Detailed Description
The following detailed description of embodiments of the invention is provided in connection with the accompanying drawings and examples:
as shown in fig. 2, a P2P service access system provided in this embodiment of the present invention is configured to implement P2P service access between a P2P service sender a and a P2P service access control and bearer separation, and includes:
the P2P data forwarding apparatus 1 is configured to receive and filter a P2P signaling and a P2P data packet sent by a P2P service sender a through a DPI proxy module 11, forward the signaling and the P2P data packet to a data analysis unit 5, receive a data flow sent by the P2P service sender 1 after a P2P tunnel is established, forward the data flow to a P2P tunnel starting node 3 through a DPI redirection module 12, and configure a P2P policy of the DPI proxy module 11 according to feedback of the data analysis unit 5 through a protocol configuration module 13;
the data analysis unit 5 is configured to analyze, by using the information analysis module 52, the start information or the end information of the P2P service according to the P2P service data packet received by the packet receiving module 51 from the P2P data forwarding apparatus 1, and feed back the start information or the end information to the P2P data forwarding apparatus 1;
the control node 2 is used for controlling the P2P tunnel starting point node 3 and the P2P tunnel end point node 4 to establish or delete the P2P tunnel according to the starting information or the ending information of the P2P service analyzed and generated by the data analysis unit 5;
the P2P tunnel starting node 3 is configured to receive control of the control node 2, perform P2P tunnel configuration through the tunnel configuration module 31, establish or delete a P2P tunnel through the P2P tunnel starting point processing module 32, and send P2P data to the P2P tunnel end node 4;
the P2P tunnel endpoint node 4 is configured to receive control of the control node 2, perform P2P tunnel configuration through the tunnel configuration module 41, establish or delete a P2P tunnel through the P2P tunnel endpoint processing module 42, receive P2P data, and send the data to the receiver B of the P2P service through the P2P data forwarding module 43.
The data analysis unit 5 includes a DPI server and a policy server.
The system further comprises the following device structure:
the information analysis module 52 further includes:
and the data detection submodule 521 is configured to detect whether the data packet of the P2P service of the sender a is received in the response time.
The P2P tunnel starting point processing module 32 includes:
the P2P tunnel processing sub-module 321 is configured to establish or delete a P2P tunnel according to the P2P tunnel configuration set by the tunnel configuration module 31;
and the P2P data stream forwarding sub-module 322 is configured to receive the P2P data stream sent by the sender a, and send the P2P traffic data stream through the P2P tunnel.
The P2P tunnel endpoint processing module 42 includes:
the P2P tunnel processing sub-module 421, configured to establish or delete a P2P tunnel according to the P2P tunnel configuration set by the tunnel configuration module 41;
and the P2P data flow forwarding sub-module 422 is configured to receive the P2P traffic data flow through the P2P tunnel, and send the P2P traffic data flow to the P2P data forwarding module 43.
In practical application, the P2P service access system provided in the embodiment of the present invention has two forms, one is a P2P service access system in which a P2P data forwarding device 1 and a P2P tunnel starting node 3 are physically integrated into an access node an (access node), and the other is a P2P service access system in which the P2P data forwarding device 1 is installed in a residential gateway rg (intellectual gateway), and further, based on the above two types of P2P service access systems, the embodiment of the present invention provides a corresponding P2P service access method, and for convenience of description, the embodiments are respectively provided as follows:
fig. 3 is a schematic structural diagram of a P2P service access system including an access node according to a first embodiment of the present invention. In the system, a P2P tunnel starting point node 3 and a P2P tunnel end point node 4 are introduced. The P2P data forwarding device 1 and the P2P tunnel origin node 3 are physically merged into an access node 6.
The P2P tunnel start node 3 and the P2P tunnel end node 4 may be located in AN RG, AN or aggregation network node, and the DPI server may be deployed in AN IP edge node, SR or aggregation network node. The DPI server and the policy server may be physically combined into one, and the embodiment of the present invention is collectively referred to as a data parsing unit 5. Wherein, the DPI server is used to configure the P2P tunnel and DPI related policies to the DPI proxy module 11, the P2P tunnel start node 3 and the P2P tunnel end node 4 through the IP edge node 3.
The access node 6 includes a DPI proxy module 11, a DPI redirection module 12, a tunnel configuration module 31, and a P2P tunnel origin processing module 32.
The DPI agent module 11 is used for analyzing an application layer of the data message through flow classification and DPI filtering and/or identifying a specific application service type and content thereof through a detection technology based on flow characteristics, and then performing QoS control according to a DPI strategy; the module forwards the P2P data packet to the P2P tunnel start point processing module 32 for processing, on the other hand, redirects the P2P data or signaling packet to the data analysis unit 5 for further processing, and further performs traffic restriction on the P2P data packet sent by the sender a.
The DPI redirection module 12 is configured to redirect the P2P data or signaling packet to the data parsing unit 5, and may be completed by using a tunneling technique (the tunnel starting point is the DPI proxy module 11, and the end point is the data parsing unit 5), or modifying the destination address of the data packet to the destination address of the DPI server, so as to forward the data packet to the data parsing unit 5 for further processing.
Tunneling techniques such as ethernet tunneling, IP tunneling, or dedicated tunneling are used to mark a data packet with a special VLAN (Virtual Local Area Network) identifier or VPN (Virtual private Network) identifier.
The tunnel configuration module 31 is configured to configure a P2P tunnel and a P2P related policy through protocols such as L2C (layer Two Control), OMCI (ONU Management and Control Interface), TR069, or GMPLS.
The P2P tunnel start point processing module 32 is configured to encapsulate the P2P data into the P2P tunnel for data transmission.
The P2P tunnel endpoint node 4 includes a tunnel configuration module 41, a P2P tunnel endpoint processing module 42, and a P2P data forwarding module 43.
A tunnel configuration module 41, configured to configure a P2P tunnel and a P2P related policy through protocols such as L2C, OMCI, TR069, or GMPLS;
and the P2P tunnel endpoint processing module 42 is configured to perform tunnel decapsulation processing on the P2P tunnel packet to obtain a P2P data packet, and send the P2P data packet to a forwarding or routing unit.
The P2P data forwarding module 43 is configured to perform two-layer MAC forwarding, IP bridging forwarding, or IP routing forwarding on the P2P data packet, and send the P2P data stream to the receiver B.
Based on the system provided by the first embodiment of the present invention, the present invention provides a P2P service access method for stopping P2P transmission by DPI analysis and a P2P service access method for stopping P2P transmission by signaling, and the specific flow is as follows in the second and third embodiments of the present invention:
as shown in fig. 4, a flowchart of a P2P service access method for terminating P2P transmission by DPI analysis according to a second embodiment of the present invention is shown, and for convenience of description, in this embodiment, the access node 6 is referred to as AN1, the AN2 is referred to as AN2, and the AN1 and the AN2 are collectively referred to as a P2P tunnel path node.
The method specifically comprises the following steps:
P2P tunnel establishment phase:
step S401, the sender A sends P2P data message to AN 1.
Step S402, the DPI agent module 11 of the AN1 identifies that the packet from the sender a is a P2P data packet through flow classification and/or DPI filtering.
Step S403, redirecting the P2P data packet to the data parsing unit 5.
Step S404, the data parsing unit 5 performs DPI analysis on the P2P data or the signaling packet, identifies the application service type and the content of the corresponding flow or parses the P2P signaling, and finds out the DPI related policy of the P2P flow.
In step S405, if the DPI related policy of the P2P flow is to allow the P2P flow, the data analysis unit 5 forwards the P2P data to the destination recipient B.
Step S406, the data analysis unit 5 issues a P2P tunnel and a policy configuration command to the control node 2 according to the DPI related policy.
Step S407, the control node 2 determines the P2P tunnel path according to the P2P tunnel and policy configuration command, the P2P source user id and the P2P destination user id, and issues a P2P tunnel and policy configuration command to AN1 and AN2, respectively.
For a PBT tunnel, the control node 2 configures an ESP identified by a P2P tunnel start node MAC, a P2P VLAN, and a P2P tunnel end node MAC to the P2P tunnel path node;
for the MPLS tunnel, the control node 2 configures a corresponding MPLS label to each path node of the MPLS LSP;
for the VLAN tunnel, the IP edge node configures a corresponding VLAN to each path node of the VLAN tunnel.
P2P data transfer phase:
step S408, when the tunnel configuration of P2P is completed, AN1 gates P2P data packets, i.e. allowing P2P data packets to pass through the P2P tunnel, and starts P2P charging.
Step S409, AN1 performs tunnel encapsulation processing on the P2P data packet from the sender a.
Step S410, P2P data flow through tunnel to AN 2.
And S411, the AN2 carries out tunnel decapsulation processing to obtain a P2P data message.
Step S412, AN2 performs two-layer MAC forwarding, IP bridging forwarding or IP routing forwarding on the P2P data message.
Step S413, P2P, the data stream arrives at receiver B.
P2P is the service termination phase:
step S414, DPI analysis. When the DPI agent module 11 does not receive the P2P datagram from the sender a within the specified time, or analyzes that the P2P traffic flow of the sender a is terminated by other methods, the process goes to step S415.
Step S415, the notification data analysis unit 5 deletes the P2P tunnel and policy.
Step S416, the data analysis unit 5 issues a P2P tunnel and policy deletion command to the control node 2;
step S417, the control node 2 issues the P2P tunnel and policy configuration command to the P2P tunnel path node according to the P2P tunnel and policy configuration command.
In the embodiment of the invention, for the PBT tunnel, the control node 2 deletes the ESP identified by the P2P tunnel starting node MAC, the P2P VLAN and the P2P tunnel end node MAC from the P2P tunnel path node;
for the MPLS tunnel, the IP edge node deletes the corresponding MPLS label to each path node of the MPLS LSP;
and for the VLAN tunnel, the IP edge node deletes the corresponding VLAN from each path node of the VLAN tunnel.
Step S418, AN1 blocks the P2P flow corresponding to the sender A, and stops P2P charging.
The P2P service ends.
As shown in fig. 5, a flowchart of a P2P service access method for terminating P2P transmission by signaling according to a third embodiment of the present invention is shown, and for convenience of description, in this embodiment, AN access node 6 is referred to as AN1, AN2 is referred to as AN2, and AN1 and AN2 are collectively referred to as a P2P tunnel path node.
The method specifically comprises the following steps:
P2P tunnel establishment phase:
step S501, the P2P data message of the sender A is uploaded to AN 1.
Step S502, the DPI agent module 11 of the AN1 identifies that the packet from the sender a is a P2P data packet through flow classification and/or DPI filtering.
Step S503, redirecting the P2P data packet to the data parsing unit 5.
Step S504, the data parsing unit 5 parses the P2P signaling message.
And step S505, issuing a P2P tunnel and policy configuration command to the control node 2 according to the DPI related policy.
Step S506, the control node 2 determines a P2P tunnel path according to the P2P tunnel and policy configuration command, the P2P source user identifier and the P2P destination user identifier, and issues a P2P tunnel and policy configuration command to the P2P tunnel path node respectively.
In the embodiment of the invention, for the PBT tunnel, the control node 2 configures ESP identified by a P2P tunnel start node MAC, a P2P VLAN and a P2P tunnel end node MAC to AN1 and AN 2;
for the MPLS tunnel, the IP edge node configures corresponding MPLS label to each path node of the MPLS LSP;
for the VLAN tunnel, the IP edge node configures a corresponding VLAN to each path node of the VLAN tunnel.
P2P data transfer phase:
step S507, when the tunnel configuration of the P2P is completed, the AN1 gates the P2P data message, namely the P2P data message is allowed to pass through the P2P tunnel, and the P2P charging is started; but the P2P signaling message is still redirected to the data parsing unit 5.
Step S508, AN1 processes the P2P data message from the sender A to tunnel package.
Step S509, P2P data stream is tunneled to AN 2.
And step S510, the AN2 carries out tunnel decapsulation processing to obtain a P2P data message.
Step S511, AN2 performs two-layer MAC forwarding, IP bridging forwarding or IP routing forwarding on the P2P data message.
Step S512, P2P data flow reaches the receiver B.
P2P service termination phase:
in step S513, the sender a issues a P2P end command.
And step S514, DPI filtering. If the DPI Proxy recognizes that the packet from the sender a is a P2P signaling packet through flow classification and/or DPI filtering, the process goes to step S515.
Step S515, redirecting the P2P signaling message to the data parsing unit 5
Step S516, the data parsing unit 5 parses the P2P ending command, and issues a P2P tunnel and policy deletion command to the control node 2.
Step S517, the control node 2 issues a P2P tunnel and policy configuration command to the P2P tunnel path node according to the P2P tunnel and policy configuration command.
Step S518, AN1 blocks the P2P flow corresponding to the sender A, and stops P2P charging.
The two P2P service access methods provided in the second embodiment and the third embodiment are completed based on the P2P service access system in the third embodiment.
On the other hand, as described above, in the implementation, there is also a P2P service access system and a P2P service access method based on the P2P service access system, which is specifically referred to the following embodiments of the present invention.
As shown in fig. 6, a P2P service access system including a residential gateway is a fourth embodiment of the present invention. In the system, a P2P tunnel starting point node 3 and a P2P tunnel end point node 4 are introduced. The P2P data forwarding device 1 is installed on a residential gateway, and for convenience, the residential gateway is abbreviated as RG, the P2P tunnel start node 3 is abbreviated as AN1, and the P2P tunnel end node 4 is abbreviated as AN 2.
In the present system, the P2P tunnel start node 3 and the P2P tunnel end node 4 may be located in AN or aggregation network node, and the DPI device may be deployed in AN IP edge node, SR or aggregation network node. The DPI server and the policy server may be physically combined into one, which is referred to as a data parsing unit 5. The data analysis unit 5 is configured to configure the P2P tunnel and the DPI related policy to the AN1 and the AN2 through the control node 2, and configure the DPI related policy to the RG through the ACS.
The RG includes a DPI proxy module 11, a DPI redirection module 12 and a protocol configuration module 13.
The DPI agent module 11 is configured to perform application layer analysis on the data packet through flow classification and DPI filtering and/or identify a specific application service type and content thereof through a detection technology based on a flow characteristic, and then perform QoS control according to a DPI policy; on one hand, the P2P data packet is forwarded to the AN1 for processing, on the other hand, the P2P data or signaling packet is redirected to the data parsing unit 5 for further processing, and the traffic of the P2P data packet sent by the sender a is restricted.
The protocol configuration module 13 is used for configuring the P2P related policy of the RG through the protocols of OMCI, TR069, and the like.
The DPI redirection module 12 is configured to redirect the P2P data or signaling packet to the data parsing unit 5, and may be completed by using a tunneling technique (the tunnel starting point is the DPI proxy module 11, and the end point is the data parsing unit 5), or modifying the destination address of the data packet to the destination address of the data parsing unit 5, so as to forward the data packet to the data parsing unit 5 for further processing.
Tunneling techniques such as ethernet tunneling, IP tunneling, or dedicated tunneling are used to mark a data packet with a special VLAN (Virtual Local Area Network) identifier or VPN (Virtual private Network) identifier.
AN1, including a tunnel configuration module 31 and a P2P tunnel origination point processing module 32.
The tunnel configuration module 31 is configured to configure a P2P tunnel and a P2P related policy through protocols such as L2C, OMCI, TR069, GMPLS, and the like;
the P2P tunnel origination processing module 32 is used to encapsulate the P2P data into a P2P tunnel, and send it to the AN 2.
The AN2 includes a tunnel configuration module 41, a P2P tunnel endpoint processing module 42, and a P2P data forwarding module 43.
Based on the system provided by the fourth embodiment of the present invention, the present invention provides a P2P service access method for stopping P2P transmission by DPI analysis and a P2P service access method for stopping P2P transmission by signaling, and the specific flow is as follows in fifth and sixth embodiments of the present invention:
as shown in fig. 7, a fifth embodiment of the present invention is a flowchart of a P2P service access method for terminating P2P transmission by DPI analysis, and for convenience of description, in this embodiment, a residential gateway is abbreviated as RG, a P2P tunnel start node 3 is referred to as AN1, a P2P tunnel end node 4 is referred to as AN2, and AN1 and AN2 are collectively referred to as a P2P tunnel path node.
The method specifically comprises the following steps:
P2P tunnel establishment phase:
step S701, the P2P data message of the sender A is uploaded to the RG;
step S702, the DPI agent module 11 filters. The DPI agent module 11 of the RG recognizes that the packet from the sender a is a P2P data packet by flow classification and/or DPI filtering. The process proceeds to step S703.
Step S703, the P2P redirects the data packet to the data parsing unit 5.
Step S704, the data parsing unit 5 performs DPI analysis on the P2P data or the signaling packet, identifies the application service type and the content of the corresponding flow or parses the P2P signaling, and finds out the DPI related policy of the P2P flow.
Step S705, if the DPI related policy of the P2P flow is to allow the P2P flow, the data parsing unit 5 forwards the P2P data to the receiving side B.
Step S706, the data parsing unit 5 then issues a P2P tunnel and a policy configuration command to the control node 2 according to the DPI related policy.
And step S707, the control node 2 determines a P2P tunnel path according to the P2P tunnel and policy configuration command, the P2P source user identifier and the P2P destination user identifier, and respectively issues a P2P tunnel and policy configuration command to the P2P tunnel path node.
In the embodiment of the invention, for the PBT tunnel, the IP edge node configures ESPs identified by a P2P tunnel starting node MAC, a P2P VLAN and a P2P tunnel end node MAC to AN1 and AN 2;
for the MPLS tunnel, the IP edge node configures corresponding MPLS label to each path node of the MPLS LSP;
for the VLAN tunnel, the IP edge node configures a corresponding VLAN to each path node of the VLAN tunnel.
Step S708, the data parsing unit 5 issues a P2P policy configuration command to the ACS.
Step S709, the ACS configures the RG according to the policy configuration command P2P to gate the P2P data stream corresponding to the sender a, i.e. allow the P2P data packet to pass through the RG.
P2P data transfer phase:
step S710, when the P2P tunnel configuration is completed, the RG and/or P2P tunnel node gates the P2P data message of the sender A, and starts P2P charging.
Step S711, AN1 processes tunnel encapsulation for P2P data message from sender A.
Step S712, P2P data stream is tunneled to AN 2.
And S713, the AN2 carries out tunnel decapsulation processing to obtain the P2P data message.
Step S714, AN2 performs two-layer MAC forwarding, IP bridging forwarding or IP routing forwarding on the P2P data message.
Step S715, P2P shows that the data stream arrives at the receiver B.
P2P service termination phase:
step S716, DPI analysis. When the DPI agent module 11 of the RG does not receive the P2P data packet from the sender a within the specified time, or analyzes that the P2P traffic flow of the sender a is terminated by other methods, the process goes to step S717.
In step S717, the notification data analysis unit 5 deletes the P2P tunnel and policy.
Step S718, the data parsing unit 5 issues a P2P tunnel and policy deletion command to the control node 2.
Step S719, the control node 2 issues the P2P tunnel and policy configuration command to the P2P tunnel path node respectively according to the P2P tunnel and policy configuration command.
In the embodiment of the invention, for the PBT tunnel, the control node 2 deletes the ESP identified by the P2P tunnel start node MAC, the P2P VLAN and the P2P tunnel end node MAC from AN1 and AN 2;
for the MPLS tunnel, the IP edge node deletes the corresponding MPLS label to each path node of the MPLS LSP;
and for the VLAN tunnel, the IP edge node deletes the corresponding VLAN from each path node of the VLAN tunnel.
Step S720, the data parsing unit 5 issues a P2P policy deletion command to the ACS.
Step S721, ACS configures that RG can not gate P2P data stream corresponding to sender a according to P2P policy delete command, i.e. P2P data packet is not allowed to pass through RG.
Step S722, RG or AN1 blocks the P2P flow corresponding to the sender A, and stops P2P charging.
As shown in fig. 8, a flowchart of a P2P service access method for terminating P2P transmission by signaling according to a sixth embodiment of the present invention is shown, and for convenience of description, in this embodiment, a residential gateway is referred to as RG, a P2P tunnel start node 3 is referred to as AN1, a P2P tunnel end node 4 is referred to as AN2, and AN1 and AN2 are collectively referred to as a P2P tunnel path node.
The method specifically comprises the following steps:
step S801, the P2P signaling message of the sender A is uploaded to the RG.
And step S802, DPI filtering. The DPI agent module 11 of the RG recognizes that the packet from the sender a is the P2P signaling packet through flow classification and/or DPI filtering, and then proceeds to step S803.
Step S803, the P2P redirects the signaling message to the data parsing unit 5.
And step S804, DIP analysis. The data parsing unit 5 parses the P2P signaling message.
Step S805, according to the DPI related policy, issues a P2P tunnel and policy configuration command to the control node 2.
In step S806, the control node 2 determines a P2P tunnel path.
And step S807, respectively issuing a P2P tunnel and policy configuration command to the P2P tunnel path node.
In the embodiment of the invention, for the PBT tunnel, the IP edge node configures ESPs identified by a P2P tunnel starting node MAC, a P2P VLAN and a P2P tunnel end node MAC to AN1 and AN 2;
for the MPLS tunnel, the IP edge node configures corresponding MPLS label to each path node of the MPLS LSP;
for the VLAN tunnel, the IP edge node configures a corresponding VLAN to each path node of the VLAN tunnel.
Step S808, the data parsing unit 5 issues a P2P policy configuration command to the ACS.
Step S809, the ACS configures the RG according to the policy configuration command P2P to gate the P2P data stream corresponding to the sender a, i.e. allow the P2P data packet to pass through the RG.
Step S810, when the tunnel configuration of the P2P is completed, the RG and/or the AN1 gates the P2P data message, that is, the P2P data message is allowed to pass through the P2P tunnel, and the P2P charging is started; but the P2P signaling message is still redirected to the data parsing unit 5.
Step S811, AN1 performs tunnel encapsulation processing on the P2P data packet from the sender a.
Step S812, P2P data stream is tunneled to AN 2.
Step S813, AN2 carries out tunnel decapsulation processing to obtain P2P data message.
Step S814, AN2 performs two-layer MAC forwarding, IP bridging forwarding or IP routing forwarding on the P2P data message.
Step S815, the P2P data stream arrives at the receiver B.
In step S816, the sender a issues a P2P end command.
And step S817, DPI filtering. The DPI agent module 11 of the RG recognizes that the packet from the sender a is the P2P signaling packet through flow classification and/or DPI filtering, and then proceeds to step S818.
Step S818, the P2P signaling message is redirected to the data parsing unit 5.
Step S819, the data parsing unit 5 parses the P2P end command, and issues a P2P tunnel and policy deletion command to the control node 2.
Step S820, the control node 2 issues the P2P tunnel and policy configuration command to the P2P tunnel path node according to the P2P tunnel and policy configuration command.
In the embodiment of the invention, for the PBT tunnel, the IP edge node deletes ESPs identified by a P2P tunnel starting node MAC, a P2P VLAN and a P2P tunnel end node MAC from AN1 and AN 2;
for the MPLS tunnel, the IP edge node deletes the corresponding MPLS label to each path node of the MPLS LSP;
and for the VLAN tunnel, the IP edge node deletes the corresponding VLAN from each path node of the VLAN tunnel.
In step S821, the data analysis unit 5 issues a P2P policy deletion command to the ACS.
Step S822, the ACS configures that the RG cannot gate the P2P data stream corresponding to the sender a according to the P2P policy deletion command, i.e. the P2P data packet is not allowed to pass through the RG.
Step S823, RG or AN1 blocks the corresponding P2P flow of the sender A, and stops P2P charging.
By applying the P2P access system with separated bearing and control, the invention introduces the P2P tunnel starting point node and the P2P tunnel terminal point node, so as to realize that the P2P service can fully exert the advantages of the communication mode from the Client to the Client, and directly carry out P2P communication through the P2P tunnel between RG or AN, so that the P2P data messages do not need to all go up to the IP Edge, thereby greatly reducing the data flow of the access aggregation network, reducing the requirements on the bandwidth and the cost of the IP Edge, and lightening the DPI processing burden of a DPI server.
The above disclosure is only for a few specific embodiments of the present invention, but the present invention is not limited thereto, and any variations that can be made by those skilled in the art are intended to fall within the scope of the present invention.