device carried in the first route.
  • the second FID is used to identify the second service flow sent by the second communication device to the first communication device, and the second FID includes node information of the first communication device and node information of the second communication device;
  • the second communication device generates a second FID based on the node information of the second communication device and the node information of the first communication device carried in the second route.
  • the method further includes: the first communication device sending a first service message to the second communication device, and the first communication device The service packet belongs to the first service flow, and the first service packet includes the first FID;
  • the method further includes: the second communication device receiving the first service message sent by the first communication device.
  • the method further includes: the second communication device sends a second service message to the first communication device, and the second communication device The service message belongs to the second service flow, and the second service message includes the second FID;
  • the method further includes: the first communication device receiving a second service message sent by the second communication device.
  • the first communication device after the first communication device generates the first FID corresponding to the service connection based on the node information of the first communication device and the node information of the second communication device carried in the first route, it further includes: a first The communication device performs traffic management on the first service flow based on the first FID;
  • the method further includes: the second communication device performs traffic flow on the first service flow based on the first FID. manage.
  • the first communication device after the first communication device generates the second FID corresponding to the service connection based on the node information of the first communication device and the node information of the second communication device carried in the first route, it further includes: a first The communication device performs traffic management on the second service flow based on the second FID;
  • the method further includes: the second communication device performs traffic on the second service flow based on the second FID. manage.
  • the method further includes: the first communication device receives a second service message sent by the second communication device, and the first communication device The second service message belongs to the second service flow, the second service message includes node information of the second communication device; the first communication device determines the second FID based on the mapping relationship between the node information of the second communication device and the second FID. FID, performing traffic management on the second service flow based on the second FID.
  • the method further includes: the second communication device receives the first service message sent by the first communication device, and the second communication device A service message belongs to the first service flow, and the first service message includes node information of the first communication device; the second communication device is based on the node information of the first communication device and the third communication device.
  • a mapping relationship between FIDs determines the first FID, and traffic management is performed on the first service flow based on the first FID.
  • a communication device which device includes:
  • a transceiver module configured to perform reception and/or transmission related operations performed by the first communication device in the first aspect or any possible implementation of the first aspect;
  • a processing module configured to perform other operations other than the receiving and/or sending related operations performed by the first communication device in the first aspect or any possible implementation manner of the first aspect.
  • the transceiver module includes a receiving module and/or a sending module.
  • the receiving module is used to perform reception-related operations
  • the sending module is used to perform sending-related operations.
  • the transceiver module is configured to receive a first route published by a second communication device.
  • the first route is used to establish a business connection between the first communication device and the second communication device.
  • the first route includes Node information of the second communication device;
  • a processing module configured to generate a first FID corresponding to the service connection based on the node information of the first communication device and the node information of the second communication device carried in the first route.
  • the first FID is used to identify the first communication device to the second communication device.
  • the first service flow sent by the device, the first FID includes node information of the first communication device and node information of the second communication device.
  • the service connection is a VPN
  • the first route also includes the identifier of the VPN
  • the first FID further includes the identifier of the VPN.
  • the service connection is a sub-service connection of the VPN.
  • the sub-service connection is used to transmit the sub-service of the VPN.
  • the first route also includes the identifier of the VPN.
  • the first FID also includes the identifier of the VPN and the identifier of the sub-service. .
  • the first route also includes an identifier of the sub-service.
  • the address of the first communication device is a first IPv6 address
  • the first IPv6 address includes node information of the first communication device
  • the first route includes the second IPv6 address of the second communication device
  • the second The IPv6 address includes node information of the second communication device.
  • the second IPv6 address is an SRv6 VPN SID.
  • the location identification field of the SRv6 VPN SID is used to indicate the node information of the second communication device, and the function field of the SRv6 VPN SID is used to indicate the identity of the VPN.
  • the parameter field of the SRv6 VPN SID is used to indicate the identity of the VPN sub-service.
  • the first route includes a VNI.
  • the transceiver module is also configured to send a first service message to the second communication device, where the first service message belongs to the first service flow, and the first service message includes the first FID.
  • the processing module is also configured to perform traffic management on the first service flow based on the first FID.
  • the processing module is further configured to generate a second FID corresponding to the service connection based on the node information of the first communication device and the node information of the second communication device carried in the first route.
  • the second FID is Yu Logo Second Communications
  • the second service flow sent by the device to the first communication device, the second FID includes node information of the first communication device and node information of the second communication device.
  • the transceiver module is also configured to receive a second service message sent by the second communication device.
  • the second service message belongs to the second service flow, and the second service message includes the second FID.
  • the processing module is also configured to perform traffic management on the second service flow based on the second FID.
  • the transceiver module is also configured to receive a second service message sent by the second communication device.
  • the second service message belongs to the second service flow, and the second service message includes the second service message of the second communication device. Node information;
  • the processing module is also configured to determine the second FID based on the mapping relationship between the node information of the second communication device and the second FID, and perform traffic management on the second service flow based on the second FID.
  • a communication system including a first communication device and a second communication device;
  • a first communication device configured to perform operations performed by the first communication device according to any one of the second aspects
  • the second communication device is configured to perform the operations performed by the second communication device according to any one of the second aspects.
  • a communication device in a fifth aspect, includes: a processor, the processor is coupled to a memory, and at least one program instruction or code is stored in the memory.
  • the at least one program instruction or code is composed of the The processor loads and executes, so that the communication device implements the above first aspect or the method in any possible implementation manner of the first aspect, or allows the communication device to implement the above second aspect or the second aspect. method in any possible implementation.
  • processors there are one or more processors and one or more memories.
  • the memory may be integrated with the processor, or the memory may be provided separately from the processor.
  • the memory can be a non-transitory memory, such as a read-only memory (ROM), which can be integrated on the same chip as the processor, or can be set in different On the chip, the embodiment of the present application does not limit the type of memory and the arrangement of the memory and the processor.
  • ROM read-only memory
  • a communication device which includes a transceiver, a memory, and a processor.
  • the transceiver, the memory and the processor communicate with each other through an internal connection path
  • the memory is used to store instructions
  • the processor is used to execute the instructions stored in the memory to control the transceiver to receive signals and control the transceiver to send signals.
  • the communication device is caused to execute the method in the first aspect or any possible implementation of the first aspect.
  • a computer-readable storage medium is provided. At least one instruction is stored in the storage medium, and the instruction is loaded and executed by a processor, so that the computer implements any of the above-mentioned identification methods of business connections. .
  • a computer program includes: computer program code.
  • the computer program code When the computer program code is run by a computer, it causes the computer to perform the methods in the above aspects.
  • a chip including a processor configured to call from a memory and run instructions stored in the memory, so that a communication device equipped with the chip executes the methods in the above aspects.
  • another chip including: a communication interface and a processor, based on the communication interface and the processor, executing the above aspects and the method in any possible implementation manner.
  • the communication interface is used to perform receiving and/or sending related operations, and the processor is used to perform other operations other than sending and receiving operations.
  • the communication interface may be, for example, an interface circuit, and the processor may be, for example, a processing circuit.
  • the chip further includes a memory, the communication interface, the processor and the memory are connected through internal connection paths, and the processor is used to execute the code in the memory. Said code When executed, the processor is configured to perform the methods in the above aspects.
  • Figure 1 is a schematic diagram of the implementation environment of a method for identifying business connections provided by an embodiment of the present application
  • Figure 2 is a schematic diagram of the implementation environment of another method for identifying business connections provided by an embodiment of the present application
  • FIG. 3 is a schematic structural diagram of a SID provided by an embodiment of the present application.
  • Figure 4 is an interactive schematic diagram of a method for identifying service connections provided by an embodiment of the present application
  • Figure 5 is a schematic diagram of a route publishing process provided by an embodiment of the present application.
  • Figure 6 is a schematic diagram of a structured SID provided by an embodiment of the present application.
  • Figure 7 is a schematic diagram of a message forwarding process provided by an embodiment of the present application.
  • Figure 8 is a flow chart of a method for identifying service connections provided by an embodiment of the present application.
  • Figure 9 is a schematic diagram of the identification result of a service connection provided by the embodiment of the present application.
  • Figure 10 is a schematic diagram of the identification result of another service connection provided by the embodiment of the present application.
  • Figure 11 is a schematic diagram of the identification result of another service connection provided by the embodiment of the present application.
  • Figure 12 is a schematic diagram of the identification result of another service connection provided by the embodiment of the present application.
  • Figure 13 is a schematic diagram of a communication device provided by an embodiment of the present application.
  • Figure 14 is a schematic structural diagram of a network device provided by an embodiment of the present application.
  • Figure 15 is a schematic structural diagram of another network device provided by an embodiment of the present application.
  • the service connection refers to a connection established between two communication devices for transmitting services.
  • the service connection may also refer to a connection established between two communication devices for transmitting a sub-service.
  • the connection also called a connection channel.
  • the service connection may be a connection channel used to transmit all services between two communication devices, or the service connection may be a connection channel used to transmit one service between two communication devices, Alternatively, the service connection is a connection channel for transmitting a sub-service between two communication devices.
  • in-situ flow information telemetry (iFIT) technology generates a flow identifier of the target service flow corresponding to the service connection through static configuration.
  • iFIT in-situ flow information telemetry
  • the embodiment of the present application provides a method for identifying a business connection.
  • This method does not rely on static configuration and can automatically generate the FID corresponding to the business connection based on the route for establishing the business connection during the process of establishing the business connection, thereby realizing the generation of the FID.
  • the operation of generating FID is simpler, the workload is smaller, and the efficiency is higher.
  • Figure 1 is an implementation environment of a service connection identification method provided by an embodiment of the present application. Schematic diagram. As shown in Figure 1, the implementation environment includes a first communication device and a second communication device.
  • the first communication device and the second communication device are respectively used as two edge routing devices of the communication network, wherein the first communication device is connected to The first client is used to connect the first client to the communication network, and the second communication device is connected to the second client, used to connect the second client to the communication network.
  • the first client and the second client may be custom edge (CE) devices, and the CE device may be a router or a switch.
  • the first client and the second client can also be any terminal device used by the user, such as a personal computer (Personal Computer, PC), smart phone, personal digital assistant (Personal Digital Assistant, PDA), wearable device, handheld device Computer PPC (Pocket PC, PPC), tablet computer, smart car, etc.
  • the first communication device and the second communication device are devices with route publishing functions and message forwarding functions.
  • the route publishing function one or more service connections can be established between the first communication device and the second communication device in the communication network.
  • the message forwarding function the first communication device and the second communication device can transmit data through any service connection. business flow.
  • the FID corresponding to the service connection is automatically generated based on the route released during the establishment process of the service connection, thereby realizing the identification of the service connection. Therefore, when transmitting the service flow, traffic management can be performed on the service flow transmitted by the service connection based on the generated FID.
  • the traffic management of the transmitted service flow based on the generated FID may include traffic detection, traffic statistics, traffic visualization, traffic connection or traffic service quality control, etc., the embodiments of this application do not Make limitations.
  • the service flow transmitted by the service connection can be bidirectional. Therefore, the FID corresponding to the service connection can be used to identify the service flows in the two transmission directions.
  • the FID corresponding to the service connection can also include the corresponding service flows in the two directions.
  • FID for example, the FID of the service flow sent by the first communication device to the second communication device is the first FID, and the FID sent by the second communication device to the first communication device is the second FID.
  • the implementation environment may also include multiple communication devices such as a third communication device or a fourth communication device, which are not shown in Figure 1 .
  • Each of the multiple communication devices can establish one or more different communication devices.
  • each communication device can use the business connection identification method provided by the embodiment of the present application to identify the established business connection.
  • the communication devices mentioned in the embodiments of this application may be network equipment such as switches and routers, or may be part of the components on the network equipment, such as single boards and line cards on the network equipment, or may be A functional module on the network device may also be a chip used to implement the method of the present application, which is not specifically limited in the embodiment of the present application.
  • the transceiver unit used to implement the method may be, for example, an interface circuit of the chip, and the processing unit may be a processing circuit with a processing function in the chip.
  • Connection methods between communication devices include but are not limited to direct connection through Ethernet cables or optical cables.
  • the embodiments of this application do not limit the application scenarios of the identification method for business connections, and can be applied to any scenario in which business flows are transmitted through established business connections.
  • the application scenario of the embodiment of the present application may be a scenario based on SRv6 communication or a scenario based on VXLAN communication.
  • the first communication device and the second communication device communicate through SRv6; in a scenario based on VXLAN communication, the first communication device and the second communication device communicate through a VXLAN tunnel.
  • FIG. 2 is a schematic diagram of the implementation environment of another method for identifying service connections provided by an embodiment of the present application.
  • the implementation environment includes user edge (custom edge, CE) 1 device and CE2 device.
  • CE1 device is connected to access router (ACC) device.
  • ACC device is used to connect CE1 device to the network.
  • the CE2 device is connected to the service operator edge (provider edge, PE) 3 and PE4 devices.
  • the PE3 and PE4 devices are used to connect the CE2 device to the network respectively.
  • the equipment used to connect ACC equipment and PE3 equipment or PE4 equipment includes aggregation nodes.
  • the first communication device may be the ACC device shown in Figure 2
  • the second communication device may be the PE3 device or PE4 device shown in Figure 2.
  • SRv6 refers to the application of segment routing (SR) technology in IPv6 networks.
  • SID is used to identify a unique segment.
  • the SID in SRv6 is in the form of an IPv6 address, and the length is 128 bits.
  • FIG. 3 is a schematic structural diagram of an SID provided by an embodiment of the present application.
  • SID includes three parts: locator (also called location identifier), function and parameters (arguments, args).
  • locator occupies the high bits of SID
  • args occupies the low bits of SID
  • function occupies the other bits of SID.
  • the locator field is a variable-length IPv6 prefix format, used to locate the node device that publishes the SID, and has routing and aggregation functions.
  • a locator represents an IPv6 network segment, and the IPv6 address under this network segment can be allocated as a SID.
  • the function field represents the instruction of the device, which is used to instruct the node device that issues the SID to perform corresponding forwarding actions and has programming functions.
  • the args field is an optional parameter that can define some variable information such as message flows and services.
  • the SRv6-enabled node device maintains a local SID table (local SID table).
  • the local SID table is used to save the SID generated by the node device and the information associated with the SID.
  • the local SID table includes the SID, the type of the SID, the outbound interface bound to the SID, the VPN instance associated with the SID, etc.
  • a VPN instance is a specialized entity established and maintained by a node device for directly connected sites. Each site has a corresponding VPN instance on the node device. Each VPN instance contains one or more sites directly connected to the node device.
  • the forwarding table of the CE device. VPN instances may also be called virtual routing forwarding (VRF).
  • the identification method 400 of the service connection provided by the embodiment of the present application will be introduced with reference to FIG. 4 . Since the establishment of the service connection is completed on the control plane, and the identification method of the service connection provided by the embodiment of the present application automatically generates the flow identification corresponding to the service connection along with the establishment process of the service connection, therefore, the identification method of the service connection provided by the embodiment of the application Methods can also be implemented in the control plane. Referring to Figure 4, the identification method 400 of a service connection provided by this embodiment of the present application includes but is not limited to the following steps.
  • Step 401 Communication device 1 publishes a first VPN route to communication device 2.
  • the first VPN route is used to establish a business connection between communication device 1 and communication device 2.
  • the first VPN route includes node information of communication device 1. .
  • the type of the first route may be a VPN route or a public network route, which is not limited in the embodiment of this application.
  • Communication devices can complete the establishment of service connections by publishing routes to each other.
  • a service connection is used to connect two communication devices so that service flows can be transmitted between the two communication devices.
  • the first route is a first VPN route
  • the first VPN route is used to establish a service connection between the communication device 1 and the communication device 2, that is, a VPN.
  • the communication device 1 is the PE3 device shown in Figure 2
  • the communication device 2 is the ACC device shown in Figure 2.
  • the CE1 device and the CE2 device respectively belong to two sites in the same VPN instance, and both the ACC device and the PE3 device are configured with the VPN instance.
  • the PE3 device binds the VPN instance to the first interface of the PE3 device, configures the corresponding first locator for the first interface, and then allocates the VPN SID based on the first locator.
  • the ACC device binds the VPN instance to the second interface of the ACC device, configures a corresponding second locator for the second interface, and then allocates a VPN SID based on the second locator.
  • the CE2 device will use the interior gateway protocol (IGP) or border gateway
  • IGP interior gateway protocol
  • BGP border gateway protocol
  • the PE3 device learns the private network route of the CE2 device, it saves the private network route of the CE2 device in the routing table corresponding to the VPN instance, and allocates the corresponding first VPN SID to the private network route of the CE2 device, based on the A VPN SID generates the first VPN route.
  • the PE3 device after generating the first VPN route, the PE3 device will publish the first VPN route to other sites corresponding to the VPN instance, for example, publish the first VPN route to the ACC device.
  • the embodiment of this application does not limit the method of publishing VPN routes between PE3 devices and ACC devices.
  • BGP or multi-protocol external border gateway protocol (MP-EBGP) can be run between different autonomous domains. to publish.
  • Figure 5 is a schematic diagram of a route publishing process provided by an embodiment of the present application. As shown in Figure 5, take the address of CE1 device as 1.1.1.1 and the address of CE2 device as 2.2.2.2 as an example.
  • the first VPN route published by the PE3 device includes the private network route prefix: 2.2.2.0/24, next hop (NHP): A1::8:1 and VPN SID: A1::8:B100:0.
  • the next hop is the PE3 device
  • A1::8:1 is the IPv6 address of the PE3 device
  • A1::8:B100:0 is the first VPN SID generated by the PE3 device
  • the locator field in the first VPN SID indicates the PE3 device's Node information
  • the function field in the first VPN SID indicates the VPN identification.
  • Step 402 The communication device 2 receives the first VPN route published by the communication device 1, and generates the first FID corresponding to the service connection based on the node information of the communication device 2 and the node information of the communication device 1 carried in the received first VPN route.
  • the first FID is used to identify the first service flow sent by the communication device 2 to the communication device 1 .
  • the first FID includes the node information of the communication device 2 and the node information of the communication device 1 .
  • the communication device 2 can save the first VPN route, for example, add the first VPN route to the forwarding table corresponding to the VPN instance, so that the communication device 2 The first service flow can be sent to the communication device 1 on the forwarding plane.
  • the communication device 2 establishes a service connection between the communication device 2 and the communication device 1.
  • the communication device 2 can send the first service flow to the communication device 1 through the service connection.
  • the source node of the first service flow is the communication device. 2.
  • the sink node is communication device 1.
  • the communication device 2 will also perform the related operations performed by the communication device 1 in step 401. Still taking the route publishing process shown in Figure 5 as an example, the communication device 1 is the PE3 device shown in Figure 2, and the communication device 2 is the ACC device shown in Figure 2.
  • the ACC device will also learn the private network route of the CE1 device. Since the CE1 device and the CE2 device belong to the same VPN instance, the ACC device and the PE3 device can receive the VPN routes sent by each other. In the same way, the ACC device will also allocate the corresponding second VPN SID to the private network route of the CE1 device, and generate the second VPN route based on the second VPN SID.
  • the second VPN route includes the private network route prefix: 1.1.1.0/24, NHP: A2::9:1 and VPN SID: A2::9:B100:0.
  • the next hop is the ACC device
  • A2:: 9:1 is the IPv6 address of the ACC device
  • A2::9:B100:0 is the second VPN SID
  • the locator field in the second VPN SID indicates the node information of the ACC device
  • the function field in the second VPN SID indicates the VPN identification. .
  • the communication device 2 can obtain the IPv6 address and the first VPN SID of the communication device 1 based on the received first VPN route, and the communication device 2 can obtain the IPv6 address and the second VPN SID of the communication device 2 . Since the source node of the first service flow corresponding to the service connection is communication device 2, the sink node is communication device 1. Therefore, the communication device 2 can generate a service connection corresponding to the node information of the communication device 2, the node information of the communication device 1 and the VPN identifier. The first FID.
  • the first FID generated based on the first VPN route is: A2::9:1+A1::8:B100:0.
  • A2::9:1 is the IPv6 address of the ACC, used to indicate the node information of the ACC device
  • A1::8:B100:0 is the first VPN SID, used to indicate the node information and VPN identification of the PE3 device
  • the first FID is: A2::9:B100:0+A1::8:B100:0
  • A2::9:B100:0 is the second VPN SID, used to indicate the node information of ACC.
  • the first FID is used to uniquely identify the first service flow of the first service message sent by the ACC device to the PE3 device.
  • the communication device 1 can also send the second service flow to the communication device 2 through the service connection. Furthermore, since the sink node of the second service flow corresponding to the service connection is the communication device 2 and the source node is the communication device 1, the communication device 2 can also use the node information of the communication device 2, the node information of the communication device 1 and the VPN identifier, Generate the second FID corresponding to the service connection. For example, based on Figure 5, the second FID is: A1::8:1+A2::9:B100:0.
  • A1::8:1 is the IPv6 address of the PE3 device, used to indicate the node information of the PE3 device
  • A2::9:B100:0 is the second VPN SID, used to indicate the node information and VPN identification of the ACC device
  • the second FID is: A1::8:B100:0+A2::9:B100:0
  • A1::8:B100:0 is the first VPN SID, used to indicate the node information of the PE3 device.
  • the second FID is used to uniquely identify the second service flow of the second service message sent by the PE3 device to the ACC device.
  • Step 403 The communication device 2 publishes a second VPN route to the communication device 1.
  • the second VPN route is also used to establish the business connection between the communication device 1 and the communication device 2.
  • the second VPN route includes the communication device. 2 node information.
  • the communication device 2 after the communication device 2 generates the second VPN route, it will also publish the second VPN route to other sites corresponding to the VPN instance, for example, publish the second VPN route to the communication device 1 .
  • the communication device 2 publishes the second VPN route to the communication device 1, reference can be made to the relevant description of the above step 401, which will not be described again here.
  • Step 404 The communication device 1 receives the second VPN route published by the communication device 2, and generates the first FID corresponding to the service connection based on the node information of the communication device 1 and the node information of the communication device 2 carried in the received second VPN route.
  • the communication device 1 will receive the second VPN route published by the communication device 2 and save the second VPN route, for example, add the second VPN route to the forwarding table corresponding to the VPN instance, so that The communication device 1 can send the second service message to the communication device 2 on the forwarding plane.
  • the communication device 1 establishes a service connection between the communication device 1 and the communication device 2.
  • the communication device 1 sends the second service flow to the communication device 2 through the service connection.
  • the source node of the second service flow is the communication device 1.
  • the sink node is the communication device 2.
  • the communication device 1 can obtain the IPv6 address and the second VPN SID of the communication device 2 according to the received second VPN route, and can obtain the IPv6 address and the second VPN SID of the communication device 1 according to the first VPN route. A VPN SID. Based on the same method, the communication device 1 can generate the same first FID and the second FID as the communication device 2 .
  • step 404 the communication device 1 generates the first FID corresponding to the service connection based on the node information of the communication device 1 and the node information of the communication device 2 carried in the received second VPN route. You may refer to the above steps. The relevant description of 402 will not be repeated here.
  • the length of the IPv6 address and SID is both 128 bits, the length of the generated FID is 256 bits, resulting in a long information table required to save the FID.
  • the locator field or IPv6 address in the SID is structured, the locator field in different SIDs or some fields in the IPv6 address are the same in a fixed network, and the information that can be used to distinguish different devices is a fixed part of it. field.
  • the locator field in the SID or the structural characteristics of the IPv6 address can be used to distinguish the device from the locator field in the SID or the IPv6 address. Extract by field, and use some of the extracted fields to generate a simplified version of the FID to reduce the length of the FID and reduce the data space required to store the FID.
  • FIG. 6 is a schematic diagram of a structured SID provided by an embodiment of the present application.
  • the locator field of the SID includes fixed prefix, type, province and city identification, reservation, network domain, shard reservation and node identification. Among them, the province and city identification accounts for 12 bits and the node identification accounts for 20 bits. Some fields used to distinguish devices. Therefore, the two partial fields of the province and city identification and the node identification can be used as the node information of the device.
  • the locator field in the first VPN SID indicates the node information of the communication device 1
  • the function field indicates the VPN identification.
  • the args field can be extended to carry the sub-service identifier under the VPN;
  • the second VPN route includes the IPv6 address of the communication device 2 and the second VPN SID, and the locator field in the second VPN SID Indicates the node information of the communication device 2
  • the function field indicates the VPN instance
  • the args field can be extended to carry the sub-service identifier under the VPN. Therefore, as the service connection is established, both the communication device 2 and the communication device 1 can generate the first FID and the second FID corresponding to the service connection based on the first VPN route and the second VPN route published by the control plane.
  • the communication device 2 and the communication device 1 have completed the establishment and identification of the service connection on the control plane, so that on the forwarding plane, the communication device 2 can send the first service message belonging to the first service flow based on the service connection. Since the first service message carries the node information of the source node, the node information of the sink node, and information used to identify different services. Therefore, traffic management of the first service flow can be performed based on the first FID corresponding to the service connection. In the same way, the communication device 1 can send the second service message belonging to the second service flow based on the service connection, because the second service message carries the node information of the source node, the node information of the sink node and the node information used to identify different services.
  • traffic management can be performed on the second service flow based on the second FID corresponding to the service connection.
  • traffic management can be performed on the service flows in different directions of the service connection, which refines the accuracy of traffic management.
  • FIG. 7 is a schematic diagram of a message forwarding process provided by an embodiment of the present application.
  • the communication device 2 receives the first service message from the interface bound to the VPN instance, Search the forwarding table corresponding to the VPN instance for the first VPN SID that matches the routing prefix of the destination address.
  • the communication device 2 encapsulates an SRv6 header for the first service message according to the forwarding principle of SRv6, where the source address (source address, SA) of the SRv6 header is the IPv6 address of the communication device 2: A2::9: 1.
  • the destination address (DA) is the first VPN SID: A1::8:B100:0, and the payload is the first service packet. Therefore, the communication device 2 can respectively obtain A2::9:1 and A1::8:B100:0 included in the first FID through the above-mentioned encapsulation operation of the SRv6 message header, and then the communication device 2 can obtain the A2::9:1 and A1::8:B100:0 included in the first FID.
  • the FID collects statistics on the transmission information of the first service packet.
  • the transmission information may include information such as the time of transmission and the quantity of transmission.
  • the embodiment of the present application does not limit the location where the communication device 2 saves the first FID, and it can be saved at any location that the communication device 2 can obtain.
  • communication device 2 may save the first FID in the VRF table of communication device 2 .
  • the communication device 2 can carry the generated first FID in the first service message, so that the communication device 1 can identify the first FID based on the received first service message.
  • the first service packet belongs to the first service flow, and traffic management is performed on the first service flow based on the first FID.
  • the communication device 2 can use the generated first FID as a flow identifier in the iFIT technology and carry it in the iFIT message header of the service message extension.
  • the first service message does not carry the first FID.
  • the communication device 1 After the communication device 1 receives the first service message, based on the mapping relationship between the node information of the communication device 2 and the first FID Determine the first FID and then base Perform traffic management on the first service flow on the first FID.
  • the communication device 1 after the communication device 1 generates the first FID corresponding to the service connection based on the second VPN route published by the communication device 2, it also saves the mapping relationship between the node information of the communication device 2 and the first FID. .
  • the communication device 1 can obtain the node information of the communication device 2 based on the next hop information in the second route.
  • the communication device 1 uses the node information of the communication device 2 as the key and the first FID as the value.
  • the communication device 1 stores the mapping relationship between the node information of the communication device 2 and the first FID. For example, deliver the key-value pair with the key A2::9:1 and the value A2::9:1+A1::8:B100:0 to the VRF.
  • the communication device 1 can find the mapping relationship between the node information of the communication device 2 and the first FID through the DA in the SRv6 message header. Furthermore, the first FID corresponding to the first service message can be found through the SA in the SRv6 message header, and the reception information of the first service message can be processed based on the first FID. For example, the reception information may include the time of reception. , quantity received and other information. In this case, since there is no need to carry the first FID in the transmitted first service message, the communication device 1 can determine and obtain the first FID through the SA and DA in the received first service message, and then implement the first FID based on the received first service message.
  • First FID traffic management Compared with iFIT technology, which uses the head node to carry the flow identifier of the configured service flow in the transmitted service message to perform traffic management on the service flow, the traffic management of the service flow implemented by the embodiment of the present application can Reduce the transmission pressure on the forwarding surface.
  • the communication device 2 can send the statistical message sending information corresponding to the first FID to the analyzer, and the communication device 1 can also send the statistical message receiving information corresponding to the first FID to the analyzer, so that the analyzer
  • the connection status of the service connection can be perceived based on the message sending information and message receiving information corresponding to the first FID.
  • the packet loss rate of the business connection is analyzed based on the number of messages sent in the message sending information and the number of received messages in the message receiving information.
  • the identification method of the business connection provided by the embodiment of the present application can generate FID without static configuration, and realizes the automatic generation of the FID corresponding to the business connection during the establishment process of the business connection, making the operation of generating FID simpler and easier to work. The amount is smaller and the generation efficiency is higher.
  • the FID since the FID is generated based on the routing of the service connection, the FID can not only be used to identify the service flow transmitted by the service connection, but also can be used to identify the service connection, providing an effective way to identify the service connection.
  • a business model of the entire network can be established by generating corresponding FIDs for each business connection, and the traffic status corresponding to each business connection can be visualized through the business model. Furthermore, since there is no need to deploy other protocols other than those required to establish business connections, the business flows corresponding to different business connections can be identified based on the transmitted business messages and automatically generated FIDs, which improves the efficiency of business flow identification. And because corresponding FIDs can be generated based on service connections of different granularities, the service flows transmitted by multiple service connections can be differentiatedly managed through the corresponding FIDs, further meeting traffic management needs.
  • the service connection identification method 800 includes the following steps.
  • the first communication device and the second communication device shown in FIG. 8 may be based on the ACC device and the PE3 device shown in FIG. 2 respectively.
  • the operations performed by the first communication device and the second communication device may be referred to the above-mentioned service connection. Identify the operations performed by the communication device 1 and the communication device 2 in the method 400.
  • Step 801 The first communication device receives the first route published by the second communication device.
  • the first route is used to establish a business connection between the first communication device and the second communication device.
  • the first route includes node information of the second communication device. .
  • the type of the first route may be a VPN route or a public network route, which is not limited in the embodiment of this application.
  • communication devices complete the establishment of service connections by publishing routes to each other.
  • a service connection is used to connect two communication devices so that service flows can be transmitted between the two communication devices.
  • the first route is a VPN route
  • the first route is used to establish a service connection between the first communication device and the second communication device, that is, a VPN.
  • the second communication device publishes the first route of the second communication device to the first communication device. Since the first route includes the node information of the second communication device, after receiving the first route, the first communication device The first route is delivered to the forwarding table of the first communication device. Therefore, the first communication device can send the first service flow to the second communication device based on the first route, that is, the first communication device establishes a service connection between the first communication device and the second communication device.
  • the first communication device will also send the second route of the first communication device to the second communication device.
  • the second communication device After receiving the second route published by the first communication device, the second communication device will also send the second route of the first communication device to the second communication device.
  • the second route is delivered to the forwarding table of the second communication device. Therefore, the second communication device can send the second service flow to the first communication device based on the second route, that is, the second communication device establishes a service connection between the second communication device and the first communication device.
  • the second route includes node information of the first communication device.
  • Step 802 The first communication device generates a first FID corresponding to the service connection based on the node information of the first communication device and the node information of the second communication device carried in the first route.
  • the first FID is used to identify the first communication device to which the service connection is directed.
  • the first FID includes node information of the first communication device and node information of the second communication device.
  • the source node that sends the first service flow is a first communication device
  • the sink node that receives the first service flow is a second communication device. Since the first route includes the node information of the second communication device, the first communication device can obtain the node information of the sink node corresponding to the first service flow. Since the node information of the source node corresponding to the service connection is the first communication device itself, the first communication device can generate the first FID corresponding to the service connection based on the node information of the source node and the node information of the sink node. The first FID is To identify the first service flow sent by the first communication device to the second communication device.
  • the embodiments of the present application do not limit the method of generating the first FID corresponding to the service connection based on the node information of the source node and the node information of the sink node. It suffices to be able to identify the first service flow sent by the first communication device to the second communication device. . It can be understood that the content included in the first FID is different, and the granularity of the first service flow sent by the first communication device to the second communication device identified by the first FID is also different, that is, the identification granularity of the service connection is different.
  • the identification granularity of service connections includes but is not limited to the following types.
  • the first FID includes node information of the first communication device and node information of the second communication device.
  • the first FID only needs to include the node information of the source node and the node information of the sink node of the service connection.
  • the identification granularity of the service connection is two nodes, and the first FID is used to identify the first Service flows corresponding to all services sent by the communication device to the second communication device. That is to say, the service flow corresponding to any service sent by the first communication device to the second communication device can be identified by the first FID.
  • the first FID can also be used to identify service flows corresponding to all services sent by the second communication device to the first communication device. For example, when the first FID is the node information of the source node + When the first FID is the node information of the sink node + the node information of the source node, the first FID is used to identify the service flows corresponding to all services sent by the first communication device to the second communication device; when the first FID is the node information of the sink node + the node information of the source node, the first FID An FID is used to identify service flows corresponding to all services sent by the second communication device to the first communication device.
  • FIG. 9 is a schematic diagram of the identification result of a service connection provided by an embodiment of the present application.
  • the first communication device and the second communication device are configured with service 1 and service 2.
  • the service connection 1 is established between the first communication device and the second communication device.
  • the first communication device uses the service connection 1
  • the service flows of Service 1 and Service 2 are sent to the second communication device.
  • the FID1 corresponding to the service connection 1 is used to identify the service flows of Service 1 and Service 2 sent by the first communication device to the second communication device. That is, the packet statistical information obtained based on the FID1 is the statistical information corresponding to all the packets of service 1 and service 2 transmitted from the first communication device to the second communication device.
  • the address of the first communication device is a first IPv6 address
  • the first IPv6 address includes node information of the first communication device
  • the address of the second communication device is a second IPv6 address
  • the second IPv6 address Includes node information of the second communication device.
  • the embodiment of this application does not limit the node information, and it only needs to be used to distinguish the information of different nodes.
  • the node information of the first communication device is the entire content of the first IPv6 address
  • the node information of the second communication device is the entire content of the second IPv6 address
  • the node information of the first communication device is the entire content of the second IPv6 address.
  • the part of an IPv6 address used to identify the first communication device, and the node information of the second communication device is the part of the second IPv6 address used to identify the second communication device.
  • the first FID includes node information of the first communication device, node information of the second communication device, and first service information.
  • the first FID also includes the first service information used to distinguish different services.
  • the service The identification granularity of the connection is a service, and the first FID is used to identify a service flow corresponding to a service sent by the first communication device to the second communication device.
  • FIG. 10 is a schematic diagram of identification results of another service connection provided by an embodiment of the present application.
  • service 1 and service 2 are configured from the first communication device to the second communication device.
  • Service connection 1 and service connection 2 are established between the first communication device and the second communication device.
  • the first communication device passes the service Connection 1 sends the service flow of service 1 to the second communication device, and the first communication device sends the service flow of service 2 to the second communication device through service connection 2. Therefore, the FID1 corresponding to the service connection 1 is used to identify the service flow of the service 1 sent by the first communication device to the second communication device.
  • the packet statistical information obtained based on the first FID1 is the statistical information corresponding to the packets of service 1 transmitted from the first communication device to the second communication device.
  • the FID2 corresponding to the service connection 2 is used to identify the service flow of the service 2 sent by the first communication device to the second communication device. That is, the packet statistical information obtained based on the FID2 is the statistical information corresponding to the packets of service 2 transmitted from the first communication device to the second communication device.
  • the first route also carries the first service information, so that the first communication device can obtain the first service information.
  • the embodiment of the present application does not limit the first service information and can be used to Just distinguish the information of different businesses.
  • the first service information may be a VPN identifier.
  • the first route is a VPN route and the service connection is a VPN.
  • the first route also carries the VPN identifier, so that the first communication device can obtain the VPN identifier.
  • the first route carries the VPN SID, and the function field in the VPN SID is used to indicate the identity of the VPN. At this time, the identity of the VPN in the first FID is the function field in the VPN SID.
  • the first route carries VNI, and the VNI indicates the VXLAN tunnel. If the VXLAN tunnel is associated with a VPN, the VNI can also be used to indicate the VPN. In this case, the identifier of the VPN in the first FID can also be the VNI.
  • the first FID includes node information of the first communication device, node information of the second communication device, and the first service information and secondary business information.
  • the first FID also includes the node information used to distinguish the same service.
  • Second service information of different sub-services of the service is a sub-service under a service
  • the first FID is used to identify a service flow corresponding to a sub-service under a service sent by the first communication device to the second communication device.
  • different sub-services of the same service may be different levels of the same service, or different users of the same service, or different types of the same service, which are not limited in this embodiment of the present application.
  • Figure 11 is a schematic diagram of identification results of another service connection provided by an embodiment of the present application.
  • the service 1 includes sub-service 1 and sub-service 2, and a service connection 1 and a service connection are established between the first communication device and the second communication device 2.
  • the first communication device sends the service flow of sub-service 1 under service 1 to the second communication device through service connection 1, and the first communication device sends the service of sub-service 2 under service 1 to the second communication device through service connection 2. flow.
  • the first communication device identified by FID1 corresponding to the service connection 1 sends the service flow of sub-service 1 under service 1 to the second communication device. That is, the packet statistical information obtained based on the FID1 is the statistical information corresponding to the packets of sub-service 1 under service 1 transmitted from the first communication device to the second communication device.
  • the first communication device identified by FID4 corresponding to the service connection 2 sends the service flow of sub-service 1 under service 1 to the second communication device. That is, the packet statistical information obtained based on the FID2 is the statistical information corresponding to the packets of sub-service 1 under service 1 transmitted from the first communication device to the second communication device.
  • the first route also carries the second service information, so that the first communication device can obtain the second service information.
  • the embodiment of the present application does not limit the second service information and can be used to Just distinguish the information of different sub-businesses under the same business.
  • the first service information is the identifier of the VPN
  • the second service information may be the identifier of the sub-service of the VPN
  • the service connection is the sub-service connection of the VPN.
  • the first route carries the VPN SID
  • the location identification field in the VPN SID is used to indicate the node information of the second communication device
  • the function field of the VPN SID can be used to indicate the identity of the VPN.
  • the args field in the VPN SID is used to indicate the identity of the first sub-service of the VPN in the first FID.
  • the identifier of the first sub-service of the VPN may be a coded value of DSCP, or may be an identifier used to indicate the service type of the sub-service.
  • the identifier of the sub-service is used to indicate the voice sub-service, video sub-service or text sub-service, thereby enabling the method to identify the voice sub-service, video sub-service or text sub-service of the same VPN respectively, that is, generating the voice sub-service Business, video sub-service or text sub-service respectively correspond to the FID, and then the traffic management of respective business flows can be carried out based on their respective FIDs to achieve differentiated management of the traffic of different sub-services.
  • the first communication device identifies that the service corresponding to the service connection is the first service through the first service information in the first route, and the service configuration information includes the first sub-service and the second sub-service corresponding to the first service.
  • the first communication device can directly generate FID1 corresponding to the first sub-service and FID2 corresponding to the second sub-service through the first route.
  • FID1 is used to identify the first service sent by the first communication device to the second communication device.
  • FID2 The service flow corresponding to the first sub-service under the first communication device, FID2 is used to identify the service flow corresponding to the second sub-service under the first service sent by the first communication device to the second communication device. Therefore, two granularity FIDs corresponding to the service connection can be generated through a route and service configuration information containing the first service information, which reduces the number of route releases and improves the efficiency of establishing a service connection.
  • the number of first FIDs corresponding to the service connection generated by the first communication device based on the first route may be one or multiple.
  • the first FID can be generated according to any one of the above granularity one to three granularity methods.
  • the first FIDs include at least two FIDs generated according to at least two methods from the above granularity one to three.
  • the first communication device Based on the above process, the first communication device generates a first FID corresponding to the service connection based on the first route. Since the service flow transmitted by the service connection is bidirectional, the first communication device will also send the second route of the first communication device to the second communication device. The second route is used by the second communication device to establish communication between the second communication device and the first communication device. The service connection between devices causes the second communication device to also generate a second FID corresponding to the service connection based on the second route. The second FID is used to identify the second service flow sent by the second communication device to the first communication device.
  • the source node is the second communication device and the sink node is the first communication device. That is, the source node of the second service flow is the sink node of the first service flow. The sink node of the flow is the source node of the first service flow. Therefore, after generating the first FID corresponding to the service connection, the first communication device can automatically generate the second FID corresponding to the service connection and reverse to the first FID.
  • the second FID corresponding to the service connection obtained includes the node information of the second communication device, the node information of the first communication device and the first service information.
  • the first communication device since the first communication device will also send the second route of the first communication device to the second communication device, see that the first communication device generates the first FID corresponding to the service connection based on the first route.
  • the second communication device In the second FID method, the second communication device will also generate the second FID and the first FID corresponding to the service connection based on the second route.
  • the first communication device and the second communication device complete the establishment of the service connection on the control plane, and simultaneously generate the first FID and the second FID corresponding to the service connection.
  • the first communication device will save the first FID and the second FID generated based on service 1 as local service 1 information. middle.
  • the first FID includes the local node ID+the opposite node ID+the opposite service ID
  • the second FID includes the opposite node ID+the local node ID+the local service ID.
  • the local node ID is the node information of the first communication device
  • the opposite node ID is the node information of the second communication device
  • the opposite service ID and the local service ID are both service 1 Information.
  • the second communication device will save the first FID and the second FID generated based on service 1 in the local service 1 information, where the first FID includes the opposite node ID + the local node ID + the local service ID, and the second FID will be stored in the local service 1 information.
  • the second FID includes the local node ID + the opposite node ID + the opposite service ID.
  • the local node ID is the node information of the second communication device
  • the opposite node ID is the node information of the first communication device.
  • the node information, peer service ID and local service ID are all information services of service 1.
  • the first FID generated by the first communication device and the first FID generated by the second communication device are the same, and the second FID generated by the first communication device is the same as the second FID generated by the second communication device. It's the same. Therefore, the traffic flow of the service 1 sent by the first communication device to the second communication device can be managed based on the first FID, and the service flow 1 sent by the second communication device to the first communication device can be managed based on the second FID.
  • the first FID and the second FID jointly realize the identification of the service connection of the service 1 between the first communication device and the second communication device.
  • the first communication device after the first communication device generates the first flow identifier FID corresponding to the service connection, It also includes: the first communication device sends a first service message to the second communication device, the first service message belongs to the first service flow, and the first service message includes the first FID.
  • the first communication device performs traffic management on the first service flow based on the first FID.
  • the method in which the first communication device performs traffic management on the first service flow based on the first FID will be described.
  • the first communication device sends the first service packet to the second communication device
  • the first route in the forwarding table will be found based on the destination address of the first service packet.
  • the first route can be obtained.
  • the node information of the sink node corresponding to the first service flow Since the first communication device is the source node of the first service flow, the first communication device can obtain the source node of the corresponding service flow based on the first service message.
  • the node information and the node information of the sink node The first communication device is enabled to identify the first service flow to which the first service message belongs, and perform traffic management on the first service flow based on the first FID.
  • the method further includes: the first communication device receives the second communication The second service message sent by the device belongs to the second service flow, and the second service message includes the second FID.
  • the first communication device performs traffic management on the second service flow based on the second FID.
  • the method in which the first communication device performs traffic management on the second service flow based on the second FID will be described.
  • the node information of the source node corresponding to the second service flow can be obtained according to the source address in the second service message.
  • the target address in the second service message can obtain the node information of the sink node corresponding to the second service flow, so that the first communication device can identify the second service flow to which the second service message belongs, and perform matching based on the second FID.
  • the second service flow performs traffic management.
  • the method further includes: the first communication device saving the mapping relationship between the generated second FID and the second communication device.
  • the VRF of the first communication device includes a mapping relationship between the node information of the second communication device and the second FID.
  • the first communication device receives the second service message sent by the second communication device, and the second service message belongs to the second communication device.
  • the second service message includes the node information of the second communication device; the first communication device determines the second FID based on the mapping relationship between the node information of the second communication device and the second FID, and the second FID determines the second FID based on the second FID.
  • the second business flow performs traffic management.
  • the method provided by this application also includes: the first communication device receives a third route published by the second communication device, and the third route is used to establish the first communication device
  • the second service connection with the second communication device includes the node information of the second communication device; the first communication device carries the second route according to the node information of the first communication device and the received third route.
  • the node information of the communication device generates a third FID corresponding to the second service connection.
  • the third FID is used to identify the third service flow sent by the first communication device to the second communication device.
  • the third FID includes the first communication device. node information and node information of the second communication device.
  • the first service connection established based on the first route is a first sub-service connection of the first VPN
  • the second service connection established based on the third route is a second sub-service connection of the first VPN.
  • Service connection, the second sub-service connection is used to transmit the second sub-service of the first VPN
  • the third route also includes the identifier of the first VPN
  • the generated third FID also includes the identifier of the first VPN and the identifier of the second sub-service.
  • the third service flow identified by the third FID is all service flows of the second sub-service of the first VPN transmitted between the first communication device and the second communication device.
  • FID and tertiary FID can be achieved Perform traffic management on the service flows of the first sub-service and the second sub-service of the same first VPN.
  • This application does not limit the number of multiple service connections established between the first communication device and the second communication device.
  • the first communication device and the second communication device can also establish The multiple service connections may be service flows used to transmit different sub-services of the same service.
  • multiple service connections established between the first communication device and the second communication device can also be used to transmit service flows of different services.
  • the first service connection established based on the first route is In the first VPN
  • the second service connection established based on the third route is the second VPN.
  • the third route also includes the identifier of the second VPN;
  • the generated third FID also includes the identifier of the second VPN.
  • the third service flow identified by the third FID is all the service flows of the second VPN transmitted between the first communication device and the second communication device.
  • not only all the service flows of the first VPN but also all the service flows of the second VPN can be transmitted between the first communication device and the second communication device, that is, between the first communication device and the second communication device.
  • Multiple business connections are established between each other.
  • the multiple business connections transmit business flows of different services. Traffic management of the business flows of different services can be implemented through different FIDs.
  • the second service connection established based on the third route is a sub-service connection of the second VPN, and the sub-service connection of the second VPN is used to transmit the sub-service of the second VPN.
  • the third route also includes the identifier of the second VPN; the generated third FID also includes the identifier of the second VPN and the identifier of the sub-service of the second VPN.
  • the third service flow identified by the third FID is all service flows of the sub-services of the second VPN transmitted between the first communication device and the second communication device.
  • not only all the service flows of the first VPN can be transmitted between the first communication device and the second communication device, but also all the service flows of the sub-services of the second VPN can be transmitted between the first communication device and the second communication device.
  • Multiple service connections are established between devices, and the multiple service connections transmit service flows of different services or sub-services of different services.
  • the first communication device receives a fourth route published by the third communication device.
  • the fourth route is used to establish a third service connection between the first communication device and the third communication device.
  • the fourth route including node information of the third communication device; the first communication device generates a fourth FID corresponding to the third service connection according to the node information of the first communication device and the node information of the third communication device carried in the fourth route, and the fourth The FID is used to identify the fourth service flow sent by the first communication device to the third communication device.
  • the fourth FID includes node information of the first communication device and node information of the third communication device.
  • the first communication device can not only establish a service connection with the second communication device, but also can establish a service connection with the third communication device, that is, the same communication device can establish a service connection with different communication devices.
  • Establish a business connection and automatically generate the FID corresponding to the business connection during the process of establishing the business connection.
  • the third service connection established based on the fourth route is a third VPN
  • the fourth route further includes an identifier of the third VPN
  • the fourth FID further includes an identifier of the third VPN.
  • the fourth service flow identified by the fourth FID is all the service flows of the third VPN transmitted between the first communication device and the third communication device.
  • the third service connection is a sub-service connection of the third VPN
  • the fourth route also includes the identifier of the third VPN
  • the fourth FID also includes the identifier of the third VPN and the third VPN identifier.
  • the fourth service flow identified by the fourth FID is all service flows of the sub-services of the third VPN transmitted between the first communication device and the third communication device.
  • the third VPN is the same as the above-mentioned first VPN, or the third VPN is different from the above-mentioned first VPN.
  • the methods of generating the third FID and the fourth FID can refer to the above-mentioned method of generating the first FID.
  • the relevant description of the first service connection to establish For the methods of the second service connection and the third service connection, please refer to the above-mentioned related description of establishing the first service connection based on the first route, and will not be described in detail here.
  • the identification method of the business connection provided by the embodiment of the present application can automatically generate the FID corresponding to the business connection according to the node information carried in the route used to establish the business connection during the establishment process of the business connection, and use the FID to identify the business connection. Identifies the business flow transmitted by this business connection. Since FID can be generated without static configuration, the operation of generating FID is simpler, the workload is smaller, and the generation efficiency is higher.
  • the FID since the FID is generated based on the routing of the service connection, the FID can not only be used to identify the service flow transmitted by the service connection, but also can be used to identify the service connection, providing an effective way to identify the service connection.
  • the method provided by the embodiments of the present application can generate corresponding FIDs based on service connections of different granularities established between two communication devices, so that the service flows transmitted by the service connections can be processed based on the FIDs corresponding to the service connections of different granularities. Management at different granularities improves the flexibility of traffic management.
  • FIG. 13 is a schematic structural diagram of a communication device provided by an embodiment of the present application.
  • the communication device is the ACC device, PE3 device, or PE4 device shown in FIG. 2 above. Based on the following multiple modules shown in Figure 13, it should be understood that the device may include more additional modules than the modules shown or omit some of the modules shown therein, and the embodiments of the present application are not limited to this. As shown in Figure 13, the device includes:
  • the transceiver module 1301 is used to perform reception and/or transmission related operations performed by the communication device 2 in the service connection identification method 400 shown in Figure 4, or is used to perform the service connection identification method shown in Figure 8 Other operations other than the reception and/or transmission related operations performed by the first communication device in 800;
  • the processing module 1302 is configured to perform other operations other than the receiving and/or sending related operations performed by the communication device 2 in the service connection identification method 400 shown in FIG. 4, or is used to perform operations shown in FIG. 8. Other operations other than the reception and/or transmission related operations performed by the first communication device in the service connection identification method 800.
  • the transceiver module 1301 is configured to receive a first route published by a second communication device.
  • the first route is used to establish a business connection between the first communication device and the second communication device.
  • the first route including node information of the second communication device;
  • the processing module 1302 is configured to generate a first FID corresponding to the service connection according to the node information of the first communication device and the node information of the second communication device carried in the first route, where the first FID is used
  • the first FID includes node information of the first communication device and node information of the second communication device.
  • the service connection is a VPN
  • the first route also includes the identifier of the VPN
  • the first FID further includes the identifier of the VPN.
  • the service connection is a sub-service connection of the VPN.
  • the sub-service connection is used to transmit the sub-service of the VPN.
  • the first route also includes the identifier of the VPN.
  • the first FID also includes the identifier of the VPN and the identifier of the sub-service. .
  • the first route also includes an identifier of the sub-service.
  • the address of the first communication device is a first IPv6 address
  • the first IPv6 address includes node information of the first communication device
  • the first route includes the second IPv6 address of the second communication device
  • the second The IPv6 address includes node information of the second communication device.
  • the second IPv6 address is an SRv6 VPN SID.
  • the locator field of the SRv6 VPN SID is used to indicate the node information of the second communication device, and the function field of the SRv6 VPN SID is used to indicate the identity of the VPN.
  • the parameter field of the SRv6 VPN SID is used to indicate the identity of the VPN sub-service.
  • the first route includes a VNI.
  • the transceiver module 1301 is also configured to send a first service message to the second communication device.
  • the first service message belongs to the first service flow, and the first service message includes the first FID.
  • the processing module 1302 is also configured to perform traffic management on the first service flow based on the first FID.
  • the processing module 1302 is also configured to generate a second FID corresponding to the service connection according to the node information of the first communication device and the node information of the second communication device carried in the first route.
  • the second FID Used to identify the second service flow sent by the second communication device to the first communication device, the second FID includes node information of the first communication device and node information of the second communication device.
  • the transceiver module 1301 is also configured to receive a second service message sent by the second communication device.
  • the second service message belongs to the second service flow, and the second service message includes the second FID.
  • the processing module 1302 is also used by the first communication device to perform traffic management on the second service flow based on the second FID.
  • the VRF of the first communication device includes a mapping relationship between the node information of the second communication device and the second FID;
  • the transceiver module 1301 is also used to receive a second service message sent by the second communication device.
  • the second service message belongs to the second service flow, and the second service message includes node information of the second communication device;
  • the processing module 1302 is also configured to determine the second FID based on the mapping relationship between the node information of the second communication device and the second FID, and perform traffic management on the second service flow based on the second FID.
  • the device During the process of establishing a service connection, the device directly generates the FID corresponding to the service connection based on the first route used to establish the service connection, and then uses the FID to identify the service flow transmitted by the service connection, which can be obtained without static configuration.
  • the FID Therefore, the operation of generating FID is simpler, the workload is smaller, and the generation efficiency is higher.
  • the FID since the FID is generated based on the routing of the service connection, the FID can not only be used to identify the service flow transmitted by the service connection, but also can be used to identify the service connection, providing an effective way to identify the service connection.
  • the business flows corresponding to different business connections can be identified based on the transmitted business messages and automatically generated FIDs, which improves the efficiency of business flow identification.
  • corresponding FIDs can be generated based on service connections of different granularities, the service flows transmitted by multiple service connections can be differentiatedly managed through the corresponding FIDs, further meeting traffic management needs.
  • Figure 14 shows a schematic structural diagram of a network device 2000 provided by an exemplary embodiment of the present application.
  • the network device 2000 shown in FIG. 14 is used to perform the operations involved in the identification method 400 of the service connection shown in FIG. 4 or the identification method 800 of the service connection shown in FIG. 8 .
  • the network device 2000 is, for example, a switch, a router, etc., and the network device 2000 can be implemented by a general bus architecture.
  • the network device 2000 includes at least one processor 2001, a memory 2003, and at least one communication interface 2004.
  • the processor 2001 is, for example, a general central processing unit (CPU) or a digital signal processor. (digital signal processor, DSP), network processor (NP), graphics processing unit (GPU), neural network processing units (NPU), data processing unit (Data Processing Unit) , DPU), microprocessor or one or more integrated circuits used to implement the solution of the present application.
  • the processor 2001 includes an application-specific integrated circuit (ASIC), a programmable logic device (PLD) or other programmable logic devices, transistor logic devices, hardware components, or any combination thereof.
  • a PLD is, for example, a complex programmable logic device (CPLD), a field-programmable gate array (FPGA), a general array logic (GAL), or any combination thereof.
  • the processor may implement or execute the various logical blocks, modules and circuits described in conjunction with the disclosure of embodiments of the present invention.
  • the processor may also be a combination that implements computing functions, such as a combination of one or more microprocessors, a combination of a DSP and a microprocessor, and so on.
  • the network device 2000 also includes a bus.
  • Buses are used to transfer information between components of network device 2000.
  • the bus can be a peripheral component interconnect (PCI) bus or an extended industry standard architecture (EISA) bus, etc.
  • PCI peripheral component interconnect
  • EISA extended industry standard architecture
  • the bus can be divided into address bus, data bus, control bus, etc. For ease of presentation, only one thick line is used in Figure 14, but it does not mean that there is only one bus or one type of bus.
  • the memory 2003 is, for example, a read-only memory (ROM) or other type of static storage device that can store static information and instructions, or a random access memory (random access memory, RAM) or a device that can store information and instructions.
  • ROM read-only memory
  • RAM random access memory
  • Other types of dynamic storage devices such as electrically erasable programmable read-only memory (EEPROM), compact disc read-only memory (CD-ROM) or other optical disk storage, optical discs Storage (including compressed optical discs, laser discs, optical discs, digital versatile discs, Blu-ray discs, etc.), magnetic disk storage media or other magnetic storage devices, or can be used to carry or store desired program code in the form of instructions or data structures and can Any other media accessed by a computer, without limitation.
  • the memory 2003 exists independently, for example, and is connected to the processor 2001 through a bus.
  • the memory 2003 may also be integrated with the processor 2001.
  • the communication interface 2004 uses any device such as a transceiver for communicating with other devices or a communication network.
  • the communication network may be Ethernet, a radio access network (RAN) or a wireless local area network (WLAN), etc.
  • the communication interface 2004 may include a wired communication interface and may also include a wireless communication interface.
  • the communication interface 2004 may be an Ethernet (Ethernet) interface, a Fast Ethernet (FE) interface, a Gigabit Ethernet (GE) interface, an asynchronous transfer mode (Asynchronous Transfer Mode, ATM) interface, a wireless LAN ( wireless local area networks, WLAN) interface, cellular network communication interface or a combination thereof.
  • the Ethernet interface can be an optical interface, an electrical interface, or a combination thereof.
  • the communication interface 2004 can be used for the network device 2000 to communicate with other devices.
  • the processor 2001 may include one or more CPUs, such as CPU0 and CPU1 as shown in FIG. 14 .
  • Each of these processors may be a single-CPU processor or a multi-CPU processor.
  • a processor here may refer to one or more devices, circuits, and/or processing cores for processing data (eg, computer program instructions).
  • the network device 2000 may include multiple processors, such as the processor 2001 and the processor 2005 shown in FIG. 14 .
  • processors can be a single-core processor (single-CPU) or a multi-core processor (multi-CPU).
  • a processor here may refer to one or more devices, circuits, and/or or a processing core used to process data (such as computer program instructions).
  • the network device 2000 may also include an output device and an input device.
  • Output devices communicate with processor 2001 and can display information in a variety of ways.
  • the output device may be a liquid crystal display (LCD), a light emitting diode (LED) display device, a cathode ray tube (CRT) display device, or a projector (projector), etc.
  • Input devices communicate with processor 2001 and can receive user input in a variety of ways.
  • the input device may be a mouse, a keyboard, a touch screen device or a sensing device, etc.
  • the memory 2003 is used to store the program code 2010 for executing the solution of the present application
  • the processor 2001 can execute the program code 2010 stored in the memory 2003. That is to say, the network device 2000 can implement the identification method of the service connection provided by the method embodiment through the processor 2001 and the program code 2010 in the memory 2003.
  • Program code 2010 may include one or more software modules.
  • the processor 2001 itself can also store program codes or instructions for executing the solution of the present application.
  • the network device 2000 in the embodiment of the present application may correspond to the first communication device in each of the above method embodiments.
  • the processor 2001 in the network device 2000 reads the instructions in the memory 2003, so that as shown in Figure 14
  • the network device 2000 is capable of performing all or part of the operations performed by the first communication device.
  • the network device 2000 may also correspond to the communication device shown in FIG. 13 above, and each functional module in the communication device is implemented using the software of the network device 2000.
  • the functional modules included in the communication device are generated by the processor 2001 of the network device 2000 after reading the program code 2010 stored in the memory 2003.
  • Each step of the method for identifying a service connection shown in FIG. 8 is completed through an integrated logic circuit of hardware in the processor of the network device 2000 or instructions in the form of software.
  • the steps of the methods disclosed in conjunction with the embodiments of the present application can be directly implemented by a hardware processor for execution, or can be executed by a combination of hardware and software modules in the processor.
  • the software module can be located in random access memory, flash memory, read-only memory, programmable read-only memory or electrically erasable programmable memory, registers and other mature storage media in this field.
  • the storage medium is located in the memory, and the processor reads the information in the memory and completes the steps of the above method in combination with its hardware. To avoid repetition, the details will not be described here.
  • Figure 15 shows a schematic structural diagram of a network device 2100 provided by another exemplary embodiment of the present application.
  • the network device 2100 shown in Figure 15 is used to perform the above-mentioned identification method 400 of service connections shown in Figure 4, Or all or part of the operations involved in the identification method 800 of the service connection shown in FIG. 8 .
  • the network device 2100 is, for example, a switch, a router, etc., and the network device 2100 can be implemented by a general bus architecture.
  • the network device 2100 includes: a main control board 2110 and an interface board 2130.
  • the main control board is also called the main processing unit (MPU) or route processor card.
  • the main control board 2110 is used to control and manage traffic of each component in the network device 2100, including route calculation, equipment Traffic management, equipment maintenance, and protocol processing functions.
  • the main control board 2110 includes: a central processing unit 2111 and a memory 2112.
  • the interface board 2130 is also called a line processing unit (LPU), line card or service board.
  • the interface board 2130 is used to provide various service interfaces and implement data packet forwarding.
  • Business interfaces include but are not limited to Ethernet interfaces, POS (Packet over SONET/SDH) interfaces, etc.
  • Ethernet interfaces are, for example, Flexible Ethernet Clients (FlexE Clients).
  • the interface board 2130 includes: a central processor 2131, a network processor 2132, a forwarding entry memory 2134, and a physical interface card (physical interface card, PIC) 2133.
  • the central processor 2131 on the interface board 2130 is used to control traffic management of the interface board 2130 and communicate with the central processor 2111 on the main control board 2110.
  • the network processor 2132 is used to implement packet forwarding processing.
  • the network processor 2132 may be in the form of a forwarding chip.
  • the forwarding chip can be a network processor (NP).
  • the forwarding chip can be implemented through an application-specific integrated circuit (ASIC) or a field programmable gate array (FPGA).
  • ASIC application-specific integrated circuit
  • FPGA field programmable gate array
  • the network processor 2132 is used to forward the received message based on the forwarding table stored in the forwarding table memory 2134.
  • the message is uploaded to the CPU (such as the central processor 2131) processing; if the destination address of the message is not the address of the network device 2100, the next hop and outbound interface corresponding to the destination address are found from the forwarding table according to the destination address, and the identification of the service connection is to the outbound interface corresponding to the destination address.
  • the processing of uplink packets may include: processing of the packet incoming interface, forwarding table search; and the processing of downlink packets may include: forwarding table search, etc.
  • the central processing unit can also perform the function of the forwarding chip, such as implementing software forwarding based on a general-purpose CPU, so that there is no need for a forwarding chip in the interface board.
  • the physical interface card 2133 is used to implement the docking function of the physical layer.
  • the original traffic enters the interface board 2130 through this, and the processed packets are sent out from the physical interface card 2133.
  • the physical interface card 2133 is also called a daughter card and can be installed on the interface board 2130. It is responsible for converting photoelectric signals into messages and checking the validity of the messages before forwarding them to the network processor 2132 for processing.
  • the central processor 2131 can also perform the functions of the network processor 2132, such as implementing software forwarding based on a general-purpose CPU, so that the network processor 2132 is not required in the physical interface card 2133.
  • the network device 2100 includes multiple interface boards.
  • the network device 2100 also includes an interface board 2140.
  • the interface board 2140 includes: a central processor 2141, a network processor 2142, a forwarding entry memory 2144, and a physical interface card 2143.
  • the functions and implementation methods of each component in the interface board 2140 are the same as or similar to those of the interface board 2130 and will not be described again here.
  • the network device 2100 also includes a switching network board 2120.
  • the switching fabric unit 2120 may also be called a switching fabric unit (switch fabric unit, SFU).
  • SFU switching fabric unit
  • the switching network board 2120 is used to complete data exchange between the interface boards.
  • the interface board 2130 and the interface board 2140 can communicate through the switching network board 2120.
  • the main control board 2110 is coupled with the interface board.
  • the main control board 2110, the interface board 2130, the interface board 2140, and the switching network board 2120 are connected to the system backplane through a system bus to achieve intercommunication.
  • an inter-process communication protocol (IPC) channel is established between the main control board 2110 and the interface board 2130 and the interface board 2140.
  • the main control board 2110 and the interface board 2130 and the interface board 2140 communicate through IPC channels.
  • network device 2100 includes a control plane and a forwarding plane.
  • the control plane includes a main control board 2110 and a central processor 2111.
  • the forwarding plane includes various components that perform forwarding, such as forwarding entry memory 2134, physical interface card 2133, and network processing.
  • the control plane executes functions such as router, generates forwarding tables, processes signaling and protocol messages, configures and maintains the status of network devices.
  • the control plane sends the generated forwarding tables to the forwarding plane.
  • the network processor 2132 is based on the control
  • the forwarding table delivered above looks up the table and forwards the packets received by the physical interface card 2133.
  • the forwarding table delivered by the control plane may be stored in the forwarding table item storage 2134. In some embodiments, the control plane and forwarding plane may be completely separated and not on the same network device.
  • main control boards there may be one or more main control boards, and when there are multiple main control boards, they can include the main main control board and the backup main control board.
  • network equipment can have at least one switching network board, which realizes data exchange between multiple interface boards through the switching network board, providing large-capacity data exchange and processing power. Therefore, the data access and processing capabilities of network equipment with a distributed architecture are greater than those with a centralized architecture.
  • the network device can also be in the form of only one board, that is, there is no switching network board. The functions of the interface board and the main control board are integrated on this board. In this case, the central processor and main control board on the interface board The central processor on the board can be combined into one central processor on this board to perform the superimposed functions of the two.
  • This form of network equipment has low data exchange and processing capabilities (for example, low-end switches or routers, etc. Internet equipment).
  • the specific architecture used depends on the specific networking deployment scenario and is not limited here.
  • the network device 2100 corresponds to the communication device applied to the first communication device shown in FIG. 13 described above.
  • the transceiver module 1301 in the communication device shown in FIG. 13 is equivalent to the physical interface card 2133 in the network device 2100
  • the processing module 1302 is equivalent to the central processor 2111 or the network processor 2132 in the network device 2100.
  • the communication system includes: a first communication device and a second communication device.
  • the first communication device is the network device 2000 shown in FIG. 14 or the network device 2100 shown in FIG. 15
  • the second communication device is the network device 2000 shown in FIG. 14 or the network device 2100 shown in FIG. 15 .
  • An embodiment of the present application also provides a communication device, which includes: a transceiver, a memory, and a processor.
  • the transceiver, the memory and the processor communicate with each other through an internal connection path, the memory is used to store instructions, and the processor is used to execute the instructions stored in the memory to control the transceiver to receive signals and control the transceiver to send signals.
  • the processor executes the instructions stored in the memory, the processor is caused to execute the method required to be executed by the first communication device.
  • An embodiment of the present application also provides a communication device, which includes: a transceiver, a memory, and a processor.
  • the transceiver, the memory and the processor communicate with each other through an internal connection path, the memory is used to store instructions, and the processor is used to execute the instructions stored in the memory to control the transceiver to receive signals and control the transceiver to send signals.
  • the processor executes the instructions stored in the memory, the processor is caused to execute the method required to be executed by the second communication device.
  • processor can be a CPU, or other general-purpose processor, digital signal processing (DSP), application specific integrated circuit (ASIC), field programmable gate array ( field-programmable gate array (FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc.
  • DSP digital signal processing
  • ASIC application specific integrated circuit
  • FPGA field programmable gate array
  • a general-purpose processor can be a microprocessor or any conventional processor, etc. It is worth noting that the processor may be a processor that supports advanced RISC machines (ARM) architecture.
  • ARM advanced RISC machines
  • the above-mentioned memory may include a read-only memory and a random access memory, and provide instructions and data to the processor.
  • Memory may also include non-volatile random access memory.
  • the memory may also store device type information.
  • the memory may be volatile memory or non-volatile memory, or may include both volatile and non-volatile memory.
  • the non-volatile memory can be read-only memory (ROM), programmable ROM (PROM), erasable programmable read-only memory (erasable PROM, EPROM), electrically removable memory.
  • ROM read-only memory
  • PROM programmable ROM
  • EPROM erasable programmable read-only memory
  • Erase programmable read-only memory electrically EPROM, EEPROM
  • Volatile memory may be random access memory (RAM), which is used as an external cache. By way of example but not is a restrictive note, many forms of RAM are available.
  • static random access memory static random access memory
  • dynamic random access memory dynamic random access memory
  • DRAM dynamic random access memory
  • SDRAM synchronous dynamic random access memory
  • double data rate synchronous dynamic random access Memory double data rate SDRAM, DDR SDRAM
  • enhanced synchronous dynamic random access memory enhanced SDRAM, ESDRAM
  • synchronous link dynamic random access memory direct rambus RAM, DR RAM
  • Embodiments of the present application also provide a computer-readable storage medium, in which at least one instruction is stored, and the instruction is loaded and executed by the processor, so that the computer implements the identification method of a business connection as described above.
  • Embodiments of the present application also provide a computer program (product).
  • the computer program When the computer program is executed by a computer, it can cause the processor or computer to execute corresponding steps and/or processes in the above method embodiments.
  • An embodiment of the present application also provides a chip, including a processor, configured to call from a memory and run instructions stored in the memory, so that the communication device installed with the chip performs any of the above-mentioned business connections. Identification method.
  • An embodiment of the present application also provides another chip, including: a communication interface and a processor, based on the communication interface and the processor, the method in the above method embodiment is executed.
  • the communication interface is used to perform receiving and/or sending related operations, and the processor is used to perform other operations other than sending and receiving operations.
  • the communication interface may be, for example, an interface circuit, and the processor may be, for example, a processing circuit.
  • the chip further includes a memory, the communication interface, the processor and the memory are connected through internal connection paths, and the processor is used to execute the code in the memory.
  • the processor is configured to execute any of the above-mentioned identifying methods for service connections.
  • the computer program product includes one or more computer instructions.
  • the computer may be a general-purpose computer, a special-purpose computer, a computer network, or other programmable device.
  • the computer instructions may be stored in or transmitted from one computer-readable storage medium to another, e.g., the computer instructions may be transferred from a website, computer, server, or data center Transmission to another website, computer, server or data center through wired (such as coaxial cable, optical fiber, digital subscriber line) or wireless (such as infrared, wireless, microwave, etc.) means.
  • the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that contains one or more available media integrated therein.
  • the available media may be magnetic media (eg, floppy disk, hard disk, magnetic tape), optical media (eg, DVD), or semiconductor media (eg, solid state disk), etc.
  • the program can be stored in a computer-readable storage medium.
  • the storage medium mentioned above may be a read-only memory, a magnetic disk or an optical disk, etc.
  • the computer program product includes one or more computer program instructions.
  • methods of embodiments of the present application may be described in the context of machine-executable instructions, such as included in a program module executing in a device on a target's real or virtual processor.
  • program modules include routines, programs, libraries, objects, classes, components, data structures, etc., which perform specific tasks or implement specific abstract data structures.
  • the functionality of program modules may be combined or split between the described program modules.
  • Machine-executable instructions for program modules can execute locally or on a distributed device. In a distributed device, program modules can be located in both local and remote storage media.
  • Computer program codes for implementing the methods of embodiments of the present application may be written in one or more programming languages. These computer program codes may be provided to a processor of a general-purpose computer, a special-purpose computer, or other programmable data processing device, so that when executed by the computer or other programmable data processing device, the program code causes the flowcharts and/or block diagrams to be displayed. The functions/operations specified in are implemented.
  • the program code may execute entirely on the computer, partly on the computer, as a stand-alone software package, partly on the computer and partly on a remote computer or entirely on the remote computer or server.
  • the computer program code or related data may be carried by any appropriate carrier, so that the device, device or processor can perform the various processes and operations described above.
  • Examples of carriers include signals, computer-readable media, and the like.
  • Examples of signals may include electrical, optical, radio, acoustic, or other forms of propagated signals, such as carrier waves, infrared signals, and the like.
  • a machine-readable medium may be any tangible medium that contains or stores a program for or in connection with an instruction execution system, apparatus, or device.
  • the machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium.
  • Machine-readable media may include, but are not limited to, electronic, magnetic, optical, electromagnetic, infrared or semiconductor systems, devices or devices, or any suitable combination thereof. More detailed examples of machine-readable storage media include an electrical connection with one or more wires, laptop computer disk, hard drive, random memory accessor (RAM), read-only memory (ROM), erasable programmable read-only memory Memory (EPROM or flash memory), optical storage device, magnetic storage device, or any suitable combination thereof.
  • the disclosed systems, devices and methods can be implemented in other ways.
  • the device embodiments described above are only illustrative.
  • the division of the modules is only a logical function division. In actual implementation, there may be other division methods.
  • multiple modules or components may be combined or may be Integrated into another system, or some features can be ignored, or not implemented.
  • the coupling or direct coupling or communication connection between each other shown or discussed may be indirect coupling or communication connection through some interfaces, devices or modules, or may be electrical, mechanical or other forms of connection.
  • the modules described as separate components may or may not be physically separated.
  • the components shown as modules may or may not be physical modules, that is, they may be located in one place, or they may be distributed to multiple network modules. Some or all of the modules can be selected according to actual needs to achieve the purpose of the embodiments of the present application.
  • each functional module in each embodiment of the present application can be integrated into one processing module, or each module can exist physically alone, or two or more modules can be integrated into one module.
  • the above integrated modules can be implemented in the form of hardware or software function modules.
  • the integrated module is implemented in the form of a software function module and sold or used as an independent product, it can be saved Stored in a computer-readable storage medium.
  • the technical solution of the present application is essentially or part of the contribution to the existing technology, or all or part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium , including several instructions to cause a computer device (which can be a personal computer, a server, or a network device, etc.) to execute all or part of the steps of the methods in various embodiments of the present application.
  • the aforementioned storage media include: U disk, mobile hard disk, read-only memory (ROM), random access memory (RAM), magnetic disk or optical disk and other media that can store program code. .
  • first, second and other words are used to distinguish the same or similar items with basically the same functions and functions. It should be understood that the terms “first”, “second” and “nth” There is no logical or sequential dependency, and there is no limit on the number or execution order. It should also be understood that, although the following description uses the terms first, second, etc. to describe various elements, these elements should not be limited by the terms. These terms are only used to distinguish one element from another. For example, a first route may be referred to as a second route, and similarly, a second route may be referred to as a first route, without departing from the scope of various described examples. Both the first route and the second route may be routes, and in some cases, may be separate and distinct routes.
  • the size of the sequence number of each process does not mean the order of execution.
  • the execution order of each process should be determined by its function and internal logic, and should not be determined by the execution order of the embodiments of the present application.
  • the implementation process constitutes no limitation.
  • determining B based on A does not mean determining B only based on A, and B can also be determined based on A and/or other information.
  • references throughout this specification to "one embodiment,””anembodiment,” and “a possible implementation” mean that specific features, structures, or characteristics related to the embodiment or implementation are included herein. In at least one embodiment of the application. Therefore, “in one embodiment” or “in an embodiment” or “a possible implementation” appearing in various places throughout this specification do not necessarily refer to the same embodiment. Furthermore, these specific features, structures or characteristics may be combined in any suitable manner in one or more embodiments.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

La présente invention concerne le domaine technique des communications. L'invention concerne un procédé, un appareil et un système permettant d'identifier une connexion de service, ainsi qu'un support de stockage. Le procédé comprend : un premier appareil de communication recevant un premier itinéraire publié par un second appareil de communication et utilisé pour établir une connexion de service entre le premier appareil de communication et le second appareil de communication ; et en fonction des informations de routage du premier appareil de communication et des informations de routage du second appareil de communication contenues dans le premier itinéraire reçu, générant un premier FID correspondant à la connexion de service, dans lequel le premier FID est utilisé pour identifier un premier flux de service envoyé par le premier appareil de communication au second appareil de communication, et le premier FID comprend les informations de routage du premier appareil de communication et les informations de routage du second appareil de communication. Selon un itinéraire d'établissement d'une connexion de service, un FID correspondant à la connexion de service est généré, de sorte que le FID correspondant à la connexion de service est automatiquement généré avec le processus d'établissement de la connexion de service ; et par rapport à un mode de configuration statique, l'opération est plus simple, et l'efficacité de la génération du FID est plus élevée.
PCT/CN2023/081997 2022-03-21 2023-03-16 Procédé, appareil et système d'identification de la connexion de service et moyen de stockage WO2023179457A1 (fr)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
CN202210281721 2022-03-21
CN202210281721.9 2022-03-21
CN202210575954.XA CN116828024A (zh) 2022-03-21 2022-05-24 业务连接的标识方法、装置、系统及存储介质
CN202210575954.X 2022-05-24

Publications (1)

Publication Number Publication Date
WO2023179457A1 true WO2023179457A1 (fr) 2023-09-28

Family

ID=88099876

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/081997 WO2023179457A1 (fr) 2022-03-21 2023-03-16 Procédé, appareil et système d'identification de la connexion de service et moyen de stockage

Country Status (1)

Country Link
WO (1) WO2023179457A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117155826A (zh) * 2023-10-31 2023-12-01 新华三技术有限公司 一种网络流量的检测方法、装置、电子设备和存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200329129A1 (en) * 2017-12-27 2020-10-15 Huawei Technologies Co., Ltd. Packet Processing Method, Network Node, and System
CN112448887A (zh) * 2019-09-04 2021-03-05 华为技术有限公司 分段路由方法及装置
CN113556259A (zh) * 2020-04-24 2021-10-26 华为技术有限公司 一种基于随流检测的报文处理方法及装置
CN113949650A (zh) * 2020-07-17 2022-01-18 华为技术有限公司 随流检测方法及相关设备

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200329129A1 (en) * 2017-12-27 2020-10-15 Huawei Technologies Co., Ltd. Packet Processing Method, Network Node, and System
CN112448887A (zh) * 2019-09-04 2021-03-05 华为技术有限公司 分段路由方法及装置
CN113556259A (zh) * 2020-04-24 2021-10-26 华为技术有限公司 一种基于随流检测的报文处理方法及装置
CN113949650A (zh) * 2020-07-17 2022-01-18 华为技术有限公司 随流检测方法及相关设备

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117155826A (zh) * 2023-10-31 2023-12-01 新华三技术有限公司 一种网络流量的检测方法、装置、电子设备和存储介质
CN117155826B (zh) * 2023-10-31 2024-02-23 新华三技术有限公司 一种网络流量的检测方法、装置、电子设备和存储介质

Similar Documents

Publication Publication Date Title
CN115362662B (zh) 智能网络接口卡的流量管理
US8913613B2 (en) Method and system for classification and management of inter-blade network traffic in a blade server
US10567293B1 (en) Mechanism to coordinate end to end quality of service between network nodes and service provider core
WO2021135468A1 (fr) Dispositif et procédé de détermination d'identifiant de segment
WO2022001835A1 (fr) Procédé et appareil d'envoi de message, ainsi que dispositif de réseau, système et support de stockage
CN114244906B (zh) 数据流量分流方法、装置、设备及介质
CN114553760B (zh) 路径权重分配方法以及装置
CN108289061B (zh) 基于sdn的业务链拓扑系统
CN106998347A (zh) 服务器虚拟化网络共享的装置和方法
WO2019033964A1 (fr) Procédé de transmission de paquet, dispositif d'acheminement, contrôleur et système
WO2023179457A1 (fr) Procédé, appareil et système d'identification de la connexion de service et moyen de stockage
WO2022111666A1 (fr) Procédé, appareil et système d'annonce d'itinéraire
WO2022068744A1 (fr) Procédé d'obtention d'informations d'en-tête de message et de génération de message, dispositif et support de stockage
WO2022160665A1 (fr) Procédé de transfert de paquets, procédé de traitement de paquets et dispositif
CN111130978B (zh) 网络流量转发方法、装置、电子设备及机器可读存储介质
CN116828024A (zh) 业务连接的标识方法、装置、系统及存储介质
WO2022042403A1 (fr) Procédé de génération d'informations de routage, procédé d'envoi d'informations de localisation, procédé de transfert de message et dispositif
CN117097818A (zh) 一种报文处理的方法及相关设备
CN114513485A (zh) 获取映射规则的方法、装置、设备、系统及可读存储介质
US11743180B2 (en) System and method for routing traffic onto an MPLS network
WO2024027194A1 (fr) Procédé, dispositif et système de transfert de message, et support de stockage
CN115242699A (zh) 报文传输方法、切片生成方法、装置及系统
CN114221895A (zh) 传输数据的方法、装置及网络设备
WO2022194193A1 (fr) Procédé et appareil d'acquisition de chemin
US20180367446A1 (en) Dual network interface implementation in multipath networking

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23773705

Country of ref document: EP

Kind code of ref document: A1