WO2022262798A1 - 链路处理方法、装置、网络设备和存储介质 - Google Patents
链路处理方法、装置、网络设备和存储介质 Download PDFInfo
- Publication number
- WO2022262798A1 WO2022262798A1 PCT/CN2022/099093 CN2022099093W WO2022262798A1 WO 2022262798 A1 WO2022262798 A1 WO 2022262798A1 CN 2022099093 W CN2022099093 W CN 2022099093W WO 2022262798 A1 WO2022262798 A1 WO 2022262798A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- risk
- link
- duration
- state
- calculation
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/22—Alternate routing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/02—Topology update or discovery
- H04L45/036—Updating the topology between route computation elements, e.g. between OpenFlow controllers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/12—Shortest path evaluation
- H04L45/123—Evaluation of link metrics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
- H04L41/142—Network analysis or design using statistical or mathematical methods
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
- H04L43/0805—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
- H04L43/0811—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking connectivity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/12—Shortest path evaluation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/28—Routing or path finding of packets in data switching networks using route fault recovery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/12—Discovery or management of network topologies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/70—Routing based on monitoring results
Definitions
- the present application relates to the technical field of communications, and in particular to a link processing method, device, network device and storage medium.
- link flapping occurs in the network, it is usually accompanied by a large number of rerouting and switchback operations for services in the network, resulting in frequent service changes and increasing the risk of data packet loss on the forwarding plane.
- the present application provides a link processing method, device, network equipment and storage medium.
- An embodiment of the present application provides a link processing method, which is applied to a link processing device, and the method includes: obtaining the number of state changes and the duration of the first state of the link within a predetermined period of time; based on the number of state changes and the first Calculate the risk information of the link according to the duration of the state; perform path calculation based on the risk information; and perform risk suppression on path switching according to the result of the path calculation.
- An embodiment of the present application provides a link processing device, including: an information acquisition module configured to acquire the number of state changes of the link within a predetermined time period and the duration of the first state; a risk calculation module configured to and the duration of the first state, calculate the risk information of the link; the path calculation module is configured to perform path calculation based on the risk information; and the risk suppression module is configured to perform risk on path switching according to the result of the path calculation inhibition.
- An embodiment of the present application provides a network device, including: one or more processors; memory, on which one or more programs are stored, and when one or more programs are executed by one or more processors, one or more Each processor implements any link processing method in the embodiments of the present application.
- the embodiment of the present application further provides a storage medium, the storage medium stores a computer program, and when the computer program is executed by a processor, any link processing method in the embodiment of the present application is implemented.
- FIG. 1 shows a schematic diagram of a network management system architecture according to an embodiment of the present application.
- FIG. 2 shows a schematic flowchart of a link processing method according to an embodiment of the present application.
- Fig. 3 shows a detailed flowchart of a link processing method according to an exemplary embodiment of the present application.
- Fig. 4 shows a schematic diagram of a system architecture of another embodiment of the present application.
- FIG. 5 shows a schematic structural diagram of a link processing device provided by an embodiment of the present application.
- Fig. 6 is a structural diagram showing an exemplary hardware architecture of a computing device capable of implementing the link processing method and apparatus according to the embodiments of the present invention.
- FIG. 1 shows a schematic diagram of a network management system architecture according to an embodiment of the present application.
- the architecture of the network management system shown in FIG. 1 includes: a network controller 10 and a network 20 .
- the network controller 10 may include: a southbound interface module 11, a message management module 12 and a path computation element (Path Computation Element, PCE) module 13.
- PCE Path Computation Element
- the southbound interface module 11 can be configured to receive a link change message reported by a device in the network 20 , and deliver the path calculation result of the network controller 10 to the device in the network 20 .
- the link change message may be included in an alarm message reported by a network device in the network 20 .
- the southbound interface module 11 is a module for the network controller 10 to exchange data with switching devices in the network 20 .
- the southbound interface can include: the interface based on the network configuration netconf protocol, the interface based on the Simple Network Management Protocol Agent (SNMP) and the interface based on the open protocol (openflow protocol), so as to realize the corresponding protocol interface analysis.
- SNMP Simple Network Management Protocol Agent
- the message management module 12 can be configured to analyze the messages reported by the devices in the network 20 through the southbound interface, and distribute the received messages.
- the link change message reported by the device in the network 20 through the southbound interface may include: a link disconnection message or a link connection message.
- the message management module 12 can distribute the link change message to the PCE module 13 .
- the PCE module 13 can be configured to use existing network topology information in the network 20 to calculate an end-to-end path that satisfies a predetermined constraint condition and a predetermined calculation policy.
- the PCE module 13 can be configured to identify risky links, and obtain a feasible path from the source node to the sink node based on path calculation. Appropriate detours.
- the type of network 20 may be, for example, any one of the following different types of networks: microwave bearer network, IP bearer network, optical transport network-based bearer network, and flexible Ethernet-based bearer network.
- the devices in the network 20 may be, for example, switching devices or terminal devices; wherein, the switching devices may include, for example, switches and routers, such as router 21 , router 22 , router 23 and router 24 shown in FIG. 1 .
- the network controller 10 in FIG. 1 may also include more other modules, and the number of network function modules of different types of networks and the number of southbound interfaces are only illustrative. According to actual application needs, it can be flexibly adjusted. Specifically, it can be flexibly configured according to requirements, and there is no limit to the content in this aspect.
- link (or link interface) oscillation may be caused by various factors, and different factors are superimposed on each other, making the link oscillation sporadic, that is, in a certain period of time, the link will oscillate, After a period of time, the link returns to normal.
- the usual network management and control is to reduce the invalid rerouting and invalid switchback related to the link; for the link that recovers from the vibration to normal, restore the normal rerouting and switchback.
- some factors that cause link oscillations are periodic and repeatable, for example, the temperature is high during the day and low at night, so there is a high probability that the link that has been vibrated before will reoccur in the subsequent period.
- a link that vibrates again has certain risks, and is called a risk link in the present invention.
- the above-mentioned network management and control lacks the management of risky links, and treats risky links as normal links, does not take into account the impact of risky links on business, and lacks self-adaptive means for oscillating links, often using delay Switching back or accumulating multiple times of rerouting suppresses oscillations and lacks adaptability.
- FIG. 2 shows a schematic flowchart of a link processing method according to an embodiment of the present application.
- the link processing method in the embodiment of the present application may include the following steps S210-S240.
- the risk information of the link is calculated according to the received number of state changes of the link within a predetermined time period and the duration of the first state, and the business that needs path switching is performed according to the risk information.
- Path calculation, and path switching risk suppression based on path calculation results so as to realize risk link identification and adaptive suppression based on historical statistical analysis, effectively identify link risk information, and carry out corresponding risk suppression from the management and control level, In this way, frequent service changes can be avoided, and the risk of packet loss on the forwarding plane can be reduced.
- the link processing method before step S210, further includes: determining that the current time reaches the time to regularly update the risk information of the link; or, determining that the state change information of the link is received.
- the link risk information can be calculated periodically or in response to the received link state change information, that is, the data update of the link risk information can include two types: There are two methods, one is regular update, and the other is update triggered by link information to calculate and identify link risk information.
- the risk information includes a risk level; the number of predetermined durations is at least one.
- S210 may specifically include the following steps S11-S13.
- the shortest duration is the minimum value among at least one predetermined duration, and the shortest duration Less than or equal to the predetermined duration threshold.
- the risk level of the link can be determined according to the number of state changes and the corresponding limiting conditions for the number of times, as well as the duration of the first state and the corresponding limiting conditions for the duration, so as to effectively identify different influences.
- Risky links allow users to perform network management on links with different risk levels to suppress risks.
- the number of state changes of the link refers to the number of changes from the first state to the second state.
- the first state is a link connection state
- the second state is a link disconnection state
- the first state is a link disconnection state
- the second state is a link connection state.
- the limiting condition for the number of times in step S12 is: the number of times of state changes within the obtained non-shortest duration is greater than or equal to the predetermined number threshold corresponding to the obtained non-shortest duration.
- the duration of the first state is the working time
- the duration limitation condition is: the proportion of the working time of the link within the non-shortest duration, It is less than the working hours proportion threshold corresponding to the acquired non-shortest hours.
- the duration of the first state is the duration of the outage
- the duration limit condition is: the length of the outage of the link within the obtained non-shortest duration accounts for ratio, which is greater than or equal to the percentage threshold of the non-shortest duration corresponding to the obtained non-shortest duration.
- the assessment of the risk level of the link can be mainly based on two variables: the number of link state changes and the duration of the first state.
- the two variables may be, for example, the number of state changes of the link from connected to disconnected and the proportion of working hours, or may be the number of times of state changes of the link from disconnected to connected and the proportion of stop working time.
- the first state may be set as a connected state (or working state) of the link; the first state may also be set as a disconnected state (or non-working state) of the link.
- the total number of predetermined durations is N, and N is an integer greater than or equal to 1.
- the predetermined duration is a preset shortest duration and the shortest duration is less than or equal to the preset duration threshold; for example, the preset shortest duration may be a minute-level duration.
- the predetermined duration may include the preset shortest duration and at least one non-shortest duration, and the non-shortest duration is greater than the shortest duration; for example, the non-shortest duration may be an hour-level duration.
- the predetermined duration is the preset shortest duration, for example, can be set to 10 minutes, and the number of times threshold corresponding to the shortest duration can be set to 5 times.
- the risk level of the link is determined to be high risk if the number of state changes of the link within 10 minutes (from connected state to disconnected state, or from disconnected state to connected state) is greater than or equal to 5 times.
- the predetermined durations include a preset shortest duration and at least one non-shortest duration.
- the predetermined duration may include two durations, three durations or other number of durations.
- the method for determining the risk level of a link is described below by taking the predetermined duration as two durations.
- the predetermined duration is two durations, for example, 10 minutes and 1 hour. Within the two durations, the number of "disconnections" and the proportion of working hours are counted respectively.
- the link from the "connected” state to the "disconnected” state, or the link from the "disconnected” state to the “connected” state is recorded as a state change, and it is determined that the link is The total number of state changes that occurred within a certain period of time; the proportion of working hours within a certain period of time refers to the ratio of the time that the link is in the "connected” state to the period; The ratio of the duration of the "disconnected” state to this duration.
- the number of times threshold corresponding to 10 minutes can be set to 5 times
- the number of times threshold corresponding to 1 hour can be set to 7 times
- the proportion of working hours corresponding to 1 hour can be set to 0.8
- the proportion of working hours corresponding to 1 hour can be set to Can be set to 0.2.
- the link is directly determined to be at high risk. If within 1 hour, the number of state changes of the link is greater than or equal to 7 times, or the proportion of working hours is less than 0.8, or the proportion of stop working hours is greater than or equal to 0.2, the link is considered to be at medium risk.
- the method for determining the risk level of a link is described below by taking the predetermined duration as three durations.
- the three durations are referred to as the shortest duration, the medium duration, and the longest duration according to the duration, for example, 10 minutes, 1 hour, and 24 hours respectively, corresponding to the thresholds of the times of the above three durations It can be set to 5 times, 7 times, and 10 times, and the proportion of working hours corresponding to the medium duration and the longest duration is set to 0.8 and 0.8.
- the link can be directly determined to be at high risk.
- the link Within 1 hour of medium duration, if the number of interruptions exceeds the medium duration threshold 7 times, or the proportion of working hours is less than the medium duration threshold 0.8, the link is considered to be at medium risk; within the longest duration of 24 hours, the number of interruptions exceeds the long duration threshold If the number of times is 10, or the proportion of working hours is less than the long-time threshold of 0.8, the link is considered to be at medium risk.
- the number and specific duration of the predetermined duration may be set according to actual conditions.
- the shortest duration can be minute-level (less than 1 hour)
- the longest duration can be level-level duration (greater than or equal to 24 hours)
- medium durations other than the shortest and longest durations can be hour-level Duration (greater than or equal to 1 hour and less than 24 hours)
- the number and value of the above-mentioned durations can be set according to actual conditions, and are not specifically limited in this embodiment of the present application.
- risk information includes risk levels and risk rates.
- the above step S220 may specifically include the following sub-steps S21-S24.
- the time period used when the risk level is calculated is used as the time period for participating in the calculation.
- the normalization process in step S23 may include, for example, the following sub-steps S31-S33.
- the first normalization process may be performed through the following expression (1-1), to obtain the risk rate of state changes within the participating calculation time.
- f downNum represents the risk rate generated by the number of state changes of the link from the connected state to the disconnected state
- downnum is the number of times the current link changes from the connected state to the disconnected state within the calculation period.
- the number of state changes, threshold1 is the threshold for the number of state changes corresponding to the calculation duration.
- k1 0.4
- k2 0.4. It should be understood that the values of k1 and k2 can be customized according to actual conditions, and are not specifically limited in this embodiment of the present application.
- the first normalization process may be performed through the following expression (1-2) to obtain the risk rate of the state change within the participating calculation time.
- f upNum represents the risk rate generated by the number of state changes of the link from the disconnected state to the connected state
- upNum is the risk rate of the current link from the disconnected state to the connected state within the calculation period.
- the number of state changes, the meaning of threshold1 and the values of k1 and k2 are the same as the above expression (1-1), and will not be repeated in the embodiment of this application.
- the second normalization process can be performed through the following expression (2-1) to obtain the risk rate generated by the proportion of working hours within the participating calculation hours.
- the following expression (2-2) can be used to perform the second normalization process to obtain the proportion of the disconnected duration of the first state participating in the calculation and the corresponding A state duration ratio threshold.
- the risk rate caused by the state change can be expressed as the following expression (3):
- the proportion of the duration of the first state is the proportion of working hours
- the risk rate generated by the proportion of working hours can be expressed as the following expression (4 ):
- the risk rate caused by the state change can be expressed as the following expression (5):
- the risk rate generated by the first state change can be expressed as the following expression (6):
- the above-mentioned first normalization method and the second normalization method can also be based on a zero-mean (z-score) normalization method or based on a hyperbolic tangent function (Hyperbolic Tangent Function, Tanth) the normalization method.
- z-score zero-mean
- Tanth hyperbolic Tangent Function
- the z-score normalization method can be expressed as the following expression (7):
- the normalization method based on Tanth can be expressed as the following expression (8):
- f2(x) is the calculated state change corresponding to the participating computing duration Generated risk rate; if the value of x is the proportion of the duration of the first state in the calculation period, then f2(x) is the calculated risk rate corresponding to the duration of the calculation in the first state.
- the expression of the first normalization processing and the expression of the second normalization processing above may also be other normalization processing methods, which can be set according to actual application scenarios, and are not specifically limited in the embodiments of the present disclosure. .
- risk information includes risk levels and risk rates.
- the above step S220 may specifically include the following steps S41-S42.
- the risk information of each link can be added to the graph resources required for path calculation.
- the risk suppression in step S240 can use different risk levels to avoid risky links as much as possible to achieve the purpose of suppressing risky links, thereby performing path calculation based on the risk information of the links, and setting high-risk links as disconnected Links, low-risk links are regarded as links that do not affect rerouting calculations, and the corresponding risk rate strategy is added to the path calculation for medium-risk links, so that the risk information and risk rate of the link can be referred to during the path calculation process , so as to carry out risk avoidance and risk suppression according to the corresponding path calculation results.
- risk mitigation includes rerouting mitigation.
- the step of calculating the path based on the risk rate of the medium-risk link in the above step S42 may specifically include the following steps S42-01 to S42-03.
- the risk rate policy is a calculation policy set according to the risk rate of the link with medium risk.
- multiple path calculation strategies can be used in the path calculation process using the path calculation strategy.
- the multiple path calculation strategies include the original rerouting calculation strategy and the newly added risk rate strategy.
- the path with the smallest cumulative risk rate is selected as the optimal switching path for rerouting, so as to avoid risks in the path switching of service rerouting.
- using the preset path calculation strategy to perform path calculation on the scheduled service includes: performing path calculation on the scheduled service according to the priority of the strategy included in the preset path calculation strategy; wherein, in the preset path calculation strategy Among the included policies, the priority of the risk rate policy is lower than that of the highest priority policy, and the highest priority policy is used to complete the rerouting of scheduled services first.
- the original rerouting calculation strategy may include, for example, strategies required by rerouting itself such as minimum hops, and the risk strategy is the lowest priority strategy, that is, on the basis of satisfying other strategies, try to select the strategy with the lowest cumulative risk rate.
- the risk strategy may also adopt a second-lower priority strategy, that is, on the basis of satisfying the priority rerouting strategy, the link with the lowest cumulative risk rate is preferentially selected.
- risk suppression includes cutback suppression.
- the step of calculating the path based on the risk rate of the medium-risk link in the above step S42 may specifically include the following steps S42-04 to S42-05.
- the cumulative risk rate of each link in the current route and the cumulative risk rate of the switchback route are calculated.
- the cumulative risk rate of the switchback route is smaller, the link is switched back; Otherwise, it will not switch; realize risk avoidance for path switching of service rerouting.
- the link in the embodiment of the present application is a link composed of underlying network devices connected by the network controller through the southbound interface, and the network controller is the network controller to which the link processing device in the embodiment of the present application belongs ;
- the state of the link is the link state information obtained in advance from the received link change message of the link, wherein the link change message is a message reported by the underlying network device through the southbound interface.
- the link processing method in the embodiment of the present application further includes: sending the path calculation result to the underlying network device through the southbound interface of the network controller, so that the underlying network device performs path switching according to the path calculation result.
- the network controller sends the path result to the device through the southbound interface to complete path switching.
- the link processing method further includes: in the case of performing path calculation again, setting a penalty weight for the high risk link, so as to reduce deployment according to the penalty weight The traffic volume of the link with the highest risk.
- the penalty weight of the link can be increased in subsequent path calculations, thereby reducing the number of services on the link, and finally adaptively suppressing frequent switching of services from the management and control level, effectively suppressing oscillating links Invalid path switching caused by the path.
- the risk information includes a risk rate; the link control method further includes: determining a link with a risk rate greater than a predetermined risk rate threshold in the network as a link that may cause oscillation; link to generate corresponding risk warning information.
- a link with a risk rate greater than a predetermined risk rate threshold in the network is regarded as a link that may vibrate, and corresponding risk prompt information is generated to give a risk to a link that may vibrate in the future hint.
- the link processing method of the embodiment of the application can effectively identify risky links with different influences, and adopt a cross-level response plan to effectively suppress the ongoing oscillation Invalid rerouting and invalid switchback caused by links; and give risk warnings to links that may fluctuate in the future, increase the penalty weight of the link in subsequent path calculations, thereby reducing the number of services on the link, and finally from the management and control Layer self-adaption suppresses frequent switching of services.
- Fig. 3 shows a detailed flowchart of a link processing method according to an exemplary embodiment of the present application.
- the link processing method may include the following steps S301-S311.
- link data updates are divided into two types, one is timer-triggered data update for link status changes of all links;
- the subsequent corresponding processes of the two update methods are the same.
- the threshold for the number of times of link disconnection and the threshold for the proportion of working hours can be set for each preset duration.
- the different predetermined durations include the shortest duration, medium duration, and longest duration described in the above embodiments.
- step S306 judging whether the number of disconnections of the non-shortest duration exceeds the corresponding disconnection times threshold corresponding to the non-shortest duration, or whether the proportion of working hours exceeds the threshold of the proportion of working hours corresponding to the non-shortest duration. If yes, execute step S307 to determine that the link is of medium risk; if not, execute step S308 to determine that the link is of low risk.
- risk information is added to the graph resources required for path calculation.
- Set high-risk links as disconnected links continue path calculation for low-risk links, and increase the risk rate strategy for medium-risk links.
- S310 in the rerouting phase of risk suppression, use a multi-path calculation strategy to perform path calculation.
- the multipath calculation strategy includes the original rerouting calculation strategy and the newly added risk rate strategy.
- the risk link identification process is based on the real historical data of the link, and each link in the network is analyzed separately.
- the algorithm has a clear idea and does not belong to the black box algorithm.
- the recognition rate can be as high as more than 90%, and the risk recognition rate is high.
- statistics are performed based on historical link data, so as to realize prediction of future link flapping conditions. Since the time consumption required by the risk identification algorithm is very small, for controlled products, the time consumption of the algorithm is negligible, so that rapid risk identification can be carried out.
- the risk identification algorithm and the path calculation of rerouting/switching can be combined, and the risk rate strategy can be embedded in the path algorithm, which can effectively adaptively suppress invalid rerouting and switching caused by oscillation.
- the path algorithm can effectively adaptively suppress invalid rerouting and switching caused by oscillation.
- For high-frequency oscillation links it can be 100% suppressed; for low-frequency oscillation links, under the premise of ensuring the smoothness of the actual network, it can be effectively suppressed, and the suppression rate of risky links is high.
- Fig. 4 shows a schematic diagram of a system architecture of another embodiment of the present application.
- the same reference numerals are used for the same or equivalent structures in FIG. 4 as those in FIG. 1 .
- the network controller 10 may include: a risk identification module 101 and a risk suppression module 102 .
- the risk identification module 101 can be configured to calculate the risk rate of the link; the risk suppression module 102 can be configured to perform path calculation based on the risk information of the link, so as to suppress the risk of path switching according to the path calculation result.
- this module can react in time to the status change information of the link uploaded by each network device in the network 20, and can determine and output the risk information of the link in real time.
- the risk information in the embodiment of the present application may include: risk level and risk rate.
- the risk level (that is, the risk level) may include, for example, three levels of low risk, medium risk, and high risk. Each risk level has a corresponding risk rate.
- the value range of rate is 0-1. Specifically, high risk (the calculated risk rate can be greater than or equal to 0.8, for example), medium risk (the calculated risk rate can be greater than or equal to 0.6 and less than 0.8), low risk (the calculated risk rate is less than 0.6) .
- the link is suppressed, that is, no rerouting or switchback is calculated until the link is no longer high risk.
- no rerouting or switchback is calculated until the link is no longer high risk.
- For medium-risk links you can continue to calculate rerouting or switchback, but you need to consider the impact of the risk rate.
- For low-risk links recalculation routing or switchback is not affected.
- the network controller 10 can trigger risk link identification according to the received link oscillation message (such as the link change message reported by the network device through the southbound interface module 11), and the risk identification module 101 starts to calculate the current trigger The risk level and risk rate of the link; the risk suppression module 102 starts rerouting or switching back, during which the path calculation gives priority to the risk rate; after the risk suppression module 102 completes the path calculation, it returns the result to the network controller 10 .
- the network controller 10 sends the path result to the network device through the southbound interface module 11 to complete path switching.
- FIG. 5 shows a schematic structural diagram of a link processing device provided by an embodiment of the present application. As shown in Fig. 5, the link processing device may include the following modules.
- the information obtaining module 510 is configured to obtain the number of state changes of the link and the duration of the first state within a predetermined time period.
- the risk calculation module 520 is configured to calculate the risk information of the link based on the number of state changes and the duration of the first state.
- the path calculation module 530 is configured to perform path calculation based on the risk information.
- the risk suppression module 540 is configured to perform risk suppression on path switching according to the path calculation result.
- the risk information includes a risk level; the number of predetermined durations is at least one; the risk calculation module 520 includes: a high risk determination unit configured to determine that the number of state changes within the shortest duration is greater than or equal to the minimum duration Corresponding number of thresholds, then determine that the risk level of the link is a high risk; wherein, the shortest duration is the minimum value in at least one predetermined duration, and the shortest duration is less than or equal to the predetermined duration threshold; the medium risk determination unit is configured to be at least one In the predetermined duration, if it is determined that the number of state changes obtained within a non-shortest duration satisfies the corresponding limit condition for the number of times, or if it is determined that the duration of the first state within the acquired non-shortest duration satisfies the corresponding duration limit condition, then determine the chain The risk level of the road in the obtained non-shortest duration is medium risk; the low-risk determination unit is configured to determine that the number of state changes obtained within a non-shortest duration does not meet
- the condition for limiting the number of times is: the number of state changes obtained within the non-shortest duration is greater than or equal to the predetermined threshold value corresponding to the obtained non-shortest duration; if the first state is a link connection state, the second state If the link is disconnected, the duration of the first state is the working time, and the duration limitation condition is: the working time proportion of the link in the non-shortest time period is less than the working time proportion threshold corresponding to the obtained non-shortest time length.
- the duration of the first state is the duration of the stop working
- the duration limitation condition is: the link is not the shortest duration of acquisition
- the proportion of non-working duration within the period is greater than or equal to the non-minimum duration corresponding to the obtained non-minimum duration corresponding to the threshold of the proportion of non-working duration.
- the risk information includes a risk level and a risk rate
- the risk calculation module 520 includes: a duration determination unit configured to use the duration used to calculate the risk level as the duration of the calculation; the duration ratio calculation unit, It is configured to obtain the proportion of the duration of the first state in each participating calculation period according to the ratio of the first state duration in each participating calculation period to the corresponding participating calculation period; the risk rate calculation unit is configured to be based on each The number of state changes within the participating calculation time and the corresponding state change threshold, as well as the proportion of the first state duration in each participating calculation time and the corresponding threshold of the first state duration are normalized to obtain the chain The risk rate of the link in each participating calculation time length; the maximum risk rate determination unit is configured to use the maximum value of the risk rate of the link in each participating calculation time length as the risk rate of the link.
- the risk rate calculation unit when the risk rate calculation unit performs normalization processing, it is further configured to: perform the first normalization processing on the number of state changes and the corresponding threshold of the number of state changes within the participating calculation time to obtain the link The risk rate caused by state changes within the participating calculation time; based on the proportion of the first state duration and the corresponding threshold of the first state duration within the participating calculation time, the second normalization process is performed to obtain the link The risk rate generated by the proportion of the duration of the first state within the participating calculation time; from the risk rate generated by the state change and the risk rate generated by the proportion of the duration of the first state, the maximum value of the risk rate is obtained as the chain The risk rate corresponding to the risk level of the road.
- the link processing device further includes: a link processing triggering module, configured to determine that the current moment reaches the timing of updating the link before calculating the risk information of the link based on the number of state changes and the duration of the first state. The moment of the risk information; or, determining that the state change information of the link is received.
- a link processing triggering module configured to determine that the current moment reaches the timing of updating the link before calculating the risk information of the link based on the number of state changes and the duration of the first state. The moment of the risk information; or, determining that the state change information of the link is received.
- risk information includes risk levels and risk rates.
- the path calculation module 530 may include: a graph information updating unit configured to add a risk level of the link to the topology graph information of the network to which the link belongs to obtain updated topology graph information; a triggering unit configured to, according to the updated topology graph information, Trigger path calculation for scheduled services; the path calculation module 530 is also configured to: during the path calculation process: for links with high risk levels, set high-risk links as disconnected links; for low-risk links with risk levels For links whose risk level is medium risk, path calculation is performed based on the risk rate of the link with medium risk.
- the risk suppression includes rerouting suppression; when the path calculation module 530 is configured to perform path calculation based on the risk rate of a medium-risk link, it may include the following units: a strategy path calculation unit configured to adopt a preset path The calculation strategy calculates the path of the scheduled business to obtain the rerouting candidate path of the scheduled business.
- the preset path calculation strategy includes: the original rerouting calculation strategy and the newly added risk rate strategy.
- the risk rate strategy is based on the medium risk
- the calculation strategy of the risk rate setting of the link configured to calculate the sum of the risk rates of each link in each rerouting candidate path, and obtain the cumulative risk rate of each rerouting candidate path; switching path
- the determining unit is configured to select the rerouting candidate path corresponding to the minimum value of the cumulative risk rate as the optimal switching path for path calculation.
- the strategy path calculation unit when the strategy path calculation unit uses the preset path calculation strategy to perform path calculation on the predetermined service, it may be specifically configured to: perform path calculation on the predetermined service according to the priority of the strategy included in the preset path calculation strategy; Among the policies included in the preset path calculation policy, the priority of the risk rate policy is lower than the priority of the highest priority policy, and the highest priority policy is used to complete the rerouting of the predetermined service with priority.
- risk suppression includes switchback suppression; when the path calculation module 530 is configured to perform path calculation based on the risk rate of a medium-risk link, it may include the following unit: a current path risk rate calculation unit configured to calculate a predetermined The sum of the risk rates of each link in the current business path of the business is taken as the current path risk rate; the original path risk rate calculation unit is configured to calculate the sum of the risk rates of each link in the original business path of the scheduled business as the original path risk rate; the switchback path calculation unit is configured to use the original path risk rate as the path calculation result of the business switchback when the risk rate of the original path is less than the risk rate of the current path.
- a current path risk rate calculation unit configured to calculate a predetermined The sum of the risk rates of each link in the current business path of the business is taken as the current path risk rate
- the original path risk rate calculation unit is configured to calculate the sum of the risk rates of each link in the original business path of the scheduled business as the original path risk rate
- the switchback path calculation unit is configured to use the
- the link is a link composed of underlying network devices connected by a network controller through a southbound interface, and the network controller is the network controller to which the link processing device belongs; the state of the link is received in advance from The link status information is obtained from the link change message of the link.
- the link change message is the message reported by the underlying network device through the southbound interface.
- the link processing device further includes: a calculation result sending module configured to send the path calculation result to the underlying network device through the southbound interface, so that the underlying network device performs path switching according to the path calculation result.
- the link processing device further includes: a weight setting module, configured to set a penalty weight for the high risk link in the case of performing path calculation again, according to Penalty weights reduce the amount of traffic deployed to high-risk links.
- the risk information includes a risk rate; the link processing device further includes: an oscillating link determination module configured to determine a link whose risk rate is greater than a predetermined risk rate threshold as a link that may be oscillated; risk warning A module configured to generate corresponding risk prompt information for links determined to be likely to vibrate.
- the link processing device of the embodiment of the present application aiming at the problem of link oscillation, it can effectively identify the risk links with different influences, and adopt a cross-level solution to effectively suppress the invalidity caused by the link oscillation. Rerouting and invalid switchback; and give risk warnings to links that may fluctuate in the future, increase the penalty weight of the link in subsequent path calculations, thereby reducing the number of services on the link, and finally adaptively suppress services from the management and control level Switch frequently.
- Fig. 6 is a structural diagram showing an exemplary hardware architecture of a computing device capable of implementing the link processing method and apparatus according to the embodiments of the present invention.
- the computing device 600 includes an input device 601 , an input interface 602 , a central processing unit 603 , a memory 604 , an output interface 605 , and an output device 606 .
- the input interface 602, the central processing unit 603, the memory 604, and the output interface 605 are connected to each other through the bus 610, and the input device 601 and the output device 606 are respectively connected to the bus 610 through the input interface 602 and the output interface 605, and then connected to the computing device 600 other component connections.
- the input device 601 receives input information from the outside, and transmits the input information to the central processing unit 603 through the input interface 602; the central processing unit 603 processes the input information based on computer-executable instructions stored in the memory 604 to generate output information, temporarily or permanently store the output information in the memory 604, and then transmit the output information to the output device 606 through the output interface 605; the output device 606 outputs the output information to the outside of the computing device 600 for the user to use.
- the computing device shown in FIG. 6 may be implemented as a network device, and the network device may include: a memory configured to store a program; a processor configured to run the program stored in the memory to Execute the link processing method described in the foregoing embodiments.
- the various embodiments of the present application can be implemented in hardware or special purpose circuits, software, logic or any combination thereof.
- some aspects may be implemented in hardware, while other aspects may be implemented in firmware or software, which may be executed by a controller, microprocessor or other computing device, although the application is not limited thereto.
- Computer program instructions may be assembly instructions, instruction set architecture (ISA) instructions, machine instructions, machine-dependent instructions, microcode, firmware instructions, state setting data, or source code written in any combination of one or more programming languages or object code.
- ISA instruction set architecture
- Any logic flow block diagrams in the drawings of the present application may represent program steps, or may represent interconnected logic circuits, modules and functions, or may represent a combination of program steps and logic circuits, modules and functions.
- Computer programs can be stored on memory.
- the memory may be of any type suitable to the local technical environment and may be implemented using any suitable data storage technology, such as, but not limited to, read-only memory (ROM), random-access memory (RAM), optical memory devices and systems (digital versatile disc DVD or CD), etc.
- Computer readable media may include non-transitory storage media.
- the data processor can be of any type suitable for the local technical environment, such as but not limited to general purpose computer, special purpose computer, microprocessor, digital signal processor (DSP), application specific integrated circuit (ASIC), programmable logic device (FGPA) and processors based on multi-core processor architectures.
- DSP digital signal processor
- ASIC application specific integrated circuit
- FGPA programmable logic device
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- General Physics & Mathematics (AREA)
- Algebra (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Mathematical Physics (AREA)
- Probability & Statistics with Applications (AREA)
- Pure & Applied Mathematics (AREA)
- Physics & Mathematics (AREA)
- Environmental & Geological Engineering (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims (16)
- 一种链路处理方法,应用于链路处理装置,所述方法包括:获取链路在预定时长内的状态变化次数和第一状态持续时长;基于所述状态变化次数和第一状态持续时长,计算所述链路的风险信息;基于所述风险信息进行路径计算;以及根据所述路径计算的结果对路径切换进行风险抑制。
- 根据权利要求1所述的方法,其中,所述风险信息包括风险等级;所述预定时长的数量为至少一个;并且所述基于所述状态变化次数和第一状态持续时长,计算所述链路的风险信息,包括:若最短时长内的所述状态变化次数,大于或等于所述最短时长所对应的次数阈值,则确定所述链路的风险等级为高风险;其中,所述最短时长为所述至少一个预定时长中的最小值,且所述最短时长小于或等于预定时长阈值;在所述至少一个预定时长中,若获取的一个非最短时长内的所述状态变化次数满足对应的次数限定条件,或者,所获取非最短时长内的所述第一状态持续时长满足对应的时长限定条件,则确定所述链路在所获取非最短时长内的风险等级为中风险;若获取的一个非最短时长内的所述状态变化次数不满足对应的次数限定条件,并且,所获取非最短时长内的所述第一状态持续时长不满足对应的时长限定条件,则确定所述链路在所获取非最短时长内的风险等级为低风险。
- 根据权利要求2所述的方法,其中,所述次数限定条件为:获取的所述非最短时长内的所述状态变化次数,大于或等于获取的所述非最短时长所对应的预定次数阈值;所述状态变化次数为第一状态到第二状态的变化次数;并且其中,所述第一状态为链路连接状态,第二状态为链路断开状态,所述第一状态持续时长为工作时长,所述时长限定条件为:所述链路在所述非最短时长内的工作时长占比,小于获取的所述非最短时长所对应的工作时长占比阈值;或者所述第一状态为链路断开状态,第二状态为链路连接状态,所述第一状态持续时长为停止工作时长,所述时长限定条件为:所述链路在获取的所述非最短时长内的停止工作时长占比,大于或等于获取的所述非最短时长所对应的停止工作时长占比阈值。
- 根据权利要求1所述的方法,其中,所述风险信息包括风险等级和风险率;所述基于所述状态变化次数和第一状态持续时长,计算所述链路的风险信息,包括:将计算得到所述风险等级时所使用的时长,作为参与计算时长;根据每个参与计算时长内的所述第一状态持续时长与对应的参与计算时长的比值,得到所述每个参与计算时长内的第一状态持续时长占比;基于所述每个参与计算时长内的所述状态变化次数和对应的状态变化次数阈值,以及所述每个参与计算时长内的第一状态持续时长占比和对应的第一状态持续时长占比阈值进行归 一化处理,得到所述链路在所述每个参与计算时长内的风险率;以及将所述链路在所述每个参与计算时长内的风险率的最大值,作为所述链路的风险率。
- 根据权利要求4所述的方法,其中,所述归一化处理,包括:对所述参与计算时长内的所述状态变化次数和对应的状态变化次数阈值,进行第一归一化处理,得到所述链路在所述参与计算时长内的由状态变化产生的风险率;基于所述参与计算时长内的第一状态持续时长占比和对应的第一状态持续时长占比阈值,进行第二归一化处理,得到所述链路在所述参与计算时长内的由第一状态持续时长占比产生的风险率;以及从所述由状态变化产生的风险率和所述由第一状态持续时长占比产生的风险率中,获取风险率的最大值作为所述链路的风险等级对应的风险率。
- 根据权利要求1所述的方法,其中,在所述基于所述状态变化次数和第一状态持续时长,计算所述链路的风险信息之前,所述方法还包括:确定当前时刻达到定时更新所述链路的风险信息的时刻;或者,确定接收到所述链路的状态变化信息。
- 根据权利要求1所述的方法,其中,所述风险信息包括风险等级和风险率;并且所述基于所述风险信息进行路径计算,包括:在所述链路所属网络的拓扑图信息中增加所述链路的风险等级,得到更新的拓扑图信息;根据所述更新的拓扑图信息,触发对预定业务进行的所述路径计算;其中,在所述路径计算过程中:对于所述风险等级为高风险的链路,设置所述高风险的链路为断开链路;对于所述风险等级为低风险的链路,继续进行所述路径计算;并且对于所述风险等级为中风险的链路,基于所述中风险的链路的风险率进行所述路径计算。
- 根据权利要求7所述的方法,其中,所述风险抑制包括重路由抑制;并且所述基于所述中风险的链路的风险率进行所述路径计算,包括:采用预设路径计算策略对所述预定业务进行所述路径计算,得到所述预定业务的重路由候选路径;其中,所述预设路径计算策略包括:原有的重路由计算策略和新增的风险率策略,所述风险率策略是根据所述中风险的链路的风险率设置的计算策略;计算每条所述重路由候选路径中各链路的风险率之和,得到每条所述重路由候选路径的累计风险率;以及选择所述累计风险率中的最小值对应的重路由候选路径,作为所述路径计算的最优切换路径。
- 根据权利要求8所述的方法,其中,所述采用预设路径计算策略对所述预定业务进行所述路径计算,包括:按照所述预设路径计算策略所包含策略的优先级,对所述预定业务进行所述路径计算;其中,在所述预设路径计算策略所包含策略中,所述风险率策略的优先级低于最高优先级策略的优先级,所述最高优先级策略用于优先完成所述预定业务的重路由。
- 根据权利要求7所述的方法,其中,所述风险抑制包括回切抑制;并且所述基于所述中风险的链路的风险率进行所述路径计算,包括:计算所述预定业务的当前业务路径中各链路的风险率之和,作为当前路径风险率,以及计算所述预定业务在原业务路径中各链路的风险率之和,作为原路径风险率;以及在所述原路径风险率小于所述当前路径风险率的情况下,将所述原路径风险率作为所述业务回切的路径计算结果。
- 根据权利要求1所述的方法,其中,所述链路为网络控制器通过南向接口连接的底层网络设备组成的链路,所述网络控制器为所述链路处理装置所属的网络控制器;所述链路的状态是预先从接收到的所述链路的链路变更消息中获取的链路状态信息,所述链路变更消息是所述底层网络设备通过所述南向接口上报的消息;并且所述方法还包括:通过所述南向接口将所述路径计算结果发送至所述底层网络设备,以使所述底层网络设备根据所述路径计算结果进行路径切换。
- 根据权利要求1所述的方法,其中,所述风险信息包括风险等级,并且对于所述风险等级为高风险的链路,所述方法还包括:在再次进行所述路径计算的情况下,为所述高风险的链路设置惩罚权重,以根据所述惩罚权重减少部署至所述高风险的链路的业务数量。
- 根据权利要求1所述的方法,其中,所述风险信息包括风险率;并且所述方法还包括:将风险率大于预定风险率阈值的所述链路,确定为可能发生震荡的链路;以及对确定为可能发生震荡的链路,生成对应的风险提示信息。
- 一种链路处理装置,其中,所述装置包括:信息获取模块,配置为获取链路在预定时长内的状态变化次数和第一状态持续时长;风险计算模块,配置为基于所述状态变化次数和第一状态持续时长,计算所述链路的风险信息;路径计算模块,配置为基于所述风险信息进行路径计算;以及风险抑制模块,配置为根据所述路径计算的结果对路径切换进行风险抑制。
- 一种网络设备,包括:一个或多个处理器;存储器,其上存储有一个或多个程序,当所述一个或多个程序被所述一个或多个处理器 执行,使得所述一个或多个处理器实现权利要求1-13中任一项所述的方法。
- 一种存储介质,所述存储介质存储有计算机程序,所述计算机程序被处理器执行时实现权利要求1-13任一项所述的方法。
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP22824271.5A EP4354826A4 (en) | 2021-06-18 | 2022-06-16 | METHOD AND DEVICE FOR CONNECTION PROCESSING, NETWORK DEVICE AND STORAGE MEDIUM |
BR112023026511A BR112023026511A2 (pt) | 2021-06-18 | 2022-06-16 | Método e aparelho de processamento de link, dispositivo de rede e meio de armazenamento |
US18/563,551 US20240250893A1 (en) | 2021-06-18 | 2022-06-16 | Link processing method and apparatus, network device, and storage medium |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110678522.7 | 2021-06-18 | ||
CN202110678522.7A CN115499364A (zh) | 2021-06-18 | 2021-06-18 | 链路处理方法、装置、网络设备和存储介质 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2022262798A1 true WO2022262798A1 (zh) | 2022-12-22 |
Family
ID=84464158
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2022/099093 WO2022262798A1 (zh) | 2021-06-18 | 2022-06-16 | 链路处理方法、装置、网络设备和存储介质 |
Country Status (5)
Country | Link |
---|---|
US (1) | US20240250893A1 (zh) |
EP (1) | EP4354826A4 (zh) |
CN (1) | CN115499364A (zh) |
BR (1) | BR112023026511A2 (zh) |
WO (1) | WO2022262798A1 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116996964A (zh) * | 2023-07-28 | 2023-11-03 | 中国电信股份有限公司技术创新中心 | 终端数据传输方法、装置、电子设备及存储介质 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1764154A (zh) * | 2004-10-20 | 2006-04-26 | 日立通讯技术株式会社 | 标记交换通路的路径控制 |
US20160182344A1 (en) * | 2014-12-17 | 2016-06-23 | Ciena Corporation | Systems and methods to detect, diagnose, and mitigate issues in multi-layer networks |
CN107769951A (zh) * | 2016-08-22 | 2018-03-06 | 南京中兴软件有限责任公司 | 链路处理方法及装置 |
CN112422442A (zh) * | 2020-10-21 | 2021-02-26 | 鹏城实验室 | 处理双向转发检测协议的会话中断消息的方法及存储介质 |
CN112532518A (zh) * | 2020-11-26 | 2021-03-19 | 新华三技术有限公司 | 一种段路由策略的路径选择方法及装置 |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2008128572A1 (en) * | 2007-04-20 | 2008-10-30 | Telefonaktiebolaget Lm Ericsson (Publ) | A method and apparatus for quality of service (qos) planning for an ethernet based network |
CN101572674A (zh) * | 2009-06-12 | 2009-11-04 | 杭州华三通信技术有限公司 | 一种路由计算方法及装置 |
US10108803B2 (en) * | 2016-03-31 | 2018-10-23 | International Business Machines Corporation | Automatic generation of data-centric attack graphs |
-
2021
- 2021-06-18 CN CN202110678522.7A patent/CN115499364A/zh active Pending
-
2022
- 2022-06-16 US US18/563,551 patent/US20240250893A1/en active Pending
- 2022-06-16 BR BR112023026511A patent/BR112023026511A2/pt unknown
- 2022-06-16 EP EP22824271.5A patent/EP4354826A4/en active Pending
- 2022-06-16 WO PCT/CN2022/099093 patent/WO2022262798A1/zh active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1764154A (zh) * | 2004-10-20 | 2006-04-26 | 日立通讯技术株式会社 | 标记交换通路的路径控制 |
US20160182344A1 (en) * | 2014-12-17 | 2016-06-23 | Ciena Corporation | Systems and methods to detect, diagnose, and mitigate issues in multi-layer networks |
CN107769951A (zh) * | 2016-08-22 | 2018-03-06 | 南京中兴软件有限责任公司 | 链路处理方法及装置 |
CN112422442A (zh) * | 2020-10-21 | 2021-02-26 | 鹏城实验室 | 处理双向转发检测协议的会话中断消息的方法及存储介质 |
CN112532518A (zh) * | 2020-11-26 | 2021-03-19 | 新华三技术有限公司 | 一种段路由策略的路径选择方法及装置 |
Non-Patent Citations (1)
Title |
---|
See also references of EP4354826A4 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116996964A (zh) * | 2023-07-28 | 2023-11-03 | 中国电信股份有限公司技术创新中心 | 终端数据传输方法、装置、电子设备及存储介质 |
Also Published As
Publication number | Publication date |
---|---|
EP4354826A1 (en) | 2024-04-17 |
US20240250893A1 (en) | 2024-07-25 |
CN115499364A (zh) | 2022-12-20 |
BR112023026511A2 (pt) | 2024-03-05 |
EP4354826A4 (en) | 2024-10-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11240153B1 (en) | Scoring policies for predictive routing suggestions | |
US11044191B2 (en) | Coupling reactive routing with predictive routing in a network | |
US10977574B2 (en) | Prediction of network device control plane instabilities | |
US9838317B1 (en) | Policy-based selective traffic reroute based on predicted traffic loss | |
US11398958B2 (en) | Reverting routing decisions made based on incorrect network predictions | |
US10313153B2 (en) | Adaptive MAC grouping and timeout in EVPN environments using machine learning | |
US9225616B2 (en) | Feedback-based tuning of control plane traffic by proactive user traffic observation | |
US11063861B2 (en) | Ensuring backup path performance for predictive routing in SD-WANs | |
WO2012166886A1 (en) | Management of misbehaving nodes in a computer network | |
US9563440B2 (en) | Fast learning to train learning machines using smart-triggered reboot | |
US11616712B2 (en) | Machine learning approach for dynamic adjustment of BFD timers in SD-WAN networks | |
US20220294738A1 (en) | Globally avoiding simultaneous reroutes in a network | |
US20230128567A1 (en) | Elastic allocation of resources for optimizing efficiency of predictive routing systems | |
US20230136635A1 (en) | Selective formation and maintenance of tunnels within a mesh topology | |
US20210351989A1 (en) | Self-managed networks and services with artificial intelligence and machine learning | |
WO2022262798A1 (zh) | 链路处理方法、装置、网络设备和存储介质 | |
CN104639557A (zh) | 一种建立pcep会话的方法、系统及设备 | |
US20190372852A1 (en) | Event-aware dynamic network control | |
WO2023065756A1 (zh) | 确定性路由的计算方法、装置、存储介质和电子设备 | |
US11711291B2 (en) | Progressive automation with predictive application network analytics | |
US20190273633A1 (en) | Link state packet transmission method and routing node | |
US20220377005A1 (en) | Safety net engine for machine learning-based network automation | |
US20240089204A1 (en) | Communication Method, Device, and System | |
WO2016160007A1 (en) | Method and apparatus for flow control | |
US11483234B2 (en) | Predictive routing-based policy adjustments in software-defined networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 22824271 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 18563551 Country of ref document: US |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2022824271 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 2022824271 Country of ref document: EP Effective date: 20231218 |
|
REG | Reference to national code |
Ref country code: BR Ref legal event code: B01A Ref document number: 112023026511 Country of ref document: BR |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 112023026511 Country of ref document: BR Kind code of ref document: A2 Effective date: 20231215 |