WO2022166465A1 - 一种报文处理方法及相关装置 - Google Patents
一种报文处理方法及相关装置 Download PDFInfo
- Publication number
- WO2022166465A1 WO2022166465A1 PCT/CN2021/141540 CN2021141540W WO2022166465A1 WO 2022166465 A1 WO2022166465 A1 WO 2022166465A1 CN 2021141540 W CN2021141540 W CN 2021141540W WO 2022166465 A1 WO2022166465 A1 WO 2022166465A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- network
- identifier
- slice
- packet
- network device
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/76—Routing in software-defined topologies, e.g. routing between virtual machines
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/70—Admission control; Resource allocation
- H04L47/82—Miscellaneous aspects
- H04L47/829—Topology based
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/22—Parsing or analysis of headers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/40—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using virtualisation of network functions or resources, e.g. SDN or NFV entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/02—Topology update or discovery
- H04L45/036—Updating the topology between route computation elements, e.g. between OpenFlow controllers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/302—Route determination based on requested QoS
- H04L45/306—Route determination based on the nature of the carried application
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/302—Route determination based on requested QoS
- H04L45/308—Route determination based on user's profile, e.g. premium users
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/34—Source routing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/50—Routing or path finding of packets in data switching networks using label swapping, e.g. multi-protocol label switch [MPLS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/74—Address processing for routing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/70—Admission control; Resource allocation
- H04L47/72—Admission control; Resource allocation using reservation actions during connection setup
- H04L47/724—Admission control; Resource allocation using reservation actions during connection setup at intermediate nodes, e.g. resource reservation protocol [RSVP]
Definitions
- the present application relates to the field of communication technologies, and in particular, to a message processing method and related apparatus.
- Network slicing is a form of virtualization that allows multiple logical networks to run on top of a shared physical network infrastructure. That is to say, based on a shared physical network, corresponding network slices (or virtual networks) are cut out through virtualization technology to meet the differentiated needs of users. Each virtual network slice is logically resource isolated, independent of each other, and does not affect each other.
- the solution for implementing packet forwarding based on network slices in the bearer network is as follows: the controller uniformly assigns a slice identifier to each network slice; the packets received by the network device carry the slice identifier, and the network device determines the slice identifier according to the slice identifier. network slice, and use the resource corresponding to the determined network slice to forward the packet.
- the current slice identifier is a global identifier, which requires all devices in the network to consistently understand the meaning of the slice identifier, and use the resources indicated by the slice identifier to forward packets.
- the slice capabilities supported by different devices in the network may be different, and the number of slices supported by different devices may also be different. It is difficult to ensure that all devices can use the same slice ID to perform corresponding packet forwarding behaviors.
- the present application provides a packet processing method.
- the packet carries a slice identifier including a plurality of sub identifiers, and different sub identifiers indicate different attributes of network slices, ensuring that devices with different slice capabilities can also use the slice identifiers as indicated by the slice identifiers. properties of the network slice to perform the corresponding packet forwarding behavior.
- a first aspect of the present application provides a packet processing method.
- the method includes: a first network device obtains a first packet, where the first packet includes a first slice identifier.
- the first slice identifier is used to identify the first network slice to which the first packet belongs.
- the first slice identifier includes a plurality of consecutive sub-identities, and each sub-identity may be represented by a field, so the first slice identifier may be represented by a plurality of consecutive fields.
- the multiple sub-identities in the first slice identifier are respectively used to represent different attributes of the first network slice, such as attributes such as topology, path calculation algorithm, or forwarding resources of the first network slice.
- the first network device forwards the first packet according to the first slice identifier in the first packet. Specifically, the first network device can determine the first network slice to which the first packet belongs based on the first slice identifier in the first packet. Therefore, the first network device can forward the first packet based on the resource corresponding to the first network slice.
- the multiple sub-identities include topology identifiers and resource identifiers.
- the topology identifier is used to represent the topology of the first network slice, that is, the topology to which the first network slice belongs in the network domain.
- the resource identifier is used to represent the forwarding resource of the first network slice.
- the forwarding resources of the first network slice include, for example, a physical interface, a logical sub-interface, and/or a packet queue.
- the slice identifier in the packet that is forwarded in the network domain may include a topology identifier and a resource identifier.
- the network device determines the topology of the network slice through the topology identifier, and further determines the forwarding resource corresponding to the network slice based on the resource identifier.
- network slices with different topologies and different forwarding resources can use the same destination IP address, MPLS label or SID to identify the same destination IP address, MPLS label or SID.
- by carrying the topology identifier and the resource identifier separately it is possible to use forwarding entries of the same topology to perform forwarding processing on multiple slices with the same topology, reducing the impact of slices on the increase in the number of forwarding entries.
- the plurality of sub-identities further include an algorithm identification, where the algorithm identification is used to indicate a path calculation algorithm of the first network slice. That is, the first slice identifier includes a topology identifier, an algorithm identifier, and a resource identifier.
- the first network device first determines the purpose of the first packet according to the information (for example, the above-mentioned destination address, MPLS label, or SID) used to indicate the forwarding path in the first packet.
- the information for example, the above-mentioned destination address, MPLS label, or SID
- the first network device determines the topology used to go to the destination node according to the topology identifier in the first message, and determines the route calculation algorithm used to go to the destination node based on the algorithm identifier in the first message, so as to obtain the the interface for forwarding the packet; finally, the first network device determines the corresponding forwarding resource (eg, logical sub-interface or queue) on the interface according to the resource identifier in the first packet, thereby implementing the forwarding of the first packet.
- the corresponding forwarding resource eg, logical sub-interface or queue
- the same information can be used to identify the same destination node in network slices with different topologies, using different algorithms, and having different resources, avoiding the need for Slicing plans a larger number of destination node information.
- forwarding entries with the same topology or the same algorithm can be used to forward multiple slices with the same topology or algorithm, reducing the impact of slices on the increase in the number of forwarding entries. .
- the multiple sub-identities include an algorithm identification and a resource identification
- the algorithm identification is used to indicate the path calculation algorithm of the first network slice
- the resource identification is used to indicate the forwarding resource of the first network slice.
- the first network device first determines the first packet according to the information (for example, the above-mentioned destination address, MPLS label or SID) used to indicate the forwarding path in the first packet. the destination node of the message; then, the first network device determines the route calculation algorithm used to reach the destination node according to the algorithm identifier in the first packet, so as to obtain the interface corresponding to the forwarding path obtained when the route calculation algorithm is adopted; finally, The first network device determines a corresponding forwarding resource (for example, a logical sub-interface or a queue) on the interface according to the resource identifier in the first packet, thereby implementing forwarding of the first packet.
- the information for example, the above-mentioned destination address, MPLS label or SID
- network slices with different topologies and different forwarding resources can use the same information to identify the same destination node, avoiding the need for Slicing plans a larger number of destination node information.
- forwarding entries with the same algorithm can be used to forward multiple slices with the same path calculation algorithm, reducing the impact of slices on the increase in the number of forwarding entries.
- the multiple sub-identities further include a domain identifier, and the domain identifier is used to indicate a network domain in which the first slice identifier is valid.
- the multiple sub-identities include domain identification, topology identification, and resource identification; or, the multiple sub-identifications include domain identification, algorithm identification, and resource identification; or, the multiple sub-identifications include domain identification, topology identification, algorithm identification Identity and resource identity.
- the multiple sub-identities include a domain identifier and a resource identifier
- the domain identifier is used to indicate the network domain in which the first slice identifier is valid
- the resource identifier is used to indicate the forwarding of the first network slice.
- resource is used to represent the network domain in which the first slice identifier is valid
- the resource identifier is used to represent the forwarding resources of the first network slice.
- the combination of sub-identifications including domain identification and resource identification in the slice identification may be applicable to network slice scenarios spanning multiple network domains.
- network slices in each network domain can use different domain IDs and resource IDs.
- Network slices of multiple network domains are spliced to form cross-domain network slices.
- the forwarding resources include physical interfaces, logical sub-interfaces and/or packet queues.
- the first network device forwarding the first packet according to the first slice identifier includes: the first network device, according to the sub-identity and the mapping table in the first slice identifier, determining an interface for forwarding the first packet and a forwarding resource of the interface; the first network device forwards the first packet to a second network device according to the forwarding resource of the interface; wherein the The mapping table includes the mapping relationship between the plurality of sub-identities and interfaces.
- the mapping table may be a mapping relationship including multiple sub-identities and interfaces and forwarding resources of the interface at the same time, and the mapping table may also include multiple sub-mapping tables, and the multiple sub-mapping tables respectively include each sub-identity and interface. mapping relationship between them.
- the plurality of sub-identities further include flag identifiers.
- the first slice identifier in addition to the topology identifier and the resource identifier, also includes a flag bit identifier.
- the first slice identifier includes a domain identifier, a topology identifier, an algorithm identifier, and a resource identifier, and the first slice identifier also includes a flag bit identifier.
- the flag bit identifier is used to indicate a sub-identity in the first slice identifier used to direct forwarding and a forwarding policy corresponding to the first slice identifier.
- the sub-identity used to guide forwarding refers to the sub-identity selected by the network device to guide the forwarding of the packet in the first slice identifier.
- the sub-identities used to direct forwarding may be one or more sub-identities other than the flag bit identification in the first slice identification.
- the sub-identities used to direct forwarding may be a topology identifier and an algorithm identifier;
- the sub-identities can be topology identification, algorithm identification and resource identification.
- the flag bit identifier is used to indicate which sub-identifiers in the slice identifier need to be used by the network device to perform packet forwarding.
- the forwarding policy represented by the flag bit identifier is used to indicate the forwarding behavior after the interface is determined according to the sub-identity used to direct forwarding.
- the forwarding behavior may refer to: if the first network device cannot find the interface for forwarding according to the first slice identifier, the first network device may not determine the interface for forwarding according to the first slice identifier, The first network device may forward the packet based on a default slice; or, if the first network device cannot find an interface for forwarding according to the first slice identifier, the first network device discards the first packet.
- the network device can perform packet forwarding based on different strategies, thereby satisfying the diversification in the packet forwarding process. business requirements.
- the method further includes: receiving, by the first network device, a second packet, where the second packet includes a second slice identifier;
- the second slice identifier is updated to the first slice identifier to obtain the first packet.
- the second slice identifier is valid in the second network domain, and the first slice identifier is valid in the first network domain where the first network device is located.
- the first slice identifier is used to indicate the first network slice in the first network domain
- the second slice identifier is used to indicate the second network slice in the second network domain
- the second slice identifier is used to indicate the second network slice in the second network domain.
- the Service-Level Agreement (SLA) of one network slice is the same as the SLA of the second network slice. That is, the network quality of the first network slice is the same as the network quality of the second network slice.
- SLA Service-Level Agreement
- the first network device is a border node in the bearer network, and the first network device receives a packet sent by a network device in a network other than the bearer network, and the packet carries a slice identifier of the entire network.
- the first network device can receive the second packet sent by the network device in the access network or the core network.
- the packet carries the second slice identifier, and the second slice identifier is valid in the entire network, that is, the first slice identifier is valid in the entire network.
- the two-slice identifier is valid in the access network, bearer network, and core network.
- the second slice identifier is a single network slice selection support information (Single Network Slice Selection Assistance Information, S-NSSAI) or an application-aware network (Application-Aware Networking, APN) identifier.
- S-NSSAI Single Network Slice Selection Assistance Information
- APN Application-Aware Networking
- the first network device is a border node in the bearer network
- the second packet obtained by the first network device carries a second slice identifier that is valid in the bearer network including multiple network domains.
- the second slice identifier can indicate the network slice to which the second packet belongs in multiple network domains of the entire bearer network.
- the format of the second slice identifier may be the same as that of the first slice identifier, and the format of the second slice identifier may also be different from that of the first slice identifier. In this way, the first network device can convert the second slice identifier valid in multiple network domains into the first slice identifier valid in the network domain where the first network device is located.
- the first network device may be a network domain located in the bearer network, and the first network device receives packets sent by network devices outside the network domain. Specifically, the first network device receives the third packet, and determines the network slice to which the third packet belongs. The third packet comes from a network device outside the network domain to which the first network device belongs. The first network device then adds the first slice identifier to the third packet according to the network slice to which the third packet belongs to obtain the first packet.
- the determining, by the first network device, the network slice to which the third packet belongs includes: the first network device determining, according to information in the third packet, the network slice to which the third packet belongs.
- Network slice wherein, the information in the third packet includes one or more of the following information: source address, destination address, protocol number, Differentiated Services Code Point (Differentiated Services Code Point, DSCP) field, traffic level ( Traffic Class) field, Virtual Local Area Network identifier (VLAN ID), and port number.
- DSCP Differentiated Services Code Point
- Traffic Class Traffic Class
- VLAN ID Virtual Local Area Network identifier
- the first network device adding the first slice identifier to the third packet according to the network slice to which the third packet belongs including: the first network device according to the The network slice to which the third packet belongs, the first slice identifier and the fourth slice identifier are added to the third packet to obtain the first packet; the fourth slice identifier is used to The bearer network of each network domain identifies the network slice to which the third packet belongs.
- the determining, by the first network device, the network slice to which the third packet belongs includes: determining, by the first network device, the third packet according to a third slice identifier in the third packet.
- the third slice identifier in the third packet is a global identifier in the bearer network and takes effect in multiple network domains of the entire bearer network, that is, the third slice identifier can identify the third packet in the bearer network.
- the first network device may determine the network slice to which the third packet belongs based on the third slice identifier, so as to obtain the first slice identifier valid in the network domain where the first network device is located. Then, the first network device adds the first slice identifier to the third packet to obtain the first packet, where the first packet includes both the third slice identifier and the first slice identifier.
- the first network device When the third packet received by the first network device only includes the third slice identifier, the first network device adds the first slice identifier on the basis of the third slice identifier, so that the obtained first packet includes Two slice identifiers, the third slice identifier and the first slice identifier.
- the first network device determines the first slice identifier according to the third slice identifier, and replaces another slice identifier in the third packet with the first slice identifier, so that the obtained first packet includes the third slice identifier and the first slice identifier.
- Slice ID These two slice IDs.
- a second aspect of the present application provides a network device, including a transceiver unit and a processing unit.
- the transceiver unit is configured to acquire a first packet, where the first packet includes a first slice identifier, and the first slice identifier includes multiple consecutive sub-identities, and the multiple sub-identities are used to represent the first Different attributes of network slices, the first slice identifier is used to identify the first network slice to which the first packet belongs; the transceiver unit is further configured to forward the first network slice according to the first slice identifier message.
- the multiple sub-identities include a topology identifier and a resource identifier, where the topology identifier is used to represent the topology of the first network slice, and the resource identifier is used to represent forwarding resources of the first network slice.
- the plurality of sub-identities further include an algorithm identification, where the algorithm identification is used to indicate a path calculation algorithm of the first network slice.
- the multiple sub-identities include an algorithm identification and a resource identification
- the algorithm identification is used to indicate the path calculation algorithm of the first network slice
- the resource identification is used to indicate the forwarding resource of the first network slice.
- the multiple sub-identities further include a domain identifier, where the domain identifier is used to indicate a network domain in which the first slice identifier is valid.
- the multiple sub-identities include a domain identifier and a resource identifier, the domain identifier is used to indicate the network domain in which the first slice identifier is valid, and the resource identifier is used to indicate the forwarding of the first network slice. resource.
- the forwarding resources include physical interfaces, logical sub-interfaces and/or packet queues.
- the processing unit is configured to determine an interface for forwarding the first packet and a forwarding resource of the interface according to the sub-identity in the first slice identifier and the mapping table; the forwarding The unit is further configured to forward the first packet to the second network device according to the forwarding resource of the interface; wherein the mapping table includes the mapping relationship between the multiple sub-identities and the interface.
- the multiple sub-identities further include a flag bit identification, and the flag bit identification is used to indicate a forwarding strategy corresponding to the first slice identification, and the forwarding strategy is used to indicate that according to the sub-identity used for guiding forwarding Forwarding behavior after an interface is determined.
- the forwarding behavior includes: if the interface for forwarding cannot be found according to the first slice identifier, the interface for forwarding is not determined according to the first slice identifier; or, if the interface for forwarding cannot be determined according to the first slice identifier; If the first slice identifier cannot find an interface for forwarding, the first packet is discarded.
- the transceiver unit is further configured to receive a second packet, where the second packet includes a second slice identifier; the processing unit is further configured to update the second slice identifier to the first slice identifier The slice identifier is obtained, and the first packet is obtained.
- the first slice identifier is used to indicate the first network slice in the first network domain
- the second slice identifier is used to indicate the second network slice in the second network domain
- the second slice identifier is used to indicate the second network slice in the second network domain.
- the service level agreement SLA of one network slice is the same as the SLA of the second network slice.
- the first network device is a border node of a bearer network
- the second slice identifier is a single network slice selection support information S-NSSAI or an application aware network APN identifier.
- the transceiver unit is further configured to receive a third packet; the processing unit is further configured to determine the network slice to which the third packet belongs; the processing unit is further configured to determine the network slice to which the third packet belongs; For the network slice to which it belongs, add the first slice identifier to the third packet to obtain the first packet.
- the processing unit is further configured to determine, according to the information in the third packet, the network slice to which the third packet belongs; wherein the information in the third packet includes one of the following information: One or more of: source address, destination address, protocol number, Differentiated Services Code Point DSCP field, traffic class TC field, VLAN ID and port number.
- the processing unit is further configured to add the first slice identifier and the fourth slice identifier to the third packet according to the network slice to which the third packet belongs, to obtain the first slice. packet; the fourth slice identifier is used to identify the network slice to which the third packet belongs in a bearer network including multiple network domains.
- the processing unit is further configured to determine, according to the third slice identifier in the third packet, the network slice to which the third packet belongs; wherein the third slice identifier is used to include multiple slices.
- the bearer network of each network domain identifies the network slice to which the third packet belongs.
- a third aspect of the present application provides a network device, where the network device includes: a processor, configured to enable the network device to implement the method described in any possible implementation manner of the foregoing first aspect.
- the device may further include a memory, the memory is coupled to the processor, and when the processor executes the instructions stored in the memory, the network device can implement the method described in any possible implementation manner of the foregoing first aspect.
- the device may also include a communication interface for the apparatus to communicate with other devices, for example, the communication interface may be a transceiver, circuit, bus, module or other type of communication interface.
- the instructions in the memory may be stored in advance, or may be downloaded from the Internet and stored after using the network device.
- This application does not specifically limit the source of the instructions in the memory.
- the coupling in this application is an indirect coupling or connection between devices, units or modules, which may be in electrical, mechanical or other forms, and is used for information exchange between devices, units or modules.
- a fourth aspect of the present application provides a network system, where the network system includes multiple network devices, and the multiple network devices include the network device described in the foregoing third aspect.
- the network device acquires the message, the network device can implement the method described in any possible implementation manner of the foregoing first aspect.
- a fifth aspect of the present application provides a computer storage medium, where the computer storage medium may be non-volatile; computer-readable instructions are stored in the computer storage medium, and when the computer-readable instructions are executed by a processor, the first aspect is implemented The method described in any of the possible implementations of .
- a sixth aspect of the present application provides a computer program product comprising instructions which, when run on a computer, cause the computer to perform a method as described in any possible implementation of the first aspect.
- FIG. 1 is a schematic structural diagram of a network according to an embodiment of the present application.
- FIG. 2 is a schematic flowchart of a packet processing method 200 provided by an embodiment of the present application.
- 3a is a schematic structural diagram of a slice identifier provided by an embodiment of the present application.
- 3b is a schematic structural diagram of another slice identifier provided by an embodiment of the present application.
- FIG. 3c is a schematic diagram of forwarding a message according to an embodiment of the present application.
- FIG. 4a is a schematic structural diagram of a slice identifier provided by an embodiment of the present application.
- FIG. 4b is a schematic diagram of another packet forwarding provided by an embodiment of the present application.
- FIG. 5a is a schematic structural diagram of a slice identifier provided by an embodiment of the present application.
- FIG. 5b is a schematic diagram of another packet forwarding provided by an embodiment of the present application.
- 5c is a schematic diagram of a network device forwarding a packet based on a slice identifier according to an embodiment of the present application
- FIG. 6 is a schematic structural diagram of another slice identifier provided by an embodiment of the present application.
- FIG. 7 is another schematic structural diagram of a first slice identifier provided in an embodiment of the present application.
- FIG. 8 is a schematic structural diagram of a first slice identifier provided by an embodiment of the present application.
- FIG. 9a is a schematic diagram of division of a network domain according to an embodiment of the present application.
- FIG. 9b is a schematic diagram of another network domain division provided by an embodiment of the present application.
- FIG. 10 is a schematic structural diagram of a network device 1000 according to an embodiment of the present application.
- FIG. 11 is a schematic structural diagram of a network device 1100 provided by an embodiment of the application.
- FIG. 12 provides a schematic structural diagram of a network system 1200 according to an embodiment of the present application.
- the naming or numbering of the steps in this application does not mean that the steps in the method flow must be executed in the time/logical sequence indicated by the naming or numbering, and the named or numbered process steps can be implemented according to the The technical purpose is to change the execution order, as long as the same or similar technical effects can be achieved.
- the division of units in this application is a logical division. In practical applications, there may be other division methods. For example, multiple units may be combined or integrated into another system, or some features may be ignored. , or not implemented, in addition, the shown or discussed mutual coupling or direct coupling or communication connection may be through some interfaces, and the indirect coupling or communication connection between units may be electrical or other similar forms. There are no restrictions in the application.
- units or sub-units described as separate components may or may not be physically separated, may or may not be physical units, or may be distributed into multiple circuit units, and some or all of them may be selected according to actual needs. unit to achieve the purpose of the scheme of this application.
- enhanced mobile broadband enhanced mobile broadband
- eMBB enhanced mobile broadband
- massive machine type communication mMTC
- uRLLC ultra-reliable and low latency communications
- Network slicing refers to the logical network customized according to different business requirements on the physical or virtual network infrastructure.
- Network slicing can be a complete end-to-end network including an access network, a bearer network, a core network, and an application server, which can provide complete communication services and have certain network capabilities.
- Network slicing can also be any combination of access network, bearer network, core network and application server.
- a network slice can often be thought of as an instantiated 5G network.
- Such a network structure allows operators to provide the network as a service to users, and can freely combine physical networks according to indicators such as rate, capacity, coverage, delay, reliability, security, and availability to meet the needs of different users. Require.
- a solution for implementing packet forwarding based on network slices in a bearer network is as follows: the controller uniformly assigns a slice identifier to each network slice.
- the packet received by the network device carries a slice identifier, and the slice identifier and other fields in the packet indicating the destination address or path determine the forwarding behavior of the packet.
- a network device forwards a packet, it determines the packet according to the destination address field, Multi-Protocol Label Switching (MPLS) label stack or Segment Routing header (SRH) and other information in the packet. Interface.
- MPLS Multi-Protocol Label Switching
- SSH Segment Routing header
- the current slice identifier is a global identifier, which requires all devices in the network to consistently understand the meaning of the slice identifier, and use the resources indicated by the slice identifier to forward packets.
- the slice capabilities supported by different devices in the network may be different, and the number of slices supported by different devices may also be different. It is difficult to ensure that all devices can use the same slice ID to perform corresponding packet forwarding behaviors.
- the same forwarding action can be performed for a group of network slices, that is, packets are forwarded based on the same interface.
- the network device cannot obtain common features between slices based on the slice identifiers.
- the network device also needs to combine other identifiers in the packet, such as the destination IP address field, MPLS label or segment identifier (segment ID, SID) shared by the same group of slices to guide the forwarding of slices.
- IP addresses, MPLS labels or SIDs to be planned and allocated based on some attributes of the slice, such as assigning different IP addresses, MPLS labels or SIDs to identify different topologies or algorithms, thus increasing the planning difficulty and quantity of IP addresses or labels .
- an embodiment of the present application provides a packet processing method, by carrying a slice identifier including a plurality of sub identifiers in a packet, and different sub identifiers indicate different attributes of network slices, ensuring devices with different slice capabilities. Corresponding packet forwarding behavior can also be performed according to the attributes of the network slice indicated by the slice identifier.
- FIG. 1 is a schematic structural diagram of a network according to an embodiment of the present application.
- the network shown in FIG. 1 includes a network device 1 - a network device 8 .
- the network device 1 is the head node in the network
- the network device 2 - the network device 7 are the intermediate nodes in the network
- the network device 8 is the tail node in the network.
- the network device 1 encapsulates a slice identifier including a plurality of consecutive sub-IDs in the message, and sends the message to the intermediate node in the network domain.
- the intermediate node in the network domain forwards the message according to the slice identifier in the message, so as to realize forwarding the message to the network device 8 serving as the tail node.
- the network device 8 forwards the packet to other network domains according to the slice identifier in the packet.
- FIG. 2 is a schematic flowchart of a packet processing method 200 provided by an embodiment of the present application.
- the packet processing method 200 can be applied to the network structure shown in FIG. 1 .
- the packet processing method 200 at least includes the following steps.
- Step 201 the first network device obtains a first packet, the first packet includes a first slice identifier, the first slice identifier includes multiple consecutive sub-identities, and the multiple sub-identities are used to represent different attributes of the first network slice, The first slice identifier is used to identify the first network slice to which the first packet belongs.
- the first network device is a network in a bearer network.
- the first network device may be a network device in an MPLS network, an Internet Protocol version 4 (Internet Protocol version 4, IPv4) network, or an Internet Protocol version 6 (Internet Protocol version 6, IPv6) network.
- the first network device may be, for example, a physical device such as a router, a switch, or a gateway, or a virtual device that supports packet forwarding. This embodiment does not limit the specific type of the first network device.
- the manner in which the first network device obtains the first packet may be by receiving the first packet sent by other network devices, for example, receiving a data packet sent by a network device located outside the MPLS network, or by generating the first packet by itself, Or the first packet is received from a network device on the access network side.
- the first packet includes a first slice identifier for identifying the first network slice to which the first packet belongs.
- the first slice identifier includes a plurality of consecutive sub-identities, and each sub-identity may be represented by a field, so the first slice identifier may be represented by a plurality of consecutive fields.
- the multiple sub-identities in the first slice identifier are respectively used to represent different attributes of the first network slice, such as attributes such as the topology of the first network slice, a path calculation algorithm, or a forwarding resource.
- the first slice identifier may be carried in different positions in different types of data packets, and this embodiment does not specifically limit the carrying manner of the first slice identifier.
- the first packet may be an IPv6 data packet.
- the first slice identifier may be carried in some fields of the fixed packet header of the IPv6 data packet, for example, the flow label (Flow label) field, the source address field or the destination address field of the fixed packet header.
- the first slice identifier can also be carried in the extension header of the IPv6 data message, and the extension header of the IPv6 data message can be, for example, a hop by hop (HBH) header, a routing extension header or Purpose extension header.
- HBV hop by hop
- the first packet may be an MPLS data packet.
- the first slice identifier may be carried in the MPLS label stack of the MPLS packet header of the MPLS data packet.
- the first slice identifier may also be carried in a control word field or an extension header located after the MPLS packet header.
- the extension header in the MPLS data packet is located between the MPLS label and the payload.
- Step 202 the first network device forwards the first packet according to the first slice identifier.
- the first network device can determine the first network slice to which the first packet belongs based on the first slice identifier in the first packet. Therefore, the first network device can forward the first packet based on the resource corresponding to the first network slice.
- different sub identifiers indicate different attributes of the network slice, ensuring that devices with different slice capabilities can also use the slice identifier to indicate the network slice. attribute to perform the corresponding packet forwarding behavior.
- Scenario 1 The multiple sub-identities in the first slice identifier include topology identifiers and resource identifiers.
- FIG. 3a is a schematic structural diagram of a slice identification provided by an embodiment of the present application.
- the first slice identifier includes a topology identifier and a resource identifier.
- the topology identifier is used to indicate the topology of the first network slice, that is, the topology to which the first network slice belongs in the network domain.
- the resource identifier is used to represent the forwarding resource of the first network slice.
- the forwarding resources of the first network slice include, for example, a physical interface, a logical sub-interface, and/or a packet queue.
- the resource identifier may include multiple levels of sub-identities, and sub-identities of different levels represent different forwarding resources. More fine-grained forwarding resources can be indicated based on the multi-level sub-identification in the resource identifier.
- FIG. 3b is a schematic structural diagram of another slice identifier provided by an embodiment of the present application.
- the resource identifier in the first slice identifier may include a primary resource identifier and a secondary resource identifier, and the primary resource identifier and the secondary resource identifier represent different forwarding resources.
- the resource indicated by the primary resource identifier is the logical sub-interface corresponding to the interface
- the resource indicated by the secondary resource identifier is the queue resource corresponding to the logical sub-interface; in this way, based on the primary resource identifier and the secondary resource identifier, the first The network device can determine specific forwarding resources on the interface for forwarding the first packet.
- the network domain where the first network device is located may be a topology that uses a multi-topology (Multi-topology) technology to divide network slices in the network domain.
- Multi-topology multi-topology
- Different network slices in the network domain can correspond to different topologies; different network slices in the network domain can also correspond to the same topology, but the forwarding resources allocated to different network slices on the network device are different. Forwarding resources allocated for different network slices are distinguished based on resource identifiers.
- the slice identifier in the packet that is forwarded in the network domain may include a topology identifier and a resource identifier.
- the network device determines the topology of the network slice through the topology identifier, and further determines the forwarding resource corresponding to the network slice based on the resource identifier.
- the process of forwarding the first packet by the first network device based on the first slice identifier is as follows: the first network device first The destination node of the first packet is determined according to the information used to indicate the forwarding path, such as the destination address, MPLS label, or segment ID (SID) in the first packet; then, the first network device determines the destination node of the first packet according to the information in the first packet The topology identifier determines the topology used to go to the destination node, so as to obtain the interface to the destination node under this topology; finally, the first network device determines to use the corresponding forwarding resource (for example, logical) on the interface according to the resource identifier in the first message. sub-interface or queue) to forward the first packet.
- the corresponding forwarding resource for example, logical
- a mapping table for guiding packet forwarding may be preset in the first network device, and the mapping table may be delivered by the controller or manually configured, for example.
- the mapping table of the first network device includes mapping relationships between multiple sub-identities in the first slice identifier and interfaces.
- the first network device first determines one or more interfaces to the destination node of the first packet according to information such as the destination address, MPLS label, or SID in the first packet. Then, the first network device determines, according to the topology identifier, the resource identifier and the mapping table, an interface for forwarding the first packet and a forwarding resource corresponding to the interface in one or more interfaces to the destination node of the first packet. Finally, the first network device forwards the first packet to the second network device according to the determined interface and the forwarding resource corresponding to the interface.
- the mapping table in the first network device may simultaneously include mapping relationships between multiple sub-identities and interfaces and forwarding resources of the interfaces. That is, the mapping table includes different sub-identity combinations, each sub-identity combination has a corresponding interface and forwarding resources of the interface, and different sub-identity combinations correspond to different interfaces or different forwarding resources. For example, topology ID 1 and resource ID 1 correspond to interface 1 and queue 1 on interface 1; topology ID 1 and resource ID 2 correspond to queue 2 on interface 1 and interface 1; topology ID 2 and resource ID 3 correspond to interfaces 2 and queue 3 on interface 2.
- the first network device may determine, based on the multiple sub-identities in the first slice identifier and the mapping table, the interface in the mapping table that uniquely corresponds to the multiple sub-identities and the forwarding resources of the interface.
- the mapping table in the first network device may also include multiple different sub-mapping tables, and the different sub-mapping tables include mapping relationships between different sub-identities and interfaces or forwarding resources.
- the mapping table in the first network device includes sub-mapping table 1 and sub-mapping table 2, where sub-mapping table 1 includes a mapping relationship between topology identifiers and interfaces, and sub-mapping table 2 includes a mapping relationship between resource identifiers and forwarding resources.
- the first network device may determine the interface based on the topology identifier and the sub-mapping table 1, and then determine the forwarding resource corresponding to the interface based on the resource identifier and the sub-mapping table 2.
- FIG. 3c is a schematic diagram of packet forwarding provided by an embodiment of the present application.
- the network structure shown in Fig. 1 is topologically divided by using the multi-topology technology, and the topology 1 and the topology 2 are obtained.
- topology 1 includes network device 1, network device 2, network device 3, network device 4, and network device 8;
- topology 2 includes network device 1, network device 5, network device 6, network device 7, and network device 8.
- network device 1 obtains a packet, and the destination node of the packet is network device 8; and the topology identifier in the packet is used to represent topology 1, and the resource identifier in the packet is used to represent queue 1. Then, based on the destination node of the packet, the network device 1 can determine that the interfaces for forwarding the packet include the interface between the network device 1 and the network device 2 and the interface between the network device 1 and the network device 5 .
- network device 1 determines to use topology 1 to forward the message based on the topology identifier in the message, thereby determining that the interface for forwarding the message is the interface between network device 1 and network device 2; further, the network Device 1 determines, based on the resource identifier in the packet, to finally use queue 1 corresponding to the interface between network device 1 and network device 2 to forward the packet.
- network slices with different topologies and different forwarding resources can be identified by the same destination IP address, MPLS label or SID.
- the same destination node avoids planning a larger number of IP addresses, MPLS labels or SIDs for slices.
- by carrying the topology identifier and the resource identifier separately it is possible to use forwarding entries of the same topology to perform forwarding processing on multiple slices with the same topology, reducing the impact of slices on the increase in the number of forwarding entries.
- Scenario 2 The multiple sub-identities in the first slice identifier include algorithm identifiers and resource identifiers.
- FIG. 4a is a schematic structural diagram of a slice identification provided by an embodiment of the present application.
- the first slice identifier includes an algorithm identifier and a resource identifier.
- the algorithm identifier is used to indicate a path calculation algorithm of the first network slice, that is, an algorithm used by the first network slice to perform path calculation in the network domain.
- the resource identifier is used to represent the forwarding resource of the first network slice.
- the forwarding resources of the first network slice include, for example, a physical interface, a logical sub-interface, and/or a packet queue.
- the resource identifier in the first slice identifier may also include multi-level sub-identities, and sub-identities at different levels represent different forwarding resources.
- the specific manner in which the resource identifier includes multi-level sub-identities may refer to the above-mentioned embodiments, and details are not described herein again.
- the network domain where the first network device is located may adopt a flexible algorithm (Flex-Algo) or other specific algorithms and other route calculation algorithms to define the route calculation constraints of the network slices in the network domain.
- Different network slices in the network domain may use different path calculation algorithms to calculate paths.
- Different network slices in the network domain can also use the same route calculation algorithm to calculate the route, but the forwarding resources allocated for different network slices on the network device are different, and the network device can be divided into different network slices based on resource identifiers Allocated forwarding resources.
- the process of forwarding the first packet by the first network device based on the first slice identifier is as follows: the first network device first The destination node of the first packet is determined according to the information (for example, the above-mentioned destination address, MPLS label or SID) used to indicate the forwarding path in the first packet; then, the first network device determines the destination node according to the algorithm identifier in the first packet Go to the path calculation algorithm used by the destination node, so as to obtain the interface corresponding to the forwarding path obtained when the path calculation algorithm is adopted; finally, the first network device determines the corresponding forwarding resource on the interface according to the resource identifier in the first message ( For example, a logical sub-interface or a queue), so as to realize the forwarding of the first packet.
- the resource identifier for example, a logical sub-interface or a queue
- the first network device may forward the first packet based on the preset mapping table and the algorithm identifier and the resource identifier in the first packet.
- the mapping table in the first network device may include both the algorithm identifier and the resource identifier and the interface and the mapping relationship between the forwarding resources of the interface, and the mapping table in the first network device may also include multiple sub-mapping tables.
- the mapping table respectively includes a mapping relationship between algorithm identifiers and interfaces, and a mapping relationship between resource identifiers and forwarding resources.
- FIG. 4b is a schematic diagram of another packet forwarding provided by this embodiment of the present application.
- the network structure in FIG. 4b can use different path calculation algorithms to calculate the packet path.
- network device 1 obtains the packet
- the destination node of the packet is network device 8.
- the calculated forwarding path of the packet is: network device 1 > network device 2 > network device 3 > network device 4 > network device 8.
- the network device adopts Algorithm 2 to calculate the forwarding path of the packet the calculated forwarding path of the packet is: network device 1 > network device 5 > network device 6 > network device 7 > network device 8.
- the packet obtained by the network device 1 includes an algorithm identifier and a resource identifier
- the path calculation algorithm indicated by the algorithm identifier is algorithm 1
- the forwarding resource indicated by the resource identifier is queue 2.
- network device 1 determines that the interface forwarding the message is the interface between network device 1 and network device 2; further, network device 1 determines based on the resource identifier in the message
- the queue 2 corresponding to the interface between the network device 1 and the network device 2 is used to forward the packet.
- network slices with different topologies and different forwarding resources can use the same information to identify the same destination node, avoiding the need for Plan a larger number of destination node information for slices.
- forwarding entries with the same algorithm can be used to forward multiple slices with the same path calculation algorithm, reducing the impact of slices on the increase in the number of forwarding entries.
- the multiple sub-identities in the first slice identifier include topology identifiers, algorithm identifiers, and resource identifiers.
- FIG. 5a is a schematic structural diagram of a slice identification provided by an embodiment of the present application.
- the first slice identifier includes a topology identifier, an algorithm identifier and a resource identifier.
- the algorithm identifier and the resource identifier reference may be made to the above-mentioned embodiments, which will not be repeated here.
- the network domain where the first network device is located may be a topology in which a multi-topology (Multi-topology) technology is used to divide network slices in the network domain, and a flexible algorithm (Flex-Algo) or other specific algorithms, etc. is used.
- the path calculation algorithm is used to define the path calculation constraints for network slices in the network domain.
- the network domain where the first network device is located includes multiple topologies, and one or more path calculation algorithms may be used in each topology to perform path calculation.
- Different network slices in the network domain where the first network device is located may correspond to different topologies, or different network slices may respectively use different path calculation algorithms to perform path calculation.
- Different network slices in the network domain may also correspond to the same topology and path calculation algorithm, but the forwarding resources allocated to different network slices on the network device are different, and the network device can be differentiated into different network slices based on resource identifiers. Allocated forwarding resources.
- the process of forwarding the first packet by the first network device based on the first slice identifier is as follows: first The network device first determines the destination node of the first packet according to the information used to indicate the forwarding path in the first packet (for example, the above-mentioned destination address, MPLS label, or SID); then, the first network device determines the destination node of the first packet according to the information in the first packet.
- the information used to indicate the forwarding path in the first packet for example, the above-mentioned destination address, MPLS label, or SID
- the topology identifier determines the topology used to go to the destination node, and determines the route calculation algorithm used to go to the destination node based on the algorithm identifier in the first message, so as to obtain an interface for forwarding the message;
- the resource identifier in a packet determines the corresponding forwarding resource (for example, a logical sub-interface or a queue) on the interface, thereby implementing the forwarding of the first packet.
- the first network device may forward the first packet based on a preset mapping table and a topology identifier, an algorithm identifier, and a resource identifier in the first packet.
- the mapping table in the first network device may also include a topology identifier, an algorithm identifier, and a mapping relationship between resource identifiers and interfaces and forwarding resources of the interfaces, and the mapping table in the first network device may also include multiple sub-mapping tables,
- the multiple sub-mapping tables respectively include a mapping relationship between topology identifiers and interfaces, a mapping relationship between algorithm identifiers and interfaces, and a mapping relationship between resource identifiers and forwarding resources.
- FIG. 5b is a schematic diagram of another packet forwarding provided by an embodiment of the present application.
- the network structure in FIG. 5b is divided into two different topologies (ie, topology 1 and topology 2), and different path calculation algorithms are used to calculate the path of the message.
- topology 1 includes network device 1, network device 2, network device 3, network device 4, network device 6, network device 7 and network device 8
- topology 2 includes network device 1, network device 3, network device 4, network device 8 5.
- the network device 1 obtains the packet, and the destination node of the packet is the network device 8 .
- the forwarding path of the packet calculated by the network device based on the topology identifier and the algorithm identifier is: network device 1 > network device 2 > network device 3>Network Device 4>Network Device 8.
- the forwarding path of the packet calculated by the network device based on the topology identifier and the algorithm identifier is: network device 1 > network device 2 > network device 3>Network Device 6>Network Device 7>Network Device 8.
- the forwarding path of the packet calculated by the network device based on the topology identifier and the algorithm identifier is: network device 1 > network device 5 > network device 6>Network Device 3>Network Device 4>Network Device 8.
- the forwarding path of the packet calculated by the network device based on the topology identifier and the algorithm identifier is: network device 1 > network device 5 > network device 6>Network Device 7>Network Device 8.
- Algorithm 1 and Algorithm 2 are different types of path calculation algorithms
- Algorithm 3 and Algorithm 4 are also different types of path calculation algorithms.
- Algorithm 1 and Algorithm 3 or Algorithm 4 may be different types of path calculation algorithms, or may be the same type of path calculation algorithms.
- the packet obtained by network device 1 includes a topology identifier, an algorithm identifier, and a resource identifier, and the topology indicated by the topology identifier is topology 1, the path calculation algorithm indicated by the algorithm identifier is algorithm 1, and the forwarding resource indicated by the resource identifier for queue 2.
- network device 1 determines that the interface forwarding the message is the interface between network device 1 and network device 2; further, network device 1 determines based on the The resource identifier is determined to finally use the queue 2 corresponding to the interface between the network device 1 and the network device 2 to forward the packet.
- the same information can be used to identify the same destination node in network slices with different topologies, using different algorithms, and having different resources, avoiding the need for Plan a larger number of destination node information for slices.
- forwarding entries with the same topology or the same algorithm can be used to forward multiple slices with the same topology or algorithm, reducing the impact of slices on the increase in the number of forwarding entries. .
- different forwarding policies may be configured on different network devices in the same network domain, so that different network devices perform packet forwarding according to different sub-identities in the slice identifier.
- the network device may perform packet forwarding based on all sub-identities in the slice identifier, or the network device may be based on some sub-identities in the slice identifier. to perform packet forwarding.
- the network device may determine sub-identities in the slice identifier for guiding packet forwarding based on the configured forwarding policy, and then forward the packet according to these sub-identities for guiding packet forwarding.
- FIG. 5c is a schematic diagram of a network device forwarding a packet based on a slice identifier according to an embodiment of the present application.
- the network structure shown in FIG. 5c includes network device 1-network device 8, and the slice identifiers carried by the packets forwarded in the network structure include topology identifiers, algorithm identifiers, primary resource identifiers and secondary resource identifiers.
- the granularity of the slices supported by the network device 1, the network device 2 and the network device 5 is relatively fine, and supports the allocation of fine-grained resources for different slices on the same node or link. Therefore, network device 1, network device 2, and network device 5 can forward packets using all sub-identities (ie, topology identification, algorithm identification, primary resource identification, and secondary resource identification) in the slice identification. Specifically, network device 1, network device 2, and network device 5 can determine the topology of the slice and the path calculation algorithm based on the topology identifier and the algorithm identifier, so as to use the corresponding path calculation algorithm to calculate the path in the specified topology, and obtain a path for forwarding. The interface of the packet; then, use the primary resource identifier and the secondary resource identifier to determine the resources allocated for the slice, and finally realize the forwarding of the packet.
- sub-identities ie, topology identification, algorithm identification, primary resource identification, and secondary resource identification
- network device 3 and network device 6 do not support allocating fine-grained resources to different slices on the same node or link. Therefore, the network device 3 and the network device 6 can use some of the sub-identities in the slice identification, that is, the topology identification and the algorithm identification, to forward the packet. Specifically, the network device 3 and the network device 6 can determine the topology of the slice and the path calculation algorithm based on the topology identifier and the algorithm identifier, so as to use the corresponding path calculation algorithm to perform path calculation in the specified topology, and obtain an interface for forwarding packets. , and forward packets based on this interface.
- the network device 4, the network device 7 and the network device 8 support the allocation of fine-grained resources for different slices on the same node or link, but the granularity of resource allocation is relatively coarse. Therefore, the network device 4, the network device 7, and the network device 8 can use the topology identifier, algorithm identifier, and primary resource identifier in the slice identifier to forward the packet. Specifically, the network device 4, the network device 7, and the network device 8 can determine the topology and the path calculation algorithm of the slice based on the topology identifier and the algorithm identifier, so as to use the corresponding path calculation algorithm to calculate the path in the specified topology, and obtain a path for forwarding. The interface of the packet; then, use the first-level resource identifier to determine the resources allocated for the slice, and finally realize the forwarding of the packet.
- network devices with different forwarding capabilities in the same network domain can forward packets based on the same slice identifier, which ensures normal packet forwarding .
- Scenario 4 The multiple sub-identities in the first slice identifier include domain identifiers and resource identifiers.
- FIG. 6 is a schematic structural diagram of another slice identifier provided by an embodiment of the present application.
- the first slice identifier includes a domain identifier and a resource identifier.
- the domain identifier is used to represent the network domain in which the first slice identifier is valid, and the resource identifier is used to represent the forwarding resources of the first network slice.
- the domain identifier may be a global identifier, that is, the domain identifier indicates that the network domains in which the first slice identifier takes effect are all network domains in the bearer network.
- the domain identifier may be a default value of 0, and the default value is used to indicate that the network domains in which the slice identifier is valid are all network domains in the bearer network.
- the resource identifier may be a globally valid resource identifier, that is, network devices in all network domains in the bearer network can be based on This resource identifier is used to forward packets.
- the domain identifier may be an area identifier, that is, the domain identifier indicates that the network domain where the first slice identifier is valid is a part of the network domain in the bearer network. For example, when the value of the domain identifier is 1, the domain identifier indicates that the network domain where the first slice identifier takes effect is the first network domain in the bearer network; when the value of the domain identifier is 2, the domain identifier represents the first slice identifier The effective network domain is the second network domain in the bearer network.
- the resource identifier may be a resource identifier valid for a specific area, that is, the resource identifier is valid only in the network domain indicated by the domain identifier. .
- the combination of sub-identifications including domain identification and resource identification in the slice identification may be applicable to network slice scenarios spanning multiple network domains.
- network slices in each network domain can use different domain IDs and resource IDs.
- Network slices of multiple network domains are spliced to form cross-domain network slices.
- the process of forwarding the packet by the network device based on the slice identifier is specifically as follows.
- a network device located at the boundary of a network domain receives a packet, and the packet may include a domain identifier and a resource identifier.
- the network device determines the valid domain ID and resource ID in the current network domain according to the locally maintained mapping relationship and the domain ID in the message, and updates the slice ID in the message, or adds the valid slice ID in the current network domain to the message.
- the network device determines the destination node of the packet according to information indicating the path such as the destination IP address, MPLS label or SID in the packet, and determines the interface to the destination node according to the default topology and default algorithm.
- the network device determines to use the corresponding forwarding resource on the interface to forward the packet according to the resource identifier.
- the network device inside the network domain receives the packet including the domain ID and resource ID
- the network device determines the destination node of the packet according to the information indicating the path, such as the destination IP address, MPLS label or SID in the packet, and determines the destination node according to the missing information.
- the provincial topology and default algorithm determine the interface to the destination node.
- the network device determines to use the corresponding forwarding resource on the interface to forward the packet according to the resource identifier.
- the multiple sub-identities in the first slice identifier include a domain identifier and a resource identifier, and the multiple sub-identities further include one or more of a topology identifier and an algorithm identifier.
- the multiple sub-identifications in the first slice identification have various combinations.
- FIG. 7 is another schematic structural diagram of the first slice identifier provided in this embodiment of the present application.
- the multiple sub-identities in the first slice identifier include a domain identifier, a topology identifier, and a resource identifier.
- the multiple sub-identities in the first slice identifier include a domain identifier, an algorithm identifier, and a resource identifier.
- the multiple sub-identities in the first slice identifier include a domain identifier, a topology identifier, an algorithm identifier, and a resource identifier.
- the various sub-identity combinations shown in FIG. 7 may be applicable to network slicing scenarios spanning multiple network domains.
- network slices in each network domain may use different domain identifiers, and the topology identifiers, algorithm identifiers, and resource identifiers corresponding to each network slice may also be different.
- Network slices of multiple network domains are spliced to form cross-domain network slices.
- Scenario 6 On the basis of Scenario 1 to Scenario 5, the plurality of sub-identifications in the first slice identifier also include a flag bit identifier.
- the first slice identification also includes a flag bit identification.
- the first slice identifier includes a topology identifier and a resource identifier
- the first slice identifier also includes a flag bit identifier.
- the first slice identifier includes a domain identifier, a topology identifier, an algorithm identifier and a resource identifier
- the first slice identifier also includes a flag bit identifier.
- FIG. 8 is a schematic structural diagram of a first slice identifier according to an embodiment of the present application.
- the first slice identifier includes a domain identifier, a topology identifier, an algorithm identifier, a resource identifier, and a flag bit identifier.
- the flag bit identifier is used to indicate a sub-identity in the first slice identifier used to guide forwarding and a forwarding policy corresponding to the first slice identifier.
- the sub-identity used to guide forwarding refers to the sub-identity selected by the network device to guide the forwarding of the packet in the first slice identifier.
- the sub-identities used to direct forwarding may be one or more sub-identities other than the flag bit identification in the first slice identification.
- the sub-identities used to direct forwarding may be a topology identifier and an algorithm identifier;
- the sub-identities can be topology identification, algorithm identification and resource identification.
- the flag bit identifier is used to indicate which sub-identifiers in the slice identifier need to be used by the network device to perform packet forwarding.
- the forwarding policy represented by the flag bit identifier is used to indicate the forwarding behavior after the interface is determined according to the sub-identity used to direct forwarding.
- the forwarding behavior may refer to: if the first network device cannot find the interface for forwarding according to the first slice identifier, the first network device may not determine the interface for forwarding according to the first slice identifier, The first network device may forward the packet based on a default slice; or, if the first network device cannot find an interface for forwarding according to the first slice identifier, the first network device discards the first packet.
- the first network device is a boundary device of a network domain, and the first network device receives packets from other network domains, and updates the received packets, so that the updated packets carry the above-mentioned The first slice identifier of . Then, the first network device performs packet forwarding based on the updated packet.
- Cross-domain scenario 1 The first network device is located in the first network domain in the bearer network, and the first network device receives a packet sent by a network device in the second network domain in the bearer network, and the packet carries the information in the first network domain. 2.
- the slice identifier valid in the network domain.
- the first network device acts as a border node between the first network domain and the second network domain.
- the first network device updates the packet received in the second network domain to obtain the updated packet, and
- the network domain generated by the updated message is the first network domain.
- the first network device is preconfigured with mapping relationships between slice identifiers of different network domains. Based on the mapping relationship, the first network device can convert the slice identifier valid in the second network domain into the slice identifier valid in the first network domain. Specifically, the first network device receives a second packet sent by the second network device, where the second packet includes a second slice identifier, and the second slice identifier includes multiple sub-identities. Then, the first network device updates the second slice identifier in the second packet to the first slice identifier based on the preconfigured mapping relationship to obtain the first packet.
- the first slice identifier is valid in the first network domain and is used to indicate the first network slice in the first network domain; the second slice identifier is valid in the second network domain and used to indicate in the second network domain Second network slice.
- the Service-Level Agreement (SLA) of the first network slice is the same as the SLA of the second network slice, that is, the network quality of the first network slice and the network quality of the second network slice are the same.
- SLA Service-Level Agreement
- FIG. 9a is a schematic diagram of network domain division according to an embodiment of the present application.
- network device 1, network device 2, network device 3 and network device 4 are located in the second network domain;
- network device 5, network device 6, network device 7 and network device 8 are located in the first network domain;
- network Device 9, network device 10, network device 11 and network device 12 are located in the third network domain.
- the network device 5 and the network device 6 in the first network domain are domain boundary nodes. After the network device 5 and the network device 6 receive the message from the second network domain, they need to update the received message to obtain the The updated message that takes effect in the first network domain.
- network devices in different network domains may forward packets based on different combinations of sub-identities.
- the network device in each network domain can select one or more sub-identifiers in the packet to determine the interface to forward the packet according to the forwarding policy in the current network domain, thereby realizing packet forwarding.
- FIG. 9b is a schematic diagram of network domain division according to an embodiment of the present application.
- network device 1, network device 2, network device 3, and network device 4 in the second network domain select the topology identifier, algorithm identifier, and resource identifier in the slice identifier to determine the interface of the packet, and based on the obtained interface forwards packets.
- network device 5, network device 6, network device 7, and network device 8 in the first network domain select the topology identifier and algorithm identifier in the slice identifier to determine the interface of the packet, and forward the packet based on the obtained interface. message.
- network device 9, network device 10, network device 11, and network device 12 in the third network domain select the algorithm identifier and resource identifier in the slice identifier to determine the interface of the packet, and forward the packet based on the obtained interface. message.
- Cross-domain scenario 2 The first network device is a border node in the bearer network, and the first network device receives a packet sent by a network device in a network other than the bearer network, and the packet carries the network-wide slice identifier .
- the first network device may receive a second packet sent by a network device in an access network or a core network, where the second packet carries a second slice identifier, and the second slice identifier is Effective in the entire network, that is, the second slice identifier is effective in the access network, bearer network, and core network.
- the first network device updates the second slice identifier to the first slice identifier to obtain the first packet.
- the second slice identifier is a single network slice selection support information (Single Network Slice Selection Assistance Information, S-NSSAI) or an application-aware network (Application-Aware Networking, APN) identifier.
- S-NSSAI Single Network Slice Selection Assistance Information
- APN Application-Aware Networking
- the second slice identifier can indicate the network slice to which the second packet belongs in multiple network domains of the entire bearer network
- the format of the second slice identifier may be the same as that of the first slice identifier
- the second slice identifier The format can also be different from the first slice identifier. In this way, the first network device can convert the second slice identifier valid in multiple network domains into the first slice identifier valid in the network domain where the first network device is located.
- the first network device receives the third packet, and determines the network slice to which the third packet belongs. The first network device then adds the first slice identifier to the third packet according to the network slice to which the third packet belongs to obtain the first packet.
- the third packet includes a third slice identifier, and the third slice identifier is used to identify the network slice to which the third packet belongs in a bearer network including multiple network domains.
- the third slice identifier can be an S-NSSAI or APN identifier, and the third slice identifier can also be in the same format as the first slice identifier.
- the third slice identifier includes a plurality of sub identifiers, and the third slice identifier can indicate the third packet. Network slices belonging to multiple network domains of the entire bearer network.
- the third slice identifier in the third packet is a global identifier in the bearer network and takes effect in multiple network domains of the entire bearer network, that is, the third slice identifier can identify the third packet in the bearer network.
- the first network device may determine the network slice to which the third packet belongs based on the third slice identifier, so as to obtain the first slice identifier valid in the network domain where the first network device is located. Then, the first network device adds the first slice identifier to the third packet to obtain the first packet, where the first packet includes both the third slice identifier and the first slice identifier.
- Cross-domain scenario 3 The first network device is located in a network domain of the bearer network, and the first network device receives a packet sent by a network device outside the network domain, and the packet does not carry a slice identifier.
- the first network device receives the third packet, and determines the network slice to which the third packet belongs.
- the third packet comes from a network device outside the network domain to which the first network device belongs, and the third packet does not carry a slice identifier.
- the first network device then adds the first slice identifier to the third packet according to the network slice to which the third packet belongs to obtain the first packet.
- the first network device may also add the first slice identifier and the fourth slice identifier to the third packet according to the network slice to which the third packet belongs to obtain the first packet.
- the fourth slice identifier is used to identify the network slice to which the third packet belongs in a bearer network including multiple network domains. That is, the first packet generated by the first network device includes the first slice identifier and the fourth slice identifier.
- the first slice identifier is valid only in the network domain where the first network device is located, and is used to instruct network devices in the network domain where the first network device is located to forward packets; the fourth slice identifier can take effect in multiple network domains and is used for Instructs the boundary nodes of a network domain to update the slice identities valid within a single network domain.
- a policy for determining a network slice may be preconfigured in the first network device, and the first network device may, under the instruction of the policy, determine the network slice to which the third packet belongs according to the information in the third packet .
- the information in the third packet includes one or more of the following information: source address, destination address, protocol number, Differentiated Services Code Point (DSCP) field, Traffic Class (Traffic Class) field, Virtual Local Area Network identifier (VLAN ID) and port number.
- DSCP Differentiated Services Code Point
- Traffic Class Traffic Class
- VLAN ID Virtual Local Area Network identifier
- the source address may be, for example, a source Internet (Internet Protocol, IP) address or a source media access control (Media Access Control, MAC) address, such as the address of a user host or a base station, for sending the message.
- the destination address may be, for example, the destination IP address or destination MAC address of the packet.
- the first network device may also determine the network slice to which the third packet belongs according to some other fields in the third packet. For example, the DSCP field or the TC field in the IPv4 or IPv6 packet header in the third packet, the VLAN ID in the Ethernet header, and the like. Specifically, the first network device may determine the network to which the third packet belongs according to one of the above fields (for example, source address, destination address, protocol number, DSCP field or TC field, etc.), or a combination of certain fields. slice.
- Cross-domain scenario 4 The first network device is located in a network domain in the bearer network, and the first network device receives a packet sent by a network device outside the network domain, and the packet includes a packet that takes effect in multiple network domains.
- the slice identifier and the slice identifier that is valid only in the network domain preceding the network domain where the first network is located.
- the first network device receives the third packet, and determines the network slice to which the third packet belongs.
- the third packet comes from a network device outside the network domain to which the first network device belongs, and the third packet carries two slice identifiers, a third slice identifier and a fourth slice identifier.
- the third slice identifier carried in the third packet takes effect in the bearer network including multiple network domains, and the fourth slice identifier takes effect only in the network domain preceding the network domain where the first network is located.
- the first network device determines the network slice to which the third packet belongs according to the third slice identifier, updates the fourth slice identifier in the third packet to the first slice identifier, and obtains a network slice including the third slice identifier and The first packet identified by the first slice.
- the packets forwarded in the bearer network including multiple network domains include two slice identifiers.
- One slice identifier can take effect in multiple network domains, and is used to guide the update of border nodes in a network domain to take effect in a single network domain.
- the slice identifier of the other slice identifier is valid only in one network domain and is used to instruct network devices in the current network domain to forward packets.
- FIG. 10 is a schematic structural diagram of a network device 1000 according to an embodiment of the present application.
- network device 1000 includes one or more processing units (cpus) 1001, a network interface 1002, a programming interface 1003, memory 1004, and one or more communication buses 1005 for connecting various component interconnection.
- processing units cpus
- network interface 1002 a network interface 1002
- programming interface 1003 a programming interface 1003
- memory 1004 a programming interface for connecting various component interconnection.
- communication buses 1005 for connecting various component interconnection.
- the network device 1000 may also omit or add some functional components or units based on the foregoing examples.
- the network interface 1002 is used, among other things, to interface with one or more other network devices/servers in the network system.
- the communication bus 1005 includes circuitry that interconnects and controls communication between system components.
- Memory 1004 may include non-volatile memory such as read-only memory (ROM), programmable read-only memory (PROM), erasable programmable read-only memory (EPROM) , Electrically Erasable Programmable Read-Only Memory (electrically EPROM, EEPROM) or flash memory.
- Memory 1004 may also include volatile memory, which may be random access memory (RAM), which acts as an external cache.
- memory 1004 or a non-transitory computer-readable storage medium of memory 1004 stores the following programs, modules, and data structures, or subsets thereof, including, for example, a transceiver unit (not shown), an acquisition unit 10041, and a process Unit 10042.
- the network device 1000 may have any function of the network device 2 in the method embodiment corresponding to FIG. 2 above.
- the network device 1000 corresponds to the first network device in the foregoing method embodiments, and each module and the foregoing other operations and/or functions in the network device 1000 are respectively implemented to implement the first network device in the foregoing method embodiments.
- each module and the foregoing other operations and/or functions in the network device 1000 are respectively implemented to implement the first network device in the foregoing method embodiments.
- transceiver unit can be realized by the processor calling the program code in the memory, and cooperate with the network interface 1002 when needed; it can also be the network interface 1002 on the network device 1000 to complete the data transceiver operation .
- the network device 1000 is configured to execute the packet processing method provided by the embodiment of the present application, for example, execute the packet processing method corresponding to the embodiment shown in FIG. 2 above.
- the embodiments of the present application further provide a network device, and the hardware structure of the network device is introduced below.
- FIG. 11 is a schematic structural diagram of a network device 1100 according to an embodiment of the present application, and the network device 1100 may be configured as the first network device in the foregoing method embodiments.
- the network device 1100 may correspond to the first network device in the above method embodiments, and each hardware, module, and other operations and/or functions in the network device 1100 are respectively implemented to implement the first network device in the method embodiments.
- each step of the method embodiment corresponding to FIG. 2 above is completed by an integrated logic circuit of hardware in the processor of the network device 1100 or an instruction in the form of software.
- the steps of the methods disclosed in conjunction with the embodiments of the present application may be directly embodied as executed by a hardware processor, or executed by a combination of hardware and software modules in the processor.
- the software modules may be located in random access memory, flash memory, read-only memory, programmable read-only memory or electrically erasable programmable memory, registers and other storage media mature in the art.
- the storage medium is located in the memory, and the processor reads the information in the memory, and completes the steps of the above method in combination with its hardware. To avoid repetition, detailed description is omitted here.
- the network device 1100 may also correspond to the network device 1100 in the foregoing virtual appliance embodiment, and each functional module in the network device 1100 is implemented by software and hardware of the network device 1100 .
- the functional modules included in the network device 1100 are generated after the processor of the network device 1100 reads the program code stored in the memory, or the processor of the network device 1100 reads the program code stored in the memory, and It is realized together with the communication interface.
- the network device 1100 includes: a main control board 1110 and an interface board 1130 .
- the main control board 1110 is also called the main processing unit (main processing unit, MPU) or the route processor card (route processor card). Equipment maintenance, protocol processing functions.
- the main control board 1110 includes: a central processing unit 1111 and a memory 1112 .
- the interface board 1130 is also referred to as a line processing unit (LPU), a line card or a service board.
- the interface board 1130 is used to provide various service interfaces and implement data packet forwarding.
- the service interface includes but is not limited to an Ethernet interface, a POS (Packet over SONET/SDH) interface, etc.
- the Ethernet interface is, for example, a flexible Ethernet service interface (Flexible Ethernet Clients, FlexE Clients).
- the interface board 1130 includes: a central processing unit 1131 , a network processor 1132 , a forwarding table entry memory 1134 and a physical interface card (ph11sical interface card, PIC) 1133 .
- the central processing unit 1131 on the interface board 1130 is used to control and manage the interface board 1130 and communicate with the central processing unit 1111 on the main control board 1110 .
- the network processor 1132 is used to implement packet forwarding processing.
- the form of the network processor 1132 may be a forwarding chip.
- the processing of the uplink packet includes: processing of the incoming interface of the packet, and searching of the forwarding table; processing of the downlink packet: searching of the forwarding table, and so on.
- the physical interface card 1133 is used to realize the interconnection function of the physical layer, the original traffic enters the interface board 1130 through this, and the processed packets are sent from the physical interface card 1133 .
- the physical interface card 1133 includes at least one physical interface, and the physical interface is also called a physical port.
- the physical interface card 1133 corresponds to the FlexE physical interface in the system architecture.
- the physical interface card 1133 is also called a daughter card, which can be installed on the interface board 1130, and is responsible for converting the photoelectric signal into a message, checking the validity of the message, and forwarding it to the network processor 1132 for processing.
- the central processing unit 1131 of the interface board 1103 can also perform the functions of the network processor 1132 , such as implementing software forwarding based on a general-purpose CPU, so that the network processor 1132 is not required in the physical interface card 1133 .
- the network device 1100 includes multiple interface boards.
- the network device 1100 further includes an interface board 1140 .
- the interface board 1140 includes a central processing unit 1141 , a network processor 1142 , a forwarding table entry storage 1144 and a physical interface card 1143 .
- the network device 1100 further includes a switch fabric board 1120 .
- the switch fabric unit 1120 may also be referred to as a switch fabric unit (switch fabric unit, SFU).
- SFU switch fabric unit
- the switching network board 1120 is used to complete data exchange between the interface boards.
- the interface board 1130 and the interface board 1140 can communicate through the switch fabric board 1120 .
- the main control board 1110 and the interface board 1130 are coupled.
- the main control board 1110, the interface board 1130, the interface board 1140, and the switch fabric board 1120 are connected to the system backplane through a system bus to implement intercommunication.
- an inter-process communication (inter-process communication, IPC) channel is established between the main control board 1110 and the interface board 1130, and the main control board 1110 and the interface board 1130 communicate through the IPC channel.
- IPC inter-process communication
- the network device 1100 includes a control plane and a forwarding plane
- the control plane includes the main control board 1110 and the central processing unit 1131
- the forwarding plane includes various components that perform forwarding, such as the forwarding entry storage 1134, the physical interface card 1133 and the network processing device 1132.
- the control plane executes functions such as routers, generating forwarding tables, processing signaling and protocol packets, and configuring and maintaining device status.
- the control plane delivers the generated forwarding tables to the forwarding plane.
- the network processor 1132 based on the control plane
- the delivered forwarding table forwards the packets received by the physical interface card 1133 by looking up the table.
- the forwarding table issued by the control plane may be stored in the forwarding table entry storage 1134 .
- the control plane and forwarding plane may be completely separate and not on the same device.
- the transceiver unit in the network device 1100 may be equivalent to the physical interface card 1133 or the physical interface card 1143 in the network device 1100 ; the acquiring unit 11041 and the processing unit 11042 in the network device 1100 may be equivalent to the central processing unit in the network device 1100 controller 1111 or central processing unit 1131.
- the operations on the interface board 1140 in the embodiment of the present application are the same as the operations on the interface board 1130, and are not repeated for brevity.
- the network device 1100 in this embodiment may correspond to the first network device in the foregoing method embodiments, and the main control board 1110 , the interface board 1130 and/or the interface board 1140 in the network device 1100 may implement the foregoing methods
- the functions possessed by the first network device and/or the various steps implemented in the embodiments are not repeated here.
- main control boards there may be one or more main control boards, and when there are multiple main control boards, they may include the main main control board and the backup main control board.
- a network device may have at least one switching network board, and the switching network board realizes data exchange between multiple interface boards, providing large-capacity data exchange and processing capabilities. Therefore, the data access and processing capabilities of network devices in a distributed architecture are greater than those in a centralized architecture.
- the network device can also be in the form of only one board, that is, there is no switching network board, and the functions of the interface board and the main control board are integrated on this board.
- the central processing unit and the main control board on the interface board The central processing unit on the board can be combined into a central processing unit on this board to perform the functions of the two superimposed, the data exchange and processing capacity of this form of equipment is low (for example, low-end switches or routers and other networks. equipment).
- the specific architecture used depends on the specific networking deployment scenario, and is not uniquely limited here.
- the above-mentioned first network device may be implemented as a virtualized device.
- the virtualization device may be a virtual machine (English: Virtual Machine, VM) running a program for sending a message, and the virtual machine is deployed on a hardware device (for example, a physical server).
- a virtual machine refers to a complete computer system with complete hardware system functions simulated by software and running in a completely isolated environment.
- the virtual machine can be configured as the first network device.
- the first network device may be implemented based on a general physical server combined with a Network Functions Virtualization (NFV) technology.
- the first network device is a virtual host, a virtual router or a virtual switch.
- An embodiment of the present application provides a computer program product, which, when the computer program product runs on a network device, enables the network device to execute the method performed by the network device 2 in the method embodiment corresponding to FIG. 2 above.
- an embodiment of the present application provides a network system 1200 .
- the system 1200 includes: a network device 1201 , a network device 1202 , and a network device 1203 .
- the network device 1201 is connected to the network device 1202 and the network device 1203, respectively.
- the network device 1201 may be the first network device in the method embodiment corresponding to FIG. 2 .
- Embodiments of the present application further provide a chip, including a processor and an interface circuit, where the interface circuit is configured to receive instructions and transmit them to the processor.
- the processor is coupled to a memory, and the memory is used to store programs or instructions, and when the programs or instructions are executed by the processor, the chip system enables the method in any of the foregoing method embodiments.
- the number of processors in the chip system may be one or more.
- the processor can be implemented by hardware or by software.
- the processor may be a logic circuit, an integrated circuit, or the like.
- the processor may be a general-purpose processor implemented by reading software codes stored in memory.
- the number of memories in the system-on-chip may also be one or more.
- the memory may be integrated with the processor, or may be provided separately from the processor, which is not limited in this application.
- the memory can be a non-transitory processor, such as a read-only memory ROM, which can be integrated with the processor on the same chip, or can be provided on different chips.
- the setting method of the processor is not particularly limited.
- the system-on-chip may be a field programmable gate array (FPGA), an application specific integrated circuit (ASIC), or a system on chip (SoC), It can also be a central processing unit (CPU), a network processor (NP), a digital signal processing circuit (DSP), or a microcontroller (microcontroller).
- controller unit, MCU it can also be a programmable logic device (PLD) or other integrated chips.
- B corresponding to A means that B is associated with A, and B can be determined according to A.
- determining B according to A does not mean that B is only determined according to A, and B may also be determined according to A and/or other information.
- the disclosed system, apparatus and method may be implemented in other manners.
- the apparatus embodiments described above are only illustrative.
- the division of units is only a logical function division.
- there may be other division methods for example, multiple units or components may be combined or integrated. to another system, or some features can be ignored, or not implemented.
- the shown or discussed mutual coupling or direct coupling or communication connection may be through some interfaces, indirect coupling or communication connection of devices or units, and may be in electrical, mechanical or other forms.
- Units described as separate components may or may not be physically separated, and components shown as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution in this embodiment.
- each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically alone, or two or more units may be integrated into one unit.
- the above-mentioned integrated units may be implemented in the form of hardware, or may be implemented in the form of software functional units.
- the integrated unit if implemented as a software functional unit and sold or used as a stand-alone product, may be stored in a computer-readable storage medium.
- the technical solutions of the present application can be embodied in the form of software products in essence, or the parts that contribute to the prior art, or all or part of the technical solutions, and the computer software products are stored in a storage medium , including several instructions to cause a computer device (which may be a personal computer, a server, or a network device/server, etc.) to execute all or part of the steps of the methods of the various embodiments of the present application.
- the aforementioned storage medium includes: a U disk, a removable hard disk, a read-only memory, a random access memory, a magnetic disk or an optical disk and other media that can store program codes.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims (20)
- 一种报文处理方法,其特征在于,包括:第一网络设备获取第一报文,所述第一报文包括第一切片标识,所述第一切片标识包括连续的多个子标识,所述多个子标识用于表示第一网络切片不同的属性,所述第一切片标识用于标识所述第一报文所属的第一网络切片;所述第一网络设备根据所述第一切片标识转发所述第一报文。
- 根据权利要求1所述的方法,其特征在于,所述多个子标识包括拓扑标识和资源标识,所述拓扑标识用于表示所述第一网络切片的拓扑,所述资源标识用于表示所述第一网络切片的转发资源。
- 根据权利要求2所述的方法,其特征在于,所述多个子标识还包括算法标识,所述算法标识用于表示所述第一网络切片的算路算法。
- 根据权利要求1所述的方法,其特征在于,所述多个子标识包括算法标识和资源标识,所述算法标识用于表示所述第一网络切片的算路算法,所述资源标识用于表示所述第一网络切片的转发资源。
- 根据权利要求2-4任意一项所述的方法,其特征在于,所述多个子标识还包括域标识,所述域标识用于表示所述第一切片标识生效的网络域。
- 根据权利要求1所述的方法,其特征在于,所述多个子标识包括域标识和资源标识,所述域标识用于表示所述第一切片标识生效的网络域,所述资源标识用于表示所述第一网络切片的转发资源。
- 根据权利要求1-6任意一项所述的方法,其特征在于,所述转发资源包括物理接口、逻辑子接口和/或报文队列。
- 根据权利要求1-7任意一项所述的方法,其特征在于,所述第一网络设备根据所述第一切片标识转发所述第一报文,包括:所述第一网络设备根据所述第一切片标识中的子标识以及映射表,确定用于转发所述第一报文的接口以及所述接口的转发资源;所述第一网络设备根据所述接口的转发资源向第二网络设备转发所述第一报文;其中,所述映射表包括所述多个子标识与接口之间的映射关系。
- 根据权利要求1-8任意一项所述的方法,其特征在于,所述多个子标识还包括标志位标识,所述标志位标识用于表示所述第一切片标识对应的转发策略,所述转发策略用于 指示根据用于指导转发的子标识确定接口后的转发行为。
- 根据权利要求9所述的方法,其特征在于,所述转发行为包括:若根据所述第一切片标识无法查找到用于转发的接口,则不根据所述第一切片标识确定用于转发的接口;或,若根据所述第一切片标识无法查找到用于转发的接口,则丢弃所述第一报文。
- 根据权利要求1-10任意一项所述的方法,其特征在于,所述方法还包括:所述第一网络设备接收第二报文,所述第二报文包括第二切片标识;所述第一网络设备将所述第二切片标识更新为所述第一切片标识,得到所述第一报文。
- 根据权利要求11所述的方法,其特征在于,所述第一切片标识用于在第一网络域中指示所述第一网络切片,所述第二切片标识用于在第二网络域中指示第二网络切片,所述第一网络切片的服务等级协议SLA与所述第二网络切片的SLA相同。
- 根据权利要求11所述的方法,其特征在于,所述第一网络设备为承载网的边界节点,所述第二切片标识为单网络切片选择支撑信息S-NSSAI或应用感知网络APN标识。
- 根据权利要求1-10任意一项所述的方法,其特征在于,所述方法还包括:所述第一网络设备接收第三报文;所述第一网络设备确定所述第三报文所属的网络切片;所述第一网络设备根据所述第三报文所属的网络切片,在所述第三报文中添加所述第一切片标识,得到所述第一报文。
- 根据权利要求14所述的方法,其特征在于,所述第一网络设备确定所述第三报文所属的网络切片,包括:所述第一网络设备根据所述第三报文中的信息,确定所述第三报文所属的网络切片;其中,所述第三报文中的信息包括以下信息的一种或多种:源地址、目的地址、协议号、差分服务代码点DSCP字段、流量等级TC字段、虚拟局域网标识和端口号。
- 根据权利要求14或15所述的方法,其特征在于,所述第一网络设备根据所述第三报文所属的网络切片,在所述第三报文中添加所述第一切片标识,包括:所述第一网络设备根据所述第三报文所属的网络切片,在所述第三报文中添加所述第一切片标识和第四切片标识,得到所述第一报文;所述第四切片标识用于在包括多个网络域的承载网中标识所述第三报文所属的网络切片。
- 根据权利要求14所述的方法,其特征在于,所述第一网络设备确定所述第三报文 所属的网络切片,包括:所述第一网络设备根据所述第三报文中的第三切片标识,确定所述第三报文所属的网络切片;其中,所述第三切片标识用于在包括多个网络域的承载网中标识所述第三报文所属的网络切片。
- 一种网络设备,其特征在于,包括:处理器和存储器;所述存储器用于存储指令;所述处理器用于执行存储器中的指令,使得所述网络设备执行如权利要求1至17任意一项所述的方法。
- 一种计算机可读存储介质,其特征在于,所述计算机存储介质中存储有计算机可读指令,当所述计算机可读指令被处理器执行时实现如权利要求1至17任意一项所述的方法。
- 一种计算机程序产品,其特征在于,所述计算机程序产品中存储有计算机可读指令,当所述计算机可读指令被处理器执行时实现如权利要求1至17任意一项所述的方法。
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP21924458.9A EP4270897A4 (en) | 2021-02-02 | 2021-12-27 | MESSAGE PROCESSING METHOD AND ASSOCIATED APPARATUS |
KR1020237027873A KR20230128564A (ko) | 2021-02-02 | 2021-12-27 | 패킷 처리 방법 및 관련 장치 |
JP2023546511A JP2024504845A (ja) | 2021-02-02 | 2021-12-27 | パケット処理方法および関連装置 |
US18/228,503 US20230412508A1 (en) | 2021-02-02 | 2023-07-31 | Packet processing method and related apparatus |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110143450 | 2021-02-02 | ||
CN202110143450.6 | 2021-02-02 | ||
CN202110461985.8 | 2021-04-27 | ||
CN202110461985.8A CN114844962A (zh) | 2021-02-02 | 2021-04-27 | 一种报文处理方法及相关装置 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US18/228,503 Continuation US20230412508A1 (en) | 2021-02-02 | 2023-07-31 | Packet processing method and related apparatus |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2022166465A1 true WO2022166465A1 (zh) | 2022-08-11 |
Family
ID=82562498
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2021/141540 WO2022166465A1 (zh) | 2021-02-02 | 2021-12-27 | 一种报文处理方法及相关装置 |
Country Status (6)
Country | Link |
---|---|
US (1) | US20230412508A1 (zh) |
EP (1) | EP4270897A4 (zh) |
JP (1) | JP2024504845A (zh) |
KR (1) | KR20230128564A (zh) |
CN (1) | CN114844962A (zh) |
WO (1) | WO2022166465A1 (zh) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117041259A (zh) * | 2023-09-28 | 2023-11-10 | 新华三技术有限公司 | 计算资源的调度方法及装置 |
WO2024147477A1 (ko) * | 2023-01-03 | 2024-07-11 | 삼성전자주식회사 | 네트워크 슬라이스에 대한 자원을 식별하기 위한 방법 및 장치 |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116761208A (zh) * | 2020-03-17 | 2023-09-15 | 华为技术有限公司 | 报文处理方法、装置、设备及存储介质 |
CN119011337A (zh) * | 2023-05-19 | 2024-11-22 | 华为技术有限公司 | 报文转发方法、装置及系统 |
CN118677858B (zh) * | 2024-08-19 | 2024-11-08 | 北京开源芯片研究院 | 一种数据转递方法、装置、电子设备及存储介质 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107517488A (zh) * | 2016-06-15 | 2017-12-26 | 华为技术有限公司 | 报文处理的方法及设备 |
US20190141760A1 (en) * | 2015-11-18 | 2019-05-09 | Telefonaktiebolaget Lm Ericsson (Publ) | First Network Node, Receiving Network Node and Methods Performed Therein |
CN110912795A (zh) * | 2018-09-14 | 2020-03-24 | 中兴通讯股份有限公司 | 一种传输控制方法、节点、网络系统及存储介质 |
CN111050361A (zh) * | 2018-10-12 | 2020-04-21 | 中国移动通信有限公司研究院 | 一种报文传送方法、装置及系统 |
CN111835637A (zh) * | 2019-04-15 | 2020-10-27 | 华为技术有限公司 | 一种基于SRv6的数据处理方法及相关网络设备 |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107659419B (zh) * | 2016-07-25 | 2021-01-01 | 华为技术有限公司 | 网络切片方法和系统 |
US11588733B2 (en) * | 2019-05-14 | 2023-02-21 | Vmware, Inc. | Slice-based routing |
-
2021
- 2021-04-27 CN CN202110461985.8A patent/CN114844962A/zh active Pending
- 2021-12-27 EP EP21924458.9A patent/EP4270897A4/en active Pending
- 2021-12-27 WO PCT/CN2021/141540 patent/WO2022166465A1/zh active Application Filing
- 2021-12-27 JP JP2023546511A patent/JP2024504845A/ja active Pending
- 2021-12-27 KR KR1020237027873A patent/KR20230128564A/ko active Pending
-
2023
- 2023-07-31 US US18/228,503 patent/US20230412508A1/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20190141760A1 (en) * | 2015-11-18 | 2019-05-09 | Telefonaktiebolaget Lm Ericsson (Publ) | First Network Node, Receiving Network Node and Methods Performed Therein |
CN107517488A (zh) * | 2016-06-15 | 2017-12-26 | 华为技术有限公司 | 报文处理的方法及设备 |
CN110912795A (zh) * | 2018-09-14 | 2020-03-24 | 中兴通讯股份有限公司 | 一种传输控制方法、节点、网络系统及存储介质 |
CN111050361A (zh) * | 2018-10-12 | 2020-04-21 | 中国移动通信有限公司研究院 | 一种报文传送方法、装置及系统 |
CN111835637A (zh) * | 2019-04-15 | 2020-10-27 | 华为技术有限公司 | 一种基于SRv6的数据处理方法及相关网络设备 |
Non-Patent Citations (1)
Title |
---|
See also references of EP4270897A4 |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2024147477A1 (ko) * | 2023-01-03 | 2024-07-11 | 삼성전자주식회사 | 네트워크 슬라이스에 대한 자원을 식별하기 위한 방법 및 장치 |
CN117041259A (zh) * | 2023-09-28 | 2023-11-10 | 新华三技术有限公司 | 计算资源的调度方法及装置 |
CN117041259B (zh) * | 2023-09-28 | 2024-01-12 | 新华三技术有限公司 | 计算资源的调度方法及装置 |
Also Published As
Publication number | Publication date |
---|---|
KR20230128564A (ko) | 2023-09-05 |
US20230412508A1 (en) | 2023-12-21 |
EP4270897A4 (en) | 2024-05-29 |
EP4270897A1 (en) | 2023-11-01 |
JP2024504845A (ja) | 2024-02-01 |
CN114844962A (zh) | 2022-08-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2022166465A1 (zh) | 一种报文处理方法及相关装置 | |
JP2022532729A (ja) | スライスベースルーティング | |
CN113973082A (zh) | 一种报文处理方法及网络设备 | |
US11663052B2 (en) | Adaptive application assignment to distributed cloud resources | |
US20220255862A1 (en) | Packet forwarding method, device, storage medium, and system | |
WO2021143279A1 (zh) | 段路由业务处理方法和装置、路由设备及存储介质 | |
WO2022222750A1 (zh) | 报文转发方法、装置、网络设备及存储介质 | |
CN113395735A (zh) | 一种报文传输方法、装置和网络设备 | |
CN111654441A (zh) | 伪线负载分担的方法和设备 | |
WO2022048418A1 (zh) | 一种转发报文的方法、设备和系统 | |
US20230155930A1 (en) | Packet Processing Method and Network Device | |
WO2022188530A1 (zh) | 一种路由处理方法及网络设备 | |
CN112822097A (zh) | 报文转发的方法、第一网络设备以及第一设备组 | |
CN114301839A (zh) | 一种组播报文传输方法及装置 | |
US20230224236A1 (en) | Routing Information Transmission Method and Apparatus | |
CN112751766A (zh) | 报文转发方法、装置及计算机存储介质 | |
WO2023213216A1 (zh) | 一种报文处理的方法及相关设备 | |
CN114338518B (zh) | 一种路由处理方法及网络设备 | |
CN117097818A (zh) | 一种报文处理的方法及相关设备 | |
JP2023538688A (ja) | 通信方法および関連装置 | |
CN115811499A (zh) | 指定转发者df选举的方法及设备 | |
WO2022143572A1 (zh) | 一种报文处理方法及相关设备 | |
CN114697220B (zh) | 一种报文处理方法及相关装置 | |
EP4525400A1 (en) | Message sending method, network device and system | |
WO2024002101A1 (zh) | 报文传输方法、装置、相关设备及存储介质 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 21924458 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2023546511 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 202317052000 Country of ref document: IN |
|
ENP | Entry into the national phase |
Ref document number: 2021924458 Country of ref document: EP Effective date: 20230726 |
|
ENP | Entry into the national phase |
Ref document number: 20237027873 Country of ref document: KR Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020237027873 Country of ref document: KR |
|
NENP | Non-entry into the national phase |
Ref country code: DE |