Search

EP-4117233-B1 - NETWORK CONFIGURATION METHOD, TERMINAL, SYSTEM, AND STORAGE MEDIUM

EP4117233B1EP 4117233 B1EP4117233 B1EP 4117233B1EP-4117233-B1

Inventors

  • ZHAI, Jingliang

Dates

Publication Date
20260506
Application Date
20210802

Claims (15)

  1. A network configuration method for communicatively connecting a user access device to a network access device by means of a single physical link, the method being performed by the user access device and comprising the steps of: receiving, by the user access device, first configuration information from the network access device (S101); adaptively setting, by the user access device, Virtual Local Area Network, VLAN, information of the user access device according to the first configuration information (S102), and generating second configuration information according to the VLAN information of the user access device (S103); and establishing, by the network access, a plurality of logical link communication connections between the network access device and the user access device on the single physical link by means of an untagged port according to the second configuration information, to share the single physical link; wherein the network access device is connected to the Internet, and the user access device is connected to terminal devices or functions.
  2. The network configuration method of claim 1, wherein the first configuration information comprises at least one of: VLAN ID, Internet Protocol, IP, subnet information, Access Point Name, APN, information or port type information.
  3. The network configuration method of claim 1, wherein the user access device receives from the network access device, the first configuration information in a form of a Socket or a file.
  4. The network configuration method of any one of claims 1 to 3, further comprising a step of sending second configuration information to the network access device, wherein the second configuration information comprises at least one of: VLAN ID, IP subnet information or APN information.
  5. A network configuration method for communicatively connecting a user access device to a network access device by means of a single physical link, the method being performed by the network access device and comprising the steps of: acquiring, by the network access, first configuration information of a Virtual Local Area Network, VLAN (S201); sending, by the network access, the first configuration information to the user access device (S202); and establishing, by the network access, a plurality of logical link communication connections between the user access device and the network access device on the single physical link by means of an untagged interface according to the first configuration information, to share the single physical link; wherein the network access device is connected to the Internet, and the user access device is connected to terminal devices or functions.
  6. The network configuration method of claim 5, wherein the first configuration information comprises at least one of: VLAN ID, Internet Protocol, IP, subnet information, Access Point Name, APN, information or port type information.
  7. The network configuration method of claim 5, wherein the first configuration information is sent by the network access device, to the user access device in form of a Socket or a file.
  8. The network configuration method of any one of claims 5 to 7, further comprising a step of acquiring, by the network access device, second configuration information from the user access device.
  9. The network configuration method of claim 8, further comprising the steps of: detecting, by the network access device, according to the second configuration information, whether the first configuration information conflicts with the second configuration information; and in response to a presence of the confliction, performing, by the network access device, a collision avoidance process.
  10. The network configuration method of claim 9, wherein the the step of performing, by the network access device , a collision avoidance process comprises the steps of: resetting a subnet address; and reconfiguring a subnet of the network access device.
  11. A network configuration method for communicatively connecting a user access device to a network access device by means of a single physical link, the method being performed by a network configuration system comprising the network access device and the user access device, and said method comprising the steps of: acquiring, by the network access device, first configuration information of a Virtual Local Area Network, VLAN; sending, by the network access device, the first configuration information to the user access device; adaptively setting, by the user access device, VLAN information of the user access device according to the first configuration information; generating, by the user access device, second configuration information according to the VLAN information of the user access device; sending, by the user access device, the second configuration information to the network access device; and establishing, by the network access, a plurality of logical link communication connections between the network access device and the user access device on the single physical link by means of an untagged port according to the first configuration information and the second configuration information, to share the single physical link; wherein the network access device is connected to the Internet, and the user access device is connected to terminal devices or functions.
  12. The network configuration method of claim 11, further comprising a step of performing a collision detection process, wherein the collision detection process comprises the steps of: sending, by the network access device, third configuration information to the user access device; acquiring, by the user access device, according to the third configuration information, a subnet and a gateway of the network access device; judging, by the user access device, whether the subnet and the gateway of the network access device are the same as the subnet and the gateway of the user access device; in response to the subnet and the gateway of the network access device being the same as the subnet and the gateway of the user access device, modifying the subnet and the gateway of the user access device; and in response to the subnet and the gateway of the network access device being different from the subnet and the gateway of the user access device, terminating the collision detection process.
  13. The network configuration method of claim 11, further comprising: the steps of sending, by the user access device, an acquisition mode of the first configuration information to the network access device; and sending, by the network access device, the first configuration information to the user access device according to the acquisition mode.
  14. The network configuration method of claim 13, wherein the first configuration information is sent, from the network access device, and is received, by the user access device, in a form of a Socket or a file.
  15. A computer-readable storage medium, storing one or more programs which, when executed by one or more processors, cause the one or more processors to perform the network configuration method of any one of claims 1 to 4; or, alterantively, the network configuration method of any one of claims 5 to 10; or, alterantively, the network configuration method of any one of claims 11 to 14.

Description

TECHNICAL FIELD The present disclosure relates to Virtual Local Area Networks (VLAN), and in particular, to a network configuration method and system, a terminal device, and a computer-readable storage medium. BACKGROUND VLAN is a broadcast domain segmentation technology based on Layer 2 switches. Applied VLANs may be grouped according to locations, functions, departments of network users or according to application programs and protocols used by the network users, so as to improve the freedom of network design. According to the 802.1Q protocol (dot1q) issued by the Institute of Electrical and Electronics Engineers (IEEE), multiple Bridges are allowed to share the same entity network publicly without leakage of information. With the continuous development of wireless technology and improvement of wireless network data rate, intelligent devices are becoming more and more popular. Due to the increasing number of access devices, VLANs are becoming more and more popular because of characteristics of network segmentation according to user needs without being restricted by physical locations of network users. At present, a VLAN realizes the access and switching of an access device through a VLAN Identity Document (ID) in a VLAN tagging. The access device needs to monitor information of a VLAN ID in each data message, which will occupy resources of the device and thus affect the performance of the device. A large number of messages need to be sent in a VLAN system, which reduces the stability of the VLAN system. In WO 2018/059503 A1, a traffic forwarding control method is disclosed. The method includes acquiring VLAN configuration information of communication ports of an OpenFlow forwarding device, and then converting all information of VLANs having the same communication port joining method to corresponding common VLAN information and generating the same in a group table. That is, one group table corresponds to all VLANs having the same communication port joining method, rather than one group table corresponding to one VLAN. As a result, for one communication port, the number of group tables required is equal to the number of VLAN joining methods thereof. In US 2015/280992 A1, techniques for automatically configuring a network device are provided. In one embodiment, the network device can receive a Layer 2 discovery packet on an uplink port operable for connecting the network device to another network device. The network device can then learn VLAN information from the Layer 2 discovery packet and automatically configure one or more of its ports based on the VLAN information. In EP 1 509 013 A2, a method and apparatus are provided for configuring a VLAN on a node of a communication network. A graphical user interface (GUI) is provided at a network management system, through which an operator selects a node and a physical port on the node. The operator identifies which virtual ports associated with the physical port are to be included in each of the member set, the forbidden set, and the untagged set of the VLAN, using the GUI. The GUI is designed so that each virtual port can only belong to one of the members set and the forbidden set. In addition, the network management system ensures that a VLAN ID entered by the operator is unique, and that the maximum number of VLANs have not already been configured on the physical port. The configuration information is thereby validated, and sent to the node for configuration thereon. In US 2015/333927 A1, an approach for dynamic discovery and assignment of virtual local area networks (VLANs) is provided. In the approach, a network switch receives a request for VLAN configuration, from a device connecting to a port of the network switch. The network switch retrieves a list of available VLANs at the port, determines whether respective ones of the available VLANs are configured for the device, forms an acknowledgement including a list of VLANs configured for the device, and sends the acknowledgement to the device. In the approach, the acknowledgement is used to determine one of the VLANs configured for the device; the one of the VLANs configured for the device is tagged by the device to an adapter of the device, and the device is connected to the one of the VLANs configured for the device. In NOKIA ET AL: "VLAN Information configuration and information exchange", it proposes how VLAN configuration information of DS-TT/NN-TT ports are exchanged inside a 5GS TSN Bridge. SUMMARY The following is an overview of the subject described in detail herein. The features of the network configuration methods and the computer-readable storage medium according to embodiments of the present disclosure are set out in the appended set of claims. Other features and advantages of the present disclosure will be set forth in the following description, and partly become apparent from the description, or understood by implementing the present disclosure. The objects and other advantages of the present