The present disclosure relates to the field of communications technologies, and in particular, to a virtual network protection method and apparatus.
As Internet technologies develop, especially as data centers (DC) develop rapidly, clients' requirements on transport network traffic are increasingly high. In addition, as clients' dynamically changing requirements constantly increase, a conventional manner of leasing a fixed dedicated line or a dedicated network service can no longer meet this type of dynamic requirements for large bandwidth changes.
In order to effectively improve resource utilization efficiency and provide a client with sufficient configuration flexibility, a physical network may be abstracted by using a network virtualization technology, and then partitioned to construct different virtual networks according to a service access requirement (for example, how to connect multiple client DCs) of a client, where the virtual networks are provided to the client as a whole. Further, a client dynamically establishes, according to a service characteristic and a requirement of the client, a connection between two service access nodes of the client on a virtual network leased by the client, to transmit data of the client. In network virtualization, a physical network resource is sliced into virtual network resources at a fine granularity by using a virtualization technology on a shared physical platform, and abstraction, slicing, and combination are further performed based on the virtual network resources, to form multiple parallel programmable virtual networks that are mutually isolated. By using the network virtualization technology, multiple virtual networks may be provided on a physical network for different users to use. These users are not affected by each other, and users using the virtual network have same user experience as those exclusively using the physical network.
Definitions of a network and a resource are as follows: Resources may be considered as discrete network components, such as a node, a link, and bandwidth on a link. A network may be considered as a pool for storing these resources, and these resources are combined orderly to form a specific shape, so as to form a network topology. Currently, an operator mostly provides a connection service to a client. A connection means that some resources are selected, and these resources are linked together to implement end-to-end transmission of a service. Along with population of data center-type applications, an operator may consider providing a virtual network service to a client, that is, providing the client with a virtual network (including resources). This brings the client more flexibility, and the client may establish a connection by itself on a virtual network leased by the client. The network, the resource, and the connection herein may include a physical network, a physical resource, and a physical connection, and may further include a virtual network, a virtual resource, and a virtual connection.
On a transport network, according to operation and maintenance habits of a transport network operator, when a transport connection service is provided to a client, protection and recovery capabilities generally need to be provided at the same time to ensure reliability of a service connection. This is also applicable when a virtual network service is provided to a client. That is, when a fault occurs on a virtual network, the operator needs to help the client quickly recover a virtual network resource leased by the client, and recover transmission of various types of service data carried on the virtual network. In the prior art, protection and recovery are usually available only to an established service connection. For example, in terms of protection, when establishing a connection for a client, a transport operator establishes two connections that have a same source and sink, one as a working path and the other as a protection path, thereby implementing 1+1 or 1:1 connection protection. When the working path is normal, service data is transmitted on the working path. When a fault occurs on the working path, service data is switched to the protection path for transmission. In the prior art, protection and recovery are available to an established service connection only. For example, if protection and recovery are only available to an established connection on a virtual network, when a fault occurs on a link resource that is on the virtual network and on which no connection is established, the virtual network cannot be protected. This reduces user experience of a client.
In view of this, embodiments of the present disclosure provide a virtual network protection method and apparatus, to resolve a problem that when a fault occurs on a virtual network, the virtual network cannot be protected.
According to a first aspect, an embodiment of the present disclosure provides a virtual network protection method, including: receiving a virtual network topology establishment request message, where the virtual network topology establishment request message carries a virtual network resource parameter and/or a virtual network protection and recovery type; reserving a working physical resource and a protection physical resource in an idle physical resource of a physical network according to the virtual network resource parameter and/or the virtual network protection and recovery type; and mapping a virtual link on a virtual network to the working physical resource and the protection physical resource.
According to a second aspect, an embodiment of the present disclosure provides a virtual network protection apparatus, comprising:
a receiver, configured to receive a virtual network topology establishment request message, wherein the virtual network topology establishment request message carries a virtual network resource parameter and/or a virtual network protection and recovery type;
a processor, configured to reserve a working physical resource and a protection physical resource in an idle physical resource of a physical network according to the virtual network resource parameter and/or the virtual network protection and recovery type; and map a virtual link on a virtual network to the working physical resource and the protection physical resource.
To describe the technical solutions in the embodiments of the present disclosure more clearly, the following briefly describes the accompanying drawings required for describing the background and the embodiments. Apparently, the accompanying drawings in the following description show merely some embodiments of the present disclosure, and a person of ordinary skill in the art may still derive other accompanying drawings or embodiments according to these drawings or description without creative efforts, and the present disclosure is intended to cover all these derived accompanying drawings or embodiments.
To make the objectives, technical solutions, and advantages of the present disclosure clearer and more comprehensible, the following further describes the present disclosure in detail with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely used to explain the present disclosure but are not intended to limit the present disclosure. Apparently, the described embodiments are merely some but not all of the embodiments of the present disclosure. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments of the present disclosure without creative efforts shall fall within the protection scope of the present disclosure.
Specifically, a physical network shown in
It is assumed that a client has three DCs: a DC1, a DC2, and a DC3, and needs to lease the physical network on the transport network to transmit traffic between the DC1, the DC2, and the DC3. The DC1, the DC2, and the DC3 are respectively connected to the nodes B, F, and D of the physical network. Therefore, the nodes B, F, and D are service access nodes of the client. The physical network shown in
The following concepts are used in the following description process, and are explained herein:
Virtual link: a connection between any two adjacent virtual nodes on a virtual network topology. A virtual link provides a bandwidth resource that may be used by one or more virtual connections.
Virtual connection: a path connection, from a source virtual node to a sink virtual node on a virtual network topology, used to carry a data service. A virtual connection passes through at least one virtual link, and occupies a part of or all bandwidth resources in the virtual link through which the virtual connection passes.
Physical link: a connection between any two adjacent physical nodes on a physical network topology. A physical link provides a bandwidth resource that may be used by one or more physical connections. Physical connection: a path, from a source physical node to a sink physical node on a physical network topology, used to carry a data service. A physical connection passes through at least one physical link, and occupies a part of or all bandwidth resources in the physical link passed through.
S201. The C-C requests the T-C to establish a virtual network topology.
The C-C sends a virtual network topology establishment request message to the T-C. The virtual network topology establishment request message carries one or both of a virtual network resource parameter and a virtual network protection and recovery type. In a specific implementation process, the virtual network resource parameter may include transmission traffic between any two service access nodes, or may include virtual network topology information. The virtual network topology information may include virtual node information and virtual link information. The virtual node information may include a node identifier of each virtual node on the virtual network topology. The virtual link information may include a connection relationship between virtual nodes and transmission bandwidth of a virtual link. Specifically, the virtual network protection and recovery type may include 1+1 virtual topology protection, 1:1 virtual topology protection, and the like. In 1+1 virtual topology protection, for physical nodes corresponding to virtual nodes at two ends of each virtual link, using configuration for a single direction as an example, a dual feed connection is configured for a transmit end. That is, a service is sent on both a working path and a protection path; and a selective receiving connection is configured for a receive end, so that a service may be received from the working path or the protection path selectively according to, for example, a fault status of the link. In 1:1 virtual topology protection, for physical nodes corresponding to virtual nodes at two ends of each virtual link, using configuration for a single direction as an example, a selective bridging connection is configured for a transmit end, so that a service may be sent from a working path or a protection path selectively according to, for example, a fault status of the link; and a selective receiving connection is configured for a receive end, so that a service may be received from the working path or the protection path according to a fault status of the link. Because a link and a service on a transport network are usually bidirectional, generally both sending and receiving are configured on a node at one end of the link.
In an example of an implementation of the present disclosure, the T-C establishes a virtual network topology. Specifically, the virtual network resource parameter includes information about a requirement of a client for a virtual network resource. For example, the virtual network resource parameter may include traffic requirement matrix information between any two DCs. Table 1 describes traffic requirement matrix information between every two of the three DCs shown in
In another example, the C-C plans a virtual network topology. Specifically, the C-C may plan, according to traffic requirement matrix information between any two DCs, a virtual network topology meeting traffic requirement matrix information between DCs. The virtual network resource parameter includes virtual network topology information planned by the C-C, such as virtual node information and virtual link information. Table 2 describes virtual network topology information shown in
The planned virtual network topology meets the traffic requirement matrix information of the client. For example, required traffic of 3.75 Gbps between the DC1 and the DC2 may be carried on vNE1-vNE2;
required traffic of 7.5 Gbps between the DC1 and the DC3 may be carried on vNE1-vNE3; and
required traffic of 5 Gbps between the DC2 and the DC3 may be carried on vNE2-vNE3.
S202. The T-C establishes a virtual network topology for the C-C.
The T-C plans a working physical resource and a protection physical resource in an idle physical resource of the physical network according to the virtual network resource parameter and the virtual network protection and recovery type in the virtual network topology establishment request message sent by the C-C, and maps the virtual network to the working physical resource and the protection physical resource. The idle physical resource of the physical network includes an available physical resource that is not leased to or reserved for the virtual network, and that is not used by another connection. Preferably, the working physical resource and the protection physical resource are physically separated. In a specific implementation process, as an example for illustration, the virtual network protection and recovery type is 1+1 virtual topology protection or 1:1 virtual topology protection.
In an example of an implementation of the present disclosure, the T-C establishes a virtual network topology. The T-C may plan a virtual network topology according to a traffic requirement between any two DCs that is sent by the C-C. In addition, the T-C may plan two physical network resources in the idle physical resource of the physical network according to traffic requirement matrix information between any two DCs that is sent by the C-C and according to the virtual network protection and recovery type. For example, according to the traffic requirement matrix information between the DCs described in Table 1, the T-C may reserve a working physical resource of 3.75 Gbps on physical links B-A and A-F, and reserve a protection physical resource of 3.75 Gbps on physical links B-G and G-F. The T-C may reserve a working physical resource of 7.5 Gbps on physical links B-C and C-D, and reserve a protection physical resource of 7.5 Gbps on physical links B-G and G-D. The T-C may reserve a working physical resource of 5 Gbps on a physical link F-D, and reserve a protection physical resource of 5 Gbps separately on physical links F-E and E-D. Preferably, to avoid a conflict between a working physical resource and a protection physical resource, a working physical resource and a protection physical resource of each link are physically separated from each other. B is a service access node of the DC1, F is a service access node of the DC2, and D is a service access node of the DC3.
The T-C maps the virtual network topology vNE1-vNE2-vNE3 to the reserved working physical resource and the reserved protection physical resource. The virtual node vNE1 is corresponding to a part of or all resources of the physical node B, the virtual node vNE2 is corresponding to a part of or all resources of the physical node F, and the virtual node vNE3 is corresponding to a part of or all physical resources of the physical node D. A virtual link vNE1-vNE2 is corresponding to the working physical resource reserved on the physical links B-A and A-F on the physical network, and the protection physical resource reserved on the physical links B-G and G-F on the physical network. A virtual link vNE1-vNE3 is corresponding to the working physical resource reserved on the physical links B-C and C-D on the physical network, and the protection physical resource reserved on the physical links B-G and G-D on the physical network. A virtual link vNE2-vNE3 is corresponding to the working physical resource reserved on the physical link F-D on the physical network, and the protection physical resource reserved on the physical links F-E and E-D on the physical network.
The planned virtual network topology meets the traffic requirement matrix information of the client. For example, required traffic of 3.75 Gbps between the DC1 and the DC2 may be carried on vNE1-vNE2;
required traffic of 7.5 Gbps between the DC1 and the DC3 may be carried on vNE1-vNE3; and
required traffic of 5 Gbps between the DC2 and the DC3 may be carried on vNE2-vNE3.
In another example, the C-C plans a virtual network topology. The T-C may plan two physical network resources in the idle physical resource of the physical network according to the pre-planned virtual network topology information that is of the virtual network and that is sent by the C-C, such as the virtual node information, the virtual link information, and the virtual network protection and recovery type. For example, according to the virtual network topology information described in Table 2, the T-C may reserve a working physical resource of 3.75 Gbps on physical links B-A and A-F, and reserve a protection physical resource of 3.75 Gbps on physical links B-G and G-F. The T-C may reserve a working physical resource of 7.5 Gbps on physical links B-C and C-D, and reserve a protection physical resource of 7.5 Gbps on physical links B-G and G-D. The T-C may reserve a working physical resource of 5 Gbps on a physical link F-D, and reserve a protection physical resource of 5 Gbps separately on physical links F-E and E-D. Preferably, to avoid a conflict between a working physical resource and a protection physical resource, a working physical resource and a protection physical resource of each link are physically separated from each other. B is a service access node of the DC1, F is a service access node of the DC2, and D is a service access node of the DC3.
The T-C maps a reserved working physical resource and a reserved protection physical resource to the virtual network topology vNE1-vNE2-vNE3 pre-planned by the C-C. The virtual node vNE1 is corresponding to a part of or all physical resources of the physical node B, the virtual node vNE2 is corresponding to a part of or all physical resources of the physical node F, and the virtual node vNE3 is corresponding to a part of or all physical resources of the physical node D. A virtual link vNE1-vNE2 is corresponding to the working physical resource reserved on the physical links B-A and A-F on the physical network, and the protection physical resource reserved on the physical links B-G and G-F on the physical network. A virtual link vNE1-vNE3 is corresponding to the working physical resource reserved on the physical links B-C and C-D on the physical network, and the protection physical resource reserved on the physical links B-G and G-D on the physical network. A virtual link vNE2-vNE3 is corresponding to the working physical resource reserved on the physical link F-D on the physical network, and the protection physical resource reserved on the physical links F-E and E-D on the physical network.
S203. The T-C sends a virtual network topology establishment response message to the C-C.
After the T-C establishes the virtual network topology, the T-C stores the virtual network, and maintains information about the virtual network, such as virtual network topology information of the virtual network, a virtual network protection and recovery type, a mapping relationship between the virtual network topology and a working physical resource on the physical network, and a mapping relationship between the virtual network topology and a protection physical resource on the physical network. The virtual network topology information includes virtual node information and virtual link information. The virtual link information includes transmission bandwidth and the like of a virtual link. The mapping relationship between the virtual network topology and a working physical resource on the physical network and the mapping relationship between the virtual network topology and a protection physical resource on the physical network may include: a mapping relationship between a virtual node and a physical node, a mapping relationship between a virtual link and a physical link, and a mapping relationship between a bandwidth resource on a virtual link and a bandwidth resource on a physical link. In addition, the T-C sends the virtual network topology establishment response message to the C-C.
In an example of an implementation of the present disclosure, the T-C establishes a virtual network topology. The virtual network topology establishment response message sent by the T-C to the C-C carries information indicating virtual network topology establishment success, and may further carry the virtual network topology information, such as the virtual node information and the virtual link information. In another example, the C-C plans a virtual network topology. The virtual network topology establishment response message sent by the T-C to the C-C carries the information indicating virtual network topology establishment success, but may not carry the virtual network topology information.
S204. The C-C establishes a virtual connection on a virtual network.
After obtaining the virtual network topology information, the C-C may control the virtual network. For example, the C-C establishes a connection on the virtual network to transmit a service between DCs. In a specific implementation process, the C-C calculates, according to resource information of the virtual network and information about an actual traffic requirement during service transmission between DCs, a virtual connection that is on the virtual network and that meets a traffic requirement between a source DC and a sink DC.
For example, it is assumed that a connection with a bandwidth of 1.25 Gbps needs to be established between the DC1 and the DC3, and a path that is on the virtual network topology and that is calculated by the C-C is vNE1-vNE2-vNE3. The C-C reserves a resource of 1.25 Gbps separately on virtual links vNE1-vNE2 and vNE2-vNE3, and establishes a virtual connection vNE1-vNE2-vNE3. A virtual node does not have an entity, and is merely node information stored in the C-C and the T-C. Therefore, the “establishment of a virtual connection” herein is essentially as follows: The C-C changes virtual node information and virtual link information in a database that stores the virtual network. The vNE2 in the foregoing established virtual connection vNE1-vNE2-vNE3 is used as an example, that is, the C-C stores a piece of information about “a cross connection between a resource of 1.25 G on the left of the vNE2 and a resource of 1.25 G on the right of the vNE2”.
S205. The C-C delivers a physical connection establishment command to the T-C.
After establishing the virtual connection vNE1-vNE2-vNE3 on the virtual network, the C-C sends the physical connection establishment command to the T-C. A cross connection between virtual nodes is mapped to a cross connection between physical nodes on the physical network, so that a physical connection corresponding to the virtual connection vNE1-vNE2-vNE3 is established.
S206. The T-C maps the virtual connection to a physical connection according to the virtual connection established by the C-C.
After receiving the physical connection establishment command sent by the C-C, the T-C maps the virtual connection vNE1-vNE2-vNE3 of the virtual network to the reserved working physical resource and protection physical resource on the physical network according to the stored virtual network topology information, information about the mapping relationship between the virtual network topology and a working physical resource on the physical network and the mapping relationship between the virtual network topology and a protection physical resource on the physical network, and virtual network protection and recovery type; and delivers a cross connection establishment command to corresponding physical nodes. A cross connection is established on physical nodes that are passed through, to establish a corresponding physical connection, so as to meet a virtual connection establishment requirement of the C-C. The T-C delivers a physical node cross connection command to the physical nodes for establishing a cross connection, so as to form a physical connection corresponding to the virtual connection.
In 1+1 virtual topology protection, for physical nodes corresponding to virtual nodes at two ends of each virtual link, using configuration for a single direction as an example, the T-C configures a dual feed connection for a service transmit end, that is, a service is sent on both a working path and a protection path; and the T-C configures a selective receiving connection for a service receive end, that is, a service is received from the working path or the protection path. Because a link and a service on a transport network are usually bidirectional, a node at one end of a link serves as a transmit end node in one direction and a receive end node in the other direction. Therefore, a dual feed connection is usually configured on a node at one end of a link for sending a service, and a selective receiving connection is also configured on the node for receiving a service from a working path or a protection path selectively according to a fault status of a service, a path, a link, or the like. The T-C configures a cross connection for a service on each intermediate node, in each virtual link, through which a working physical resource and a protection physical resource pass.
In 1:1 virtual topology protection, for a physical node corresponding to a virtual node at a transmit end of each virtual link, using configuration for a single direction as an example, the T-C configures a selective bridging connection for a service transmit end, that is, a service is sent from a working path or a protection path selectively according to a fault status of a service, a path, a link, or the like. The T-C configures a selective receiving connection for a service receive end, so as to receive a service from a working path or a protection path selectively according to a fault status of a service, a path, a link, or the like. Because a link and a service on a transport network are usually bidirectional, a node at one end of a link serves as a transmit end node in one direction and a receive end node in the other direction. Therefore, a selective bridging connection is usually configured on a node at one end of a link for sending a service, and a selective receiving connection is also configured on the node for receiving a service from a working path or a protection path selectively according to a fault status of a service, a path, a link, or the like. The T-C configures a cross connection for a service on each intermediate node, in each virtual link, through which a working physical resource and a protection physical resource pass.
It should be noted that, because a link and a service on a transport network are usually bidirectional, a node at one end of a link serves as a transmit end node in one direction and a receive end node in the other direction. Because the two directions are symmetric, in the following description, only one direction is described.
When the transport network is an OTN, it is assumed that each link on the physical network is an ODU2 link with a bandwidth of 10 Gbps, bandwidth resources in the link are discrete, and each bandwidth resource of 1.25 Gbps is one timeslot, the ODU2 link has eight timeslots in total. For example, as shown in
For a virtual link vNE2-vNE3, the T-C allocates one timeslot resource of four timeslot resources reserved on a physical link F-D through which a working physical resource corresponding to the virtual link passes, and allocates one timeslot resource of four timeslot resources reserved on physical links F-E and E-D through which a protection physical resource corresponding to the virtual link passes. The T-C performs the following operations: configuring a cross connection on the node F, so that the node F selectively receives “from one timeslot allocated to A-F” or “from one timeslot allocated to G-F”, and also configuring a dual feed connection between “one timeslot allocated to F-D” and “one timeslot allocated to F-E; configuring a cross connection “from one timeslot allocated to F-E to one timeslot allocated to E-D” on the node E; and configuring a selective receiving connection “from one timeslot allocated to F-D to an access-side port of the DC3” and “from one timeslot allocated to E-D to the access-side port of the DC3” on the last node of the service, that is, the node D.
Specifically, when a virtual network protection and recovery type is 1:1 virtual topology protection, for a virtual link vNE1-vNE2, the T-C allocates one timeslot resource of three timeslot resources reserved on physical links B-A and A-F through which a working physical resource corresponding to the virtual link passes, and allocates one timeslot resource of three timeslot resources reserved on physical links B-G and G-F through which a protection physical resource corresponding to the virtual link passes. The T-C performs the following operations: configuring a selective bridging connection “from an access-side port of the DC1 to one timeslot allocated to B-A” and “from the access-side port of the DC1 to one timeslot allocated to B-G” on the first node of a service, that is, the node B, and establishing a bridging connection to one timeslot allocated to B-A; configuring a cross connection “from one timeslot allocated to B-A to one timeslot allocated to A-F” on the node A; and configuring a cross connection “from one timeslot allocated to B-G to one timeslot allocated to G-F” on the node G.
For a virtual link vNE2-vNE3, the T-C allocates one timeslot resource of four timeslot resources reserved on a physical link F-D through which a working physical resource corresponding to the virtual link passes, and allocates one timeslot resource of four timeslot resources reserved on physical links F-E and E-D through which a protection physical resource corresponding to the virtual link passes. The T-C performs the following operations: configuring a cross connection on the node F, so that the node F selectively receives “from one timeslot allocated to A-F” or “from one timeslot allocated to G-F”, and also configuring a selective bridging connection between “one timeslot allocated to F-D” and “one timeslot allocated to F-E”, and establishing a bridging connection to one timeslot allocated to F-D; configuring a cross connection “from one timeslot allocated to F-E to one timeslot allocated to E-D” on the node E; and configuring a selective receiving connection “from one timeslot allocated to F-D to an access-side port of the DC3” and “from one timeslot allocated to E-D to the access-side port of the DC3” on the last node of the service, that is, the node D.
S207. The T-C updates virtual network topology information, and returns a connection establishment success message to the C-C.
After establishing a physical connection for the C-C, the T-C updates the virtual network topology information. For example, a bandwidth resource of 1.25 Gbps in a working physical resource corresponding to the virtual connection vNE1-vNE2-vNE3 and a bandwidth resource of 1.25 Gbps in a protection physical resource corresponding to the virtual connection vNE1-vNE2-vNE3 are occupied, and the T-C returns the connection establishment success message to the C-C.
S208. The T-C detects that a link corresponding to a working physical resource is faulty, and performs service protection switching.
Specifically, a physical link fault detection manner includes: detecting a fault on a node at a downstream end of a faulty physical link for a unidirectional service, and detecting faults on nodes at both ends of a faulty physical link for a bidirectional service.
In one case, when a fault occurs on a physical link in a working physical resource, if the faulty physical link carries a service, a virtual link corresponding to the faulty physical link is affected by the fault. A physical node corresponding to an end node of the virtual link affected by the fault switches the service to a protection path. The protection path uses a protection physical resource corresponding to the virtual link affected by the fault.
Specifically, in
When a virtual network protection and recovery type is 1:1 virtual topology protection, when a physical link fault is detected, the physical node B corresponding to the virtual node vNE1 at a transmit end of the virtual link vNE1-vNE2 affected by the fault chooses to send a service from one timeslot allocated to a physical link B-G of a protection physical resource; and when a physical link fault is detected, the physical node F corresponding to the virtual node vNE2 at a receive end of the virtual link vNE1-vNE2 affected by the fault chooses to receive a service from one timeslot allocated to a physical link G-F of a protection physical resource.
In another case, if no service is established on a virtual link affected by a fault, protection switching does not need to be performed on the physical network. However, the T-C may record a working physical resource fault, and protection physical resource information may be used when a service is established. In a specific implementation process, physical network fault information may be reported to the T-C, so that the T-C learns a virtual network affected by a faulty physical link and a virtual link on the virtual network, and the T-C stores information about a protection capability failure that is on the virtual link affected by the fault in the virtual topology.
Specifically, after detecting a link fault, the node A and/or the node F report/reports information about the fault to the T-C, so that the T-C learns that a fault occurs on a physical link A-F. The T-C determines, according to previously stored information about the C-C, that a resource in the faulty physical link is reserved or leased by the C-C. On a virtual network topology leased by the C-C, a fault occurs on a physical link A-F in the working physical resource corresponding to the virtual link vNE1-vNE2. If the physical link A-F carries a service, the service is switched to physical links B-G and G-F in the protection physical resource corresponding to the virtual link vNE1-vNE2. If no service is established on the physical link A-F, protection switching does not need to be performed on the physical network. The T-C only needs to record the working physical resource fault, and protection physical resource information is used when a service is established. The T-C may determine, according to a fault on the physical link A-F, that a protection capability on the virtual link vNE1-vNE2 fails. The T-C locally stores information such as the information about the protection capability failure that is on the virtual link vNE1-vNE2, or information about implementation of protection switching on the physical link corresponding to the virtual link vNE1-vNE2.
S209. The T-C updates virtual network topology information to the C-C.
After the T-C leans that a protection physical resource, on the physical network, corresponding to the virtual link affected by the fault carries a service on which protection switching is performed, or after a protection resource is used, optionally, the T-C may update the virtual network topology information to the C-C, such as the information about the protection capability failure that is on the virtual link vNE1-vNE2.
In this embodiment of the present disclosure, the transport-controller reserves the working physical resource and the protection physical resource on the physical network according to the virtual network topology establishment request message sent by the client-controller, generates the virtual network topology, and maps a virtual network to the working physical resource and the protection physical resource, so as to protect the virtual network. In this way, before a virtual connection is established, the virtual network already has a protection capability. When a fault occurs on the physical network corresponding to the virtual network, the physical network can rapidly complete protection switching. For a client, protection switching does not affect a virtual network leased by the client, a virtual network topology is not changed, and a virtual connection service established by the client on the virtual network is not changed either. The virtual connection remains unchanged after a fault occurs on the virtual network, and the virtual topology is not changed. This improves user experience.
S401. Receive a virtual network topology establishment request message, where the virtual network topology establishment request message carries a virtual network resource parameter and/or a virtual network protection and recovery type.
Specifically, in an implementation, the virtual network resource parameter carried in a virtual network topology establishment request message may include transmission traffic between any two service access nodes, to form traffic requirement matrix information. In another implementation, a client-controller may pre-plan a virtual network topology according to transmission traffic between any two service access nodes, that is, traffic requirement matrix information. Therefore, the virtual network resource parameter may include virtual network topology information, such as virtual node information and virtual link information. The virtual link information includes transmission bandwidth and the like of a virtual link.
The virtual network protection and recovery type includes but is not limited to 1+1 protection and 1:1 protection.
S402. Reserve a working physical resource and a protection physical resource in an idle physical resource of a physical network according to the virtual network resource parameter and/or the virtual network protection and recovery type.
In an implementation, the transport-controller reserves a working physical resource and a protection physical resource in the idle physical resource of the physical network according to transmission traffic between any two service access nodes of a client. In another implementation, the transport-controller reserves a working physical resource and a protection physical resource in the idle physical resource of the physical network according to the virtual network topology information pre-planned by the client-controller. The idle physical resource is an available physical resource that is not leased to or reserved for a virtual network and that is not used by another connection. Preferably, to avoid a resource conflict, a working physical resource and a protection physical resource may be physically separated from each other.
S403. Map a virtual link on a virtual network to the working physical resource and the protection physical resource.
Specifically, the transport-controller maps the virtual link on the virtual network to the working physical resource and the protection physical resource on the physical network, to form a virtual network topology. The transport-controller stores and maintains the virtual network topology information of the established virtual network, a mapping relationship between the virtual network topology and the working physical resource, and a mapping relationship between the virtual network topology and the protection physical resource; and returns a virtual network topology establishment response message to the client-controller. Specifically, the mapping relationship between the virtual network topology and the working physical resource and the mapping relationship between the virtual network topology and the protection physical resource may include a mapping relationship between a virtual node and a physical node, and a mapping relationship between a virtual link and a physical link.
In an implementation, the virtual network topology establishment response message sent by the transport-controller may carry information indicating virtual network topology establishment success, and may further carry the virtual network topology information, such as the virtual node information and the virtual link information. In another implementation, the virtual network topology establishment response message sent by the transport-controller may carry the information indicating virtual network topology establishment success.
In a specific implementation process, the transport-controller receives a physical connection establishment command from the client-controller. The physical connection establishment command carries virtual connection information of the virtual network. Specifically, the virtual connection information includes a virtual link through which a virtual connection passes and transmission bandwidth of the virtual link. The transport-controller establishes, according to the virtual connection information, a physical connection in a physical resource corresponding to the virtual link through which the virtual connection passes. Specifically, the physical resource corresponding to the virtual link includes a working physical resource and a protection physical resource. The physical connection includes a working physical path and a protection physical path.
When a fault occurs on a physical link in a working physical resource corresponding to the virtual network, a virtual link corresponding to the faulty physical link is affected by the fault. In an implementation, if a virtual connection is established on the virtual link affected by the fault, a physical node corresponding to an end node of the virtual link affected by the fault switches a service to a protection path. The protection path uses a protection physical resource corresponding to the virtual link affected by the fault. The T-C may store information indicating that service protection switching is implemented on the physical link corresponding to the virtual link affected by the fault. In another implementation, if no virtual connection is established on the virtual link affected by the fault, a physical node corresponding to an end node of the virtual link affected by the fault does not need to perform protection switching, but the T-C may be notified to record information about a working physical resource fault. The T-C may store information about a protection capability failure that is on the virtual link affected by the fault.
In this embodiment of the present disclosure, the transport-controller reserves the working physical resource and the protection physical resource on the physical network according to the virtual network topology establishment request message of the client-controller, generates the virtual network topology, and maps the virtual network to the working physical resource and the protection physical resource, so as to protect the virtual network. In this way, before a virtual connection is established, the virtual network already has a protection capability. When a fault occurs on the physical network corresponding to the virtual network, the physical network can rapidly complete protection switching. For a client, protection switching does not affect a virtual network leased by the client, a virtual network topology is not changed, and a virtual connection service established by the client on the virtual network is not changed either. The virtual connection remains unchanged after a fault occurs on the virtual network, and the virtual topology is not changed. This improves user experience.
The first receiving module 501 is configured to receive a virtual network topology establishment request message, where the virtual network topology establishment request message carries a virtual network resource parameter and/or a virtual network protection and recovery type.
Specifically, in an implementation, the virtual network resource parameter carried in a virtual network topology establishment request message may include transmission traffic between any two service access nodes, to form traffic requirement matrix information. In another implementation, a client-controller may pre-plan a virtual network topology according to transmission traffic between any two service access nodes, that is, traffic requirement matrix information. Therefore, the virtual network resource parameter may include virtual network topology information, such as virtual node information and virtual link information. The virtual link information includes transmission bandwidth and the like of a virtual link.
The virtual network protection and recovery type includes but is not limited to 1+1 protection and 1:1 protection.
The resource reservation module 502 is configured to reserve a working physical resource and a protection physical resource in an idle physical resource of the physical network according to the virtual network resource parameter and/or the virtual network protection and recovery type.
In an implementation, the resource reservation module 502 reserves a working physical resource and a protection physical resource in the idle physical resource of the physical network according to transmission traffic between any two service access nodes of a client. In another implementation, the resource reservation module 502 reserves a working physical resource and a protection physical resource in the idle physical resource of the physical network according to the virtual network topology information pre-planned by the client-controller. The idle physical resource is an available physical resource that is not leased to or reserved for a virtual network and that is not used by another connection. Preferably, to avoid a resource conflict, a working physical resource and a protection physical resource may be physically separated from each other.
The mapping module 503 is configured to map a virtual link on a virtual network to the working physical resource and the protection physical resource.
Specifically, the mapping module 503 maps the virtual link on the virtual network to the working physical resource and the protection physical resource on the physical network, so as to form a virtual network topology. Specifically, the transport-controller may further include a storage module, configured to store and maintain virtual network topology information of the established virtual network, a mapping relationship between the virtual network topology and the working physical resource, and a mapping relationship between the virtual network topology and the protection physical resource. Specifically, the mapping relationship between the virtual network topology and the working physical resource and the mapping relationship between the virtual network topology and the protection physical resource may include a mapping relationship between a virtual node and a physical node, and a mapping relationship between a virtual link and a physical link.
In a specific implementation process, the transport-controller may further include a second receiving module, configured to receive a physical connection establishment command from the client-controller. The physical connection establishment command carries virtual connection information of the virtual network. Specifically, the virtual connection information includes a virtual link through which a virtual connection passes and transmission bandwidth of the virtual link. The transport-controller may further include a path establishment module, configured to establish, according to the virtual connection information, a physical connection in a physical resource corresponding to the virtual link through which the virtual connection passes. Specifically, the physical resource corresponding to the virtual link includes a working physical resource and a protection physical resource. The physical connection includes a working physical path and a protection physical path.
When a fault occurs on a physical link in a working physical resource corresponding to the virtual network, a virtual link corresponding to the faulty physical link is affected by the fault. Specifically, the transport-controller may further include a service switching module, configured to: when a virtual connection is established on the virtual link affected by the fault, switch a service to a protection path by a physical node corresponding to an end node of the virtual link affected by the fault. The protection path uses a protection physical resource corresponding to the virtual link affected by the fault. The storage module is configured to store information indicating that service protection switching is implemented on the physical link corresponding to the virtual link affected by the fault. The storage module is configured to: when no virtual connection is established on the virtual link affected by the fault, store information about a protection capability failure that is on the virtual link affected by the fault.
In this embodiment of the present disclosure, the transport-controller reserves the working physical resource and the protection physical resource on the physical network according to the virtual network topology establishment request message of the client-controller, generates the virtual network topology, and maps the virtual network to the working physical resource and the protection physical resource, so as to protect the virtual network. In this way, before a virtual connection is established, the virtual network already has a protection capability. When a fault occurs on the physical network corresponding to the virtual network, the physical network can rapidly complete protection switching. For a client, protection switching does not affect a virtual network leased by the client, a virtual network topology is not changed, and a virtual connection service established by the client on the virtual network is not changed either. The virtual connection remains unchanged after a fault occurs on the virtual network, and the virtual topology is not changed. This improves user experience.
The processor 601 may be a general central processing unit (CPU), a microprocessor, an application-specific integrated circuit (ASIC), or at least one integrated circuit, and is configured to execute a related program, to implement the technical solutions provided in the embodiments of the present disclosure.
The memory 602 may be a read-only memory (ROM), a static storage device, a dynamic storage device, or a random access memory (RAM). The memory 602 may store an operating system and another application program. When the technical solutions provided in the embodiments of the present disclosure are implemented by using software or firmware, program code used to implement the technical solutions provided in the embodiments of the present disclosure is stored in the memory 602, and is executed by the processor 601.
The input/output interface 603 is configured to receive input data and information, and to output data such as an operation result.
The communications interface 604 is but is not limited to a transceiver apparatus such as a transceiver, to implement communication between the computer device 600 and another device or a communications network.
The bus 605 may include a channel, to transfer information between parts (such as the processor 601, the memory 602, the input/output interface 603, and the communications interface 604) of the computer device 600.
In a specific implementation process, the transport-controller receives a virtual network topology establishment request message by using the communications interface 604, where the virtual network topology establishment request message carries a virtual network resource parameter and/or a virtual network protection and recovery type. The processor 601 executes the code stored in the memory 602, so as to implement: reserving a working physical resource and a protection physical resource in an idle physical resource of a physical network according to the virtual network resource parameter and/or the virtual network protection and recovery type, and mapping a virtual link on a virtual network to the working physical resource and the protection physical resource.
In this embodiment of the present disclosure, the transport-controller reserves the working physical resource and the protection physical resource on the physical network according to the virtual network topology establishment request message of the client-controller, generates a virtual network topology, and maps the virtual network to the working physical resource and the protection physical resource, so as to protect the virtual network. In this way, before a virtual connection is established, the virtual network already has a protection capability. When a fault occurs on the physical network corresponding to the virtual network, the physical network can rapidly complete protection switching. For a client, protection switching does not affect a virtual network leased by the client, a virtual network topology is not changed, and a virtual connection service established by the client on the virtual network is not changed either. The virtual connection remains unchanged after a fault occurs on the virtual network, and the virtual topology is not changed. This improves user experience.
It should be noted that, although for the computer device 600, merely the processor 601, the memory 602, the input/output interface 603, the communications interface 604, and the bus 605 are shown in
A person of ordinary skill in the art may understand that, each aspect of the present disclosure or a possible implementation of each aspect may be specifically implemented as a system, a method, or a computer program product. Therefore, each aspect of the present disclosure or a possible implementation of each aspect may use forms of hardware only embodiments, software only embodiments (including firmware, resident software, and the like), or embodiments with a combination of software and hardware, which are uniformly referred to as a “circuit”, a “module”, or a “system” herein. In addition, each aspect of the present disclosure or the possible implementation of each aspect may take a form of a computer program product, where the computer program product refers to computer-readable program code stored in a computer-readable medium.
The computer-readable medium may be a computer-readable signal medium or a computer-readable storage medium. The computer-readable storage medium includes but is not limited to an electronic, magnetic, optical, electromagnetic, infrared, or semi-conductive system, device, or apparatus, or any appropriate combination thereof, such as a random access memory (RAM), a read-only memory (ROM), an erasable programmable read only memory (EPROM or flash memory), an optical fiber, and a compact disc read only memory (CD-ROM).
A processor in a computer reads computer-readable program code stored in a computer-readable medium, so that the processor can perform a function and an action specified in each step or a combination of steps in a flowchart; an apparatus is generated to implement a function and an action specified in each block or a combination of blocks in a block diagram.
Computer-readable program code may be completely executed on a computer of a user, partially executed on a computer of a user, executed as a standalone software package, partially executed on a computer of a user and partially executed on a remote computer, or completely executed on a remote computer or a server. It should also be noted that, in some alternative implementation solutions, steps in a flowchart or functions specified in blocks in a block diagram may not occur in an illustrated order. For example, depending on an involved function, two consecutive steps or two blocks in the illustration may actually be executed substantially at the same time, or these blocks may sometimes be executed in reverse order.
A person of ordinary skill in the art may be aware that, in combination with the examples described in the embodiments disclosed in this specification, units and algorithm steps may be implemented by electronic hardware or a combination of computer software and electronic hardware. Whether the functions are performed by hardware or software depends on particular applications and design constraint conditions of the technical solutions. A person skilled in the art may use different methods to implement the described functions for each particular application, but it should not be considered that the implementation goes beyond the scope of the present disclosure.
The foregoing descriptions are merely specific implementations of the present disclosure, but are not intended to limit the protection scope of the present disclosure. Any variation or replacement readily figured out by a person skilled in the art within the technical scope disclosed in the present disclosure shall fall within the protection scope of the present disclosure. Therefore, the protection scope of the present disclosure shall be subject to the protection scope of the claims.
This application is a continuation of International Application No. PCT/CN2015/076916, filed on Apr. 17, 2015, the disclosure of which is hereby incorporated by reference in its entirety.
Number | Date | Country | |
---|---|---|---|
Parent | PCT/CN2015/076916 | Apr 2015 | US |
Child | 15785935 | US |