Unlock instant, AI-driven research and patent intelligence for your innovation.

Slice-based burst traffic detection method and device in a pon system

A technology of burst traffic and detection method, which is applied in the field of optical communication, can solve the problems of heavy workload, complex and cumbersome configuration operations, and large number of objects, and achieve the effects of improving operating efficiency, reducing redundant data, and saving device memory

Active Publication Date: 2022-04-01
FENGHUO COMM SCI & TECH CO LTD +1
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The traditional burst traffic detection function defines a data stream based on source IP (Internet Protocol, Internet Protocol) address, destination IP address, protocol number, source port, destination port, etc., and configures the burst traffic detection threshold of the data stream Parameters, bound to a specified object (such as a PON interface), all data flows under the object that meet the characteristics will apply the same burst traffic detection parameters and policies, and fine management cannot be performed;
[0004] If it is necessary to implement different burst traffic detection strategies for the same type of business flow but different types of users or application scenarios in practical applications, it is necessary to bind the detection rules to lower-level management objects, such as ONU (Optical Network Unit , optical network unit) or UNI (User Networks interface, user network interface) port, the number of such objects is often huge, and the configuration operation is complicated and cumbersome. If it is necessary to modify the detection strategy, the workload is huge;
[0005] In the application scenario of OLT product slicing, the traditional burst traffic detection method can only meet different policy requirements through complex configuration methods, and cannot adapt to the application mode of new slicing scenarios

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Slice-based burst traffic detection method and device in a pon system
  • Slice-based burst traffic detection method and device in a pon system
  • Slice-based burst traffic detection method and device in a pon system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0050] Such as figure 1 As shown, the present invention provides a slice-based burst traffic detection method in a PON system, including:

[0051] S1. Receive the burst traffic detection template configuration of the OLT slice performed by the user, and template binding related operations related to the slice or objects in the slice, and configure the burst traffic detection template for the OLT slice;

[0052] In a multi-slice scenario, each slice is virtualized as an independent network element with independent service configuration. Users can create their own burst traffic detection templates for each slice, and bind them directly to the slice or the subordinate objects belonging to the slice (such as the PON interface or ONU belonging to the slice). Valid within the scope of the slice.

[0053] In different slices, the traffic classification method of the burst traffic detection template can be consistent (for example, the same Ethernet type is used for data traffic clas...

Embodiment 2

[0067] figure 2 It is a schematic configuration diagram of a burst traffic detection template in the embodiment of the present invention, such as figure 2 shown;

[0068] The same traffic classification template can be bound to objects at different levels;

[0069] The same traffic classification template can be used in combination with different policy templates to implement different burst traffic detection policies for the same data flow in different slices;

[0070] After the template is bound to an object, it also takes effect on the subordinate objects of the object.

[0071] For example, traffic classification template 1 and policy template 1 are bound to slice 2, and they work on all objects under slice 2;

[0072] Traffic classification template 2 and policy template 3 are bound to uplink port 1 in slice 1, and work on all objects under uplink port 1;

[0073] Traffic classification template 3 and policy template 3 are bound to ONU0 / 1 / 1 / 8 under PON 0 / 1 / 1 under s...

Embodiment 3

[0084] Figure 4 It is a schematic flow chart of the burst traffic detection template binding operation in the embodiment of the present invention, including:

[0085] S41. Create a burst traffic detection template;

[0086] For example, specify the data flow characteristics in the traffic classification template, and set the burst detection threshold, burst detection frequency, data collection interval and other information in the policy template;

[0087] S42. Performing a legality check;

[0088] S43. Determine whether the bound object is a slice, if yes, go to step S44, otherwise go to step S45;

[0089] S44. Use the slice ID as the detection object of the burst traffic detection function, and implement a burst traffic detection strategy based on the entire slice; that is, send the slice ID as a detection parameter, and all data streams meeting the characteristics under the slice will be processed according to the burst The traffic detection template performs burst traf...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a slice-based burst traffic detection method in a PON system, comprising: burst traffic detection template configuration connected to an OLT slice, template binding related operations involving slices or objects in a slice, and OLT slice configuration Burst traffic detection template; perform corresponding template binding related operations according to template binding related operations; perform traffic detection on slices or objects in slices, and generate traffic if the data traffic of the detected object is greater than the threshold configured in the burst traffic detection template Alarm indication; determine whether the object that generates the alarm belongs to a slice as an exclusive resource. If the object that generates the alarm belongs to a slice as an exclusive resource, the management parameters configured by the slice will report the alarm; slices, alarms are reported according to the management parameters configured for each slice. The invention also provides a corresponding slice-based burst flow detection device in the PON system.

Description

technical field [0001] The invention belongs to the technical field of optical communication, and more specifically relates to a slice-based burst traffic detection method and device in a PON system. Background technique [0002] OLT (Optical Line Terminal, Optical Line Terminal) is the core equipment of PON (Passive Optical Network, Passive Optical Network) system, which supports comprehensive high-speed access functions for ordinary household broadband users, government and enterprise users, and other services. The OLT network slicing technology regards the OLT physical device as an open platform. One device is divided into multiple network slices. Each slice has independent management objects, hardware entries, and user management interfaces. Business isolation between different slices , have no influence on each other. Burst traffic detection is a necessary function of network operation and maintenance. It monitors burst traffic in the network in real time, enables user...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04Q11/00
CPCH04Q11/0062H04Q11/0067H04Q2011/0083H04Q2011/0081
Inventor 李锐吴军平王莉
Owner FENGHUO COMM SCI & TECH CO LTD