(19)
(11)EP 4 142 220 A1

(12)EUROPEAN PATENT APPLICATION
published in accordance with Art. 153(4) EPC

(43)Date of publication:
01.03.2023 Bulletin 2023/09

(21)Application number: 21817839.0

(22)Date of filing:  28.05.2021
(51)International Patent Classification (IPC): 
H04L 12/26(2006.01)
H04L 12/24(2006.01)
(52)Cooperative Patent Classification (CPC):
H04L 43/00; H04L 41/00
(86)International application number:
PCT/CN2021/096895
(87)International publication number:
WO 2021/244438 (09.12.2021 Gazette  2021/49)
(84)Designated Contracting States:
AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR
Designated Extension States:
BA ME
Designated Validation States:
KH MA MD TN

(30)Priority: 30.05.2020 CN 202010480913

(71)Applicant: Huawei Technologies Co., Ltd.
Shenzhen, Guangdong 518129 (CN)

(72)Inventors:
  • ZHANG, Yinxi
    Shenzhen, Guangdong 518129 (CN)
  • ZHOU, Yang
    Shenzhen, Guangdong 518129 (CN)
  • YU, Bin
    Shenzhen, Guangdong 518129 (CN)
  • YANG, Jiayuan
    Shenzhen, Guangdong 518129 (CN)

(74)Representative: Maiwald GmbH 
Engineering Elisenhof Elisenstrasse 3
80335 München
80335 München (DE)

  


(54)METHOD AND APPARATUS FOR EVALUATING NETWORK OPERATION IMPACT, AND DEVICE


(57) Embodiments of this application disclose a method and an apparatus for evaluating impact of a network operation, and a device, to accurately evaluate impact of the network operation on a target network. The method in embodiments of this application includes: first obtaining a service intent, where the service intent is used to indicate to perform a first network operation on the target network; then obtaining a mirror simulation network corresponding to the target network; then determining verification content, where the verification content is used to perform simulation verification on a running state of the mirror simulation network; then performing the first network operation on the mirror simulation network based on the service intent; and finally, performing, after the first network operation is performed on the mirror simulation network, simulation verification on the mirror simulation network based on the verification content, to obtain a first verification result, where the first verification result is used to evaluate impact of the first network operation on the target network.




Description


[0001] This application claims priority to Chinese Patent Application No. 202010480913.3, filed on May 30, 2020 and entitled "METHOD AND APPARATUS FOR EVALUATING IMPACT OF NETWORK OPERATION, AND DEVICE", which is incorporated herein by reference in its entirety.

TECHNICAL FIELD



[0002] This application relates to the field of computer technologies, and in particular, to a method and an apparatus for evaluating impact of a network operation, and a device.

BACKGROUND



[0003] With change and development of a service, a network in an area needs to be optimized or changed. For example, in an enterprise campus, with deepening of enterprise digital transformation, many Internet of Things terminals will access an original network. Therefore, the original network needs to be changed. For another example, in a network, a delay of transmitting a data stream from one Internet Protocol IP address to another IP address is serious. Therefore, an original network needs to be optimized, to reduce the delay.

[0004] However, a change operation or an optimization operation performed on a network greatly affects a service carried by the network, and an incorrect change operation or optimization operation, for example, an incorrect configuration or an incorrect connection, has a catastrophic impact on the carried service.

[0005] Therefore, before the change operation or the optimization operation is performed on the network, impact of the change operation or the optimization operation needs to be evaluated. In this way, an operation can be adjusted in a timely manner based on an evaluation result, to reduce negative impact of the change operation or the optimization operation on an original service on the network.

[0006] A current test method is as follows: A test network that is the same as an original network is first set up, and then the change operation or the optimization operation is performed on the test network, to obtain impact of the change operation or the optimization operation.

[0007] It is difficult to set up a the test network and the original network that are in 1:1. Therefore, accuracy of evaluating the impact of the change operation or the optimization operation by using this method is low.

SUMMARY



[0008] This application provides a method and an apparatus for evaluating impact of a network operation, and a device, to accurately evaluate impact of the network operation on a target network.

[0009] According to a first aspect, a method for evaluating impact of a network operation is provided, including:

a control device obtains a service intent, where the service intent is used to indicate to perform a first network operation on a target network, the first network operation may have a plurality of choices, for example, may include network optimization and/or a network change, and the service intent may further indicate a time point at which the first network operation is performed on the target network;

the control device obtains a mirror simulation network corresponding to the target network;

the control device determines verification content, where the verification content is used to perform simulation verification on a running state of the mirror simulation network;

the control device performs the first network operation on the mirror simulation network based on the service intent; and

the control device performs, after performing the first network operation on the mirror simulation network, simulation verification on the mirror simulation network in a sandbox environment based on the verification content, to obtain a first verification result, where the first verification result is used to evaluate impact of the first network operation on the target network.



[0010] Because the mirror simulation network can accurately reflect the target network, performing the first network operation on the mirror simulation network corresponding to the target network can better simulate performing the first network operation on the target network. Then, simulation verification is performed based on the verification content, to obtain the first verification result. The first verification result can reflect the running state of the mirror simulation network. Therefore, the impact of the first network operation on the target network can be accurately evaluated based on the first verification result.

[0011] Based on the first aspect, in a first implementation of the first aspect, that the control device determines verification content includes:

the control device determines a type of the verification content, where the type of the verification content may include service information expected by a user, security compliance, an optimal path for data transmission, Internet of Things isolation, and the like; and

the control device obtains the verification content based on the type of the verification content. The obtained verification content varies based on the type of the verification content.



[0012] This implementation provides a feasible solution for obtaining the verification content. In other words, the type of the verification content is obtained first, and then the verification content is obtained based on the type of the verification content.

[0013] Based on the first implementation of the first aspect, in a second implementation of the first aspect, the type of the verification content is the service information; and
that the control device obtains the verification content based on the type of the verification content includes:
the control device obtains, after performing the first network operation on the target network, a first service parameter that is of the target network in a running state and that is expected by the user.

[0014] The first service parameter may include a plurality of types, for example, may include a service flow parameter, and may specifically include a connectivity status of a service flow, a delay of the service flow, jitter of the service flow, and bandwidth of the service flow, or may include an application parameter, and may specifically include a delay of an application, jitter of the application, and bandwidth of the application.

[0015] This implementation provides a specific solution for obtaining the verification content based on the type of the verification content.

[0016] Based on the second implementation of the first aspect, in a third implementation of the first aspect, that the control device obtains, after performing the first network operation on the target network, a first service parameter that is of the target network in a running state and that is expected by the user includes:

the control device obtains a second service parameter that is of the target network in a current running state, where the second service parameter, for example, includes a current connectivity status of the service flow, a current delay of the service flow, current jitter of the service flow, and current bandwidth of the service flow;

the control device obtains first modification information based on content input by the user, where the first modification information is used to indicate to modify the second service parameter; and

the control device modifies the second service parameter based on the first modification information, and uses a modified second service parameter as the first service parameter that is of the target network in the running state and that is expected by the user.



[0017] This implementation provides a feasible solution for obtaining the first service parameter. In other words, modification is performed based on the second service parameter, to obtain the first service parameter, to improve efficiency of obtaining the first service parameter.

[0018] Based on the second implementation of the first aspect, or the third implementation of the first aspect, in a fourth implementation of the first aspect, that the control device performs, after performing the first network operation on the mirror simulation network, simulation verification on the mirror simulation network based on the verification content, to obtain a first verification result includes:

the control device obtains, after performing the first network operation on the mirror simulation network, a third service parameter that is of the mirror simulation network in the running state in the sandbox environment; and

the control device generates a first comparison result between the first service parameter and the third service parameter. The first comparison result has a plurality of forms, for example, includes a comparison result between the first service parameter and the third service parameter, or may include a difference between the first service parameter and the third service parameter.



[0019] The first comparison result may more intuitively reflect the difference between the first service parameter expected by the user and the actual third service parameter of the mirror simulation network.

[0020] Based on the first implementation of the first aspect, or the second implementation of the first aspect, or the third implementation of the first aspect, or the fourth implementation of the first aspect, in a fifth implementation of the first aspect, the service intent is used to indicate to add a first network device to the target network; and
that the control device obtains, after performing the first network operation on the mirror simulation network, a third service parameter that is of the mirror simulation network in the running state includes:
the control device obtains, after the first network device is added to the mirror simulation network, a third service parameter that is of the first network device in a running state.

[0021] Based on the first implementation of the first aspect, or the second implementation of the first aspect, or the third implementation of the first aspect, or the fourth implementation of the first aspect, in a sixth implementation of the first aspect, the service intent is used to indicate to adjust an access-control list of a second network device in the target network; and
that the control device obtains, after performing the first network operation on the mirror simulation network, a third service parameter that is of the mirror simulation network in the running state includes:
the control device obtains, after the access-control list of the second network device in the target network is adjusted, a service flow that passes through the second network device.

[0022] Based on the first implementation of the first aspect, or the second implementation of the first aspect, or the third implementation of the first aspect, or the fourth implementation of the first aspect, or the fifth implementation of the first aspect, or the sixth implementation of the first aspect, in a seventh implementation of the first aspect, that the control device determines a type of the verification content includes: The control device generates the type of the verification content based on the service intent.

[0023] This implementation provides a feasible solution for generating the type of the verification content. The type of the verification content is automatically generated based on the service intent.

[0024] Based on the seventh implementation of the first aspect, in an eighth implementation of the first aspect, after the control device generates the type of the verification content based on the service intent, the method further includes:

the control device obtains second modification information, where the second modification information is used to indicate to modify the type of the verification content; and

the control device modifies the type of the verification content based on the second modification information.



[0025] This implementation provides a feasible solution for obtaining the type of the verification content. In other words, the automatically generated type of the verification content is modified, to obtain a final type of the verification content, to improve efficiency of obtaining the type of the verification content.

[0026] Based on the first aspect, or the first implementation of the first aspect, or the second implementation of the first aspect, or the third implementation of the first aspect, or the fourth implementation of the first aspect, or the fifth implementation of the first aspect, or the sixth implementation of the first aspect, or the seventh implementation of the first aspect, or the eighth implementation of the first aspect, in a ninth implementation of the first aspect, that the control device obtains a mirror simulation network corresponding to the target network includes:
the control device obtains network information of the target network. The network information may include a topology structure, configuration plane information, and forwarding plane information of the target network. The configuration plane information may include one or more of a link state, an interface state, interface bandwidth, an uplink rate, and a downlink rate. The forwarding plane information may include one or more of a Layer 2 forwarding table and a Layer 3 forwarding table.

[0027] In a sandbox environment, the mirror simulation network corresponding to the target network is constructed based on the network information.

[0028] This implementation provides a feasible solution for obtaining the mirror simulation network.

[0029] Based on the first aspect, or the first implementation of the first aspect, or the second implementation of the first aspect, or the third implementation of the first aspect, or the fourth implementation of the first aspect, or the fifth implementation of the first aspect, or the sixth implementation of the first aspect, or the seventh implementation of the first aspect, or the eighth implementation of the first aspect, or the ninth implementation of the first aspect, in a tenth implementation of the first aspect, the method further includes:
the control device may send, based on the fact that the first verification result meets a preset requirement, first configuration information to the target network at a time point indicated by the service intent. The first configuration information is used to indicate the target network to perform configuration related to the first network operation.

[0030] In this implementation, the first configuration information is delivered, so that the target network performs configuration related to the first network operation, to complete the first network operation on the target network.

[0031] Based on the first aspect, or the first implementation of the first aspect, or the second implementation of the first aspect, or the third implementation of the first aspect, or the fourth implementation of the first aspect, or the fifth implementation of the first aspect, or the sixth implementation of the first aspect, or the seventh implementation of the first aspect, or the eighth implementation of the first aspect, or the ninth implementation of the first aspect, in an eleventh implementation of the first aspect, the method further includes:
the control device generates a first network operation solution based on the fact that the first verification result does not meet a preset requirement. The first network operation solution is used to indicate to continue to perform a second network operation on the mirror simulation network, so that a second verification result obtained by performing simulation verification on the mirror simulation network based on the verification content meets the preset requirement.

[0032] In this implementation, because the first verification result does not meet the preset requirement, the first network operation solution is automatically generated. The first network operation solution is used to indicate to continue to perform the second network operation on the mirror simulation network, so that the second verification result obtained by performing simulation verification again can meet the preset requirement, to implement the first network operation performed on the target network.

[0033] Based on the eleventh implementation of the first aspect, in a twelfth implementation of the first aspect, after the control device generates the first network operation solution based on the fact that the first verification result does not meet the preset requirement, the method further includes:

the control device performs the second network operation on the mirror simulation network based on the first network operation solution, where the second network operation may include a plurality of types, for example, may include newly adding a link between two devices in the target network, and may further include adjusting a transmission path of the service flow; and

the control device performs, after performing the second network operation on the mirror simulation network, simulation verification on the mirror simulation network based on the verification content, to obtain the second verification result, where a form of the second verification result may be the same as a form of the first verification result.



[0034] In this implementation, the second network operation is performed on the mirror simulation network, and simulation verification is performed again on the mirror simulation network on which the second network operation is performed, to ensure that the obtained second verification result can meet the preset requirement.

[0035] Based on the twelfth implementation of the first aspect, in a thirteenth implementation of the first aspect, the method further includes:
the control device sends second configuration information to the target network based on the fact that the second verification result meets the preset requirement. The second configuration information is used to indicate the target network to perform configuration related to the first network operation and configuration related to the second network operation.

[0036] In this implementation, the second configuration information is delivered, so that the target network performs configuration related to the first network operation and configuration related to the second network operation, to complete the first network operation and the second network operation that are performed on the target network.

[0037] Based on the first aspect, or the first implementation of the first aspect, or the second implementation of the first aspect, or the third implementation of the first aspect, or the fourth implementation of the first aspect, or the fifth implementation of the first aspect, or the sixth implementation of the first aspect, or the seventh implementation of the first aspect, or the eighth implementation of the first aspect, or the ninth implementation of the first aspect, in a fourteenth implementation of the first aspect, based on the fact that the first verification result does not meet a preset requirement, the method further includes:

the control device generates a second network operation solution, where the second operation solution is used to indicate to perform a third network operation on the mirror simulation network;

the control device performs the third network operation on the mirror simulation network based on the second network operation solution;

the control device performs, after performing the third network operation on the mirror simulation network, simulation verification on the mirror simulation network based on the verification content, to obtain a third verification result;

the control device repeatedly performs the foregoing steps until the third verification result meets the preset requirement; and

the control device sends third configuration information to the target network, where the third configuration information is used to indicate the target network to perform configuration related to the first network operation and configuration related to the third network operation.



[0038] In this implementation, based on the fact that the first verification result does not meet the preset requirement, the control device automatically generates the second network operation solution, performs the second network operation solution on the mirror simulation network, then performs simulation verification on the mirror simulation network, and finally determines whether the third verification result meets the preset requirement. If the third verification result does not meet the preset requirement, the foregoing operations are cyclically performed, until the third verification result meets the preset requirement. In this way, the control device can automatically generate a network operation solution based on a service intent input by the user. The network operation solution can ensure that the running state of the target network can meet a requirement of the user after the first network operation is performed on the target network, to avoid negative impact of the first network operation on the target network.

[0039] Based on the tenth implementation of the first aspect, or the thirteenth implementation of the first aspect, or the fourteenth implementation of the first aspect, in a fifteenth implementation of the first aspect, the method further includes:

the control device sends a packet to the target network, where the packet is used to indicate the target network to perform a dialing test; and

the control device obtains a dialing test result, to determine that the dialing test result meets the preset requirement.



[0040] In this implementation, the target network is indicated to perform the dialing test, to ensure that the impact of the first network operation on the target network can meet the requirement of the user.

[0041] Based on the first aspect, or the first implementation of the first aspect, or the second implementation of the first aspect, or the third implementation of the first aspect, or the fourth implementation of the first aspect, or the fifth implementation of the first aspect, or the sixth implementation of the first aspect, or the seventh implementation of the first aspect, or the eighth implementation of the first aspect, or the ninth implementation of the first aspect, or the tenth implementation of the first aspect, or the eleventh implementation of the first aspect, in the twelfth implementation of the first aspect, the first network operation includes the network optimization and/or the network change.

[0042] According to a second aspect, an apparatus for evaluating impact of a network operation is provided, including:

a first obtaining unit, configured to obtain a service intent, where the service intent is used to indicate to perform a first network operation on a target network;

a second obtaining unit, configured to obtain a mirror simulation network corresponding to the target network;

a verification content determining unit, configured to determine verification content, where the verification content is used to perform simulation verification on a running state of the mirror simulation network;

a network operation unit, configured to perform the first network operation on the mirror simulation network based on the service intent; and

a simulation verification unit, configured to perform, after the first network operation is performed on the mirror simulation network, simulation verification on the mirror simulation network based on the verification content, to obtain a first verification result, where the first verification result is used to evaluate impact of the first network operation on the target network.



[0043] Based on the second aspect, in a first implementation of the second aspect, the verification content determining unit is configured to:

determine a type of the verification content; and

obtain the verification content based on the type of the verification content.



[0044] Based on the first implementation of the second aspect, in a second implementation of the second aspect, the type of the verification content is service information; and
the verification content determining unit is configured to:
obtain, after the first network operation is performed on the target network, a first service parameter that is of the target network in a running state and that is expected by a user.

[0045] Based on the second implementation of the second aspect, in a third implementation of the second aspect, the verification content determining unit is configured to:

obtain a second service parameter that is of the target network in a current running state;

obtain first modification information, where the first modification information is used to indicate to modify the second service parameter; and

modify the second service parameter based on the first modification information, and use a modified second service parameter as the first service parameter that is of the target network in the running state and that is expected by the user.



[0046] Based on the second implementation of the second aspect or the third implementation of the second aspect, in a fourth implementation of the second aspect, the simulation verification unit is configured to: obtain, after the first network operation is performed on the mirror simulation network, a third service parameter that is of the mirror simulation network in the running state in a sandbox environment; and
generate a first comparison result between the first service parameter and the third service parameter.

[0047] Based on the first implementation of the second aspect, or the second implementation of the second aspect, or the third implementation of the second aspect, or the fourth implementation of the second aspect, in a fifth implementation of the second aspect, the service intent is used to indicate to add a first network device to the target network; and
the simulation verification unit is configured to obtain, after the first network device is added to the mirror simulation network, a third service parameter that is of the first network device in a running state.

[0048] Based on the first implementation of the second aspect, or the second implementation of the second aspect, or the third implementation of the second aspect, or the fourth implementation of the second aspect, in a sixth implementation of the second aspect, the service intent is used to indicate to adjust an access-control list of a second network device in the target network; and
the simulation verification unit is configured to obtain, after the access-control list of the second network device in the target network is adjusted, a service flow that passes through the second network device.

[0049] Based on the first implementation of the second aspect, or the second implementation of the second aspect, or the third implementation of the second aspect, or the fourth implementation of the second aspect, or the fifth implementation of the second aspect, or the sixth implementation of the second aspect, in a seventh implementation of the second aspect, the verification content determining unit is configured to generate the verification content based on the service intent.

[0050] Based on the seventh implementation of the second aspect, in an eighth implementation of the second aspect, the verification content determining unit is further configured to:

obtain second modification information, where the second modification information is used to indicate to modify the verification content; and

modify the verification content based on the second modification information.



[0051] Based on the second aspect, or the first implementation of the second aspect, or the second implementation of the second aspect, or the third implementation of the second aspect, or the fourth implementation of the second aspect, or the fifth implementation of the second aspect, or the sixth implementation of the second aspect, or the seventh implementation of the second aspect, or the eighth implementation of the second aspect, in a ninth implementation of the second aspect, the second obtaining unit is configured to: obtain network information of the target network; and
construct, based on the network information, the mirror simulation network corresponding to the target network.

[0052] Based on the second aspect, or the first implementation of the second aspect, or the second implementation of the second aspect, or the third implementation of the second aspect, or the fourth implementation of the second aspect, or the fifth implementation of the second aspect, or the sixth implementation of the second aspect, or the seventh implementation of the second aspect, or the eighth implementation of the second aspect, or the ninth implementation of the second aspect, in a tenth implementation of the second aspect, the apparatus further includes:
a sending unit, configured to send first configuration information to the target network based on the fact that the first verification result meets a preset requirement. The first configuration information is used to indicate the target network to perform configuration related to the first network operation.

[0053] Based on the second aspect, or the first implementation of the second aspect, or the second implementation of the second aspect, or the third implementation of the second aspect, or the fourth implementation of the second aspect, or the fifth implementation of the second aspect, or the sixth implementation of the second aspect, or the seventh implementation of the second aspect, or the eighth implementation of the second aspect, or the ninth implementation of the second aspect, in an eleventh implementation of the second aspect, the apparatus further includes:
a network operation solution generating unit, configured to generate a network operation solution based on the fact that the first verification result does not meet a preset requirement. The first network operation solution is used to indicate to continue to perform a second network operation on the mirror simulation network, so that a second verification result obtained by performing simulation verification on the mirror simulation network based on the verification content meets the preset requirement.

[0054] Based on the eleventh implementation of the second aspect, in a twelfth implementation of the second aspect, the simulation verification unit is further configured to: perform the second network operation on the mirror simulation network based on the first network operation solution; and
perform, after the second network operation is performed on the mirror simulation network, simulation verification on the mirror simulation network based on the verification content, to obtain the second verification result.

[0055] Based on the twelfth implementation of the second aspect, in a thirteenth implementation of the second aspect, the sending unit is further configured to send second configuration information to the target network based on the fact that the second verification result meets the preset requirement. The second configuration information is used to indicate the target network to perform configuration related to the first network operation and configuration related to the second network operation.

[0056] Based on the second aspect, or the first implementation of the second aspect, or the second implementation of the second aspect, or the third implementation of the second aspect, or the fourth implementation of the second aspect, or the fifth implementation of the second aspect, or the sixth implementation of the second aspect, or the seventh implementation of the second aspect, or the eighth implementation of the second aspect, or the ninth implementation of the second aspect, in a fourteenth implementation of the second aspect, based on the fact that the first verification result does not meet a preset requirement, the apparatus further includes a network operation solution generating unit and a sending unit.

[0057] The network operation solution generating unit is configured to generate a second network operation solution. The second operation solution is used to indicate to perform a third network operation on the mirror simulation network.

[0058] The simulation verification unit is further configured to: perform the third network operation on the mirror simulation network based on the second network operation solution;

perform, after the third network operation is performed on the mirror simulation network, simulation verification on the mirror simulation network based on the verification content, to obtain a third verification result; and

repeatedly perform the foregoing steps until the third verification result meets the preset requirement.



[0059] The sending unit is configured to send third configuration information to the target network. The third configuration information is used to indicate the target network to perform configuration related to the first network operation and configuration related to the third network operation.

[0060] Based on the tenth implementation of the second aspect, or the thirteenth implementation of the second aspect, or the fourteenth implementation of the second aspect, in a fifteenth implementation of the second aspect, the sending unit is further configured to: send a packet to the target network, where the packet is used to indicate the target network to perform a dialing test; and
obtain a dialing test result, to determine that the dialing test result meets the preset requirement.

[0061] According to a third aspect, a control device is provided, including at least one processor and a memory. The memory stores computer-executable instructions that can be run on the processor. When the computer-executable instructions are executed by the processor, the terminal device performs the method for evaluating impact of a network operation according to any implementation of the foregoing first aspect.

[0062] According to a fourth aspect, a chip or a chip system is provided. The chip or the chip system includes at least one processor and a communication interface. The communication interface is interconnected to the at least one processor through a line. The at least one processor is configured to run a computer program or instructions, to perform the method for evaluating impact of a network operation according to any implementation of the foregoing first aspect.

[0063] According to a fifth aspect, a computer storage medium is provided. The computer storage medium is configured to store computer software instructions used by the foregoing terminal device. The computer software instructions are used to execute a program designed for a network device.

[0064] The network device may be the apparatus for evaluating impact of a network operation described in the foregoing second aspect.

[0065] According to a sixth aspect, a computer program product is provided. The computer program product includes computer software instructions. The computer software instructions may be loaded by a processor to implement the method for evaluating impact of a network operation according to any implementation of the foregoing first aspect.

[0066] According to a seventh aspect, a network system is provided, including a target network and a control device. The target network includes one or more network devices.

[0067] The control device is configured to perform the method for evaluating impact of a network operation according to any implementation of the foregoing first aspect.

[0068] The foregoing technical solutions have the following advantages.

[0069] First, the service intent is obtained. The service intent is used to indicate to perform the first network operation on the target network. Then, the mirror simulation network corresponding to the target network is obtained. The mirror simulation network can accurately reflect the target network. Then, the verification content is determined. The verification content is used to indicate to perform simulation verification on the mirror simulation network. Then, the first network operation is performed on the mirror simulation network based on the service intent, to simulate performing the first network operation on the target network. Finally, after the first network operation is performed on the mirror simulation network, simulation verification is performed on the mirror simulation network based on the verification content, to obtain the first verification result. The first verification result can reflect the running state of the mirror simulation network. Therefore, the impact of the first network operation on the target network can be accurately evaluated based on the first verification result.

BRIEF DESCRIPTION OF DRAWINGS



[0070] 

FIG. 1 is a schematic diagram of an architecture of an embodiment of a network system according to an embodiment of this application;

FIG. 2 is a schematic diagram of an architecture of another embodiment of a network system according to an embodiment of this application;

FIG. 3 is a schematic diagram of a first embodiment of a method for evaluating impact of a network operation according to an embodiment of this application;

FIG. 4 is a schematic diagram of an embodiment of a first interface according to an embodiment of this application;

FIG. 5 is a schematic diagram of an embodiment of a second interface according to an embodiment of this application;

FIG. 6 is a schematic diagram of an embodiment of constructing a mirror simulation network according to an embodiment of this application;

FIG. 7 is a schematic diagram of an embodiment of determining verification content;

FIG. 8 is a schematic diagram of an embodiment of determining a type of verification content;

FIG. 9 is a schematic diagram of an embodiment of obtaining a first service parameter;

FIG. 10 is a schematic diagram of an embodiment of a third interface according to an embodiment of this application;

FIG. 11 is a schematic diagram of an embodiment of a fourth interface according to an embodiment of this application;

FIG. 12 is a schematic diagram of a second embodiment of a method for evaluating impact of a network operation according to an embodiment of this application;

FIG. 13 is a schematic diagram of a structure of an apparatus for evaluating impact of a network operation according to an embodiment of this application;

FIG. 14 is a schematic diagram of a structure of a control device according to an embodiment of this application; and

FIG. 15 is a schematic diagram of a structure of a network system according to an embodiment of this application.


DESCRIPTION OF EMBODIMENTS



[0071] Embodiments of this application provide a method and an apparatus for evaluating impact of a network operation, and a device, to accurately evaluate impact of the network operation on a target network.

[0072] Embodiments of this application may be applied to a campus network system shown in FIG. 1. As shown in FIG. 1, the campus network system includes a gateway device, edge devices, access devices, a wireless access point, and a firewall. A first side of the gateway device is connected to a server by sequentially using an edge device, an access device, and the firewall, a second side of the gateway device is connected to a terminal device by sequentially using an edge device and an access device, and the second side of the gateway device is further connected to a terminal device by sequentially using an edge device, an access device, and the wireless access point.

[0073] The gateway device is also referred to as an inter-network connector or a protocol converter, and is a computer system or device that provides a data conversion service between a plurality of networks.

[0074] The edge device is a device that provides an entry point for a core network of an enterprise or a service provider. The edge device may include a router, a routing switch, an integrated access device (IAD), a multiplexer, and various metropolitan area network (MAN) access devices and wide area network (WAN) access devices.

[0075] The access device is usually configured to remotely access a network resource, and may include a router, a multiplexer, and a modulation regulator.

[0076] The terminal device may include a smartphone, a notebook computer, a tablet computer, and various Internet of Things terminal devices. In FIG. 1, the Internet of Things terminal device is used to represent the terminal device, and specifically includes a smart speaker, a smart screen, and a smart socket.

[0077] In addition, the campus network system further includes a control device. The control device is configured to configure a parameter of a network device in the campus network system, and monitor and manage the network device in the campus network system.

[0078] In actual application, based on a change of an actual requirement, network optimization and/or a network change usually needs to be performed on the campus network system shown in FIG. 1, to adapt to the actual requirement.

[0079] In this embodiment of this application, the network change includes replacing or removing any network device (which is the gateway device, the edge device, the access device, the wireless access point, or the firewall) in the campus network system shown in FIG. 1, and adding a new network device to the campus network system shown in FIG. 1. The campus network system shown in FIG. 1 is used as an example. An air purifier is added to an office building in a campus. Correspondingly, a network change needs to be performed on the campus network system shown in FIG. 1, that is, an access device needs to be added for access of the air purifier. FIG. 2 shows a campus network system obtained after the network change.

[0080] The network optimization includes modifying a configuration of any network device in the campus network system shown in FIG. 1. For example, the network optimization may include adjusting an access-control list of the network device, changing a quantity of links between two network devices, adjusting an optimal path for data transmission, and adjusting security compliance of the campus network system.

[0081] It should be understood that, regardless of the network change or the network optimization, a service carried by the campus network system may be greatly affected. Therefore, to reduce impact of the network optimization and the network change on the service, before network optimization and the network change are performed on the campus network system, the impact of the network optimization and the network change on the campus network system needs to be evaluated. In this way, the campus network system can be further adjusted based on an evaluation result, to reduce negative impact of the network optimization and the network change on an original service in the campus network system. For ease of description, the following uses a network operation to represent the network optimization and/or the network change, and uses a network to represent the network system.

[0082] Therefore, an embodiment of this application provides a method for evaluating impact of a network operation. The method can be applied to a control device in a network system. Specifically, the control device performs the network operation based on a mirror simulation network, then verifies the mirror simulation network on which the network operation is performed, and finally evaluates the impact of the network operation based on a verification result.

[0083] It should be noted that this embodiment of this application is applicable to any network system including a campus network system.

[0084] Specifically, FIG. 3 is a schematic diagram of a first embodiment of a method for evaluating impact of a network operation according to an embodiment of this application. As shown in FIG. 3, this embodiment of this application provides an embodiment of the method for evaluating impact of a network operation. The method may be applied to a control device and includes the following steps.

[0085] Step 101: The control device obtains a service intent. The service intent is used to indicate to perform a first network operation on a target network.

[0086] The target network may be a network in which the control device is located, or may be another network other than a network in which the control device is located.

[0087] The first network operation may include network optimization and/or a network change. Because the network change and the network optimization have been described in the foregoing content, the network optimization and the network change in this embodiment of this application may be understood with reference to the foregoing descriptions.

[0088] There are a plurality of methods for obtaining the service intent. This is not limited in this embodiment of this application. For example, the service intent may be recognized based on information, for example, a text or voice input by a user. Alternatively, a plurality of service intent options may be first provided for a user to select, and then the service intent is determined based on a selection instruction of the user.

[0089] In another implementable manner, an input initial service intent may be obtained first, then Step 102 is performed to obtain a mirror simulation network corresponding to the target network, and then a final service intent is obtained based on an actual operation performed by a user on the mirror simulation network.

[0090] For example, as shown in FIG. 4, the user may input the initial service intent on a first interface shown in FIG. 4. Herein, it is assumed that the initial service intent is performing the network change on the target network.

[0091] Correspondingly, the control device obtains the initial service intent, then obtains the mirror simulation network of the target network based on the initial service intent, and displays the mirror simulation network on a second interface shown in FIG. 5.

[0092] Then, the user may directly perform the first network operation on the mirror simulation network on the second interface shown in FIG. 5. Correspondingly, the control device obtains the first network operation, to obtain the service intent.

[0093] Step 102: The control device obtains the mirror simulation network corresponding to the target network.

[0094] There are a plurality of methods for obtaining the mirror simulation network. This is not limited in this embodiment of this application. For example, if the mirror simulation network corresponding to the target network is stored in a database, the mirror simulation network may be directly obtained from the database.

[0095] As shown in FIG. 6, if the mirror simulation network is not stored in the database, in an implementable manner, obtaining the mirror simulation network corresponding to the target network may include the following steps.

[0096] Step 201: The control device obtains network information of the target network.

[0097] The network information may include a topology structure, configuration plane information, and forwarding plane information of the target network. The configuration plane information may include one or more of a link state, an interface state, interface bandwidth, an uplink rate, and a downlink rate. The forwarding plane information may include one or more of a Layer 2 forwarding table and a Layer 3 forwarding table.

[0098] Step 202: The control device constructs, based on the network information, the mirror simulation network corresponding to the target network.

[0099] Specifically, the mirror simulation network may be constructed based on a sandbox environment. Because a technology for constructing the mirror simulation network is mature, details are not described herein in this embodiment of this application.

[0100] Step 103: The control device determines verification content. The verification content is used to perform simulation verification on a running state of the mirror simulation network.

[0101] There may be a plurality of types of verification content. This is not specifically limited in this embodiment of this application. For example, the verification content may include: verifying whether a transmission path of a service flow in the target network is an optimal path, verifying whether transmission of the service flow in the target network meets security compliance, and verifying whether service information at a network device meets a requirement of the user.

[0102] There are also a plurality of methods for determining the verification content. This is not specifically limited in this embodiment of this application.

[0103] A process of determining the verification content is subsequently described in detail in this embodiment of this application with reference to FIG. 7.

[0104] Step 104: The control device performs the first network operation on the mirror simulation network based on the service intent.

[0105] In this embodiment of this application, the first network operation is performed on the mirror simulation network, to simulate performing the first network operation on the target network.

[0106] It is assumed that the first network operation is adjusting an access-control list of a network device. In this case, Step 104 may include: adjusting the access-control list of the network device in the mirror simulation network.

[0107] Step 105: The control device performs, after performing the first network operation on the mirror simulation network, simulation verification on the mirror simulation network based on the verification content, to obtain a first verification result. The first verification result is used to evaluate impact of the first network operation on the target network.

[0108] It should be noted that there are a plurality of methods for performing simulation verification on the mirror simulation network. This is not specifically limited in this embodiment of this application. For example, it is assumed that the first network operation is adjusting the access-control list of the network device. In this case, performing simulation verification on the mirror simulation network may include: simulating an access-control list algorithm of the network device by using a simulator or an algorithm, and then performing a test by using an original service flow on the network device.

[0109] Different verification content corresponds to different first verification results. There are a plurality of forms for the first verification result. This is not specifically limited in this embodiment of this application.

[0110] For example, it is assumed that the first network operation is adjusting the access-control list of the network device. In this case, the first verification result may include that, in the mirror simulation network, the network device allows a service flow to pass through, or the network device forbids a service flow to pass through. In addition, the first verification result may further include that, in the target network, the network device allows a service flow to pass through, or the network device forbids a service flow to pass through.

[0111] In this embodiment of this application, because the mirror simulation network can accurately reflect the target network, performing the first network operation on the mirror simulation network corresponding to the target network can better simulate performing the first network operation on the target network. Then, simulation verification is performed based on the verification content, to obtain the first verification result. In this way, the impact of the first network operation on the target network can be accurately evaluated based on the first verification result.

[0112] Based on the foregoing descriptions, it can be learned that there are a plurality of methods for determining the verification content. The following describes one of the methods. As shown in FIG. 7, determining the verification content includes the following steps.

[0113] Step 301: The control device determines a type of the verification content.

[0114] It should be noted that the type of the verification content may be defined based on an actual requirement. For example, the type of the verification content may include service information, an optimal path for data transmission, security compliance, and Internet of Things isolation.

[0115] The service information may be further classified into a plurality of types, for example, may be classified into flow service information and application service information.

[0116] There are a plurality of methods for determining the type of the verification content. This is not specifically limited in this embodiment of this application.

[0117] As shown in FIG. 8, for example, determining the type of the verification content includes the following steps.

[0118] Step 401: The control device generates the type of the verification content based on the service intent.

[0119] It may be understood that the type of the verification content is related to the service intent. Therefore, the type of the verification content may be automatically generated based on the service intent, to improve efficiency of determining the type of the verification content.

[0120] For example, if the service intent is the network change, the generated type of the verification content may include the service information, the optimal path for data transmission, and the security compliance.

[0121] If the service intent is the network optimization, the generated type of the verification content may include the service information and the security compliance.

[0122] It should be noted that, to implement flexible selection of the type of the verification content, based on the foregoing example, in another example, after the type of the verification content is generated based on the service intent, the method further includes the following steps.

[0123] Step 402: The control device obtains second modification information. The second modification information is used to indicate to modify the type of the verification content.

[0124] It may be understood that the second modification information may be input by the user. A form of the second modification information is not specifically limited in this embodiment of this application. For example, the second modification information may be a text or a voice, or may be a specific deletion instruction or an addition instruction.

[0125] Step 403: The control device modifies the type of the verification content based on the second modification information.

[0126] The following describes the foregoing process by using a specific example. Specifically, the second interface shown in FIG. 5 is used as an example. It is assumed that the type of the verification content obtained after Step 401 is performed includes the service information and the security compliance. If the user needs to add the type of the verification content, namely, the optimal path for data transmission, the user may directly tap "+" in a dashed-line box on the interface shown in FIG. 5, and then select the "optimal path for data transmission" from "optional type of verification information". In this embodiment, the second modification information is an instruction for adding the optimal path for data transmission. If the user wants to delete the type of the verification content, namely, the security compliance, the user may directly tap a minus sign after the "security compliance" on the interface shown in FIG. 5. In this example, the second modification information is an instruction for deleting the security compliance.

[0127] Step 302: The control device obtains the verification content based on the type of the verification content.

[0128] It may be understood that the obtained verification content varies with the type of the verification content and a method for obtaining the verification content.

[0129] For example, if the type of the verification content is the optimal path for data transmission, the verification content may be verifying whether the transmission path of the service flow in the target network is an optimal path. If the type of the verification content is the security compliance, the verification content may be verifying whether the transmission of the service flow in the target network meets security compliance. If the type of the verification content is the Internet of Things isolation, the verification content may be verifying whether the target network meets a requirement of the Internet of Things isolation.

[0130] For example, if the type of the verification content is the service information, that the control device obtains the verification content based on the type of the verification content includes:
the control device obtains, after performing the first network operation on the target network, a first service parameter that is of the target network in a running state and that is expected by the user.

[0131] The first service parameter of the target network in the running state includes a first service parameter of at least one network device in the target network.

[0132] The first service parameter may include a service flow parameter, and may specifically include a connectivity status of a service flow, a delay of the service flow, jitter of the service flow, and bandwidth of the service flow. Alternatively, the first service parameter may include an application parameter, and may specifically include a delay of an application, jitter of the application, and bandwidth of the application. It may be understood that the first service parameter may alternatively include both a service flow parameter and an application parameter.

[0133] The connectivity status of the service flow may be understood as that the network device allows some service flows to pass through and forbids other service flows to pass through.

[0134] It should be noted that there are a plurality of methods for obtaining the first service parameter. This is not specifically limited in this embodiment of this application. For example, the first service parameter may be directly generated based on the type of the verification content. The method may be used to obtain a first service parameter corresponding to an original network device of the target network, or may be used to obtain a first service parameter corresponding to a newly added network device.

[0135] Specifically, the target network shown in FIG. 2 is used as an example. Based on the target network shown in FIG. 1, the air purifier and the corresponding access device are added to the target network shown in FIG. 2. Therefore, a first service parameter corresponding to the access device may be directly generated. The first service parameter may include a connectivity status of a service flow, a delay of the service flow, jitter of the service flow, and bandwidth of the service flow. In this example, the connectivity status of the service flow may be understood as that the access device allows some service flows to pass through and forbids other service flows to pass through.

[0136] For the original network device of the target network, another method may be alternatively used to generate the first service parameter that is of the target network in a running state and that is expected by the user. Specifically, in another implementable manner, as shown in FIG. 9, obtaining, after the first network operation is performed on the target network, the first service parameter that is of the target network in the running state and that is expected by the user includes the following steps.

[0137] Step 501: The control device obtains a second service parameter that is of the target network in a current running state.

[0138] There are a plurality of methods for obtaining the second service parameter. This is not specifically limited in this embodiment of this application.

[0139] For example, if the second service parameter is a service flow parameter, a service flow, a transmission path of the service flow, and a QoS attribute corresponding to the service flow may be obtained based on a 5-tuple (namely, a source IP, a source port number, a transmission protocol, a destination IP, and a destination port number), and the quality of service QoS attribute may be used as the second service parameter. The second service parameter may specifically include a connectivity status of the service flow, a delay of the service flow, jitter of the service flow, and bandwidth of the service flow.

[0140] For another example, if the second service parameter is an application parameter, an application in the target network may be identified and a quality attribute of the application may be obtained. The quality attribute of the application may be used as the second service parameter. The second service parameter may specifically include a delay of the application, jitter of the application, and bandwidth of the application.

[0141] Step 502: The control device obtains first modification information. The first modification information is used to indicate to modify the second service parameter.

[0142] Similar to the second modification information, the first modification information may also be input by the user. In addition, a form of the first modification information is not specifically limited in this embodiment of this application. For example, the first modification information may be a text (which includes a digit), a voice, or another form.

[0143] Step 503: The control device modifies the second service parameter based on the first modification information, and uses a modified second service parameter as the first service parameter that is of the target network in the running state and that is expected by the user.

[0144] The following describes the foregoing process by using a specific example. FIG. 10 is a schematic diagram of an embodiment of a third interface according to an embodiment of this application. As shown in FIG. 10, the third interface includes a mirror simulation network of the target network, and the first network operation is performed on the mirror simulation network.

[0145] In this example, to obtain a first service parameter of a gateway device, a second service parameter of the gateway device is first obtained. The second service parameter includes a first service flow parameter, a second service flow parameter, and an application parameter. Specifically, the first service flow parameter refers to information about a service flow from a smart speaker to a server, and specifically includes bandwidth, a delay, a packet loss rate, and jitter. The second service flow parameter refers to information about a service flow from a smart socket to the server, and specifically includes bandwidth, a delay, a packet loss rate, and jitter. The application parameter refers to an application parameter on a smart screen, and specifically includes a delay, a packet loss rate, jitter, and a connectivity status.

[0146] On the third interface, the user may directly modify the second service parameter on the third interface. For example, the user may modify the delay 20 ms in the first service flow parameter to 22 ms.

[0147] In this embodiment of this application, the second service parameter that is of the target network in the current running state may be first obtained, and then the second service parameter is modified based on the first modification information input by the user, to obtain the first service parameter. Compared with that in a manner in which the user manually sets each piece of information of the service information one by one, in this embodiment of this application, efficiency of obtaining the first service parameter can be improved.

[0148] Based on the foregoing two embodiments of obtaining the first service parameter, in another embodiment of the method for evaluating impact of a network operation provided in this embodiment of this application, that the control device performs, after performing the first network operation on the mirror simulation network, simulation verification on the mirror simulation network based on the verification content, to obtain a first verification result includes:
first, the control device obtains, after performing the first network operation on the mirror simulation network, a third service parameter that is of the mirror simulation network in the running state.

[0149] It should be noted that there are a plurality of methods for obtaining the third service parameter. This is not specifically limited in this embodiment of this application. Specifically, a method for obtaining the third service parameter may be related to the service intent.

[0150] In an implementable manner, if the service intent is used to indicate to add a first network device to the target network, that the control device obtains, after performing the first network operation on the mirror simulation network, a third service parameter that is of the mirror simulation network in the running state includes:
the control device obtains, after the first network device is added to the mirror simulation network, a third service parameter that is of the first network device in a running state.

[0151] Correspondingly, the verification content includes verifying whether the third service parameter of the first network device meets a requirement of the first service parameter.

[0152] In another implementable manner, if the service intent is used to indicate to adjust an access-control list of a second network device in the target network, that the control device obtains, after performing the first network operation on the mirror simulation network, a third service parameter that is of the mirror simulation network in the running state includes:
the control device obtains, after the access-control list of the second network device in the target network is adjusted, a service flow that passes through the second network device.

[0153] Correspondingly, the verification content includes verifying whether the service flow that passes through the second network device meets a requirement of the access-control list.

[0154] After obtaining the third service parameter, the control device generates a first comparison result between the first service parameter and the third service parameter.

[0155] There are a plurality of forms for the first comparison result. This is not specifically limited in this embodiment of this application. The first comparison result may include a comparison result between the first service parameter and the third service parameter. To display the comparison result more intuitively, the first service parameter and the third service parameter may be separately displayed in fonts of different colors. For example, FIG. 11 is a schematic diagram of an embodiment of a fourth interface according to an embodiment of this application. It is assumed that a first service parameter in FIG. 11 is the second service parameter in FIG. 10. It can be learned, by comparing FIG. 10 with FIG. 11, that FIG. 11 shows a comparison result that the third service parameter does not meet the requirement of the first service parameter. Specifically, for the first service flow parameter, FIG. 11 shows a packet loss rate of 2% in the first service parameter and a packet loss rate of 4% in the third service parameter. For the second service flow parameter, FIG. 11 shows a delay of 20 ms in the second service parameter and a delay of 25 ms in the third service parameter.

[0156] In another implementable manner, the first comparison result may alternatively include a difference between the first service parameter and the third service parameter. Specifically, if the difference is positive, it indicates that a value in the first service parameter is greater than a value in the third service parameter. If the difference is negative, it indicates that a value in the first service parameter is less than a value in the third service parameter.

[0157] Based on the foregoing descriptions, it can be learned that there are a plurality of methods for obtaining the mirror simulation network by the control device. In an implementable manner, that the control device obtains the mirror simulation network corresponding to the target network includes:
the control device first obtains network information of the target network.

[0158] The network information may include a topology structure, configuration plane information, and forwarding plane information of the target network. The configuration plane information may include one or more of a link state, an interface state, interface bandwidth, an uplink rate, and a downlink rate. The forwarding plane information may include one or more of a Layer 2 forwarding table and a Layer 3 forwarding table.

[0159] Then, the control device constructs, based on the network information, the mirror simulation network corresponding to the target network.

[0160] It should be noted that a technology for constructing the mirror simulation network is mature, and therefore details are not described herein.

[0161] Based on the foregoing descriptions, it can be learned that the impact of the first network operation on the target network may be evaluated based on the first verification result. When the impact of the first network operation on the target network is low or null, corresponding configuration may be performed on the target network, to implement the first network operation on the target network. When the impact of the first network operation on the target network is high, corresponding adjustment may be performed, to reduce the impact of the first network operation on the target network on the premise that the first network operation on the target network is implemented.

[0162] Specifically, based on the foregoing embodiments, as shown in FIG. 3, this embodiment of this application further provides an embodiment of the method for evaluating impact of a network operation. In this embodiment, the method further includes the following step.

[0163] Step 106: The control device sends first configuration information to the target network based on the fact that the first verification result meets a preset requirement.

[0164] It should be noted that, it may be determined, in a plurality of manners, that the first verification result meets the preset requirement. For example, when the verification content is verifying whether the transmission path of the service flow in the target network is the optimal path, if the first verification result shows that the transmission path of the service flow in the target network is the optimal path, it indicates that the first verification result meets the preset requirement. When the verification content is verifying whether the transmission of the service flow in the target network meets the security compliance, if the first verification result shows that the transmission of the service flow in the target network meets the security compliance, it indicates that the first verification result meets the preset requirement. When the verification content is verifying whether the target network meets the Internet of Things isolation requirement, if the first verification result shows that the target network meets the requirement of the Internet of Things isolation, it indicates that the first verification result meets the preset requirement.

[0165] For another example, when the verification content is the first service parameter that is of the target network in the running state and that is expected by the user, if the first verification result shows that the third service parameter meets the requirement of the first service parameter, it indicates that the first verification result meets the preset requirement.

[0166] The first configuration information is used to indicate the target network to perform configuration related to the first network operation. Specifically, the first configuration information is used to indicate one or more network devices in the target network to perform configuration related to the first network operation. It should be noted that different first network operations correspond to different first configuration information.

[0167] The target network shown in FIG. 2 is used as an example. It is assumed that the first network operation is adding the air purifier and the access device corresponding to the air purifier. In this case, the first configuration information may include configuration information of the newly added access device, configuration information of an edge device corresponding to the newly added access device, configuration information of a gateway device corresponding to the edge device, and the like. The newly added access device is used as an example. The configuration information may include a QoS parameter of the newly added access device, an access-control list of the newly added access device, and the like.

[0168] For another example, if the first network operation is adjusting an access-control list of an access device corresponding to the smart screen in FIG. 2, the first configuration information may include only a new access-control list of the access device corresponding to the smart screen.

[0169] The foregoing embodiment describes a case in which the first verification result meets the preset requirement. The following describes a case in which the first verification result does not meet a preset requirement.

[0170] Specifically, based on the foregoing embodiments, as shown in FIG. 3, this embodiment of this application further provides an embodiment of the method for evaluating impact of a network operation. In this embodiment, the method further includes the following steps.

[0171] Step 107: The control device generates a first network operation solution based on the fact that the first verification result does not meet the preset requirement. The first network operation solution is used to indicate to continue to perform a second network operation on the mirror simulation network, so that a second verification result obtained by performing simulation verification on the mirror simulation network based on the verification content meets the preset requirement.

[0172] It should be noted that there are a plurality of methods for generating the first network operation solution. This is not specifically limited in this embodiment of this application. For example, the first network operation solution may be generated based on a technology, for example, an expert experience library or knowledge graph.

[0173] There may be a plurality of types of content of the first network operation solution, and the content is specifically related to the first verification result. The mirror simulation network shown in FIG. 11 is used as an example. For a second service flow parameter of the gateway device, the first verification result in FIG. 11 shows that the delay that is in the first service parameter and that is expected by the user is 20 ms. However, the delay in the third service parameter of the mirror simulation network in the running state is 25 ms. To be specific, the first verification result does not meet the preset requirement.

[0174] Based on this, a network operation solution may be generated. The first network operation solution is used to indicate to add a link between the gateway device and an edge device corresponding to the smart socket, to reduce a delay of the second service flow.

[0175] Based on the foregoing embodiment, to verify that the generated first network operation solution can enable the second verification result obtained by performing simulation verification on the mirror simulation network based on the verification content to meet the preset requirement, as shown in FIG. 3, this embodiment of this application further provides an embodiment of the method for evaluating impact of a network operation. In this embodiment, after the first network operation solution is generated based on the fact that the first verification result does not meet the preset requirement, the method further includes the following steps.

[0176] Step 108: The control device performs the second network operation on the mirror simulation network based on the first network operation solution.

[0177] The second network operation performed on the mirror simulation network is similar to the first network operation performed on the mirror simulation network. For details, refer to the foregoing related descriptions to understand Step 108.

[0178] The foregoing example is used as an example. Performing the second network operation on the mirror simulation network based on the first network operation solution may include: adding a link between a gateway device in the mirror simulation network and an edge device corresponding to the smart socket.

[0179] Step 109: The control device performs, after performing the second network operation on the mirror simulation network, simulation verification on the mirror simulation network based on the verification content, to obtain the second verification result.

[0180] The second verification result is similar to the first verification result. For details, refer to the foregoing related descriptions of the first verification result to understand the second verification result. The second verification result may meet the preset requirement, or may not meet the preset requirement.

[0181] The foregoing example is used as an example. After the link is added between the gateway device in the mirror simulation network and the edge device corresponding to the smart socket, the second verification result may show that the delay in the third service parameter of the mirror simulation network in the running state changes to 20 ms, that is, the second verification result meets the preset requirement.

[0182] The following describes a case in which the second verification result meets the preset requirement.

[0183] This embodiment of this application further provides an embodiment of the method for evaluating impact of a network operation. In this embodiment. The method further includes the following step.

[0184] Step 110: The control device sends second configuration information to the target network based on the fact that the second verification result meets the preset requirement. The second configuration information is used to indicate the target network to perform configuration related to the first network operation and configuration related to the second network operation.

[0185] The second configuration information is similar to the first configuration information. For details, refer to the foregoing related descriptions of the first configuration information to understand the second configuration information.

[0186] A difference lies in that the second configuration information indicates not only the target network to perform configuration related to the first network operation, but also the target network to perform configuration related to the second network operation.

[0187] For example, in the foregoing example, performing the second network operation on the mirror simulation network based on the first network operation solution includes: adding the link between the gateway device in the mirror simulation network and the edge device corresponding to the smart socket. In this case, the second configuration information indicates a gateway device in the target network and an edge device corresponding to the smart socket to perform corresponding configuration, to establish a new link. It can be learned from the foregoing embodiment that the first configuration information is sent to the target network when the first verification result meets the preset requirement, to perform the first network operation on the target network; and the second configuration information is sent to the target network when the second verification result meets the preset requirement, to perform the second network operation on the target network. To further determine that the impact of the first network operation on the target network, or impact of the first network operation and the second network operation on the target network can meet the requirement of the user, this embodiment of this application further provides an embodiment of the method for evaluating impact of a network operation, the method further includes the following steps.

[0188] Step 111: The control device sends a packet to the target network. The packet is used to indicate the target network to perform a dialing test.

[0189] It should be noted that the dialing test means that an actual test is performed on the target network. For example, it is assumed that the first network operation is adjusting an access-control list of the gateway device. In this case, the target network selects a corresponding service flow for testing. Specifically, the target network shown in FIG. 2 is used as an example, a dialing test process may include: The smart speaker and the smart screen separately sends a service flow to the server, to test whether the two service flows can pass through the gateway device, and a dialing test result is determined with reference to the access-control list.

[0190] Step 112: The control device obtains the dialing test result, to determine that the dialing test result meets the preset requirement.

[0191] In this embodiment of this application, the packet is used to indicate the target network to perform the dialing test, and the dialing test result is used to determine that the impact of the first network operation on the target network can meet the requirement of the user, or determine that the impact of the first network operation and the second network operation on the target network can meet the requirement of the user.

[0192] Based on the foregoing descriptions, it can be learned that, based on the fact that the first verification result does not meet the preset requirement, the control device generates the first network operation solution, performs the second network operation on the mirror simulation network based on the first network operation solution, and then performs verification again, to obtain the second verification result. However, there is a situation that the second verification result also does not meet the preset requirement. Therefore, the first network operation solution cannot enable the running state of the target network to meet the requirement of the user.

[0193] Therefore, as shown in FIG. 12, in another embodiment of the method for evaluating impact of a network operation provided in this embodiment of this application, based on the fact that the first verification result does not meet a preset requirement, the method further includes the following steps.

[0194] Step 113: The control device generates a second network operation solution. The second network operation solution is used to indicate to perform a third network operation on the mirror simulation network.

[0195] That the control device generates the second network operation solution is similar to that the control device generates the first network operation solution. For details, refer to the foregoing related descriptions for understanding.

[0196] Step 114: The control device performs the third network operation on the mirror simulation network based on the second network operation solution.

[0197] Performing the third network operation on the mirror simulation network is similar to performing the first network operation on the mirror simulation network. For details, refer to the foregoing related descriptions for understanding.

[0198] Step 115: The control device performs, after performing the third network operation on the mirror simulation network, simulation verification on the mirror simulation network based on the verification content, to obtain a third verification result.

[0199] In this embodiment of this application, a process of performing simulation verification on the mirror simulation network to obtain the third verification result is similar to a process of performing simulation verification on the mirror simulation network to obtain the second verification result in the foregoing embodiment. For details, refer to related descriptions in the foregoing embodiment for understanding.

[0200] The control device repeatedly performs the foregoing steps until the third verification result meets the preset requirement.

[0201] Different from that in the foregoing embodiment, in this embodiment of this application, Step 113 to Step 115 are performed for a plurality of times until the third verification result meets the preset requirement.

[0202] For example, the control device first performs Step 113 to Step 115 once. If the obtained third verification result does not meet the preset requirement, the control device performs Step 113 to Step 115 again. If a third verification result obtained by performing Step 113 to Step 115 again does not meet the preset requirement, the control device performs Step 113 to Step 115 for a third time. A subsequent process is similar to the foregoing process until an obtained third verification result meets the preset requirement.

[0203] It should be noted that second network operation solutions generated each time Step 113 to Step 115 are performed are different. Specifically, when performing Step 113 for the first time, the control device generates a second network operation solution. Based on the fact that a third verification result corresponding to the second network operation solution does not meet the preset requirement, the control device performs Step 113 for the second time, to generate another second network operation solution.

[0204] Step 116: The control device sends third configuration information to the target network. The third configuration information is used to indicate the target network to perform configuration related to the first network operation and configuration related to the third network operation.

[0205] It should be noted that a process in which the control device sends the third configuration information is similar to a process in which the control device sends the second configuration information. For details, refer to related descriptions in the foregoing embodiment for understanding.

[0206] After Step 116 is performed, the control device may also perform Step 111 and Step 112, to perform a dialing test. For details, refer to related descriptions of Step 111 and Step 112 for understanding.

[0207] FIG. 13 shows an embodiment of an apparatus for evaluating impact of a network operation according to an embodiment of this application. The apparatus includes:

a first obtaining unit 601, configured to obtain a service intent, where the service intent is used to indicate to perform a first network operation on a target network; a second obtaining unit 602, configured to obtain a mirror simulation network corresponding to the target network;

a verification content determining unit 603, configured to determine verification content, where the verification content is used to perform simulation verification on a running state of the mirror simulation network;

a network operation unit 604, configured to perform the first network operation on the mirror simulation network based on the service intent; and

a simulation verification unit 605, configured to perform, after the first network operation is performed on the mirror simulation network, simulation verification on the mirror simulation network based on the verification content, to obtain a first verification result, where the first verification result is used to evaluate impact of the first network operation on the target network.



[0208] It should be noted that functions of the first obtaining unit 601, the second obtaining unit 602, the verification content determining unit 603, the network operation unit 604, and the simulation verification unit 605 may be understood with reference to related descriptions of Step 101 to Step 105 in FIG. 3.

[0209] In another embodiment of the apparatus for evaluating the impact of the network operation provided in this embodiment of this application, the verification content determining unit 603 is configured to:

determine a type of the verification content; and

obtain the verification content based on the type of the verification content.



[0210] In another embodiment of the apparatus for evaluating the impact of the network operation provided in this embodiment of this application, the type of the verification content is service information.

[0211] The verification content determining unit 603 is configured to:
obtain, after the first network operation is performed on the target network, a first service parameter that is of the target network in a running state and that is expected by a user.

[0212] It should be noted that the function of the verification content determining unit 603 may be understood with reference to related descriptions of Step 301 to Step 302 in FIG. 7.

[0213] In another embodiment of the apparatus for evaluating the impact of the network operation provided in this embodiment of this application, the verification content determining unit 603 is configured to:

obtain a second service parameter that is of the target network in a current running state;

obtain first modification information, where the first modification information is used to indicate to modify the second service parameter; and

modify the second service parameter based on the first modification information, and use a modified second service parameter as the first service parameter that is of the target network in the running state and that is expected by the user.



[0214] It should be noted that the function of the verification content determining unit 603 may be understood with reference to related descriptions of Step 501 to Step 503 in FIG. 9.

[0215] In another embodiment of the apparatus for evaluating the impact of the network operation provided in this embodiment of this application, the simulation verification unit 605 is configured to: obtain, after performing the first network operation on the mirror simulation network, a third service parameter that is of the mirror simulation network in the running state in a sandbox environment; and
generate a first comparison result between the first service parameter and the third service parameter.

[0216] It should be noted that the function of the simulation verification unit 605 may be understood with reference to related descriptions of corresponding steps in the foregoing embodiment.

[0217] In another embodiment of the apparatus for evaluating the impact of the network operation provided in this embodiment of this application, the service intent is used to indicate to add a first network device to the target network.

[0218] The simulation verification unit 605 is configured to obtain, after the first network device is added to the mirror simulation network, a third service parameter that is of the first network device in a running state.

[0219] It should be noted that the function of the simulation verification unit 605 may be understood with reference to related descriptions of corresponding steps in the foregoing embodiment.

[0220] In another embodiment of the apparatus for evaluating the impact of the network operation provided in this embodiment of this application, the service intent is used to indicate to adjust an access-control list of a second network device in the target network.

[0221] The simulation verification unit 605 is configured to obtain, after the access-control list of the second network device in the target network is adjusted, a service flow that passes through the second network device.

[0222] It should be noted that the function of the simulation verification unit 605 may be understood with reference to related descriptions of corresponding steps in the foregoing embodiment.

[0223] In another embodiment of the apparatus for evaluating the impact of the network operation provided in this embodiment of this application, the verification content determining unit 603 is configured to generate the verification content based on the service intent.

[0224] It should be noted that the function of the verification content determining unit 603 may be understood with reference to related descriptions of Step 401 in FIG. 8.

[0225] In another embodiment of the apparatus for evaluating the impact of the network operation provided in this embodiment of this application, the verification content determining unit 603 is further configured to: obtain second modification information, where the second modification information is used to indicate to modify the verification content; and
modify the verification content based on the second modification information.

[0226] It should be noted that the function of the verification content determining unit 603 may be understood with reference to related descriptions of Step 402 to Step 403 in FIG. 8.

[0227] In another embodiment of the apparatus for evaluating the impact of the network operation provided in this embodiment of this application, the second obtaining unit 602 is configured to: obtain network information of the target network; and
construct, based on the network information, the mirror simulation network corresponding to the target network.

[0228] It should be noted that the function of the second obtaining unit 602 may be understood with reference to related descriptions of Step 201 to Step 202 in FIG. 6.

[0229] In another embodiment of the apparatus for evaluating the impact of the network operation provided in this embodiment of this application, the apparatus further includes:
a sending unit 606, configured to send first configuration information to the target network based on the fact that the first verification result meets a preset requirement. The first configuration information is used to indicate the target network to perform configuration related to the first network operation.

[0230] It should be noted that a function of the sending unit 606 may be understood with reference to related descriptions of Step 106 in FIG. 3.

[0231] In another embodiment of the apparatus for evaluating the impact of the network operation provided in this embodiment of this application, the apparatus further includes:
a network operation solution generating unit 607, configured to generate a first network operation solution based on the fact that the first verification result does not meet a preset requirement. The first network operation solution is used to indicate to continue to perform a second network operation on the mirror simulation network, so that a second verification result obtained by performing simulation verification on the mirror simulation network based on the verification content meets the preset requirement.

[0232] It should be noted that a function of the network operation solution generating unit 607 may be understood with reference to related descriptions of Step 107 in FIG. 3.

[0233] In another embodiment of the apparatus for evaluating the impact of the network operation provided in this embodiment of this application, the simulation verification unit 605 is further configured to: perform the second network operation on the mirror simulation network based on the first network operation solution; and
perform, after the second network operation is performed on the mirror simulation network, simulation verification on the mirror simulation network based on the verification content, to obtain the second verification result.

[0234] It should be noted that the function of the simulation verification unit 605 may be understood with reference to related descriptions of Step 108 to Step 109 in FIG. 3.

[0235] In another embodiment of the apparatus for evaluating the impact of the network operation provided in this embodiment of this application, the sending unit 606 is further configured to send second configuration information to the target network based on the fact that the second verification result meets the preset requirement. The second configuration information is used to indicate the target network to perform configuration related to the first network operation and configuration related to the second network operation.

[0236] It should be noted that a function of the sending unit 606 may be understood with reference to related descriptions of Step 110 in FIG. 3.

[0237] In another embodiment of the apparatus for evaluating the impact of the network operation provided in this embodiment of this application, the apparatus further includes a network operation solution generating unit 607 and a sending unit 606.

[0238] The network operation solution generating unit 607 is configured to generate a second network operation solution. The second operation solution is used to indicate to perform a third network operation on the mirror simulation network.

[0239] The simulation verification unit 605 is further configured to: perform the third network operation on the mirror simulation network based on the second network operation solution; and
perform, after the third network operation is performed on the mirror simulation network, simulation verification on the mirror simulation network based on the verification content, to obtain a third verification result.

[0240] The sending unit 606 is configured to send third configuration information to the target network. The third configuration information is used to indicate the target network to perform configuration related to the first network operation and configuration related to the third network operation.

[0241] It should be noted that the network operation solution generating unit 607 may be understood with reference to related descriptions of Step 113 in FIG. 12.

[0242] The function of the simulation verification unit 605 may be understood with reference to related descriptions of Step 114 and Step 115 in FIG. 12.

[0243] A function of the sending unit 606 may be understood with reference to related descriptions of Step 116 in FIG. 12.

[0244] In another embodiment of the apparatus for evaluating the impact of the network operation provided in this embodiment of this application, the sending unit 606 is further configured to send a packet to the target network. The packet is used to indicate the target network to perform a dialing test.

[0245] It should be noted that the function of the sending unit 606 may be understood with reference to related descriptions of Step 111 in FIG. 3.

[0246] The first obtaining unit 601 is further configured to obtain a dialing test result, to determine that the dialing test result meets the preset requirement.

[0247] It should be noted that the function of the first obtaining unit 601 may be understood with reference to related descriptions of Step 112 in FIG. 3.

[0248] Refer to FIG. 14. An embodiment of a control device according to an embodiment of this application may include one or more processors 701, a memory 702, and a communication interface 703.

[0249] The memory 702 may perform ephemeral storage or durable storage. Further, the processor 701 may be configured to communicate with the memory 702, and perform, on the control device, operations of a series of instructions in the memory 702.

[0250] In this embodiment, the processor 701 may perform the operations performed by the control device in the embodiments shown in FIG. 3, FIG. 6 to FIG. 9, and FIG. 12. Details are not described herein again.

[0251] Specifically, the processor 701 may perform the following steps:

obtaining a service intent, where the service intent is used to indicate to perform a first network operation on a target network;

obtaining a mirror simulation network corresponding to the target network;

determining verification content, where the verification content is used to perform simulation verification on a running state of the mirror simulation network;

performing the first network operation on the mirror simulation network based on the service intent; and

performing, after the first network operation is performed on the mirror simulation network, simulation verification on the mirror simulation network based on the verification content, to obtain a first verification result, where the first verification result is used to evaluate impact of the first network operation on the target network.



[0252] In this embodiment, specific function module division in the processor 701 may be similar to the function module division manner described in FIG. 12. Details are not described herein again. An embodiment of this application further provides a chip or a chip system. The chip or the chip system includes at least one processor and a communication interface. The communication interface is interconnected to the at least one processor through a line. The at least one processor is configured to run a computer program or instructions, to perform the operations performed by the control device in the embodiments shown in FIG. 3, FIG. 6 to FIG. 9, and FIG. 12. Details are not described herein again.

[0253] The communication interface in the chip may be an input/output interface, a pin, a circuit, or the like.

[0254] An embodiment of this application further provides a first implementation of a chip or a chip system. The chip or the chip system described above in this application further includes at least one memory. The at least one memory stores instructions. The memory may be a storage unit inside the chip, for example, a register or a buffer, or may be a storage unit (for example, a read-only memory or a random access memory) of the chip.

[0255] An embodiment of this application further provides a computer storage medium. The computer storage medium is configured to store computer software instructions used by the foregoing control device. The computer software instructions are used to execute a program designed for a terminal device.

[0256] The terminal device may be the foregoing apparatus for evaluating the impact of the network operation described in FIG. 13.

[0257] An embodiment of this application further provides a computer program product. The computer program product includes computer software instructions. The computer software instructions may be loaded by a processor to implement the procedure in the method for evaluating impact of a network operation according to any one of FIG. 3, FIG. 6 to FIG. 9, and FIG. 12.

[0258] Refer to FIG. 15. An embodiment of this application further provides a network system. The network system includes a target network 801 and a control device 802. The target network 801 includes one or more network devices.

[0259] The control device 802 is configured to perform the method for evaluating impact of a network operation according to any one of FIG. 3, FIG. 6 to FIG. 9, and FIG. 12.

[0260] For example, after receiving first configuration information, the target network 801 performs configuration related to a first network operation.

[0261] For example, after receiving second configuration information, the target network 801 performs configuration related to a first network operation and configuration related to a second network operation.

[0262] For example, after receiving third configuration information, the target network 801 performs configuration related to a first network operation and configuration related to a third network operation.

[0263] It may be clearly understood by a person skilled in the art that, for the purpose of convenient and brief description, for a detailed working process of the foregoing systems, apparatuses, and units, refer to a corresponding process in the foregoing method embodiments. Details are not described herein again.

[0264] In the several embodiments provided in this application, it should be understood that the disclosed systems, apparatuses, and methods may be implemented in other manners. For example, the foregoing described apparatus embodiments are merely examples. For example, division of the units is merely a logical function division and may be another division during actual implementation. For example, a plurality of units or components may be combined or integrated into another system, or some features may be ignored or may not be performed. In addition, the displayed or discussed mutual couplings or direct couplings or communication connections may be implemented through some interfaces. The indirect couplings or communication connections between the apparatuses or units may be implemented in electronic, mechanical, or other forms.

[0265] The units described as separate components may or may not be physically separate, and components displayed as units may or may not be physical units. To be specific, the components may be located at one location, or may be distributed on a plurality of network units. Some or all of the units may be selected based on actual requirements to achieve the objectives of the solutions in embodiments.

[0266] In addition, functional units in embodiments of this application may be integrated into one processing unit, each of the units may exist alone physically, or two or more units are integrated into one unit. The foregoing integrated unit may be implemented in a form of hardware, or may be implemented in a form of a software functional unit.

[0267] When being implemented in the form of the software functional unit and sold or used as an independent product, the integrated unit may be stored in a computer-readable storage medium. Based on such an understanding, the technical solutions of this application essentially, or the part contributing to the conventional technology, or all or some of the technical solutions may be implemented in a form of a software product. The computer software product is stored in a storage medium, and includes a plurality of instructions for instructing a computer device (which may be, for example, a personal computer, a server, or a network device) to perform all or some of the steps of the methods described in embodiments of this application. The foregoing storage medium includes any medium that can store program code, such as a USB flash drive, a removable hard disk, a read-only memory (ROM, Read-Only Memory), a random access memory (RAM, Random Access Memory), a magnetic disk, or an optical disc.


Claims

1. A method for evaluating impact of a network operation, comprising:

obtaining, by a control device, a service intent, wherein the service intent is used to indicate to perform a first network operation on a target network;

obtaining, by the control device, a mirror simulation network corresponding to the target network;

determining, by the control device, verification content, wherein the verification content is used to perform simulation verification on a running state of the mirror simulation network;

performing, by the control device, the first network operation on the mirror simulation network based on the service intent; and

performing, by the control device after performing the first network operation on the mirror simulation network, simulation verification on the mirror simulation network based on the verification content, to obtain a first verification result, wherein the first verification result is used to evaluate impact of the first network operation on the target network.


 
2. The method according to claim 1, wherein the determining, by the control device, verification content comprises:

determining, by the control device, a type of the verification content; and

obtaining, by the control device, the verification content based on the type of the verification content.


 
3. The method according to claim 2, wherein the type of the verification content is service information; and
the obtaining, by the control device, the verification content based on the type of the verification content comprises:
obtaining, by the control device after performing the first network operation on the target network, a first service parameter that is of the target network in a running state and that is expected by a user.
 
4. The method according to claim 3, wherein the obtaining, by the control device after performing the first network operation on the target network, a first service parameter that is of the target network in a running state and that is expected by a user comprises:

obtaining, by the control device, a second service parameter that is of the target network in a current running state;

obtaining, by the control device, first modification information, wherein the first modification information is used to indicate to modify the second service parameter; and

modifying, by the control device, the second service parameter based on the first modification information, and using a modified second service parameter as the first service parameter that is of the target network in the running state and that is expected by the user.


 
5. The method according to claim 3 or 4, wherein the performing, by the control device after performing the first network operation on the mirror simulation network, simulation verification on the mirror simulation network based on the verification content, to obtain a first verification result comprises:

obtaining, by the control device after performing the first network operation on the mirror simulation network, a third service parameter that is of the mirror simulation network in the running state in a sandbox environment; and

generating, by the control device, a first comparison result between the first service parameter and the third service parameter.


 
6. The method according to claim 5, wherein the service intent is used to indicate to add a first network device to the target network; and
the obtaining, by the control device after performing the first network operation on the mirror simulation network, a third service parameter that is of the mirror simulation network in the running state comprises:
obtaining, by the control device after the first network device is added to the mirror simulation network, a third service parameter that is of the first network device in a running state.
 
7. The method according to claim 5, wherein the service intent is used to indicate to adjust an access-control list of a second network device in the target network; and
the obtaining, by the control device after performing the first network operation on the mirror simulation network, a third service parameter that is of the mirror simulation network in the running state comprises:
obtaining, by the control device after the access-control list of the second network device in the target network is adjusted, a service flow that passes through the second network device.
 
8. The method according to any one of claims 2 to 7, wherein the determining, by the control device, a type of the verification content comprises:
generating, by the control device, the type of the verification content based on the service intent.
 
9. The method according to claim 8, wherein after the generating, by the control device, the type of the verification content based on the service intent, the method further comprises:

obtaining, by the control device, second modification information, wherein the second modification information is used to indicate to modify the type of the verification content; and

modifying, by the control device, the type of the verification content based on the second modification information.


 
10. The method according to any one of claims 1 to 9, wherein the method further comprises:
sending, by the control device, first configuration information to the target network based on the fact that the first verification result meets a preset requirement, wherein the first configuration information is used to indicate the target network to perform configuration related to the first network operation.
 
11. The method according to any one of claims 1 to 9, wherein the method further comprises:
generating, by the control device, a first network operation solution based on the fact that the first verification result does not meet a preset requirement, wherein the first network operation solution is used to indicate to continue to perform a second network operation on the mirror simulation network, so that a second verification result obtained by performing simulation verification on the mirror simulation network based on the verification content meets the preset requirement.
 
12. The method according to claim 11, wherein after the generating, by the control device, a first network operation solution based on the fact that the first verification result does not meet a preset requirement, the method further comprises:

performing, by the control device, the second network operation on the mirror simulation network based on the first network operation solution; and

performing, by the control device after performing the second network operation on the mirror simulation network, simulation verification on the mirror simulation network based on the verification content, to obtain the second verification result.


 
13. The method according to claim 12, wherein the method further comprises:
sending, by the control device, second configuration information to the target network based on the fact that the second verification result meets the preset requirement, wherein the second configuration information is used to indicate the target network to perform configuration related to the first network operation and configuration related to the second network operation.
 
14. The method according to any one of claims 1 to 9, wherein based on the fact that the first verification result does not meet a preset requirement, the method further comprises:

generating, by the control device, a second network operation solution;

performing, by the control device, a third network operation on the mirror simulation network based on the second network operation solution;

performing, by the control device after performing the third network operation on the mirror simulation network, simulation verification on the mirror simulation network based on the verification content, to obtain a third verification result;

repeatedly performing, by the control device, the foregoing steps until the third verification result meets the preset requirement; and

sending, by the control device, third configuration information to the target network, wherein the third configuration information is used to indicate the target network to perform configuration related to the first network operation and configuration related to the third network operation.


 
15. The method according to claim 10, 13 or 14, wherein the method further comprises:

sending a packet to the target network, wherein the packet is used to indicate the target network to perform a dialing test; and

obtaining a dialing test result, to determine that the dialing test result meets the preset requirement.


 
16. An apparatus for evaluating impact of a network operation, comprising:

a first obtaining unit, configured to obtain a service intent, wherein the service intent is used to indicate to perform a first network operation on a target network;

a second obtaining unit, configured to obtain a mirror simulation network corresponding to the target network;

a verification content determining unit, configured to determine verification content, wherein the verification content is used to indicate to perform simulation verification on a running state of the mirror simulation network;

a network operation unit, configured to perform the first network operation on the mirror simulation network based on the service intent; and

a simulation verification unit, configured to perform, after the first network operation is performed on the mirror simulation network, simulation verification on the mirror simulation network based on the verification content, to obtain a first verification result, wherein the first verification result is used to evaluate impact of the first network operation on the target network.


 
17. A control device, comprising at least one processor and a memory, wherein the memory stores computer-executable instructions that can be run on the processor, and when the computer-executable instructions are executed by the processor, the terminal device performs the method according to any one of claims 1 to 15.
 
18. A computer-readable storage medium storing one or more computer-executable instructions, wherein when the computer-executable instruction is executed by a processor, the processor performs the method according to any one of claims 1 to 15.
 
19. A network system, comprising a control device and a target network, wherein

the target network comprises one or more network devices; and

the control device is configured to perform the method according to any one of claims 1 to 15.


 
20. A computer program product, wherein the computer program product comprises computer software instructions, and the computer software instructions may be loaded by a processor to implement the method according to any one of claims 1 to 15.
 




Drawing








































Search report










Cited references

REFERENCES CITED IN THE DESCRIPTION



This list of references cited by the applicant is for the reader's convenience only. It does not form part of the European patent document. Even though great care has been taken in compiling the references, errors or omissions cannot be excluded and the EPO disclaims all liability in this regard.

Patent documents cited in the description