CN113923114B - VLAN configuration method and related equipment - Google Patents

VLAN configuration method and related equipment Download PDF

Info

Publication number
CN113923114B
CN113923114B CN202010648492.0A CN202010648492A CN113923114B CN 113923114 B CN113923114 B CN 113923114B CN 202010648492 A CN202010648492 A CN 202010648492A CN 113923114 B CN113923114 B CN 113923114B
Authority
CN
China
Prior art keywords
vlan
address
preset
addresses
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010648492.0A
Other languages
Chinese (zh)
Other versions
CN113923114A (en
Inventor
崔立伟
王丁
段文杰
惠少博
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Honor Device Co Ltd
Original Assignee
Honor Device Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Honor Device Co Ltd filed Critical Honor Device Co Ltd
Priority to CN202010648492.0A priority Critical patent/CN113923114B/en
Publication of CN113923114A publication Critical patent/CN113923114A/en
Application granted granted Critical
Publication of CN113923114B publication Critical patent/CN113923114B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Small-Scale Networks (AREA)

Abstract

The embodiment of the application discloses a VLAN configuration method and related equipment, which can be particularly applied to the field of virtual local area network division and the like. The VLAN configuration method can be applied to a network device which comprises N ports. The method comprises the following steps: acquiring URSP rules, wherein target URSP rules comprise preset VLAN configuration information, and the VLAN configuration information comprises one or more VLAN IDs and one or more preset addresses; acquiring a target message sent by first equipment, and determining a first preset address carried by the target message; the first equipment is connected with a first port, and the first port is one of the N ports; and determining a first VLAN ID corresponding to the first preset address according to the VLAN configuration information, and setting the VLAN ID of the first port as the first VLAN ID. Therefore, the efficiency and the convenience for dividing the virtual local area network can be greatly improved, and the actual requirements of users are met.

Description

VLAN configuration method and related equipment
Technical Field
The present application relates to the field of virtual local area networks, and in particular, to a VLAN configuration method and related devices.
Background
For a Local Area Network (LAN), if there is only one broadcast domain, the overall transmission performance of the Network may be affected. In order to control the range of the broadcast message, the devices in the Local Area Network may be logically divided into several subnets (or called Virtual Local Area Networks (VLANs)), and the broadcast can only be transmitted in the subnets, so that the broadcast storm can be effectively prevented from being generated. Generally, the VLAN division can be accomplished by configuring different ports of a switch with different VLAN identification numbers VLAN IDs, for example, if a switch has four ports, which are respectively ports 1, 2, 3, and 4, and are respectively connected to devices 1, 2, 3, and 4, the VLAN IDs of port 1 and port 2 can be set to VLAN1, and the VLAN IDs of port 3 and port 4 can be set to VLAN2, so as to complete the division of the VLAN, such that device 1 and device 2 belong to VLAN1, and device 3 and device 4 belong to VLAN2 in the above 4 devices.
However, in the prior art, the switch is mostly configured manually through a User Interface (UI) for VLAN classification, for example, the VLAN IDs of 4 ports of the switch are set manually as VLAN1, VLAN2 and VLAN2, respectively. Therefore, in a case where the number of devices to be configured is large, for example, in an industrial scenario, the data of a switch or a Customer Premises Equipment (CPE) is hundreds, thousands or more, and it becomes very difficult to manually configure and manage the VLAN.
Therefore, how to implement fast and efficient VLAN configuration is an urgent problem to be solved.
Disclosure of Invention
The embodiment of the application provides a VLAN configuration method and related equipment, which can greatly improve the efficiency and convenience when the virtual local area network is divided, meet the actual requirements of users and effectively maintain the network performance and the network security.
In a first aspect, an embodiment of the present application provides a VLAN configuration method, which is applied to a network device, where the network device includes N ports, where N is an integer greater than or equal to 1; the method comprises the following steps: acquiring a target user equipment routing strategy (URSP) rule, wherein the target URSP rule comprises preset Virtual Local Area Network (VLAN) configuration information, and the VLAN configuration information comprises one or more VLAN identification numbers (VLAN ID) and one or more preset addresses; acquiring a target message sent by first equipment, and determining a first preset address carried by the target message; the first device is connected with a first port, and the first port is one of the N ports; the first preset address is one of the one or more preset addresses; and determining a first VLAN ID corresponding to the first preset address according to the VLAN configuration information, and setting the VLAN ID of the first port as the first VLAN ID.
With the method provided in the first aspect, the network device may obtain preset VLAN configuration information, and obtain, according to an address carried in a received message sent by a device connected to any port in the network device, a VLAN ID (for example, VLAN 1) corresponding to the address carried in the message by querying in the preset VLAN configuration information, and then the network device may set the VLAN ID of the port to the VLAN1. Therefore, the network device can determine and set the VLAN IDs of the ports according to the preset VLAN configuration information and the addresses carried by the messages sent by the devices respectively connected with the ports of the network device, and the division of the VLAN is completed quickly and accurately. Therefore, compared with the prior art that a user needs to set the VLAN IDs of the ports in the network device (e.g., a wireless router, etc.) one by one through a user interface to complete VLAN partition, thereby consuming a lot of labor, time, and energy, the embodiment of the present application may determine the VLAN ID corresponding to the address in the preset VLAN configuration information according to the address carried by the received message, and may set the VLAN ID of the port corresponding to the message, that is, may automatically complete setting the VLAN ID of the port. Thus, for example, under the condition that the number of network devices requiring VLAN configuration is huge, for example, under the condition that each port in hundreds of thousands of network devices needs to set the VLAN ID thereof, according to the embodiment of the present application, a manager may first preset one or more pieces of VLAN configuration information according to actual requirements, and then send the VLAN configuration information to the corresponding one or more network devices, so that the network devices may automatically complete VLAN configuration according to the preset VLAN configuration information, that is, automatically set the VLAN ID of each port thereof. Obviously, compared with the prior art, the embodiment of the application improves the efficiency of VLAN configuration to a great extent, provides convenience for users, and meanwhile, the efficient and accurate division of the VLAN effectively prevents the generation of broadcast storms and maintains the overall performance and network security of the network.
In one possible implementation, the one or more preset addresses include one or more media access control MAC addresses; the one or more VLAN IDs correspond to the one or more MAC addresses one to one; the acquiring a target message sent by a first device and determining a first preset address of the target message includes: acquiring the target message sent by the first equipment, and if the target message is a first type of message, determining that a destination terminal MAC address carried by the target message is a first MAC address; the first type of message is a unicast message of an MAC layer and carries a corresponding destination MAC address; the first MAC address is one of the one or more MAC addresses.
In the embodiment of the present application, the VLAN configuration information may include one or more VLAN IDs and one or more MAC addresses corresponding to the VLAN IDs one to one. If the packet received by the network device is se:Sub>A unicast packet of the MAC layer (in general, the unicast packet of the MAC layer carries se:Sub>A corresponding destination MAC address), the network device may query, according to se:Sub>A destination MAC address carried by se:Sub>A packet received by any port of the network device (for example, if the device 1 connected to the port 1 of the network device wants to send the packet to the device 2, the MAC address of the device 2 is the destination MAC address carried by the packet), se:Sub>A VLAN ID (for example, VLAN 1) corresponding to the destination MAC address (for example, MAC-se:Sub>A) in the preset VLAN configuration information, and set the VLAN ID of the port as VLAN1. Therefore, the VLAN ID setting of each port can be automatically, quickly and accurately finished according to the MAC address of the destination end carried by the message and the preset VLAN configuration information, the VLAN configuration efficiency is greatly improved, meanwhile, the broadcast storm is effectively prevented by efficient and accurate division of the VLAN, and the overall performance and the network safety of the network are maintained.
In one possible implementation, the one or more preset addresses further include one or more network protocol IP addresses; the one or more VLAN IDs correspond to the one or more IP addresses one to one; the acquiring a target message sent by a first device, and determining a first preset address carried by the target message, further includes: acquiring the target message sent by the first device, and if the target message is a second type of message, determining that a destination IP address carried by the target message is the first IP address; the second type of message is a broadcast message of an MAC layer and carries a corresponding destination IP address; the first IP address is one of the one or more IP addresses.
In this embodiment, the VLAN configuration information may further include one or more IP addresses in one-to-one correspondence with the one or more VLAN IDs. If the packet received by the network device is a broadcast packet of the MAC layer (in general, the broadcast packet of the MAC layer does not carry a destination-end MAC address but still carries a corresponding destination-end IP address), the network device may query the preset VLAN configuration information to obtain a VLAN ID (for example, VLAN 1) corresponding to the destination-end IP address (for example, IP-a) according to the destination-end IP address carried by the packet received by any port of the network device (for example, the device 1 connected to the port 1 of the network device wants to send the packet to the device 2, the IP address of the device 2 is the destination-end IP address carried by the packet), and set the VLAN ID of the port to VLAN1. Therefore, the VLAN ID setting of each port can be automatically, quickly and accurately finished according to the destination end IP address carried by the message and the preset VLAN configuration information, the VLAN configuration efficiency is greatly improved, meanwhile, the broadcast storm is effectively prevented by efficient and accurate division of the VLAN, and the overall performance and the network safety of the network are maintained.
In a possible implementation manner, the one or more preset addresses are one or more IP addresses; the acquiring a target message sent by a first device and determining a first preset address carried by the target message includes: acquiring the target message sent by the first equipment, and determining a first IP address carried by the target message; the first IP address is one of the one or more IP addresses.
In this embodiment, each of the one or more preset addresses may be an IP address, that is, the VLAN configuration information may include one or more VLAN IDs and one or more IP addresses corresponding to the VLAN IDs one to one. Then, the network device may query, according to a destination end IP address carried by a message received by any port of the network device (for example, if the device 1 connected to the port 1 of the network device wants to send the message to the device 2, the IP address of the device 2 is the destination end IP address carried by the message, and in general, one message has a destination end IP address corresponding to the message), a VLAN ID (for example, VLAN 1) corresponding to the destination end IP address (for example, IP-a) in the preset VLAN configuration information, and set the VLAN ID of the port to VLAN1. Therefore, the VLAN ID setting of each port can be automatically, quickly and accurately finished according to the target end IP address carried by the message and the preset VLAN configuration information, the VLAN configuration efficiency is greatly improved, meanwhile, the broadcast storm is effectively prevented by efficient and accurate division of the VLAN, and the overall performance and the network safety of the network are maintained.
In a possible implementation manner, the VLAN configuration information further includes one or more data network names DNN, and the one or more DNNs are in one-to-one correspondence with the one or more VLAN IDs and the one or more preset addresses; the method further comprises the following steps: adding a VLAN label to the target message, wherein the VLAN label comprises the first VLAN ID; determining a first DNN corresponding to the first VLAN ID according to the VLAN configuration information; and sending the target message to the first preset address through the radio bearer identified as the first DNN.
In this embodiment, the preset VLAN configuration information may further include one or more DNNs in one-to-one correspondence with the one or more VLAN IDs and the one or more preset addresses. The network device may determine and set a VLAN ID of a port corresponding to the received packet according to an address carried by the packet, and add a corresponding VLAN tag to the packet, where the VLAN tag may include the determined VLAN ID (e.g., VLAN 1). Thus, when sending the message, the network device may determine, according to the VLAN configuration information, a DNN (for example, DNN 1) corresponding to the VLAN1, and send the message to an address carried in the message through a radio bearer identified as the DNN 1. Therefore, the corresponding VLAN label is added to the message according to the preset VLAN configuration information, and the message is sent through the corresponding wireless bearer. The message is transmitted in the corresponding VLAN, and the overall performance and the safety of the network are effectively improved.
In a second aspect, an embodiment of the present application provides a VLAN configuration method, which is applied to a network device, where the network device includes N ports, where N is an integer greater than or equal to 1; the method comprises the following steps: acquiring a target user equipment routing strategy (URSP) rule, wherein the target URSP rule comprises preset Virtual Local Area Network (VLAN) configuration information; the VLAN configuration information comprises a target virtual local area network identification number VLAN ID; and setting the VLAN ID of each of the N ports as the target VLAN ID according to the VLAN configuration information.
With the method provided by the second aspect, the network device may obtain preset VLAN configuration information, where the VLAN configuration information may include, for example, a preset VLAN ID (for example, VLAN 1), and then the network device may set, according to the VLAN configuration information, respective VLAN IDs of one or more ports in the network device to the VLAN1, respectively. Therefore, the network equipment can efficiently and accurately determine and set the VLAN IDs of the ports of the network equipment according to the preset VLAN configuration information, so that the division of the VLANs can be completed quickly and accurately. Therefore, compared with the scheme that in the prior art, a user needs to set the VLAN IDs of the ports in the network device (for example, a wireless router or the like) one by one through a user interface to complete VLAN division, thereby consuming a lot of labor, time and energy, in the embodiment of the present application, the VLAN IDs of one or more ports in the network device may be determined and set according to the received preset VLAN configuration information, that is, the VLAN IDs of the ports are automatically set. Thus, for example, under the condition that the number of network devices that need to perform VLAN configuration is huge, for example, under the condition that each port in hundreds of network devices needs to set its VLAN ID, according to the embodiment of the present application, a manager may first preset one or more pieces of VLAN configuration information according to actual requirements, and then send the VLAN configuration information to corresponding one or more network devices, so that the network device may automatically complete VLAN configuration according to the preset VLAN configuration information, that is, automatically set the VLAN ID of each port. Obviously, compared with the prior art, the embodiment of the application improves the efficiency of VLAN configuration to a great extent, provides convenience for users, saves a great deal of time and energy, meanwhile, effectively prevents the broadcast storm by efficient and accurate division of the VLAN, and maintains the overall performance and network security of the network.
In one possible implementation, the VLAN configuration information further includes a target data network name DNN, where the target DNN corresponds to the target VLAN ID; the method further comprises the following steps: acquiring a target message sent by first equipment, and adding a VLAN (virtual local area network) tag to the target message, wherein the VLAN tag comprises a target VLAN ID (identity); the first device is connected with one of the N ports; and sending the target message through the wireless bearer identified as the target DNN according to the VLAN configuration information.
In this embodiment, the preset VLAN configuration information may further include a preset DNN. The network device may add a corresponding VLAN tag to a packet received by any port according to the preset VLAN ID, where the VLAN tag may include the preset VLAN ID (e.g., VLAN 1). And when sending the message, the network device may perform, according to the preset DNN (for example, DNN 1), the message through the radio bearer identified as the DNN1 (for example, sending the message to the destination IP address or destination MAC address carried by the message, or the like). Therefore, the VLAN tag is added to the message according to the preset VLAN configuration information, and the message is sent through the corresponding wireless bearer. The message is transmitted in the corresponding VLAN, and the overall performance and the safety of the network are effectively improved.
In a third aspect, an embodiment of the present application provides a VLAN configuration apparatus, which is applied to a network device, where the network device includes N ports, where N is an integer greater than or equal to 1; the device comprises:
a first obtaining unit, configured to obtain a target user equipment routing policy URSP rule, where the target URSP rule includes preset virtual local area network VLAN configuration information, and the VLAN configuration information includes one or more virtual local area network identification numbers VLAN ID and one or more preset addresses;
the second obtaining unit is used for obtaining a target message sent by the first equipment and determining a first preset address carried by the target message; the first device is connected with a first port, and the first port is one of the N ports; the first preset address is one of the one or more preset addresses;
a first determining unit, configured to determine, according to the VLAN configuration information, a first VLAN ID corresponding to the first preset address, and set the VLAN ID of the first port as the first VLAN ID.
In one possible implementation, the one or more preset addresses include one or more media access control MAC addresses; the one or more VLAN IDs are in one-to-one correspondence with the one or more MAC addresses; the second obtaining unit is specifically configured to:
acquiring the target message sent by the first equipment, and if the target message is a first type of message, determining that a destination terminal MAC address carried by the target message is a first MAC address; the first type of message is a unicast message of an MAC layer and carries a corresponding destination MAC address; the first MAC address is one of the one or more MAC addresses.
In one possible implementation, the one or more preset addresses further include one or more network protocol IP addresses; the one or more VLAN IDs are in one-to-one correspondence with the one or more IP addresses; the second obtaining unit is further specifically configured to:
acquiring the target message sent by the first device, and if the target message is a second type of message, determining that a destination IP address carried by the target message is the first IP address; the second type of message is a broadcast message of an MAC layer and carries a corresponding destination IP address; the first IP address is one of the one or more IP addresses.
In a possible implementation manner, the one or more preset addresses are one or more IP addresses; the second obtaining unit is specifically configured to:
acquiring the target message sent by the first equipment, and determining a first IP address carried by the target message; the first IP address is one of the one or more IP addresses.
In a possible implementation manner, the VLAN configuration information further includes one or more data network names DNN, and the one or more DNNs are in one-to-one correspondence with the one or more VLAN IDs and the one or more preset addresses; the device further comprises:
an adding unit, configured to add a VLAN tag to the target packet, where the VLAN tag includes the first VLAN ID;
a second determining unit, configured to determine, according to the VLAN configuration information, a first DNN corresponding to the first VLAN ID;
and the sending unit is used for sending the target message to the first preset address through the radio bearer identified as the first DNN.
In a fourth aspect, an embodiment of the present application provides a VLAN configuration apparatus, which is applied to a network device, where the network device includes N ports, where N is an integer greater than or equal to 1; the device comprises:
a first obtaining unit, configured to obtain a target user equipment routing policy URSP rule, where the target URSP rule includes preset virtual local area network VLAN configuration information; the VLAN configuration information comprises a target virtual local area network identification number VLAN ID;
and the setting unit is used for setting the VLAN ID of each of the N ports as the target VLAN ID according to the VLAN configuration information.
In one possible implementation, the VLAN configuration information further includes a target data network name DNN, where the target DNN corresponds to the target VLAN ID; the device further comprises:
a second obtaining unit, configured to obtain a target packet sent by a first device, and add a VLAN tag to the target packet, where the VLAN tag includes the target VLAN ID; the first device is connected with one of the N ports;
and the sending unit is used for sending the target message through the wireless bearer identified as the target DNN according to the VLAN configuration information.
In a fifth aspect, an embodiment of the present application provides a network device, where the network device includes a processor, and the processor is configured to support the network device to implement a corresponding function in the VLAN configuration method provided in the first aspect. The network device may also include a memory, coupled to the processor, that stores program instructions and data necessary for the network device. The network device may also include a communication interface for the network device to communicate with other devices or a communication network.
In a sixth aspect, an embodiment of the present application provides a network device, where the network device includes a processor, and the processor is configured to support the network device to implement a corresponding function in the VLAN configuration method provided in the second aspect. The network device may also include a memory, coupled to the processor, that stores program instructions and data necessary for the network device. The network device may also include a communication interface for the network device to communicate with other devices or a communication network.
In a seventh aspect, an embodiment of the present application provides a computer-readable storage medium, where a computer program is stored, and when the computer program is executed by a processor, the flow of the VLAN configuration method in any one of the above first aspects is implemented.
In an eighth aspect, an embodiment of the present application provides a computer-readable storage medium, where the computer-readable storage medium stores a computer program, and the computer program, when executed by a processor, implements the flow of the VLAN configuration method in any one of the second aspects.
In a ninth aspect, an embodiment of the present application provides a computer program, where the computer program includes instructions, and when the computer program is executed by a computer, the computer may execute the flow of the VLAN configuration method in any one of the above first aspects.
In a tenth aspect, an embodiment of the present application provides a computer program, where the computer program includes instructions, and when the computer program is executed by a computer, the computer may execute the flow of the VLAN configuration method in any one of the second aspects.
In an eleventh aspect, an embodiment of the present application provides a chip system, where the chip system includes the VLAN configuration apparatus in any one of the third aspects, and is configured to implement the function related to the flow of the VLAN configuration method in any one of the first aspects. In one possible design, the system-on-chip further includes a memory for storing program instructions and data necessary for the VLAN configuration method. The chip system may be constituted by a chip, or may include a chip and other discrete devices.
In a twelfth aspect, an embodiment of the present application provides a chip system, where the chip system includes the VLAN configuration apparatus according to any one of the above fourth aspects, and is configured to implement the functions related to the flow of the VLAN configuration method according to any one of the above second aspects. In one possible design, the system-on-chip further includes a memory for storing program instructions and data necessary for the VLAN configuration method. The chip system may be constituted by a chip, or may include a chip and other discrete devices.
Drawings
In order to more clearly describe the technical solutions in the embodiments of the present application, the drawings used in the embodiments of the present application or in the background art will be described below.
Fig. 1 is a schematic diagram of a local area network in the prior art.
Fig. 2 is a schematic diagram of a system architecture for partitioning a vlan in the prior art.
Fig. 3 is a schematic diagram of a networking method in the prior art.
Fig. 4 is a schematic system architecture diagram of a VLAN configuration method according to an embodiment of the present application.
Fig. 5 is a functional block diagram of a network device according to an embodiment of the present application.
Fig. 6 is a schematic application scenario diagram of a VLAN configuration method according to an embodiment of the present application.
Fig. 7 is a schematic application scenario diagram of another VLAN configuration method according to an embodiment of the present application.
Fig. 8 is a schematic flowchart of a VLAN configuration method according to an embodiment of the present application.
Fig. 9a to fig. 9d are schematic diagrams illustrating overall steps of a set of VLAN configuration methods according to an embodiment of the present application.
Fig. 10 is a networking schematic diagram of a VLAN configuration method according to an embodiment of the present application.
Fig. 11 is a schematic flowchart of another VLAN configuration method according to an embodiment of the present application.
Fig. 12 is a schematic overall step diagram of a VLAN configuration method according to an embodiment of the present application.
Fig. 13 is a schematic networking diagram of another VLAN configuration method according to an embodiment of the present application.
Fig. 14 is a schematic structural diagram of a VLAN configuration apparatus according to an embodiment of the present application.
Fig. 15 is a schematic structural diagram of another VLAN configuration apparatus according to an embodiment of the present application.
Fig. 16 is a schematic structural diagram of a network device according to an embodiment of the present application.
Fig. 17 is a schematic structural diagram of another network device according to an embodiment of the present application.
Detailed Description
The embodiments of the present application will be described below with reference to the drawings.
The terms "first," "second," "third," and "fourth," etc. in the description and claims of this application and in the accompanying drawings are used for distinguishing between different objects and not for describing a particular order. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the application. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
As used in this specification, the terms "component," "module," "system," and the like are intended to refer to a computer-related entity, either hardware, firmware, a combination of hardware and software, or software in execution. For example, a component may be, but is not limited to being, a process running on a processor, an object, an executable, a thread of execution, a program, and/or a computer. By way of illustration, both an application running on a terminal device and the terminal device can be a component. One or more components can reside within a process and/or thread of execution and a component can be localized on one computer and/or distributed between 2 or more computers. In addition, these components can execute from various computer readable media having various data structures stored thereon. The components may communicate by way of local and/or remote processes such as in accordance with a signal having one or more data packets (e.g., data from two components interacting with one another at a local system, distributed system, and/or across a network such as the internet with other systems by way of the signal).
First, some terms in the present application are explained so as to be easily understood by those skilled in the art.
(1) A Local Area Network (LAN) is a computer communication Network formed by connecting various computers, external devices, databases, etc. to each other in a Local geographical Area (such as a school, a factory, and an organization), and is abbreviated as LAN. It can be connected with remote local area network, data base or processing centre by means of data communication network or special-purpose data circuit to form a large-range information processing system. A LAN referred to as a Virtual Local Area Network (VLAN) refers specifically to a Network (i.e., a broadcast domain) that uses router partitioning. In short, the communication between users in the same VLAN is the same as that in a local area network, and the broadcast in the same VLAN can be heard only by members in the VLAN and is not transmitted to other VLANs, thereby controlling the generation of unnecessary broadcast storms. Meanwhile, if no route exists, different VLANs cannot communicate with each other, and therefore information security among different working groups is improved. A network administrator can comprehensively manage information exchange among different workgroups within the network by configuring routing between VLANs. Compared with the traditional local area network technology, the VLAN technology is more flexible, and has the following advantages: reduced administrative overhead for movement, addition, and modification of network devices; broadcast activity may be controlled; the security of the network can be improved.
(2) A User Equipment Routing Selection Policy (URSP), which defines a configuration and management Policy of a service level in a key way, and provides a flexible configuration and management means for functions such as network slice, service, and session continuity defined by a fifth generation mobile communication technology (5 g) core network. By this policy, the network side can specify which Data packets of the terminal pass through which radio bearer (i.e., which Session Protocol Data Unit (SPDU) to send). Reference may be made in detail to the 23503 protocol of the third Generation Partnership project (3 rd Generation Partnership project,3 gpp). The message structure of the URSP is shown in table 1 below (refer to protocol 24526 of 3GPP protocol in detail):
TABLE 1
Figure BDA0002574021070000081
As shown in Table 1, for example, if the Traffic descriptor contains MAC-A and VID-A, the Route selection descriptor contents contains DNN-A. It indicates that datse:Sub>A packets sent to MAC-se:Sub>A with se:Sub>A Virtual Local arese:Sub>A Network Identity (VLAN ID) equal to VID-se:Sub>A are to be sent over the radio bearer identified as DNN-se:Sub>A.
Alternatively, the detailed Traffic descriptor may be illustrated as the following table 2:
TABLE 2
Figure BDA0002574021070000091
As shown in table 2, for example, se:Sub>A datse:Sub>A packet sent to MAC-se:Sub>A with se:Sub>A VLAN identification number (VID) equal to VID1 would leave se:Sub>A radio bearer identified as DNN 1.
(3) The problem of Bearer, i.e. Bearer loading, radio Bearer (RB) selection is actually the problem of which Radio data service to select as the data path. When there is a message to be transmitted between a network and a User Equipment (UE), a radio bearer needs to be established first. The Radio bearer is a concept between a Radio Link Control (RLC) layer and a Radio Resource Control (RRC) layer, and the RLC provides a Service to an upper layer (RRC layer or a user plane higher layer) through a Service Access Point (SAP).
For a LAN, if there is only one broadcast domain, the overall transmission performance of the network is often affected. Referring to fig. 1, fig. 1 is a schematic diagram of a local area network in the prior art. As shown in fig. 1, a plurality of switches and a plurality of computers may be included in the local area network, and may include, for example, switches 1, 2, 3, 4, and 5 and computers a, B, C, D, E, F, and G, and so on. As shown in fig. 1, when the VLAN is not partitioned, all computers can receive a broadcast message sent by any one computer, so that broadcast data flooding networks cannot be processed in time, and a large amount of network bandwidth is occupied, so that normal services cannot run, even complete paralysis occurs, and a broadcast storm occurs. Wherein a data frame or packet is broadcast to each node on the local network segment (defined by the broadcast domain). Due to the design and connection problems of network topology or other reasons, the broadcast is largely copied in a network segment, data frames are spread, the network performance is reduced, and even the broadcast storm is the case of network paralysis.
In order to control the scope of the broadcast message, a plurality of computers in the LAN may be logically divided into a plurality of VLANs, and the broadcast message may be transmitted only in the VLANs. For example, as shown in fig. 1, the computers described above may be divided into two VLANs, where computers a, B, E, and F may belong to VLAN1, while the remaining computers may belong to VLAN2. Obviously, after VLAN partition, only computers B, E and F in VLAN1 can receive the broadcast message sent by computer a, but other computers (e.g. computers C and G, etc.) belonging to VLAN2 cannot receive the broadcast message. However, in the prior art, the VLAN is mostly divided by manually configuring the switch with the port type and VLAN ID. For example, referring to fig. 2, fig. 2 is a schematic diagram of a system architecture for partitioning a virtual local area network in the prior art. As shown in fig. 2, the switch 1 is connected to a plurality of computers, which are respectively computers a, B, C, and D, and if it is necessary to divide them into two VLANs so that the computers a and B belong to VLAN1 and the computers C and D belong to VLAN2, it is necessary to manually set the VLAN IDs of the four ports of the switch 1 to be respectively VLAN1, VLAN2, and VLAN2. Therefore, the transmission range of the broadcast message can be effectively controlled through the division of the VLAN, the broadcast storm is prevented, and the network performance and the normal operation of the service are ensured.
Furthermore, the 5G CPE also supports multiple ports (otherwise referred to as network ports) and has VLAN partitioning capability. However, in the same way, VLANs corresponding to different ports in the CPE can only be configured manually on a User Interface (UI). The CPE is a customer premises equipment, and is actually a mobile signal access device that receives a mobile signal and forwards the mobile signal as a wireless WIFI signal, and is also a device (for example, a wireless router) that converts a high-speed 4G or 5G signal into a WIFI signal, and the number of mobile terminals capable of accessing the internet at the same time is also large. Among them, the 5G LAN is a technology in which 3GPP establishes a local area network by wireless connection under 5G. In 4G, the message transmitted by the air interface is an IP message, and in 5G, the message transmitted by the air interface may be an ethernet message of layer two. After supporting 5G LAN, devices of different regions can be grouped into local area networks.
As described above, after the 5G LAN feature is supported, a local area network across areas can be implemented, and in order to prevent broadcast storm, the VLAN feature also needs to be supported, that is, VLAN division needs to be performed. Referring to fig. 3, fig. 3 is a schematic diagram illustrating a networking method in the prior art. As shown in fig. 3, a typical networking approach may include monitoring cameras 1, 2, 3, 4, and 5, devices under test 1 and 2, CPE1, CPE2, and CPE3, and video server and test server, among others. The devices 1 and 2 to be tested may be, for example, a base station or a terminal device such as a smart phone. Wherein, surveillance cameras 1, 2, 3 are connected with CPE1, and surveillance cameras 4 and 5 are connected with CPE 2. As shown in fig. 3, if image data captured by the monitoring camera is to be sent to the video server, the monitoring camera and the video server belong to VLAN1; the test data of the device under test is sent to the test server, and the device under test and the test server belong to VLAN2. Thus, the VLAN configuration needs to be performed on the CPE1, so that the monitoring cameras 1, 2, and 3 belong to the VLAN1, and the VLAN configuration needs to be performed on the CPE2, so that the monitoring cameras 4 and 5 belong to the VLAN1, and at the same time, the VLAN configuration needs to be performed on the CPE3, so that the devices to be tested 1 and 2 belong to the VLAN2, and so on.
As described above, it is obvious that in the networking process, that is, in the process of dividing the VLAN, a user often needs to perform VLAN configuration on each CPE and manually set the VLAN ID of each port (or referred to as a portal), however, in an industrial scene, the number of CPEs is hundreds or thousands or more, and at this time, manually configuring the VLAN and managing the VLAN become extremely difficult, which causes a great burden to the user, and even causes misoperation due to manual configuration. Therefore, in order to solve the problem that the actual service requirement is not met in the current VLAN configuration technology, the technical problem to be actually solved by the present application includes the following aspects: based on the existing network equipment (such as the CPE or the switch), the VLAN configuration is implemented quickly and efficiently, thereby facilitating VLAN configuration, effectively preventing broadcast storm, and ensuring network performance and network security.
Referring to fig. 4, fig. 4 is a schematic diagram of a system architecture of a VLAN configuration method according to an embodiment of the present application, and the technical solution of the embodiment of the present application may be implemented in the system architecture shown in fig. 4 by way of example or a similar system architecture. As shown in fig. 4, the system architecture may include an Access Management Function (AMF) device 100a, a plurality of network side servers, a plurality of network devices, and a plurality of terminal devices. As shown in fig. 4, the network device specifically includes network devices 200a and 200b, terminal devices 300a, 300b, 300c, 300d, 300e, 300f, 300g, and 300h, and network-side devices 400a and 400b. Wherein the AMF device 100a and the network devices 200a and 200b may be connected by wireless. As shown in fig. 4, the network device 200a may be connected to the terminal devices 300a, 300b, 300c, and 300d, and the network device 200b may be connected to the terminal devices 300e, 300f, 300g, and 300 h. Specifically, each of the network devices 200a and 200b may include a plurality of ports, and the terminal devices 300a, 300b, 300c, 300d, 300e, 300f, 300g, and 300h may be connected to different ports through data lines. The network-side devices 400a and 400b are configured to process related services, for example, the network-side device 400a may be a test server, and may receive test data sent by the terminal device 300a through the network device 200a, and perform corresponding processing and analysis on the test data, and so on. Optionally, a plurality of network-side servers may be connected to each of the network devices 200a and 200b, which is not specifically limited in this embodiment. The AMF device 100a is configured to control and manage the network devices 200a and 200b, for example, in this application, the AMF device 100a may issue a URSP rule to configure VLAN for the network devices 200a and 200b (such as the CPE described above), and so on. The VLAN configuration method provided in the present application will be described in detail below by taking the network device 200a as an example.
The network device 200a may receive the URSP rule sent by the AMF device 100a, where the URSP rule may include preset VLAN configuration information. Alternatively, the VLAN configuration information may include a preset target VLAN ID, for example, VLAN1, and the network device 200a may set the VLAN IDs of the ports to VLAN1 according to the VLAN configuration information. Thus, the automatic setting of the VLAN ID of each port is completed, and obviously, the URSP may be sent to a plurality of network devices by the AMF device 100a, thereby completing the automatic setting of the VLAN ID of each port of the plurality of network devices, and greatly improving the efficiency of setting the port VLAN ID.
Optionally, the VLAN configuration information may include one or more VLAN IDs and one or more preset addresses. Each of the one or more preset addresses may be an Internet Protocol (IP) address, and the one or more VLAN IDs may correspond to the one or more IP addresses one to one. The network device 200a may obtain a packet sent by a device (e.g., the terminal device 300a shown in fig. 4) connected to a port thereof, and determine that a destination IP address carried in the packet (e.g., if the packet is a packet that the terminal device 300a wants to send to the network-side server 400a, an IP address of the network-side server 400a is a destination IP address of the packet) is a first IP address in the one or more IP addresses. The end device 200a may then determine a first VLAN ID corresponding to the first IP address among the one or more VLAN IDs according to the VLAN configuration information. Then, the network device 200a may set the VLAN ID of the port connected to the terminal device 300a to the first VLAN ID. Therefore, the VLAN ID setting of each port can be automatically completed according to the destination IP address carried by the message received by each port and the preset VLAN configuration information, the setting efficiency is greatly improved, and a large amount of time and energy are saved.
Optionally, as described above, the VLAN configuration information may include one or more VLAN IDs and one or more preset addresses. The one or more preset addresses may include one or more Media Access Control (MAC) addresses, and the one or more VLAN IDs may correspond to the one or more MAC addresses one to one. The network device 200 se:Sub>A may obtain se:Sub>A packet sent by se:Sub>A device (e.g., the terminal device 300 se:Sub>A shown in fig. 4) connected to se:Sub>A port of the network device 200 se:Sub>A, and if the packet is se:Sub>A unicast packet of an MAC layer (it should be noted that the unicast packet of the MAC layer generally carries se:Sub>A corresponding destination MAC address, such as MAC-se:Sub>A), determine that se:Sub>A destination MAC address carried by the packet (e.g., the MAC address of the network-side server 400 se:Sub>A is se:Sub>A packet that the terminal device 300 se:Sub>A wants to send to the network-side server 400 se:Sub>A, the destination MAC address of the network-side server 400 se:Sub>A is the destination MAC address of the packet) is se:Sub>A first MAC address in the one or more MAC addresses. The end device 200a may then determine a first VLAN ID corresponding to the first MAC address among the one or more VLAN IDs according to the VLAN configuration information. Then, the network device 200a may set the VLAN ID of the port connected to the terminal device 300a to the first VLAN ID. Therefore, the VLAN ID setting of each port can be automatically completed according to the destination MAC address carried by the message received by each port and the preset VLAN configuration information, the setting efficiency is greatly improved, and a large amount of time and energy are saved. Optionally, the one or more preset addresses may further include one or more IP addresses, and the one or more VLAN IDs may correspond one-to-one to the one or more IP addresses. As described above, if the message sent by the terminal device 300a received by the network device 200a is a broadcast message of the MAC layer (it should be noted that the broadcast message of the MAC layer generally does not carry the destination-end MAC address but still has a corresponding destination-end IP address, that is, one message usually carries the destination-end IP address), it is determined that the destination-end IP address carried by the message is the first IP address of the one or more IP addresses. The end device 200a may then determine a first VLAN ID corresponding to the first IP address among the one or more VLAN IDs according to the VLAN configuration information. Then, the network device 200a may set the VLAN ID of the port connected to the terminal device 300a to the first VLAN ID. Therefore, the VLAN ID setting of each port can be automatically completed according to the destination IP address carried by the message received by each port and the preset VLAN configuration information, the setting efficiency is greatly improved, and a large amount of time and energy are saved.
Thus, the network device 200a completes the automatic VLAN configuration based on the URSP rule, sets the respective VLAN IDs of the multiple ports, realizes the automatic VLAN partition, effectively prevents the broadcast storm, greatly improves the efficiency of VLAN configuration, and reduces the burden of manual configuration for the user. It can be understood that, the AMF device 100a may also issue different URSP rules to multiple different network devices simultaneously or respectively according to actual requirements, so that the multiple network devices may automatically complete VLAN configuration according to preset VLAN configuration information, and thus, compared with the prior art, a user needs to manually perform VLAN configuration on each network device, and manually set respective VLAN IDs of multiple ports of each network device, the embodiment of the present application obviously may greatly improve efficiency of VLAN configuration, and save a large amount of time and energy.
As described above, the AMF device 100a may be a server, a computer, or the like having the above functions. The network devices 200a and 200b may be CPEs (such as wireless routers) or switches having the above functions, and the like, which is not specifically limited in this embodiment of the present invention. The terminal devices 300a, 300b, 300c, 300d, 300e, 300f, 300g, and 300h may be smartphones, smart wearable devices, tablet computers, notebook computers, desktop computers, servers, and other devices (e.g., cameras, monitoring cameras, etc.) with the above functions, and the embodiments of the present application are not limited in this respect. The network-side servers 400a and 400b may be one server having the above functions, or may be a server cluster composed of multiple servers, or may be a cloud computing service center, for example, the video server and the test server shown in fig. 3, and the like, which is not specifically limited in this embodiment of the present application.
Referring to fig. 5, fig. 5 is a functional block diagram of a network device according to an embodiment of the present disclosure. The following describes an embodiment specifically by taking the network device 200a as an example. It should be understood that network device 200a may have more or fewer components than shown in fig. 4, may combine two or more components, or may have a different configuration of components. The various components shown in fig. 4 may be implemented in hardware, software, or a combination of hardware and software, including one or more signal processing and/or application specific integrated circuits.
As shown in fig. 5, the network device 200a may include: VLAN configuration module 201, ports 1-N202, wireless communication system 203, power management module 204, and computer system 205, where computer system 205 may include a processor 206 and a memory 207, where memory 207 may include instructions 208, and the like. It is to be understood that the illustrated structure of the embodiment of the present application does not constitute a specific limitation to the network device 200 a. In other embodiments of the present application, network device 200a may include more or fewer components than shown in fig. 5, or some components may be combined, some components may be split, or a different arrangement of components may be used, etc. The components shown in fig. 5 may be implemented in hardware, software, or a combination of software and hardware.
The ports 1 to N202, that is, N ports, where N is an integer greater than or equal to 1, may be connected to other devices (for example, terminal devices such as a smart phone, a tablet computer, a notebook computer, a desktop computer, and a camera) through a data line, and may receive messages sent by the other devices.
The VLAN configuration module 201 may receive a URSP rule issued by the AMF device, where the URSP rule may include preset VLAN configuration information, and the VLAN configuration information may include, for example, one or more VLAN IDs and one or more preset addresses. In some embodiments of the present application, each of the one or more preset addresses may be an IP address, and the one or more VLAN IDs may correspond one-to-one to the one or more IP addresses. For example, the VLAN configuration module 201 may determine, according to a destination end IP address (for example, IP-a) carried in a packet received by a port connected to a device in the network device 200a, a VLAN ID (for example, VLAN 1) corresponding to the destination end IP address in the VLAN configuration information, then set the VLAN ID of the port to VLAN1, and add a tag of VLAN1 to the packet. In other embodiments of the present application, the one or more preset addresses may include one or more MAC addresses, and the one or more VLAN IDs may have a one-to-one correspondence with the one or more MAC addresses. If se:Sub>A message received by se:Sub>A port connected to se:Sub>A device in the network device 200 se:Sub>A is se:Sub>A unicast message of an MAC layer, the VLAN configuration module 201 may determine, in the VLAN configuration information, se:Sub>A VLAN ID (for example, VLAN 1) corresponding to se:Sub>A destination MAC address (for example, MAC-se:Sub>A) according to the destination MAC address (for example, MAC-se:Sub>A) carried in the message, and then may set the VLAN ID of the port to VLAN1, and add se:Sub>A tag of VLAN1 to the message. The one or more preset addresses may further include one or more IP addresses, and the one or more VLAN IDs may correspond one-to-one to the one or more IP addresses. If a message received by a port connected to a device in the network device 200a is a broadcast message of an MAC layer, the VLAN configuration module 201 may determine, in the VLAN configuration information, a VLAN ID (for example, VLAN 1) corresponding to a destination IP address (for example, IP-a) according to the destination IP address (for example, IP-a) carried in the message, and then may set the VLAN ID of the port to VLAN1, and add a tag of VLAN1 to the message. Therefore, VLAN configuration can be automatically completed through the issued URSP rules and the destination end IP address or destination end MAC address carried by the message received by each port, that is, VLAN ID setting is automatically carried out on each port, and the VLAN configuration efficiency is greatly improved. In other embodiments of the present application, the VLAN configuration information preset in the URSP rule may include, for example, a target VLAN ID (e.g., VLAN 1), and the VLAN configuration module 201 may set, according to the VLAN configuration information, the VLAN ID of each port in the network device 200a to VLAN1, so that VLAN configuration may be automatically completed through the issued URSP rule, that is, VLAN ID setting is automatically performed on each port, and thus, efficiency of VLAN configuration is greatly improved.
The Wireless communication system 203 may communicate wirelessly with one or more devices directly or via a communication network, the Wireless communication system 203 may communicate in various Wireless communication manners such as, but not limited to, second generation mobile communication networks (2g), 3G, 4G, and 5G, may also be Wireless-Fidelity (WIFI), dedicated Short Range Communication (DSRC), and the like, and may also be a wired communication mode connected via a data line, and the like.
The power management module 204 is used to connect the VLAN configuration module 201, the ports 1 to N202, the wireless communication system 203, and the computer system 205. The power management module 204 may provide power to the VLAN configuration module 201, the ports 1 to N202, the wireless communication system 203, the computer system 205, and the like.
Some or all of the functionality of network device 200a is controlled by computer system 205. The computer system 205 may include at least one processor 206, the processor 206 executing instructions 208 stored in a non-transitory computer readable medium, such as a memory 207. Computer system 205 may also be a plurality of computing devices that control individual components or subsystems of network device 200a in a distributed manner.
The processor 206 may be any conventional processor, such as a commercially available CPU. Alternatively, the processor 206 may be a dedicated device such as an ASIC or other hardware-based processor. Processor 206 may include one or more processing units, such as: the processor 110 may include an Application Processor (AP), a modem processor, a controller, a memory, a video codec, a Digital Signal Processor (DSP), a baseband processor, and/or a neural-Network Processing Unit (NPU), among others. The different processing units may be separate devices or may be integrated into one or more processors. The controller may be, among other things, a neural center and a command center of the network appliance 200 a. The controller can generate an operation control signal according to the instruction operation code and the timing signal to complete the control of instruction fetching and instruction execution. Although fig. 5 functionally illustrates a processor, memory, one of ordinary skill in the art will appreciate that the processor or memory may actually comprise multiple processors or memories that are not stored within the same physical housing. For example, the memory may be a hard drive or other storage medium located in a different enclosure than computer system 205. Thus, references to a processor or memory are to be understood as including references to a collection of processors or memories that may or may not operate in parallel. Rather than using a single processor to perform the steps described herein, for example, some of the components in VLAN configuration module 201 may each have their own processor that performs only computations related to the component-specific functions.
A memory may also be provided in the processor 206 for storing instructions and data. In some embodiments, the memory in the processor 206 may be a cache memory. The memory may hold instructions or data that have just been used or recycled by the processor 206. If the processor 206 needs to use the instruction or data again, it can be called directly from the memory. Repeated accesses of instructions or data are avoided, and the waiting time of the processor 206 is reduced, so that the operating efficiency of the system can be greatly improved.
In some embodiments, the processor 206 may include one or more interfaces. The interface may include an integrated circuit (I2C) interface, an integrated circuit built-in audio (I2S) interface, a Pulse Code Modulation (PCM) interface, a universal asynchronous receiver/transmitter (UART) interface, a Mobile Industry Processor Interface (MIPI), a general-purpose input/output (GPIO) interface, a Subscriber Identity Module (SIM) interface, and/or a Universal Serial Bus (USB) interface, etc.
It should be understood that the interfacing relationship between the modules illustrated in the embodiment of the present application is only an exemplary illustration, and does not form a structural limitation on the network device 200 a. In other embodiments of the present application, the network device 200a may also adopt a different interface manner or a combination of a plurality of interface manners than those in the above embodiments.
In some embodiments, memory 207 may contain instructions 208 (e.g., program logic), which instructions 208 may be executed by processor 206 to perform various functions of network device 200a, including those described above. The memory 207 may also contain additional instructions, including instructions to send data to, receive data from, interact with, and/or control the VLAN configuration module 201 and the wireless communication system 203, among others.
In addition to the instruction 208, the memory 207 may further store data, for example, store a URSP rule issued by the AMF device, including storing preset VLAN configuration information therein, and the like, may further store a MAC address and an IP address of a device connected to each port in the network device 200a, and the like, and may further store a MAC address and an IP address of a network side device (for example, a device used for service processing, such as a video server and a test server) connected to the network device 200a, and the like, which is not specifically limited in this embodiment of the present application.
It should be understood that the interfacing relationship between the modules illustrated in the embodiment of the present application is only an exemplary illustration, and does not form a structural limitation on the network device 200 a. In other embodiments of the present application, the network device 200a may also adopt a different interface manner or a combination of a plurality of interface manners than those in the above embodiments.
Optionally, the network device 200a may further include an external memory interface (not shown in fig. 5), which may be used to connect an external memory card, such as a Micro SD card, to implement the expansion of the storage capability of the network device 200 a. The external memory card may communicate with the processor 206 through an external memory interface to implement data storage functions.
Optionally, the network device 200a may further include an indicator (not shown in fig. 5), where the indicator may be an indicator light, and may be configured to indicate a device connection status of each port, a VLAN ID setting status of each port, and the like, which is not specifically limited in this embodiment of the present invention.
The network device 200a may be a CPE (specifically, a 5G CPE), a wireless router, or a switch having the above functions, which is not limited in this embodiment of the present invention.
To facilitate understanding of the embodiments of the present application, the following exemplary list application scenarios to which a VLAN configuration method in the present application is applicable, and may include the following 2 scenarios.
In the first scenario, according to preset VLAN configuration information, VLAN IDs of respective ports are set.
Referring to fig. 6, fig. 6 is a schematic view of an application scenario of a VLAN configuration method according to an embodiment of the present application. As shown in fig. 6, the application scenario may include an AMF device 100a, a network device 200a (CPE is taken as an example in fig. 6), end devices 300a and 300b (monitoring cameras are taken as an example in fig. 6), and a network side server (video server is taken as an example in fig. 6). The network device 200a may include a relevant memory, a processor, and the like. Wherein the memory and the processor may perform data transmission through a system bus. The network device 200a may be accessed to a base station (not shown in fig. 6) through a wireless air interface, and the base station may be connected with the AMF device 100a and the video server, so that the network device 200a may establish a connection with the AMF device 100a and the video server. The network device 200a may include a plurality of ports, for example, a port 1 and a port 2, wherein the monitoring camera 1 may be connected to the port 1 through a data line, and the monitoring camera may also be connected to the port 2 through a data line. It should be noted that, in some possible embodiments, the monitoring cameras 1 and 2 may also be connected to the ports 1 and 2 in a wireless manner, which is not specifically limited in the embodiment of the present application. In the application scenario shown in fig. 6, for example, videos acquired by the monitoring cameras 1 and 2 need to be sent to the video server, and then the monitoring cameras 1 and 2 need to belong to the same virtual local area network, for example, both belong to VLAN1. At this time, the network side administrator may preset VLAN configuration information according to actual requirements, where the VLAN configuration information may include, for example, a preset VLAN ID (such as the above-mentioned VLAN 1), and then may issue, through the AMF device 100a shown in fig. 6, a URSP rule to the network device 200a, where the URSP rule may include the above-mentioned preset VLAN configuration information. Then, the network device 200a may set the VLAN IDs of the respective ports according to the preset VLAN configuration information, for example, set the VLAN IDs of both port 1 and port 2 to VLAN1, thereby completing the VLAN ID setting of the respective ports of the network device 200 a. Optionally, the VLAN configuration information may further include a preset DNN (for example, DNN 1), and the network device 200a may receive a packet sent by port 1 or port 2, add a VLAN tag to the packet, where the VLAN tag may include the preset target VLAN ID (for example, VLAN 1), and then may send the packet through a radio bearer identified as the DNN 1. Therefore, the VLAN configuration of the network device 200a is automatically completed, the VLAN ID of each port is automatically set, and the corresponding VLAN label is automatically added to the message sent by each port, so that the VLAN configuration efficiency is greatly improved, and great convenience is brought to networking.
As described above, the AMF device 100a may be a server, a computer, or the like, which is not particularly limited in this embodiment; the network device 200a may be other network devices besides the CPE, for example, other wireless routers or switches, and the like, which is not specifically limited in this embodiment of the present application; the terminal devices 300a and 300b may be other devices besides the monitoring camera, for example, smart phones, smart wearable devices, tablet computers, laptop computers, desktop computers, and the like, which have the above functions, and this is not limited in this embodiment of the present application; the network-side server 400a may be a test server or a graphic processing server, etc. other than the video server, and the network-side server 400a may be one server with the above functions, a server cluster composed of multiple servers, or a cloud computing service center, etc., which is not limited in this embodiment of the present application.
And in a second scenario, according to preset VLAN configuration information, the VLAN ID of each port is set through the address carried by the message.
Referring to fig. 7, fig. 7 is a schematic application scenario diagram of another VLAN configuration method according to an embodiment of the present application. As shown in fig. 7, the application scenario may include an AMF device 100a, a network device 200a (fig. 7 takes a CPE as an example), a terminal device 300a (fig. 7 takes a monitoring camera as an example), a terminal device 300b (fig. 7 takes a monitoring camera as an example), a terminal device 300c (fig. 7 takes a device to be tested as an example), a network-side server 400a (fig. 7 takes a video server as an example), and a network-side server 400b (fig. 7 takes a test server as an example). The network device 200a may include a relevant memory and a processor. Wherein the memory and the processor may perform data transfer via a system bus. The network device 200a may access a base station (not shown in fig. 7) through a wireless air interface, and the base station may be connected with the AMF device 100a, the video server, and the test server, so that the network device 200a may establish a connection with the AMF device 100a, the video server, and the test server. The network device 200a may include a plurality of ports, for example, a port 1, a port 2, and a port 3, where the monitoring camera 1 may be connected to the port 1 through a data line, the monitoring camera may also be connected to the port 2 through a data line, and a device to be tested (for example, a terminal device such as a smart phone, etc.) may be connected to the port 3 through a data line. It should be noted that, in some possible embodiments, the monitoring cameras 1 and 2 and the device under test may also be connected to the ports 1, 2 and 3 respectively in a wireless manner, and this is not particularly limited in the embodiments of the present application. In the application scenario shown in fig. 7, for example, videos acquired by the monitoring cameras 1 and 2 need to be sent to the video server, the monitoring cameras 1 and 2 need to belong to the same virtual local area network, for example, both belong to VLAN1, and test data acquired by the device to be tested needs to be sent to the test server, so that the device to be tested needs to belong to another virtual local area network, for example, belong to VLAN2. At this time, the network side administrator may preset VLAN configuration information according to actual requirements, where the VLAN configuration information may include, for example, one or more preset VLAN IDs (such as VLAN1 and VLAN2 described above) and one or more preset addresses (for example, IP addresses of the video server and the test server may be, for example, IP-se:Sub>A and IP-B, respectively, and MAC addresses of the video server and the test server may be, for example, MAC-se:Sub>A and MAC-B, respectively), and then may issue se:Sub>A URSP rule to the network device 200 se:Sub>A through the AMF device 100 se:Sub>A shown in fig. 7, where the URSP rule may include the preset VLAN configuration information. Then, as shown in fig. 7, the network device 200 se:Sub>A may receive se:Sub>A packet sent by, for example, the monitoring camerse:Sub>A 1, where the packet may carry se:Sub>A destination MAC address corresponding to the packet, for example, MAC-se:Sub>A, and the network device may determine, according to the destination MAC address, se:Sub>A VLAN ID corresponding to the packet, for example, VLAN1, in the preset VLAN configuration information. Then, the network device 200a may set the VLAN ID of the port 1 to VLAN1, and add a VLAN tag to the packet, where the VLAN tag may include VLAN1 as described above. Optionally, the packet is also a broadcast packet of the MAC layer, so that the packet does not carry the destination MAC address corresponding to the packet, but still carries the destination IP address corresponding to the packet, for example, IP-a, and the network device may determine the VLAN ID corresponding to the packet, for example, VLAN1, in the preset VLAN configuration information according to the destination IP address. Then, the network device 200a may set the VLAN ID of the port 1 to VLAN1, and add a VLAN tag to the packet, where the VLAN tag may include VLAN1 as described above. As described above, as shown in fig. 7, the network device 200a may also receive a message sent by, for example, a device under test, and then determine and set a VLAN ID of the port 3 according to a destination IP address or a destination MAC address carried in the message, and so on, which are not described herein again. Therefore, the network device 200a can determine and set the VLAN ID of the corresponding port according to the preset VLAN configuration information through the destination IP address or the destination MAC address carried in the received packet, so that the automatic setting of the VLAN IDs of the plurality of ports in the network device 200a can be automatically completed, the efficiency of VLAN configuration is greatly improved, and great convenience is brought to networking. Optionally, as described above, the preset VLAN configuration information may further include one or more DNNs, and the network device 200a may send the received packet through the radio bearer identified by the corresponding DNN, which is not described herein again.
As described above, the AMF device 100a may be a server, a computer, or the like, which is not particularly limited in this embodiment; the network device 200a may be other network devices besides the CPE, for example, other wireless routers or switches, and the like, which is not specifically limited in this embodiment of the present application; the terminal devices 300a and 300b may be other devices besides the monitoring camera, for example, smart phones, smart wearable devices, tablet computers, laptop computers, desktop computers, and the like, which have the above functions, and this embodiment of the present application is not limited thereto; the network-side server 400a may be another server besides the video server and the test server, for example, a graphics processing server, and the like, and the network-side server 400a may be one server having the above functions, a server cluster composed of multiple servers, or a cloud computing service center, and the like, which is not limited in this embodiment of the present application.
It can be understood that the above-mentioned two application scenarios are only exemplary scenarios, and the VLAN configuration method provided in the present application may also be applied to other scenarios besides the above-mentioned two application scenarios, which is not described herein again.
Referring to fig. 8, fig. 8 is a flowchart illustrating a VLAN configuration method according to an embodiment of the present disclosure, where the method is applicable to the system architecture shown in fig. 4 and the application scenario shown in fig. 7, and is specifically applicable to the network device 200a shown in fig. 5, where the network device 200a may include N ports, where N is an integer greater than or equal to 1. The following description is made with reference to fig. 8, taking the network device 200a in fig. 5 as an example of the implementation subject. The method may include the following steps S801 to S803:
step S801, a target user equipment routing policy URSP rule is obtained, where the target URSP rule includes preset virtual local area network VLAN configuration information, and the VLAN configuration information includes one or more virtual local area network identification numbers VLAN ID and one or more preset addresses.
Specifically, the network side issues the target URSP rule, and optionally, the target URSP rule may be sent to the network device through the AMF device. The network device receives the target URSP rule, which may include preset VLAN configuration information, which may include one or more VLAN IDs and one or more preset addresses. Optionally, the VLAN configuration information may further include one or more DNNs, and the one or more DNNs may have a one-to-one correspondence with the one or more VLAN IDs and the one or more preset addresses. Therefore, the VLAN ID of the corresponding port can be determined and set according to the preset address subsequently, the VLAN configuration of the network equipment is completed automatically, and the VLAN configuration efficiency is improved greatly.
Step S802, acquiring a target message sent by first equipment, and determining a first preset address carried by the target message; the first device is connected with a first port, and the first port is one of the N ports.
Specifically, a first device sends a target message to a network device, and the network device receives the target message and determines a first preset address carried by the target message; the first device is connected to a first port, and the first port is one of the N ports of the network device.
Optionally, the one or more preset addresses may include one or more MAC addresses, and the one or more MAC addresses may correspond to the one or more VLAN IDs one to one. Alternatively, please refer to fig. 9a to 9d, and fig. 9a to 9d are schematic diagrams illustrating overall steps of a group of VLAN configuration methods according to an embodiment of the present application. As shown in fig. 9 se:Sub>A and 9B, the AMF device 100 se:Sub>A sends se:Sub>A target URSP rule to the network device 200 se:Sub>A, and the network device 200 se:Sub>A receives the target URSP rule, where the target URSP rule may include preset VLAN configuration information, and the VLAN configuration information may include se:Sub>A plurality of MAC addresses (such as MAC-se:Sub>A and MAC-B) and se:Sub>A plurality of VLAN IDs (such as VLAN1 and VLAN 2) corresponding thereto as shown in fig. 9 se:Sub>A and 9B. Optionally, the VLAN configuration information may further include one or more DNNs (such as DNN 1).
If the target packet is a first type of packet, that is, a unicast packet of the MAC layer, it may be determined that a destination MAC address carried by the target packet is a first MAC address, where the first MAC address may be one of the one or more MAC addresses.
Optionally, the one or more preset addresses may further include one or more IP addresses, and the one or more IP addresses may correspond to the one or more VLAN IDs in a one-to-one manner. Alternatively, as shown in fig. 9c and 9d, the AMF device 100a sends a target URSP rule to the network device 200a, and the network device 200a receives the target URSP rule, where the target URSP rule may include preset VLAN configuration information, and the VLAN configuration information may include a plurality of IP addresses (such as IP-a and IP-B) and a plurality of VLAN IDs (such as VLAN1 and VLAN 2) corresponding thereto as shown in fig. 9c and 9 d. Optionally, the VLAN configuration information may further include one or more DNNs (such as DNN 1).
If the target packet is a second type of packet, that is, a broadcast packet of the MAC layer (that is, the packet does not carry a corresponding target MAC address but still carries a corresponding target IP address), it may be determined that the target IP address carried by the target packet is a first IP address, where the first IP address is one of the one or more IP addresses.
Optionally, under a normal condition, both the unicast packet of the MAC layer and the broadcast packet of the MAC layer carry the corresponding destination IP address, so each of the one or more preset addresses may be an IP address, that is, the VLAN configuration information may include one or more VLAN IDs and one or more IP addresses corresponding to the VLAN IDs one to one, and details are not repeated here.
Step S803, according to the VLAN configuration information, determine a first VLAN ID corresponding to the first preset address, and set the VLAN ID of the first port as the first VLAN ID.
Specifically, the network device determines, according to the VLAN configuration information, that the VLAN ID corresponding to the first preset address is a first VLAN ID, and sets the VLAN ID of the first port as the first VLAN ID.
Alternatively, as described above, when the preset address is se:Sub>A MAC address, that is, when the MAC address, the VID (that is, the VLAN ID) and the DNN type are included in the URSP rule, it is assumed that the MAC address is MAC-se:Sub>A, the VID is VID-se:Sub>A, and the DNN type is DNN-se:Sub>A. This URSP rule may indicate that all messages sent to MAC-se:Sub>A and VID = VID-se:Sub>A (alternatively referred to as datse:Sub>A messages) need to be sent over se:Sub>A radio bearer identified as DNN-se:Sub>A. For 5G CPE which needs to support VLAN tagging, when se:Sub>A device (i.e., se:Sub>A device connected to se:Sub>A port of the device) on the downstream side sends se:Sub>A packet, if se:Sub>A destination MAC is MAC-se:Sub>A, se:Sub>A LAN corresponding to the device is configured as VID-se:Sub>A, that is, se:Sub>A VID (i.e., se:Sub>A VLAN ID) of the port to which the device is connected is set to VID-se:Sub>A.
Alternatively, the relevant configuration information about VLAN ID, MAC address and DNN in the target URSP rule may be specifically as shown in table 3 below.
TABLE 3
Figure BDA0002574021070000191
As shown in table 3 above, the target URSP rule includes se:Sub>A plurality of VLAN IDs (VID 1 and VID 2), se:Sub>A plurality of MAC addresses (MAC-se:Sub>A and MAC-B), and se:Sub>A preset DNN (DNN 1) that are set in advance. VID1 corresponds to and is associated with MAC-A and DNN1, and VID2 corresponds to and is associated with MAC-B and DNN 1. According to the URSP rule shown in table 3 above, the network device may set the VLAN ID of the port corresponding to the packet carrying the destination MAC address as MAC-se:Sub>A to VID1, add the tag of VID1 to the packet, and send the packet to the destination MAC address through the radio bearer identified as DNN 1; and, the network device may set the VLAN ID of the port corresponding to the packet with the destination MAC address as MAC-B to VID2, add a tag of VID2 to the packet, and send the packet to the destination MAC address through the radio bearer identified as DNN1, and so on.
As described above, when the preset address is an IP address, that is, when the IP address, the VID, and the DNN type are included in the URSP rule, it is assumed that the IP address is IP-A, the VID is VID-A, and the DNN type is DNN-A. This URSP rule may indicate that all messages sent to IP-A and VID = VID-A need to be sent over A radio bearer identified as DNN-A. For 5G CPE needing to support VLAN tagging, when a device hung down (namely a device connected with a port of the device) sends a message, if a destination IP is IP-A, a LAN corresponding to the device is configured to VID-A, namely the VID of the port connected with the device is set to VID-A.
Alternatively, the relevant configuration information about VLAN ID, IP address and DNN in the target URSP rule may be specifically as shown in table 4 below.
TABLE 4
Figure BDA0002574021070000201
As shown in table 4 above, the target URSP rule includes a plurality of VLAN IDs (VID 1 and VID 2), a plurality of IP addresses (IP-a and IP-B), and a preset DNN (DNN 1) that are set in advance. VID1 corresponds to and is associated with IP-A and DNN1, and VID2 corresponds to and is associated with IP-B and DNN 1. According to the URSP rule shown in table 4 above, the network device may set the VLAN ID of the port corresponding to the packet carrying the destination IP address IP-a to VID1, add the tag of VID1 to the packet, and send the packet to the destination IP address through the radio bearer identified as DNN 1; and, the network device may set VID2 to the VLAN ID of the port corresponding to the packet whose destination IP address is IP-B, add a tag of VID2 to the packet, and send the packet to the destination IP address through a radio bearer identified as DNN1, and so on.
For example, as shown in fig. 9 se:Sub>A, se:Sub>A terminal device 1 is connected to se:Sub>A port 1 in se:Sub>A network device 200 se:Sub>A, the terminal device 1 sends se:Sub>A message 1 to the network device, se:Sub>A source MAC address of the message 1 is MAC-C (that is, se:Sub>A MAC address of the terminal device 1), and se:Sub>A destination MAC address of the message 1 is MAC-se:Sub>A (that is, se:Sub>A MAC address of se:Sub>A network side server 400 se:Sub>A, and obviously, the message 1 is se:Sub>A unicast message of se:Sub>A MAC layer). At this time, the network device 200 se:Sub>A may determine, according to the destination MAC address carried in the packet 1, that the VLAN ID corresponding to the MAC-se:Sub>A is VLAN1 in the VLAN configuration information shown in fig. 9 se:Sub>A, so that the network device 200 se:Sub>A may set the VLAN ID of the port 1 to VLAN1, and add se:Sub>A VLAN tag to the packet, where the tag may include the VLAN1. Then, the network device 200 se:Sub>A sends the message 1 with the VLAN tag added to se:Sub>A destination MAC address (MAC-se:Sub>A) through se:Sub>A corresponding radio bearer identified as DNN1, that is, to the network device 400 se:Sub>A.
For example, as shown in fig. 9B, the terminal device 4 is connected to a port 4 in the network device 200a, the terminal device 4 sends a packet 2 to the network device, a source MAC address of the packet 2 is MAC-F (that is, a MAC address of the terminal device 4), and a destination MAC address of the packet 2 is MAC-B (that is, a MAC address of the network-side server 400B, obviously, the packet 2 is a unicast packet of a MAC layer). At this time, the network device 200a may determine, according to the destination MAC address carried in the packet 2, that the VLAN ID corresponding to the MAC-B is VLAN2 in the VLAN configuration information shown in fig. 9B, so that the network device 200a may set the VLAN ID of the port 4 to be VLAN2, and add a VLAN tag to the packet, where the tag may include the VLAN2. Then, the network device 200a sends the message 2 added with the VLAN tag to a destination MAC address (MAC-B) through a corresponding radio bearer identified as DNN2, that is, to the network side device 400B.
For example, as shown in fig. 9C, the terminal device 1 is connected to a port 1 in the network device 200a, the terminal device 1 sends a packet 3 to the network device, a source IP address of the packet 3 is IP-C (that is, an IP address of the terminal device 1), and a destination IP address of the packet 3 is IP-a (that is, an IP address of the network side server 400a, and the packet 3 may be a unicast packet of the MAC layer or a broadcast packet of the MAC layer). At this time, the network device 200a may determine, according to the destination IP address carried in the packet 3, that the VLAN ID corresponding to the IP-a is VLAN1 in the VLAN configuration information shown in fig. 9a, so that the network device 200a may set the VLAN ID of the port 1 to VLAN1, and add a VLAN tag to the packet, where the tag may include the VLAN1. Then, the network device 200a sends the message 3 with the VLAN tag added to a destination IP address (IP-a) through a corresponding radio bearer identified as DNN1, that is, to the network device 400a.
For example, as shown in fig. 9d, the terminal device 4 is connected to a port 4 in the network device 200a, the terminal device 4 sends a packet 4 to the network device, a source IP address of the packet 4 is IP-F (that is, an IP address of the terminal device 4), and a destination IP address of the packet 4 is IP-B (that is, an IP address of the network side server 400B, where the packet 4 may be a unicast packet of the MAC layer or a broadcast packet of the MAC layer). At this time, the network device 200a may determine, according to the destination IP address carried in the packet 4, that the VLAN ID corresponding to the IP-B is VLAN2 in the VLAN configuration information shown in fig. 9B, so that the network device 200a may set the VLAN ID of the port 4 to VLAN2, and add a VLAN tag to the packet, where the tag may include the VLAN2. Then, the network device 200a sends the message 4 with the VLAN tag added to the destination IP address (IP-B) through the corresponding radio bearer identified as DNN2, that is, to the network-side device 400B.
Referring to fig. 10, fig. 10 is a schematic networking diagram of a VLAN configuration method according to an embodiment of the present application. As shown in fig. 10, the network may include test equipment, industrial cameras, CPEs, base stations, and network-side servers. Optionally, the network side server may include a plurality of servers, for example, a test server and a video server, etc. The CPE may access a base station through a wireless air interface, and the base station may be connected with a network side server and an AMF device (not shown in fig. 10), and the CPE may specifically be the above-mentioned 5G CPE, for example. The test equipment and the industrial camera may be respectively connected to ports in the CPE. The test datse:Sub>A acquired by the test equipment needs to be sent to the video server, so that the test datse:Sub>A needs to be divided into the same VLAN (virtual local arese:Sub>A network), for example, the VLAN1, and the MAC address of the destination end can be MAC-A; the video data or image data collected by the industrial camera needs to be sent to the video server, and therefore needs to be divided into another VLAN, for example, into VLAN2, and then the destination MAC address can be MAC-B. When the URSP rule received by the CPE is as shown in table 3 above, the VLAN ID of the port connected to the testing device in the CPE may be set to VID1, and a VLAN tag is added to the message sent by the testing device, where the tag includes VID1; and, the CPE may set a VLAN ID of a port connected to the industrial camera in the CPE to VID2, and add a VLAN tag to a message sent by the industrial camera, where the tag includes VID2.
Referring to fig. 10, as described above, the test data collected by the test device needs to be sent to the video server, and therefore needs to be divided into the same VLAN, for example, into VLAN1, the destination IP address may be IP-a; the video data or image data collected by the industrial camera needs to be sent to the video server, and therefore needs to be divided into another VLAN, for example, into VLAN2, and then the destination IP address may be IP-B. When the URSP rule received by the CPE is as shown in table 4 above, the VLAN ID of the port of the CPE connected to the test device may be set to VID1, and a VLAN tag is added to the message sent by the test device, where the tag includes VID1; moreover, the CPE may set a VLAN ID of a port of the CPE, which is connected to the industrial camera, to VID2, and add a VLAN tag to a packet sent by the industrial camera, where the tag includes VID2.
Referring to fig. 11, fig. 11 is a schematic flowchart of another VLAN configuration method according to an embodiment of the present disclosure, where the method is applicable to the system architecture shown in fig. 4 and the application scenario shown in fig. 6, and is specifically applicable to the network device 200a shown in fig. 5, where the network device 200a may include N ports, where N is an integer greater than or equal to 1. The following description will be made by taking the network device 200a in fig. 5 as an example, which is described above as an implementation subject, in conjunction with fig. 11. The method may include the following steps S1101-S1102:
step S1101, obtaining a target user equipment routing strategy URSP rule, wherein the target URSP rule comprises preset virtual local area network VLAN configuration information; the VLAN configuration information includes a target virtual local area network identification number VLAN ID.
Specifically, the network side issues the target URSP rule, and optionally, the target URSP rule may be sent to the network device through the AMF device. The network device receives the target URSP rule, which may include preset VLAN configuration information, which may include a preset target VLAN ID. Optionally, the VLAN configuration information may further include a preset target DNN, and the target DNN may correspond to the target VLAN ID.
Alternatively, as shown in table 5 below, if the Traffic descriptor in table 5 does not include "10000001 Destination MAC address type" therein, only the VID (i.e., VLAN ID) and DNN are included. For example, VID = VID-A and DNN = DNN-A, then A message (alternatively referred to as A datA message) indicating that all VID-as received by the network device (e.g., 5G CPE) are to be sent over the radio bearer identified as DNN-A. For the 5G CPE which needs to perform VLAN configuration, it may be considered that all devices suspended from the 5G CPE belong to the VLAN VID-a at this time, so that during subsequent networking, all LAN tags of the 5G CPE may be set to VID-a according to the URSP rule, that is, VLAN IDs of all ports of the 5G CPE are set to VID-a. Therefore, the user does not need to configure the VLAN through the UI, the VLAN can be automatically divided, and the VLAN dividing efficiency is greatly improved.
TABLE 5
Figure BDA0002574021070000221
Optionally, referring to fig. 12, fig. 12 is a schematic diagram illustrating an overall step of a VLAN configuration method according to an embodiment of the present application. As shown in fig. 12, the AMF device 100a transmits the target URSP rule to the network device 200a, and the network device 200a receives the target URSP rule. The network device 200a may include 4 ports as shown in fig. 12, specifically, port 1, port 2, port 3, and port 4. The port 1 is connected with the terminal device 1, the port 2 is connected with the terminal device 2, the port 3 is connected with the terminal device 3, and the port 4 is connected with the terminal device 4. As shown in fig. 12, the target VLAN ID included in the preset VLAN configuration information may be VLAN1. Alternatively, the relevant configuration information about VLAN ID and DNN in the target URSP rule may be specifically shown in table 6 below.
TABLE 6
Figure BDA0002574021070000231
As shown in table 6 above, the target URSP rule includes a preset target VLAN ID (VID 1) and a preset target DNN (DNN 1), where VID1 corresponds to and is associated with DNN 1.
Step S1102, according to the VLAN configuration information, sets the respective VLAN IDs of the N ports as target VLAN IDs.
Specifically, as described above, the network device may set the VLAN IDs of the respective N ports in the network device to the target VLAN IDs, for example, to VLAN1, and so on, according to the VLAN configuration information.
As shown in fig. 12, the network device 200a may set the VLAN IDs of the ports of the network device 200a to VLAN1 (i.e., to VID 1) according to the VLAN configuration information (e.g., including VID1 and DNN1 corresponding thereto as shown in table 6) preset in the target URSP rule, for example, as shown in fig. 12, the VLAN IDs of port 1, port 2, port 3 and port 4 are all set to VLAN1. Optionally, in some possible embodiments, the VLAN ID of a part of the ports in the end device may also be set to VLAN1, and the like, which is not specifically limited in this embodiment of the present application. Therefore, VLAN configuration is automatically completed according to URSP rules, namely, automatic setting of VLAN IDs of all ports in the network equipment is completed, the efficiency of VLAN configuration is greatly improved, convenience is provided for users, meanwhile, broadcast storms are effectively prevented by efficient and accurate division of VLANs, and the overall performance and network safety of the network are maintained.
Referring to fig. 13, fig. 13 is a schematic networking diagram of another VLAN configuration method according to an embodiment of the present application. As shown in fig. 13, the networking may include an industrial camera, a CPE, a base station, and a network side server, the CPE may access the base station through a wireless air interface, the base station may be connected with the network side server and an AMF device (not shown in fig. 13), and the CPE may be, for example, the above-mentioned 5G CPE specifically. The industrial camera may be connected to a port in the CPE, and when the URSP rule received by the CPE is as shown in table 6 above, the VLAN ID of each port of the CPE may be set to VID1, a tag of VID1 may be further added to a message (for example, a message sent by the industrial camera shown in fig. 13) received by each port, and the message is sent through a radio bearer identified as DNN1, and so on, which is not described herein again.
To sum up, the embodiment of the present application provides a VLAN configuration method, which may preset a corresponding URSP rule according to an actual requirement, and implement automatic setting of a VLAN ID of each port in a network device through the URSP rule, complete VLAN configuration of the network device, add a corresponding VLAN tag to a message received by each port, and so on. The method can comprise the following three main modes:
a) VLAN configuration is completed through VID (802.1Q C-TAG VID and 802.1Q S-TAG VID);
b) VLAN configuration is completed through VID (802.1Q C-TAG VID and 802.1Q S-TAG VID) and MAC address;
c) VLAN configuration is accomplished via VID (802.1Q C-TAG VID &802.1Q S-TAG VID) and IP address.
Optionally, in this embodiment of the present application, a developer may also continuously optimize a VLAN configuration method provided by the present application according to an obtained VLAN configuration result, for example, continuously optimize VLAN configuration information formulated in the present application, for example, optionally, may also complete automatic VLAN configuration for a network device by presetting VLAN configuration information including one or more Fully Qualified Domain Names (FQDNs) and one or more VLAN IDs corresponding thereto, so as to continuously improve accuracy and efficiency of VLAN configuration, improve an appropriate rate of VLAN configuration information for various actual conditions (including various types of network devices and messages, for example), and enable a network device to implement more accurate, rapid, and automatic VLAN configuration according to the preset VLAN configuration information.
Referring to fig. 14, fig. 14 is a schematic structural diagram of a VLAN configuration apparatus according to an embodiment of the present application, where the VLAN configuration apparatus may be applied to a network device, the network device may include N ports, and N is an integer greater than or equal to 1. The VLAN configuration apparatus may include an apparatus 30, and the apparatus 30 may include a first obtaining unit 301, a second obtaining unit 302, and a first determining unit 303, where details of each unit are described below.
A first obtaining unit 301, configured to obtain a target user equipment routing policy URSP rule, where the target URSP rule includes preset virtual local area network VLAN configuration information, and the VLAN configuration information includes one or more virtual local area network identification numbers VLAN ID and one or more preset addresses;
a second obtaining unit 302, configured to obtain a target packet sent by a first device, and determine a first preset address carried in the target packet; the first device is connected with a first port, and the first port is one of the N ports; the first preset address is one of the one or more preset addresses;
a first determining unit 303, configured to determine, according to the VLAN configuration information, a first VLAN ID corresponding to the first preset address, and set the VLAN ID of the first port as the first VLAN ID.
In one possible implementation, the one or more preset addresses include one or more media access control MAC addresses; the one or more VLAN IDs are in one-to-one correspondence with the one or more MAC addresses; the second obtaining unit 302 is specifically configured to:
acquiring the target message sent by the first equipment, and if the target message is a first type of message, determining that a destination terminal MAC address carried by the target message is a first MAC address; the first type of message is a unicast message of an MAC layer and carries a corresponding destination MAC address; the first MAC address is one of the one or more MAC addresses.
In one possible implementation, the one or more preset addresses further include one or more network protocol IP addresses; the one or more VLAN IDs are in one-to-one correspondence with the one or more IP addresses; the second obtaining unit 302 is further specifically configured to:
acquiring the target message sent by the first device, and if the target message is a second type of message, determining that a destination IP address carried by the target message is the first IP address; the second type of message is a broadcast message of an MAC layer and carries a corresponding destination IP address; the first IP address is one of the one or more IP addresses.
In a possible implementation manner, the one or more preset addresses are one or more IP addresses; the second obtaining unit 302 is specifically configured to:
acquiring the target message sent by the first equipment, and determining a first IP address carried by the target message; the first IP address is one of the one or more IP addresses.
In a possible implementation manner, the VLAN configuration information further includes one or more data network names DNN, and the one or more DNNs are in one-to-one correspondence with the one or more VLAN IDs and the one or more preset addresses; the device 30 further comprises:
an adding unit 304, configured to add a VLAN tag to the target packet, where the VLAN tag includes the first VLAN ID;
a second determining unit 305, configured to determine, according to the VLAN configuration information, a first DNN corresponding to the first VLAN ID;
a sending unit 306, configured to send the target packet to the first preset address through the radio bearer identified as the first DNN.
It should be noted that, for the functions of each functional unit in the VLAN configuration apparatus described in this embodiment, reference may be made to the description related to steps S801 to S803 in the method embodiment described in fig. 8, which is not described herein again.
Each of the units in fig. 14 may be implemented in software, hardware, or a combination thereof. The unit implemented in hardware may include a circuit and a furnace, an arithmetic circuit, an analog circuit, or the like. A unit implemented in software may comprise program instructions, considered as a software product, stored in a memory and executable by a processor to perform the relevant functions, see in particular the previous description.
Referring to fig. 15, fig. 15 is a schematic structural diagram of another VLAN configuration apparatus according to an embodiment of the present application, where the VLAN configuration apparatus may be applied to a network device, and the network device may include N ports, where N is an integer greater than or equal to 1. The VLAN configuration apparatus may include an apparatus 40, and the apparatus 40 may include a first obtaining unit 401 and a setting unit 402, where details of each unit are described below.
A first obtaining unit 401, configured to obtain a target user equipment routing policy URSP rule, where the target URSP rule includes preset virtual local area network VLAN configuration information; the VLAN configuration information comprises a target virtual local area network identification number VLAN ID;
a setting unit 402, configured to set, according to the VLAN configuration information, the VLAN ID of each of the N ports as the target VLAN ID.
In one possible implementation, the VLAN configuration information further includes a target data network name DNN, where the target DNN corresponds to the target VLAN ID; the apparatus 40 further comprises:
a second obtaining unit 403, configured to obtain a target packet sent by a first device, and add a VLAN tag to the target packet, where the VLAN tag includes the target VLAN ID; the first device is connected with one of the N ports;
a sending unit 404, configured to send the target packet through the radio bearer identified as the target DNN according to the VLAN configuration information.
It should be noted that, for the functions of each functional unit in the VLAN configuration apparatus described in this embodiment, reference may be made to the related description of step S1101-step S1102 in the method embodiment described in fig. 11, and details are not repeated here.
Each of the units in fig. 15 may be implemented in software, hardware, or a combination thereof. The unit implemented in hardware may include a circuit and a furnace, an arithmetic circuit, an analog circuit, or the like. A unit implemented in software may comprise program instructions, considered as a software product, stored in a memory and executable by a processor to perform the relevant functions, see in particular the previous description.
Based on the description of the method embodiment and the apparatus embodiment, the embodiment of the present application further provides a network device. Referring to fig. 16, fig. 16 is a schematic structural diagram of a network device according to an embodiment of the present disclosure, where the network device 50 at least includes a processor 501, an input device 502, an output device 503, and a computer-readable storage medium 504, and the network device 50 may further include other general components, for example, N ports, and the N ports may each be connected to an end device, and in this embodiment, the VLAN ID of each of the N ports may be set according to a received URSP rule, so as to divide a VLAN to which the end device belongs. The processor 501, the input device 502, the output device 503, and the computer-readable storage medium 504 within the network device 50 may be connected by a bus or other means. And so on. This is not particularly limited in the embodiments of the present application.
The processor 501 may be a general purpose Central Processing Unit (CPU), a microprocessor, an application-specific integrated circuit (ASIC), or one or more integrated circuits for controlling the execution of programs according to the above schemes.
The Memory in the network device 50 may be a Read-Only Memory (ROM) or other types of static Memory devices that can store static information and instructions, a Random Access Memory (RAM) or other types of dynamic Memory devices that can store information and instructions, an Electrically Erasable Programmable Read-Only Memory (EEPROM), a Compact Disc Read-Only Memory (CD-ROM) or other optical Disc storage, optical Disc storage (including Compact Disc, laser Disc, optical Disc, digital versatile Disc, blu-ray Disc, etc.), a magnetic disk storage medium or other magnetic storage device, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer, but is not limited to. The memory may be self-contained and coupled to the processor via a bus. The memory may also be integral to the processor.
A computer-readable storage medium 504 may be stored in the memory of the network device 50, the computer-readable storage medium 504 being used for storing a computer program comprising program instructions, the processor 501 being used for executing the program instructions stored by the computer-readable storage medium 504. The processor 501 (or CPU) is a computing core and a control core of the network device 50, and is adapted to implement one or more instructions, specifically, to load and execute one or more instructions so as to implement a corresponding method flow or a corresponding function; in an embodiment, the processor 501 according to this embodiment may be configured to perform a series of processes for VLAN configuration, including: acquiring a target user equipment routing strategy (URSP) rule, wherein the target URSP rule comprises preset Virtual Local Area Network (VLAN) configuration information, and the VLAN configuration information comprises one or more VLAN identification numbers (VLAN ID) and one or more preset addresses; acquiring a target message sent by first equipment, and determining a first preset address carried by the target message; the first device is connected with a first port, and the first port is one of the N ports; the first preset address is one of the one or more preset addresses; and determining a first VLAN ID corresponding to the first preset address according to the VLAN configuration information, setting the VLAN ID of the first port as the first VLAN ID, and the like.
It should be noted that, for the functions of each functional unit in the network device 50 described in the embodiment of the present application, reference may be made to the related description of step S801 to step S803 in the method embodiment described in fig. 8, which is not described herein again.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
Embodiments of the present application also provide a computer-readable storage medium (Memory), which is a Memory device in the network device 50 and is used for storing programs and data. It is understood that the computer readable storage medium herein may include both built-in storage medium in the network device 50 and, of course, extended storage medium supported by the network device 50. The computer-readable storage medium provides storage space that stores the operating system of network device 50. Also stored in this memory space are one or more instructions, which may be one or more computer programs (including program code), suitable for loading and execution by processor 501. It should be noted that the computer-readable storage medium may be a high-speed RAM memory, or may be a non-volatile memory (non-volatile memory), such as at least one disk memory; and optionally at least one computer readable storage medium remotely located from the aforementioned processor.
Embodiments of the present application also provide a computer program, which includes instructions that, when executed by a computer, enable the computer to perform some or all of the steps of any one of the VLAN configuration methods.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
Based on the description of the method embodiment and the apparatus embodiment, the embodiment of the present application further provides a network device. Referring to fig. 17, fig. 17 is a schematic structural diagram of another network device provided in this embodiment, where the network device 60 at least includes a processor 601, an input device 602, an output device 603, and a computer-readable storage medium 604, and the network device 60 may further include other general components, for example, N ports may be included, and each of the N ports may be connected to a terminal device, and in this embodiment, a VLAN ID of each of the N ports may be set according to a received URSP rule, so as to divide a VLAN to which the terminal device belongs. Wherein the processor 601, input device 602, output device 603, and computer-readable storage medium 604 within the network device 60 may be connected by a bus or other means, and the like. This is not particularly limited in the embodiments of the present application.
The processor 601 may be a general purpose Central Processing Unit (CPU), a microprocessor, an application-specific integrated circuit (ASIC), or one or more integrated circuits configured to control the execution of programs according to the above schemes.
The Memory in the network device 60 may be a Read-Only Memory (ROM) or other types of static Memory devices that can store static information and instructions, a Random Access Memory (RAM) or other types of dynamic Memory devices that can store information and instructions, an Electrically Erasable Programmable Read-Only Memory (EEPROM), a Compact Disc Read-Only Memory (CD-ROM) or other optical Disc storage, optical Disc storage (including Compact Disc, laser Disc, optical Disc, digital versatile Disc, blu-ray Disc, etc.), a magnetic disk storage medium or other magnetic storage device, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer, but is not limited to. The memory may be self-contained and coupled to the processor via a bus. The memory may also be integral to the processor.
A computer-readable storage medium 604 may be stored in the memory of the network device 60, the computer-readable storage medium 604 being used to store a computer program comprising program instructions, the processor 601 being used to execute the program instructions stored by the computer-readable storage medium 604. Processor 601 (or Central Processing Unit (CPU)) is a computing core and a control core of network device 60, and is adapted to implement one or more instructions, and specifically, is adapted to load and execute one or more instructions to implement corresponding method flows or corresponding functions; in an embodiment, the processor 601 according to this embodiment of the present application may be configured to perform a series of processes for VLAN configuration, including: acquiring a target user equipment routing strategy (URSP) rule, wherein the target URSP rule comprises preset Virtual Local Area Network (VLAN) configuration information; the VLAN configuration information comprises a target virtual local area network identification number VLAN ID; setting the VLAN ID of each of the N ports as the target VLAN ID according to the VLAN configuration information, and the like.
It should be noted that, for the functions of each functional unit in the network device 60 described in the embodiment of the present application, reference may be made to the related description of step S1101-step S1102 in the method embodiment described in fig. 11, and details are not repeated here.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to the related descriptions of other embodiments.
An embodiment of the present application also provides a computer-readable storage medium (Memory), which is a Memory device in the network device 60 and is used for storing programs and data. It will be appreciated that the computer-readable storage media herein may include both built-in storage media within network device 60 and, of course, extended storage media supported by network device 60. The computer readable storage medium provides storage space that stores the operating system of network device 60. Also stored in this memory space is one or more instructions, which may be one or more computer programs (including program code), adapted to be loaded and executed by processor 601. It should be noted that the computer-readable storage medium may be a high-speed RAM memory, or may be a non-volatile memory (non-volatile memory), such as at least one disk memory; and optionally at least one computer readable storage medium remotely located from the aforementioned processor.
Embodiments of the present application further provide a computer program, where the computer program includes instructions, which when executed by a computer, enable the computer to perform some or all of the steps of any one of the VLAN configuration methods.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to the related descriptions of other embodiments.
It should be noted that for simplicity of description, the above-mentioned embodiments of the method are described as a series of acts, but those skilled in the art should understand that the present application is not limited by the described order of acts, as some steps may be performed in other orders or simultaneously according to the present application. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required in this application.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus may be implemented in other manners. For example, the above-described embodiments of the apparatus are merely illustrative, and for example, the above-described division of the units is only one type of division of logical functions, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of some interfaces, devices or units, and may be an electric or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one position, or may be distributed on multiple network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit may be stored in a computer-readable storage medium if it is implemented in the form of a software functional unit and sold or used as a separate product. Based on such understanding, the technical solution of the present application may be substantially implemented or a part of or all or part of the technical solution contributing to the prior art may be embodied in the form of a software product stored in a storage medium, and including several instructions for enabling a computer device (which may be a personal computer, a server, or a network device, and may specifically be a processor in the computer device) to execute all or part of the steps of the above-mentioned method of the embodiments of the present application. The storage medium may include: a U-disk, a removable hard disk, a magnetic disk, an optical disk, a Read-only memory (ROM) or a Random Access Memory (RAM), and other various media capable of storing program codes.
The above embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present application.

Claims (12)

1. A VLAN configuration method is applied to network equipment, wherein the network equipment comprises N ports, N is an integer greater than or equal to 1; the method comprises the following steps:
acquiring a target user equipment routing strategy (URSP) rule, wherein the target URSP rule comprises preset Virtual Local Area Network (VLAN) configuration information, and the VLAN configuration information comprises one or more VLAN identification numbers (VLAN ID) and one or more preset addresses; the one or more VLAN IDs correspond to the one or more preset addresses one to one;
acquiring a target message sent by first equipment, and determining that a destination address carried by the target message is a first preset address; the first device is connected with a first port, and the first port is one of the N ports; the first preset address is one of the one or more preset addresses;
and determining a first VLAN ID corresponding to the first preset address according to the VLAN configuration information, and setting the VLAN ID of the first port as the first VLAN ID.
2. The method of claim 1, wherein the one or more preset addresses comprise one or more Media Access Control (MAC) addresses; the one or more VLAN IDs correspond to the one or more MAC addresses one to one; the acquiring a target message sent by a first device and determining a first preset address of the target message includes:
acquiring the target message sent by the first equipment, and if the target message is a first type of message, determining that a destination terminal MAC address carried by the target message is a first MAC address; the first type of message is a unicast message of an MAC layer and carries a corresponding destination MAC address; the first MAC address is one of the one or more MAC addresses.
3. The method of claim 2, wherein the one or more predetermined addresses further comprise one or more network protocol, IP, addresses; the one or more VLAN IDs correspond to the one or more IP addresses one to one; the acquiring a target message sent by a first device, and determining a first preset address carried by the target message, further includes:
acquiring the target message sent by the first device, and if the target message is a second type of message, determining that a destination IP address carried by the target message is the first IP address; the second type of message is a broadcast message of an MAC layer and carries a corresponding destination IP address; the first IP address is one of the one or more IP addresses.
4. The method of claim 1, wherein the one or more preset addresses are one or more IP addresses; the acquiring a target message sent by a first device and determining a first preset address carried by the target message includes:
acquiring the target message sent by the first equipment, and determining a first IP address carried by the target message; the first IP address is one of the one or more IP addresses.
5. The method of any of claims 1-4, wherein the VLAN configuration information further includes one or more Data Network Names (DNNs), and wherein the one or more DNNs are in one-to-one correspondence with the one or more VLAN IDs and the one or more preset addresses; the method further comprises the following steps:
adding a VLAN label to the target message, wherein the VLAN label comprises the first VLAN ID;
determining a first DNN corresponding to the first VLAN ID according to the VLAN configuration information;
and sending the target message to the first preset address through the radio bearer identified as the first DNN.
6. The VLAN configuration device is applied to a network device, wherein the network device comprises N ports, and N is an integer greater than or equal to 1; the device comprises:
a first obtaining unit, configured to obtain a target user equipment routing policy (URSP) rule, where the target URSP rule includes preset Virtual Local Area Network (VLAN) configuration information, and the VLAN configuration information includes one or more VLAN identification numbers (VLAN IDs) and one or more preset addresses; the one or more VLAN IDs correspond to the one or more preset addresses one to one;
the second acquiring unit is used for acquiring a target message sent by the first equipment and determining that a destination address carried by the target message is a first preset address; the first device is connected with a first port, and the first port is one of the N ports; the first preset address is one of the one or more preset addresses;
a first determining unit, configured to determine, according to the VLAN configuration information, a first VLAN ID corresponding to the first preset address, and set the VLAN ID of the first port as the first VLAN ID.
7. The apparatus of claim 6, wherein the one or more preset addresses comprise one or more Media Access Control (MAC) addresses; the one or more VLAN IDs correspond to the one or more MAC addresses one to one; the second obtaining unit is specifically configured to:
acquiring the target message sent by the first equipment, and if the target message is a first type of message, determining that a destination terminal MAC address carried by the target message is a first MAC address; the first type of message is a unicast message of an MAC layer and carries a corresponding destination MAC address; the first MAC address is one of the one or more MAC addresses.
8. The apparatus of claim 7, wherein the one or more predetermined addresses further comprise one or more network protocol, IP, addresses; the one or more VLAN IDs are in one-to-one correspondence with the one or more IP addresses; the second obtaining unit is further specifically configured to:
acquiring the target message sent by the first device, and if the target message is a second type of message, determining that a destination IP address carried by the target message is the first IP address; the second type of message is a broadcast message of an MAC layer and carries a corresponding destination IP address; the first IP address is one of the one or more IP addresses.
9. The apparatus of claim 6, wherein the one or more preset addresses are one or more IP addresses; the second obtaining unit is specifically configured to:
acquiring the target message sent by the first equipment, and determining a first IP address carried by the target message; the first IP address is one of the one or more IP addresses.
10. The apparatus of any of claims 6-9, wherein the VLAN configuration information further comprises one or more Data Network Names (DNNs), the one or more DNNs corresponding one-to-one to the one or more VLAN IDs and the one or more preset addresses; the device further comprises:
an adding unit, configured to add a VLAN tag to the target packet, where the VLAN tag includes the first VLAN ID;
a second determining unit, configured to determine, according to the VLAN configuration information, a first DNN corresponding to the first VLAN ID;
and the sending unit is used for sending the target message to the first preset address through the radio bearer identified as the first DNN.
11. A network device comprising a processor and a memory, the processor and the memory coupled, wherein the memory is configured to store program code and the processor is configured to invoke the program code to perform the method of any of claims 1 to 5.
12. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program which, when executed by a processor, implements the method of any one of the preceding claims 1 to 5.
CN202010648492.0A 2020-07-07 2020-07-07 VLAN configuration method and related equipment Active CN113923114B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010648492.0A CN113923114B (en) 2020-07-07 2020-07-07 VLAN configuration method and related equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010648492.0A CN113923114B (en) 2020-07-07 2020-07-07 VLAN configuration method and related equipment

Publications (2)

Publication Number Publication Date
CN113923114A CN113923114A (en) 2022-01-11
CN113923114B true CN113923114B (en) 2022-10-28

Family

ID=79231617

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010648492.0A Active CN113923114B (en) 2020-07-07 2020-07-07 VLAN configuration method and related equipment

Country Status (1)

Country Link
CN (1) CN113923114B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007065358A1 (en) * 2005-12-06 2007-06-14 Huawei Technologies Co., Ltd. Method and system for service processing based on vlan stack
WO2012088901A1 (en) * 2010-12-28 2012-07-05 华为技术有限公司 Method for allocating virtual local area network and associated device
CN105490911A (en) * 2014-09-19 2016-04-13 杭州华三通信技术有限公司 Virtual local area network mapping method and apparatus

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI415468B (en) * 2010-12-21 2013-11-11 D Link Corp And a method for improving the transmission quality of image data packet transmission

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007065358A1 (en) * 2005-12-06 2007-06-14 Huawei Technologies Co., Ltd. Method and system for service processing based on vlan stack
WO2012088901A1 (en) * 2010-12-28 2012-07-05 华为技术有限公司 Method for allocating virtual local area network and associated device
CN105490911A (en) * 2014-09-19 2016-04-13 杭州华三通信技术有限公司 Virtual local area network mapping method and apparatus

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"Wireless and wireline convergence access support";3rd Generation Partnership Project;《3GPP TS 23.316》;20200316;参见第9.5.2,9.6.4节 *

Also Published As

Publication number Publication date
CN113923114A (en) 2022-01-11

Similar Documents

Publication Publication Date Title
EP3226132B1 (en) Method and apparatus for deploying virtual machine instances in a nfv architecture
US8762501B2 (en) Implementing a 3G packet core in a cloud computer with openflow data and control planes
CN111224821B (en) Security service deployment system, method and device
EP2947907B1 (en) Startup configuration method in base station, base station and server
US20120303835A1 (en) Implementing EPC in a Cloud Computer with Openflow Data Plane
CN110972092A (en) Local area network communication method, device and system
CN104022953A (en) Message forwarding method and device based on Open Flow
US20220350637A1 (en) Virtual machine deployment method and related apparatus
US20200244579A1 (en) Flexible Ethernet Frame Forwarding Method and Apparatus
EP3627775A1 (en) Route synchronization
CN112073330A (en) Cloud platform container network current limiting method
CN106027396B (en) A kind of route control method, device and system
CN106792821B (en) Access control method and device based on virtual gateway
CN109756411B (en) Message forwarding method and device, first VTEP device and storage medium
US10512091B2 (en) Data communications over a distributed multi-core wireless communication network
JP2018116677A (en) System recovery using WOL
US10405132B2 (en) Precise and custom location based service discovery application for wired and wireless devices
JP2024504466A (en) Packet forwarding methods, packet processing methods, and devices
US20210119971A1 (en) Distribution of stateless security functions
CN113923114B (en) VLAN configuration method and related equipment
US11895189B2 (en) Secure communications of storage tenants that share a storage cluster system
CN112532506B (en) Hybrid networking method, device, server and computer-readable storage medium
US20220166711A1 (en) System and method for routing traffic onto an mpls network
US20210119859A1 (en) Topology Agnostic Security Services
US20220255971A1 (en) Coordination between wireline and wireless policy controllers

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant