WO2024149033A1 - 5gs tsn虚拟网桥的防环路方法、设备及存储介质 - Google Patents

5gs tsn虚拟网桥的防环路方法、设备及存储介质 Download PDF

Info

Publication number
WO2024149033A1
WO2024149033A1 PCT/CN2023/139937 CN2023139937W WO2024149033A1 WO 2024149033 A1 WO2024149033 A1 WO 2024149033A1 CN 2023139937 W CN2023139937 W CN 2023139937W WO 2024149033 A1 WO2024149033 A1 WO 2024149033A1
Authority
WO
WIPO (PCT)
Prior art keywords
loop
mapping relationship
tsn
port
virtual bridge
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2023/139937
Other languages
English (en)
French (fr)
Inventor
杜相文
詹亚军
蹇慧君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to EP23915787.8A priority Critical patent/EP4645767A4/en
Publication of WO2024149033A1 publication Critical patent/WO2024149033A1/zh
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/42Loop networks
    • H04L12/437Ring fault isolation or reconfiguration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/40Bus networks
    • H04L12/40169Flexible bus arrangements
    • H04L12/40176Flexible bus arrangements involving redundancy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/18Loop-free operations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/66Layer 2 routing, e.g. in Ethernet based MAN's
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/74Address processing for routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/28Flow control; Congestion control in relation to timing considerations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/04Arrangements for maintaining operational condition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/40Bus networks
    • H04L2012/4026Bus for use in automation systems

Definitions

  • the present application relates to the field of time-sensitive network technology, and in particular to an anti-loop method, device and storage medium for a 5GS TSN virtual bridge.
  • redundancy mechanisms that is, the method of duplicating data frames, are generally used to ensure the reliability of end-to-end device communications.
  • duplicate data frames will reduce network throughput and cause network congestion.
  • the IEEE802.1CB protocol (the redundancy protocol in the TSN (Time-Sensitive Network) standard) defines a solution for implementing redundant transmission in Ethernet networks. That is, redundancy is eliminated by inserting redundant tags with serial numbers into data frames. At the data receiver, the redundant tags are used to determine whether the data frame is a previously received duplicate frame, and the duplicate frame is deleted, leaving only one data frame, thereby preventing the reception of multiple identical data frames and causing network congestion.
  • the prerequisite for implementing the above scheme is that there are redundant paths for data transmission in the network.
  • the NW-TT (Network-side TSN translator) in the 5GS TSN virtual bridge has limited resources and cannot provide an independent NW-TT for each DS-TT (Device-side TSN translator).
  • multiple DS-TTs are connected through one NW-TT.
  • broadcast or multicast when the NW-TT receives a message sent by a terminal, the NW-TT will send the message from other DS-TTs to form a loop. Once a loop occurs, the broadcast or multicast may be forwarded in an infinite loop in the network, causing a network storm and causing the devices in the network to be impacted.
  • the main purpose of this application is to provide a 5GS TSN virtual bridge loop prevention method, device, equipment and storage medium, aiming to solve the technical problem that it is difficult to effectively protect broadcast or multicast loops in the 5GS TSN virtual bridge.
  • the present application provides a loop prevention method for a 5GS TSN virtual bridge, which is applied to the NW-TT in the 5GS TSN virtual bridge.
  • the 5GS TSN virtual bridge also includes a DS-TT, and one NW-TT corresponds to multiple DS-TTs.
  • the anti-loop method of the 5GS TSN virtual bridge includes the following steps:
  • the preset anti-loop mapping relationship table is used to store the preset anti-loop mapping relationship between multiple DS-TT corresponding ports and the anti-loop identifier.
  • FIG1 is a flow chart of a first embodiment of a method for preventing loops in a 5GS TSN virtual bridge of the present application
  • FIG2 is a schematic diagram of a first scenario of a 5GS TSN virtual bridge loop prevention method according to a first embodiment of the present application
  • FIG3 is a schematic diagram of a second scenario of the anti-loop method of the 5GS TSN virtual bridge of the first embodiment of the present application.
  • FIG4 is a schematic diagram of a third scenario of the anti-loop method of the 5GS TSN virtual bridge of the first embodiment of the present application.
  • FIG5 is a schematic diagram of a fourth scenario of the anti-loop method of the 5GS TSN virtual bridge of the second embodiment of the present application.
  • FIG6 is a schematic diagram of the fifth scenario of the anti-loop method of the 5GS TSN virtual bridge of the second embodiment of the present application.
  • FIG7 is a schematic diagram of the sixth scenario of the anti-loop method of the 5GS TSN virtual bridge of the third embodiment of the present application.
  • FIG8 is a schematic diagram of the seventh scenario of the anti-loop method of the 5GS TSN virtual bridge of the third embodiment of the present application.
  • Figure 9 is a structural schematic diagram of the anti-loop device of the 5GS TSN virtual bridge in the hardware operating environment involved in the embodiment of the present application.
  • first, second, third, etc. may be used to describe various information in this article, these information should not be limited to these terms. These terms are only used to distinguish the same type of information from each other.
  • first information may also be referred to as the second information
  • second information may also be referred to as the first information.
  • the present application embodiment provides a 5GS TSN virtual bridge loop prevention method, referring to FIG. 1 , in this embodiment,
  • the anti-loop method of the 5GS TSN virtual bridge includes:
  • Step S10 When receiving a message sent by a target port corresponding to the DS-TT, identifying an anti-loop identifier corresponding to the target port;
  • Step S20 Determine whether the anti-loop identifier exists in the preset anti-loop mapping relationship table. If so, do not send the message to the port corresponding to the anti-loop identifier, wherein the preset anti-loop mapping relationship table is used to store the preset anti-loop mapping relationship between multiple DS-TT corresponding ports and the anti-loop identifier.
  • the reliability of end-to-end device communication is generally ensured by a redundancy mechanism, that is, by duplicating data frames.
  • duplicate data frames will reduce network throughput and cause network congestion.
  • the IEEE802.1CB protocol (the redundancy protocol in the TSN standard) defines a solution for implementing redundant transmission in Ethernet networks, that is, by inserting redundant tags with serial numbers into data frames to eliminate redundancy.
  • the redundant tags are used to determine whether the data frame is a previously received duplicate frame, and the duplicate frame is deleted, leaving only one data frame, thereby preventing the reception of multiple identical data frames from causing end-side abnormalities.
  • the prerequisite for implementing the above scheme is that there are redundant paths for data transmission in the network.
  • the present application involves a 5GS TSN virtual bridge that regards the 5GS as a whole as a virtual TSN bridge.
  • the NW-TT resources in the 5GS TSN virtual bridge are limited, and it is impossible to provide an independent NW-TT for each DS-TT.
  • multiple DS-TTs (DS-TT1, DS-TT2, etc.) are generally connected through one NW-TT.
  • the NW-TT will send the message from all other DS-TTs to form a loop.
  • the broadcast or multicast may be forwarded in an infinite loop in the network, causing a network storm and causing the devices in the network to be impacted. Therefore, in the external redundant networking scenario, the NW-TT and the external switch that supports the IEEE802.1CB protocol may form a loop.
  • DS-TT1 and DS-TT2 reach NW-TT through two different PDU (Packet Data Unit) sessions.
  • DS-TT1 sends a broadcast message to NW-TT
  • DS-TT2 sends a broadcast message to NW-TT.
  • NW-TT will send the broadcast message sent by DS-TT1 back to the CB switch from DS-TT2, forming a loop.
  • loops may also be formed between multi-level TSN switches, as shown in Figure 3.
  • anti-loop means preventing the occurrence of a loop phenomenon.
  • the anti-loop method of the 5GS TSN virtual bridge is applied to the NW-TT in the 5GS TSN virtual bridge.
  • a virtual bridge implements LAN interconnection at the data link layer, and its main function is to forward data packets between connected network interfaces.
  • the 5GS TSN virtual bridge includes NW-TT and DS-TT, and one NW-TT corresponds to multiple DS-TTs.
  • This embodiment aims to: by identifying DS-TTs belonging to the same broadcast/multicast loop, block the propagation of messages between DS-TTs in the same loop, solve the problem of broadcast loops caused when one NW-TT is connected to multiple DS-TTs, and further solve the broadcast/multicast loop problem between the NW-TT and an external switch supporting the IEEE802.1CB protocol.
  • Step S10 When receiving a message sent by a target port corresponding to the DS-TT, identifying an anti-loop identifier corresponding to the target port;
  • the terminal station x1 (End Station 1) sends a message to DS-TT1 through port 1, and DS-TT1 then sends it to NW-TT through a PDU (Packet Data Unit) session initiated by the user terminal (UE1).
  • PDU Packet Data Unit
  • the PDU session establishment process is initiated by the user terminal side, and the purpose is to establish a new PDU session (a data transmission channel between the user terminal and the external network) between the user terminal and the NW-TT.
  • the destination port is the port through which the DS-TT sends the message.
  • the message may be a broadcast message or a multicast message, etc., which is not specifically limited.
  • the anti-loop identifier is an identifier of the message itself or an identifier pre-configured for each port, etc., which is not specifically limited.
  • the anti-loop identifier can be the source MAC (Media Access Control) address of the message itself, or a redundant group tag configured for each port, etc., without specific limitation.
  • NW-TT when NW-TT receives a message sent by the target port corresponding to DS-TT, it identifies the anti-loop identifier corresponding to the target port, that is, it identifies the source MAC address of the terminal station that sends the message corresponding to the target port, or identifies the redundant group label pre-configured for the target port, etc., without specific limitation.
  • Step S20 Determine whether the anti-loop identifier exists in the preset anti-loop mapping relationship table. If so, do not send the message to the port corresponding to the anti-loop identifier, wherein the preset anti-loop mapping relationship table is used to store the preset anti-loop mapping relationship between multiple DS-TT corresponding ports and the anti-loop identifier.
  • the preset anti-loop mapping relationship table is used to store the corresponding ports of multiple DS-TTs and the anti-loop mapping relationship table.
  • the preset anti-loop mapping relationship table can store the preset anti-loop mapping relationship between the port corresponding to DS-TT1 and the anti-loop identification 1, and can also store the preset anti-loop mapping relationship between the port corresponding to DS-TT1 and the preset anti-loop 2, and can also store the preset anti-loop mapping relationship between the port corresponding to DS-TT2 and the anti-loop identification 1, etc., without specific limitation.
  • the NW-TT when the above-mentioned NW-TT receives a message sent by the target port corresponding to the DS-TT, after identifying the anti-loop identifier corresponding to the target port, it determines whether the anti-loop identifier exists in the preset anti-loop mapping relationship table; that is, it searches the preset anti-loop mapping relationship table to see whether there is an anti-loop identifier corresponding to the target port. If so, the message is not sent to the port corresponding to the anti-loop identifier.
  • the preset anti-loop mapping relationship table contains an anti-loop identifier corresponding to the target port, then based on the preset anti-loop mapping relationship between the anti-loop identifier corresponding to the target port and other ports recorded in the preset anti-loop mapping relationship table, the message is not sent to the port corresponding to the anti-loop identifier corresponding to the target port (target port + other ports).
  • the preset anti-loop mapping relationship table records the preset anti-loop mapping relationship between the port corresponding to DS-TT1 and the anti-loop identifier 1, and also records the preset anti-loop mapping relationship between the port corresponding to DS-TT2 and the anti-loop identifier 1, that is, the port corresponding to DS-TT1 and the port corresponding to DS-TT2 belong to a broadcast/multicast loop
  • NW-TT determines that the anti-loop identifier exists in the preset anti-loop mapping relationship table, and does not send the message to the port corresponding to DS-TT2 corresponding to the anti-loop identifier corresponding to the port corresponding to DS-TT1, but only sends the message to the port corresponding to DS-TT3 that does not correspond to the anti-loop identifier corresponding to the port corresponding to DS-TT1, thereby preventing NW-TT from sending the message from the port
  • the message sent by the target port received by the NW-TT may be sent by the terminal through multiple DS-TT corresponding ports, when it is determined that a loop may be caused if the message is sent to the port corresponding to the anti-loop identifier, the message can be targeted not to be sent to the port corresponding to the anti-loop identifier, effectively protecting the loop that may be caused by broadcast or multicast in the 5GS TSN virtual bridge.
  • the method when a message sent by a target port corresponding to a DS-TT is received, after the step of identifying an anti-loop identifier corresponding to the target port, the method further includes:
  • Step S30 Check whether there is a source corresponding to the terminal sending the message in the first anti-loop mapping relationship table.
  • the anti-loop identifier includes a source MAC address
  • the preset anti-loop mapping relationship table includes a first anti-loop mapping relationship table, which is used to store the first anti-loop mapping relationship between the port numbers of the ports corresponding to the multiple DS-TTs and the multiple source MAC addresses.
  • the DS-TT corresponding port in the first anti-loop mapping relationship can be represented by a port number or other specified character string, etc., which is not specifically limited.
  • NW-TT can, through self-learning (no data is stored in the first anti-loop mapping relationship table), after receiving the message and identifying the source MAC address of the terminal station that sent the message through the target port, query whether there is a first anti-loop mapping relationship between the target port and the corresponding source MAC address in the first anti-loop mapping relationship table.
  • the source MAC address in the message After receiving a message sent by terminal station x1 through the corresponding port of DS-TT1, identify the source MAC address in the message as the source MAC address x1 of terminal station x1, and query whether there is a mapping relationship between the corresponding port of DS-TT1 and the source MAC address x1 in the first anti-loop mapping relationship table.
  • terminal station x1 sends a message to UPF/NW-TT (NW-TT can be set separately or in UPF) through port port-1 of DS-TT1, and the source MAC address of the message is the MAC address of terminal station x1; terminal station x1 sends a message to UPF/NW-TT through port port-2 of DS-TT2, and the source MAC address of the message is the MAC address of terminal station x1.
  • NW-TT can be set separately or in UPF
  • the source MAC address of the message is the MAC address of terminal station x1
  • terminal station x1 sends a message to UPF/NW-TT through port port-2 of DS-TT2
  • the source MAC address of the message is the MAC address of terminal station x1.
  • the CB switch connects terminal station x1 and terminal station x2.
  • the broadcast/multicast message sent from the CB switch can be sent to UPF/NW-TT in sequence through port-1, DS-TT1, and UE1, and can also be sent to UPF/NW-TT in sequence through port-2, DS-TT2, and UE2.
  • the messages of terminal station x1 and terminal station x2 are sent redundantly.
  • Terminal station y1 can send broadcast messages to UPF/NW-TT in sequence through port-3, DS-TT3, and UE3; after receiving the broadcast/multicast message, UPF/NW-TT self-learns the mapping relationship between the source MAC address of the message and the port corresponding to DS-TT, and stores the first anti-loop mapping relationship table between the source MAC address of the message and the port corresponding to DS-TT, as shown in Table 1 below.
  • Table 1 The first anti-loop mapping relationship table
  • source MAC address x1 and source MAC address x2 are maintained under DS-TT1
  • source MAC address x1 and source MAC address x2 are maintained under DS-TT2
  • source MAC address y1 is maintained under DS-TT3.
  • Step S40 If it does not exist, the second anti-loop mapping relationship between the source MAC address and the port number of the target port is stored in the first anti-loop mapping relationship table.
  • the mapping relationship between the DS-TT1 corresponding port and the source MAC address x1 does not exist in the first anti-loop mapping relationship table. If it does not exist, the second anti-loop mapping relationship between the source MAC address and the port number of the target port is stored in the first anti-loop mapping relationship table. If it exists, the first anti-loop mapping relationship table is not updated.
  • UPF/NW-TT determines based on the source MAC address of the message (00-11-12-13-00-00) that there are MAC address records of terminal station x1 under DS-TT1 (port number: 1000) and DS-TT2 (port number: 2000), and does not send broadcast/multicast messages to DS-TT1 and DS-TT2; there is no MAC address record of x1 under DS-TT3 (port number: 3000), and sends broadcast/multicast messages to the DS-TT3 port.
  • the first anti-loop mapping relationship between multiple DS-TT corresponding ports and multiple source MAC addresses is continuously updated to the first anti-loop mapping relationship table, as shown in Table 1.
  • the method of obtaining the first anti-loop mapping relationship table through the above-mentioned NW-TT self-learning can save the time of configuring the first anti-loop mapping relationship in the first anti-loop mapping relationship table, thereby improving the anti-loop efficiency.
  • the 5GS TSN virtual bridge also includes multiple network elements of the 5GS core network control plane link, and the multiple network elements of the control plane link include application function network element AF and other network elements; the first anti-loop mapping relationship is configured by CNC for each port during the process of configuring PSFP parameters, and is sent to the local through the application function network element AF and the other network elements, wherein the configured PSFP parameters include source MAC addresses corresponding to multiple ports.
  • the entire 5G system acts as a virtual bridge in the TSN network, which includes the core network elements of 5GS (AF (Application Function, application function network element), NEF (Network Exposure Function, network open function network element), PCF (Policy Control Function, policy control function network element), UDM (Unified Data Management, unified data management function network element), SMF (Session Management function, session management function network element), AMF (Access and Mobility Management Function, access and mobility management function network element), UPF (User Plane Function, user plane function network element), NW-TT), RAN (Wireless Access Network), UE/DS-TT (DS-TT It can be set individually or in the UE), 5G GM (5G internal system clock).
  • the 5GS TSN virtual bridge is managed collaboratively with the CNC (centralized network configuration) via the TSN AF.
  • the first anti-loop mapping relationship is configured by the CNC for each port during the process of configuring PSFP parameters, and is sent to the local through the application function network element AF through the other network elements, wherein the configured PSFP parameters include source MAC addresses corresponding to multiple ports.
  • the CNC configures the mapping relationship between each DS-TT corresponding port and the source MAC address during the process of configuring PSFP parameters; after the CNC completes the PSFP parameter configuration, it sends the PSFP information to the AF, and the PSFP information includes the first anti-loop mapping relationship between each DS-TT corresponding port and multiple source MAC addresses (as shown in Table 1); the AF extracts the first anti-loop mapping relationship and transmits the first anti-loop mapping relationship to the PCF through the N5 port message; the PCF transmits it to the SMF through the N7 port message; the SMF transmits it to the UPF/NW-TT through the N4 port message; after the UPF/NW-TT receives the first anti-loop mapping relationship, it stores it in the first anti-loop mapping relationship table preset locally.
  • N5 port messages, N7 port messages, and N4 port messages are respectively the numbers of information transmission channels between specific network elements specified in the 3GPP (3rd Generation
  • manually configuring the first anti-loop mapping relationship in the CNC can save certain network resources and improve the anti-loop efficiency.
  • the step of not sending the message to the port corresponding to the anti-loop identifier includes:
  • Step A1 querying and obtaining a plurality of port numbers corresponding to the source MAC address from the first anti-loop mapping relationship table;
  • multiple port numbers corresponding to the source MAC address are queried from the first anti-loop mapping relationship table. For example, UPF/NW-TT obtains multiple port numbers (1000 and 2000) based on the source MAC address (00-11-12-13-00-00).
  • Step A2 Do not send the message to the ports corresponding to the multiple port numbers corresponding to the source MAC address.
  • UPF/NW-TT does not send broadcast/multicast messages to DS-TT1 and DS-TT2 corresponding to the above-queried ports; it only sends broadcast/multicast messages to DS-TT3 corresponding to the unqueried port.
  • mapping relationship between the source MAC address carried by the message and the target port for sending the message it is determined whether there is a mapping relationship between the source MAC address and other ports. If so, these ports are regarded as the same loop, and the message is blocked from propagating between DS-TTs in the same loop, so as to solve the problem of broadcast loop caused by connecting multiple DS-TTs to one NW-TT, without adding other identifiers, thereby reducing the difficulty of loop protection.
  • the step of not sending the message to the port corresponding to the anti-loop identifier includes:
  • Step C1 querying from the second anti-loop mapping relationship table to obtain a plurality of port numbers corresponding to the target redundancy group tag, wherein the target redundancy group tag corresponds to the target port;
  • the anti-loop identifier also includes multiple redundant group tags
  • the preset anti-loop mapping relationship table also includes a second anti-loop mapping relationship table, which is used to store a third anti-loop mapping relationship between multiple redundant group tags and multiple DS-TT corresponding ports.
  • the redundant group tag may be a string of characters or an identifier, etc., which is not specifically limited.
  • the third anti-loop mapping relationship between multiple redundant group tags and multiple DS-TT corresponding ports can be a mapping relationship between redundant group tag 1 and DS-TT1 and DS-TT2 corresponding ports, or a mapping relationship between redundant group tag 1 and DS-TT2 and DS-TT3 corresponding ports, etc., without specific limitation.
  • the 5GS TSN virtual bridge also includes multiple network elements of the 5GS core network control plane link, and the multiple network elements of the control plane link include the application function network element AF and other network elements; the third anti-loop mapping relationship is pre-configured on the application function network element AF for each DS-TT corresponding port, and sent to the local through the other network elements.
  • a redundant group tag of the port number of each DS-TT corresponding port is configured on the AF, and the relationship between the port number of each DS-TT corresponding port and the redundant group tag is transmitted to the UPF/NW-TT through other network elements.
  • a redundant group tag of the port number of each DS-TT corresponding port is configured on the AF.
  • configuring a redundant group tag of the port number of each DS-TT corresponding port on the AF can play a role in centrally managing the ports corresponding to each DS-TT, which is convenient for global control.
  • the AF passes the redundant group tag of the current PDU session to the PCF through the N5 port message; the PCF passes the redundant group tag of the PDU session to the SMF through the N7 port message; the SMF passes the redundant group tag of the PDU session to the UPF/NW-TT through the N4 port message.
  • the third anti-loop mapping relationship can also be pre-configured on each DS-TT and sent to the local area through multiple network elements of the 5GS core network control plane link.
  • the relationship between the port number and the redundant group tag of the corresponding port is configured on each DS-TT; the DS-TT transparently transmits the redundant group field of the port corresponding to the DS-TT to the AMF through the N2 port; the AMF transparently transmits the relationship between the port number and the redundant group tag of the port corresponding to the DS-TT to the SMF through the N11 port; the SMF transparently transmits the relationship between the port number and the redundant group tag of the port corresponding to the DS-TT to the PCF through the N7 port; the PCF transparently transmits the relationship between the port number and the redundant group tag of the port corresponding to the DS-TT to the AF through the N5 port, wherein the N2 port message and the N11 port message are respectively specified in the 3GPP protocol.
  • the relationship between the port number of the corresponding port and the redundant group label is configured on each DS-TT, so as to avoid the problem that the amount of global configuration information is large and the processing process is complicated due to the large number of DS-TTs. It is configured on each DS-TT, which can be used out of the box and has strong pertinence.
  • AF passes the redundant group tag of the PDU session to PCF through the N5 port message;
  • PCF passes the redundant group tag of the PDU session to SMF through the N7 port message;
  • SMF passes the redundant group tag of the PDU session to UPF/NW-TT through the N4 port message, and
  • UPF/NW-TT stores the mapping relationship between the port number of the corresponding port of DS-TT and the redundant group tag.
  • the step of determining whether the anti-loop identifier exists in the preset anti-loop mapping relationship table includes:
  • Step B1 Obtaining the redundancy group field in the information of the PDU session corresponding to the terminal sending the message;
  • a redundant group field corresponding to the redundant group tag in the third anti-loop mapping relationship is newly added to the information of the PDU session corresponding to each terminal.
  • a redundancy group field is added to the PDU session, and the initial value of the field is 0.
  • the AF fills in the redundancy group field value of the PDU session as 100 or 10, etc., and there is no specific limitation.
  • the UPF/NW-TT after receiving the redundant group tag of the PDU session transmitted by the SMF, the UPF/NW-TT obtains the redundant group field in the information of the PDU session corresponding to the terminal sending the message.
  • the redundant group field in the information of the PDU session corresponding to the terminal sending the message is 100 or 10, etc., which is not specifically limited.
  • Step B2 If the redundancy group field exists in the second anti-loop mapping relationship table, determine that the target redundancy group tag exists in the second anti-loop mapping relationship table.
  • UPF/NW-TT queries whether the redundant group field value 100 exists in the PDU session in the second anti-loop mapping relationship table. If so, it is determined that the target redundant group tag exists in the second anti-loop mapping relationship table, and the ports corresponding to DS-TT1 and DS-TT2 are maintained under the target redundant group tag.
  • Step C2 Do not send the message to the ports corresponding to the multiple port numbers corresponding to the target redundancy group tag.
  • the broadcast/multicast messages are not forwarded to the DS-TT1 corresponding port and the DS-TT2 corresponding port corresponding to the target redundant group label corresponding to the redundant group field value of 100, and the broadcast/multicast messages are only forwarded to the DS-TT3 corresponding port.
  • redundant group tags by configuring redundant group tags, it is possible to detect and block the propagation of messages between DS-TTs in the same loop, so as to solve the problem of broadcast loops caused when one NW-TT is connected to multiple DS-TTs.
  • the redundant group tags are ready to use, convenient and independent.
  • the redundancy mechanism is widely used, such as in industrial applications.
  • the anti-loop method of the 5GS TSN virtual bridge of this application can be used to solve the problem of broadcast or multicast loops, and using one UPF/NW-TT to connect multiple DS-TTs reduces the cost of use.
  • FIG. 9 is a schematic diagram of the device structure of the hardware operating environment involved in the embodiment of the present application.
  • the anti-loop device of the 5GS TSN virtual bridge may include: a processor 1001, a memory 1005, and a communication bus 1002.
  • the communication bus 1002 is used to realize the connection communication between the processor 1001 and the memory 1005.
  • the anti-loop device of the 5GS TSN virtual bridge may also include a user interface, a network interface, a camera, an RF (Radio Frequency) circuit, a sensor, a WiFi module, etc.
  • the user interface may include a display screen (Display), an input submodule such as a keyboard (Keyboard), and the user interface may also include a standard wired interface and a wireless interface.
  • the network interface may include a standard wired interface and a wireless interface (such as a WI-FI interface).
  • the anti-loop device structure of the 5GS TSN virtual bridge shown in Figure 9 does not constitute a limitation on the anti-loop device of the 5GS TSN virtual bridge, and may include more or fewer components than shown in the figure, or a combination of certain components, or a different arrangement of components.
  • the memory 1005 as a storage medium may include an operating system, a network communication module, and an anti-loop program of the 5GS TSN virtual bridge.
  • the operating system is a program that manages and controls the hardware and software resources of the anti-loop device of the 5GS TSN virtual bridge, and supports the operation of the anti-loop program of the 5GS TSN virtual bridge and other software and/or programs.
  • the network communication module is used to realize the communication between the components inside the memory 1005, and to communicate with other hardware and software in the anti-loop system of the 5GS TSN virtual bridge.
  • the processor 1001 is used to execute the anti-loop program of the 5GS TSN virtual bridge stored in the memory 1005 to implement the steps of the anti-loop method of the 5GS TSN virtual bridge described in any of the above items.
  • the present application also provides a storage medium, on which is stored an anti-loop program for a 5GS TSN virtual bridge.
  • an anti-loop program for a 5GS TSN virtual bridge When the anti-loop program for the 5GS TSN virtual bridge is executed by a processor, the steps of the anti-loop method for the 5GS TSN virtual bridge as described in any one of the above items are implemented.
  • the specific implementation method of the storage medium of the present application is basically the same as the above-mentioned embodiments of the anti-loop method of the 5GS TSN virtual bridge, and will not be repeated here.
  • the technical solution of the present application is essentially or the part that contributes to the prior art can be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) as described above, and includes a number of instructions for a terminal device (which can be a mobile phone, computer, server, air conditioner, or network device, etc.) to execute the methods described in each embodiment of the present application.
  • a storage medium such as ROM/RAM, magnetic disk, optical disk
  • a terminal device which can be a mobile phone, computer, server, air conditioner, or network device, etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Small-Scale Networks (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

本申请公开了一种5GS TSN虚拟网桥的防环路方法、设备及存储介质,属于时间敏感网络技术领域,本申请应用于5GS TSN虚拟网桥中的NW-TT,所述5GS TSN虚拟网桥还包括DS-TT,一个NW-TT与多个DS-TT对应;当NW-TT接收到DS-TT对应目标端口发送的报文时,识别目标端口对应的防环路标识;预设防环路映射关系表用于存储多个DS-TT对应端口与所述防环路标识之间的预设防环路映射关系,确定预设防环路映射关系表中是否存在所述防环路标识,若存在,则不将所述报文发送给所述防环路标识所对应的端口。

Description

5GS TSN虚拟网桥的防环路方法、设备及存储介质
相关申请
本申请要求于2023年1月13号申请的、申请号为202310059703.0的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及时间敏感网络技术领域,尤其涉及一种5GS TSN虚拟网桥的防环路方法、设备及存储介质。
背景技术
在工业以太网技术领域,一般会通过冗余机制,也就是复制数据帧的方法保证端到端设备通信的可靠性,但是重复的数据帧会降低网络的吞吐量,造成网络拥堵。
目前,IEEE802.1CB协议(TSN(Time-Sensitive Network,时间敏感网络)标准中的冗余协议)中定义了在以太网网络中实现冗余传输的方案,即,通过在数据帧中插入具有序列号的冗余标签来消冗,在数据接收方,根据冗余标签判定数据帧是否是之前接收到的复制帧,并删除复制帧,只保留一个数据帧,从而防止接收多个相同的数据帧,造成网络拥堵。
实现上述方案的前提条件是网络中数据的传输存在冗余路径。然而,本申请涉及将5GS(5G System,5G系统)整体视为一个虚拟的TSN网桥的5GS TSN虚拟网桥,5GS TSN虚拟网桥中NW-TT(Network-side TSNtranslator,网络侧时间敏感网络适配器)资源有限,无法为每个DS-TT(Device-side TSN translator,设备侧时间敏感网络适配器)提供独立的NW-TT,一般是通过一个NW-TT连接多个DS-TT,在广播或组播过程中,当NW-TT接收到终端发送的报文时,NW-TT会将该报文从其他DS-TT发送出去,形成环路。一旦出现环路,广播或组播就可能在网络中被无限循环转发,引发网络风暴,导致网络中的设备受到冲击。
发明内容
本申请的主要目的在于提供一种5GS TSN虚拟网桥的防环路方法、装置、设备及存储介质,旨在解决难以有效防护在5GS TSN虚拟网桥中广播或组播环路的技术问题。
为实现上述目的,本申请提供一种5GS TSN虚拟网桥的防环路方法,应用于5GS TSN虚拟网桥中的NW-TT,所述5GS TSN虚拟网桥还包括DS-TT,一个NW-TT与多个DS-TT对应;
所述5GS TSN虚拟网桥的防环路方法,包括以下步骤:
当接收到DS-TT对应目标端口发送的报文时,识别所述目标端口对应的防环路标识;
确定预设防环路映射关系表中是否存在所述防环路标识,若存在,则不将所述报文发送给所述防环路标识所对应的端口,其中,所述预设防环路映射关系表用于存储多个DS-TT对应端口与所述防环路标识之间的预设防环路映射关系。
附图说明
图1为本申请一种5GS TSN虚拟网桥的防环路方法的第一实施例的流程示意图;
图2为本申请第一实施例的5GS TSN虚拟网桥的防环路方法的第一场景示意图;
图3为本申请第一实施例的5GS TSN虚拟网桥的防环路方法的第二场景示意图;
图4为本申请第一实施例的5GS TSN虚拟网桥的防环路方法的第三场景示意图;
图5为本申请第二实施例的5GS TSN虚拟网桥的防环路方法的第四场景示意图;
图6为本申请第二实施例的5GS TSN虚拟网桥的防环路方法的第五场景示意图;
图7为本申请第三实施例的5GS TSN虚拟网桥的防环路方法的第六场景示意图;
图8为本申请第三实施例的5GS TSN虚拟网桥的防环路方法的第七场景示意图;
图9是本申请实施例方案涉及的硬件运行环境的5GS TSN虚拟网桥的防环路设备的结构示意图。
本申请目的的实现、功能特点及优点将结合实施例,参照附图做进一步说明。
具体实施方式
应当理解,此处所描述的具体实施例仅仅用以解释本申请,并不用于限定本申请。尽管在本文可能采用术语第一、第二、第三等来描述各种信息,但这些信息不应限于这些术语。这些术语仅用来将同一类型的信息彼此区分开。例如,在不脱离本文范围的情况下,第一信息也可以被称为第二信息,类似地,第二信息也可以被称为第一信息。
本申请实施例提供了一种5GS TSN虚拟网桥的防环路方法,参照图1,在本实施例中, 所述5GS TSN虚拟网桥的防环路方法包括:
步骤S10:当接收到DS-TT对应目标端口发送的报文时,识别所述目标端口对应的防环路标识;
步骤S20:确定预设防环路映射关系表中是否存在所述防环路标识,若存在,则不将所述报文发送给所述防环路标识所对应的端口,其中,所述预设防环路映射关系表用于存储多个DS-TT对应端口与所述防环路标识之间的预设防环路映射关系。
作为一种示例,在工业以太网技术领域,一般会通过冗余机制,也就是复制数据帧的方法保证端到端设备通信的可靠性,但是重复的数据帧会降低网络的吞吐量,造成网络拥堵。目前,IEEE802.1CB协议(TSN标准中的冗余协议)中定义了在以太网网络中实现冗余传输的方案,即,通过在数据帧中插入具有序列号的冗余标签来消冗,在数据接收方,根据冗余标签判定数据帧是否是之前接收到的复制帧,并删除复制帧,只保留一个数据帧,从而防止接收多个相同的数据帧而造成端侧异常。
实现上述方案的前提条件是网络中数据的传输存在冗余路径。然而,本申请涉及将5GS整体视为一个虚拟的TSN网桥的5GS TSN虚拟网桥,5GS TSN虚拟网桥中NW-TT资源有限,无法为每个DS-TT提供独立的NW-TT,如图2所示,一般是通过一个NW-TT连接多个DS-TT(DS-TT1、DS-TT2等)。在广播或组播过程中,当NW-TT接收到终端发送的报文时,NW-TT会将该报文从其他所有DS-TT发送出去,形成环路。一旦出现环路,广播或组播就可能在网络中被无限循环转发,引发网络风暴,导致网络中的设备受到冲击。因此,在外部冗余组网场景下,NW-TT和外部支持IEEE802.1CB协议的交换机,可能形成环路。
有两种情况下会形成环路,如图2所示,DS-TT1与DS-TT2通过两个不同的PDU(Packet Data Unit)会话到达NW-TT。DS-TT1发送广播报文到NW-TT,DS-TT2发送广播报文到NW-TT,NW-TT会将DS-TT1发送的广播报文从DS-TT2送回CB交换机,形成环路。更复杂的网络场景下,除了NW-TT和外部支持IEEE802.1CB协议的交换机形成广播环路,多级TSN交换机间,也可能形成环路,如图3所示。
作为一种示例,在进行TSN业务处理时,会需要对一些场景进行广播、组播处理,上述多级TSN交换机间形成的环路可以通过在不同的端口配置不同的VLAN解决。但NW-TT和外部支持IEEE802.1CB协议的交换机之间存在的广播环路问题,目前协议和相关专利未提供有效解决方案。因此,针对该问题,该发明提供了5GS TSN虚拟网桥的防环路方法。
作为一种示例,防环路即防止环路现象的产生。
作为一种示例,5GS TSN虚拟网桥的防环路方法应用于5GS TSN虚拟网桥中的NW-TT。
作为一种示例,虚拟网桥是在数据链路层上实现局域网互连,主要功能是在接入的不网络接口间进行数据包的转发。
作为一种示例,如图4所示,5GS TSN虚拟网桥包括NW-TT和DS-TT,一个NW-TT与多个DS-TT对应。
本实施例旨在:通过识别属于同一个广播/组播环路的DS-TT,阻断报文在同一个环路内的DS-TT间传播,解决一个NW-TT连接多个DS-TT时导致广播环路的问题,进而解决NW-TT和外部支持IEEE802.1CB协议的交换机之间存在的广播/组播环路问题。
具体步骤如下:
步骤S10:当接收到DS-TT对应目标端口发送的报文时,识别所述目标端口对应的防环路标识;
作为一种示例,如图4所示,终端站x1(End Station1)通过端口1发送报文至DS-TT1,DS-TT1再通过用户终端(UE1)发起的PDU(Packet Data Unit,协议数据单元)会话发送至NW-TT。
作为一种示例,PDU会话建立过程是由用户终端侧发起的,目的是在用户终端和NW-TT之间建立一条新的PDU会话(用户终端和外部网络之间的数据传输通道)。
作为一种示例,目标端口为DS-TT发送所述报所经端口。
作为一种示例,所述报文可以是广播报文或组播报文等,具体不做限定。
作为一种示例,防环路标识是报文本身的标识或者是预先为各端口配置好的标识等,具体不做限定。
作为一种示例,所述防环路标识可以是报文本身的源MAC(Media Access Control,介质访问控制)地址,或者是为各端口配置好的冗余组标签等,具体不做限定。
作为一种示例,NW-TT当接收到DS-TT对应目标端口发送的报文时,识别目标端口对应的防环路标识,即,识别目标端口对应的发送所述报文的终端站的源MAC地址,或者识别为目标端口预先配置好的冗余组标签等,具体不做限定。
步骤S20:确定预设防环路映射关系表中是否存在所述防环路标识,若存在,则不将所述报文发送给所述防环路标识所对应的端口,其中,所述预设防环路映射关系表用于存储多个DS-TT对应端口与所述防环路标识之间的预设防环路映射关系。
作为一种示例,所述预设防环路映射关系表用于存储多个DS-TT对应端口与所述防环 路标识之间的预设防环路映射关系。例如,预设防环路映射关系表可以存储DS-TT1对应端口与防环路标识1之间的预设防环路映射关系,还可以存储DS-TT1对应端口与预设防环路2之间的预设防环路映射关系,还可以存储DS-TT2对应端口与防环路标识1之间的预设防环路映射关系等,具体不做限定。
作为一种示例,上述NW-TT当接收到DS-TT对应目标端口发送的报文时,识别得到目标端口对应的防环路标识之后,确定预设防环路映射关系表中是否存在所述防环路标识;即,查找预设防环路映射关系表中是否存在与目标端口对应的防环路标识,若存在,则不将所述报文发送给所述防环路标识所对应的端口。也就是说,若预设防环路映射关系表存在与目标端口对应的防环路标识,则基于预设防环路映射关系表中记录的目标端口对应的防环路标识与其他端口的预设防环路映射关系,不将所述报文发送给目标端口对应的防环路标识所对应的端口(目标端口+其他端口)。
在一实施方式中,如果目标端口为DS-TT1对应端口,且预设防环路映射关系表记录了DS-TT1对应端口与防环路标识1之间的预设防环路映射关系,还记录了DS-TT2对应端口与防环路标识1之间的预设防环路映射关系,也就是说,DS-TT1对应端口和DS-TT2对应端口属于一个广播/组播环路,那么NW-TT确定预设防环路映射关系表中存在所述防环路标识,并不将所述报文发送给DS-TT1对应端口对应的防环路标识所对应的DS-TT2对应端口,只将该报文发送给DS-TT1对应端口对应的防环路标识所不对应的DS-TT3对应端口,防止了NW-TT将报文从DS-TT2对应端口发给终端站x1和终端站x2。
在本实施例中,由于NW-TT接收到的目标端口发送的报文可能是终端经过多个DS-TT对应端口发送的,因此,当确定了若将报文发送给与防环路标识对应的端口就可能引起环路,即可针对性地不将报文发送给与防环路标识对应的端口,有效防护了在5GS TSN虚拟网桥中广播或组播可能引起的环路。也就是说,通过识别属于同一个广播/组播环路的DS-TT,阻断报文在同一个环路内的DS-TT间传播,解决一个NW-TT连接多个DS-TT时导致广播环路的问题,进而解决NW-TT和外部支持IEEE802.1CB协议的交换机之间存在的广播/组播环路问题。
基于本申请中第一实施例,提供本申请的另一实施例,在该实施例中,所述当接收到DS-TT对应目标端口发送的报文时,识别所述目标端口对应的防环路标识的步骤之后,所述方法还包括:
步骤S30:查询所述第一防环路映射关系表中是否存在发送所述报文的终端对应的源 MAC地址与目标端口的之间的映射关系;
在本实施例中,所述防环路标识包括源MAC地址,所述预设防环路映射关系表包括第一防环路映射关系表,所述第一防环路映射关系表用于存储所述多个DS-TT对应端口的端口号与多个源MAC地址的之间的第一防环路映射关系。
作为一种示例,第一防环路映射关系中DS-TT对应端口可以用端口号表示或者其他规定的字符串等,具体不做限定。
作为一种示例,由于报文中本身携带有终端站的源MAC地址的标识,NW-TT可以通过自学习的方式(第一防环路映射关系表中未存储任何数据),在接收到报文并识别出通过目标端口发送该报文的终端站的源MAC地址后,查询第一防环路映射关系表中是否存在该目标端口与对应源MAC地址之间的第一防环路映射关系。例如,接收到终端站x1通过DS-TT1对应端口发送的报文后,识别该报文中的源MAC地址为终端站x1的源MAC地址x1,并查询第一防环路映射关系表中是否存在DS-TT1对应端口与源MAC地址x1之间的映射关系。
作为一种示例,如图5所示,终端站x1通过DS-TT1的端口port-1发送报文到UPF/NW-TT(NW-TT可以单独设置或者设置在UPF中),该报文的源MAC地址为终端站x1的MAC地址;终端站x1通过DS-TT2的端口port-2发送报文到UPF/NW-TT,该报文的源MAC地址为终端站x1的MAC地址。
作为一种示例,CB交换机连接终端站x1和终端站x2,从CB交换机发送的广播/组播报文既可以通过port-1、DS-TT1、UE1依次发送报文到UPF/NW-TT,同时也可以通过port-2、DS-TT2、UE2依次发送广播报文到UPF/NW-TT,终端站x1和终端站x2的报文冗余发送。终端站y1可以通过port-3、DS-TT3、UE3依次发送广播报文到UPF/NW-TT;UPF/NW-TT收到广播/组播报文后,自学习报文的源MAC地址与DS-TT对应端口的映射关系,存储报文的源MAC地址与DS-TT对应端口的第一防环路映射关系表,如下表1所示。
表1第一防环路映射关系表

作为一种示例,第一防环路映射关系表中DS-TT1下面维护源MAC地址x1和源MAC地址x2,DS-TT2下面维护源MAC地址x1和源MAC地址x2,DS-TT3下面维护源MAC地址y1。
步骤S40:若不存在,则将所述源MAC地址与所述目标端口的端口号之间的第二防环路映射关系,存储至所述第一防环路映射关系表中。
作为一种示例,若终端站x1从未经任一DS-TT对应端口发送过报文,则第一防环路映射关系表中不存在DS-TT1对应端口与源MAC地址x1之间的映射关系。若不存在,则将所述源MAC地址与所述目标端口的端口号之间的第二防环路映射关系,存储至所述第一防环路映射关系表中。若存在,则不更新所述第一防环路映射关系表。
作为一种示例,UPF/NW-TT根据报文的源MAC地址(00-11-12-13-00-00)判断,DS-TT1(端口号:1000)和DS-TT2(端口号:2000)下面存在终端站x1的MAC地址记录,不向DS-TT1和DS-TT2发送广播/组播报文;DS-TT3(端口号:3000)下面不存在x1的的MAC地址记录,向DS-TT3端口发送广播/组播报文。
作为一种示例,通过上述方式,将多个DS-TT对应端口与多个源MAC地址的之间的第一防环路映射关系不断更新至所述第一防环路映射关系表中,如表1所示。
在本实施例中,通过上述NW-TT自学习得到第一防环路映射关系表的方式能过够节省配置第一防环路映射关系表中第一防环路映射关系的时间,提升防环路效率。
在本实施例中,所述5GS TSN虚拟网桥还包括5GS核心网控制面链路的多个网元,所述控制面链路的多个网元包括应用功能网元AF以及其他网元;所述第一防环路映射关系是CNC在配置PSFP参数过程中为每个端口进行配置,并经应用功能网元AF通过所述其他网元发送至本地的,其中,完成配置的PSFP参数中包括与多个端口对应的源MAC地址。
作为一种示例,如图4所示,整个5G系统(DS-TT,UE和CN(核心网))在TSN网络中作为一个虚拟网桥,该网桥内包括5GS的核心网各网元(AF(Application Function,应用功能网元)、NEF(Network Exposure Function,网络开放功能网元)、PCF(Policy Control Function,策略控制功能网元)、UDM(Unified Data Management,统一数据管理功能网元)、SMF(Session Management function,会话管理功能网元)、AMF(Access and Mobility Management Function,接入及移动性管理功能网元)、UPF(User Plane Function,用户面功能网元)、NW-TT)、RAN(Wireless Access Network,无线接入网)、UE/DS-TT(DS-TT 可以单独设置也可以设置在UE中)、5G GM(5G内部系统时钟)。5GS TSN虚拟网桥经由TSN AF实现与CNC(集中网络配置)间的协同管理。
作为一种示例,所述第一防环路映射关系是CNC在配置PSFP参数过程中为每个端口进行配置,并经应用功能网元AF通过所述其他网元发送至本地的,其中,完成配置的PSFP参数中包括与多个端口对应的源MAC地址。在一实施方式中,如图6所示,CNC在配置PSFP参数过程中为每个DS-TT对应端口配置其与源MAC地址之间的映射关系;CNC完成PSFP参数配置后,下发PSFP信息至AF,所述PSFP信息中包含每个DS-TT对应端口与多个源MAC地址之间的第一防环路映射关系(如表1所示);AF将所述第一防环路映射关系提取出来,并通过N5口消息将所述第一防环路映射关系传递到PCF;PCF通过N7口消息将其传递到SMF;SMF通过N4口消息将其传递给UPF/NW-TT;UPF/NW-TT接收到第一防环路映射关系后,将其存储至本地预设的第一防环路映射关系表中。其中,N5口消息、N7口消息、N4口消息分别为3GPP(3rd Generation Partnership Project,第三代合作伙伴计划)协议中规定的特定网元之间信息传输通道的编号。
在本实施例中,相较于上述NW-TT自学习预设防环路映射关系表,通过人工在CNC配置第一防环路映射关系能够节省一定的网络资源,提升防环路效率。
在本实施例中,所述不将所述报文发送给所述防环路标识所对应的端口的步骤,包括:
步骤A1:从所述第一防环路映射关系表中查询得到与所述源MAC地址对应的多个端口号;
作为一种示例,从所述第一防环路映射关系表中查询得到与所述源MAC地址对应的多个端口号,例如,UPF/NW-TT根据源MAC地址(00-11-12-13-00-00)查询得到多个端口号(1000和2000)。
步骤A2:不将所述报文发送给所述与源MAC地址对应的多个端口号所对应端口。
作为一种示例,UPF/NW-TT不向上述查询到的端口对应DS-TT1和DS-TT2发送广播/组播报文;只向未查询到的端口对应DS-TT3发送广播/组播报文。
在本实施例中,通过识别报文携带的源MAC地址与发送报文的目标端口之前的映射关系,确定源MAC地址与其他端口之间是否存在映射关系,若存在,则将这些端口作为一个同一个环路,并阻断报文在同一个环路内的DS-TT间传播,以解决一个NW-TT连接多个DS-TT时导致广播环路的问题,无需增加其他标识,降低环路的防护难度。
基于本申请中第一实施例和第二实施例,提供本申请的另一实施例,在该实施例中, 所述不将所述报文发送给所述防环路标识所对应的端口的步骤,包括:
步骤C1:从第二防环路映射关系表中查询得到与目标冗余组标签对应的多个端口号,其中,所述目标冗余组标签与所述目标端口对应;
在本实施例中,所述防环路标识还包括多个冗余组标签,所述预设防环路映射关系表还包括第二防环路映射关系表,所述第二防环路映射关系表用于存储多个冗余组标签和多个DS-TT对应端口之间的第三防环路映射关系。
作为一种示例,冗余组标签可以是一串字符或者一个标识等,具体不做限定。
作为一种示例,多个冗余组标签和多个DS-TT对应端口之间的第三防环路映射关系,可以是冗余组标签1与DS-TT1以及DS-TT2对应端口之间的映射关系,也可以是冗余组标签1与DS-TT2以及DS-TT3对应端口之间的映射关系等,具体不做限定。
在本实施例中,所述5GS TSN虚拟网桥还包括5GS核心网控制面链路的多个网元,所述控制面链路的多个网元包括应用功能网元AF和其他网元;所述第三防环路映射关系是预先在应用功能网元AF上为每个DS-TT对应端口进行配置,并通过所述其他网元发送至本地的。
作为一种示例,如图7所示,在AF上配置各DS-TT对应端口的端口号的冗余组标签,并通过其他网元将各DS-TT对应端口的端口号与冗余组标签的关系传递给UPF/NW-TT。在一实施方式中,在AF上配置各DS-TT对应端口的端口号的冗余组标签。
在本实施例中,在AF上配置各DS-TT对应端口的端口号的冗余组标签能够起到集中管理各DS-TT对应端口的作用,便于全局把控。
作为一种示例,在AF上配置各DS-TT对应端口的端口号的冗余组标签之后,AF通过N5口消息将当前PDU会话的冗余组标签传递到PCF;PCF通过N7口消息将PDU会话的冗余组标签传递到SMF;SMF通过N4口消息将PDU会话的冗余组标签传递到UPF/NW-TT。
在本实施例中,所述第三防环路映射关系还可以是预先在每个DS-TT上配置,并通过所述5GS核心网控制面链路的多个网元发送至本地的。
作为一种示例,如图8所示,在每个DS-TT上配置对应端口的端口号与冗余组标签的关系;DS-TT将DS-TT对应端口的冗余组字段通过N2口透传到AMF;AMF通过N11口透传DS-TT对应端口的端口号与冗余组标签的关系给SMF;SMF通过N7口透传DS-TT对应端口的端口号与冗余组标签的关系给PCF;PCF通过N5口透传DS-TT对应端口的端口号与冗余组标签的关系给AF,其中,N2口消息、N11口消息分别为3GPP协议中规定 的特定网元之间信息传输通道的编号。
在本实施例中,在每个DS-TT上配置对应端口的端口号与冗余组标签的关系,避免由于DS-TT较多,导致全局配置的信息量较大,处理过程较为繁琐的问题,在每个DS-TT上配置,能够即配即用,针对性强。
作为一种示例,AF通过N5口消息将PDU会话的冗余组标签传递到PCF;PCF通过N7口消息将PDU会话的冗余组标签传递到SMF;SMF通过N4口消息将PDU会话的冗余组标签传递到UPF/NW-TT,UPF/NW-TT存储DS-TT对应端口的端口号与冗余组标签之间的映射关系。
在本实施例中,所述确定预设防环路映射关系表中是否存在所述防环路标识的步骤,包括:
步骤B1:获取发送所述报文的终端对应PDU会话的信息中的冗余组字段;
在该实施例中,在完成所述第三防环路映射关系的配置之后,每个终端对应PDU会话的信息中新增与所述第三防环路映射关系中冗余组标签对应的冗余组字段。
作为一种示例,PDU会话新增冗余组字段,该字段初始值为0。AF填写PDU会话的冗余组字段值为100或者10等,具体不做限定。
作为一种示例,UPF/NW-TT在接收到SMF传递的PDU会话的冗余组标签后,获取发送所述报文的终端对应PDU会话的信息中的冗余组字段。在一实施方式中,获取发送所述报文的终端对应PDU会话的信息中的冗余组字段为100或者10等,具体不做限定。
步骤B2:若所述第二防环路映射关系表中存在与所述冗余组字段,则确定所述第二防环路映射关系表中存在所述目标冗余组标签。
作为一种示例,UPF/NW-TT在第二防环路映射关系表中查询PDU会话是否存在冗余组字段值100,若存在,则确定所述第二防环路映射关系表中存在所述目标冗余组标签,目标冗余组标签下面维护的是DS-TT1对应端口和DS-TT2对应端口。
步骤C2:不将所述报文发送给与所述目标冗余组标签对应的多个端口号所对应端口。
作为一种示例,在处理广播/组播报文时,不向冗余组字段值为100所对应目标冗余组标签对应的DS-TT1对应端口和DS-TT2对应端口转发广播/组播报文,只向DS-TT3对应端口转发广播/组播报文。
在本实施例中,通过配置冗余组标签,能够发现并阻断报文在同一个环路内的DS-TT间传播,以解决一个NW-TT连接多个DS-TT时导致广播环路的问题,冗余组标签即配即用,方便且具有独立性。在实际TSN业务中,冗余机制广泛应用,比如在工业应用中对于 一些PLC(Programmable Logic Controller,可编程逻辑控制器)控制设备、无人机、传感器、AR/VR、机械臂等会通过冗余机制,保证业务的可靠性。当企业希望通过极少的UPF/NW-TT集中管理大量DS-TT,也就是存在一个UPF/NW-TT连接多个DS-TT的场景下,那么可以采用本申请的5GS TSN虚拟网桥的防环路方法来解决广播或组播环路的问题,使用一个UPF/NW-TT连接多个DS-TT降低了使用成本。
参照图9,图9是本申请实施例方案涉及的硬件运行环境的设备结构示意图。
如图9所示,该5GS TSN虚拟网桥的防环路设备可以包括:处理器1001,存储器1005,通信总线1002。通信总线1002用于实现处理器1001和存储器1005之间的连接通信。
在一实施方式中,该5GS TSN虚拟网桥的防环路设备还可以包括用户接口、网络接口、摄像头、RF(Radio Frequency,射频)电路,传感器、WiFi模块等等。用户接口可以包括显示屏(Display)、输入子模块比如键盘(Keyboard),用户接口还可以包括标准的有线接口、无线接口。网络接口可以包括标准的有线接口、无线接口(如WI-FI接口)。
本领域技术人员可以理解,图9中示出的5GS TSN虚拟网桥的防环路设备结构并不构成对5GS TSN虚拟网桥的防环路设备的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。
如图9所示,作为一种存储介质的存储器1005中可以包括操作系统、网络通信模块以及5GS TSN虚拟网桥的防环路程序。操作系统是管理和控制5GS TSN虚拟网桥的防环路设备硬件和软件资源的程序,支持5GS TSN虚拟网桥的防环路程序以及其它软件和/或程序的运行。网络通信模块用于实现存储器1005内部各组件之间的通信,以及与5GS TSN虚拟网桥的防环路系统中其它硬件和软件之间通信。
在图9所示的5GS TSN虚拟网桥的防环路设备中,处理器1001用于执行存储器1005中存储的5GS TSN虚拟网桥的防环路程序,实现上述任一项所述的5GS TSN虚拟网桥的防环路方法的步骤。
本申请5GS TSN虚拟网桥的防环路设备具体实施方式与上述5GS TSN虚拟网桥的防环路方法各实施例基本相同,在此不再赘述。
本申请还提供一种存储介质,所述存储介质上存储有5GS TSN虚拟网桥的防环路程序,所述5GS TSN虚拟网桥的防环路程序被处理器执行时实现如上述任一项所述的5GS TSN虚拟网桥的防环路方法的步骤。
本申请存储介质具体实施方式与上述5GS TSN虚拟网桥的防环路方法各实施例基本相同,在此不再赘述。
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者系统不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者系统所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者系统中还存在另外的相同要素。
上述本申请实施例序号仅仅为了描述,不代表实施例的优劣。
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在如上所述的一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端设备(可以是手机,计算机,服务器,空调器,或者网络设备等)执行本申请各个实施例所述的方法。
以上仅为本申请的可选实施例,并非因此限制本申请的专利范围,凡是利用本申请说明书及附图内容所作的等效结构或等效流程变换,或直接或间接运用在其他相关的技术领域,均同理包括在本申请的专利保护范围内。

Claims (10)

  1. 一种5GS TSN虚拟网桥的防环路方法,应用于5GS TSN虚拟网桥中的NW-TT,所述5GS TSN虚拟网桥还包括DS-TT,一个NW-TT与多个DS-TT对应;
    所述5GS TSN虚拟网桥的防环路方法,包括以下步骤:
    当接收到DS-TT对应目标端口发送的报文时,识别所述目标端口对应的防环路标识;
    确定预设防环路映射关系表中是否存在所述防环路标识,若存在,则不将所述报文发送给所述防环路标识所对应的端口,其中,所述预设防环路映射关系表用于存储多个DS-TT对应端口与所述防环路标识之间的预设防环路映射关系。
  2. 如权利要求1所述的5GS TSN虚拟网桥的防环路方法,其中,所述防环路标识包括源MAC地址,所述预设防环路映射关系表包括第一防环路映射关系表,所述第一防环路映射关系表用于存储所述多个DS-TT对应端口的端口号与多个源MAC地址的之间的第一防环路映射关系;
    所述当接收到DS-TT对应目标端口发送的报文时,识别所述目标端口对应的防环路标识的步骤之后,所述方法还包括:
    查询所述第一防环路映射关系表中是否存在发送所述报文的终端对应的源MAC地址与目标端口的之间的映射关系;
    若不存在,则将所述源MAC地址与所述目标端口的端口号之间的第二防环路映射关系,存储至所述第一防环路映射关系表中。
  3. 如权利要求2所述的5GS TSN虚拟网桥的防环路方法,其中,所述不将所述报文发送给所述防环路标识所对应的端口的步骤,包括:
    从所述第一防环路映射关系表中查询得到与所述源MAC地址对应的多个端口号;
    不将所述报文发送给所述与源MAC地址对应的多个端口号所对应端口。
  4. 如权利要求3所述的5GS TSN虚拟网桥的防环路方法,其中,所述5GS TSN虚拟网桥还包括5GS核心网控制面链路的多个网元,所述控制面链路的多个网元包括应用功能网元AF以及其他网元;
    所述第一防环路映射关系是CNC在配置PSFP参数过程中为每个端口进行配置,并 经应用功能网元AF通过所述其他网元发送至本地的,其中,完成配置的PSFP参数中包括与多个端口对应的源MAC地址。
  5. 如权利要求1所述的5GS TSN虚拟网桥的防环路方法,其中,所述防环路标识还包括多个冗余组标签,所述预设防环路映射关系表还包括第二防环路映射关系表,所述第二防环路映射关系表用于存储多个冗余组标签和多个DS-TT对应端口之间的第三防环路映射关系;
    所述不将所述报文发送给所述防环路标识所对应的端口的步骤,包括:
    从第二防环路映射关系表中查询得到与目标冗余组标签对应的多个端口号,其中,所述目标冗余组标签与所述目标端口对应;
    不将所述报文发送给与所述目标冗余组标签对应的多个端口号所对应端口。
  6. 如权利要求5所述的5GS TSN虚拟网桥的防环路方法,其中,所述5GS TSN虚拟网桥还包括5GS核心网控制面链路的多个网元,所述控制面链路的多个网元包括应用功能网元AF和其他网元;
    所述第三防环路映射关系是预先在应用功能网元AF上为每个DS-TT对应端口进行配置,并通过所述其他网元发送至本地的。
  7. 如权利要求5所述的5GS TSN虚拟网桥的防环路方法,其中,所述第三防环路映射关系是预先在每个DS-TT上配置,并通过所述5GS核心网控制面链路的多个网元发送至本地的。
  8. 如权利要求6或7所述的5GS TSN虚拟网桥的防环路方法,其中,在完成所述第三防环路映射关系的配置之后,每个终端对应PDU会话的信息中新增与所述第三防环路映射关系中冗余组标签对应的冗余组字段;
    所述确定预设防环路映射关系表中是否存在所述防环路标识的步骤,包括:
    获取发送所述报文的终端对应PDU会话的信息中的冗余组字段;
    若所述第二防环路映射关系表中存在与所述冗余组字段,则确定所述第二防环路映射关系表中存在所述目标冗余组标签。
  9. 一种5GS TSN虚拟网桥的防环路设备,其中,所述设备包括:存储器、处理器及存储在所述存储器上并可在所述处理器上运行的5GS TSN虚拟网桥的防环路程序,所述5GS TSN虚拟网桥的防环路程序配置为实现如权利要求1至8中任一项所述的5GS TSN虚拟网桥的防环路方法的步骤。
  10. 一种存储介质,其中,所述存储介质上存储有5GS TSN虚拟网桥的防环路程序,所述5GS TSN虚拟网桥的防环路程序被处理器执行时实现如权利要求1至8任一项所述的5GS TSN虚拟网桥的防环路方法的步骤。
PCT/CN2023/139937 2023-01-13 2023-12-19 5gs tsn虚拟网桥的防环路方法、设备及存储介质 Ceased WO2024149033A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP23915787.8A EP4645767A4 (en) 2023-01-13 2023-12-19 Anti-loop process for TSN 5GS virtual bridge, device and storage support

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202310059703.0 2023-01-13
CN202310059703.0A CN118353738A (zh) 2023-01-13 2023-01-13 5gs tsn虚拟网桥的防环路方法、设备及存储介质

Publications (1)

Publication Number Publication Date
WO2024149033A1 true WO2024149033A1 (zh) 2024-07-18

Family

ID=91814413

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/139937 Ceased WO2024149033A1 (zh) 2023-01-13 2023-12-19 5gs tsn虚拟网桥的防环路方法、设备及存储介质

Country Status (3)

Country Link
EP (1) EP4645767A4 (zh)
CN (1) CN118353738A (zh)
WO (1) WO2024149033A1 (zh)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101917298A (zh) * 2010-09-02 2010-12-15 杭州华三通信技术有限公司 一种基于vlan的环路监测方法和设备
CN106789192A (zh) * 2016-12-06 2017-05-31 无锡路通视信网络股份有限公司 系统环路故障的检测与处理方法、系统以及epon终端中应用
CN108306834A (zh) * 2017-12-28 2018-07-20 中国银联股份有限公司 用于消除虚拟网络环路引发的风险的方法和装置
WO2021251870A1 (en) * 2020-06-11 2021-12-16 Telefonaktiebolaget Lm Ericsson (Publ) Method and system for interaction between 5g and multiple tsc/tsn domains
WO2022032544A1 (zh) * 2020-08-12 2022-02-17 华为技术有限公司 一种通信方法、通信装置、终端设备及用户面网元

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11444804B2 (en) * 2019-11-21 2022-09-13 Oracle International Corporation System and method for preventing switch loops in layer-2 networks

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101917298A (zh) * 2010-09-02 2010-12-15 杭州华三通信技术有限公司 一种基于vlan的环路监测方法和设备
CN106789192A (zh) * 2016-12-06 2017-05-31 无锡路通视信网络股份有限公司 系统环路故障的检测与处理方法、系统以及epon终端中应用
CN108306834A (zh) * 2017-12-28 2018-07-20 中国银联股份有限公司 用于消除虚拟网络环路引发的风险的方法和装置
WO2021251870A1 (en) * 2020-06-11 2021-12-16 Telefonaktiebolaget Lm Ericsson (Publ) Method and system for interaction between 5g and multiple tsc/tsn domains
WO2022032544A1 (zh) * 2020-08-12 2022-02-17 华为技术有限公司 一种通信方法、通信装置、终端设备及用户面网元

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP4645767A4 *

Also Published As

Publication number Publication date
EP4645767A1 (en) 2025-11-05
EP4645767A4 (en) 2026-03-18
CN118353738A (zh) 2024-07-16

Similar Documents

Publication Publication Date Title
US12149444B2 (en) Routing rule management method and communications apparatus
EP3879879B1 (en) Time sensitive networking communication method and apparatus thereof
US11522790B2 (en) Multipath data transmission processing method and network device
TWI393401B (zh) 用以管理多播路由之系統、裝置、方法及具有電腦程式收錄其中之記憶體
US20210111987A1 (en) Automatically selecting an optimized communication channel for communications with a deflect in an overlay network
US20110305143A1 (en) Maximum transmission unit (mtu) size discovery mechanism and method for data-link layers
CN107079524B (zh) 一种数据转发的方法和控制器
WO2022017285A1 (zh) 报文转发方法、装置及系统
WO2021244356A1 (zh) 数据传输方法及装置
WO2022267950A1 (zh) 一种通信方法和装置
CN114697999A (zh) 一种冗余路径创建方法、装置及系统
EP2775663B1 (en) Method and device for recovering customer service
JP2017503407A (ja) パケット処理方法および装置
CN116724545A (zh) 一种数据包传输的方法、装置和系统
WO2023174221A1 (zh) 多模态业务实现方法、装置及通信设备
CN110708230A (zh) 一种指定转发者选举方法和装置
CN114422437A (zh) 一种异构报文的转发方法及装置
WO2024149033A1 (zh) 5gs tsn虚拟网桥的防环路方法、设备及存储介质
CN117528844B (zh) 网络隔离方法、装置、设备及存储介质
CN103973570B (zh) 一种报文传输的方法、ap及系统
WO2023019874A1 (zh) 分布式业务转发方法、装置、系统、存储介质及电子设备
EP3324587A1 (en) Multicast method, multicast relay device and system
US20200120046A1 (en) Buffer control method, network element, and controller
CN121012777B (zh) 一种用于报文转发的方法和装置
CN116567593B (zh) 通知方法、第一网络功能及第二网络功能

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23915787

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 2023915787

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 2023915787

Country of ref document: EP

Effective date: 20250728

ENP Entry into the national phase

Ref document number: 2023915787

Country of ref document: EP

Effective date: 20250728

NENP Non-entry into the national phase

Ref country code: DE

WWP Wipo information: published in national office

Ref document number: 2023915787

Country of ref document: EP