Slice-based burst traffic detection method and device in a pon system
A technology of burst traffic and detection method, which is applied in the field of optical communication, can solve the problems of heavy workload, complex and cumbersome configuration operations, and large number of objects, and achieve the effects of improving operating efficiency, reducing redundant data, and saving device memory
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0050] Such as figure 1 As shown, the present invention provides a slice-based burst traffic detection method in a PON system, including:
[0051] S1. Receive the burst traffic detection template configuration of the OLT slice performed by the user, and template binding related operations related to the slice or objects in the slice, and configure the burst traffic detection template for the OLT slice;
[0052] In a multi-slice scenario, each slice is virtualized as an independent network element with independent service configuration. Users can create their own burst traffic detection templates for each slice, and bind them directly to the slice or the subordinate objects belonging to the slice (such as the PON interface or ONU belonging to the slice). Valid within the scope of the slice.
[0053] In different slices, the traffic classification method of the burst traffic detection template can be consistent (for example, the same Ethernet type is used for data traffic clas...
Embodiment 2
[0067] figure 2 It is a schematic configuration diagram of a burst traffic detection template in the embodiment of the present invention, such as figure 2 shown;
[0068] The same traffic classification template can be bound to objects at different levels;
[0069] The same traffic classification template can be used in combination with different policy templates to implement different burst traffic detection policies for the same data flow in different slices;
[0070] After the template is bound to an object, it also takes effect on the subordinate objects of the object.
[0071] For example, traffic classification template 1 and policy template 1 are bound to slice 2, and they work on all objects under slice 2;
[0072] Traffic classification template 2 and policy template 3 are bound to uplink port 1 in slice 1, and work on all objects under uplink port 1;
[0073] Traffic classification template 3 and policy template 3 are bound to ONU0 / 1 / 1 / 8 under PON 0 / 1 / 1 under s...
Embodiment 3
[0084] Figure 4 It is a schematic flow chart of the burst traffic detection template binding operation in the embodiment of the present invention, including:
[0085] S41. Create a burst traffic detection template;
[0086] For example, specify the data flow characteristics in the traffic classification template, and set the burst detection threshold, burst detection frequency, data collection interval and other information in the policy template;
[0087] S42. Performing a legality check;
[0088] S43. Determine whether the bound object is a slice, if yes, go to step S44, otherwise go to step S45;
[0089] S44. Use the slice ID as the detection object of the burst traffic detection function, and implement a burst traffic detection strategy based on the entire slice; that is, send the slice ID as a detection parameter, and all data streams meeting the characteristics under the slice will be processed according to the burst The traffic detection template performs burst traf...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


