WO2023280004A1 - Procédé de configuration de réseau, dispositif et système - Google Patents
Procédé de configuration de réseau, dispositif et système Download PDFInfo
- Publication number
- WO2023280004A1 WO2023280004A1 PCT/CN2022/101726 CN2022101726W WO2023280004A1 WO 2023280004 A1 WO2023280004 A1 WO 2023280004A1 CN 2022101726 W CN2022101726 W CN 2022101726W WO 2023280004 A1 WO2023280004 A1 WO 2023280004A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- delay
- data flow
- forwarding
- shaper
- information
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 107
- 230000005540 biological transmission Effects 0.000 claims abstract description 171
- 238000012545 processing Methods 0.000 claims description 79
- 238000007493 shaping process Methods 0.000 claims description 54
- 238000009826 distribution Methods 0.000 claims description 20
- 238000012937 correction Methods 0.000 claims description 11
- 238000004422 calculation algorithm Methods 0.000 claims description 10
- 230000001934 delay Effects 0.000 claims description 10
- 238000009825 accumulation Methods 0.000 claims description 8
- 230000004044 response Effects 0.000 claims description 6
- 230000001902 propagating effect Effects 0.000 claims description 5
- 230000006870 function Effects 0.000 description 18
- 238000010586 diagram Methods 0.000 description 16
- 230000015654 memory Effects 0.000 description 16
- 230000008569 process Effects 0.000 description 15
- 238000003860 storage Methods 0.000 description 14
- 238000004364 calculation method Methods 0.000 description 9
- 238000004891 communication Methods 0.000 description 8
- 238000005516 engineering process Methods 0.000 description 8
- 238000007726 management method Methods 0.000 description 7
- 238000005070 sampling Methods 0.000 description 7
- 239000004744 fabric Substances 0.000 description 5
- 238000013507 mapping Methods 0.000 description 5
- 238000007781 pre-processing Methods 0.000 description 5
- 230000008878 coupling Effects 0.000 description 4
- 238000010168 coupling process Methods 0.000 description 4
- 238000005859 coupling reaction Methods 0.000 description 4
- 230000001186 cumulative effect Effects 0.000 description 4
- 238000013461 design Methods 0.000 description 3
- 239000013307 optical fiber Substances 0.000 description 3
- 238000012546 transfer Methods 0.000 description 3
- NAWXUBYGYWOOIX-SFHVURJKSA-N (2s)-2-[[4-[2-(2,4-diaminoquinazolin-6-yl)ethyl]benzoyl]amino]-4-methylidenepentanedioic acid Chemical compound C1=CC2=NC(N)=NC(N)=C2C=C1CCC1=CC=C(C(=O)N[C@@H](CC(=C)C(O)=O)C(O)=O)C=C1 NAWXUBYGYWOOIX-SFHVURJKSA-N 0.000 description 2
- 230000005856 abnormality Effects 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 2
- 230000003190 augmentative effect Effects 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 230000002452 interceptive effect Effects 0.000 description 2
- 230000001960 triggered effect Effects 0.000 description 2
- 230000002159 abnormal effect Effects 0.000 description 1
- 230000002776 aggregation Effects 0.000 description 1
- 238000004220 aggregation Methods 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 239000002131 composite material Substances 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 125000004122 cyclic group Chemical group 0.000 description 1
- 238000013075 data extraction Methods 0.000 description 1
- 230000003247 decreasing effect Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000000737 periodic effect Effects 0.000 description 1
- 238000003672 processing method Methods 0.000 description 1
- 238000001356 surgical procedure Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/10—Flow control; Congestion control
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
- H04W24/02—Arrangements for optimising operational condition
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
- H04W28/16—Central resource management; Negotiation of resources or communication parameters, e.g. negotiating bandwidth or QoS [Quality of Service]
- H04W28/18—Negotiating wireless communication parameters
- H04W28/20—Negotiating bandwidth
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
- H04W28/16—Central resource management; Negotiation of resources or communication parameters, e.g. negotiating bandwidth or QoS [Quality of Service]
- H04W28/24—Negotiating SLA [Service Level Agreement]; Negotiating QoS [Quality of Service]
Definitions
- the present application relates to the technical field of communications, and in particular to a network configuration method, device and system.
- a shaper (shaper) is used to adjust the transmission rate and other aspects of the data stream transmitted in the network.
- the data flow burst can be limited by the shaper, so as to realize relatively stable data flow transmission, prevent problems such as network congestion or transmission jitter, and meet the business requirements of data flow transmission.
- the ultra-reliable low-latency communication (URLLC) multi-service of the fifth-generation (5G) technology has strict requirements on the quality of service (QoS) .
- QoS quality of service
- services of different service types have different service requirements that need to be met. It is necessary for the network to reasonably allocate network resources based on business requirements to meet the corresponding business requirements of different business types.
- the shaper parameters used to adjust the data flow in the shaper are relatively fixed, so that the data flow adjusted based on the shaper parameters cannot meet the service requirements in some business scenarios. How to determine the shaper parameters of the shaper to meet the business requirements of data stream transmission is a technical problem that needs to be solved.
- the embodiment of the present application provides a network configuration method, device and system, which can determine the shaper parameters according to the traffic collection information of the data flow and the service level agreement (service level agreement, SLA) information corresponding to the data flow, so that the shaper parameters can be used
- SLA service level agreement
- a network configuration method comprising: a first device acquires traffic collection information corresponding to a data flow, and determines the shaping of the shaper based on the obtained traffic collection information and the SLA information corresponding to the data flow device parameters.
- the shaper parameter is used to configure the shaper, so that the shaper adjusts the data flow to meet the transmission requirements indicated by the SLA information.
- the shaper parameters determined according to the traffic collection information of the data stream and the corresponding SLA information of the data stream are more compatible with the data stream and the SLA information of the data stream, and can realize the shaping process of the data stream through the shaper more accurately, so that the processing The subsequent data flow meets the transmission requirements indicated by the SLA information.
- the first device first determines the target bandwidth, and then determines the shaper parameters according to the target bandwidth.
- the first device determines a target bandwidth based on the acquired traffic collection information of the data flow and SLA information corresponding to the data flow, and determines a shaper parameter according to the target bandwidth.
- the target bandwidth is the minimum value of the available bandwidth for transmitting the data flow on the premise of meeting the transmission requirements indicated by the SLA information. Based on the target bandwidth, more accurate shaper parameters can be determined, so that the adjusted data flow can meet the transmission requirements indicated by the SLA information corresponding to the data flow.
- the first device may first determine the range of the target bandwidth, and then select the target bandwidth from within the range of the target bandwidth.
- the first device first determines the range of the target bandwidth according to the traffic collection information, and then determines the target bandwidth within the range of the target bandwidth according to the SLA information corresponding to the data flow.
- the range of the target bandwidth determined based on the flow collection information may be matched with the data flow.
- the target bandwidth matching the SLA information corresponding to the data flow is determined within the range of the target bandwidth. Therefore, the target bandwidth matching the data flow and the SLA information corresponding to the data flow can be obtained, so as to meet the transmission requirement indicated by the SLA information.
- the first device may determine the range of the target bandwidth in the following two manners.
- the first device determines the range of the target bandwidth according to the reference value of the target bandwidth and the correction value of the target bandwidth.
- the reference value of the target bandwidth is determined according to the traffic collection information, and the correction value of the target bandwidth indicates the amount of fluctuation of the target bandwidth relative to the reference value.
- the first device determines the range of the target bandwidth based on a distribution fitting algorithm and traffic collection information.
- the flow collection information includes the length of packets of the data flow in multiple collection periods.
- the first device may determine the burst volume of the data stream according to the acquired traffic collection information of the data stream, and then calculate the target bandwidth by using the burst volume and SLA information corresponding to the data stream.
- the burst amount is the length of the message corresponding to each acquisition period among the plurality of acquisition periods.
- the first device when the degree of congestion is greater than the threshold, the first device adopts one or more of the following three ways to adjust to meet the transmission requirements indicated by the SLA information and the degree of congestion is less than or equal to the threshold .
- the degree of congestion is determined according to the remaining capacity of the forwarding device.
- the remaining capacity refers to the remaining forwarding capability of the forwarding device when the committed forwarding delay of the forwarding device is guaranteed.
- the committed forwarding delay is the preset delay for data streams waiting to be processed in the forwarding device.
- the first device adjusts the SLA information, so that the shaper parameters determined according to the traffic collection information and the adjusted SLA information adjust the data flow.
- the first device adjusts the queue into which the data flow enters.
- the first device adjusts the transmission path of the data flow, so that the data flow is transmitted through the transmission path of the data flow.
- the first device adopts one or more of the following three ways to adjust to meet the transmission requirement indicated by the SLA information.
- the first device adjusts the SLA information, so that the shaper parameters determined according to the traffic collection information and the adjusted SLA information adjust the data flow.
- the first device adjusts the queue into which the data flow enters.
- the first device adjusts the transmission path of the data flow, so that the data flow is transmitted through the transmission path of the data flow.
- the SLA information includes the upper bound of the target delay, and the upper bound of the target delay indicates the upper bound of the delay of the data flow from the source end to the destination end.
- the target delay includes shaping delay
- the shaping delay indicates the delay during processing of the data flow in the shaper.
- the target delay further includes one or more of a fixed delay and a network forwarding delay
- the fixed delay includes one or more of a propagation delay, a device processing delay, and a port delay.
- the propagation delay is the delay of the data stream propagating in the transmission medium
- the device processing delay is the delay of the device processing the data stream
- the port transmission delay is the delay of transmitting the data stream through the port.
- the network forwarding delay is the preset delay for the data flow waiting to be processed in the forwarding device during the process from the source end to the destination end.
- the network forwarding delay indicates the sum of committed forwarding delays of multiple forwarding devices transmitting data streams, where the committed forwarding delay is a preset delay for data streams waiting to be processed in the forwarding devices.
- the network forwarding delay is determined according to preset forwarding bandwidths of multiple forwarding devices transmitting data streams, and the preset forwarding bandwidth is the preset bandwidth of data streams forwarded by the forwarding devices.
- the target delay further includes one or more of a fixed delay and an actual forwarding delay
- the actual forwarding delay indicates a delay for a data flow from the source end to the destination end to be processed in the forwarding device.
- the SLA information includes a cache upper bound
- the cache upper bound is a minimum value of an available cache of a device including a shaper among devices transmitting data streams.
- the SLA information further includes a reliability probability, where the reliability probability is a probability of meeting a transmission requirement indicated by the SLA information corresponding to the data flow.
- the first device may acquire the traffic collection information of the data flow through the second device.
- the second device generates traffic collection information of the data flow, and sends it to the first device.
- the second device is a device for transmitting data streams.
- the first device may acquire traffic collection information of the data flow collected and generated by the first device.
- the flow collection information includes statistical values of packet lengths of the data flow in multiple collection periods.
- the statistical value includes an average value, and the average value indicates the length of the plurality of packets in the collected data stream and the ratio of the number of collection cycles for collecting the plurality of packets.
- the statistical value further includes one or more of second-order moments and fourth-order moments.
- the second-order moment indicates the ratio of the sum of the squares of the lengths of multiple packets in the collected data stream to the number of collection cycles experienced in collecting the multiple packets.
- the fourth moment indicates the ratio of the sum of the fourth powers of the lengths of multiple packets in the collected data stream to the number of collection cycles experienced in collecting the multiple packets.
- the first device may send the shaper parameter to the third device.
- the third device is a device for transporting data streams including a shaper.
- the first device is a control device or a device for transmitting data streams.
- control device is a central network control CNC device.
- the shaper parameters include at least one of token bucket depth and token generation rate.
- the shaper parameters include at least one of a credit accumulation rate and a credit consumption rate.
- a first device in a second aspect, has a function of implementing the behavior of the first device in the above method.
- the functions may be implemented based on hardware, or corresponding software may be implemented based on hardware.
- Hardware or software includes one or more modules corresponding to the above-mentioned functions.
- the first device includes: an acquisition unit and a processing unit. Wherein, the acquiring unit is configured to acquire traffic collection information of the data stream.
- the processing unit is configured to determine the shaper parameters according to the traffic collection information and the SLA information corresponding to the data flow, and the shaper parameters are used by the shaper to adjust the data flow to meet the transmission requirements indicated by the SLA information.
- the structure of the first device includes a processor and an interface, and the processor is configured to support the first device to perform corresponding functions in the foregoing method.
- the interface is used to support the communication between the first device and the second device, and receives the information or instructions involved in the above method from the second device, and the interface is also used to support the communication between the first device and the third device, and sends the information to the second device.
- the third device sends the information or instructions involved in the above methods.
- the first device may further include a memory for coupling with the processor, which stores necessary program instructions and data of the first device.
- the first device includes: a processor, a transmitter, a receiver, a random access memory, a read only memory, and a bus.
- the processor is respectively coupled to the transmitter, the receiver, the random access memory and the read-only memory through the bus.
- the basic input/output system solidified in the read-only memory or the bootloader boot system in the embedded system is started to guide the first device into a normal operation state. After the first device enters the normal running state, run the application program and the operating system in the random access memory, so that the processor executes the method in the first aspect or any possible implementation manner of the first aspect.
- a first device in a third aspect, includes: a main control board and an interface board, and may further include a switching fabric board.
- the first device is configured to execute the method in the first aspect or any possible implementation manner of the first aspect.
- the first device includes a module for executing the method in the first aspect or any possible implementation manner of the first aspect.
- a first device in a fourth aspect, includes a controller and a first forwarding sub-device.
- the first forwarding sub-device includes: an interface board, and may further include a switching fabric board.
- the first forwarding sub-device is configured to perform the function of the interface board in the third aspect, and further, may also perform the function of the switching fabric board in the third aspect.
- the controller includes receiver, processor, transmitter, random access memory, read only memory and bus. Wherein, the processor is respectively coupled to the receiver, the transmitter, the random access memory and the read-only memory through the bus.
- the basic input/output system solidified in the read-only memory or the bootloader boot system in the embedded system is started to guide the controller into a normal operation state.
- the application program and the operating system are run in the random access memory, so that the processor executes the functions of the main control board in the third aspect.
- a computer storage medium which is used to store the programs, codes or instructions used by the above-mentioned first device.
- the processor or hardware device executes these programs, codes or instructions, the first aspect in the above-mentioned first aspect can be completed.
- a function or step of a device is provided, which is used to store the programs, codes or instructions used by the above-mentioned first device.
- a network system includes a first device and a second device.
- the second device is a device for transmitting data streams.
- the second device is configured to collect traffic collection information of the data stream, and send the traffic collection information of the data stream to the first device.
- the first device is configured to receive traffic collection information of the data stream sent by the second device, and is further configured to determine shaper parameters according to the traffic collection information and SLA information corresponding to the data stream.
- the shaper parameters are used by the shaper to adjust the data flow to meet the transmission requirements indicated by the SLA information.
- the network system further includes a third device.
- the first device is further configured to send the shaper parameter to the third device.
- the third device is configured to receive the shaper parameters sent by the first device, and configure the shaper according to the shaper parameters.
- the third device is a device for transporting data streams including a shaper.
- the first device can obtain the shaper parameters corresponding to the data flow and the SLA information of the data flow according to the traffic collection information of the data flow and the SLA information corresponding to the data flow, and can achieve relatively accurate data shaping through the shaper.
- the flow is shaped so that the processed data flow meets the transmission requirements indicated by the SLA information.
- the parameters of the shaper can be more accurately and flexibly matched with the service requirements corresponding to the data flow, and the differentiated guarantee for the service requirements of the data flow of different service types can be realized.
- FIG. 1 is a schematic diagram of a network architecture provided by an embodiment of the present application.
- FIG. 2 is a schematic diagram of another network architecture provided by an embodiment of the present application.
- FIG. 3 is an interactive schematic diagram of a network configuration method provided in an embodiment of the present application.
- FIG. 4 is a schematic diagram of a message format carrying SLA information of a data flow provided by an embodiment of the present application
- FIG. 5 is a schematic flowchart of a network configuration method provided in an embodiment of the present application.
- FIG. 6 is a schematic structural diagram of a first device according to an embodiment of the present application.
- FIG. 7 is a schematic diagram of a hardware structure of a first device according to an embodiment of the present application.
- FIG. 8 is a schematic diagram of a hardware structure of another first device according to an embodiment of the present application.
- the transmitted data flow may be a dynamic data flow, which has a certain degree of burstiness, randomness and dynamics.
- the dynamic data flow may be, for example, a data flow with relatively large traffic fluctuations within a certain period of time, or a data flow with relatively large transmission rate fluctuations, or a data flow that causes micro-bursts to occur on the network. If the data stream is directly transmitted, it is easy to cause problems such as network congestion or transmission jitter, and it is difficult to meet the service requirements corresponding to the data stream. Therefore, it is necessary to shape the data stream so that the processed data stream has a relatively definite maximum burst and a relatively stable transmission rate, reduce possible network problems during data stream transmission, and meet the corresponding business requirements of the data stream .
- a shaper may be used to perform shaping processing on the data stream.
- the shaper is used to adjust the traffic and burst of the data flow, so that the data flow shaped by the shaper is transmitted at a relatively uniform speed.
- Shapers include shaper parameters that indicate shaping adjustments.
- the parameters of the shaper are mainly determined based on the data flow transmission requirements of the source, and a certain amount of manual intervention and adjustment is performed based on experience, so the parameters of the shaper are relatively fixed.
- the data flow shaped by the shaper cannot meet the service requirements well, and it is difficult to adapt to the actual needs of the network.
- embodiments of the present application provide a network configuration method, device, and system, which determine shaper parameters by acquiring traffic collection information of a data flow and SLA information corresponding to the data flow.
- the determined shaper parameters adjust the data flow more accurately to ensure that the data flow shaped by the shaper meets the transmission requirements of the corresponding SLA information indication of the data flow, and realize the provision of corresponding SLA information indication based on different data flows Differentiated guarantees for transport requirements.
- the SLA information includes service level parameters.
- the service level parameter may indicate the service index to be achieved by the specific network service.
- the service level parameter may be the upper bound of the target delay, and the upper bound of the target delay is used to indicate the upper bound of the transmission delay of the data flow from the source end to the destination end.
- the service level parameter may also be a cache upper bound, and the cache upper bound is used to indicate the minimum value of the available cache of the device transmitting the data stream.
- the SLA information may also include the reliability probability of transmitting the data flow meeting the service level parameter. For example, if the SLA information includes the upper bound of the target delay, the SLA information may further include a reliability probability that the delay is less than or equal to the upper bound of the target delay when the data stream is transmitted. If the SLA information includes the cache upper bound, the SLA information may further include a reliability probability that the available cache of the device transmitting the data stream is greater than or equal to the cache upper bound.
- the network configuration method proposed in the embodiment of the present application can be applied to URLLC scenarios in 5G, and these scenarios need to meet service requirements of high reliability and low latency.
- the solutions in the embodiments of this application can be used to provide highly reliable bounded delay guarantees for smart grid differential protection services, and can also provide highly reliable, bounded delay guarantees for service flows of control services in campus networks. Latency forwarding service. It can also be used in smart factories, based on wired Ethernet or wireless networks, to provide high-reliability bounded delay guarantees for sensors to collect business traffic, industrial control traffic, and video surveillance traffic.
- the network 100 shown in FIG. 1 includes a control device 101 and network devices 102-104.
- the sending end device 105 is the source end device for sending the data flow
- the receiving end device 106 is the destination end device for the data flow.
- the network devices 102 - 104 are forwarding devices on the transmission path of the data flow, and are used to send the data flow from the sending end device 105 to the receiving end device 106 in the network 100 .
- the network device 102 and the network device 104 are edge nodes of the network, and the network device 103 is connected to the network device 102 and the network device 104 respectively.
- FIG. 1 is only a schematic diagram of an exemplary system architecture of the embodiment of the present application, and should not limit the network architecture of this solution.
- the network 100 in FIG. forwarding device may further include multiple subnets, and each subnet includes one or more forwarding devices.
- the sending end device 105 and the receiving end device 106 in FIG. 1 may be terminal devices or servers.
- Terminal equipment also known as user equipment (UE), mobile station (mobile station, MS), mobile terminal (mobile terminal, MT), terminal, etc.
- UE user equipment
- MS mobile station
- MT mobile terminal
- terminal etc.
- UE user equipment
- device or a chip set in the device, for example, a handheld device with a wireless connection function, a vehicle-mounted device, and the like.
- examples of some terminal devices are: mobile phones, desktop computers, tablet computers, notebook computers, handheld computers, mobile internet devices (mobile internet device, MID), wearable devices, virtual reality (virtual reality, VR) equipment, augmented reality (augmented reality, AR) equipment, wireless terminals in industrial control, wireless terminals in self driving, wireless terminals in remote medical surgery, smart grid Wireless terminals in transportation safety, wireless terminals in smart city, wireless terminals in smart home, and home gateway devices supporting 5G access (5G-residential gateway) , 5G-RG) etc.
- mobile internet device mobile internet device, MID
- wearable devices virtual reality (virtual reality, VR) equipment, augmented reality (augmented reality, AR) equipment, wireless terminals in industrial control, wireless terminals in self driving, wireless terminals in remote medical surgery, smart grid Wireless terminals in transportation safety, wireless terminals in smart city, wireless terminals in smart home, and home gateway devices supporting 5G access (5G-residential gateway) , 5G-RG) etc.
- VR virtual reality
- AR augmented reality
- the network devices 102-104 in FIG. 1 can be in the form of hardware or a combination of software and hardware, and can be an independent device, such as a switch, a router, and other devices with forwarding functions, or it can be a server deploying a virtual router or a virtual switch, or it can be It is a functional module or a combination of multiple functional modules on a network device, which can be selected and designed according to specific scenario requirements.
- the network devices 102 - 104 are used to forward the data flow in the network 100 .
- the control device 101 in FIG. 1 may specifically be a central network control (Central Network Controller, CNC) device.
- CNC Central Network Controller
- the control device may be an independent physical device as shown in FIG. 1 , that is, it is physically independent from the network devices 102-104. Referring to FIG. 2 , the control device can also be integrated as a functional unit on any one of the network devices 102 - 104 , or on the sending end device 105 , or on the receiving end device 106 . The control device can also be split into several sub-functional units and deployed on the devices 102-106 in a distributed manner. As long as the control device has logically corresponding calculation, management and control functions, the embodiment of the present application does not limit the existence form of the control device.
- FIG. 3 is an interactive schematic diagram of a network configuration method provided in the embodiment of the present application.
- the network configuration method provided in the embodiment of the present application includes the following steps:
- S301 The second device generates traffic collection information of a data stream.
- the second device is a device for transmitting data streams.
- the second device may be any of the network devices 102 - 104 , the sending end device 105 , and the receiving end device 106 in FIG. 1 .
- the second device collects the transmitted data flow to obtain traffic collection information of the data flow.
- the data flow may be a single service flow, or may be an aggregation flow obtained by converging multiple service flows.
- the traffic collection information of the data flow changes in real time along with the data flow.
- the flow collection information may include the length of the packet in at least one collection period of the data flow.
- the counting unit of the acquisition period may be a time unit such as microsecond (microsecond, ⁇ s), millisecond (millisecond, ms), or second (second, s).
- the counting unit of the message length is bit (binary digit, BIT) or byte (byte).
- Method 1 Make statistics on the packet length of the data stream in each collection cycle.
- the second device collects the accumulated packet length in the data stream at a collection period ⁇ T k to obtain the sequence A k .
- ⁇ T k T k ⁇ T k-1
- T k is the sampling time
- k 1, . . . , N
- N is the number of samples.
- the collection period ⁇ T k can be a constant value ⁇ T or a variable value, which can be specifically set according to the collection requirements of the data stream.
- the acquisition period ⁇ T may be a constant value of 100ms.
- Method 2 Determine the packet length of the data stream in each collection cycle according to the time stamp and packet length of the obtained packet.
- the second device obtains the time stamp and the packet length of each packet. According to the time stamp of each message, determine the collection period to which the message belongs. Then, according to the message length of each message, the cumulative message length of the data stream in each collection period is determined.
- the second device obtains the time stamp t j and the packet length B j of each packet in the data stream.
- j is the number of packets in the obtained data stream.
- the lengths of the packets corresponding to the time stamps belonging to the collection period ⁇ T k are accumulated to obtain the cumulative packet length A k within the collection period ⁇ T k , expressed as ⁇ sampling time T k , cumulative packet length A k ⁇ .
- the accumulative message length A k represents the sum of the message lengths sampled at the sampling time T k , and can also be understood as the number of messages arriving between the last sampling time T k-1 and the current sampling time, that is, ⁇ T k sum of text lengths.
- the sampling time and the cumulative message length ⁇ T k , A k ⁇ can be stored in a double-precision format, and the storage space occupied by the sampling data of N points is 8 byte*2*N.
- Method 2 can obtain a relatively comprehensive timestamp and packet length of each packet in the data stream, making it more flexible to obtain traffic collection information of the data stream, and also facilitates the analysis based on the timestamp and packet length of each packet The accumulated packet length in the collection cycle is determined.
- the second device may first preprocess the lengths of packets of the collected data streams in multiple collection periods to obtain multiple collection Statistical value of the length of packets in a period.
- the statistical value includes an average value of the lengths of the packets in multiple collection periods, and the average value indicates the ratio of the lengths of the multiple packets in the collected data stream to the number of collection cycles experienced in collecting the multiple packets.
- statistical values may also include statistical values such as second-order moments, covariance, and fourth-order moments.
- the second-order moment indicates the ratio of the sum of the squares of the lengths of multiple packets in the collected data stream to the number of collection cycles experienced in collecting the multiple packets.
- the fourth moment indicates the ratio of the sum of the fourth powers of the lengths of multiple packets in the collected data stream to the number of collection cycles experienced in collecting the multiple packets.
- the type of the specific statistical value included in the statistical value may be determined according to the manner of determining the parameters of the shaper.
- the second-order moment, covariance and fourth-order moment can be represented by formulas (2)-(4):
- a statistical value that more accurately reflects the flow change of the data stream can be obtained.
- the amount of data included in the flow collection information generated based on the preprocessing result is small, which facilitates the transmission of flow collection information from the second device to the first device and reduces the amount of transmitted data.
- S302 The second device sends traffic collection information of the data flow to the first device.
- the first device may be the control device 101 in FIG. 1 .
- the second device may send the traffic collection information of the data flow to the first device in a type-length-value (tag length value, TLV) format.
- the second device may send the traffic collection information of the data flow within the period to the first device at a certain period.
- the period for the second device to send the traffic collection information may be greater than or equal to the period for collecting the traffic collection information of the data stream.
- the period for collecting traffic collection information of the data stream may be 100ms, and the period for sending traffic collection information may be 500ms.
- the first device determines shaper parameters according to the traffic collection information and the SLA information corresponding to the data flow.
- the trigger condition for the first device to determine the shaper parameter is not limited. It can be triggered by a set time, for example, timing trigger to determine the parameters of the shaper; it can also be triggered by a set condition, for example, the transmitted data flow meets the condition that needs to be shaped and adjusted.
- the SLA information corresponds to the data flow, and is used to indicate the transmission requirements to be met by the transmission of the data flow.
- the SLA information corresponding to the data flow is relatively fixed.
- the first device may acquire SLA information corresponding to the data stream at an initial stage of transmitting the data stream. Afterwards, the updated SLA information may be obtained again after the SLA information corresponding to the data stream changes.
- the first device may acquire the SLA information corresponding to the data flow based on the locally stored correspondence between the data flow and the SLA information.
- the first device may obtain the SLA information corresponding to the data flow from other devices through a user network interface (user network interface, UNI) or a user centralized configuration (centralized user configuration, CUC).
- the first device may acquire SLA information corresponding to the data flow through the second device.
- the second device may be the sending end device 105 shown in FIG. 1 , or may be the network devices 102-103. Wherein, the second device that sends the SLA information may be the same device as the second device that sends the traffic collection information.
- the second device that sends the SLA information and the second device that sends the traffic collection information may be the network device 102 in FIG. 1 .
- the second device that sends the SLA information may also be a different device from the second device that sends the traffic collection information.
- the second device sending the SLA information is the sending end device 105 in FIG. 1
- the second device sending the traffic collection information is the network device 102 in FIG. 1 .
- the second device can pass the SLA information through the user network interface (User Network Interface, UNI) through multiple registration protocol (multiple registration protocol, MRP) message, local chain Link-local registration protocol (link-local registration protocol, LRP) message, network configuration protocol (Network Configuration Protocol, NETCONF) message, RESTCONF message or management information base (management information base, MIB) message, etc. are sent to the first device .
- MRP multiple registration protocol
- LRP local chain Link-local registration protocol
- network configuration protocol Network Configuration Protocol
- NETCONF Network Configuration Protocol
- RESTCONF management information base
- MIB management information base
- the figure is a schematic diagram of a packet format carrying SLA information of a data flow provided by an embodiment of the present application.
- the MaxLatency field carries the upper bound of the target latency
- the new field Latency_ConfidenceLevel carries the reliability probability. If the value of the Latency_ConfidenceLevel field is 999900, it means that the user accepts that in 99.99% of cases, the network guaranteed transmission delay is less than or equal to the upper bound of the target delay carried by MaxLatency.
- the device transmitting the data stream may register the data stream SLA information carried in the UserToNetworkRequirements TLV into a local MRP Data Unit (MRP Data Unit, MRPDU), and issue a declaration (declaration), and send it to the first device.
- MRP Data Unit MRP Data Unit
- the device transmitting the data stream may also register the data stream SLA information carried in the UserToNetworkRequirements TLV into the LRP database, and send a declaration to the first device.
- the SLA information may include the upper bound of the target latency, or may include the upper bound of the cache, or may include a combination of the upper bound of the target latency and the upper bound of the cache. Further, the SLA information may also include the reliability probability corresponding to the upper bound of the target latency, and the reliability probability of the cache upper bound.
- the upper bound of the target delay is the maximum delay allowed by the transmitted data flow.
- the upper bound of the target delay may be the upper bound of the delay of transmitting the data flow from the source end to the destination end.
- the upper bound of the target delay can be the upper bound of the transmission delay of the entire network that transmits the data stream, or the upper bound of the transmission delay within the subnetwork that transmits the data stream.
- the upper bound of the target delay represents the upper bound of the delay of data stream transmission in the network.
- the upper bound of the target delay indicates the upper bound of the delay of data flow transmission in the subnetwork.
- the upper bound of the target delay may also be the upper bound of the delay of the data stream transmitted by the single-hop device transmitting the data stream.
- the upper bound of the target delay for transmitting data streams from the source to the destination is related to the upper bound of the target delay for transmitting data streams by a single device. For example, based on the number of devices transmitting data streams from the source end to the destination end and the upper bound of the target delay time for transmitting data streams from the source end end to the destination end, the upper bound of the target delay of data stream transmission by a single device can be obtained.
- the cache upper bound indicates the minimum size of buffer available for the stream on the device including the shaper.
- the cache upper bound may be the smallest cache of queues supported by the device including the shaper.
- the reliability probability indicates the probability of meeting the transmission requirement indicated by the SLA information corresponding to the data flow, for example, the reliability probability may be 99.99%.
- the reliability probability is related to the content of the SLA information. For example, when the SLA information of the data flow includes the upper bound of the target delay, the reliability probability of the upper bound of the target delay may also be included.
- the reliability probability of the upper bound of the target delay indicates the probability that the delay of the transmission data stream is less than or equal to the upper bound of the target delay.
- the reliability probability is that the delay of transmitting the data stream from the source to the destination is less than or equal to the target The probability of an upper bound on the delay. If the upper bound of the target delay is the upper bound of the delay of the data stream transmitted by the single-hop device, then the reliability probability is the probability that the delay of the data stream transmitted by the single-hop device is less than or equal to the upper bound of the target delay. For another example, when the SLA information of the data flow includes the cache upper bound, the reliability probability indicates the probability that the available cache of the device including the shaper is less than or equal to the cache upper bound.
- the reliability probability p is a parameter greater than or equal to 0 and less than or equal to 1.
- the reliability probability of the data flow transmitted from the source end to the destination end may be obtained according to the reliability probability of each device in the network.
- the calculation formula of the reliability probability p k from the source end to the destination end of the transmission data stream is shown in formula (5):
- p is the reliability probability of a single-hop device
- H is the number of devices transmitting data streams.
- the first device determines the shaper parameter based on the acquired traffic collection information of the data flow and the SLA information corresponding to the data flow.
- the parameters of the shaper may be determined according to the type of the shaper.
- the parameters of the shaper may include at least one of a token bucket depth (burst) and a token generation rate (rate).
- the bucket depth of the token bucket is also the committed burst size (committed burst size, CBS)
- the token generation rate is also the committed information rate (committed information rate, CIR).
- the shaper parameters may include at least one of a credit accumulation rate (idleslope) and a credit consumption rate (sendslope).
- the first device may first obtain the target bandwidth based on the acquired traffic collection information of the data flow and the SLA information corresponding to the data flow, and then use the target bandwidth to obtain the shaper parameters.
- the target bandwidth is the minimum value of the available bandwidth for transmitting the data flow that satisfies the transmission requirement indicated by the SLA information.
- the obtained value of the target bandwidth may be set as the value of the token generation rate or the credit accumulation rate.
- the target bandwidth may be multiplied by the protection coefficient, and the obtained value may be set as the value of the token generation rate or the credit accumulation rate.
- the protection factor can be 1.2, for example.
- the target bandwidth can be multiplied by the upper bound of the shaping delay to obtain the value of the token bucket depth.
- the value obtained by multiplying the target bandwidth by the upper bound of the shaping delay can be multiplied by the protection coefficient to obtain the value of the token bucket depth.
- the upper bound of the shaping delay is the upper bound of the delay during the processing of the data flow in the shaper.
- the upper bound of the shaping delay can be determined based on the SLA information. For details, see the following.
- the difference between the target bandwidth and the port transmission rate of the device including the shaper may be calculated, and the obtained value is set as the value of the credit consumption rate.
- the product of the target bandwidth and the protection coefficient may be calculated first, the difference between the obtained product and the port transmission rate may be calculated, and the obtained value may be set as the value of the credit consumption rate.
- the port transmission rate is the rate at which the output port of the device including the shaper transmits the data flow.
- Manner 1 The first device first obtains the range of the target bandwidth according to the traffic collection information, and then determines the target bandwidth by using the SLA information.
- the range of the target bandwidth is determined according to the traffic collection information, and is the value range of the minimum value of the available bandwidth for transmitting the data flow.
- the embodiment of the present application provides two manners for determining the range of the target bandwidth.
- the range of the target bandwidth may be determined by using the reference value and the correction value of the target bandwidth.
- the baseline value of the target bandwidth is determined based on traffic collection information.
- the correction value of the target bandwidth indicates the amount of fluctuation of the target bandwidth relative to the reference value.
- the reference value and correction value of the target bandwidth may be determined by using a time series processing method.
- a time series processing method For example, an n-order autoregressive method may be employed.
- the embodiment of the present application provides an expression of the range ⁇ ( ⁇ ) of the target bandwidth, as shown in formula (6).
- ⁇ ( ⁇ ) is a variable that has a mapping relationship with ⁇ , and the specific value of ⁇ ( ⁇ ) is determined by the value of ⁇ .
- ⁇ is the quality factor of SLA, which is used to measure the requirements of SLA in cache.
- U 1 is an average value of message lengths in multiple collection periods determined according to the traffic collection information. If the traffic collection information includes statistical values of packet lengths in multiple collection periods, and the statistical values include average values, the calculation of formula (6) can be performed directly using the average values in the traffic collection information. If the traffic collection information includes the lengths of packets in multiple collection periods, the average value can be calculated by using formula (1).
- T is the total time of multiple collection cycles in the traffic collection information.
- v indicates the variance of the lengths of packets in multiple collection periods, which can be calculated by formula (7).
- the covariance coefficient indicating the length of the packets in multiple collection periods can be calculated by formula (8).
- U 1 is the average value of the length of the message in multiple collection periods determined according to the traffic collection information
- U 2 is the second-order moment of the length of the message in multiple collection periods
- U 3 is multiple collection periods The covariance of the lengths of the packets within .
- U 1 , U 2 and U 3 can all be calculated according to the lengths of packets in multiple collection periods.
- the traffic may be first fitted to a random distribution according to the traffic collection information and the distribution fitting algorithm, and then the range of the target bandwidth is determined according to the fitting result.
- the distribution fitting of the traffic may be realized through a distribution fitting algorithm.
- the distribution fitting algorithm can determine the random distribution that best matches the traffic distribution according to the traffic collection information.
- the random distribution may be one of random distributions such as Poisson distribution, composite Poisson distribution, Pareto distribution, Markov arrival process, or batch Markov arrival process.
- ⁇ ( ⁇ ) is a variable that has a mapping relationship with ⁇
- the specific value of ⁇ ( ⁇ ) is determined by the value of ⁇
- ⁇ is the quality factor of SLA, which is used to measure the requirements of SLA in terms of caching.
- T is the total time of multiple collection cycles in the traffic collection information.
- X(T) is the distribution expectation determined based on the traffic distribution.
- the target bandwidth is determined from the range of the target bandwidth based on the SLA information.
- the target bandwidth can be determined by formula (10).
- ⁇ * is the quality factor of SLA, which is used to measure the requirement of SLA in terms of delay.
- ⁇ * is the quality factor of SLA, which is used to measure the requirement of SLA in terms of delay.
- ⁇ * is the quality factor of SLA, which is used to measure the requirement of SLA in terms of delay.
- ⁇ * can be obtained according to the mapping relationship between ⁇ * and ⁇ and ⁇ ( ⁇ ).
- p can be a fixed value with a range of [0,1], or a reliability probability in the SLA information.
- D 0 is the upper bound of the shaping delay
- the upper bound of the shaping delay is the upper bound of the delay during the processing of the data flow in the shaper.
- the upper bound of the shaping delay can be determined based on the SLA information. For details, see the following.
- the specific value ⁇ 0 of ⁇ * can be calculated by using formula (10), and then ⁇ ( ⁇ 0 ) can be calculated to obtain the target bandwidth.
- Method 2 The first device first obtains the burst volume of the data stream according to the traffic collection information, and then determines the target bandwidth by using the burst volume of the data stream and SLA information.
- the burst volume of the data stream may be determined based on the traffic collection information first.
- the burst amount is the length of the message corresponding to each acquisition period among the plurality of acquisition periods.
- the burst size may be the maximum burst size of the data stream.
- the maximum burst size of the data stream is the length of the message corresponding to the first cycle in multiple collection cycles, and the length of the message corresponding to the first cycle is the maximum length of the message corresponding to each collection cycle in multiple collection cycles value.
- the target bandwidth R 0 is calculated by using the burst volume of the data flow and the SLA information.
- B is the burst volume of the data flow.
- p can be a fixed value with a range of [0,1], or a reliability probability in the SLA information.
- D 0 is the upper bound of the shaping delay, and the upper bound of the shaping delay is the upper bound of the delay during the processing of the data flow in the shaper.
- the upper bound of the shaping delay can be determined based on the SLA information. For details, see the following.
- the above methods for calculating the target bandwidth are all based on the upper bound of the shaping delay.
- the following describes different implementations of determining the shaping delay according to the SLA information.
- Case 1 The SLA information includes the upper bound of the target delay, and the target delay indicates the delay of data stream transmission in the network.
- the upper bound of the target delay is the maximum delay required for the data flow to be transmitted in the network. It can be understood that there may be delays in various aspects during the process of transmitting data streams in the network, for example, shaping delays, fixed delays, network forwarding delays, and actual forwarding delays.
- the shaping delay, fixed delay, network forwarding delay and actual forwarding delay are introduced below.
- the shaping delay indicates the delay during the processing of the data flow in the shaper.
- the shaping delay may include delays such as queuing delay of the device and preprocessing delay of the data flow, where the device is a device including a shaper.
- the preprocessing delay may be the delay of processing the data stream before the data stream enters the token bucket.
- the pre-processing delay may be the delay of processing the data stream before determining the credit of the queue.
- the fixed delay is a relatively definite delay generated by the network transmission data flow.
- the fixed delay may specifically include one or more of propagation delay, device processing delay, and port delay.
- the propagation delay is the delay caused by the data stream propagating a certain distance in the transmission medium.
- Propagation delay indicates the ratio of transmission distance to transmission speed.
- the transmission speed is determined according to the type of the transmission signal and the propagation medium. For example, if the data flow is transmitted through the optical fiber line in the form of electromagnetic signals, then according to the propagation speed of the electromagnetic signal in the optical fiber line at 200,000 kilometers per second, it can be obtained that for an optical fiber line with a transmission distance of 1,000 kilometers, the The propagation delay is 5ms.
- the propagation delay may be obtained by the first device during the service planning stage, or may be obtained through a telemetry (telemetry) technology, or may be obtained through other devices, such as a network controller (network controller).
- the device processing delay is the delay caused by the device processing the data flow.
- the device processing delay may include the delay generated by the device performing, for example, analysis, data extraction, and routing search on the data stream after receiving the data stream.
- Device processing delay is an indicator parameter of the device.
- the device processing delay may be reported to the first device by the device transmitting the data stream, so that the first device determines the shaping delay according to the device processing delay.
- the device processing delay may also be pre-stored in the database of the first device, so that the first device acquires the device processing delay corresponding to the device transmitting the data stream from the database.
- Port delay is the delay required by the device to send data streams.
- the port delay indicates the ratio of the packet length in the transmitted data flow to the port bandwidth. It can be understood that the port delay is determined according to the length of the packet transmitted by the port, and the port delay required for transmitting packets of different lengths is different. In a possible implementation manner, considering the range of the port delay, the maximum packet length in the data flow may be used to calculate the port delay.
- the network forwarding delay is the preset delay for the data flow waiting to be processed in the forwarding device from the source end to the destination end.
- the network forwarding delay may be a preset queuing delay of the data flow in the forwarding device.
- Provide scheduling technology for network forwarding delay for example, periodic queuing and forwarding (cyclic queuing) defined by Institute of Electrical and Electronics Engineers (IEEE) 802.1 Time Sensitive Network (TSN) Forwarding, CQF) or time awareness shaper (time awareness shaper, TAS) scheduling method, or QoS, hierarchical quality of service (hierarchical quality of service, HQoS), priority scheduling on routers and switches with reasonable configuration of queue parameters , Polling scheduling and other scheduling technologies.
- periodic queuing and forwarding defined by Institute of Electrical and Electronics Engineers (IEEE) 802.1 Time Sensitive Network (TSN) Forwarding, CQF) or time awareness shaper (time awareness shaper, TAS) scheduling method, or QoS, hierarchical quality of service (
- the first device may obtain the network forwarding delay through a forwarding device that transmits the data flow. In another implementation, the first device may acquire and store the network forwarding delay in advance.
- the network forwarding delay is related to the preset data flow waiting delay in each forwarding device.
- the network forwarding delay may be determined according to the committed forwarding delay of each forwarding device.
- the committed forwarding delay of the forwarding device is the preset delay of the data flow waiting for processing in the forwarding device.
- the network forwarding delay D 1 can be calculated by formula (12).
- T i is the committed forwarding delay T i of each forwarding device that transmits data streams
- i represents the number of forwarding devices
- i is a positive integer less than or equal to M
- M is the total number of forwarding devices that transmit data streams.
- the forwarding bandwidth of the forwarding device may be determined by using the committed forwarding delay T i of the forwarding device.
- the committed forwarding delay T i of the forwarding device can be used as D 0 in the above formula for calculating the target bandwidth, and the calculated target bandwidth R 0 is the forwarding bandwidth of the forwarding device.
- the forwarding capability of the forwarding device is measured by the preset forwarding bandwidth of the forwarding device.
- the committed forwarding delay of the forwarding device can be determined according to the preset forwarding bandwidth of the forwarding device, and then the network forwarding delay can be determined based on the committed forwarding delay.
- the embodiment of the present application does not limit the manner of determining the committed forwarding delay according to the preset forwarding bandwidth of the forwarding device.
- the committed forwarding delay T i can be calculated according to the deterministic network calculus algorithm, and the calculation method is shown in formula (13):
- b is the token bucket bucket depth in the shaper parameter, or the committed burst size
- R i is the preset forwarding bandwidth of the forwarding device.
- the actual forwarding delay is the delay of the data flow waiting to be processed in the forwarding device from the source end to the destination end.
- the actual forwarding delay is the waiting delay generated in the forwarding device after the data stream is transmitted.
- the actual forwarding delay may be reported to the first device by the forwarding device transmitting the data stream after forwarding the data stream.
- the first device may obtain the actual forwarding delay from the source end to the destination end according to the forwarding delay reported by each forwarding device.
- the delay included in the target delay is determined according to the network that transmits the data stream.
- the shaping delay is determined based on the delay in network transmission and the target delay.
- the target delay includes shaping delay.
- the target delay may be determined as the shaping delay without considering the fixed delay, the network forwarding delay and the actual forwarding delay. For example, if the fixed delay from the source end to the destination end is relatively small and there is no forwarding device, the target delay may be determined as the shaping delay regardless of the fixed delay and the forwarding delay caused by the forwarding device.
- the upper bound of the target delay included in the SLA information can be determined and shaped The upper bound of the delay.
- the upper bound of the target delay may be the delay of a single-hop device transmitting the data stream, and the target delay may be used as the shaping delay to calculate the forwarding bandwidth of the device.
- the target delay includes shaping delay, and also includes one or more of fixed delay and network forwarding delay.
- one or more of fixed delay and network forwarding delay need to be considered.
- the shaping delay is obtained by subtracting one or more of the fixed delay and the network forwarding delay from the target delay.
- the propagation delay of the transmission data stream is 1.1ms
- the single device processing delay of the network devices 102-104 is 25 ⁇ s
- the target delay includes shaping delay, and also includes one or more of fixed delay and actual forwarding delay.
- one or more of the fixed delay and the actual forwarding delay need to be considered.
- the shaping delay is obtained by subtracting one or more of the fixed delay and the actual forwarding delay from the target delay.
- the calculation method of the upper bound of the shaping delay is similar to that of the upper bound of the shaping delay in Scenario 2, and will not be repeated here.
- the SLA information includes the buffer upper bound, and the buffer upper bound is the minimum value of the available buffer of the device including the shaper among the devices transmitting the data stream.
- the cache upper bound has a mapping relationship with the target latency upper bound.
- the buffer upper bound may be converted into the upper bound of the target delay, and then the upper bound of the shaping delay may be determined by referring to the method in the first case above.
- S304 The first device sends the shaper parameter to the third device.
- the first device is a control device 101, which is not a device for transmitting data streams, and the control device does not include a shaper for adjusting data streams.
- the first device sends the shaper parameter to the third device including the shaper, wherein the third device is a device including the shaper among the devices for transmitting data streams.
- the third device may be the network devices 102 - 104 in FIG. 1 or the sending end device 105 .
- the first device sends the shaper parameter to the third device through a committed information rate of a scheduler instance (scheduler instance) of NETCONF/YANG or RESTCONF/YANG.
- the second device that collects traffic collection information of the data stream may be the same device as the third device that includes the shaper.
- the network device 102 may be a second device that collects traffic collection information of data streams, and the network device 102 may also be a third device including a shaper.
- the first device namely the control device 101 , obtains traffic collection information from the network device 102 and sends shaper parameters to the network device 102 .
- the second device that collects traffic collection information of the data stream may be different from the third device that includes shaping.
- the network device 102 may be a second device that collects traffic collection information of data streams, and the network device 103 is a third device including a shaper.
- the first device that is, the control device 101 obtains traffic collection information from the network device 102 and sends shaper parameters to the network device 103 .
- S305 The third device configures the shaper according to the shaper parameter.
- the third device configures the shaper by using the received shaper parameters.
- the configured shaper is used to shape the data flow, so that the transmission of the data flow adjusted by the shaper can meet the transmission requirements indicated by the SLA information.
- the first device can obtain the shaper parameters corresponding to the SLA information of the data flow according to the flow collection information of the data flow and the SLA information corresponding to the data flow, and can more accurately shape the data flow through the shaper Processing, so that the processed data flow meets the transmission requirements indicated by the SLA information.
- the parameters of the shaper can be more accurately and flexibly matched with the service requirements corresponding to the data flow, and the differentiated guarantee for the service requirements of the data flow of different service types can be realized.
- Case 1 The congestion degree of the network is greater than the threshold.
- the forwarding device that transmits the data stream has a preset buffer capacity, which is used to ensure that the actual forwarding delay of the forwarding device forwarding the data stream is less than or equal to the promised forwarding delay.
- the forwarding device can control network congestion by adjusting the occupied preset buffer capacity.
- the degree of congestion of the network may be determined according to the remaining capacity of the forwarding equipment transmitting the data flow. Wherein, the remaining capacity is used to represent the remaining forwarding capability of the forwarding device when the committed forwarding delay of the forwarding device is guaranteed.
- the remaining capacity of the forwarding device may specifically be the unused preset buffer capacity of the forwarding device, which may be obtained by subtracting the burst amount of the data flow from the preset buffer capacity of the forwarding device.
- each forwarding device may report the remaining capacity corresponding to each forwarding device to the first device.
- the first device determines the congestion degree of the network according to the obtained remaining capacity of each forwarding device.
- the first device may determine the congestion degree according to the remaining capacity of each forwarding device.
- the first device may determine the bottleneck device according to the remaining capacity of each forwarding device.
- the bottleneck device is the forwarding device with the smallest remaining capacity.
- the first device may determine the degree of congestion according to the remaining capacity of the bottleneck device, and may also adjust the weight used when determining the degree of congestion based on the remaining capacity of the bottleneck device.
- the congestion degree of the network When the congestion degree of the network is greater than the threshold, it indicates that the congestion degree of the network may not meet the requirement of the congestion degree of data stream transmission.
- the transmission mode of the data flow may be further adjusted, so that the adjusted data flow can meet the transmission requirement indicated by the SLA information and the congestion degree is less than or equal to the threshold.
- the embodiment of the present application provides three possible methods for adjusting data stream transmission, one or more of which may be used to adjust the data stream transmission, specifically including:
- Manner 1 The first device adjusts the SLA information, re-determines the shaper parameters based on the adjusted SLA information, and adjusts the data flow.
- the first device may adjust the composition of the upper bound of the target delay or the upper bound of the cache included in the SLA information, so as to adjust the parameters of the shaper.
- the target delay may include shaping delay and network forwarding delay.
- the network forwarding delay may have a certain value range.
- the first device can adjust the network forwarding delay, so as to realize the adjustment of the shaping delay, and then adjust the parameters of the shaper, so as to realize the adjustment of the data flow.
- the first device may adjust the distribution ratio of the shaping delay and the network forwarding delay.
- the proportion of the shaping delay and the network forwarding delay may be randomly determined within a certain proportion range.
- the adjustment step size may be increased for the shaping delay, and the adjustment step size may be decreased for the network forwarding delay.
- the adjustment step size can be determined according to the congestion degree of the network, and the adjustment step size can be a positive number or a negative number.
- the first device then uses the adjusted shaping delay to calculate and obtain adjusted shaper parameters.
- the second device may configure the shaper with the adjusted shaper parameters.
- the first device may calculate the committed forwarding delay corresponding to each forwarding device, or calculate the forwarding bandwidth corresponding to each forwarding device.
- the first device sends the re-determined committed forwarding delay or forwarding bandwidth of the forwarding device to each forwarding device, so that each forwarding device adjusts the committed forwarding delay or forwarding bandwidth.
- the congestion degree of the network is still greater than the threshold, and the SLA information can be adjusted again to continue to generate the corresponding The shaper parameter adjusts the data flow until the times of adjusting the SLA information reaches the adjustment threshold, or the congestion degree is less than or equal to the threshold.
- Manner 2 The first device adjusts the queue into which the data flow enters.
- the first device may adjust the queues into which the data streams enter, and re-divide the queues into which the data streams enter, so that the adjusted data streams can meet the transmission requirements indicated by the SLA information and the congestion degree is less than or equal to the threshold.
- the queue into which the data flow enters can be divided again, and the congestion level can be re-determined until the adjustment The number of times the data flow enters the queue reaches the adjustment threshold, or until the degree of congestion is less than or equal to the threshold.
- Manner 3 The first device adjusts the transmission path of the data stream.
- the first device may also adjust the transmission path of the transmission data stream. Re-determine the transmission path of the data flow by adjusting the equipment that transmits the data flow.
- the first device obtains a transmission path of the data stream through multiprotocol label switching (multiprotocol label switching, MPLS) or traffic engineering (traffic engineering, TE) technology, and determines a device for transmitting the data stream on the transmission path.
- the first device determines the device on the path for transmitting the data stream, it can obtain network status information and device capability information based on the network configuration protocol (network configuration protocol, NETCONF) or representational state transfer configuration protocol (representational state transfer configuration protocol, RESTCONF) , such as obtaining the port rate, the maximum available bandwidth of the link, the maximum remaining bandwidth of the link, the weight of the link, the maximum transmission unit (MTU) of the link, the scheduling method and parameters of the device, and the processing time of the device Delay, device cache capability and other information.
- the first device acquires network status information and device capability information through NETCONF/YANG or RESTCONF/YANG. It should be understood that the first device may deploy network resources according to the foregoing network status information and device
- the transmission path of the data flow can be adjusted again, and the congestion degree can be re-determined. Until the number of times of adjusting the transmission path of the data flow reaches the adjustment threshold, or the degree of congestion is less than or equal to the threshold.
- the data flow When the data flow is transmitted, the data flow may also be divided into queues, diverted, and converged with other data flows, resulting in the expected transmission process of one or more data flows, or the actual transmission process.
- the transmission requirements indicated by the SLA information corresponding to the data flow are met.
- the network management device may be a device including a path computation element (path computation element, PCE), or may be a device connected to the PCE.
- path computation element PCE
- the transmission of the data flow needs to be adjusted.
- one or more of the above three methods for adjusting data stream transmission may be used, so that the adjusted data stream meets the transmission requirements of the SLA information.
- the congestion degree of the network or the delay of the network transmission data flow or the estimated value of the delay of the network transmission data flow, it can be judged whether the network transmission data flow can meet the transmission requirements of the data flow.
- the transmission of the data flow is adjusted so that the transmission of the data flow meets the transmission requirements.
- the first device is an independent control device.
- the first device can also be a device with an integrated control function.
- FIG. indivual With reference to the schematic diagram of the network architecture shown in FIG. indivual.
- the first device with a control function may acquire traffic collection information of the data flow, and configure shaper parameters for a shaper included in itself.
- the sending end device 105 or the network devices 102-104 can acquire the traffic collection information of the data flow, obtain the shaper parameters based on the traffic collection information of the data flow and the SLA information corresponding to the data flow, and The shaper included with the device is configured.
- FIG. 5 is a schematic flowchart of a network configuration method provided in the embodiment of the present application, specifically including:
- S501 The first device acquires traffic collection information of a data stream.
- the first device collects traffic on the transmitted data stream to obtain traffic collection information.
- traffic collection information of the data stream refer to the description in S301, and details are not repeated here.
- the first device determines shaper parameters according to traffic collection information and SLA information corresponding to the data flow.
- S503 The first device configures the shaper according to the shaper parameter.
- the first device Based on the determined shaper parameters, the first device configures shaper parameters for the included shaper, so that the shaper after the shaper parameter configuration can adjust the data flow to meet the transmission indicated by the SLA information corresponding to the data flow Require.
- the first device with a control function may obtain traffic collection information of the data flow through other devices, and send the obtained shaper parameters to other devices including the shaper. Wherein, the traffic collection information of the data flow and the shaper parameters may be sent to the first device through the transmission path of the transmission data flow.
- the first device may be the receiving end device 106, and the network device 102 may obtain the flow collection information of the data flow, and send the flow collection information of the data flow to the receiving end device through the network devices 103 and 104 106.
- the receiver device 106 After obtaining the shaper parameters, the receiver device 106 sends the shaper parameters to the network device 102 including the shaper, so that the network device 102 configures the shaper parameters for the shaper.
- the interaction process between devices can refer to the schematic diagram of interaction of the network configuration method shown in FIG. 3 , which will not be repeated here.
- the second device may be the same device as the first device.
- the first device collects traffic collection information of the data flow, determines shaper parameters based on the traffic collection information, and sends the shaper parameters to a third device including the shaper, so that the third device uses the shaper parameters to configure the shaper, and the data flow Carry out shaping.
- the first device may be the sink device 106 .
- the first device may collect data streams, obtain traffic collection information, obtain shaper parameters, and send the shaper parameters to the third device, that is, the network device 102 .
- the network device 102 configures the shaper with shaper parameters, so that the shaper processes the data flow.
- the third device may be the same device as the first device.
- the second device collects traffic collection information of the data stream, determines shaper parameters based on the traffic collection information, and uses the shaper parameters to adjust the shaper included in the first device.
- the second device may be the sending end device 105
- the first device may be the network device 102 .
- the second device may collect the data flow to obtain flow collection information.
- the second device sends the traffic collection information to the first device, that is, the network device 102 .
- the network device 102 obtains the shaper parameters according to the traffic collection information and the SLA information corresponding to the data flow.
- the network device 102 configures the shaper using the obtained shaper parameters.
- the target delay includes the shaping delay, and also includes one or more of the fixed delay and the actual forwarding delay.
- the actual forwarding delay can be the , sending the forwarding delay to the first device.
- the first device is the receiving end device 106 .
- the actual device forwarding delay of the network device 102 is sent to the receiving end device 106 through the network devices 103 and 104 .
- the network devices 103 and 104 forward the data flow
- the actual device forwarding delay of the device is sent to the receiving end device 106 through the network device through the transmission path of the subsequent data flow.
- the receiver device 106 determines the actual forwarding delay based on the forwarding delay sent by the network devices 102-104.
- the embodiment of the present application also provides a situation in which the first device is a device with an integrated control function, an abnormal situation that may occur in network transmission and a corresponding adjustment method.
- the first device is a device with an integrated control function
- an abnormal situation that may occur in network transmission and a corresponding adjustment method.
- the following is an introduction to possible abnormalities in network transmission and corresponding adjustment methods.
- Case 1 The congestion degree of the network is greater than the threshold.
- the method for determining the degree of network congestion and the method for adjusting it are similar to the first case above, that is, the method for the degree of network congestion is greater than the threshold, please refer to the above description, and will not repeat them here.
- the remaining capacity of the forwarding device may be transmitted to the first device through a transmission path for transmitting data streams.
- the receiving end device 106 in FIG. 2 as the first device as an example, the method for the first device to obtain the remaining capacity of the forwarding device will be described below.
- the forwarding devices are network devices 102-104. Each forwarding device can obtain the remaining capacity according to the burst amount when transmitting the data stream and the preset buffer capacity of the forwarding device.
- the preset buffer capacity of each forwarding device is C x , where x is the number of forwarding devices.
- the burst size when the forwarding device transmits the data flow is b x , please refer to formula (14).
- r is the output bandwidth of the data stream output by the shaper
- T x is the actual forwarding delay of the forwarding device.
- b 0 is the minimum value of the available cache of the shaper.
- Each forwarding device can obtain the remaining capacity C x ′ according to the burst amount of the transmission data flow and the preset buffer capacity.
- C x ' please refer to formula (15).
- the forwarding device sends one or more of the burst b x and the remaining capacity C x ′ to the receiving end device 106 through the transmission path of the transmission data flow.
- the receiving end device 106 may determine whether the congestion degree of the network is greater than a threshold according to the obtained remaining capacity of each forwarding device.
- the method of determining the delay or the estimated value of the delay and the adjustment method are the same as the second case above, that is, the delay of transmitting the data flow from the source to the destination, or the time of transmitting the data flow from the source to the destination.
- the first device can obtain the shaper parameters corresponding to the data flow and the SLA information of the data flow according to the traffic collection information of the data flow and the SLA information corresponding to the data flow, and can achieve more accurate data flow through the shaper.
- the data flow is shaped so that the processed data flow meets the transmission requirements indicated by the SLA information.
- the parameters of the shaper can be more accurately and flexibly matched with the service requirements corresponding to the data flow, and the differentiated guarantee for the service requirements of the data flow of different service types can be realized.
- FIG. 6 is a schematic structural diagram of a first device 1000 according to an embodiment of the present application.
- the first device 1000 shown in FIG. 6 may execute corresponding steps performed by the first device in the method of the foregoing embodiments.
- the first device is deployed in a communications network that also includes a second device.
- the first device 1000 includes an acquiring unit 1001 and a processing unit 1002 .
- An acquisition unit 1001 configured to acquire traffic collection information of the data stream
- the processing unit 1002 is configured to determine shaper parameters according to traffic collection information and SLA information corresponding to the data flow; the shaper parameters are used by the shaper to adjust the data flow to meet the transmission requirements indicated by the SLA information.
- processing unit 1002 is specifically configured to:
- the target bandwidth is the minimum value of the available bandwidth used to transmit the data flow to meet the transmission requirements indicated by the SLA information;
- the processing unit 1002 when the processing unit 1002 obtains the target bandwidth according to the traffic collection information and the SLA information corresponding to the data flow, the processing unit 1002 is specifically configured to:
- the target bandwidth is obtained according to the range of the target bandwidth and the SLA information corresponding to the data flow.
- the processing unit 1002 obtains the target bandwidth according to the traffic collection information
- the processing unit 1002 is specifically configured to:
- the range of the target bandwidth is determined according to the reference value and the correction value;
- the reference value is the reference value of the target bandwidth determined according to the traffic collection information, and the correction value indicates the fluctuation amount of the target bandwidth relative to the reference value.
- the range in which the processing unit 1002 obtains the target bandwidth according to the traffic collection information includes:
- the first device determines the range of the target bandwidth according to the distribution fitting algorithm and the traffic collection information.
- the traffic collection information includes the length of the packets of the data stream in multiple collection periods; when the processing unit 1002 obtains the target bandwidth according to the traffic collection information and the SLA information corresponding to the data stream, the processing unit 1002 is specifically used for:
- the burst volume is the length of the message corresponding to each collection cycle in multiple collection cycles;
- the first device also includes:
- the first adjustment unit is configured to adjust the SLA information in response to the congestion degree being greater than the threshold, so that the data flow is adjusted according to the shaper parameters determined according to the adjusted SLA information and the traffic collection information, so as to meet the transmission requirements indicated by the SLA information and The degree of congestion is less than or equal to the threshold;
- the degree of congestion is determined according to the remaining capacity of the forwarding equipment, and the remaining capacity refers to the remaining forwarding capability of the forwarding equipment under the guaranteed forwarding delay of the forwarding equipment. delay.
- the first device also includes:
- the second adjustment unit adjusts the SLA information in response to the time delay of transmitting the data flow from the source end to the destination end, or the estimated value of the time delay of transmitting the data flow from the source end to the destination end does not meet the transmission requirements of the SLA information, so that Adjust the data flow according to the adjusted SLA information and the shaper parameters determined by the traffic collection information, so as to meet the transmission requirements indicated by the SLA information;
- the transmission path of the data flow is adjusted so that the data flow transmitted through the transmission path meets the transmission requirements indicated by the SLA information.
- the SLA information includes the upper bound of the target delay; the upper bound of the target delay indicates the upper bound of the delay of the data flow from the source end to the destination end.
- the target delay includes a shaping delay; the shaping delay indicates a delay during processing of the data flow in the shaper.
- the target delay also includes one or more of fixed delay and network forwarding delay;
- fixed delay includes one or more of propagation delay, device processing delay and port delay; Latency is the delay of data flow propagating in the transmission medium; device processing delay is the delay of equipment processing data flow; port transmission delay is the delay of transmitting data flow through the port; network forwarding delay is from source to At the destination end, the preset delay for data streams to wait for processing in the forwarding device.
- the network forwarding delay indicates the sum of committed forwarding delays of multiple forwarding devices transmitting data streams; the committed forwarding delay is a preset delay for data streams waiting to be processed in the forwarding devices.
- the network forwarding delay is determined according to preset forwarding bandwidths of multiple forwarding devices transmitting data streams; the preset forwarding bandwidth is the preset bandwidth of data streams forwarded by the forwarding devices.
- the target delay also includes one or more of fixed delay and actual forwarding delay
- the actual forwarding delay indicates the delay of the data flow waiting to be processed in the forwarding device from the source end to the destination end.
- the SLA information includes a cache upper bound; the cache upper bound is a minimum value of an available cache of a device including a shaper among devices transmitting data streams.
- the SLA information further includes a reliability probability, where the reliability probability is a probability of meeting a transmission requirement indicated by the SLA information corresponding to the data flow.
- the acquiring unit 1001 is specifically used for:
- the flow collection information of the data flow sent by the second device is received; the second device is a device for transmitting the data flow.
- the acquiring unit 1001 is specifically used for:
- the flow collection information of the data flow collected by the first device is acquired.
- the traffic collection information includes the statistical value of the length of the packets of the data flow in multiple collection periods; the statistical value includes an average value, and the average value indicates the length of multiple packets in the collected data flow and is related to the length of multiple packets collected in the data flow. The ratio of the number of collection cycles experienced by the packet.
- the statistical value also includes one or more of the second-order moment and the fourth-order moment;
- the second-order moment indicates that the sum of the squares of the lengths of the multiple packets in the collected data stream is equal to the sum of the lengths of the multiple packets collected.
- the fourth moment indicates the ratio of the sum of the fourth powers of the lengths of the plurality of packets in the acquisition data stream to the number of acquisition cycles experienced by the acquisition of the plurality of packets.
- the first device also includes:
- a sending unit configured to send the shaper parameters to a third device; the third device is a device for transmitting data streams including the shaper.
- the first device is a control device or a device for transmitting data streams.
- control device is a central network control CNC device.
- the shaper parameters include at least one of token bucket depth and token generation rate.
- the shaper parameters include at least one of a credit accumulation rate and a credit consumption rate.
- FIG. 7 is a schematic diagram of a hardware structure of a first device 1100 according to an embodiment of the present application.
- the first device 1100 shown in FIG. 7 may execute corresponding steps performed by the first device in the method of the foregoing embodiments.
- the first device 1100 includes a processor 1101 , a memory 1102 , an interface 1103 and a bus 1104 .
- the interface 1103 can be implemented in a wireless or wired manner, specifically, it can be a network card.
- the aforementioned processor 1101 , memory 1102 and interface 1103 are connected through a bus 1104 .
- the interface 1103 may specifically include a transmitter and a receiver for sending and receiving information between the first device and the second device in the above embodiment, and between the first device and the third device in the above embodiment.
- the interface 1103 is configured to support receiving a traffic collection message sent by the second device.
- the interface 1103 is used to support the first device to send the shaper parameter to the third device.
- the interface 1103 is used to support the processes S302 and S304 in FIG. 3 .
- the processor 1101 is configured to execute the processing performed by the first device in the foregoing embodiments.
- the processor 1101 is configured to determine shaper parameters according to traffic collection information and SLA information corresponding to the data flow; and/or other processes used in the technologies described herein.
- the processor 1101 is used to support the process S303 in Fig. 3 .
- the memory 1102 includes an operating system 11021 and an application program 11022 for storing programs, codes or instructions. When the processor or hardware device executes these programs, codes or instructions, the processing process related to the first device in the method embodiment can be completed.
- the memory 1102 may include a read-only memory (English: Read-only Memory, abbreviated: ROM) and a random access memory (English: Random Access Memory, abbreviated: RAM).
- ROM includes basic input/output system (English: Basic Input/Output System, abbreviation: BIOS) or embedded system
- RAM includes application program and operating system.
- the BIOS solidified in the ROM or the bootloader in the embedded system is used to boot the system, and guide the first device 1100 into a normal running state. After the first device 1100 enters the normal running state, the application program and the operating system in the RAM are run, thereby completing the processing procedures related to the first device in the method embodiment.
- FIG. 7 only shows a simplified design of the first device 1100 .
- the first device may include any number of interfaces, processors or memories.
- FIG. 8 is a schematic diagram of a hardware structure of another first device 1200 according to an embodiment of the present application.
- the first device 1200 shown in FIG. 8 may execute corresponding steps performed by the first device in the method of the foregoing embodiments.
- the first device 1200 includes: a main control board 1210 , an interface board 1230 , a switching fabric board 1220 , and an interface board 1240 .
- the main control board 1210, the interface boards 1230 and 1240, and the switching fabric board 1220 are connected to the system backplane through the system bus to realize intercommunication.
- the main control board 1210 is used to complete functions such as system management, equipment maintenance, and protocol processing.
- the SFU 1220 is used to implement data exchange between interface boards (interface boards are also called line cards or service boards).
- the interface boards 1230 and 1240 are used to provide various service interfaces (for example, POS interface, GE interface, ATM interface, etc.), and realize data packet forwarding.
- the interface board 1230 may include a central processing unit 1231 , a forwarding entry storage 1234 , a physical interface card 1233 and a network processor 1232 .
- the central processing unit 1231 is used for controlling and managing the interface board and communicating with the central processing unit on the main control board.
- the forwarding entry storage 1234 is used for storing forwarding entries.
- the physical interface card 1233 is used to receive and send traffic.
- the network storage 1232 is used to control the physical interface card 1233 to send and receive traffic according to the forwarding entry.
- the physical interface card 1233 may be used to receive traffic collection information sent by the second device.
- the physical interface card 1233 may also be used to send shaper parameters to the third device.
- the physical interface card 1233 receives the flow collection information, and sends the flow collection information to the central processing unit 1211 via the central processing unit 1231, and the central processing unit 1211 processes the flow collection information.
- the central processing unit 1211 is further configured to determine shaper parameters according to traffic collection information and SLA information corresponding to the data flow.
- the central processor 1231 is also used to control the network storage 1232 to obtain the forwarding entry in the forwarding entry storage 1234, and the central processing unit 1231 can also be used to control the network storage 1232 to send the shaper parameters to the third device via the physical interface card 1233 .
- the operations on the interface board 1240 in this embodiment of the present invention are consistent with the operations on the interface board 1230 , and are not repeated for brevity. It should be understood that the first device 1200 in this embodiment may correspond to the functions and/or various steps implemented in the foregoing method embodiments, and details are not repeated here.
- main control boards there may be one or more main control boards, and when there are multiple main control boards, the main main control board and the standby main control board may be included.
- interface boards There may be one or more interface boards, and the stronger the data processing capability of the first device, the more interface boards it provides.
- SFU There may be no SFU, or there may be one or more SFUs. When there are multiple SFUs, they can jointly implement load sharing and redundant backup. Under the centralized forwarding architecture, the first device may not need a switching network board, and the interface board is responsible for processing service data of the entire system.
- the first device may have at least one SFU, through which data exchange between multiple interface boards is implemented, and large-capacity data exchange and processing capabilities are provided. Therefore, the data access and processing capabilities of the first device in the distributed architecture are greater than those in the centralized architecture. Which architecture to use depends on the specific networking deployment scenario, and there is no limitation here.
- an embodiment of the present application provides a computer storage medium for storing computer software instructions used by the above-mentioned first device, which includes the program designed for executing the above-mentioned method embodiment.
- the embodiment of the present application also includes a network system, the network system includes a first device and a second device,
- the second device is configured to send traffic collection information of the data stream to the first device
- the first device is configured to receive traffic collection information of the data stream sent by the second device;
- the first device is further configured to determine shaper parameters according to traffic collection information and SLA information corresponding to the data flow; the shaper parameters are used by the shaper to adjust the data flow to meet the transmission requirements indicated by the SLA information.
- the network system further includes a third device,
- the first device is further configured to send the shaper parameter to the third device;
- the third device is configured to receive the shaper parameters sent by the first device, and configure the shaper according to the shaper parameters; the third device is a device for transmitting data streams including the shaper.
- the first device may be the first device in the aforementioned FIG. 6 or FIG. 7 or FIG. 8 , and realize any function described in the foregoing embodiments.
- the disclosed system, device and method can be implemented in other ways.
- the device embodiments described above are only illustrative.
- the division of units is only a logical business division. In actual implementation, there may be other division methods.
- multiple units or components can be combined or integrated. to another system, or some features may be ignored, or not implemented.
- the mutual coupling or direct coupling or communication connection shown or discussed may be through some interfaces, and the indirect coupling or communication connection of devices or units may be in electrical, mechanical or other forms.
- a unit described as a separate component may or may not be physically separated, and a component shown as a unit may or may not be a physical unit, that is, it may be located in one place, or may be distributed to multiple network units. Part or all of the units can be selected according to actual needs to achieve the purpose of the solution of this embodiment.
- each business unit in each embodiment of the present application may be integrated into one processing unit, each unit may exist separately physically, or two or more units may be integrated into one unit.
- the above-mentioned integrated units can be implemented in the form of hardware or in the form of software business units.
- the integrated unit is realized in the form of a software business unit and sold or used as an independent product, it can be stored in a computer-readable storage medium.
- the technical solution of the present application is essentially or part of the contribution to the prior art or all or part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium , including several instructions to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the methods in various embodiments of the present application.
- the aforementioned storage media include: U disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disk or optical disc, etc., which can store program codes. .
- the services described in the present invention may be implemented by hardware, software, firmware or any combination thereof.
- the services may be stored on or transmitted over as one or more instructions or code on a computer-readable medium.
- Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another.
- a storage media may be any available media that can be accessed by a general purpose or special purpose computer.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Quality & Reliability (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Des modes de réalisation de la présente demande divulguent un procédé de configuration de réseau, un dispositif et un système. Selon les informations d'acquisition de trafic d'un flux de données et d'informations SLA correspondant au flux de données, un premier dispositif peut acquérir des paramètres de mise en forme correspondant au flux de données et aux informations SLA du flux de données, et peut obtenir une forme relativement précise du flux de données au moyen d'un dispositif de mise en forme, de telle sorte que le flux de données traité satisfait les exigences de transmission indiquées par les informations SLA. Sur la base des informations d'acquisition de trafic du flux de données, les paramètres de mise en forme peuvent être mis en correspondance de manière plus précise et flexible avec des exigences de service correspondant au flux de données, ce qui permet d'obtenir des assurances différenciées pour des exigences de service de flux de données de types de service différents.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110759176.5A CN115589602A (zh) | 2021-07-05 | 2021-07-05 | 一种网络配置方法、设备和系统 |
CN202110759176.5 | 2021-07-05 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2023280004A1 true WO2023280004A1 (fr) | 2023-01-12 |
Family
ID=84772466
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2022/101726 WO2023280004A1 (fr) | 2021-07-05 | 2022-06-28 | Procédé de configuration de réseau, dispositif et système |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN115589602A (fr) |
WO (1) | WO2023280004A1 (fr) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080112318A1 (en) * | 2006-11-13 | 2008-05-15 | Rejean Groleau | Traffic shaping and scheduling in a network |
CN101599905A (zh) * | 2009-06-30 | 2009-12-09 | 中兴通讯股份有限公司 | 一种实现流量整形令牌添加的方法、装置及系统 |
US20160218943A1 (en) * | 2015-01-26 | 2016-07-28 | Ciena Corporation | Representative bandwidth calculation systems and methods in a network |
CN112543153A (zh) * | 2019-09-20 | 2021-03-23 | 华为技术有限公司 | 报文转发方法、装置、系统、设备及存储介质 |
CN112583735A (zh) * | 2019-09-27 | 2021-03-30 | 华为技术有限公司 | 确定传输数据流的需求带宽的方法、设备和系统 |
CN112671656A (zh) * | 2019-10-16 | 2021-04-16 | 华为技术有限公司 | 一种对网络进行配置的方法和设备 |
CN112787952A (zh) * | 2019-11-08 | 2021-05-11 | 华为技术有限公司 | 一种业务流量调整方法及装置 |
-
2021
- 2021-07-05 CN CN202110759176.5A patent/CN115589602A/zh active Pending
-
2022
- 2022-06-28 WO PCT/CN2022/101726 patent/WO2023280004A1/fr active Application Filing
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080112318A1 (en) * | 2006-11-13 | 2008-05-15 | Rejean Groleau | Traffic shaping and scheduling in a network |
CN101599905A (zh) * | 2009-06-30 | 2009-12-09 | 中兴通讯股份有限公司 | 一种实现流量整形令牌添加的方法、装置及系统 |
US20160218943A1 (en) * | 2015-01-26 | 2016-07-28 | Ciena Corporation | Representative bandwidth calculation systems and methods in a network |
CN112543153A (zh) * | 2019-09-20 | 2021-03-23 | 华为技术有限公司 | 报文转发方法、装置、系统、设备及存储介质 |
CN112583735A (zh) * | 2019-09-27 | 2021-03-30 | 华为技术有限公司 | 确定传输数据流的需求带宽的方法、设备和系统 |
CN112671656A (zh) * | 2019-10-16 | 2021-04-16 | 华为技术有限公司 | 一种对网络进行配置的方法和设备 |
CN112787952A (zh) * | 2019-11-08 | 2021-05-11 | 华为技术有限公司 | 一种业务流量调整方法及装置 |
Also Published As
Publication number | Publication date |
---|---|
CN115589602A (zh) | 2023-01-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11381452B2 (en) | Network slicing method and system | |
US11316795B2 (en) | Network flow control method and network device | |
US11272396B2 (en) | Frame aggregation method, network setting frame sending method, and device | |
US10237192B2 (en) | Apparatus and system for optimizing communication networks | |
US20160315830A1 (en) | Dynamic bandwidth control systems and methods in software defined networking | |
WO2012145841A1 (fr) | Ordonnancement et mise en forme selon un profil hiérarchique | |
KR101618985B1 (ko) | Sdn 환경에서 트래픽의 동적 제어를 위한 방법 및 장치 | |
EP4024778A1 (fr) | Procédé de détermination de bande passante requise pour transmission de flux de données, et dispositifs et système | |
EP2869506B1 (fr) | Équité et évitement de congestion dans des réseaux de données avec de multiples sources de trafic | |
CN108881031B (zh) | 一种基于sdn网络的自适应可靠数据传输方法 | |
WO2020063299A1 (fr) | Procédé et système de collecte de statistiques concernant le nombre de flux actifs et dispositif de réseau | |
WO2021244247A1 (fr) | Procédé de transfert de message de données, nœud de réseau, système, et support de stockage | |
WO2021238694A1 (fr) | Procédé de détermination de bande passante en vue d'une transmission de flux de service, dispositif et système | |
US20220224653A1 (en) | Packet Forwarding Method, Device, and System | |
CN104995883A (zh) | 用信号通知拥塞 | |
KR20220029142A (ko) | Sdn 컨트롤러 서버 및 이의 sdn 기반 네트워크 트래픽 사용량 분석 방법 | |
Mliki et al. | A comprehensive survey on carrier ethernet congestion management mechanism | |
US20230336486A1 (en) | Service flow scheduling method and apparatus, and system | |
CN113438182A (zh) | 一种基于信用的流量控制系统和流量控制方法 | |
US20230362099A1 (en) | Managing data traffic congestion in network nodes | |
WO2023280004A1 (fr) | Procédé de configuration de réseau, dispositif et système | |
CN114567602B (zh) | 一种延迟保障传输系统及方法 | |
CN116346634A (zh) | 网络管控系统的状态感知信息处理方法、装置及电子设备 | |
WO2022052800A1 (fr) | Système de communication, procédé de traitement de données et dispositif associé | |
CN117014967A (zh) | 移动通信系统、方法和用户面节点 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 22836758 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 22836758 Country of ref document: EP Kind code of ref document: A1 |