The embodiments relate to the communications field, and more specifically, to a method for forwarding a packet in a network, a network node, and a network system.
With the development of the internet, internet protocol version 6 (IPv6) is a next generation IP protocol designed by the Internet Engineering Task Force to replace internet protocol version 4 (IPv4). Segment routing over IPv6 (SRv6) is a method designed based on a source routing concept to forward an IPv6 packet on a network. Packet forwarding in the SRv6 generally includes the following three types of devices: a provider edge (PE) device, a provider (P) device, and a customer edge (CE) device. The PE device and the provider device are devices in a carrier network that provides a VPN service. The CE device is a device in a customer network that uses the VPN service. The customer network may further include another device, for example, a terminal device.
To avoid a case in which data cannot be sent to the CE device due to a fault of the PE device, two PEs may be set to be connected to a same CE devices, and the two PE devices are classified into a primary PE device and a backup PE device. When the primary PE device is faulty and cannot forward data, traffic can be switched to the backup PE device. In a currently used solution, an anycast group (anycast group) is manually configured for each PE device. This configuration is relatively complex, and some data needs to be sent to the primary PE device and then forwarded by the primary PE device to the backup PE device. As a result, data is detoured, and a data transmission rate is relatively low.
The embodiments provide a method for forwarding a packet in a network, a network node, and a network system, to increase a packet transmission rate.
According to a first aspect, a method for forwarding a packet in a network is provided. The network includes a first network node, a second network node, and a third network node. The first network node is connected to both the second network node and the third network node, and both the second network node and the third network node are connected to a same private network. The method is applied to the first network node, and the method includes: generating a correspondence between a first segment identifier (SID) and a second SID, where the first SID is an identifier that corresponds to the private network and that is stored in the second network node, and the second SID is an SID of the third network node; receiving a first packet, where a destination address (DA) of the first packet is the first SID; and when it is determined that the second network node is unreachable, pushing the second SID to the first packet to generate a second packet, and sending the second packet to the third network node.
When the second network node is unreachable, the first network node forwards, to the third network node, a packet that should be sent to the second network node, so that the third network node forwards the packet to a destination device. This can avoid a problem that some packets are detoured, and increase a packet transmission rate.
With reference to the first aspect, in a possible implementation, the generating a correspondence between a first SID and a second SID includes: generating a correspondence between a locator field of the first SID and the second SID.
The first network node may obtain a private network route identifier of the second network node and the SID of the third network node, so as to bind a relationship between the second network node and the third network node. When the second network node is unreachable, the packet that should be sent to the second network node can be successfully sent to the destination device.
With reference to the first aspect, in a possible implementation, the method includes: receiving an advertisement packet sent by the second network node, where the advertisement packet includes the correspondence between the first SID and the second SID; or receiving the correspondence that is between the first SID and the second SID and that is configured by a network management device; or receiving the correspondence that is between the first SID and the second SID and that is sent by the third network node.
The first network node obtains the correspondence between the first SID and the second SID from the second network node, the network management device, or the third network node, so that the first network node determines a next node to which the first packet is transmitted.
With reference to the first aspect, in a possible implementation, the pushing the second SID to the first packet to generate a second packet includes: pushing a segment routing header (SRH) to the first packet, where the SRH includes the second SID.
The first network node pushes a SRH including the second SID to the first packet, so that the third network node successfully receives the second packet.
According to a second aspect, a method for forwarding a packet in a network is provided. The network includes a first network node, a second network node, and a third network node. The first network node is connected to both the second network node and the third network node, and both the second network node and the third network node are connected to a same private network. The third network node stores a routing table destined to the private network. The method is applied to the third network node, and the method includes: generating a correspondence between a first SID and a private network routing table, where the first SID is an identifier that corresponds to the private network and that is stored in the second network node, and the routing table is a private network routing table destined to the private network; receiving a packet sent by the first network node, where an SRH of the packet includes the first SID and the second SID; determining the private network routing table based on the first SID and the second SID; and forwarding the packet by using the private network routing table.
The third network node generates the correspondence between the first SID and the private network routing table destined to the private network, and determines, based on the first SID and the second SID, the private network routing table used to forward the packet, so that the packet can be successfully transmitted to a destination device.
With reference to the second aspect, in a possible implementation, the determining the routing table based on the first SID and the second SID includes: determining, based on a function field of the second SID, that the first SID needs to be used to determine a routing table used to forward the packet; and determining, based on the first SID and the correspondence, that the routing table used to forward the packet is the private network routing table.
The third network node may learn of, based on the function field of the second SID, the routing table used by the third network node to forward the packet, and then the third network node determines, based on the first SID and the correspondence between the first SID and the private network routing table, that the routing table used to forward the packet is the private network routing table, so that the third network node may learn of a DA used to forward the packet.
With reference to the second aspect, in a possible implementation, the forwarding the packet by using the private network routing table includes: deleting the SRH of the packet, searching the private network routing table by using a DA of the packet whose SRH is deleted, and forwarding the packet whose SRH is deleted based on a matched routing entry.
The third network node deletes the SRH of the packet, and searches, based on the DA of the packet whose SRH is deleted, a private network route used to forward the packet, so that the packet can be successfully forwarded to the destination device.
With reference to the second aspect, in a possible implementation, before the generating a correspondence between a first SID and a private network routing table, the method further includes: receiving the first SID sent by the second network node.
With reference to the second aspect, in a possible implementation, before the generating a correspondence between a first SID and a private network routing table, the method further includes: receiving a route that is from the second network node to the private network and that is sent by the second network node; and adding the route from the second network node to the private network to the private network routing table.
The third network node obtains the route from the second network node to the private network, so that the third network node may subsequently learn of the private network route used to forward the packet, and the third network node forwards the packet to the destination device.
With reference to the second aspect, in a possible implementation, the method further includes: sending a correspondence between the first SID and the second SID to the first network node.
According to a third aspect, a network node is provided. The network includes a first network node, a second network node, and a third network node. The first network node is connected to both the second network node and the third network node, and both the second network node and the third network node are connected to a same private network. The network node is the first network node, and the network node includes: a processing unit, configured to generate a correspondence between a first SID and a second SID, where the first SID is an identifier that corresponds to the private network and that is stored in the second network node, and the second SID is an SID of the third network node; and a receiving unit, configured to receive a first packet, where a DA of the first packet is the first SID, where when it is determined that the second network node is unreachable, the processing unit is further configured to push the second SID to the first packet to generate a second packet, and send the second packet to the third network node.
With reference to the first aspect, in a possible implementation, the processing unit is configured to generate a correspondence between a locator field of the first SID and the second SID.
With reference to the third aspect, in a possible implementation, the processing unit is further configured to: receive an advertisement packet sent by the second network node, where the advertisement packet includes the correspondence between the first SID and the second SID; or receive the correspondence that is between the first SID and the second SID and that is configured by a network management device; or receive the correspondence that is between the first SID and the second SID and that is sent by the third network node.
With reference to the third aspect, in a possible implementation, the processing unit is further configured to push an SRH to the first packet, where the SRH includes the second SID.
According to a fourth aspect, a network node is provided. The network includes a first network node, a second network node, and a third network node. The first network node is connected to both the second network node and the third network node, and both the second network node and the third network node are connected to a same private network. The third network node stores a routing table destined to the private network. The network node is the third network node, and the network node includes: a processing unit, configured to generate a correspondence between a first SID and a private network routing table, where the first SID is an identifier that corresponds to the private network and that is stored in the second network node, and the routing table is a private network routing table destined to the private network; a processing unit, configured to generate a packet sent by the first network node, where an SRH of the packet includes the first SID and the second SID, where the processing unit is further configured to determine the private network routing table based on the first SID and the second SID; and a sending unit, configured to forward the packet by using the private network routing table.
With reference to the fourth aspect, in a possible implementation, the processing unit is configured to determine, based on a function field of the second SID, that the first SID needs to be used to determine a routing table used to forward the packet; and the processing unit is further configured to determine, based on the first SID and the correspondence, that the routing table used to forward the packet is the private network routing table.
With reference to the fourth aspect, in a possible implementation, the processing unit is further configured to: delete the SRH of the packet, search the private network routing table by using a DA of the packet whose SRH is deleted, and forward the packet whose SRH is deleted based on a matched routing entry.
With reference to the fourth aspect, in a possible implementation, the receiving unit is specifically configured to receive the first SID sent by the second network node.
With reference to the fourth aspect, in a possible implementation, the receiving unit is further configured to receive a route that is from the second network node to the private network and that is sent by the second network node; and the processing unit is further configured to add the route from the second network node to the private network to the private network routing table.
With reference to the fourth aspect, in a possible implementation, the sending unit is further configured to send a correspondence between the first SID and the second SID to the first network node.
According to a fifth aspect, a network node is provided. The network node includes a transceiver, a processor, and a memory. The processor is configured to control the transceiver to receive and send a signal. The memory is configured to store a computer program. The processor is configured to invoke the computer program from the memory and run the computer program, so that the network node performs the method in any one of the first aspect or the possible implementations of the first aspect.
In an implementation, the network node is a communications chip, the sending unit may be an input circuit or interface of the communications chip, and the sending unit may be an output circuit or interface of the communications chip.
According to a sixth aspect, a network node is provided. The network node includes a transceiver, a processor, and a memory. The processor is configured to control the transceiver to receive and send a signal. The memory is configured to store a computer program. The processor is configured to invoke the computer program from the memory and run the computer program, so that the network node performs the method in any one of the second aspect or the possible implementations of the second aspect.
In an implementation, the network node is a communications chip, the sending unit may be an input circuit or interface of the communications chip, and the sending unit may be an output circuit or interface of the communications chip.
According to a seventh aspect, a network system is provided. The network system includes the network node according to any one of the third aspect, the fourth aspect, or the possible implementations of the third aspect or the fourth aspect.
According to an eighth aspect, a computer program product is provided. The computer program product includes computer program code. When the computer program code is executed by a network device, the network node is enabled to perform the method according to any one of the first aspect, the second aspect, or the possible implementations of the first aspect or the second aspect.
According to a ninth aspect, a computer-readable medium is provided. The computer-readable medium stores program code, and the program code includes the method according to any one of the first aspect, the second aspect, or the possible implementations of the first aspect or the second aspect.
The following describes solutions of the embodiments with reference to accompanying drawings.
To better understand the solutions of the embodiments, the following describes related technologies used in the solutions of the embodiments.
CE device: A CE device is a border router on a network. The CE device has a route of a customer network on a local site and is connected to a PE router. The customer network may further include another device, for example, a terminal device.
PE device: A PE device is connected to each of CE devices of different customers, and uses a VPN routing forwarding (VRF) table to distinguish the different customers. The PE router learns of a virtual private network (VPN) customer private network route from a CE directly connected to the PE router by using a PE-CE routing protocol, then changes the private network route to a route distinguisher (RD) with an IPv4 prefix by using a border gateway protocol (BGP) peer relationship, sends, to a remote PE, the route distinguisher with an IPv4 prefix through a multiprotocol extensions for border gateway protocol (MP-BGP), where the RD uniquely identifies the VRF, and also transmits the customer VPN route obtained from the remote PE to a proper directly connected CE router.
A direct routing protocol between the CE and the PE may be a static routing protocol, a routing information protocol (RIP), an open shortest path first (OSPF) protocol, an intermediate system-to-intermediate system intra-domain routing information exchange protocol (IS-IS), or a BGP. This is not limited in this embodiment.
Provider (P) device: A provider device is a core router device of a service provider and is responsible for fast packet forwarding. The provider device is not connected to any customer device, does not participate in interaction of any customer route, and does not learn of any customer route.
Additionally, it may be appreciated that the foregoing device may alternatively be a node that can implement packet encapsulation, packet forwarding, and packet decapsulation, for example, a switch. The foregoing device may also be referred to as a network element, a node, or another name.
For ease of understanding of the embodiments, several concepts are first briefly described.
1. SRv6 is a method based on a source routing concept to forward an IPv6 packet on a network. Based on segment routing (SR) on an IPv6 forwarding plane, a segment routing header (SRH) is inserted into the IPv6 packet, and an explicit IPv6 address stack is pushed into the SRH. An intermediate node is used to continuously perform operations of updating a destination address (DA) and offsetting the address stack to complete hop-by-hop forwarding.
2. A VPN is a private network established on a public network. The VPN has advantages such as good privacy, high flexibility, and strong scalability.
3. An SRv6 segment identifier (SID) is a 128-bit number, and may also be usually referred to as an SID. The SID is an instantiated IPv6 address, and this type of IPv6 address is assigned a unique function. One SRv6 SID can represent one node, one link, one VPN of a Layer 2 (L2) private line, one VPN of a Layer 3 (L3) private line, or one service. It can be said that the SRv6 SID can be used to define any network function. The SRv6 SID is a network instruction.
In a process of forwarding an SRv6 packet, the intermediate device needs to be used to continuously perform the operations of updating the DA and offsetting the address stack to complete hop-by-hop packet forwarding. In this case, if an egress device is faulty, the packet cannot be sent to a destination device. In a currently used solution, an anycast group is manually configured for each egress PE device, so that the egress PE device externally advertises a same anycast segment identifier (anycast segment identifier). For example, as shown in
Therefore, a method that can increase the packet transmission rate is urgently required.
First, second, and various numbers in the embodiments shown below are merely used for differentiation for ease of description, and are not used to limit the scope of the embodiments, for example, used to distinguish different network nodes.
The method provided in the embodiments is described in detail below with reference to the accompanying drawings.
In the embodiments shown below, optionally, a first network node is a provider device. A second network node is a PE device. A third network node is a PE device. The first network node is connected to both the second network node and the third network node, and both the second network node and the third network node are connected to a same private network.
The following uses interaction between the first network node, the second network node, and the third network node as an example to describe the embodiments in detail.
Step 310: A first network node generates a correspondence between a first SID and a second SID. The first SID is an identifier that corresponds to a private network and that is stored in a second network node, and the second SID is an SID of a third network node.
Optionally, the correspondence between the first SID and the second SID may be a correspondence between a locator field of the first SID and the second SID.
Optionally, the first network node may receive an advertisement packet sent by the second network node, where the advertisement packet includes the correspondence between the first SID and the second SID.
Optionally, the first network node may alternatively receive the correspondence that is between the first SID and the second SID and that is configured by a network management device.
Optionally, the first network node may alternatively receive the correspondence that is between the first SID and the second SID and that is sent by the third network node.
For example, the first SID may be 200::100. For example, the second SID may be 300::200.
Step 320: The first network node receives a first packet. A destination address of the first packet is the first SID.
Optionally, the first packet may be sent by another PE device. For example, as shown in
Optionally, after receiving the first SID, the first network node generates a fast reroute (FRR) backup protection entry of the second SID. Table 1 shows a part of a local forwarding information base (FIB) table of the first network node. The third row in Table 1 is a backup route of the first network node.
Step 330: The first network node generates a second packet. When it is determined that the second network node is unreachable, the second SID is pushed to the first packet to generate the second packet.
Optionally, that the second network node is unreachable may be understood as that the second network node is faulty, or that the second network node is unreachable may be understood as that a link between the second network node and a customer node directly connected to the second network node is faulty. This is not limited in the embodiments.
Optionally, after receiving the first packet, the first network node needs to search the local FIB table of the first network node, namely, Table 1. When the second network node is unreachable, the first network node finds a backup route of the second network node, where a DA of the backup route is the third network node. In other words, the first network node needs to send the first packet to a destination device by using the backup route of the second network node.
Optionally, before sending the first packet to the third network node, the first network node needs to generate the second packet. For example, the first network node needs to push an SRH to the first packet, and a segment list (SL) in the SRH may include the second SID and an address of the third network node. In this case, the first network node generates the second packet to be sent to the third network node. For example, a first layer in the SL in the SRH may be a DA, namely, an address of the second network node. For example, the address of the second network node may be 200::100/128. A second layer may be the second SID. For example, the second SID may be 300::200. At the same time, the first network node modifies a DA in an IPv6 packet header to the second SID, and forwards the packet according to the longest match rule of IP routing.
For example, as shown in
Step 340: The third network node generates a correspondence between the first SID and a private network routing table. The first SID is the identifier that corresponds to the private network and that is stored in the second network node, and the routing table is a private network routing table destined to the private network.
Optionally, before generating the correspondence between the first SID and the private network routing table, the third network node needs to receive the first SID sent by the second network node.
Optionally, before generating the correspondence between the first SID and the private network routing table, the third network node receives a route that is from the second network node to the private network and that is sent by the second network node.
Optionally, the third network node needs to add the route from the second network node to the private network to the private network routing table. In addition, the third network node further needs to record a mapping relationship between the first SID and the private network routing table in a local remote segment identifier (remote SID) table of the third network node, for example, a mapping relationship shown in Table 2.
Optionally, the third network node further needs to deliver the second SID to a local segment identifier table of the third network node, and set a function corresponding to the second SID as searching the remote segment identifier table. Table 3 shows the local segment identifier table.
It may be understood that the second network node needs to send the route from the second network node to the private network to the third network node, and the third network node may add the route from the second network node to the private network to the private network routing table of the third network node as a backup route.
Step 350: The third network node receives the packet sent by the first network node, namely, the second packet. An SRH of the second packet includes the first SID and the second SID.
For example, in the second packet shown in
Step 360: The third network node determines the private network routing table. The private network routing table is a routing table that needs to be used by the third network node to forward the packet, namely, the private network routing table that originally needs to be used by the second network node to forward the packet.
Optionally, the third network node determines the private network routing table based on the first SID and the second SID. For example, the third network node searches, based on a DA of the second packet, namely, the second SID, for the function corresponding to the second SID in the local remote segment identifier table of the third network node, that is, searches the remote segment identifier table.
Optionally, the third network node determines, based on a function field of the second SID, that the first SID needs to be used to determine the routing table used to forward the packet. The third network node determines, based on the correspondence between the first SID and the private network routing table, the routing table used to forward the packet, and the routing table is the private network routing table.
For example, the third network node may determine, based on the local segment identifier table (for example, Table 3) and the second SID, the function field corresponding to the second SID. The function field corresponding to the second SID indicates that the third network node needs to search the local remote segment identifier table (for example, Table 2) of the third network node, then searches the corresponding routing table based on the first SID, and finds, based on the correspondence between the first SID and the private network routing table, the routing table used to forward the packet.
Step 370: Forward the packet.
Optionally, the third network node forwards the packet by using the private network routing table.
Optionally, the third network node needs to delete the SRH of the packet, searches the private network routing table by using a destination address in a packet header of the packet whose SRH is deleted, namely, the first packet, and forwards the packet whose SRH is deleted based on a matched routing entry.
For example, as shown in
For example, as shown in
For example, as shown in
For example, as shown in
It should be understood that sequence numbers of the foregoing processes do not mean execution sequences in the embodiments. The execution sequences of the processes should be determined according to functions and internal logic of the processes, and should not be construed as any limitation on the implementation processes of the embodiments.
The foregoing describes in detail the method for forwarding the packet in the network in the embodiments with reference to
An embodiment provides a network node. The following describes a structure and functions of the network node with reference to
The receiver 11 is configured to receive a first packet, where a DA of the first packet is the first SID.
When it is determined that the second network node is unreachable, the processor 13 is further configured to push the second SID to the first packet to generate a second packet.
The transmitter 12 is configured to send the second packet to the third network node.
The processor 13 and the memory 14 may be combined into a processing apparatus. The processor 13 is configured to execute program code stored in the memory 14, to implement the foregoing functions. In a specific implementation, the memory 14 may be integrated into the processor 13, or independent of the processor 13.
It should be understood that the network node 10 may correspond to the first network node in the method 300 for forwarding the packet in the network according to the embodiments, and the network node 10 may include units configured to perform the method performed by the first network node in the method 300 for forwarding the packet in the network in
An embodiment further provides a network node. The following describes a structure and functions of the network node with reference to
The receiving unit 21 may be implemented by software or hardware. When being implemented by the hardware, the receiving unit 21 may be the receiver 11 in
An embodiment further provides a network node. The following describes a structure and functions of the network node with reference to
The receiver 31 is configured to receive a packet sent by a first network node, where an SRH of the packet includes the first SID and a second SID.
The processor 33 is further configured to determine the private network routing table based on the first SID and the second SID.
The transmitter 32 is configured to forward the packet by using the private network routing table.
The processor 33 and the memory 34 may be combined into a processing apparatus. The processor 33 is configured to execute program code stored in the memory 34, to implement the foregoing functions. In a specific implementation, the memory 34 may be integrated into the processor 33, or independent of the processor 33.
It should be understood that the network node 30 may correspond to the third network node in the method 300 for forwarding the packet in the network according to the embodiments, and the network node 30 may include units configured to perform the method performed by the third network node in the method 300 for forwarding the packet in the network in
An embodiment further provides a network node. The following describes a structure and functions of the network node with reference to
The receiving unit 41 and the sending unit 42 each may be implemented by software or hardware. When being implemented by the hardware, the receiving unit 41 may be the receiver 31 in
It should be understood that the processor in the embodiments may be a central processing unit (CPU), or may further be another general-purpose processor, a digital signal processor (DSP), an application-specific integrated circuit (ASIC), a field programmable gate array (FPGA), or another programmable logic device, discrete gate or transistor logic device, discrete hardware component, or the like. The general-purpose processor may be a microprocessor, or the processor may be any conventional processor or the like.
It may be understood that the memory in the embodiments may be a volatile memory or a nonvolatile memory, or may include a volatile memory and a nonvolatile memory. The nonvolatile memory may be a read-only memory (ROM), a programmable read-only memory (PROM), an erasable programmable read-only memory (EPROM), an electrically erasable programmable read-only memory (EEPROM), or a flash memory. The volatile memory may be a random access memory (RAM), used as an external cache. Through example but not limitative description, many forms of random access memories may be used, for example, a static random access memory (SRAM), a dynamic random access memory (DRAM), a synchronous dynamic random access memory (SDRAM), a double data rate synchronous dynamic random access memory (DDR SDRAM), an enhanced synchronous dynamic random access memory (ESDRAM), a synchronous link dynamic random access memory (SLDRAM), and a direct rambus random access memory (DR RAM).
An embodiment further provides a network system.
All or some of the foregoing embodiments may be implemented by using software, hardware, firmware, or any combination thereof. When software is used to implement the embodiments, the foregoing embodiments may be implemented or partially in a form of a computer program product. The computer program product includes one or more computer instructions. When the computer program instructions are loaded or executed on a computer, the procedures or functions according to the embodiments are all or partially generated. The computer may be a general-purpose computer, a special-purpose computer, a computer network, or another programmable apparatus. The computer instructions may be stored in a computer-readable storage medium or may be transmitted from a computer-readable storage medium to another computer-readable storage medium. For example, the computer instructions may be transmitted from a website, computer, server, or data center to another website, computer, server, or data center in a wired (for example, infrared, radio, or microwave) manner. The computer-readable storage medium may be any usable medium accessible by a computer, or a data storage device, for example, a server or a data center, integrating one or more usable media. The usable medium may be a magnetic medium (for example, a floppy disk, a hard disk, or a magnetic tape), an optical medium (for example, a DVD), or a semiconductor medium. The semiconductor medium may be a solid-state drive.
The term “and/or” describes only an association relationship for describing associated objects and represents that three relationships may exist. For example, A and/or B may represent the following three cases: only A exists, both A and B exist, and only B exists. In addition, the character “I” generally indicates an “or” relationship between the associated objects.
A person of ordinary skill in the art may be aware that, in combination with the examples described in the embodiments, units and algorithm steps may be implemented by electronic hardware or a combination of computer software and electronic hardware. Whether the functions are performed by hardware or software depends on particular applications and design constraints of the solutions. A person of ordinary skill in the art may use different methods to implement the described functions for each particular application, but it should not be considered that the implementation goes beyond the scope of the embodiments.
It may be clearly understood by a person of ordinary skill in the art that, for the purpose of convenient and brief description, for a detailed working process of the foregoing system, apparatus, and unit, refer to a corresponding process in the foregoing method embodiment, and details are not described herein again.
In the several embodiments provided, it should be understood that the disclosed system, apparatus, and method may be implemented in other manners. For example, the described apparatus embodiment is merely an example. For example, division into the units is merely logical function division and may be other division in an actual implementation. For example, a plurality of units or components may be combined or integrated into another system, or some features may be ignored or not performed. In addition, the displayed or discussed mutual couplings or direct couplings or communication connections may be implemented through some interfaces. The indirect couplings or communication connections between the apparatuses or units may be implemented in electronic, mechanical, or other forms.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one position, or may be distributed on a plurality of network units. Some or all of the units may be selected based on actual requirements to achieve the objectives of the solutions of the embodiments.
In addition, functional units in the embodiments may be integrated into one processing unit, or each of the units may exist alone physically, or two or more units are integrated into one unit.
When the functions are implemented in the form of a software functional unit and sold or used as an independent product, the functions may be stored in a computer-readable storage medium. Based on such an understanding, the solutions of the embodiments essentially, or the part contributing to the prior art, or some of the solutions may be implemented in a form of a computer software product. The computer software product is stored in a storage medium, and includes several instructions for instructing a computer device (which may be a personal computer, a server, or a network device) to perform all or some of the steps of the methods described in the embodiments. The foregoing storage medium includes any medium that can store program code, for example, a USB flash drive, a removable hard disk, a ROM, a RAM, a magnetic disk, or an optical disc.
The foregoing descriptions are merely specific implementations of embodiments, and are non-limiting. Any variation or replacement readily figured out by a person of ordinary skill in the art within the scope disclosed shall fall within the scope of the embodiments.
Number | Date | Country | Kind |
---|---|---|---|
201910179237.3 | Mar 2019 | CN | national |
This application is a continuation of International Application No. PCT/CN2020/078810, filed on Mar. 11, 2020, which claims priority to Chinese Patent Application No. 201910179237.3, filed on Mar. 11, 2019, both of which are hereby incorporated by reference in their entireties. The disclosures of the aforementioned applications are hereby incorporated by reference in their entireties.
Number | Date | Country | |
---|---|---|---|
Parent | PCT/CN2020/078810 | Mar 2020 | US |
Child | 17465142 | US |