Disclosure of Invention
The embodiment of the application aims to provide a message processing method, a message configuration method, a message processing device and communication equipment, so as to solve the problem of low message security caused by related technologies.
In order to solve the technical problems, the application is realized as follows:
in a first aspect, a method for processing a message is provided, which is applied to a first network device, and includes:
the method comprises the steps that first network equipment generates a first message, wherein a first field of the first message carries a first identifier, and the first identifier is used for associating an application corresponding to the first message with a network;
the first network device sends the first message to the second network device, wherein the first message is used for indicating to forward the message according to the first identifier.
Optionally, the method further comprises:
The first network equipment receives first information, wherein the first information is used for configuring or indicating the corresponding relation between the application and the first identifier;
The first network device generates a first message, including:
The first network device determines a first identifier corresponding to the application corresponding to the first message according to the corresponding relation between the application and the first identifier, and generates the first message according to the first identifier corresponding to the application.
Optionally, the first field of the first packet further carries a first value, where the first value indicates that the packet generated by the first network device does not need to carry a first identifier;
Or the first field of the first message also carries a second value, where the second value indicates that the message generated by the first network device needs to carry a first identifier.
Optionally, the first network device is an access side device;
and/or, the second network device is a network side device.
In a second aspect, a method for processing a message is provided, which is applied to a second network device, and includes:
the method comprises the steps that second network equipment receives a first message sent by first network equipment, wherein a first field of the first message carries a first identifier, and the first identifier is used for associating an application corresponding to the first message with a network;
and the second network equipment forwards the first message according to the first identifier.
Optionally, the method further comprises:
the second network equipment receives second information, wherein the second information is used for configuring or indicating the corresponding relation between the path and the first identifier;
The second network device forwards the first message according to the first identifier, including:
And the second network equipment determines a path corresponding to the first identifier carried in the first field according to the corresponding relation between the path and the first identifier, and forwards the first message according to the path corresponding to the first identifier.
Optionally, the first field of the first packet further carries a first value, where the first value indicates that the packet generated by the first network device does not need to carry a first identifier;
Or the first field of the first message also carries a second value, where the second value indicates that the message generated by the first network device needs to carry a first identifier.
Optionally, when the second value is carried in the first field of the first packet, the method further includes:
the second network equipment carries out application identification on the first message according to the second value to obtain user information and application information corresponding to the first message;
The second network device sends the user information and the application information to a control device; the control device is used for distributing first identifiers corresponding to the user information and the application information.
In a third aspect, a configuration method is provided, applied to a control device, including:
the control device sends first information to the first network device and/or sends second information to the second network device; the first information is used for configuring or indicating the corresponding relation between the application and the first identifier, the second information is used for configuring or indicating the corresponding relation between the path and the first identifier, and the first identifier is used for associating the application with the network.
Optionally, the method further comprises:
The control equipment acquires subscription information of a user, wherein the subscription information comprises an application of the user and a service type required by the user;
and the control equipment generates the first information and/or the second information according to the subscription information.
Optionally, the method further comprises:
the control equipment receives user information and application information sent by the second network equipment;
The control equipment allocates first identifiers corresponding to the user information and the application information, and generates the first information and/or the second information according to the allocated first identifiers.
In a fourth aspect, a packet processing apparatus is provided, which is applied to a first network device, and includes:
The generation module is used for generating a first message, wherein a first field of the first message carries a first identifier, and the first identifier is used for associating the application corresponding to the first message with a network;
the first sending module is used for sending the first message to the second network equipment, and the first message is used for indicating to forward the message according to the first identifier.
In a fifth aspect, a packet processing apparatus is provided, applied to a second network device, including:
the second receiving module is used for receiving a first message sent by first network equipment, wherein a first field of the first message carries a first identifier, and the first identifier is used for associating an application corresponding to the first message with a network;
And the second sending module is used for forwarding the first message according to the first identifier.
In a sixth aspect, there is provided a configuration apparatus applied to a control device, comprising:
a fourth sending module, configured to send the first information to the first network device and/or send the second information to the second network device; the first information is used for configuring or indicating the corresponding relation between the application and the first identifier, the second information is used for configuring or indicating the corresponding relation between the path and the first identifier, and the first identifier is used for associating the application with the network.
In a seventh aspect, there is provided a communication device comprising a processor, a memory and a program or instruction stored on the memory and executable on the processor, the program or instruction when executed by the processor implementing the steps of the method as described in the first aspect, or the steps of the method as described in the second aspect, or the steps of the method as described in the third aspect.
In an eighth aspect, there is provided a readable storage medium having stored thereon a program or instructions which when executed by a processor, performs the steps of the method as described in the first aspect, or the steps of the method as described in the second aspect, or the steps of the method as described in the third aspect.
In a ninth aspect, there is provided a computer program product comprising computer instructions which, when executed by a processor, implement the steps of the method as described in the first aspect, or the steps of the method as described in the second aspect, or the steps of the method as described in the third aspect.
By the scheme in the embodiment of the application, the first identifier of the application report Wen Tianjia can be generated, namely, the first message carrying the first identifier is used for associating the application corresponding to the first message with the network, and the first message is forwarded to the corresponding network path according to the first identifier. Therefore, not only can the differentiated forwarding of the message be realized, but also the fact that privacy information such as application information and the like is carried in the message explicitly can be avoided, so that the risk of being attacked is reduced, and the safety of the message is improved.
Detailed Description
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are some, but not all embodiments of the application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
The terms first, second and the like in the description and in the claims, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged, as appropriate, such that embodiments of the present application may be implemented in sequences other than those illustrated or described herein, and that the objects identified by "first," "second," etc. are generally of a type, and are not limited to the number of objects, such as the first object may be one or more. Furthermore, in the description and claims, "and/or" means at least one of the connected objects, and the character "/", generally means that the associated object is an "or" relationship.
The message processing method, the message configuring device and the communication equipment provided by the embodiment of the application are described in detail through specific embodiments and application scenes thereof with reference to the accompanying drawings.
Referring to fig. 1, fig. 1 is a flowchart of a message processing method according to an embodiment of the present application, where the method is applied to a first network device, as shown in fig. 1, and the method includes the following steps:
Step 11: the method comprises the steps that first network equipment generates a first message, wherein a first field of the first message carries a first identifier, and the first identifier is used for associating an application corresponding to the first message with a network;
Step 12: the first network equipment sends a first message to the second network equipment, wherein the first message is used for indicating to forward the message according to the first identifier.
In the embodiment of the present application, the first network device may be selected as an access side device, such as a customer premise equipment CPE, an access side gateway, or the like. The second network device may be selected as a network-side device, such as a network-side gateway in a metropolitan area network, a backbone network, or the like.
Optionally, the first message may be generated by the first network device (such as CPE) adding a corresponding first identifier to the message of the corresponding application.
Optionally, the first message may be an internet protocol version6 (Internet Protocol Version, IPv 6) message or an IPv4 message, etc. When the first message is an IPv6 message, the first identifier may be carried by a flow label field of an IPv6 header, or may be carried by an IPv6 extension header, where the IPv6 extension header is a message header such as DOH, HBH, or SRH. That is, the first field may be selected from a flow label field of the IPv6 header, a field in the IPv6 extension header, or the like.
Optionally, the first identifier may be predefined or preset, or may be configured or indicated by the control device. The first identifier may be any random number, may be valid locally (e.g., the current communication system), or may be globally (e.g., all communication systems).
It should be noted that the first identifier is a specific identifier, which not only characterizes the call relation between the application and the network, but also characterizes the requirements for network paths, such as the requirements for delay, packet loss, jitter, bandwidth, etc. The first identifier is not privacy information such as application information, but rather is defined for associating/binding/adhering applications and networks, for example, may be a number, a symbol, etc., so as to facilitate management. By means of the different first identifiers, applications of different service types (such as large bandwidth, low delay, low packet loss and the like) and the broadband network capable of providing corresponding services can be associated, so that differentiated forwarding of service messages is achieved, namely differentiated services of the broadband network are achieved.
In an alternative embodiment, an application response network (Application Responsive Networking, ARN) may be introduced and differentiated services of broadband services are implemented based on ARN technology. As shown in FIG. 2, the ARN connects the application and the network, and the ARN can be understood as an intermediate layer between the application and the network, can encapsulate network capability, and can hide network information from the outside, thereby facilitating application call. The ARN support is modifiable to facilitate aggregation and overwrite. For example, the application and the network may be associated/bound/glued using the identity of the ARN, i.e. the ARN ID; the ARN ID characterizes not only the call relationship between the application and the network, but also the network path requirements, such as latency, packet loss, jitter, bandwidth, etc. The ARN ID is specifically the first identifier described above, that is, the first identifier in this embodiment may be selected as the ARN ID.
By the scheme in the embodiment of the application, the first identifier of the application report Wen Tianjia can be generated, namely, the first message carrying the first identifier is used for associating the application corresponding to the first message with the network, and the first message is forwarded to the corresponding network path according to the first identifier. Therefore, not only can the differentiated forwarding of the message be realized, but also the fact that privacy information such as application information and the like is carried in the message explicitly can be avoided, so that the risk of being attacked is reduced, and the safety of the message is improved.
In addition, by means of the scheme, application identification of the access side can be unloaded, traffic classification on the access side based on application characteristics is avoided, and the problem of bulkiness of the access side is solved.
The advantages of this solution over the prior art are described below in connection with table 1. In the existing scheme, the message explicitly carries application information; in this scheme, the message carries the first identifier.
TABLE 1
In addition, the scheme of the application has the following beneficial effects:
(1) Functional efficiency aspect: because application identification and security, such as firewall, IPS/IDS and other characteristics, need to occupy a large amount of CPU and memory resources of access equipment, the scheme can offload part of application identification and security functions to the network side gateway by means of the strong data processing capacity of the network side gateway, thereby reducing the design difficulty of the access side gateway and improving the processing efficiency of the access side gateway.
(2) Security privacy aspects: the first identity (e.g., ARN ID) is an intermediary between the application and the network, has a life cycle as if it were a contract, and has the ability to create, destroy, overrun, update, check, etc. Once the information of the first identifier is found to be leaked, the information can be quickly reported and lost without affecting other user services, and a new first identifier is applied. In terms of privacy, the first identifier does not directly use the network connection identifier, and the first identifier in the message has random value ranges aiming at different users, so that the privacy is realized.
(3) Maintainability aspect: according to the scheme, the network capacity is expressed through the first identifier and is not changed by application change, so that the problem of frequent configuration change caused by application rapid iteration is solved, and the network capacity is conveniently opened to the outside in a planning mode.
Optionally, the method for processing a message in the embodiment of the present application may further include:
The first network device receives first information, where the first information is used to configure or indicate a correspondence between an application and a first identifier. For example, the corresponding relationship between the application and the first identifier may be configured or indicated for the first network device by the control device in a static or dynamic manner. The correspondence may be represented as an application feature and a first identified entry.
The process of generating the first message may include: the first network equipment determines a first identifier corresponding to the application corresponding to the first message according to the corresponding relation between the application and the first identifier, and generates the first message according to the first identifier corresponding to the application. For example, a corresponding first identifier may be added/marked for the applied message, so as to obtain a corresponding first message.
By means of the corresponding relation between the configured or indicated application and the first identifier, the corresponding first identifier can be simply, conveniently and accurately added/marked for the message of the application, and therefore differential forwarding of the message is achieved.
In the embodiment of the present application, in order to meet the diversified requirements of packet forwarding, indication information may be introduced, for example, the indication information is carried in the first field to indicate whether the packet generated by the first network device needs to carry the first identifier.
Optionally, the first field of the first packet may further carry a first value, where the first value indicates that the packet generated by the first network device does not need to carry the first identifier; or the first field of the first message may further carry a second value, where the second value indicates that the message generated by the first network device needs to carry the first identifier. For example, the first value is equal to 0 and the second value is equal to 1.
In an alternative embodiment, when the access side device (such as the access side gateway) does not have the function of enabling the first identifier, a first value (such as 0) may be carried in a first field of a message passing through the access side device (i.e., a message generated by the access side device) to indicate that the message does not need to carry the first identifier. In this case, the access side device (such as the access side gateway) may classify the messages based on the application characteristics, and then stream the different messages onto a specific network path.
In another alternative embodiment, when the access side device (such as the access side gateway) enables the function of the first identifier, but there is no correspondence between the application and the first identifier, the first field of the message passing through the access side device (i.e. the message generated by the access side device) may carry a second value (such as 1) for indicating that the message needs to carry the first identifier. In this case, as shown in fig. 3, after the ① access side gateway drains the generated message to the network side gateway, the ② network side gateway and the application identification system may perform application identification. For example, as shown in fig. 4, the network side gateway may perform application identification through the first several messages of the flow, for example, perform identification through quintuple and deep packet inspection DPI, and then ③ returns the identified user information and application information to the controller; and then, the ④ controller randomly distributes the first identifier for the corresponding application according to the service system, and simultaneously, transmits the corresponding relation between the first identifier and the application to the access side gateway, so that the access side gateway subsequently generates a message carrying the first identifier based on the corresponding relation.
In another alternative embodiment, when the access side device (such as the access side gateway) enables the function of the first identifier and has a correspondence between the application and the first identifier, the first field of the message passing through the access side device (i.e. the message generated by the access side device) may carry the corresponding first identifier, such as the identifier allocated by the controller, so as to implement differential forwarding of the message.
Referring to fig. 5, fig. 5 is a flowchart of a message processing method according to an embodiment of the present application, where the method is applied to a second network device, as shown in fig. 5, and the method includes the following steps:
step 51: the method comprises the steps that second network equipment receives a first message sent by first network equipment, wherein a first field of the first message carries a first identifier, and the first identifier is used for associating an application corresponding to the first message with a network;
Step 52: and the second network equipment forwards the first message according to the first identifier.
In the embodiment of the present application, the first network device may be selected as an access side device, such as a customer premise equipment CPE, an access side gateway, or the like. The second network device may be selected as a network-side device, such as a network-side gateway in a metropolitan area network, a backbone network, or the like.
Optionally, the first message may be generated by the first network device (such as CPE) adding a corresponding first identifier to the message of the corresponding application.
Optionally, the first message may be an IPv6 message or an IPv4 message, etc. The first field may be selected from a flow label field of the IPv6 header, or a field in the IPv6 extension header, etc.
Optionally, the first identifier may be predefined or preset, or may be configured or indicated by the control device. The first identifier may be any random number, may be valid locally (e.g., the current communication system), or may be globally (e.g., all communication systems).
It should be noted that the first identifier is a specific identifier, which not only characterizes the call relation between the application and the network, but also characterizes the requirements for network paths, such as the requirements for delay, packet loss, jitter, bandwidth, etc. The first identifier is not privacy information such as application information, but rather is defined for associating/binding/adhering applications and networks, for example, may be a number, a symbol, etc., so as to facilitate management. By means of the different first identifiers, applications of different service types (such as large bandwidth, low delay, low packet loss and the like) and the broadband network capable of providing corresponding services can be associated, so that differentiated forwarding of service messages is achieved, namely differentiated services of the broadband network are achieved.
In an alternative embodiment, an application response network ARN may be introduced, in particular as described in the above embodiment, the corresponding ARN ID being the first identification described above.
By the scheme in the embodiment of the application, the first identifier of the application report Wen Tianjia can be generated, namely, the first message carrying the first identifier is used for associating the application corresponding to the first message with the network, and the first message is forwarded to the corresponding network path according to the first identifier. Therefore, not only can the differentiated forwarding of the message be realized, but also the fact that privacy information such as application information and the like is carried in the message explicitly can be avoided, so that the risk of being attacked is reduced, and the safety of the message is improved.
Optionally, the method for processing a message in the embodiment of the present application may further include:
The second network device receives second information, where the second information is used to configure or indicate a correspondence between the path and the first identifier. Different paths can meet different service types, such as large bandwidth, low delay, low packet loss, and the like. For example, the correspondence between the path and the first identifier may be configured or indicated for the second network device by the control device in a static manner or in a dynamic manner. The correspondence may be represented as a path and a first identified entry.
The process of forwarding the first message may include: and the second network equipment determines the path corresponding to the first identifier carried in the first field according to the corresponding relation between the path and the first identifier, and forwards the first message according to the path corresponding to the first identifier.
Thus, by means of the corresponding relation between the configured or indicated path and the first identifier, the first message can be simply, conveniently and accurately forwarded to the corresponding path, and differential forwarding of the message is realized.
It should be noted that the paths may be associated with Segment Routing (SR) policies (e.g., SRv Policy), tunnels, and/or slices. That is, when forwarding the first packet to the corresponding path, the first packet may be mapped to the corresponding SR Policy, tunnel, or slice, so as to implement differentiated bearer and forwarding of the packet.
In the embodiment of the present application, in order to meet the diversified requirements of packet forwarding, indication information may be introduced, for example, the indication information is carried in the first field to indicate whether the packet generated by the first network device needs to carry the first identifier.
Optionally, the first field of the first packet may further carry a first value, where the first value indicates that the packet generated by the first network device does not need to carry the first identifier; or the first field of the first message may further carry a second value, where the second value indicates that the message generated by the first network device needs to carry the first identifier. For example, the first value is equal to 0 and the second value is equal to 1.
Optionally, when the first field of the first packet carries a second value, that is, indicates that the first identifier needs to be carried, the packet processing method may further include:
the second network equipment carries out application identification on the first message according to the second value to obtain user information and application information corresponding to the first message;
The second network equipment sends the user information and the application information to the control equipment; the user information and the application information are used for controlling the equipment to allocate a first identifier corresponding to the user information and the application information so as to realize differentiated forwarding of the message based on the first identifier.
Optionally, when the second network device (such as a network side gateway) performs application identification, the application identification may be performed through the first several packets of the flow, for example, by performing quintuple and deep packet inspection, so as to obtain corresponding application information.
Referring to fig. 6, fig. 6 is a flowchart of a configuration method according to an embodiment of the present application, where the method is applied to a control device, such as a controller. As shown in fig. 6, the method includes the steps of:
Step 61: the control device sends first information to the first network device and/or sends second information to the second network device; the first information is used for configuring or indicating the corresponding relation between the application and the first identifier, the second information is used for configuring or indicating the corresponding relation between the path and the first identifier, and the first identifier is used for associating the application with the network.
In the embodiment of the present application, the first network device may be selected as an access side device, such as a customer premise equipment CPE, an access side gateway, or the like. The second network device may be selected as a network-side device, such as a network-side gateway in a metropolitan area network, a backbone network, or the like.
Alternatively, the first identifier may be any random number, may be valid locally (e.g. the current communication system), or may be globally (e.g. all communication systems).
It should be noted that the first identifier is a specific identifier, which not only characterizes the call relation between the application and the network, but also characterizes the requirements for network paths, such as the requirements for delay, packet loss, jitter, bandwidth, etc. The first identifier is not privacy information such as application information, but rather is defined for associating/binding/adhering applications and networks, for example, may be a number, a symbol, etc., so as to facilitate management. By means of the different first identifiers, applications of different service types (such as large bandwidth, low delay, low packet loss and the like) and the broadband network capable of providing corresponding services can be associated, so that differentiated forwarding of service messages is achieved, namely differentiated services of the broadband network are achieved.
In an alternative embodiment, an application response network ARN may be introduced, in particular as described in the above embodiment, the corresponding ARN ID being the first identification described above.
By the scheme in the embodiment of the application, the first identifier can be introduced, and the application and the network are associated by utilizing the first identifier, so that the message is forwarded to the corresponding network path according to the first identifier, differential forwarding of the message can be realized, privacy information such as application information and the like can be prevented from being carried in the message explicitly, the risk of being attacked is reduced, and the safety of the message is improved.
In the embodiment of the application, the first identifier can be allocated according to the subscription information. The configuration method may further include:
The method comprises the steps that control equipment obtains subscription information of a user, wherein the subscription information comprises application of the user and service types required by the user;
And the control equipment generates the first information and/or the second information according to the subscription information. For example, a first identifier may be allocated to the application according to the subscription information, that is, a correspondence between the application and the first identifier is established, and then, according to a service requirement, a correspondence between the first identifier and a path (i.e., a tunnel/slice) is established.
In an alternative embodiment, as shown in fig. 7, the service system may issue to the controller the service type subscribed to by the user, for example: user A, application 1, the type of service needed is large bandwidth; user A, application 2, the type of service needed is low time delay; user B, application 1, the type of service needed is low packet loss. After receiving the network service subscription requirement of the user, the controller can find out the corresponding CPE, network side gateway and provider edge PE device according to the positions of the two ends of the service connection, and determine the corresponding SR policy between the CPE, network side gateway and PE device according to the user requirement, so as to obtain a corresponding path/tunnel/slice, and meanwhile, allocate a first identifier for < user, application, service type/requirement >, for example, as shown in table 2 below.
TABLE 2
| User' s |
Application of |
Service type |
First sign |
| Nail armor |
Application 1 |
Large bandwidth |
2 |
| Nail armor |
Application 2 |
Low time delay |
1025 |
| Second step |
Application 1 |
Low packet loss |
2050 |
After the first identifier is allocated, as shown in fig. 7, the controller may issue the correspondence between the application and the first identifier to the CPE, and issue the correspondence between the path and the first identifier to the network side gateway. When the user a initiates a service (as in the branch B in fig. 7) based on the application 1, the CPE may be the first identifier "2" of the report Wen Tianjia of the application 1, and the network side gateway forwards the message in the metropolitan area network and the backbone network according to the path corresponding to the first identifier "2", as shown in the boldful arrowed line in fig. 7; or when the user A initiates a service based on the application 2, the CPE can be a first identifier "1025" of the report Wen Tianjia of the application 2, and the network side gateway forwards the message in the metropolitan area network and the backbone network according to a path corresponding to the first identifier "1025"; or when the user b initiates a service based on the application 1, the CPE may be a first identifier "2050" of the report Wen Tianjia of the application 1, and the network side gateway forwards the packet in the metropolitan area network and the backbone network according to a path corresponding to the first identifier "2050".
Optionally, the configuration method in the embodiment of the present application may further include:
The control equipment receives user information and application information sent by the second network equipment; for example, the second network device may obtain user information and application information based on application identification;
The control equipment allocates first identifiers corresponding to the user information and the application information, and generates the first information and/or the second information according to the allocated first identifiers.
In an alternative embodiment, the first identification may be assigned by an identification pool of the controller. Taking broadband service as an example to distinguish large bandwidth, low delay and low packet loss, the identification pool can distinguish a large bandwidth pool, a low delay pool and a low packet loss pool. Assuming that configuration bit11 bit10 distinguishes between various services, it may be: when bit11 bit 10=00, a large bandwidth pool is indicated; when bit11 bit 10=01, a low latency pool is indicated; when bit11 bit 10=10, a low packet loss pool is indicated. When the large bandwidth, the low delay and the low packet loss exist at the same time, the distribution can be performed according to the sequence of the large bandwidth pool > the low delay pool > the low packet loss pool.
Taking the first identifier as an ARN ID, and taking the case that the broadband service distinguishes between a large bandwidth, a low delay and a low packet loss, a large bandwidth pool, a low delay pool and a low packet loss pool can be shown in fig. 8, wherein the value range of the ARN ID in the large bandwidth pool is 2-1023, the value range of the ARN ID in the low delay pool is 1024-2047, and the value range of the ARN ID in the low packet loss pool is 2048-3096. When the first identifier is allocated to the application 1 of the user a shown in the table 2, a "2" may be selected from the large bandwidth pool as the first identifier corresponding to the application 1 based on the required service type "large bandwidth"; when the first identifier is allocated to the application 2 of the user a shown in the table 2, a "1025" may be selected from the low latency pool as the first identifier corresponding to the application 2 based on the required service type "low latency"; when the first identifier is allocated to the application 1 of the user b shown in table 2, based on the required service type "low packet loss", the "2050" may be selected from the low packet loss pool as the first identifier corresponding to the application 1.
The identification pool corresponding to the first identification can be statically configured or dynamically updated. And after matching the corresponding user and application information, the controller distributes corresponding first identifiers. When the corresponding user and application information match does not exist, the first identification can be dynamically allocated to the user and the application information, a corresponding identification pool is stored, and the next match can be allocated according to the table entry.
Optionally, according to the service requirement, the correspondence/binding relationship between the first identifier and the forwarding path may be classified into a static configuration mode and a dynamic service mode, which are described below.
A) The static mode is realized by static configuration; for example, taking the case of differentiating large bandwidth, low delay and low packet loss by broadband service, a static large bandwidth service L1 path, a low delay service L2 path and a low packet loss service L3 path are respectively planned, for example:
The L1 path is: { network side gateway-core 1-border-PE 1-PE2-PE4} SRv list path;
the L2 path is: { network side gateway-border-PE 1-PE4} SRv6 list path;
The L3 path is: { network side gateway-core 2-border-PE 1-PE2-PE4} SRv list path.
The binding relation between the identification pool and the path can be realized by configuration in the following way:
ARNID:2-1023 bind L1 path;
ARNID:1024-2047 binding L2 path;
ARNID:2048-3096 binds the L3 path.
B) The dynamic service mode can be realized by the controller through a dynamic route selection mode. The controller dynamically selects an optimal link for the corresponding first identifier according to the requirements of the application on the quality, bandwidth, priority and the like of the link, monitors the quality of the network in real time, and dynamically adjusts the path for distributing the flow according to the real-time state of each link.
It should be noted that, in the message processing method provided in the embodiment of the present application, the execution body may be a message processing device, or a control module in the message processing device for executing the message processing method. In the embodiment of the application, a method for executing a message processing by a message processing device is taken as an example, and the message processing device provided by the embodiment of the application is described.
Referring to fig. 9, fig. 9 is a schematic structural diagram of a message processing apparatus according to an embodiment of the present application, where the apparatus is applied to a first network device, as shown in fig. 9, a message processing apparatus 90 includes:
The generating module 91 is configured to generate a first packet, where a first field of the first packet carries a first identifier, and the first identifier is used to associate an application corresponding to the first packet with a network;
A first sending module 92, configured to send the first message to a second network device, where the first message is used to instruct forwarding of the message according to the first identifier.
Optionally, the message processing apparatus 90 further includes:
The first receiving module is used for receiving first information, and the first information is used for configuring or indicating the corresponding relation between the application and the first identifier;
The generating module 91 is specifically configured to: and determining a first identifier corresponding to the application corresponding to the first message according to the corresponding relation between the application and the first identifier, and generating the first message according to the first identifier corresponding to the application.
Optionally, the first field of the first packet further carries a first value, where the first value indicates that the packet generated by the first network device does not need to carry a first identifier;
Or the first field of the first message also carries a second value, where the second value indicates that the message generated by the first network device needs to carry a first identifier.
Optionally, the first network device is an access side device;
and/or, the second network device is a network side device.
The message processing device 90 of the embodiment of the present application can implement the processes of the method embodiment shown in fig. 1 and achieve the same technical effects, and for avoiding repetition, the description is omitted here.
Referring to fig. 10, fig. 10 is a schematic structural diagram of a message processing apparatus according to an embodiment of the present application, where the apparatus is applied to a second network device, as shown in fig. 10, the message processing apparatus 100 includes:
A second receiving module 101, configured to receive a first packet sent by a first network device, where a first field of the first packet carries a first identifier, where the first identifier is used to associate an application corresponding to the first packet with a network;
and the second sending module 102 is configured to forward the first packet according to the first identifier.
Optionally, the message processing apparatus 100 further includes:
the third receiving module is used for receiving second information, and the second information is used for configuring or indicating the corresponding relation between the path and the first identifier;
The second sending module 102 is specifically configured to: and determining a path corresponding to the first identifier carried in the first field according to the corresponding relation between the path and the first identifier, and forwarding the first message according to the path corresponding to the first identifier.
Optionally, the first field of the first packet further carries a first value, where the first value indicates that the packet generated by the first network device does not need to carry a first identifier;
Or the first field of the first message also carries a second value, where the second value indicates that the message generated by the first network device needs to carry a first identifier.
Optionally, the message processing apparatus 100 further includes:
the identification module is used for carrying out application identification on the first message according to the second value when the second value is carried in the first field of the first message, so as to obtain user information and application information corresponding to the first message;
the third sending module is used for sending the user information and the application information to the control equipment; the control device is used for distributing first identifiers corresponding to the user information and the application information.
The message processing apparatus 100 according to the embodiment of the present application may implement the processes of the method embodiment shown in fig. 5 and achieve the same technical effects, and in order to avoid repetition, a detailed description is omitted here.
Referring to fig. 11, fig. 11 is a schematic structural diagram of a configuration device provided in an embodiment of the present application, where the configuration device 110 is applied to a control apparatus, as shown in fig. 11, and includes:
A fourth sending module 111, configured to send the first information to the first network device and/or send the second information to the second network device; the first information is used for configuring or indicating the corresponding relation between the application and the first identifier, the second information is used for configuring or indicating the corresponding relation between the path and the first identifier, and the first identifier is used for associating the application with the network.
Optionally, the configuration device 110 further includes:
the acquisition module is used for acquiring subscription information of a user, wherein the subscription information comprises an application of the user and a service type required by the user;
And the first processing module is used for generating the first information and/or the second information according to the subscription information.
Optionally, the configuration device 110 further includes:
a fourth receiving module, configured to receive user information and application information sent by the second network device;
and the second processing module is used for distributing the first identifiers corresponding to the user information and the application information and generating the first information and/or the second information according to the distributed first identifiers.
The configuration device 110 of the embodiment of the present application may implement each process of the method embodiment shown in fig. 6 and achieve the same technical effects, and in order to avoid repetition, a detailed description is omitted here.
Optionally, as shown in fig. 12, the embodiment of the present application further provides a communication device 120, including a processor 121, a memory 122, and a program or an instruction stored in the memory 122 and capable of running on the processor 121, where the program or the instruction implements each process of the foregoing embodiment of the message processing method or implements each process of the foregoing embodiment of the configuration method when executed by the processor 121, and the same technical effects can be achieved, so that repetition is avoided and no further description is given here.
The embodiment of the present application further provides a computer program product, which includes computer instructions, where the computer instructions, when executed by a processor, may implement each process of the foregoing embodiment of the message processing method shown in fig. 1 or fig. 5, or implement each process of the foregoing embodiment of the configuration method shown in fig. 6, and achieve the same technical effects, so that repetition is avoided, and no further description is given here.
The embodiment of the application also provides a readable storage medium, on which a program or an instruction is stored, where the program or the instruction can implement each process of the above-mentioned message processing method embodiment or implement each process of the above-mentioned configuration method embodiment when executed by a processor, and the same technical effects can be achieved, so that repetition is avoided, and no further description is given here.
Computer-readable media include both permanent and non-permanent, removable and non-removable media, and information storage may be implemented by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of storage media for a computer include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device. Computer-readable media, as defined herein, does not include transitory computer-readable media (transmission media), such as modulated data signals and carrier waves.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The foregoing embodiment numbers of the present application are merely for the purpose of description, and do not represent the advantages or disadvantages of the embodiments.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (e.g. ROM/RAM, magnetic disk, optical disk) comprising instructions for causing a service classification device (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to perform the method according to the embodiments of the present application.
The foregoing is merely a preferred embodiment of the present application and it should be noted that modifications and adaptations to those skilled in the art may be made without departing from the principles of the present application, which are intended to be comprehended within the scope of the present application.