CN110635986B - Network access method and equipment - Google Patents

Network access method and equipment Download PDF

Info

Publication number
CN110635986B
CN110635986B CN201810661047.0A CN201810661047A CN110635986B CN 110635986 B CN110635986 B CN 110635986B CN 201810661047 A CN201810661047 A CN 201810661047A CN 110635986 B CN110635986 B CN 110635986B
Authority
CN
China
Prior art keywords
access
processing
message
virtual
tunnel
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810661047.0A
Other languages
Chinese (zh)
Other versions
CN110635986A (en
Inventor
李晗
胡淑军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
China Mobile Communications Ltd Research Institute
Original Assignee
China Mobile Communications Group Co Ltd
China Mobile Communications Ltd Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, China Mobile Communications Ltd Research Institute filed Critical China Mobile Communications Group Co Ltd
Priority to CN201810661047.0A priority Critical patent/CN110635986B/en
Publication of CN110635986A publication Critical patent/CN110635986A/en
Application granted granted Critical
Publication of CN110635986B publication Critical patent/CN110635986B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2854Wide area networks, e.g. public data networks
    • H04L12/2856Access arrangements, e.g. Internet access
    • H04L12/2869Operational details of access network equipments
    • H04L12/287Remote access server, e.g. BRAS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4633Interconnection of networks using encapsulation techniques, e.g. tunneling

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The embodiment of the invention provides a method and equipment for network access, wherein the method comprises the following steps: receiving a first message sent by an access UP, wherein the first message represents that a user requests to access a network; determining a processing UP corresponding to the access UP; and respectively sending a first configuration message to the access UP and the processing UP, wherein the first configuration message is used for indicating the access UP and the processing UP to establish a tunnel between the access UP and the processing UP. Thus, when the resources of the access UP are insufficient, the user traffic is scheduled to the processing UP for processing by establishing the tunnel between the access UP and the processing UP, so that the utilization of the resources is balanced.

Description

Network access method and equipment
Technical Field
The embodiment of the invention relates to the technical field of communication, in particular to a network access method and equipment.
Background
Referring to fig. 1, a relay separation virtual BRAS (Broadband Remote Access Server) system includes a centrally deployed virtual CP (Control Plane), a virtual UP (User Plane), and a distributed deployed entity UP. The virtual CP is used for centralized and unified management and control of resources, and the UP (including the virtual UP and the entity UP) is responsible for processing user traffic. The virtual UP is used for processing large-session and small-flow services, and the entity UP is used for processing large-flow services.
In the current transfer control separation virtual BRAS system, when a user accesses on a certain entity UP, the traffic of the user can only be processed on the entity UP, if the resource of the entity UP is occupied, a new user accessed on the entity UP subsequently cannot be on line, and the resource utilization is uneven.
Disclosure of Invention
The embodiment of the invention provides a network access method and equipment, which solve the problem of uneven resource utilization in the existing transfer control separation virtual BRAS system.
According to a first aspect of the embodiments of the present invention, there is provided a method for network access, which is applied to a virtual CP, the method including:
receiving a first message sent by an access User Plane (UP), wherein the first message represents that a user requests to access a network; determining a processing UP corresponding to the access UP; sending a first configuration message to the access UP and the processing UP respectively, wherein the first configuration message is used for indicating the access UP and the processing UP to establish a tunnel between the access UP and the processing UP.
Optionally, the first message includes a first hardware session utilization of the access UP, where the first hardware session utilization of the access UP is identified by an extended TAG field.
Optionally, the determining a processing UP corresponding to the access UP includes: acquiring a service type from a Virtual Local Area Network (VLAN); determining the type of the UP processing according to the service type, wherein the type comprises the following steps: a virtual type and an entity type; when the type of the processing UP is a virtual type, selecting a virtual user plane, and determining the virtual user plane as the processing UP; when the type of the processing UP is an entity type and the first hardware session utilization rate of the access UP is larger than a preset threshold value, selecting an entity UP with the lowest hardware session utilization rate from a plurality of other entity UP except the access UP, and determining the entity UP as the processing UP.
Optionally, after the sending the first configuration message to the access UP and the processing UP, respectively, the method further includes: and receiving a second hardware session utilization rate of the processing UP sent by the processing UP.
Optionally, the method further comprises: receiving a second message sent by the processing UP, wherein the second message is used for indicating that the user requests to exit the network; wherein, the second message includes the third hardware session utilization rate of the processing UP, and the third hardware session utilization rate of the processing UP is identified by an extended TAG field.
Optionally, after the receiving the second message sent by the processing UP, the method further includes: when detecting that all sessions in the tunnel are offline, sending a second configuration message to the access UP and the processing UP respectively, wherein the second configuration message is used for indicating the access UP and the processing UP to withdraw the tunnel between the processing UP and the access UP.
According to a second aspect of the embodiments of the present invention, another method for network access is provided, which is applied to access UP, and the method includes:
receiving a third message sent by the home gateway RGW; generating a first message according to the third message, wherein the first message represents that a user requests to access the network; sending the first message to a virtual CP, and determining a processing UP corresponding to the access UP by the virtual CP; receiving a first configuration message sent by the virtual CP; and establishing a tunnel between the access UP and the processing UP according to the first configuration message.
Optionally, the generating a first message according to the third message includes: expanding a TAG field in the third message to obtain a first message; wherein the TAG field is used to identify a first hardware session utilization of the access UP.
Optionally, the method further comprises: receiving a fourth message sent by the RGW, wherein the fourth message represents that the user requests to exit the network; and sending the fourth message to the processing UP through the tunnel.
Optionally, after the sending the fourth message to the processing UP through the tunnel, the method further includes: receiving a second configuration message sent by the virtual CP; revoking the tunnel between the access UP and the processing UP according to the second configuration message.
According to a third aspect of the embodiments of the present invention, there is provided a method for network access, which is applied to processing UP, and the method includes:
receiving a first configuration message sent by a virtual CP; and establishing a tunnel between the access UP and the processing UP according to the first configuration message.
Optionally, after the establishing a tunnel between the access UP and the processing UP according to the first configuration message, the method further includes: and sending the second hardware session utilization rate for processing the UP to the virtual CP.
Optionally, the method further comprises: receiving a fourth message sent by the access UP through the tunnel, wherein the fourth message represents that a user requests to exit the network; generating a second message according to the fourth message; transmitting the second message to the virtual CP.
Optionally, the generating a second message according to the fourth message includes: expanding a TAG field in the fourth message to obtain a second message; wherein the TAG field is to identify a third hardware session utilization of the processing UP.
Optionally, after the sending the second message to the virtual CP, the method further includes: receiving a second configuration message sent by the virtual CP; revoking the tunnel between the access UP and the processing UP according to the second configuration message.
According to a fourth aspect of the embodiments of the present invention, there is provided a virtual CP, including: the device comprises a first transceiver module and a first processing module;
the first transceiver module is configured to receive a first message sent by an UP access user plane, where the first message indicates that a user requests to access a network; the first processing module is configured to determine a processing UP corresponding to the access UP; the first transceiving module is further configured to send a first configuration message to the access UP and the processing UP, respectively, where the first configuration message is used to instruct the access UP and the processing UP to establish a tunnel between the access UP and the processing UP.
According to a fifth aspect of the embodiments of the present invention, there is provided an access UP, including: the second transceiver module and the second processing module;
the second transceiver module is configured to receive a third message sent by a home gateway RGW; the second processing module is configured to generate a first message according to the third message, where the first message indicates that a user requests to access a network; the second transceiving module is further configured to send the first message to a virtual CP, and the virtual CP determines a processing UP corresponding to the access UP; the second transceiver module is further configured to receive a first configuration message sent by the virtual CP; the second processing module is further configured to establish a tunnel between the access UP and the processing UP according to the first configuration message.
According to a sixth aspect of the embodiments of the present invention, there is provided a processing UP, including: a third transceiver module and a third processing module;
the third transceiver module is configured to receive a first configuration message sent by a virtual CP; and the third processing module is configured to establish a tunnel between the access UP and the processing UP according to the first configuration message.
According to a seventh aspect of the embodiments of the present invention, there is provided a network side device, including: a processor, a memory and a program of a method of network access stored on the memory and executable on the processor, which program, when executed by the processor, performs the steps of the method of network access according to the first aspect, or the steps of the method of network access according to any of the second aspects, or the steps of the method of network access according to the third aspect.
According to an eighth aspect of embodiments of the present invention, there is provided a computer readable storage medium having stored thereon a program of a method of network access, which when executed by a processor, implements the steps of the method of network access according to the first aspect, or the steps of the method of network access according to any one of the second aspect, or the steps of the method of network access according to the third aspect.
In the embodiment of the invention, a virtual CP determines a processing UP corresponding to an access UP according to a first message which is sent by the access UP and used for indicating that a user requests to access a network, and sends a first configuration message to the access UP and the processing UP respectively to indicate the access UP and the processing UP to establish a tunnel between the access UP and the processing UP. Thus, when the resources accessed to the UP are insufficient, the user flow is scheduled to the processing UP for processing by establishing the tunnel between the access UP and the processing UP, so that the resources are utilized uniformly;
when the type of the processing UP is a virtual type, the service flow can be accessed to the flexible scheduling between the UP and the processing UP through the tunnel, and corresponding strategies do not need to be statically configured on all the entity UP, thereby reducing the workload of configuration and maintenance.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings used in the description of the embodiments of the present invention will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained based on these drawings without creative efforts.
Fig. 1 is a schematic diagram of an architecture of a handover control split virtual BRAS system;
fig. 2 is a flowchart of a method for network access according to an embodiment of the present invention;
FIG. 3 is a flowchart of step 202 of FIG. 2;
fig. 4 is a second flowchart of a method for network access according to an embodiment of the present invention;
fig. 5 is a third flowchart of a method for network access according to an embodiment of the present invention;
fig. 6 is a fourth flowchart of a method for network access according to an embodiment of the present invention;
fig. 7 is a fifth flowchart of a method for network access according to an embodiment of the present invention;
fig. 8 is a flowchart illustrating a method for network access according to a sixth embodiment of the present invention;
fig. 9 is a seventh flowchart of a method for network access according to an embodiment of the present invention;
fig. 10 is a schematic structural diagram of a virtual CP according to an embodiment of the present invention;
fig. 11 is a schematic structural diagram of an access UP according to an embodiment of the present invention;
fig. 12 is a schematic structural diagram of processing UP according to an embodiment of the present invention;
fig. 13 is a schematic structural diagram of a network-side device according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 2, an embodiment of the present invention provides a method for network access, where an execution subject of the method is a virtual CP, and the method includes the following specific steps:
step 201: receiving a first message sent by an access UP;
in the embodiment of the invention, all UP is reclassified, and the UP accessed by the user is the access UP. A first message indicating a user request to access the network, the first message including a first hardware session utilization for the access UP, wherein the first hardware session utilization for the access UP is identified by an extended TAG field. The hardware session utilization rate is equal to the ratio of the number of the processed sessions of the hardware to the maximum number of the processed sessions of the hardware, and the resource occupation condition on the access UP can be known through the hardware session rate.
The embodiment of the invention is based on the RFC2516 protocol to expand the definition of the TAG field, optionally, the expanded TAG field is 0x0109 AC-use, and the expanded TAG is used for identifying the utilization rate of the hardware session.
It should be noted that the TAG in the first message is used to identify the hardware session utilization rate of the access UP, and for clarity of description, the hardware session utilization rate of the access UP is referred to as a first hardware session utilization rate.
Step 202: determining a processing UP corresponding to the access UP;
in the embodiment of the invention, the processing UP and the access UP are not the same UP, when the resources of the access UP are insufficient, the virtual CP determines a processing UP for the access UP according to the information contained in the first message, and dispatches the service flow which cannot be processed on the access UP to the processing UP for processing, wherein the processing UP has a virtual type and an entity type.
Step 203: respectively sending a first configuration message to an access UP and a processing UP;
in the embodiment of the present invention, the first configuration message is used to instruct the access UP and the processing UP to establish a tunnel between the access UP and the processing UP, through which the traffic flow of a user accessed from the access UP can be scheduled to be processed on the processing UP.
In the embodiment of the invention, a virtual CP determines a processing UP corresponding to an access UP according to a first message which is sent by the access UP and used for indicating that a user requests to access a network, and sends a first configuration message to the access UP and the processing UP respectively to indicate the access UP and the processing UP to establish a tunnel between the access UP and the processing UP. Thus, when the resources of the access UP are insufficient, the user traffic is scheduled to the processing UP for processing by establishing the tunnel between the access UP and the processing UP, so that the utilization of the resources is balanced.
In the current transfer control separation virtual BRAS system, when the user's traffic needs to be processed by virtual UP, all the entity UPs needs to be statically configured with corresponding policy so as to send the traffic to the virtual UP. If the service processed by the virtual UP changes, all the entity UPs need to be reconfigured once, resulting in a large configuration and maintenance workload.
In order to solve the above problem, the virtual CP according to the embodiments of the present invention determines the processing UP corresponding to the access UP in different manners according to different types of processing CPs. Specifically, referring to fig. 3, for step 202 in fig. 2, an embodiment of the present invention provides a method for determining a processing UP corresponding to an access UP, which includes the following specific steps:
step 2021: acquiring a service type from the VLAN;
in the embodiment of the present invention, the virtual CP may be determined according to the identifier of the service type in the VLAN, for example: VLAN1 represents a large-session small-flow service, VLAN2 represents a large-flow service, and the embodiment of the present invention does not limit the specific manner in which the virtual CP obtains the service type from the VLAN.
Step 2022: determining the type of the UP according to the service type, and then executing step 2023 or step 2024;
in the embodiment of the present invention, the types of UP include: the embodiment of the invention does not specifically limit the corresponding relationship between the service type and the type of the processing UP.
Step 2023: when the type of the processing UP is a virtual type, selecting a virtual user plane, and determining the virtual user plane as the processing UP;
step 2024: when the type of the processing UP is an entity type and the utilization rate of a first hardware session accessed to the UP is larger than a preset threshold value, selecting an entity UP with the lowest hardware session utilization rate from a plurality of other entity UP except the accessed UP, and determining the entity UP as the processing UP;
in the embodiment of the present invention, the virtual CP stores a preset threshold in advance, for example, 80%, and when the first hardware session rate of accessing UP exceeds the preset threshold, it indicates that the resources on the access are insufficient and the newly accessed service traffic cannot be processed. Therefore, the virtual CP selects an entity UP with the lowest hardware session utilization rate from the plurality of entity UPs except the access UP, determines the entity UP as a processing UP, schedules the newly accessed traffic onto the processing UP for processing, and fully utilizes resources on the UP.
It can be understood that, if the first hardware session rate of the access UP does not exceed the preset threshold value, which indicates that the resources on the access UP are still sufficient, the access UP itself processes the accessed traffic in the existing manner.
It should be noted that, along with the original service traffic processing on the access UP, the hardware session utilization of the access UP may decrease to be lower than the preset threshold, but the service traffic scheduled to process the UP is not called back until the session is completed.
In conjunction with the methods of fig. 2 and fig. 3, when resources on the access UP are insufficient, the virtual CP can automatically determine a corresponding processing UP for the access UP, where the type of the processing UP includes: a virtual type and an entity type; the virtual CP can also automatically configure the tunnel between the access UP and the processing UP, when the type of the processing UP is a virtual type, the service flow can be flexibly scheduled between the access UP and the processing UP through the tunnel, corresponding strategies do not need to be statically configured on all the entity UP, and the workload of configuration and maintenance is reduced.
Referring to fig. 4, an embodiment of the present invention provides another network access method, where an execution subject of the method is a virtual CP, and the method includes the following specific steps:
step 401: receiving a first message sent by an access UP;
step 402: determining a processing UP corresponding to the access UP;
step 403: respectively sending a first configuration message to an access UP and a processing UP;
the descriptions of step 401 to step 403 may refer to the descriptions of step 201 to step 203 in fig. 2, and are not repeated herein.
Step 404: receiving a second hardware session utilization rate of the processing UP sent by the processing UP;
in the embodiment of the present invention, after the UP completes the establishment of the tunnel to be accessed to the UP, the UP reports its own hardware session utilization rate to the virtual CP, and for clarity of description, the foregoing hardware session utilization rate is referred to as a second hardware session utilization rate.
And the processing UP reports the utilization rate of the second hardware session to the virtual CP after the tunnel establishment is finished, so that the virtual UP can acquire the utilization rate of the hardware session on each UP in real time, and the UP with the lowest hardware session utilization rate can be selected as the processing UP when the corresponding processing UP is selected for other access UPs subsequently.
Step 405: receiving a second message sent by the UP processing;
in the embodiment of the present invention, the second message indicates that the user requests to exit the network, and the second message includes a third hardware session utilization rate for processing UP, and the third hardware session utilization rate for processing UP is identified by an extended TAG field.
The embodiment of the invention is based on the RFC2516 protocol to expand the definition of the TAG field, optionally, the expanded TAG field is 0x0109 AC-use, and the expanded TAG is used for identifying the utilization rate of the hardware session.
It should be noted that the TAG in the second message is used to identify the hardware session utilization rate for processing UP, and for clarity of description, the hardware session utilization rate for processing UP is referred to as a third hardware session utilization rate.
Therefore, when each session is completed, the virtual CP can timely acquire the change of the hardware session utilization rate of each UP, and the subsequent determination of new processing UP is facilitated.
Step 406: when detecting that all the sessions in the tunnel are off-line, respectively sending a second configuration message to the access UP and the processing UP;
in the embodiment of the present invention, the virtual CP can directly monitor the offline condition of the session in the tunnel, when detecting that all sessions in the tunnel are offline, it indicates that resources on the access UP are sufficient, and the traffic flow scheduled to the processing UP is completely processed, the virtual CP sends a second configuration message to the access UP and the processing UP respectively, and the second configuration message is used for indicating the access UP and the processing UP to cancel the tunnel between the processing UP and the access UP.
In the embodiment of the invention, when the resources on the access UP are insufficient, the virtual CP can determine the corresponding processing UP for the access UP, establish a tunnel between the access UP and the processing UP and schedule the service flow which can not be processed by the access UP to the processing UP for processing; when the service flow processing is completed and all the sessions in the tunnel are offline, the virtual CP can indicate the access UP and the processing UP to cancel the tunnel, thereby realizing the flexible scheduling of the service flow, fully utilizing the UP resources and reducing the workload of configuration and maintenance.
Referring to fig. 5, an embodiment of the present invention provides a method for network access, where an execution main body of the method is access UP, and the method includes the following specific steps:
step 501: receiving a third message sent by the home gateway RGW;
in this embodiment of the present invention, for different network protocols, the third message may be a different message, for example: for a Point-to-Point Protocol over Ethernet (Point-to-Point Protocol over Ethernet), the third message is a PADI (PPPoE Active Discovery Initiation, PPPoE Discovery phase start packet) message, and the embodiment of the present invention does not specifically limit the type of the third message.
Step 502: generating a first message according to the third message;
in the invention, because the virtual CP needs to know the hardware session utilization rate of the access UP, the message based on the existing network protocol has no identifier corresponding to the hardware session utilization rate. Therefore, the third message is expanded to obtain the first message with the hardware session utilization rate identifier.
Specifically, the third message is extended based on the definition of the TAG field in the RFC2516 protocol, optionally, the extended TAG field is 0x0109AC-Usage, and the extended TAG is used to identify the hardware session utilization rate.
Step 503: sending a first message to a virtual CP, and determining a processing UP corresponding to the access UP by the virtual CP;
in the embodiment of the present invention, the access UP may send the first message to the Virtual CP through a VXLAN (Virtual eXtensible Local area network) channel. The embodiment of the present invention does not specifically limit the manner in which the access UP sends the first message to the virtual CP.
The method for determining the processing UP corresponding to the access UP by the virtual CP may refer to the description of step 2021 to step 2024 in fig. 3, which is not described herein again.
Step 504: receiving a first configuration message sent by a virtual CP;
in the embodiment of the present invention, the first configuration message is used to instruct the access UP and the processing UP to establish a tunnel between the access UP and the processing UP.
Step 505: and establishing a tunnel between the access UP and the processing UP according to the first configuration message.
In the embodiment of the invention, the access UP expands the third message from the RGW to obtain the first message, the first message comprises a TAG field used for identifying the utilization rate of the hardware session, after receiving the first message, the virtual CP determines the corresponding processing UP for the access UP and respectively sends the first configuration message to the access UP and the processing UP, and the access UP establishes a tunnel between the processing UP and the access UP according to the first configuration message, so that the service flow which cannot be processed on the access UP can be scheduled to the processing UP for processing, and the resources on each UP are fully utilized.
Referring to fig. 6, an embodiment of the present invention provides another method for network access, where an execution main body of the method is access UP, and the method includes the following specific steps:
step 601: receiving a third message sent by the home gateway RGW;
step 602: generating a first message according to the third message;
step 603: sending a first message to a virtual CP, and determining a processing UP corresponding to the access UP by the virtual CP;
step 604: receiving a first configuration message sent by a virtual CP;
step 605: according to the first configuration message, establishing a tunnel between the access UP and the processing UP;
the description of step 601 to step 605 may refer to the description of step 501 to step 505 in fig. 5, and will not be repeated herein.
Step 606: receiving a fourth message sent by the RGW;
in this embodiment of the present invention, for different network protocols, the fourth message may be a different message, for example: for a Point-to-Point Protocol over Ethernet (Point-to-Point Protocol over Ethernet), the fourth message is a PADT (PPPoE Active Discovery phase Termination packet) message, and the type of the fourth message is not specifically limited in the embodiments of the present invention.
Step 607: sending the fourth message to the processing UP through the tunnel;
in the embodiment of the invention, because the service flow is scheduled to be processed by the processing UP, the access UP sends the fourth message to the processing UP through the tunnel, and the processing UP sends the fourth message to the virtual CP.
Step 608: receiving a second configuration message sent by the virtual CP;
in the embodiment of the present invention, the second configuration message is used to instruct the access UP and the processing UP to withdraw the tunnel between the access UP and the processing UP.
Step 609: and according to the second configuration message, the tunnel between the access UP and the processing UP is withdrawn.
In the embodiment of the invention, the access UP establishes a tunnel between the access UP and the processing UP according to the first configuration message sent by the virtual CP, so that the service traffic which cannot be processed on the access UP can be scheduled to be processed on the processing UP; and after the service flow is completely processed, revoking the tunnel between the virtual CP and the UP according to a second configuration message sent by the virtual CP. Flexible scheduling of service traffic is realized by accessing the tunnel between the UP and processing the UP, and resources on the UP are fully utilized.
Referring to fig. 7, an embodiment of the present invention provides a method for network access, where an execution main body of the method is to process UP, and the method includes the following specific steps:
step 701: receiving a first configuration message sent by a virtual CP;
in the embodiment of the present invention, the first configuration message is used to instruct the access UP and the processing UP to establish a tunnel between the access UP and the processing UP.
Step 702: according to the first configuration message, establishing a tunnel between the access UP and the processing UP;
in the embodiment of the invention, the processing UP establishes a tunnel with the access UP according to the first configuration message sent by the virtual CP, so that the service traffic which cannot be processed on the access UP can be scheduled to be processed on the processing UP, the flexible scheduling of the service traffic is realized, and the resources on the UP are fully utilized.
Referring to fig. 8, an embodiment of the present invention provides another network access method, where an execution main body of the method is processing UP, and the method includes the following specific steps:
step 801: receiving a first configuration message sent by a virtual CP;
step 802: according to the first configuration message, establishing a tunnel between the access UP and the processing UP;
the above descriptions of step 801 and step 802 may refer to the descriptions of step 701 and step 702 in fig. 7, and are not repeated here.
Step 803: sending the second hardware session utilization rate for processing UP to the virtual CP;
in the embodiment of the present invention, after the UP completes the establishment of the tunnel to be accessed to the UP, the UP reports its own hardware session utilization rate to the virtual CP, and for clarity of description, the foregoing hardware session utilization rate is referred to as a second hardware session utilization rate.
And the processing UP reports the utilization rate of the second hardware session to the virtual CP after the tunnel establishment is finished, so that the virtual UP can acquire the utilization rate of the hardware session on each UP in real time, and the UP with the lowest hardware session utilization rate can be selected as the processing UP when the corresponding processing UP is selected for other access UPs subsequently.
Step 804: receiving a fourth message sent by the access UP through the tunnel;
in this embodiment of the present invention, for different network protocols, the fourth message may be a different message, for example: for a Point-to-Point Protocol over Ethernet (Point-to-Point Protocol over Ethernet), the fourth message is a PADT (PPPoE Active Discovery phase Termination packet) message, and the type of the fourth message is not specifically limited in the embodiments of the present invention.
Step 805: generating a second message according to the fourth message;
in the invention, because the virtual CP needs to know the hardware session utilization rate for processing the UP, the message based on the existing network protocol has no identifier corresponding to the hardware session utilization rate. Therefore, the fourth message is expanded to obtain the second message with the hardware session utilization rate identifier.
Specifically, the fourth message is extended based on the definition of the TAG field in the RFC2516 protocol, optionally, the extended TAG field is 0x0109AC-Usage, and the extended TAG is used to identify the hardware session utilization rate.
Step 806: sending the second message to the virtual CP;
in an embodiment of the present invention, the processing UP may send the second message to the virtual CP through the VXLAN channel. The embodiment of the present invention does not specifically limit the manner of processing the UP to send the second message to the virtual CP.
Step 807: receiving a second configuration message sent by the virtual CP;
in the embodiment of the present invention, the second configuration message is used to instruct the access UP and the processing UP to withdraw the tunnel between the access UP and the processing UP.
Step 808: and according to the second configuration message, the tunnel between the access UP and the processing UP is withdrawn.
In the embodiment of the invention, a processing UP establishes a tunnel with an access UP according to a first configuration message sent by a virtual CP, so that service traffic which cannot be processed on the access UP can be scheduled to be processed on the processing UP; and after the service flow is completely processed, withdrawing the tunnel between the virtual CP and the access UP according to a second configuration message sent by the virtual CP. Flexible scheduling of service traffic is realized by accessing the tunnel between the UP and processing the UP, and resources on the UP are fully utilized.
Referring to fig. 9, an embodiment of the present invention provides another network access method, which includes the following specific steps:
step 901: the RGW sends a third message to the access UP;
step 902: the access generates a first message according to the third message;
step 903: the access UP sends a first message to the virtual CP;
step 904: the virtual CP determines the processing UP corresponding to the access UP;
step 905: the virtual CP sends a first configuration message to the access UP and the processing UP respectively;
step 906: the processing UP sends a second hardware session utilization rate of the processing UP to the virtual CP;
step 907: according to the first configuration message, establishing a tunnel between the access UP and the processing UP;
the foregoing steps 901 to 907 determine a processing UP corresponding to the access UP for the virtual CP, and instruct the access UP and the processing UP to establish a tunnel therebetween.
It can be understood that a path for forwarding a subsequent message is determined by establishing a tunnel, where the path may be RGW-access UP-processing UP-virtual CP, and both a control message and a data message in a session can be forwarded along the path.
Step 908: the RGW sends a fourth message to the access UP;
step 909: the access UP sends the fourth message to the processing UP through the tunnel;
step 910: processing UP to generate a second message according to the fourth message;
step 911: processing UP to send a second message to the virtual CP;
step 912: when the virtual CP detects that all the sessions in the tunnel are off-line, respectively sending a second configuration message to the access UP and the processing UP;
step 913: and according to the second configuration message, the tunnel between the access UP and the processing UP is withdrawn.
The above-described steps 908 to 913 are procedures for the virtual CP to indicate a tunnel between the access UP and the process of handling UP withdrawal.
In the embodiment of the invention, aiming at the condition that the service flow of a new access user cannot be processed due to insufficient resources on the access UP, the virtual CP determines the processing UP corresponding to the access UP, indicates the access UP and the processing UP to establish a tunnel between the access UP and the processing UP, and schedules the service flow which cannot be processed by the access UP to the processing UP for processing; when the virtual CP detects that all the sessions in the tunnel are offline, the tunnel between the access UP and the handling UP is instructed to be withdrawn. The virtual CP is used for controlling in a unified way, so that the automatic establishment or cancellation of the tunnel is realized, the service flow is flexibly scheduled between the access UP and the processing UP, the resources on the UP are fully utilized, and the workload of configuration and maintenance is reduced.
Referring to fig. 10, an embodiment of the present invention provides a virtual CP 1000, including: a first transceiver module 1001 and a first processing module 1002;
the first transceiver module 1001 is configured to receive a first message sent by an access user plane UP, where the first message indicates that a user requests to access a network;
the first processing module 1002 is configured to determine a processing UP corresponding to the access UP;
the first transceiving module 1001 is further configured to send a first configuration message to the access UP and the processing UP, respectively, where the first configuration message is used to instruct the access UP and the processing UP to establish a tunnel between the access UP and the processing UP.
Optionally, the first transceiver module 1001 is further configured to receive a second hardware session utilization rate of the processing UP sent by the processing UP.
Optionally, the first message includes a first hardware session utilization of the access UP, where the first hardware session utilization of the access UP is identified by an extended TAG field.
Optionally, the first transceiver module 1001 is further configured to obtain a service type from a virtual local area network VLAN;
the first processing module 1002 is further configured to determine a type of processing UP according to the service type, where the type includes: a virtual type and an entity type; when the type of the processing UP is a virtual type, selecting a virtual user plane, and determining the virtual user plane as the processing UP; when the type of the processing UP is an entity type and the first hardware session utilization rate of the access UP is larger than a preset threshold value, selecting an entity UP with the lowest hardware session utilization rate from a plurality of other entity UP except the access UP, and determining the entity UP as the processing UP.
Optionally, the first transceiving module 1001 is further configured to send, when detecting that all sessions in the tunnel are offline, a second configuration message to the access UP and the processing UP, respectively, where the second configuration message is used to instruct the access UP and the processing UP to withdraw the tunnel between the processing UP and the access UP.
In the embodiment of the invention, a virtual CP determines a processing UP corresponding to an access UP according to a first message which is sent by the access UP and used for indicating that a user requests to access a network, and sends a first configuration message to the access UP and the processing UP respectively to indicate the access UP and the processing UP to establish a tunnel between the access UP and the processing UP. Thus, when the resources accessed to the UP are insufficient, the user flow is scheduled to the processing UP for processing by establishing the tunnel between the access UP and the processing UP, so that the resources are utilized uniformly; the service flow is flexibly scheduled between the access UP and the processing UP through the tunnel, and the configuration and maintenance workload is reduced.
Referring to fig. 11, an embodiment of the present invention provides an access UP 1100, including: a second transceiver module 1101 and a second processing module 1102;
the second transceiver module 1101 is configured to receive a third message sent by a home gateway RGW;
the second processing module 1102 is configured to generate a first message according to the third message, where the first message indicates that a user requests to access a network;
the second transceiving module 1101 is further configured to send the first message to a virtual CP, where the virtual CP determines a processing UP corresponding to the access UP;
the second transceiver module 1101 is further configured to receive a first configuration message sent by the virtual CP;
the second processing module 1102 is further configured to establish a tunnel between the access UP and the processing UP according to the first configuration message.
Optionally, the second processing module 1102 is further configured to extend a TAG field in the third message to obtain a first message; wherein the TAG field is used to identify a first hardware session utilization of the access UP.
Optionally, the second transceiver module 1101 is further configured to receive a fourth message sent by the RGW, where the fourth message indicates that the user requests to exit the network;
the second transceiving module 1101 is further configured to send the fourth message to the processing UP through the tunnel.
Optionally, the second transceiver module 1101 is further configured to receive a fourth message sent by the RGW, where the fourth message indicates that the user requests to exit the network;
the second transceiver module 1101 is further configured to receive a second configuration message sent by the virtual CP;
the second processing module 1102 is further configured to withdraw the tunnel between the access UP and the processing UP according to the second configuration message.
In the embodiment of the invention, the access UP expands the third message from the RGW to obtain the first message, the first message comprises a TAG field used for identifying the utilization rate of the hardware session, after receiving the first message, the virtual CP determines the corresponding processing UP for the access UP and respectively sends the first configuration message to the access UP and the processing UP, and the access UP establishes a tunnel between the processing UP and the access UP according to the first configuration message, so that the service flow which cannot be processed on the access UP can be scheduled to the processing UP for processing, and the resources on each UP are fully utilized.
Referring to fig. 12, an embodiment of the present invention provides a processing UP 1200, including: a third transceiver module 1201 and a third processing module 1202;
the third transceiver module 1201 is configured to receive a first configuration message sent by a virtual CP;
the third processing module 1202 is configured to establish a tunnel between the access UP and the processing UP according to the first configuration message.
Optionally, the third transceiver module 1201 is further configured to send the second hardware session utilization rate for processing UP to the virtual CP.
Optionally, the third transceiving module 1201 is further configured to receive, through the tunnel, a fourth message sent by the access UP, where the fourth message indicates that a user requests to exit the network;
the third processing module 1202 is further configured to generate a second message according to the fourth message;
the third transceiver module 1201 is further configured to send the second message to the virtual CP.
Optionally, the third processing module 1202 is further configured to extend a TAG field in the fourth message to obtain a second message; wherein the TAG field is to identify a third hardware session utilization of the processing UP.
Optionally, the third transceiver module 1201 is further configured to receive a second configuration message sent by the virtual CP;
the third processing module 1202 is further configured to revoke the tunnel between the access UP and the processing UP according to the second configuration message.
In the embodiment of the invention, the processing UP establishes a tunnel with the access UP according to the first configuration message sent by the virtual CP, so that the service traffic which cannot be processed on the access UP can be scheduled to be processed on the processing UP, the flexible scheduling of the service traffic is realized, and the resources on the UP are fully utilized.
Referring to fig. 13, an embodiment of the present invention provides another network-side device 1300, including: a processor 1301, a transceiver 1302, a memory 1303, a user interface 1304, and a bus interface.
Among other things, processor 1301 may be responsible for managing the bus architecture and general processing. The memory 1303 may store data used by the processor 1301 in performing operations.
In this embodiment of the present invention, the network side device 1300 may further include: a computer program stored on the memory 1303 and executable on the processor 1301, the computer program implementing the steps of the method provided by the embodiments of the present invention when executed by the processor 1301.
In fig. 13, the bus architecture may include any number of interconnected buses and bridges, with one or more processors represented by processor 1301 and various circuits of memory represented by memory 1303 linked together. The bus architecture may also link together various other circuits such as peripherals, voltage regulators, power management circuits, and the like, which are well known in the art, and therefore, will not be described any further in connection with embodiments of the present invention. The bus interface provides an interface. The transceiver 1302 may be a plurality of elements including a transmitter and a receiver that provide a means for communicating with various other apparatus over a transmission medium.
An embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program implements each process of the foregoing method for network access, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here. The computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
While the present invention has been described with reference to the embodiments shown in the drawings, the present invention is not limited to the embodiments, which are illustrative and not restrictive, and it will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (18)

1. A network access method is applied to a virtual Control Plane (CP), and is characterized in that the method comprises the following steps:
receiving a first message sent by an access User Plane (UP), wherein the first message represents that a user requests to access a network; the first message comprises a first hardware session utilization rate of the access UP, wherein the first hardware session utilization rate of the access UP is identified by an extended TAG field;
determining a processing UP corresponding to the access UP;
sending a first configuration message to the access UP and the processing UP respectively, wherein the first configuration message is used for indicating the access UP and the processing UP to establish a tunnel between the access UP and the processing UP.
2. The method of claim 1, wherein the determining a processing UP corresponding to the access UP comprises:
acquiring a service type from a Virtual Local Area Network (VLAN);
determining the type of the UP processing according to the service type, wherein the type comprises the following steps: a virtual type and an entity type;
when the type of the processing UP is a virtual type, selecting a virtual user plane, and determining the virtual user plane as the processing UP;
when the type of the processing UP is an entity type and the first hardware session utilization rate of the access UP is larger than a preset threshold value, selecting an entity UP with the lowest hardware session utilization rate from a plurality of other entity UP except the access UP, and determining the entity UP as the processing UP.
3. The method of claim 1, wherein after the sending the first configuration message to the access UP and the process UP, respectively, the method further comprises:
and receiving a second hardware session utilization rate of the processing UP sent by the processing UP.
4. The method of claim 1, further comprising:
receiving a second message sent by the processing UP, wherein the second message is used for indicating that the user requests to exit the network;
wherein, the second message includes the third hardware session utilization rate of the processing UP, and the third hardware session utilization rate of the processing UP is identified by an extended TAG field.
5. The method of claim 4, wherein after the receiving the second message sent by the processing UP, the method further comprises:
when detecting that all sessions in the tunnel are offline, sending a second configuration message to the access UP and the processing UP respectively, wherein the second configuration message is used for indicating the access UP and the processing UP to withdraw the tunnel between the processing UP and the access UP.
6. A network access method is applied to access UP, and is characterized in that the method comprises the following steps:
receiving a third message sent by the home gateway RGW;
generating a first message according to the third message, wherein the first message represents that a user requests to access the network;
sending the first message to a virtual CP, and determining a processing UP corresponding to the access UP by the virtual CP; the first message comprises a first hardware session utilization rate of the access UP, wherein the first hardware session utilization rate of the access UP is identified by an extended TAG field;
receiving a first configuration message sent by the virtual CP;
and establishing a tunnel between the access UP and the processing UP according to the first configuration message.
7. The method of claim 6, wherein generating the first message based on the third message comprises:
expanding a TAG field in the third message to obtain a first message;
wherein the TAG field is used to identify a first hardware session utilization of the access UP.
8. The method of claim 6, further comprising:
receiving a fourth message sent by the RGW, wherein the fourth message represents that the user requests to exit the network;
and sending the fourth message to the processing UP through the tunnel.
9. The method of claim 8, wherein after the sending the fourth message to the processing UP through the tunnel, the method further comprises:
receiving a second configuration message sent by the virtual CP;
revoking the tunnel between the access UP and the processing UP according to the second configuration message.
10. A method for network access, which is applied to processing UP, is characterized in that the method comprises the following steps:
receiving a first configuration message sent by a virtual CP;
establishing a tunnel between the access UP and the processing UP according to the first configuration message;
and sending the second hardware session utilization rate for processing the UP to the virtual CP.
11. The method of claim 10, further comprising:
receiving a fourth message sent by the access UP through the tunnel, wherein the fourth message represents that a user requests to exit the network;
generating a second message according to the fourth message;
transmitting the second message to the virtual CP.
12. The method of claim 11, wherein generating a second message based on the fourth message comprises:
expanding a TAG field in the fourth message to obtain a second message;
wherein the TAG field is to identify a third hardware session utilization of the processing UP.
13. The method of claim 11, wherein after the sending the second message to the virtual CP, the method further comprises:
receiving a second configuration message sent by the virtual CP;
revoking the tunnel between the access UP and the processing UP according to the second configuration message.
14. A virtual CP, comprising: a first transceiver module and a first processing module, wherein,
the first transceiver module is configured to receive a first message sent by an UP access user plane, where the first message indicates that a user requests to access a network; the first message comprises a first hardware session utilization rate of the access UP, wherein the first hardware session utilization rate of the access UP is identified by an extended TAG field;
the first processing module is configured to determine a processing UP corresponding to the access UP;
the first transceiving module is further configured to send a first configuration message to the access UP and the processing UP, respectively, where the first configuration message is used to instruct the access UP and the processing UP to establish a tunnel between the access UP and the processing UP.
15. An access UP, comprising: a second transceiver module and a second processing module, wherein,
the second transceiver module is configured to receive a third message sent by the home gateway RGW;
the second processing module is configured to generate a first message according to the third message, where the first message indicates that a user requests to access a network; the first message comprises a first hardware session utilization rate of the access UP, wherein the first hardware session utilization rate of the access UP is identified by an extended TAG field;
the second transceiving module is further configured to send the first message to a virtual CP, and the virtual CP determines a processing UP corresponding to the access UP;
the second transceiver module is further configured to receive a first configuration message sent by the virtual CP;
the second processing module is further configured to establish a tunnel between the access UP and the processing UP according to the first configuration message.
16. A process UP, comprising: a third transceiver module and a third processing module, wherein,
the third transceiver module is configured to receive a first configuration message sent by a virtual CP;
the third processing module is configured to establish a tunnel between the access UP and the processing UP according to the first configuration message;
and sending the second hardware session utilization rate for processing the UP to the virtual CP.
17. A network-side device, comprising: processor, memory and program of a method of network access stored on the memory and executable on the processor, which program of the method of network access when executed by the processor implements the steps of the method of network access according to any of claims 1 to 5, or the steps of the method of network access according to any of claims 6 to 9, or the steps of the method of network access according to any of claims 10 to 13.
18. A computer-readable storage medium, characterized in that the computer-readable storage medium has stored thereon a program of a method of network access, which when executed by a processor implements the steps of the method of network access according to any one of claims 1 to 5, or the steps of the method of network access according to any one of claims 6 to 9, or the steps of the method of network access according to any one of claims 10 to 13.
CN201810661047.0A 2018-06-25 2018-06-25 Network access method and equipment Active CN110635986B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810661047.0A CN110635986B (en) 2018-06-25 2018-06-25 Network access method and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810661047.0A CN110635986B (en) 2018-06-25 2018-06-25 Network access method and equipment

Publications (2)

Publication Number Publication Date
CN110635986A CN110635986A (en) 2019-12-31
CN110635986B true CN110635986B (en) 2021-11-16

Family

ID=68967261

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810661047.0A Active CN110635986B (en) 2018-06-25 2018-06-25 Network access method and equipment

Country Status (1)

Country Link
CN (1) CN110635986B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113992475B (en) * 2021-09-23 2023-12-26 新华三信息安全技术有限公司 Tunnel establishment method and device

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101262688A (en) * 2007-03-07 2008-09-10 华为技术有限公司 Method for migrating anchor access network, terminal and wireless communication network
CN101977138A (en) * 2010-07-21 2011-02-16 北京星网锐捷网络技术有限公司 Method, device, system and equipment for establishing tunnel in layer-2 virtual private network
CN102739498A (en) * 2012-07-04 2012-10-17 瑞斯康达科技发展股份有限公司 Transmission method and system for layered virtual private local area network business
CN103051535A (en) * 2012-12-18 2013-04-17 华为技术有限公司 Data access method, data access device and data access system
CN103166909A (en) * 2011-12-08 2013-06-19 上海贝尔股份有限公司 Access method and device and system of virtual network system
CN103259736A (en) * 2013-05-24 2013-08-21 杭州华三通信技术有限公司 Tunnel building method and network equipment
CN107634907A (en) * 2017-10-25 2018-01-26 新华三技术有限公司 A kind of two-layer virtual private network L2VPN data forwarding method and device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101262688A (en) * 2007-03-07 2008-09-10 华为技术有限公司 Method for migrating anchor access network, terminal and wireless communication network
CN101977138A (en) * 2010-07-21 2011-02-16 北京星网锐捷网络技术有限公司 Method, device, system and equipment for establishing tunnel in layer-2 virtual private network
CN103166909A (en) * 2011-12-08 2013-06-19 上海贝尔股份有限公司 Access method and device and system of virtual network system
CN102739498A (en) * 2012-07-04 2012-10-17 瑞斯康达科技发展股份有限公司 Transmission method and system for layered virtual private local area network business
CN103051535A (en) * 2012-12-18 2013-04-17 华为技术有限公司 Data access method, data access device and data access system
CN103259736A (en) * 2013-05-24 2013-08-21 杭州华三通信技术有限公司 Tunnel building method and network equipment
CN107634907A (en) * 2017-10-25 2018-01-26 新华三技术有限公司 A kind of two-layer virtual private network L2VPN data forwarding method and device

Also Published As

Publication number Publication date
CN110635986A (en) 2019-12-31

Similar Documents

Publication Publication Date Title
CN101632266B (en) Parameterized quality of service in a network
CN107040284B (en) Multi-address access method for improving reliability and stability of data transmission
CN109391490B (en) Network slice management method and device
CN107086934B (en) The configuration method and gateway of networking equipment
US20110310907A1 (en) Systems and methods for implementing a control plane in a distributed network
JP2020511083A (en) Service quality control method and device, SMF, UPF, UE, PCF and AN
CN109788041B (en) SDN cloud network integrated system based on UTN network
US11140091B2 (en) Openflow protocol-based resource control method and system, and apparatus
US20170310581A1 (en) Communication Network, Communication Network Management Method, and Management System
CN107113892A (en) A kind of method and device of gateway device automatic network-building
CN113746658A (en) Method, device and system for determining network slice topology
CN111064788B (en) Signal transmission method, robot, and computer-readable storage medium
WO2019029256A1 (en) Service management method and device and storage medium
CN113840330B (en) Connection establishment method, gateway equipment, network system and dispatching center
CN113824576A (en) Slice data transmission method and device, electronic equipment and readable medium
CN110635986B (en) Network access method and equipment
CN113220459B (en) Task processing method and device
CN105049367A (en) Traffic distribution method of aggregated link and access device
CN107995125B (en) Traffic scheduling method and device
CN112671914B (en) IOT (Internet of things) equipment communication method and system based on actor model
CN114143903A (en) Method, device, equipment and medium for configuring network slice PDU session
CN101494587A (en) Method for processing packet network tunnel and communication system as well as relevant equipment
CN114900901B (en) Service processing method and device, equipment and computer readable storage medium
CN114531393B (en) Method, device, equipment and medium for issuing segment routing strategy
CN110636146A (en) User address allocation method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant