CN117793015A - Speed limiting processing method and device for private line network, storage medium and electronic equipment - Google Patents
Speed limiting processing method and device for private line network, storage medium and electronic equipment Download PDFInfo
- Publication number
- CN117793015A CN117793015A CN202311714854.1A CN202311714854A CN117793015A CN 117793015 A CN117793015 A CN 117793015A CN 202311714854 A CN202311714854 A CN 202311714854A CN 117793015 A CN117793015 A CN 117793015A
- Authority
- CN
- China
- Prior art keywords
- speed limit
- network
- state
- strategy
- network device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000003672 processing method Methods 0.000 title claims abstract description 20
- 238000000034 method Methods 0.000 claims abstract description 45
- 230000008859 change Effects 0.000 claims abstract description 32
- 238000012545 processing Methods 0.000 claims abstract description 20
- 238000012544 monitoring process Methods 0.000 claims abstract description 12
- 230000004044 response Effects 0.000 claims abstract description 8
- 238000005538 encapsulation Methods 0.000 claims description 18
- 238000004590 computer program Methods 0.000 claims description 3
- 238000004891 communication Methods 0.000 abstract description 6
- 230000008569 process Effects 0.000 description 18
- 238000007726 management method Methods 0.000 description 11
- 238000010586 diagram Methods 0.000 description 8
- 230000005540 biological transmission Effects 0.000 description 4
- 230000003287 optical effect Effects 0.000 description 3
- 230000006978 adaptation Effects 0.000 description 2
- 238000001914 filtration Methods 0.000 description 2
- 238000005457 optimization Methods 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 230000007704 transition Effects 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 230000015556 catabolic process Effects 0.000 description 1
- 230000002860 competitive effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000006731 degradation reaction Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000002708 enhancing effect Effects 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 238000005259 measurement Methods 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 238000004806 packaging method and process Methods 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000008092 positive effect Effects 0.000 description 1
- 230000003252 repetitive effect Effects 0.000 description 1
- 238000013468 resource allocation Methods 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
- 239000002699 waste material Substances 0.000 description 1
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The present disclosure relates to the technical field of network communication, and provides a speed limit processing method of a private line network, a speed limit processing device of the private line network, a computer storage medium, and an electronic device, where the speed limit processing method of the private line network includes: monitoring the state of the border gateway protocol neighbor relation after the first network device and the second network device establish the border gateway protocol neighbor relation; acquiring event information related to the state change of the border gateway protocol neighbor relation in response to the state change of the border gateway protocol neighbor relation from the first state to the second state; if the event information meets the preset speed limit strategy updating triggering condition, updating the current speed limit strategy to generate a new speed limit strategy; and issuing the new speed limiting strategy to the target network equipment so that the target network equipment executes the new speed limiting strategy. The method and the device can automatically perform flexible speed limiting processing on the private line network.
Description
Technical Field
The disclosure relates to the technical field of network communication, and in particular relates to a speed limit processing method of a private line network, a speed limit processing device of the private line network, a computer storage medium and electronic equipment.
Background
Private network refers to a private network connection provided by a network operator that is directed to a particular customer. It is generally characterized by high bandwidth, low latency, etc. for meeting the high demands of enterprise clients for network connections.
In the related art, speed limit and management of a private line network are generally based on static policies and configurations, and when such a scheme is adopted, a network operator usually needs to consume a great deal of time and resources to manually configure the speed limit policies of each device, so that flexibility is poor.
In view of this, there is a need in the art to develop a new speed limiting processing method and device for private line networks.
It should be noted that the information disclosed in the foregoing background section is only for enhancing understanding of the background of the present disclosure.
Disclosure of Invention
The disclosure aims to provide a speed limiting processing method of a private line network, a speed limiting processing device of the private line network, a computer storage medium and electronic equipment, so as to overcome the technical problem of poor flexibility caused by the limitation of related technologies at least to a certain extent.
Other features and advantages of the present disclosure will be apparent from the following detailed description, or may be learned in part by the practice of the disclosure.
According to a first aspect of the present disclosure, there is provided a speed limit processing method for a private line network, including:
monitoring the state of a border gateway protocol neighbor relation after the first network device and the second network device establish the border gateway protocol neighbor relation; the first network device and the second network device are any network devices accessed to the private line network;
acquiring event information related to the state change of the border gateway protocol neighbor relation in response to the state change of the border gateway protocol neighbor relation from a first state to a second state;
if the event information meets a preset speed limit strategy updating triggering condition, updating the current speed limit strategy to generate a new speed limit strategy;
issuing the new speed limit strategy to target network equipment so that the target network equipment executes the new speed limit strategy;
the target network device is a network device, in the first network device and the second network device, having a preset network topology connection relationship with an event main body of the event information.
In an exemplary embodiment of the present disclosure, the state of the border gateway protocol neighbor relation includes:
Idle state, connected state, active state, open send state, open acknowledge state, and set up state.
In an exemplary embodiment of the disclosure, if the event information meets a preset speed limit policy update trigger condition, updating the current speed limit policy to generate a new speed limit policy includes:
and when the event information indicates that the user demand is changed, and/or when the event information indicates that the network traffic is changed, updating the current speed limit strategy to generate a new speed limit strategy.
In an exemplary embodiment of the present disclosure, the updating the current speed limit policy to generate a new speed limit policy includes:
and generating the new speed limiting strategy according to the changed user demand and/or the changed network flow so as to update the current speed limiting strategy.
In an exemplary embodiment of the present disclosure, the new speed limit policy includes at least one of the following information: new bandwidth limitation information, new network priority configuration information, and new traffic allocation rules.
In an exemplary embodiment of the disclosure, the issuing the new speed limit policy to the target network device includes:
encoding the new speed limit strategy into a specified data format;
Creating custom fields in optional attributes of the border gateway protocol attributes; the custom field is used for carrying the new speed limiting strategy;
encapsulating the coded new speed limiting strategy and the boundary gateway protocol attribute after creating the custom field to obtain encapsulation information;
and transmitting the encapsulation information to the target network equipment.
In an exemplary embodiment of the disclosure, the causing the target network device to execute the new speed limit policy includes:
the target network equipment analyzes the encapsulation information to obtain the new speed limiting strategy;
the target network equipment updates a local speed limit configuration item based on the new speed limit strategy so as to execute the new speed limit strategy;
the speed limit configuration item comprises an access control list or speed limit strategy configuration information.
According to a second aspect of the present disclosure, there is provided a speed limit processing apparatus of a private line network, comprising:
the state monitoring module is used for monitoring the state of the border gateway protocol neighbor relation after the first network equipment and the second network equipment establish the border gateway protocol neighbor relation; the first network device and the second network device are any network devices accessed to the private line network;
The event information acquisition module is used for responding to the change of the state of the border gateway protocol neighbor relation from the first state to the second state and acquiring event information related to the change of the state of the border gateway protocol neighbor relation;
the speed limit strategy updating module is used for updating the current speed limit strategy to generate a new speed limit strategy if the event information meets the preset speed limit strategy updating triggering condition;
the speed limit strategy issuing module is used for issuing the new speed limit strategy to target network equipment so that the target network equipment executes the new speed limit strategy; the target network device is a network device, in the first network device and the second network device, having a preset network topology connection relationship with an event main body of the event information.
According to a third aspect of the present disclosure, there is provided a computer storage medium having stored thereon a computer program which, when executed by a processor, implements the speed limit processing method of the private line network described in the first aspect.
According to a fourth aspect of the present disclosure, there is provided an electronic device comprising: a processor; and a memory for storing executable instructions of the processor; wherein the processor is configured to execute the speed limit processing method of the private network described in the first aspect via execution of the executable instructions.
As can be seen from the above technical solutions, the speed limit processing method of the private line network, the speed limit processing device of the private line network, the computer storage medium, and the electronic device in the exemplary embodiments of the present disclosure have at least the following advantages and positive effects:
in the technical solutions provided in some embodiments of the present disclosure, after a border gateway protocol neighbor relation is established between a first network device and a second network device, a state of the border gateway protocol neighbor relation is monitored, event information related to the state change of the border gateway protocol neighbor relation is obtained in response to the state change of the border gateway protocol neighbor relation from the first state to the second state, if the event information meets a preset speed limit policy update triggering condition, a current speed limit policy is updated to generate a new speed limit policy, and the new speed limit policy is issued to a target network device, so that the target network device executes the new speed limit policy. It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the disclosure and together with the description, serve to explain the principles of the disclosure. It will be apparent to those of ordinary skill in the art that the drawings in the following description are merely examples of the disclosure and that other drawings may be derived from them without undue effort.
Fig. 1 is a flow chart illustrating a speed limit processing method of a private line network in an embodiment of the disclosure;
FIG. 2 is a flow diagram illustrating how a new speed limit policy is issued to a target network device in an embodiment of the present disclosure;
FIG. 3 illustrates an architectural diagram of speed limit processing for a private line network in an embodiment of the present disclosure;
FIG. 4 shows a flow diagram of how an SDN controller generates a new speed limit policy in an embodiment of the present disclosure;
fig. 5 is a flow chart illustrating how a target network device updates a speed limit policy in an embodiment of the present disclosure;
fig. 6 is a schematic diagram showing a structure of a speed limit processing apparatus of a private line network in an exemplary embodiment of the present disclosure;
fig. 7 shows a schematic structural diagram of an electronic device in an exemplary embodiment of the present disclosure.
Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. However, the exemplary embodiments may be embodied in many forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of the example embodiments to those skilled in the art. The described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided to give a thorough understanding of embodiments of the present disclosure. One skilled in the relevant art will recognize, however, that the aspects of the disclosure may be practiced without one or more of the specific details, or with other methods, components, devices, steps, etc. In other instances, well-known technical solutions have not been shown or described in detail to avoid obscuring aspects of the present disclosure.
The terms "a," "an," "the," and "said" are used in this specification to denote the presence of one or more elements/components/etc.; the terms "comprising" and "having" are intended to be inclusive and mean that there may be additional elements/components/etc. in addition to the listed elements/components/etc.; the terms "first" and "second" and the like are used merely as labels, and are not intended to limit the number of their objects.
Furthermore, the drawings are merely schematic illustrations of the present disclosure and are not necessarily drawn to scale. The same reference numerals in the drawings denote the same or similar parts, and thus a repetitive description thereof will be omitted. Some of the block diagrams shown in the figures are functional entities and do not necessarily correspond to physically or logically separate entities.
In the related art, speed limit and management of private line networks are generally based on static policies and configurations, and such methods may not be able to adapt to changes in traffic and emerging application requirements. Furthermore, network operators often need to expend significant time and resources to manually configure the speed limiting policies of each device, are time consuming and inflexible, and limit dynamic tuning and optimization of the network.
The present disclosure proposes a special line flexible speed limiting method based on border gateway protocol and SDN controller, which aims to realize dynamic speed limiting and centralized management in a special line network by combining the capabilities of border gateway protocol and SDN controller, thereby meeting the requirements of different clients and applications. By the method, the network operators can adjust the speed limiting strategy more quickly and accurately, and the utilization rate of network resources and user experience are improved.
Among other things, the border gateway protocol (Border Gateway Protocol) is a protocol for exchanging routing information between different autonomous systems (ases), commonly used for communication between internet core routers. It is a path vector protocol that is used to determine how a packet should be routed from a source to a destination.
An Autonomous System (AS) refers to a group of networks and routers that are uniformly managed and controlled, with independent routing policies. In the internet, each autonomous system has a unique Autonomous System Number (ASN).
SDN (Software-Defined Networking) is a network architecture method, which enables a network administrator to centrally manage and configure network devices through a central controller by separating network control and data planes, so as to implement centralized control and automation of a network. An SDN controller is an application in a Software Defined Network (SDN) that is responsible for flow control to ensure an intelligent network.
In the embodiment of the disclosure, a speed limiting processing method of a private line network is provided first, and the defect of poor flexibility in the related art is overcome at least to a certain extent.
Fig. 1 is a schematic flow chart of a speed limit processing method of a private line network in an embodiment of the disclosure, where an execution subject of the speed limit processing method of the private line network may be an SDN controller that performs speed limit processing on the private line network.
Referring to fig. 1, a speed limit processing method of a private line network according to an embodiment of the present disclosure includes the steps of:
step S110, after the first network device and the second network device establish the border gateway protocol neighbor relation, monitoring the state of the border gateway protocol neighbor relation; the first network device and the second network device are any network devices accessed to a private line network;
step S120, responding to the state change of the border gateway protocol neighbor relation from the first state to the second state, and acquiring event information related to the state change of the border gateway protocol neighbor relation;
step S130, if the event information meets the preset speed limit strategy updating triggering condition, updating the current speed limit strategy to generate a new speed limit strategy;
step S140, issuing a new speed limit strategy to the target network equipment so that the target network equipment executes the new speed limit strategy;
the target network device is a network device, in the first network device and the second network device, which has a preset network topology connection relationship with an event main body of the event information.
In the technical solution provided in the embodiment shown in fig. 1, after the first network device and the second network device establish the border gateway protocol neighbor relation, the state of the border gateway protocol neighbor relation is monitored, and in response to the change of the state of the border gateway protocol neighbor relation from the first state to the second state, event information related to the change of the state of the border gateway protocol neighbor relation is obtained, if the event information meets a preset speed limit policy update triggering condition, the current speed limit policy is updated to generate a new speed limit policy, and the new speed limit policy is issued to the target network device, so that the target network device executes the new speed limit policy.
The specific implementation of each step in fig. 1 is described in detail below: before step S110, it should be noted that, for any two network devices (such as routers or switch devices) accessing a private line network, the present disclosure may pre-establish a BGP neighbor relationship between a first network device (hereinafter referred to as Aleaf device a) and a second network device (hereinafter referred to as Aleaf device B), and exemplary, may establish a border gateway protocol attribute neighbor based on a TCP protocol (Transmission Control Protocol, transmission control protocol, abbreviated as TCP) transmission manner, that is, a TCP connection needs to be established between the first network device and the second network device that are to establish the BGP neighbor relationship, and then transmit a BGP attribute message based on the established TCP connection to establish the BGP neighbor relationship.
Specifically, BGP neighbor relationships may be configured on Aleaf device a first, pointing to the IP address of Aleaf device B, for example, based on the following commands:
router BGP 65001// sets a BGP router whose BGP process ID is 65001;
neighbor 10.0.0.2remote-as 65002// sets the BGP neighbor of router 65001 with an IP address of 10.0.0.2 and as number 65002.
BGP neighbor relations may then be similarly configured on Aleaf device B, pointing to the IP address of Aleaf device a, for example, based on the following commands:
router BGP 65002// sets a BGP router whose BGP process ID is 65002;
neighbor 10.0.0.1remote-as 65001// BGP neighbor of router 65002 is set, the IP address of the BGP neighbor is 10.0.0.1, and as number is 65001.
After the command is validated, based on BGP protocol, BGP neighbor relation can be successfully established between the first network device and the second network device, and state interworking starts.
Referring next to fig. 1, in step S110, after the first network device and the second network device establish a border gateway protocol neighbor relation, a state of the border gateway protocol neighbor relation is monitored.
In this step, after the first network device and the second network device establish the border gateway protocol neighbor relation, the SDN controller may monitor a state of the border gateway protocol neighbor relation.
The state of the border gateway protocol neighbor relation may include the following cases:
(1) idle state BGP always starts with Idle state, which denies all inbound connections. Only after BGP is started will the BGP process initialize all BGP resources, initialize TCP connections to neighbors, monitor TCP initialization messages from neighbors, and change to connected state. The start event is typically configuring a BGP process;
(2) Connect (connection) state: after entering the connect state, the BGP process waits for completion of the TCP connection (three-way handshake), and when the TCP connection is successful, BGP will send an Open message to the neighbor and enter the Open state. If the TCP session is not established, the BGP continues to monitor the neighbor initialized connection, starts a connection retry timer, and migrates to an Active state;
(3) actve (active) state: in this state, the BGP process needs to try and establish a TCP connection with the neighbor urgently, and if the TCP connection is established successfully, the BGP process clears the connection retry timer, initializes the process after completion, and sends an open message to the neighbor, and transitions to the opencount (open send) state. If the BGP process is still in an activated state due to the expiration of the connection retry timer, the process returns to the connection state and monitors the TCP session initiated by the neighbor, and the process is repeatedly circulated until the TCP session initiated by the neighbor is monitored;
(4) opencount (open send) state: with this state in place, having sent an Open message, BGP will always wait for an Open message from a neighbor. Upon receiving an Open message, each field of the message will be checked, and if there is an error, a Notification message will be sent and the Idle state will be migrated. If the received Open message is not wrong, a keepalive message is sent and the keepalive timer and the time of keepalive sending are discussed. And transitions to the OpenConfirm state;
(5) OpenConfirm state: with this state in mind, the BGP process will wait for a Kepplive or Notification message for neighbor validation. If the received keep message is the Established state, the method is migrated to the Idle state, if the received keep message is the Notification message, the method is migrated to the Idle state;
(6) established state: entering this state illustrates that the BGP peering connection is formally established, and interaction Update, keeplive and Notification messages between peers will migrate to the Idle state.
In step S120, in response to the state change of the border gateway protocol neighbor relation from the first state to the second state, event information related to the state change of the border gateway protocol neighbor relation is acquired.
In this step, when detecting that the state of BGP neighbor relation is changed from a first state (for example, the open acknowledgement state) to a second state (for example, the establishment state), the SDN controller may acquire event information related to the state change, for example: causes or factors that cause a change in state.
The first state may be any one of the above 6 states, and the second state may be any one of 5 states other than the first state.
In step S130, if the event information satisfies the preset speed limit policy update trigger condition, the current speed limit policy is updated to generate a new speed limit policy.
In this step, when the event information indicates that the user needs change, and/or when the event information indicates that the network traffic changes, a new speed limit policy may be generated according to the changed user needs and/or the changed network traffic, so as to update the current speed limit policy.
The speed limiting strategy refers to limiting the rate of data traffic in the network to ensure reasonable utilization of network resources and avoid network congestion.
For example, when the event information indicates a bandwidth change (which may affect a change in network traffic)/a new path availability (e.g., a new network topology connection relationship)/a new high priority traffic is generated, then it may be determined that the current speed limit policy needs to be updated. For example, if the new path increases bandwidth, the network parameters may be limited in a new speed limiting policy, or if new high priority traffic is generated, the network parameters may be limited in a new speed limiting policy.
Thus, new bandwidth limitation information, new network priority configuration information, and new traffic allocation rules may be involved in the new speed limit policy.
The bandwidth limitation information refers to limiting the rate of data traffic, and the bandwidth limitation is usually expressed in units of bit per second (bps) of transmission. By updating the bandwidth limitation information, fair allocation of network resources can be ensured, and excessive consumption of network bandwidth by certain traffic can be prevented, so that other traffic can be ensured to obtain enough bandwidth.
Network priority configuration information refers to settings in the network used to define and manage data traffic priorities, which are used to determine which data flows should take precedence to acquire network resources, such as: bandwidth, delay, packet loss, etc., to ensure that important or urgent data streams can be handled preferentially. For example, different data streams may be given different priorities depending on their characteristics or application types, such as: some real-time applications, such as audio, video telephony or online gaming, may require higher priority, while some non-real-time applications, such as email or web browsing, may have lower priority, and may be flexibly configured according to actual needs.
Traffic allocation rules refer to rules that allocate network resources (e.g., bandwidth) to different data flows or users, which are typically determined based on factors such as the characteristics of the data flows, the application type, the user priority, etc. Common traffic allocation rules include fairness, priority, proportionality, etc., where fairness criteria require fair allocation of resources to all data flows, priority criteria require more resources to high priority data flows, proportionality criteria require allocation of resources according to the size or proportion of the data flows, and flexible configuration can be performed according to actual requirements.
In step S140, a new speed limit policy is issued to the target network device, so that the target network device executes the new speed limit policy.
In this step, after generating the new speed limit policy, reference may be made to fig. 2, and fig. 2 is a flow chart showing how to issue the new speed limit policy to the target network device in the embodiment of the disclosure, including step S201 to step S204:
in step S201, the new speed limit policy is encoded into a specified data format.
In this step, the new speed limit policy may be encoded into a specified data format, so that the new speed limit policy may be transferred in BGP attributes, where the encoding process needs to ensure that the speed limit policy can be accurately resolved and understood.
In step S202, a custom field is created in the optional attributes of the border gateway protocol attribute; the custom field is used to carry a new speed limit policy.
In this step, in a first alternative embodiment, a custom field may be added to the Extended Communities attribute of the BGP attribute (which is an extended attribute used to convey additional information in the BGP protocol) to carry the new speed limit policy through the custom field.
In a second alternative embodiment, a custom field may be created in the Community attribute (similar to the Extended Communities attribute) of the BGP attribute to carry the new speed limit policy through the custom field.
By way of example, the following shows a command to carry a new speed limit policy by Extended Communities attribute:
IP community-list standard LIMITS permit 123:100// creates an IP standard community list named "list" and allows for specific community identifiers 123:100. In a routing protocol (e.g., BGP), community list is a method for filtering and classifying routes;
route-map LIMITS permit 10// creates a route map named "LIMIT" and allows it to number 10, the route map being adapted to modify rules of incoming or outgoing routes;
match community LIMITS// tells the route map the name of the community list to match, i.e. "LIMIT";
set IP next-hop self// set the next hop IP address as the local IP address of the send routing mapping table;
set extcommunity rt 123:100// sets the extended community attribute to 123:100, which is a method used in BGP to classify and filter routes.
In step S203, the encoded new speed limit policy and the border gateway protocol attribute after creating the custom field are encapsulated, so as to obtain encapsulation information.
In this step, after step S201 and step S202, the SDN controller may encapsulate the encoded new speed limit policy and the border gateway protocol attribute after creating the custom field to obtain encapsulation information, where the encapsulation information is a complete BGP attribute.
Wherein "encapsulation" may be understood as packaging BGP attributes after creation of custom fields as a whole with new speed limit policies so that they can be properly parsed and processed by routers.
In step S204, the encapsulation information is issued to the target network device.
In this step, the encapsulation information may be issued to a target network device, where the target network device may be a network device having a preset network topology connection relationship with an event body of the event information in the first network device and the second network device. Accordingly, assuming that the network device having the preset network topology connection relationship with the event main body is the first network device, the SDN controller may issue the encapsulation information to the first network device, and similarly, if the network device having the preset network topology connection relationship with the event main body is the second network device, the SDN controller may issue the encapsulation information to the second network device.
The event body may be a source device or an application corresponding to the event information. The network topology connection relationship refers to connection relationship and layout between each network device in the SDN network. The connection relation can be realized by collecting topology information through the SDN controller to calculate reasonable path information and sending the reasonable path information to the repeater in a flow table mode. By acquiring and analyzing the network topology connection relationship, the SDN controller can better know the connection relationship among all devices in the network.
After issuing the new speed limit policy to the target network device, the target network device may parse the encapsulation information to obtain the new speed limit policy, and then the target network device may update the local speed limit configuration item based on the new speed limit policy to execute the new speed limit policy.
For example, after obtaining the new speed limit policy, the target network device may update the local access control list ACL based on the new speed limit policy, so as to execute the new speed limit policy, or the target network device may update the local speed limit policy configuration information based on the new speed limit policy, so as to execute the new speed limit policy.
Among them, access Control List (ACL) is an access control technique based on packet filtering, which can filter the data packet on the interface according to the set condition, and allow it to pass or discard. An ACL is typically made up of a set of rules (i.e., ACL entries), each defining an access control policy that includes allowing or denying a particular type of traffic or access request. ACLs typically control network access based on conditions of source address, destination address, protocol type, port number, time, etc.
The following illustrates embodiments of the present disclosure in connection with a specific application scenario (enterprise private network management scenario):
first, BGP neighbors (i.e., aleaf device B) may be configured for Aleaf device a based on the following commands:
interface GigabitEthernet0/0// defines a network interface called gigabit Ethernet 0/0;
IP address 192.168.1.1 255.255.255.0// an IP address, i.e., 192.168.1.1, is assigned to the network interface, and a subnet mask of 255.255.255.0 is set;
router BGP 65001// initiates a BGP routing process with AS (autonomous system) number 65001;
neighbor 192.168.2.2remote-AS 65002// is configured with a BGP neighbor whose IP address is 192.168.2.2 and whose AS number is 65002.
Second, BGP neighbors (i.e., aleaf device a) may be configured for Aleaf device B based on the following commands:
interface GigabitEthernet0/0// defines a network interface called gigabit Ethernet 0/0;
IP address 192.168.2.2 255.255.255.0// an IP address is allocated to the network interface, namely 192.168.2.2, and a subnet mask is set to 255.255.255.0;
router BGP 65002// initiates a BGP routing process with AS number 65002;
neighbor 192.168.1.1remote-AS 65001// is configured with a BGP neighbor whose IP address is 192.168.1.1 and whose AS number is 65001.
Thirdly, the state of the BGP neighbor relation can be monitored through the SDN controller, and when the state of the BGP neighbor relation is changed from the first state to the second state, the SDN controller can acquire event information related to the state change through NETCONF or REST API and other modes;
fourth, when the speed limit strategy needs to be updated, the SDN controller generates BGP attributes containing the new speed limit strategy and issues the BGP attributes to the target network equipment;
fifth, the target network device may parse the BGP attribute to obtain a new speed limit policy contained therein, and then the target network device may automatically adjust a local ACL configuration.
Illustratively, when new bandwidth limitation information (e.g., 2000000 4000) is included in the new speed limit policy, the target network device may automatically adjust the local ACL configuration based on the following commands:
access-list 100permit ip any any rate-limit input 2000000 4000。
in this command, the access-list 100 creates an access control list named 100; permit IP any any denotes that communication between all IP addresses is allowed, any refers to all possible values, IP any any refers to all communication between all IP addresses; rate-limit input2000000 4000 refers to rate limiting the incoming traffic, where 2000000 is the packet rate limit per second (about 2 Mbps), 4000 is the number of bursty packets limit, i.e., if bursty traffic exceeds this limit, this traffic is dropped.
Wherein the packet rate limit per second is primarily to limit the speed at which the network device receives or processes data packets. The method takes the number of data packets received or processed per second as a measurement standard, and controls the processing speed of the network equipment, wherein the limitation is generally used for preventing the network equipment from being overloaded and ensuring the stable operation of the network equipment; the limit of the number of burst packets is mainly to limit the capacity of the network device to receive or process a large number of data packets in a short time, and it takes the number of burst data packets as a measure, and controls the capacity of the network device to receive or process burst traffic. Such limitations are typically used to prevent network devices from being overloaded for a short period of time, avoiding network device crashes or performance degradation due to traffic peaks over a short period of time.
Based on the specific embodiment, the enterprise can adjust the speed limiting strategy in real time according to the actual change of the application flow, so that the performance and resource allocation of different applications are ensured.
Referring to fig. 3, fig. 3 illustrates an architecture diagram of speed limit processing of a private line network in an embodiment of the disclosure, as illustrated in fig. 3:
a user may access a private network through an OLT device (Optical Line Terminal, a local terminal), where a leaf device and a spine device in the private network may be a router or a switch, and a BGP neighbor relationship may be established between the leaf device a and the leaf device B, so that the present disclosure may manage the leaf device and the spine device through an SDN controller based on a BGP protocol.
The Leaf device is a Leaf node in a Leaf-spine network architecture (Leaf-Spine Network Architecture), the spine device is a spine node in the Leaf-spine network architecture, the Leaf node is used for connecting terminal devices such as a server and a storage device, and the spine node is used for connecting different Leaf nodes, and the hierarchical structure enables the data center network to be more flexible and extensible and provides lower delay and higher bandwidth.
Referring to fig. 4, fig. 4 is a flow chart illustrating how an SDN controller generates a new speed limit policy in an embodiment of the disclosure, including steps S401-S404:
in step S401, when a state change of BGP neighbor relation is monitored, event information is acquired;
in step S402, when the event information satisfies a preset speed limit policy update trigger condition, updating the current speed limit policy;
in step S403, BGP attributes including the new speed limit policy are generated;
in step S404, BGP attributes are passed to the target network device.
Referring to fig. 5, fig. 5 is a flowchart illustrating how the target network device updates the speed limit policy according to an embodiment of the present disclosure, including steps S501 to S503:
in step S501, BGP attributes are received;
in step S502, analyzing BGP attributes to obtain a new speed limit policy;
In step S503, the local speed limit policy is updated.
Compared with the prior art, the technical scheme has the main advantages that:
(1) integrating border gateway protocols and SDN controllers: the technical scheme integrates the traditional border gateway protocol and the SDN controller, combines the two together, and realizes flexible speed limiting strategy adjustment and centralized management in the private network;
(2) dynamic speed limiting strategy generation and issuing: the SDN controller can generate a new speed limiting strategy according to the network state monitored in real time, package the new speed limiting strategy into a custom border gateway protocol attribute and issue the custom border gateway protocol attribute to related Aleaf equipment, so that the speed limiting strategy can be adjusted efficiently and flexibly.
Overall, by combining the border gateway protocol with the SDN controller, the present disclosure implements dynamic speed limit policy adjustment and centralized network management, thereby achieving at least the following technical effects:
first, flexibility promotes: the method and the system allow operators to dynamically adjust the speed limiting strategy on the private line network according to real-time requirements, and can quickly and accurately adapt to the application flow change or the specific customer requirements, so that the network flexibility is improved.
Second, resource optimization: by monitoring and adjusting the speed limiting strategy in real time, the method and the system can more effectively utilize network resources, ensure that each client and application operate in a proper bandwidth range, and avoid resource waste.
Thirdly, centralized management: and the SDN controller is used for realizing centralized speed limiting policy management, so that the burden of manual configuration is reduced. The network manager can manage on a unified control platform, so that the management efficiency is improved.
Fourth, automated operation: the speed limit information is transmitted through the boundary gateway protocol attribute, and the Aleaf equipment can automatically analyze and update the speed limit strategy, so that manual intervention is reduced, and the operation risk is reduced.
Fifth, high efficiency response: the present disclosure can respond quickly, whether to account for customer demand changes or traffic fluctuations, making the network operator more competitive and business agile.
In a word, the technical scheme creatively solves the problems of speed limiting and management of a private network by combining the border gateway protocol with the SDN controller, and realizes flexible speed limiting strategy adjustment and centralized management, thereby bringing more efficient, customizable and flexible network connection service for network operators and clients.
The method and the device can be applied to the scenes of opening enterprise private line business and controlling data center network flow, realize dynamic adjustment of network flow speed limiting strategies to meet performance requirements of different applications and users, improve network performance and user experience, reduce delay and congestion, and can quickly adjust the speed limiting strategies under network congestion or emergency conditions, ensure normal operation of key applications and increase robustness of the network.
The disclosure further provides a speed limiting device of the private line network, and fig. 6 shows a schematic structural diagram of the speed limiting device of the private line network in an exemplary embodiment of the disclosure; as shown in fig. 6, the speed limit processing apparatus 600 of the private line network may include a status monitoring module 610, an event information acquisition module 620, a speed limit policy update module 630, and a speed limit policy issuing module 640. Wherein:
a state monitoring module 610, configured to monitor a state of a border gateway protocol neighbor relation after the first network device and the second network device establish the border gateway protocol neighbor relation; the first network device and the second network device are any network devices accessed to the private line network;
an event information obtaining module 620, configured to obtain event information related to a state change of the border gateway protocol neighbor relation in response to the state change of the border gateway protocol neighbor relation from a first state to a second state;
the speed limit policy updating module 630 is configured to update the current speed limit policy to generate a new speed limit policy if the event information meets a preset speed limit policy update trigger condition;
a speed limit policy issuing module 640, configured to issue the new speed limit policy to a target network device, so that the target network device executes the new speed limit policy; the target network device is a network device, in the first network device and the second network device, having a preset network topology connection relationship with an event main body of the event information.
In an exemplary embodiment of the present disclosure, the state of the border gateway protocol neighbor relation includes:
idle state, connected state, active state, open send state, open acknowledge state, and set up state.
In an exemplary embodiment of the present disclosure, if the event information meets a preset speed limit policy update trigger condition, the speed limit policy update module 630 updates the current speed limit policy to generate a new speed limit policy, including:
and when the event information indicates that the user demand is changed, and/or when the event information indicates that the network traffic is changed, updating the current speed limit strategy to generate a new speed limit strategy.
In an exemplary embodiment of the present disclosure, the speed limit policy update module 630 updates the current speed limit policy to generate a new speed limit policy, including:
and generating the new speed limiting strategy according to the changed user demand and/or the changed network flow so as to update the current speed limiting strategy.
In an exemplary embodiment of the present disclosure, the new speed limit policy includes at least one of the following information: new bandwidth limitation information, new network priority configuration information, and new traffic allocation rules.
In an exemplary embodiment of the present disclosure, the speed limit policy issuing module 640 issues the new speed limit policy to the target network device, including:
encoding the new speed limit strategy into a specified data format;
creating custom fields in optional attributes of the border gateway protocol attributes; the custom field is used for carrying the new speed limiting strategy;
encapsulating the coded new speed limiting strategy and the boundary gateway protocol attribute after creating the custom field to obtain encapsulation information;
and transmitting the encapsulation information to the target network equipment.
In an exemplary embodiment of the present disclosure, the speed limit policy issuing module 640 causes the target network device to execute the new speed limit policy, including:
the target network equipment analyzes the encapsulation information to obtain the new speed limiting strategy;
the target network equipment updates a local speed limit configuration item based on the new speed limit strategy so as to execute the new speed limit strategy;
the speed limit configuration item comprises an access control list or speed limit strategy configuration information.
The specific details of each module in the speed limiting device of the private line network are described in detail in the corresponding speed limiting processing method of the private line network, so that the details are not repeated here.
It should be noted that although in the above detailed description several modules or units of a device for action execution are mentioned, such a division is not mandatory. Indeed, the features and functionality of two or more modules or units described above may be embodied in one module or unit in accordance with embodiments of the present disclosure. Conversely, the features and functions of one module or unit described above may be further divided into a plurality of modules or units to be embodied.
Furthermore, although the steps of the methods in the present disclosure are depicted in a particular order in the drawings, this does not require or imply that the steps must be performed in that particular order or that all illustrated steps be performed in order to achieve desirable results. Additionally or alternatively, certain steps may be omitted, multiple steps combined into one step to perform, and/or one step decomposed into multiple steps to perform, etc.
From the above description of embodiments, those skilled in the art will readily appreciate that the example embodiments described herein may be implemented in software, or may be implemented in software in combination with the necessary hardware. Thus, the technical solution according to the embodiments of the present disclosure may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (may be a CD-ROM, a U-disk, a mobile hard disk, etc.) or on a network, including several instructions to cause a computing device (may be a personal computer, a server, a mobile terminal, or a network device, etc.) to perform the method according to the embodiments of the present disclosure.
The present application also provides a computer-readable storage medium that may be included in the electronic device described in the above embodiments; or may exist alone without being incorporated into the electronic device.
The computer readable storage medium can be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples of the computer-readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this disclosure, a computer-readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer readable storage medium may transmit, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable storage medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
The computer-readable storage medium carries one or more programs which, when executed by one such electronic device, cause the electronic device to implement the methods described in the embodiments above.
In addition, an electronic device capable of realizing the method is provided in the embodiment of the disclosure.
Those skilled in the art will appreciate that the various aspects of the present disclosure may be implemented as a system, method, or program product. Accordingly, various aspects of the disclosure may be embodied in the following forms, namely: an entirely hardware embodiment, an entirely software embodiment (including firmware, micro-code, etc.) or an embodiment combining hardware and software aspects may be referred to herein as a "circuit," module "or" system.
An electronic device 700 according to such an embodiment of the present disclosure is described below with reference to fig. 7. The electronic device 700 shown in fig. 7 is merely an example and should not be construed to limit the functionality and scope of use of embodiments of the present disclosure in any way.
As shown in fig. 7, the electronic device 700 is embodied in the form of a general purpose computing device. Components of electronic device 700 may include, but are not limited to: the at least one processing unit 710, the at least one memory unit 720, a bus 730 connecting the different system components (including the memory unit 720 and the processing unit 710), and a display unit 740.
Wherein the storage unit stores program code that is executable by the processing unit 710 such that the processing unit 710 performs steps according to various exemplary embodiments of the present disclosure described in the above-described "exemplary methods" section of the present specification. For example, the processing unit 710 may perform as shown in fig. 1: step S110, after the first network device and the second network device establish the border gateway protocol neighbor relation, monitoring the state of the border gateway protocol neighbor relation; the first network device and the second network device are any network devices accessed to the private line network; step S120, responding to the state change of the border gateway protocol neighbor relation from a first state to a second state, and acquiring event information related to the state change of the border gateway protocol neighbor relation; step S130, if the event information meets the preset speed limit strategy updating triggering condition, updating the current speed limit strategy to generate a new speed limit strategy; step S140, the new speed limit strategy is issued to target network equipment, so that the target network equipment executes the new speed limit strategy; the target network device is a network device, in the first network device and the second network device, having a preset network topology connection relationship with an event main body of the event information.
The memory unit 720 may include readable media in the form of volatile memory units, such as Random Access Memory (RAM) 7201 and/or cache memory 7202, and may further include Read Only Memory (ROM) 7203.
The storage unit 720 may also include a program/utility 7204 having a set (at least one) of program modules 7205, such program modules 7205 including, but not limited to: an operating system, one or more application programs, other program modules, and program data, each or some combination of which may include an implementation of a network environment.
Bus 730 may be a bus representing one or more of several types of bus structures including a memory unit bus or memory unit controller, a peripheral bus, an accelerated graphics port, a processing unit, or a local bus using any of a variety of bus architectures.
The electronic device 700 may also communicate with one or more external devices 800 (e.g., keyboard, pointing device, bluetooth device, etc.), one or more devices that enable a user to interact with the electronic device 700, and/or any device (e.g., router, modem, etc.) that enables the electronic device 700 to communicate with one or more other computing devices. Such communication may occur through an input/output (I/O) interface 750. Also, electronic device 700 may communicate with one or more networks such as a Local Area Network (LAN), a Wide Area Network (WAN) and/or a public network, such as the Internet, through network adapter 760. As shown, network adapter 760 communicates with other modules of electronic device 700 over bus 730. It should be appreciated that although not shown, other hardware and/or software modules may be used in connection with electronic device 700, including, but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, data backup storage systems, and the like.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any adaptations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
Claims (10)
1. The speed limiting processing method of the private line network is characterized by comprising the following steps of:
monitoring the state of a border gateway protocol neighbor relation after the first network device and the second network device establish the border gateway protocol neighbor relation; the first network device and the second network device are any network devices accessed to the private line network;
acquiring event information related to the state change of the border gateway protocol neighbor relation in response to the state change of the border gateway protocol neighbor relation from a first state to a second state;
if the event information meets a preset speed limit strategy updating triggering condition, updating the current speed limit strategy to generate a new speed limit strategy;
Issuing the new speed limit strategy to target network equipment so that the target network equipment executes the new speed limit strategy;
the target network device is a network device, in the first network device and the second network device, having a preset network topology connection relationship with an event main body of the event information.
2. The method of claim 1, wherein the state of the border gateway protocol neighbor relation comprises:
idle state, connected state, active state, open send state, open acknowledge state, and set up state.
3. The method according to claim 1 or 2, wherein updating the current speed limit policy to generate a new speed limit policy if the event information satisfies a preset speed limit policy update trigger condition comprises:
and when the event information indicates that the user demand is changed, and/or when the event information indicates that the network traffic is changed, updating the current speed limit strategy to generate a new speed limit strategy.
4. A method according to claim 3, wherein updating the current speed limit policy to generate a new speed limit policy comprises:
And generating the new speed limiting strategy according to the changed user demand and/or the changed network flow so as to update the current speed limiting strategy.
5. The method of claim 4, wherein the new speed limit strategy comprises at least one of the following information: new bandwidth limitation information, new network priority configuration information, and new traffic allocation rules.
6. The method of claim 5, wherein issuing the new speed limit policy to a target network device comprises:
encoding the new speed limit strategy into a specified data format;
creating custom fields in optional attributes of the border gateway protocol attributes; the custom field is used for carrying the new speed limiting strategy;
encapsulating the coded new speed limiting strategy and the boundary gateway protocol attribute after creating the custom field to obtain encapsulation information;
and transmitting the encapsulation information to the target network equipment.
7. The method of claim 6, wherein the causing the target network device to execute the new speed limit policy comprises:
the target network equipment analyzes the encapsulation information to obtain the new speed limiting strategy;
The target network equipment updates a local speed limit configuration item based on the new speed limit strategy so as to execute the new speed limit strategy;
the speed limit configuration item comprises an access control list or speed limit strategy configuration information.
8. A speed limit processing device for a private line network, comprising:
the state monitoring module is used for monitoring the state of the border gateway protocol neighbor relation after the first network equipment and the second network equipment establish the border gateway protocol neighbor relation; the first network device and the second network device are any network devices accessed to the private line network;
the event information acquisition module is used for responding to the change of the state of the border gateway protocol neighbor relation from the first state to the second state and acquiring event information related to the change of the state of the border gateway protocol neighbor relation;
the speed limit strategy updating module is used for updating the current speed limit strategy to generate a new speed limit strategy if the event information meets the preset speed limit strategy updating triggering condition;
the speed limit strategy issuing module is used for issuing the new speed limit strategy to target network equipment so that the target network equipment executes the new speed limit strategy; the target network device is a network device, in the first network device and the second network device, having a preset network topology connection relationship with an event main body of the event information.
9. A computer storage medium having a computer program stored thereon, wherein the computer program, when executed by a processor, implements the speed limit processing method of a private line network according to any one of claims 1 to 7.
10. An electronic device, comprising:
a processor; and
a memory for storing executable instructions of the processor;
wherein the processor is configured to perform the speed limit processing method of the private line network of any one of claims 1 to 7 via execution of the executable instructions.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311714854.1A CN117793015A (en) | 2023-12-13 | 2023-12-13 | Speed limiting processing method and device for private line network, storage medium and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311714854.1A CN117793015A (en) | 2023-12-13 | 2023-12-13 | Speed limiting processing method and device for private line network, storage medium and electronic equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN117793015A true CN117793015A (en) | 2024-03-29 |
Family
ID=90382574
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202311714854.1A Pending CN117793015A (en) | 2023-12-13 | 2023-12-13 | Speed limiting processing method and device for private line network, storage medium and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN117793015A (en) |
-
2023
- 2023-12-13 CN CN202311714854.1A patent/CN117793015A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9948553B2 (en) | System and method for virtual network-based distributed multi-domain routing control | |
US9819540B1 (en) | Software defined network controller | |
JP6648892B2 (en) | Conformity network function chain | |
US9473414B2 (en) | Method and system for supporting packet prioritization at a data network | |
EP2680540B1 (en) | Feedback Loop for Service Engineered Paths | |
US8327002B1 (en) | BGP peer prioritization in networks | |
US9007909B2 (en) | Link layer reservation of switch queue capacity | |
US20220286409A1 (en) | Method and apparatus for configuring quality of service policy for service, and computing device | |
US20080239957A1 (en) | Ransmission Capacity Allocation Method, Communications Network, and Network Resource Management Device | |
US20060117099A1 (en) | Truncating data units | |
US20070177604A1 (en) | Network system for managing QoS | |
WO2014000292A1 (en) | Migration method, serving control gateway and system for virtual machine across data centres | |
WO2018103665A1 (en) | L2tp-based device management method, apparatus and system | |
KR20210016802A (en) | Method for optimizing flow table for network service based on server-client in software defined networking environment and sdn switch thereofor | |
CN114175583B (en) | System resource management in self-healing networks | |
CN112714071B (en) | Data transmission method and device | |
CN107508730B (en) | SDN network-based data center interconnection method and device | |
US11812378B2 (en) | User management device, BNG, and BNG user internet access method and system | |
CN117793015A (en) | Speed limiting processing method and device for private line network, storage medium and electronic equipment | |
CN112714072B (en) | Method and device for adjusting sending rate | |
Turkovic et al. | Elastic Slicing in Programmable Networks | |
JP4846382B2 (en) | Resource management device | |
KR100722656B1 (en) | Real-time service qulity providing system, media, and method thereof | |
CN114095357A (en) | Business system | |
JP2005102012A (en) | Network resource management device at application of spanning tree protocol |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |