A virtualization accessing method and apparatus

An access device and virtualization technology, applied in the field of virtualized access, can solve the problems of complex network deployment and difficult business development, and achieve the goal of reducing the configuration process, reducing the complexity of network deployment, and reducing network maintenance costs. Effect

Active Publication Date: 2015-06-10
HUAWEI TECH CO LTD
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The embodiment of the present invention provides a method and device for virtualized access, which are used to solve the problem that a large number of...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A virtualization accessing method and apparatus
  • A virtualization accessing method and apparatus
  • A virtualization accessing method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0056] like figure 2 Shown is a virtualized access method in the embodiment of the present invention, the execution subject of the method is an access device, and the method includes:

[0057] S201, sending a request message carrying an address information configuration request based on the intermediate system to intermediate system IS-IS protocol to the virtual control node;

[0058] The current IS-IS protocol mainly includes the following message types:

[0059] Inquiry (IS-IS Hello Packets, IIH for short) message, IIH message is mainly used to establish and maintain the adjacency relationship of the access device.

[0060] Link State Packets (LSP for short) messages, LSP messages are mainly used to exchange link state information between access devices.

[0061] Complete Sequence Number packets (CSNP for short) message. The CSNP message is mainly used to confirm the latest received LSP between neighbors.

[0062] Partial Sequence Number Packets (PSNP for short) message,...

Embodiment 2

[0082] The embodiment of the present invention also provides a method for virtualized access, the execution subject of the method is a virtual control node in a virtual cluster in the network, such as image 3 Shown is a flow chart of a method for device virtualization access in an embodiment of the present invention, and the method includes:

[0083] S301. Receive a request packet based on the intermediate system to intermediate system IS-IS protocol and carrying an address information configuration request sent by the access device;

[0084] First of all, when networking, a central device or a virtual control node formed by multiple devices is selected in the network. When the virtual control node receives a request message of the IS-IS protocol, the virtual control node will analyze the request message, the virtual control node will read whether there is an address information configuration request in the TLV field of the request message, and if the request message carries ...

Embodiment 3

[0096] Corresponding to the method for virtualized access in Embodiment 1 of the present invention, this embodiment of the present invention also provides a device for virtualized access, such as Figure 4 Shown is a schematic structural diagram of a device for virtualized access in an embodiment of the present invention, and the device includes:

[0097] A sending module 401, configured to send a request message carrying an address information configuration request based on the intermediate system to intermediate system IS-IS protocol to a virtual control node in the network;

[0098] The receiving module 402 is configured to receive a response message based on the IS-IS protocol and carrying configured address information returned by the virtual control node;

[0099] The configuration module 403 is configured to perform address configuration according to the address information in the response message, and access the virtual control node according to the configured address....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiments of the present invention provide a method and a device for virtualized access. By using a type-length-value (TLV) field in an extended packet based on the Intermediate System to Intermediate System (IS-IS) protocol, the extended packet based on the IS-IS protocol can carry an address information configuration request of an access device, so that when receiving the request packet carrying the address information configuration request, a virtual control node on a network can return, to the access device, a response packet carrying address information for configuration, and therefore, the access device configures an address according to the address information in the response packet, and accesses the virtual control node according to the configured address. In this manner, virtualized access based on the IS-IS protocol by an access device is implemented, which reduces configuration processes of the access device, significantly simplifies the configuration of the access device, and reduces network maintenance costs.

Description

technical field [0001] The present invention relates to the technical field of communication, in particular to a method and device for virtualized access. Background technique [0002] In the mobile network, the wireless access network IP network (English: Internet Protocol Radio Access Network, IPRAN for short) has a large network scale and complex services, which brings great pressure to the operation and maintenance management. Taking the scale of mobile networks in large, medium and small cities as an example, according to the current network construction and operation and maintenance mode, a large number of scattered access devices need to be configured and managed point by point, resulting in complex network deployment and difficult business development. Contents of the invention [0003] Embodiments of the present invention provide a method and device for virtualized access, which are used to solve the current problem that a large number of access devices in scatter...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W24/04H04L29/12H04W24/02
CPCH04L61/5007
Inventor 杨佩林孙芦晓
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products