[go: up one dir, main page]

WO2025180331A1 - Procédé et appareil de traitement d'informations, dispositif, support de stockage et produit-programme informatique - Google Patents

Procédé et appareil de traitement d'informations, dispositif, support de stockage et produit-programme informatique

Info

Publication number
WO2025180331A1
WO2025180331A1 PCT/CN2025/078846 CN2025078846W WO2025180331A1 WO 2025180331 A1 WO2025180331 A1 WO 2025180331A1 CN 2025078846 W CN2025078846 W CN 2025078846W WO 2025180331 A1 WO2025180331 A1 WO 2025180331A1
Authority
WO
WIPO (PCT)
Prior art keywords
arn
identifier
network
packet
application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
PCT/CN2025/078846
Other languages
English (en)
Chinese (zh)
Inventor
杨锋
程伟强
段晓东
张晓秋
韩婷婷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
Research Institute of China Mobile Communication Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
Research Institute of China Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, Research Institute of China Mobile Communication Co Ltd filed Critical China Mobile Communications Group Co Ltd
Publication of WO2025180331A1 publication Critical patent/WO2025180331A1/fr
Pending legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/0001Systems modifying transmission characteristics according to link quality, e.g. power backoff
    • H04L1/0006Systems modifying transmission characteristics according to link quality, e.g. power backoff by adapting the transmission format
    • H04L1/0007Systems modifying transmission characteristics according to link quality, e.g. power backoff by adapting the transmission format by modifying the frame length
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/34Source routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/50Routing or path finding of packets in data switching networks using label swapping, e.g. multi-protocol label switch [MPLS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/02Communication route or path selection, e.g. power-based or shortest path routing

Definitions

  • the present disclosure relates to the field of wireless communication technologies, and in particular to an information processing method, apparatus, device, storage medium, and computer program product.
  • IP Internet Protocol
  • technologies ranging from Multi-Protocol Label Switching (MPLS) to the current Segment Routing over IPv6 (SRv6) are all centered around providing network path scheduling capabilities.
  • MPLS Multi-Protocol Label Switching
  • SRv6 Segment Routing over IPv6
  • the first is to classify traffic based on application characteristics and then direct different traffic to specific network paths.
  • the second is for applications to explicitly carry type information.
  • the network edge service access point device identifies the application information explicitly carried in the message and then maps the message to a network tunnel/slice.
  • the third is to directly open the network connection for applications to call.
  • all three methods have the problem of poor network security.
  • embodiments of the present disclosure are intended to provide an information processing method, apparatus, device, storage medium, and computer program product.
  • the present disclosure provides an information processing method, which is applied to a user edge device.
  • the method includes:
  • ARN Application Responsive Networking
  • marking the first IP packet based on the first ARN identifier includes:
  • the first information is used to indicate whether to convert the original content in the flow label field into the first ARN identifier.
  • marking the first IP packet based on the first ARN identifier includes:
  • the first ARN identifier is written into the source address field in the header of the first IP packet.
  • obtaining the first ARN identifier includes:
  • the first ARN identifier is allocated by the controller to the user edge device based on user information, application information and network service information.
  • sending the second IP message includes:
  • the present disclosure provides an information processing method, which is applied to a network edge device.
  • the method includes:
  • the second IP packet is obtained by the user edge device obtaining the first ARN identifier and marking the first IP packet based on the first ARN identifier; the first ARN identifier represents the calling relationship between the application and the network capability and/or the capability opened by the network to the application.
  • the method further includes:
  • the preset data table stores a preset correspondence between user information and ARN identifiers
  • the second IP packet is mapped to a corresponding path or slice based on the first ARN identifier.
  • the method further includes:
  • the first operation includes one of the following:
  • verifying the legitimacy of the first ARN identifier according to the preset data table includes:
  • the first ARN identifier is legal.
  • mapping the second IP packet to a corresponding path or slice based on the first ARN identifier includes:
  • the first ARN identifier is legal, determine the first path or first slice corresponding to the first ARN identifier according to the preset correspondence between the path or slice and the ARN identifier; map the second IP packet to the first path or the first slice;
  • the path or slice includes one of the following:
  • MPLS Multi-protocol label switching
  • IP Internet Layer 3 Protocol
  • VxLAN Virtual Extended Local Area Network
  • GRE General Routing Encapsulation
  • GENEVE Generic Network Virtualization Encapsulation
  • An embodiment of the present disclosure provides an information processing method, applied to a controller, the method comprising:
  • the first ARN identifier represents a calling relationship between an application and a network capability and/or a capability open to the application by the network;
  • the first ARN identifier is used by the user edge device to mark the first IP packet, generate a second IP packet, and send the second IP packet.
  • the method further includes:
  • the path or slice includes one of the following:
  • the method further includes:
  • the first ARN identifier is allocated to the user edge device based on user information, application information, and network service information.
  • the method further includes:
  • managing the lifecycle of the first ARN identifier includes:
  • An embodiment of the present disclosure provides an information processing device, including:
  • An acquisition module configured to acquire a first ARN identifier; the first ARN identifier represents a calling relationship between an application and a network capability and/or a capability open to the application by the network;
  • a processing module configured to mark the first IP packet based on the first ARN identifier to generate a second IP packet
  • the first sending module is configured to send the second IP message.
  • An embodiment of the present disclosure provides an information processing device, including:
  • a receiving module configured to receive a second IP message
  • the second IP packet is obtained by the user edge device obtaining the first ARN identifier and marking the first IP packet based on the first ARN identifier; the first ARN identifier represents the calling relationship between the application and the network capability and/or the capability opened by the network to the application.
  • An embodiment of the present disclosure provides an information processing device, including:
  • a second sending module is configured to send a first ARN identifier to the user edge device;
  • the first ARN identifier represents the calling relationship between the application and the network capability and/or the capability opened by the network to the application;
  • the first ARN identifier is used by the user edge device to mark the first IP packet, generate a second IP packet, and send the second IP packet.
  • An embodiment of the present disclosure provides a user edge device, including a processor and a memory for storing a computer program that can be run on the processor.
  • the processor is configured to execute the steps of any one of the methods described above on the user edge device side when running the computer program.
  • An embodiment of the present disclosure provides a network edge device, including a processor and a memory for storing a computer program that can be run on the processor.
  • the processor when used to run the computer program, it executes the steps of any one of the methods described above on the network edge device side.
  • An embodiment of the present disclosure provides a controller, comprising a processor and a memory for storing a computer program that can be run on the processor.
  • the processor when used to run the computer program, it executes the steps of any one of the methods described above on the controller side.
  • At least one embodiment of the present disclosure provides a computer-readable storage medium having a computer program stored thereon.
  • the computer program When the computer program is executed by a processor, the computer program implements the steps of any one of the methods described on the user edge device side, or implements the steps of any one of the methods described on the network edge device side, or implements the steps of any one of the methods described on the controller side.
  • An embodiment of the present disclosure further provides a computer program product, including a computer program.
  • the computer program When executed by a processor, it implements any of the methods described above on the user edge device side, or any of the methods described above on the network edge device side, or any of the methods described above on the controller side.
  • the information processing method, apparatus, device, storage medium, and computer program product provided by the embodiments of the present disclosure include: a user edge device obtains a first ARN identifier; the first ARN identifier represents the calling relationship between the application and the network capability and/or the capability open to the application by the network; based on the first ARN identifier, a first IP packet is marked to generate a second IP packet; and the second IP packet is sent.
  • the first ARN identifier represents the calling relationship of the application to the network capability and/or the capability opened by the network to the application
  • the user or application does not directly call the network capability, but calls the network capability through the first ARN identifier, so that the network will not see the relevant information of the user or application.
  • the network does not directly open the capability to the user, but opens the capability through the first ARN identifier, so that the user will not see the service information of the network, thereby improving network security while providing application collaborative network capabilities.
  • FIG1 is a schematic diagram of an Application-Aware Networking (APN) header in the related art
  • FIG2 is a first schematic diagram of an implementation flow of the information processing method according to an embodiment of the present disclosure
  • FIG3 is a second schematic diagram of the implementation flow of the information processing method according to an embodiment of the present disclosure.
  • FIG4 is a third schematic diagram of the implementation flow of the information processing method according to an embodiment of the present disclosure.
  • FIG5 is a schematic diagram of a system architecture for applying the information processing method according to an embodiment of the present disclosure
  • FIG6 is a schematic diagram of a specific implementation flow of the information processing method according to an embodiment of the present disclosure.
  • FIG7 is a schematic diagram of a controller allocating a first ARN ID to a user edge device according to an embodiment of the present disclosure
  • FIG8 is a schematic diagram of the life cycle of an ARN ID according to an embodiment of the present disclosure.
  • FIG9 is a first schematic diagram of marking a first IP message according to an embodiment of the present disclosure.
  • FIG10 is a second schematic diagram of marking a first IP message according to an embodiment of the present disclosure.
  • FIG11 is a third schematic diagram of marking a first IP message according to an embodiment of the present disclosure.
  • FIG12 is a fourth schematic diagram of marking a first IP message according to an embodiment of the present disclosure.
  • FIG13 is a first schematic diagram of an information processing device according to an embodiment of the present disclosure.
  • FIG14 is a second schematic diagram of the information processing device according to an embodiment of the present disclosure.
  • FIG15 is a third schematic diagram of an information processing device according to an embodiment of the present disclosure.
  • FIG16 is a schematic diagram of the structure of a user edge device according to an embodiment of the present disclosure.
  • FIG17 is a schematic diagram of the composition structure of a network edge device according to an embodiment of the present disclosure.
  • FIG18 is a schematic diagram of the composition structure of the controller according to an embodiment of the present disclosure.
  • IP Internet Protocol
  • MPLS Multi-Protocol Label Switching
  • SRv6 Segment Routing over IPv6
  • point-to-point network paths with different characteristics can be constructed, such as low latency and large bandwidth. Further building on the above capabilities and combining them with a bandwidth resource reservation mechanism can realize network-wide slicing capabilities, enabling a physical network to be virtualized into multiple logical slices, with each slice occupying different resources, thereby achieving multi-point to multi-point differentiated network connections.
  • IP backbone network already has flexible differentiated service capabilities, there are many different approaches to the coordination of applications and network capabilities.
  • the first approach is to classify traffic based on application characteristics and then direct different traffic to specific network paths (MPLS or SRv6).
  • MPLS MPLS
  • SRv6 specific network paths
  • the first solution uses an access control list (ACL) based on layer 3 and layer 4 header information to classify application types.
  • ACL access control list
  • the traffic is classified by matching the source IP, destination IP, protocol type, source port, and destination port five-tuples of the traffic through the ACL, and then directed to a specific low-latency or high-bandwidth tunnel/slice.
  • the hardware chips of routers and switches support ACL, so high-performance forwarding can be achieved.
  • ACL requires manual maintenance of the five-tuple characteristics of the application and configuration on the network device in the form of ACL commands. After the ACL classifies the flow, it specifies the next one for the flow, thereby directing the flow to the specified SRv6/MPLS tunnel or slice.
  • the second solution uses deep packet inspection (DPI) based on seven-layer content information to classify application types.
  • DPI deep packet inspection
  • DPI needs to identify the packet encapsulation, reassemble a series of packets into application data, and then classify them according to the characteristics of these application data.
  • DPI usually describes application characteristics in the form of regular expressions. It cannot be processed by the routing chip and can only be processed by the CPU. Common application characteristics include URLs, HTML tags, text, etc. Similar to ACL, application characteristics need to be manually maintained and configured on network devices, and it also needs to be able to reassemble multiple packets into application data.
  • DPI classifies the flow, it specifies the next one for the flow, thereby introducing the flow into the specified SRv6/MPLS tunnel or slice.
  • the second school of thought is to use explicit type information.
  • the network edge service access point PE identifies the application information explicitly carried in the message and then maps this type of message to the network tunnel/slice.
  • APN Application-Aware Networking additionally defines application information description in the message.
  • APN utilizes the extension headers (Extension Headers) that come with IPv6 data messages, such as the programmable space of the Hop-by-Hop Options Header (HBH) and the Destination Options Header (DOH).
  • Extension Headers Extension Headers
  • HBV Hop-by-Hop Options Header
  • DOH Destination Options Header
  • APN requires the message to carry application information so that network devices can directly identify the application information. After classifying the flow based on the APN information, it specifies the next one for the flow, thereby introducing the flow into the specified SRv6/MPLS tunnel or slice.
  • APN needs to explicitly carry the APN ID in the message in an unencrypted manner.
  • APN ID marking On the one hand, it requires the application to be willing to mark the APN ID, and on the other hand, it requires a unified organization to centrally allocate APN IDs to applications. According to the location of the APN ID marking on the traffic, it is divided into two methods: end-side marking and network marking. Considering that the early application side does not have the relevant capabilities, network boundary service access point marking can be used first. As the ecosystem matures, more services can carry APN IDs independently to further improve the accuracy of service perception.
  • FIG. 1 is a schematic diagram of an APN header in related art.
  • the APN header includes APN identification information and APN parameter information.
  • the APN header can be used in different data planes.
  • the APN header format may include:
  • APN parameter information (APN-Para).
  • APN ID is used to identify service attributes, indicating that messages carrying the same identifier will be given the same treatment. It specifically includes the following information: APP Group ID, which is used to identify the application group to which the message belongs and has a variable length; USER Group ID, which is used to identify the user group to which the message belongs and has a variable length.
  • APN parameter information is a parameter related to network performance requirements.
  • the specific parameters are defined by APN-Para-Type, and the length of each APN parameter is 32 bits.
  • APN-Para is transmitted together with the APN ID information to describe the required network connection requirements. It specifically includes the following information: Bandwidth, which indicates the bandwidth requirement of the application, in Mbit/s; Delay, the first 8 bits are reserved and must be set to 0 when sending and must be ignored when receiving.
  • the last 24 bits indicate the delay requirement, in ms, encoded as an integer value; Jitter, the first 8 bits are reserved and must be set to 0 when sending and must be ignored when receiving, and the last 24 bits indicate the delay variation requirement, in ms, encoded as an integer value; Packet Loss Ratio, the first 8 bits are reserved and must be set to 0 when sending and must be ignored when receiving, and the last 24 bits indicate the packet loss rate per second, which is the maximum packet loss rate allowed by the system.
  • the APN header (including the APN identifier and required parameters) can be encapsulated in the IPv6 packet extension header. Specifically, the following methods can be used:
  • Hop-by-Hop Options Header The APN header can be carried as a new option of the Hop-by-Hop Options Header. By using the information carried by the Hop-by-Hop Options Header, each node on the path can read it.
  • DOH Destination Options Header
  • Segment Routing Header The APN header can also be placed in the Segment Routing Header, as a type of Segment Routing Header TLV, immediately following the Segment List.
  • the information carried in the Segment Routing Header can be read by a specific segment on the SRv6 path.
  • the application information carried by data packets in the APN network can indicate the application (class) to which the data packet belongs, the user (group) information using the application (class), the key flows in the application (for example, action instructions in cloud games, etc.), SLA requirements or network performance requirement parameters (for example, bandwidth, latency, jitter, packet loss rate, etc.).
  • the third school of thought is to directly open the network connection and let the application call it.
  • the network connection service is abstracted by binding segment identifiers (BSID, Binding SID).
  • BSID binding segment identifiers
  • the IP backbone network abstracts the paths between PEs into BSIDs with different service capabilities, such as low latency, large bandwidth, and low packet loss, and directly compiles different BSIDs into the path list at the terminal.
  • This method requires the BSID to be made public, and the BSID is shared by multiple services. Once it is made public, it is easy to cause security issues such as network attacks and BSID bandwidth being misused.
  • the BSID is a shared resource, once it is deactivated, it will affect the business, so it cannot eliminate the security risks by deactivating it.
  • ACL and DPI are only applicable in specific scenarios.
  • ACL User Datagram Protocol
  • DPI can address the problem of ACLs failing to accurately identify applications, but its deployment also has significant limitations.
  • DPI requires CPU processing, consuming significant processing power.
  • DPI cannot handle encrypted packets, while the vast majority of Internet traffic, such as HTTPS, is encrypted. Therefore, large-scale application is difficult.
  • APN APN
  • the first issue is APN ID privacy and security. If traffic can be identified through APN, there is a risk of traffic hijacking and analysis, which can make users less motivated to use APN.
  • APN ID management is extremely difficult. APN IDs require unified management across the entire network, and different applications need to be distinguished by different values.
  • the Internet lacks a centralized application APN ID registration and management mechanism, and with the large number of new applications appearing daily, implementation is difficult.
  • the third issue is APN ID leakage. Messages may be intercepted during forwarding, allowing non-accelerated users to obtain this APN ID. This APN ID can then be included in messages sent by non-accelerated users, illegally achieving acceleration.
  • the user edge device obtains a first ARN identifier; the first ARN identifier represents the calling relationship between the application and the network capability and/or the capability open to the application by the network; the first IP packet is marked based on the first ARN identifier to generate a second IP packet; and the second IP packet is sent.
  • FIG. 2 is a schematic diagram of an implementation flow of an information processing method according to an embodiment of the present disclosure, which is applied to a user edge device.
  • the user edge device may be a client router, an SD-WAN CPE, a cloud gateway, or an application.
  • the method includes steps 201 to 203:
  • Step 201 Obtain a first ARN identifier; the first ARN identifier represents the calling relationship between the application and the network capability and/or the capability opened by the network to the application.
  • the network capability may refer to network resources, which may specifically include paths or slices, and the path may be understood as a tunnel.
  • the service type of the path or slice includes but is not limited to one of the following:
  • the calling relationship between the application and the network capability may include but is not limited to one of the following:
  • the application's call to low-latency network capabilities can also be described as the application's call to low-latency path or slice services.
  • the application's call to high-bandwidth network capabilities can also be described as the application's call to high-bandwidth path or slice services.
  • the application's call for low-packet-loss network capabilities can also be described as the application's call for low-packet-loss path or slice services.
  • network resources which may specifically include paths or slices, and the paths may be understood as tunnels.
  • Step 202 Mark the first IP packet based on the first ARN identifier to generate a second IP packet.
  • the first IP packet may be an IPv6 packet.
  • marking the first IP packet based on the first ARN identifier includes:
  • the first information is used to indicate whether to convert the original content in the flow label field into the first ARN identifier.
  • the first information may also be described as an escape character.
  • the first information may be located in the highest bit of the traffic class field.
  • the flow label (Flow Label) field is reused, and the highest bit (escape character) of the traffic type field (tc, traffic class) is used to indicate whether to escape. If the bit is 1, the original content in the flow label field is escaped to the first ARN ID; otherwise, no escape is performed.
  • marking the first IP packet based on the first ARN identifier includes:
  • the first ARN identifier is written into the source address field in the header of the first IP packet.
  • the extended header may refer to a DOH, HBH, or SRH header.
  • the ARN ID field is introduced into the first IP packet to glue the application and the network together through the first ARN ID.
  • the first ARN ID not only expresses the calling relationship between the application and the network, but also expresses the application's requirements for the network path or slice, such as path constraints such as latency, packet loss, jitter, and bandwidth.
  • obtaining the first ARN identifier includes:
  • the first ARN identifier is allocated by the controller to the user edge device based on user information, application information and network service information.
  • the network service information may include quality of service (QoS), network interface, etc.
  • QoS quality of service
  • network interface etc.
  • the service system calls the controller interface based on the service type subscribed by the user. After receiving the user's network service subscription request, the controller assigns the first ARN identifier to the user edge device.
  • the controller may allocate the first ARN identifier to the user edge device based on user information, application information, and network service information.
  • the first ARN ID can be any integer that satisfies a one-to-one correspondence between ⁇ user, application, network service> and ARN ID. Specifically, it can be generated using a random function, or generated from small to large, or from large to small.
  • the controller assigns the first ARN ID to the user edge device, it can also manage the lifecycle of the first ARN identifier, specifically including:
  • revocation refers to the controller deleting the relevant ARN ID information at the user and network edge.
  • the report of loss also corresponds to the cancellation of the related ARN ID.
  • reissue means that an ARN ID needs to be regenerated.
  • aging means that the corresponding APN service has a time limit, and the corresponding ARN ID will be automatically revoked after the time expires.
  • the extension refers to extending the service time of the ARN ID.
  • Step 203 Send the second IP message.
  • the second IP packet may be sent to a network edge device.
  • the network edge device is a BRAS/BNG for home users, a router connected to the core network for wireless users, and a PE for accessing user dedicated lines for government and enterprise users.
  • the network edge device parses the second IP packet to obtain the first ARN identifier carried in the first IP packet; and verifies the legitimacy of the first ARN identifier.
  • the validity of the first ARN identifier is verified in the following two situations:
  • the second IP packet is mapped to the corresponding path or slice based on the first ARN identifier.
  • the first operation is performed.
  • the first operation includes one of the following:
  • the user edge device may carry the first user information in the second IP message, so that the network edge device can verify the first ARN identifier.
  • sending the second IP message includes:
  • a user edge device obtains a first ARN identifier; the first ARN identifier represents the calling relationship between the application and the network capability and/or the capability opened by the network to the application; a first IP packet is marked based on the first ARN identifier to generate a second IP packet; and the second IP packet is sent.
  • the first ARN identifier represents the calling relationship between the application and the network capability and/or the capability opened by the network to the application
  • the user or application does not directly call the network capability, but calls the network capability through the first ARN identifier, so that the network will not see the relevant information of the user or application.
  • the network does not directly open the capability to the user, but opens the capability through the first ARN identifier, so that the user will not see the service information of the network, thereby improving security while providing application collaborative network capabilities.
  • the disclosed embodiments use ARN identification.
  • users/applications cannot directly call the network path, but must call network services through the intermediate layer ARN.
  • the network cannot see user application information, but only sees the intermediate layer ARN.
  • APN directly carries application and user information, which the network directly sees.
  • BSID directly opens network capabilities to users, and users directly see network service information.
  • ARN ID does not directly use the network connection identifier, such as BSID or SID, but uses an ARN ID independent of BSID.
  • the value range of ARN ID in the message is random for different users.
  • the controller can map a user network demand contract to different ARN ID values for different devices, and set it to be device-valid rather than globally valid. Different ARN ID values can be different for different devices. Therefore, it carries neither network privacy information nor user privacy information.
  • ARN IDs In terms of maintainability, network capabilities expressed through ARN IDs are independent of application changes, eliminating the frequent configuration changes associated with rapid application iterations and facilitating the planned opening of network capabilities. Furthermore, because ARN IDs correspond one-to-one with user-paid contracts, configuration information can be easily embedded into business processes, eliminating the need to convert contracts into ACL quintuples or APN IDs.
  • the ARN ID sits between applications and the network, and like a contract, has a lifecycle, with operations such as creation, destruction, expiration, renewal, and verification. If ARN ID information is discovered to be leaked, it can be quickly reported lost and a new ARN ID requested without impacting other users' services. Furthermore, messages entering the SR network can be correctly mapped to the corresponding SR Policy path based on the ARN ID, even without carrying a BSID/SID. Even when carrying a BSID/SID, the ARN ID can be used to verify the legitimacy of the BSID/SID call to the network. This resolves security issues.
  • ARN IDs can be divided into two categories: global ARN IDs, which have the same lifecycle across all sites, but can be different on different devices at different sites; and localized ARN IDs, which are tailored to the local needs of individual users and have independent lifecycles. Customers with localized ARN IDs must carry them in messages. Because ARN ID values are not required to be the same globally, coordination requirements are minimized.
  • the network edge device is a BRAS/BNG for home users, a router connected to the core network for wireless users, and a PE for accessing user dedicated lines for government and enterprise users.
  • the method includes step 301:
  • Step 301 Receive a second IP message
  • the second IP packet is obtained by the user edge device obtaining the first ARN identifier and marking the first IP packet based on the first ARN identifier; the first ARN identifier represents the calling relationship between the application and the network capability and/or the capability of the network to be open to the application.
  • the network capability may refer to network resources, which may specifically include paths or slices, and the path may be understood as a tunnel.
  • the service type of the path or slice includes but is not limited to one of the following:
  • the calling relationship between the application and the network capability may include but is not limited to one of the following:
  • the application's call to low-latency network capabilities can also be described as the application's call to low-latency path or slice services.
  • the application's call to high-bandwidth network capabilities can also be described as the application's call to high-bandwidth path or slice services.
  • the application's call for low-packet-loss network capabilities can also be described as the application's call for low-packet-loss path or slice services.
  • network resources which may specifically include paths or slices, and the paths may be understood as tunnels.
  • the method further comprises:
  • the preset data table stores a preset correspondence between user information and ARN identifiers
  • the second IP packet is mapped to a corresponding path or slice based on the first ARN identifier.
  • the user information may include a user identifier corresponding to the user, source address information, link information, etc.
  • the network edge device may receive a preset correspondence between user information and ARN identifiers sent by the controller.
  • the method further comprises:
  • the first operation includes one of the following:
  • resetting the value of the first ARN identifier may be resetting the first ARN ID to 0 as configured.
  • verifying the legitimacy of the first ARN identifier according to a preset data table includes:
  • the first ARN identifier is legal.
  • the correspondence between the first user information and the first ARN identifier is not found in the preset data table, it is determined that the first ARN identifier is illegal.
  • the first user information may be obtained through the source address field of the second IP packet.
  • the preset correspondence between user information and ARN identifiers may include: if the user information is Ua, the corresponding ARN identifier is a value of 1; if the user information is Ub, the corresponding ARN identifier is a value of 2; and if the user information is Uc, the corresponding ARN identifier is a value of 3.
  • the first user information is Ub and the first ARN identifier is a value of 2
  • mapping the second IP packet to a corresponding path or slice based on the first ARN identifier includes:
  • the first ARN identifier is legal, determine the first path or first slice corresponding to the first ARN identifier according to the preset correspondence between the path or slice and the ARN identifier; map the second IP packet to the first path or the first slice;
  • the path or slice includes one of the following:
  • MPLS Multiprotocol Label Switching
  • IP Internet Layer 3 Protocol
  • VxLAN Virtual Extended Local Area Network
  • GRE Generic Routing Encapsulation
  • GENEVE Generic Network Virtualization Encapsulation
  • the network edge device can obtain the preset correspondence between tunnels such as SRv6, Multi-Protocol Label Switching MPLS, Internet Layer 3 Protocol IPinIP, Virtual Extended Local Area Network VxLAN, Generic Routing Encapsulation Protocol GRE, and Generic Network Virtualization Encapsulation GENEVE and ARN identifiers from the controller.
  • tunnels such as SRv6, Multi-Protocol Label Switching MPLS, Internet Layer 3 Protocol IPinIP, Virtual Extended Local Area Network VxLAN, Generic Routing Encapsulation Protocol GRE, and Generic Network Virtualization Encapsulation GENEVE and ARN identifiers from the controller.
  • SRv6 tunnel 1 is tunnel color identifier a (high-bandwidth path or slice), and the corresponding ARN identifier is the value 1
  • SRv6 tunnel 2 is tunnel color identifier b (low-latency path or slice), and the corresponding ARN identifier is the value 2
  • SRv6 tunnel 3 is tunnel color identifier c (low-packet-loss path or slice), and the corresponding ARN identifier is the value 3.
  • the first ARN identifier is the value 2
  • it can be determined that the corresponding first path or first slice is SRv6 tunnel 2.
  • the second IP packet is mapped to the low-latency path or slice corresponding to the tunnel color identifier b.
  • a user edge device obtains a first ARN identifier; the first ARN identifier represents the calling relationship between the application and the network capability and/or the capability opened by the network to the application; a first IP packet is marked based on the first ARN identifier to generate a second IP packet; and the second IP packet is sent.
  • the first ARN identifier represents the calling relationship between the application and the network capability and/or the capability opened by the network to the application
  • the user or application does not directly call the network capability, but calls the network capability through the first ARN identifier, so that the network will not see the relevant information of the user or application.
  • the network does not directly open the capability to the user, but opens the capability through the first ARN identifier, so that the user will not see the service information of the network, thereby improving network security while providing application collaborative network capabilities.
  • step 401 which is a schematic diagram of an implementation flow of an information processing method according to an embodiment of the present disclosure, and is applied to a controller. As shown in FIG4 , the method includes step 401:
  • Step 401 Send a first ARN identifier to a user edge device; the first ARN identifier represents the calling relationship between the application and the network capability and/or the capability opened by the network to the application;
  • the first ARN identifier is used by the user edge device to mark the first IP packet, generate a second IP packet, and send the second IP packet.
  • the method further comprises:
  • the path or slice includes one of the following:
  • the controller sends the preset correspondence between the user information and the ARN identifier to the network edge device.
  • the network edge device can verify the legitimacy of the first ARN identifier based on the preset correspondence between the user information and the ARN identifier.
  • the controller sends the preset correspondence between the path or slice and the ARN identifier to the network edge device.
  • the network edge device can map the second IP packet to the path or slice corresponding to the first ARN identifier according to the preset correspondence between the path or slice and the ARN identifier if the first ARN identifier is legal.
  • the method further comprises:
  • the first ARN identifier is allocated to the user edge device based on user information, application information, and network service information.
  • the first ARN ID can be any integer as long as there is a one-to-one correspondence between ⁇ user, application, network service> and ARN ID.
  • the first ARN identifier can be generated using a random function, or generated from small to large, or from large to small.
  • the method further comprises:
  • managing the lifecycle of the first ARN identifier includes:
  • revocation refers to the controller deleting the relevant ARN ID information at the user and network edge.
  • the report of loss also corresponds to the cancellation of the related ARN ID.
  • reissue means that an ARN ID needs to be regenerated.
  • aging means that the corresponding APN service has a time limit, and the corresponding ARN ID will be automatically revoked after the time expires.
  • the extension refers to extending the service time of the ARN ID.
  • a user edge device obtains a first ARN identifier; the first ARN identifier represents the calling relationship between the application and the network capability and/or the capability opened by the network to the application; a first IP packet is marked based on the first ARN identifier to generate a second IP packet; and the second IP packet is sent.
  • the first ARN identifier represents the calling relationship between the application and the network capability and/or the capability opened by the network to the application
  • the user or application does not directly call the network capability, but calls the network capability through the first ARN identifier, so that the network will not see the relevant information of the user or application.
  • the network does not directly open the capability to the user, but opens the capability through the first ARN identifier, so that the user will not see the service information of the network, thereby improving security while providing application collaborative network capabilities.
  • FIG5 is a schematic diagram of a system architecture for an information processing method according to an embodiment of the present disclosure. As shown in FIG5 , the system includes:
  • the controller is configured to allocate a first ARN identifier to a user edge device; the first ARN identifier represents a calling relationship between an application and a network capability and/or a capability exposed by the network to the application.
  • the customer edge device (CPE1) is configured to mark the first IP packet based on the first ARN identifier to generate a second IP packet; and send the second IP packet to the network edge device.
  • a network edge device is used to parse the second IP packet to obtain the first ARN identifier and first user information (such as user ID); use the first user information to verify the legitimacy of the first ARN identifier, and if the first ARN identifier is legal, map the second IP packet to the corresponding path or slice based on the first ARN identifier.
  • PE network edge device
  • the user edge device can be a client router, SD-WAN CPE, cloud gateway or an application.
  • the network edge device is BRAS/BNG for home users, a router connected to the core network for wireless users, and a PE for accessing user dedicated lines for government and enterprise users.
  • FIG. 6 is a schematic diagram of a specific implementation flow of the information processing method according to an embodiment of the present disclosure. As shown in FIG6 , the method includes steps 601 to 606:
  • Step 601 The controller allocates a first ARN identifier to the user edge device; the first ARN identifier represents the calling relationship between the application and the network capability and/or the capability opened by the network to the application.
  • the network capability may refer to network resources, which may specifically include paths or slices, and the path may be understood as a tunnel.
  • the service type of the path or slice includes but is not limited to one of the following:
  • the calling relationship between the application and the network capability may include but is not limited to one of the following:
  • the application's call to low-latency network capabilities can also be described as the application's call to low-latency path or slice services.
  • the application's call to high-bandwidth network capabilities can also be described as the application's call to high-bandwidth path or slice services.
  • the application's call for low-packet-loss network capabilities can also be described as the application's call for low-packet-loss path or slice services.
  • network resources which may specifically include paths or slices, and the paths may be understood as tunnels.
  • the service system calls the controller interface based on the service type subscribed by the user. After receiving the user's network service subscription request, the controller assigns the first ARN identifier to the user edge device.
  • the controller may allocate the first ARN identifier to the user edge device based on user information, application information, and network service information.
  • the first ARN ID can be any integer as long as there is a one-to-one correspondence between ⁇ user, application, network service> and ARN ID.
  • the first ARN identifier can be generated using a random function, or generated from small to large, or from large to small.
  • FIG7 is a schematic diagram of a controller assigning a first ARN ID to a user edge device according to an embodiment of the present disclosure.
  • the application information is a video application
  • the network service information is a low-latency path or slice
  • an ARN ID is randomly selected from the unassigned ARN ID database and assigned to the corresponding user edge device as the first ARN ID.
  • the application information is a video application
  • the network service information is a low-latency and high-bandwidth path or slice
  • two ARN IDs are randomly selected from the unassigned ARN ID database and assigned to the corresponding user edge device as the first ARN ID.
  • the user edge device is used to call network capabilities.
  • the user edge device can be a client router, SD-WAN CPE, cloud gateway or an application.
  • FIG 8 is a schematic diagram of the life cycle of the ARN ID in the embodiment of the present disclosure.
  • the ARN ID has three states: unallocated, active period, and silent period. Among them, in the initial stage, the ARN ID is in the unallocated state; once allocated, it enters the active period. During the active period, the ARN ID service contract expires, the user terminates it early, or it is reported lost, which will cause the ARN ID to enter the silent period. The ARN ID in the silent period is in a suspended state. The purpose is to avoid conflicts or security risks. Therefore, it will not be allocated to the outside for a period of time. After a period of time (generally half a year or more than a year), it will be recycled into the unallocated ARN ID database.
  • a period of time generally half a year or more than a year
  • the controller assigns the first ARN ID to the user edge device, it can also manage the lifecycle of the first ARN identifier, specifically including:
  • revocation refers to the controller deleting the relevant ARN ID information at the user and network edge.
  • the report of loss also corresponds to the cancellation of the related ARN ID.
  • reissue means that an ARN ID needs to be regenerated.
  • aging means that the corresponding APN service has a time limit, and the corresponding ARN ID will be automatically revoked after the time expires.
  • the extension refers to extending the service time of the ARN ID.
  • Step 602 The user edge device marks the first IP packet based on the first ARN identifier to generate a second IP packet.
  • the first IP packet may refer to an IPv6 packet.
  • the length of the first ARN ID is at least 10 bits.
  • the ARN identifier (ID) information can be placed in the following ways:
  • the first carrying method is IPv6 header escape method.
  • Figure 9 is a schematic diagram of marking the first IP packet according to an embodiment of the present disclosure.
  • the first IP packet is an IPv6 packet and the ARN ID is 20 bits
  • the ARN ID and the first information are respectively written into the flow label field (Flow Label) and the traffic type field (traffic class) in the header of the IPv6 packet; wherein the first information is used to indicate whether the original content in the flow label field is escaped into the ARN ID.
  • the 20 bits of the flow label are reused, and the highest bit (escape character) of the traffic class field (tc) is used to indicate whether to escape. If this bit is 1, the original content in the flow label field is escaped to the ARN ID; otherwise, no escape is performed.
  • the second way is to carry it through the IPv6 extension header.
  • FIG 10 is a schematic diagram of marking the first IP message according to an embodiment of the present disclosure.
  • the ARN ID is 20 bits
  • the ARN ID is written into the extended header of the IPv6 message, namely DOH and HBH
  • type indicates that the 4 bytes (0 to 31 bits) are ARN ID, and flag is reserved and undefined.
  • the third method is to carry it through the IPv6 extension header.
  • Figure 11 is a schematic diagram of marking the first IP message according to an embodiment of the present disclosure.
  • the ARN ID is 20 bits, and the ARN ID is written into the extended header SRH header of the IPv6 message.
  • Type indicates that the 4 bytes (0 to 31 bits) are ARN ID, and flag is reserved and undefined.
  • the fourth method is to carry the IPv6 source address.
  • FIG 12 is a schematic diagram of marking the first IP message according to an embodiment of the present disclosure.
  • the first IP message is an IPv6 message and the ARN ID is 20 bits
  • the ARN ID is written into the source address field of the IPv6 message.
  • the first ARN ID is actively carried in the first IP message, and the specific location can be DOH, HBH, SRH, FlowLabel, and source address.
  • the 7th bit of the traffic type field (TC) needs to be set to 1 to indicate that the current Flow Label carries the ARN ID.
  • the type field needs to be additionally defined to indicate that the 32-bit carries the ARN ID.
  • Step 603 The user edge device sends the second IP packet to the network edge device.
  • the network edge device is BRAS/BNG for home users, a router connected to the core network for wireless users, and a PE for accessing user dedicated lines for government and enterprise users.
  • Step 604 The network edge device parses the second IP packet to obtain the first ARN identifier; and verifies the legitimacy of the first ARN identifier.
  • the validity of the first ARN identifier is verified according to a preset data table, wherein the preset data table stores a preset correspondence between user information and ARN identifiers, wherein the user information may include a user identifier corresponding to the user, source address information, or link information.
  • the ARN ID verification table i.e., the preset data table
  • Each item in the data table contains the correspondence between user information and ARN identifier, wherein the user information can be represented by the source IP address, etc.
  • the network edge device may obtain the preset data table from the controller.
  • the network edge device when the network edge device receives the second IP message containing the first ARN ID, it can obtain the first user information based on the source IP address in the second IP message, and obtain the first ARN ID based on the second IP message, and then search whether the preset data table contains the correspondence between the first user information and the first ARN identifier to verify the legitimacy of the first ARN identifier.
  • Table 1 is a schematic diagram of the correspondence between user information and ARN identifiers. As shown in Table 1, if the user information is Ua, the corresponding ARN identifier is the value 1; if the user information is Ub, the corresponding ARN identifier is the value 2; and if the user information is Uc, the corresponding ARN identifier is the value 3.
  • verifying the legitimacy of the first ARN identifier according to the preset data table includes:
  • the correspondence between the first user information and the first ARN identifier is not found in the preset data table, it is determined that the first ARN identifier is illegal.
  • the first user information may be obtained through the inbound interface link or the source IP address in the second IP packet.
  • Step 605 When the ARN identifier is verified to be legal, the second IP packet is mapped to a corresponding path or slice based on the first ARN identifier.
  • mapping the second IP packet to a corresponding path or slice based on the first ARN identifier includes:
  • the path or slice includes one of the following:
  • MPLS Multiprotocol Label Switching
  • IP Internet Layer 3 Protocol
  • VxLAN Virtual Extended Local Area Network
  • GRE Generic Routing Encapsulation
  • GENEVE Generic Network Virtualization Encapsulation
  • the network edge device can obtain the preset correspondence between the path or slice and the ARN identifier from the controller.
  • Table 2 shows the correspondence between SRv6 tunnels and ARN identifiers. As shown in Table 2, taking SRv6 as an example, it includes SRv6 tunnel 1, SRv6 tunnel 2, and SRv6 tunnel 3.
  • SRv6 tunnel 1 has tunnel color identifier a (high-bandwidth path or slice), and its corresponding ARN identifier is 1.
  • SRv6 tunnel 2 has tunnel color identifier b (low-latency path or slice), and its corresponding ARN identifier is 2.
  • SRv6 tunnel 3 has tunnel color identifier c (low-packet-loss path or slice), and its corresponding ARN identifier is 3.
  • the first ARN identifier is the value 2, according to Table 2, it can be determined that the corresponding first path or first slice is SRv6 tunnel 2, that is, tunnel color identifier b (low-latency path or slice). In this way, the second IP packet is mapped to SRv6 tunnel 2.
  • Step 606 When it is verified that the ARN identifier is illegal, perform the first operation.
  • the first operation includes one of the following:
  • the second IP packet can be processed as follows according to the configuration:
  • the first ARN ID is reset to 0 as configured; or,
  • the second IP packet will be forwarded according to the slice and tunnel that does not contain the ARN ID.
  • the network ARN ID is mainly used at network edge service access points (such as PE, BRAS/BNG).
  • the business system calls the controller interface according to the service type subscribed by the user. After receiving the user's network service subscription requirements, the controller will find the corresponding network edge device (PE/BRAS/BNG) according to the locations of both ends of the connection, and create or reuse the corresponding low-latency color tunnel identifier (color) of SRv6, Multi-Protocol Label Switching (MPLS), Internet Layer 3 Protocol (IPinIP) between the PE/BRAS/BNG according to the user's low-latency requirements.
  • PLS network edge device
  • IPinIP Internet Layer 3 Protocol
  • the controller will generate ARN ID for users, applications and network services (corresponding color), and look up the source address information or link information corresponding to the user to identify the user.
  • the user (source address or link information) and ARN ID are then sent to the network edge service access point PE/BRAS/BNG and associated with the network resource slice/tunnel, thus completing the configuration of PE/BRAS/BNG on the network side.
  • the controller On the user-side network, the controller locates the corresponding customer edge device (CPE/gateway) based on the user and then issues the ARN ID information. This allows users to tag the ARN ID based on the application type in subsequent applications.
  • CPE/gateway customer edge device
  • legitimacy verification is performed to enable the invocation of corresponding network capabilities.
  • Users can also tag applications with the ARN ID through methods such as ACLs and designated links, thus including the ARN ID in user-side messages.
  • network services can provide users with differentiated connections (low latency, large bandwidth tunnels/slices) through ARN ID instead of BSID/SID.
  • ARN ID provides the ability to assign different values to each user, which is different from the security issues caused by multiple users sharing one BSID.
  • the value of ARN ID is a number that does not explicitly carry application or user information. It can be a random number or a sequentially assigned value, so there is no problem of APN6 exposing user privacy.
  • APN6 and BSID multiple ARN IDs that can be mapped to the same network capability can be aggregated into one ARN ID.
  • the first ARN ID can be used together with user information for traffic billing.
  • user information can be identified by link, i.e., PPPoE connection, or in PE scenarios, by source IP address or dedicated line link.
  • the scope of the first ARN ID can be global or local.
  • Local validity means that different ARN IDs on the device are unique; global validity means that one or more ARN IDs of a specific user within a certain range of devices can be mapped to a tunnel/slice in the network.
  • ARN ID does not explicitly carry the user’s application information and each user’s ARN ID is different, this solves the user privacy problem and also solves the network security problem caused by different users sharing the BSID.
  • the ARN ID is actually equivalent to the routing policy Color (directly corresponding to the Color of the SR Policy).
  • the PE can obtain the user information based on the source IP, and after verifying the legitimacy of the ARN ID, it can map the ARN ID to a specific network tunnel/slice.
  • the embodiment of the present disclosure also provides an information processing device, which is installed in the user edge device.
  • Figure 13 is a schematic diagram of the composition structure of the information processing device of the embodiment of the present disclosure. As shown in Figure 13, the device includes:
  • the acquisition module 131 is configured to acquire a first ARN identifier; the first ARN identifier represents the calling relationship between the application and the network capability and/or the capability opened by the network to the application;
  • the processing module 132 is configured to mark the first IP packet based on the first ARN identifier to generate a second IP packet;
  • the first sending module 133 is configured to send the second IP message.
  • the processing module 132 is configured to:
  • the first information is used to indicate whether to convert the original content in the flow label field into the first ARN identifier.
  • the processing module 132 is configured to:
  • the first ARN identifier is written into the source address field in the header of the first IP packet.
  • the acquisition module 131 is configured to:
  • the first ARN identifier is allocated by the controller to the user edge device based on user information, application information and network service information.
  • the first sending module 133 is configured to:
  • the acquisition module 131 and the first sending module 133 can be implemented by a communication interface in an information processing device; and the processing module 132 can be implemented by a processor in the information processing device.
  • the information processing device provided in the above embodiments is illustrated only by the division of the above-mentioned program modules when performing information processing.
  • the above-mentioned processing can be assigned to different program modules as needed, that is, the internal structure of the device can be divided into different program modules to complete all or part of the above-described processing.
  • the information processing device provided in the above embodiments and the information processing method embodiment are based on the same concept. The specific implementation process is detailed in the method embodiment and is not repeated here.
  • the embodiment of the present disclosure also provides an information processing device, which is installed on the network edge device.
  • Figure 14 is a schematic diagram of the composition structure of the information processing device of the embodiment of the present disclosure. As shown in Figure 14, the device includes:
  • Receiving module 141 configured to receive a second IP message
  • the second IP packet is obtained by the user edge device obtaining the first ARN identifier and marking the first IP packet based on the first ARN identifier; the ARN identifier represents the calling relationship between the application and the network capability and/or the capability opened by the network to the application.
  • the apparatus is configured to:
  • the preset data table stores a preset correspondence between user information and ARN identifiers
  • the second IP packet is mapped to a corresponding path or slice based on the first ARN identifier.
  • the apparatus is configured to:
  • the first operation includes one of the following:
  • the apparatus is configured to:
  • the first ARN identifier is legal.
  • the apparatus is configured to:
  • the first ARN identifier is legal, determine the first path or first slice corresponding to the first ARN identifier according to the preset correspondence between the path or slice and the ARN identifier; map the second IP packet to the first path or the first slice;
  • the path or slice includes one of the following:
  • the receiving module 141 can be implemented by a communication interface in an information processing device.
  • the information processing device provided in the above embodiments is illustrated only by the division of the above-mentioned program modules when performing information processing.
  • the above-mentioned processing can be assigned to different program modules as needed, that is, the internal structure of the device can be divided into different program modules to complete all or part of the above-described processing.
  • the information processing device provided in the above embodiments and the information processing method embodiment are based on the same concept. The specific implementation process is detailed in the method embodiment and is not repeated here.
  • the embodiment of the present disclosure further provides an information processing device, which is provided in the controller.
  • FIG15 is a schematic diagram of the composition structure of the information processing device of the embodiment of the present disclosure. As shown in FIG15 , the device includes:
  • the second sending module 151 is configured to send a first ARN identifier to the user edge device; the first ARN identifier represents the calling relationship between the application and the network capability and/or the capability opened by the network to the application;
  • the first ARN identifier is used by the user edge device to mark the first IP packet, generate a second IP packet, and send the second IP packet.
  • the second sending module 151 is configured to:
  • the path or slice includes one of the following:
  • the apparatus is configured to:
  • the first ARN identifier is allocated to the user edge device based on user information, application information, and network service information.
  • the method further includes: managing the life cycle of the first ARN identifier.
  • the apparatus is configured to:
  • the second sending module 151 can be implemented by a communication interface in an information processing device.
  • the information processing device provided in the above embodiments is illustrated only by the division of the above-mentioned program modules when performing information processing.
  • the above-mentioned processing can be assigned to different program modules as needed, that is, the internal structure of the device can be divided into different program modules to complete all or part of the above-described processing.
  • the information processing device provided in the above embodiments and the information processing method embodiment are based on the same concept. The specific implementation process is detailed in the method embodiment and is not repeated here.
  • the present disclosure also provides a user edge device, as shown in FIG16 , including:
  • the first communication interface 161 is capable of exchanging information with other user edge devices
  • the first processor 162 is connected to the first communication interface 161 and is configured to execute the method provided by one or more technical solutions on the user edge device side when running a computer program.
  • the computer program is stored in the first memory 163 .
  • bus system 164 is used to enable communication between these components.
  • bus system 164 also includes a power bus, a control bus, and a status signal bus. However, for clarity, all of these buses are labeled as bus system 164 in FIG. 16 .
  • the first memory 163 in the embodiment of the present disclosure is used to store various types of data to support the operation of the user edge device 160 .
  • Examples of such data include any computer program used to operate on the user edge device 160 .
  • the methods disclosed in the above embodiments of the present disclosure can be applied to the first processor 162 or implemented by the first processor 162.
  • the first processor 162 may be an integrated circuit chip with signal processing capabilities. During implementation, the steps of the above methods can be completed by hardware integrated logic circuits in the first processor 162 or by software instructions.
  • the above first processor 162 may be a general-purpose processor, a digital signal processor (DSP), or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc.
  • DSP digital signal processor
  • the first processor 162 can implement or execute the various methods, steps, and logic block diagrams disclosed in the embodiments of the present disclosure.
  • a general-purpose processor may be a microprocessor or any conventional processor, etc.
  • the steps of the methods disclosed in conjunction with the embodiments of the present disclosure can be directly implemented as being executed by a hardware decoding processor, or can be executed by a combination of hardware and software modules in the decoding processor.
  • the software module can be located in a storage medium located in the first memory 163.
  • the first processor 162 reads the information in the first memory 163 and completes the steps of the above methods in conjunction with its hardware.
  • the second communication interface 171 is capable of exchanging information with other user edge devices
  • the second processor 172 is connected to the second communication interface 171 and is configured to execute the method provided by one or more technical solutions on the network edge device side when running a computer program.
  • the computer program is stored in the second memory 173 .
  • bus system 174 is used to enable communication between these components.
  • bus system 174 also includes a power bus, a control bus, and a status signal bus. However, for clarity, all of these buses are labeled as bus system 174 in FIG. 17 .
  • the second memory 173 in the embodiment of the present disclosure is used to store various types of data to support the operation of the network boundary device 170. Examples of such data include any computer program used to operate on the network boundary device 170.
  • the methods disclosed in the above embodiments of the present disclosure can be applied to the second processor 172 or implemented by the second processor 172.
  • the second processor 172 may be an integrated circuit chip with signal processing capabilities. During implementation, each step of the above method can be completed by the hardware integrated logic circuit in the second processor 172 or by instructions in the form of software.
  • the above second processor 172 may be a general-purpose processor, a digital signal processor (DSP), or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc.
  • DSP digital signal processor
  • the second processor 172 can implement or execute the various methods, steps, and logic block diagrams disclosed in the embodiments of the present disclosure.
  • a general-purpose processor may be a microprocessor or any conventional processor.
  • the steps of the methods disclosed in conjunction with the embodiments of the present disclosure can be directly implemented as being executed by a hardware decoding processor, or can be executed by a combination of hardware and software modules in the decoding processor.
  • the software module can be located in a storage medium located in the second memory 173.
  • the second processor 172 reads the information in the second memory 173 and completes the steps of the above method in conjunction with its hardware.
  • the present disclosure also provides a controller, as shown in FIG18 , including:
  • the third communication interface 181 is capable of exchanging information with other devices
  • the third processor 182 is connected to the third communication interface 181 and is used to execute the method provided by one or more technical solutions of the controller side when running a computer program.
  • the computer program is stored in the third memory 183.
  • bus system 184 is used to enable communication between these components.
  • bus system 184 also includes a power bus, a control bus, and a status signal bus. However, for clarity, in FIG. 18 , all of these buses are labeled as bus system 184.
  • the third memory 183 in the embodiment of the present disclosure is used to store various types of data to support the operation of the controller 180. Examples of such data include any computer programs used to operate on the controller 180.
  • the methods disclosed in the above-mentioned embodiments of the present disclosure can be applied to the third processor 182 or implemented by the third processor 182.
  • the third processor 182 may be an integrated circuit chip with signal processing capabilities. During implementation, each step of the above-mentioned method can be completed by hardware integrated logic circuits or software instructions in the third processor 182.
  • the above-mentioned third processor 182 may be a general-purpose third processor, a digital signal processor (DSP), or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc.
  • DSP digital signal processor
  • the third processor 182 can implement or execute the various methods, steps, and logic block diagrams disclosed in the embodiments of the present disclosure.
  • a general-purpose third processor can be a microprocessor or any conventional third processor.
  • the steps of the methods disclosed in conjunction with the embodiments of the present disclosure can be directly implemented and executed by the hardware decoding third processor, or by a combination of hardware and software modules in the decoding third processor.
  • the software module can be located in a storage medium located in the third memory 183.
  • the third processor 182 reads the information in the third memory 183 and, in conjunction with its hardware, completes the steps of the above-mentioned method.
  • the user edge device 160, the network edge device 170, and the controller 180 can be implemented by one or more application-specific integrated circuits (ASICs), DSPs, programmable logic devices (PLDs), complex programmable logic devices (CPLDs), field-programmable gate arrays (FPGAs), general-purpose processors, controllers, microcontrollers (MCUs), microprocessors, or other electronic components to perform the aforementioned method.
  • ASICs application-specific integrated circuits
  • DSPs digital signal processors
  • PLDs programmable logic devices
  • CPLDs complex programmable logic devices
  • FPGAs field-programmable gate arrays
  • general-purpose processors controllers
  • controllers microcontrollers (MCUs), microprocessors, or other electronic components to perform the aforementioned method.
  • the memory (first memory 163, second memory 173, third memory 183) of the embodiment of the present disclosure can be a volatile memory or a non-volatile memory, and can also include both volatile and non-volatile memories.
  • the non-volatile memory can be a read-only memory (ROM), a programmable read-only memory (PROM), an erasable programmable read-only memory (EPROM), an electrically erasable programmable read-only memory (EEPROM), a magnetic random access memory (FRAM), a flash memory, a magnetic surface memory, an optical disc, or a compact disc read-only memory (CD-ROM);
  • the magnetic surface memory can be a disk memory or a tape memory.
  • Volatile memory can be random access memory (RAM), which is used as external cache.
  • RAM random access memory
  • RAM random access memory
  • SSRAM synchronous static random access memory
  • DRAM dynamic random access memory
  • SDRAM synchronous dynamic random access memory
  • DDRSDRAM double data rate synchronous dynamic random access memory
  • ESDRAM enhanced synchronous dynamic random access memory
  • SLDRAM synchronized dynamic random access memory
  • DRRAM direct rambus random access memory
  • the present disclosure further provides a storage medium, namely, a computer storage medium, specifically, a computer-readable storage medium, such as a memory storing a computer program.
  • the computer program can be executed by the first processor 162 of the user edge device 160 to complete the steps of the user edge device-side method.
  • the computer-readable storage medium can be a memory such as FRAM, ROM, PROM, EPROM, EEPROM, Flash Memory, magnetic surface storage, optical disk, or CD-ROM.
  • an embodiment of the present disclosure also provides a computer program product, including a computer program, which can be executed by the first processor 162 of the user edge device 160 to complete the steps of any of the aforementioned methods, or executed by the second processor 172 of the network edge device 170 to complete the steps of any of the aforementioned methods, or executed by the third processor 182 of the controller 180 to complete the steps of any of the aforementioned methods.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Quality & Reliability (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

La présente divulgation divulgue un procédé et un appareil de traitement d'informations, un dispositif, un support de stockage et un produit programme informatique. Le procédé comprend les étapes suivantes : un dispositif périphérique client acquiert un premier identifiant de réseau de réponse d'application (ARN), le premier identifiant ARN représentant une relation d'appel d'une application à une capacité de réseau et/ou une capacité d'un réseau à exposer à l'application ; marquer un premier paquet de protocole Internet (IP) sur la base du premier identifiant ARN pour générer un second paquet IP ; et envoyer le second paquet IP.
PCT/CN2025/078846 2024-02-28 2025-02-24 Procédé et appareil de traitement d'informations, dispositif, support de stockage et produit-programme informatique Pending WO2025180331A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202410224372.6A CN118802068A (zh) 2024-02-28 2024-02-28 信息处理方法、装置、设备、存储介质及计算机程序产品
CN202410224372.6 2024-02-28

Publications (1)

Publication Number Publication Date
WO2025180331A1 true WO2025180331A1 (fr) 2025-09-04

Family

ID=93034056

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2025/078846 Pending WO2025180331A1 (fr) 2024-02-28 2025-02-24 Procédé et appareil de traitement d'informations, dispositif, support de stockage et produit-programme informatique

Country Status (2)

Country Link
CN (1) CN118802068A (fr)
WO (1) WO2025180331A1 (fr)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118802068A (zh) * 2024-02-28 2024-10-18 中国移动通信有限公司研究院 信息处理方法、装置、设备、存储介质及计算机程序产品
CN118803099A (zh) * 2024-03-20 2024-10-18 中国移动通信有限公司研究院 报文处理方法、配置方法、装置及通信设备

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20210037410A1 (en) * 2019-07-31 2021-02-04 Futurewei Technologies, Inc. Transporting A Multi-Transport Network Context-Identifier (MTNC-ID) Across Multiple Domains
WO2022110535A1 (fr) * 2020-11-27 2022-06-02 华为技术有限公司 Procédé, dispositif et système d'envoi de paquet
CN115334589A (zh) * 2021-05-11 2022-11-11 中国移动通信有限公司研究院 报文传输方法、装置、相关设备及存储介质
CN116846862A (zh) * 2022-03-24 2023-10-03 中国移动通信有限公司研究院 一种SRv6报文处理方法、装置、通信设备和存储介质
CN118802068A (zh) * 2024-02-28 2024-10-18 中国移动通信有限公司研究院 信息处理方法、装置、设备、存储介质及计算机程序产品

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116112416A (zh) * 2021-11-11 2023-05-12 中兴通讯股份有限公司 报文转发方法、电子设备及存储介质
CN117135196A (zh) * 2022-05-19 2023-11-28 华为技术有限公司 一种数据传输方法和相关设备
CN117527681A (zh) * 2023-10-13 2024-02-06 上海卫星互联网研究院有限公司 一种数据传输方法、装置、网络设备及存储介质

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20210037410A1 (en) * 2019-07-31 2021-02-04 Futurewei Technologies, Inc. Transporting A Multi-Transport Network Context-Identifier (MTNC-ID) Across Multiple Domains
WO2022110535A1 (fr) * 2020-11-27 2022-06-02 华为技术有限公司 Procédé, dispositif et système d'envoi de paquet
CN115334589A (zh) * 2021-05-11 2022-11-11 中国移动通信有限公司研究院 报文传输方法、装置、相关设备及存储介质
CN116846862A (zh) * 2022-03-24 2023-10-03 中国移动通信有限公司研究院 一种SRv6报文处理方法、装置、通信设备和存储介质
CN118802068A (zh) * 2024-02-28 2024-10-18 中国移动通信有限公司研究院 信息处理方法、装置、设备、存储介质及计算机程序产品

Also Published As

Publication number Publication date
CN118802068A (zh) 2024-10-18

Similar Documents

Publication Publication Date Title
US12101254B2 (en) Packet processing method and network device
US9887881B2 (en) DNS-assisted application identification
US6990592B2 (en) Controlling concurrent usage of network resources by multiple users at an entry point to a communications network based on identities of the users
US10230627B2 (en) Service path allocation method, router and service execution entity
US6892309B2 (en) Controlling usage of network resources by a user at the user's entry point to a communications network based on an identity of the user
EP2727297B1 (fr) Construction de trajet de transfert en fonction de variables pour traitement de paquets dans un dispositif de réseau
CN107733799B (zh) 一种报文传输方法和装置
CN105591971B (zh) 一种QoS的实现方法和装置
US20160350151A1 (en) System and method for routing network frames between virtual machines
CN112437009B (zh) SRv6端到端流策略的方法、路由器、路由系统和存储介质
WO2025180331A1 (fr) Procédé et appareil de traitement d'informations, dispositif, support de stockage et produit-programme informatique
US7855972B2 (en) Creating, modifying and storing service abstractions and role abstractions representing one or more packet rules
CN102857322A (zh) 混合端口范围编码
WO2022237291A1 (fr) Procédé et appareil de transmission de message, dispositif associé et support de stockage
CA2774281C (fr) Procede d'acces utilisateur, systeme et serveur d'acces, dispositif d'acces
WO2023116355A1 (fr) Procédé et appareil de communication, dispositifs et support d'enregistrement associés
CN115348202A (zh) 基于网络切片的数据传输方法、装置、设备及存储介质
CN111865805B (zh) 一种组播gre报文处理方法及系统
CN115460155B (zh) Sdwan应用流量控制方法、装置、设备和存储介质
CN103731352B (zh) 一种报文处理方法和装置
CN120358078B (zh) 一种基于切片网络及可信数据空间的数据流通方法及系统
WO2024002101A1 (fr) Procédé et appareil de transmission de paquets, dispositif associé, et support de stockage
WO2025256325A1 (fr) Procédé et appareil de traitement de paquets, nœud, support de stockage et produit-programme informatique
CN119854882A (zh) 通信方法及相关设备
CN118803062A (zh) 报文处理方法、装置、节点、存储介质及计算机程序产品

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 25760872

Country of ref document: EP

Kind code of ref document: A1