Service node configuration method and service node pool logger and system

A technology of service node and configuration method, applied in the field of communication, can solve problems such as overload, heavier burden, and easy failure.

Active Publication Date: 2014-01-01
HUAWEI TECH CO LTD
View PDF7 Cites 84 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 3. After the original dedicated hardware-supported business nodes are virtualized, their individual high performance is replaced by virtual machines. The relative performance decline will lead to a decrease in the efficiency of the business nodes, and the burden will also increase with the increase of tenants

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Service node configuration method and service node pool logger and system
  • Service node configuration method and service node pool logger and system
  • Service node configuration method and service node pool logger and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0101] Combine below figure 2 Illustrate preferred embodiment one of the present invention, the processing procedure of business node registration is as follows:

[0102] The service nodes in the embodiment of the present invention are all service nodes (such as vFW, vLB) that have been successfully created, and their related function templates are issued by the management configuration device, as in step 1a in the figure, the firewall service template is issued and assigned to tenant A, and the notification The next hop of Service Node1 is Service Node2, 1b delivers the LB business template and assigns it to tenant A, and 1c delivers the WoC business template without specifying a tenant;

[0103] The service node configures corresponding functions, as in step 2a in the figure, the service node configures the firewall service, 2b the service node configures the LB service, and 2c the service node configures the WoC service;

[0104] After the service node is successfully cre...

Embodiment 2

[0105] Combine below image 3 Describe the second preferred embodiment of the present invention. After the firewall service node executes the first packet to pass, the logout process is as follows:

[0106] The function of passing the first packet supported by the firewall mainly refers to: after the first packet passes, it confirms that the packet of this type of forwarding information meets the requirements, so as to directly issue the forwarding entry to the forwarding device, so that subsequent packets with the same forwarding attribute can pass directly, without It needs to be processed by the firewall again, so as to improve the processing efficiency;

[0107] Business node deregistration needs to send a deregistration message to the service node pool register, and at the same time, it needs to attach the identification information of the business node it jumps up and down, so as to update the relevant content in the service node database;

[0108] Finally, the manageme...

Embodiment 3

[0119] Combine below Figure 4 Illustrate the preferred embodiment three of the present invention, the processing flow of the heavy part of the service node is as follows:

[0120] For the relocation of service nodes, the most important thing is to query the qualified source service nodes and destination service nodes in the service node database of the service node pool register according to the restrictions of relocation;

[0121] If two corresponding service nodes can be found, the following operations are the deregistration and release of the source service node, the creation and update of the destination service node, and the update of the service node chain.

[0122] The specific steps are:

[0123] 1. Management and configuration equipment submits restrictions on relocation of service nodes (source and destination nodes of service relocation, functional specifications, relocation policies, etc.);

[0124] 2. The service node pool register queries the qualified sourc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a service node configuration method. The method includes the steps that a service node query request sent by management configuration equipment is received, and the service node query request contains service requirements which come from users or are caused by network changes; a service node database is searched for, service node information matched with the service node query request is obtained, and the matched service node information includes matched service node identification, position information, state information, a selection strategy for the state information, lessee identification and one or more service chain paths meeting the service requirements; the matched service node information is sent to the management configuration equipment, and therefore the management configuration equipment can perform network and service configuration on matched service nodes according to obtained network topology information and the obtained matched service node information.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a service node configuration method, a service node pool register and a system. Background technique [0002] In traditional data centers, service nodes (Service Node) usually exist in physical form, limited in number, and fixed in location, and can be configured manually. However, network virtualization brings new requirements: [0003] 1. Virtualized multi-tenant requirements: tenant business isolation requires each tenant network to have different types and numbers of business nodes; [0004] 2. Cloud-based interconnection of data centers: Multiple data centers are interconnected into a virtual, cloud-based data center, which will lead to a large increase in the number of service nodes, and virtual service nodes can be deployed in any location; [0005] 3. After the original dedicated hardware-supported business nodes are virtualized, their individual high performance ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/08H04L29/06H04L12/24H04L45/02
CPCH04L41/5051H04L41/12H04L41/0816H04L41/5054H04L41/5058H04L63/02H04L41/5096H04L43/0817H04L43/10H04L63/1416G06F16/9537H04L41/0806H04L67/1001H04L41/0895H04L41/40H04L43/20H04L41/0897H04L41/0894H04L41/0893G06F3/0635H04L43/00H04L43/0805H04L45/026H04L67/1095
Inventor 管红光汪洋李峰
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products