CN102811169B - Virtual private network (VPN) implementation method and system for performing multi-core parallel processing by using Hash algorithm - Google Patents
Virtual private network (VPN) implementation method and system for performing multi-core parallel processing by using Hash algorithm Download PDFInfo
- Publication number
- CN102811169B CN102811169B CN201210257170.9A CN201210257170A CN102811169B CN 102811169 B CN102811169 B CN 102811169B CN 201210257170 A CN201210257170 A CN 201210257170A CN 102811169 B CN102811169 B CN 102811169B
- Authority
- CN
- China
- Prior art keywords
- vpn
- data message
- processor core
- core
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention relates to the technical field of virtual private network (VPN), and discloses a VPN implementation method and a VPN implementation system for performing multi-core parallel processing by using a Hash algorithm. The method specifically comprises the following steps of: constructing a Hash bucket according to the number of processor cores in a VPN system, wherein the depth of the Hash bucket is equal to the number of the processor cores, and each Hash value in the Hash bucket corresponds to the number of a processor core; calculating a Hash value according to a quintuple of a received data message, and finding a corresponding processor core according to the Hash value; and transmitting the data message to the corresponding processor core for processing, wherein the quintuple comprises a source Internet protocol (IP) address, a destination IP address, a source transmission layer port, a destination transmission layer port and an IP message protocol number. Compared with the prior art, the method and the system have the advantages that the utilization efficiency of a plurality of processor cores can be greatly improved, a plurality of data streams can be encrypted and decrypted in parallel, and the high throughput of the VPN is ensured.
Description
Technical field
The present invention relates to VPN technologies field, particularly relate to a kind of adopt hash algorithm to carry out multi-core parallel concurrent process VPN realization method and system.
Background technology
VPN(Virtual Private Network, be called for short VPN) be the abbreviation of VPN (virtual private network), at present, Network Security Device on market has gradually adopted the multi-core platform being equipped with multiple hardware processor core, to scheme the throughput improving network data, the particularly equipment of this computation-intensive of IPSEC VPN, the introducing of multiple processor core should be very effective to raising whole system encryption and decryption transmission throughput.But effect bad in actual applications, otherwise be exactly that network card data is concentrated and sent indivedual or minority processor core to, however be exactly each data message very random pass to different processor cores.The former causes the imbalance that responsible load Distribution is serious, thus multinuclear utilance is lower, multinuclear actual change monokaryon.The latter causes data message seriously out of order, because the data encrypting and deciphering of different message length time difference used is very large, this is very unfavorable for the application higher based on reliability requirements such as TCP, can cause frequent insignificant re-transmission, and whole efficiency of transmission is sharply reduced.
Summary of the invention
For the technical problem of core utilance low and poor reliability when multinuclear process in the vpn system existed in prior art, the invention discloses a kind of VPN realization method adopting hash algorithm to carry out multi-core parallel concurrent process.Another object of the present invention is to provide a kind of vpn system adopting hash algorithm to carry out multi-core parallel concurrent process.
Object of the present invention is realized by following technical proposals:
A kind of VPN realization method adopting hash algorithm to carry out multi-core parallel concurrent process, it specifically comprises following steps: the number according to processor core in vpn system builds Hash bucket, the degree of depth of Hash bucket equals the number of processor core, a numbering of each cryptographic Hash alignment processing device core in Hash bucket, five-tuple according to the data message received calculates cryptographic Hash, and find out corresponding processor core according to cryptographic Hash, sent to by data message corresponding processor core to process; Wherein: five-tuple comprises source and destination IP address, source and destination transport layer port and IP message protocol number.
More enter a ground, above-mentioned each processor core creates separately a VPN strategy, when processor core receives data message, searches the VPN strategy that data message is corresponding, processes data message according to searching the VPN strategy obtained.
More enter a ground, said method also comprises for each cryptographic Hash distributes a fifo queue, and processor core takes out data and to go forward side by side row relax from fifo queue, and the data message after process is delivered to network interface card and sends.
More enter a ground, said method also comprises for each processor core setting data load process upper limit, this upper limit determines according to the average treatment load of the computing capability of monokaryon and multiple core, once data payload exceeds the process upper limit, transfers to the lightest core of load to process by data message.
More enter a ground, above-mentioned VPN strategy search the VPN Policy List preferentially searching present treatment device core, the VPN Policy List of other processor cores can not be searched again further one by one by matched data message.
More enter a ground, the computing formula of above-mentioned cryptographic Hash is as follows:
Wherein Hash bucket depth B D equals the number of the processor core of equipment, and data message source IP address is Sip, source port is Sport, object IP address is Dip, destination interface is Dport and protocol number is Proto.
The invention also discloses a kind of system of above-mentioned VPN realization method, described system comprises: initialization module, data distribution module, data processing module and data transmission blocks, described initialization module, data distribution module, data processing module and data transmission blocks sequentially connect, described initialization module is for building Hash bucket, and distribute a fifo queue for each cryptographic Hash, for each processor core creates independently VPN Policy List; Described data distribution module is used for the undressed data message received by network interface card, adopt hash algorithm to carry out shunting process according to the number of processor core and the five-tuple of data message, will there is the data message of same cryptographic Hash stored in same fifo queue; Described data processing module carries out encryption and decryption and the encapsulation decapsulation process of VPN; Data message after process is passed to network interface card and sends by described data transmission blocks.
Beneficial effect of the present invention: the data message of the present invention by receiving, hash algorithm is adopted to carry out shunting process according to the number of processor core and the five-tuple of data message, and maintain independently VPN Policy List for each processor core, different processor core process is given different distribution of flows, distributing a FIFO(first in first out for each cryptographic Hash simultaneously) queue to be to realize the order-preserving of same data flow data message, thus greatly can improve the utilization ratio of multi-processor core, realize multiple data stream to walk abreast encryption and decryption process, reach very high VPN throughput.
Accompanying drawing explanation
Fig. 1 is the VPN realization flow figure that employing hash algorithm that the embodiment of the present invention provides carries out multi-core parallel concurrent process.
Fig. 2 is the VPN concrete grammar that employing hash algorithm that the embodiment of the present invention provides carries out multi-core parallel concurrent process.
Fig. 3 is the structure chart that employing hash algorithm that the embodiment of the present invention provides carries out the vpn system of multi-core parallel concurrent process.
Embodiment
In order to make object of the present invention, technical scheme and advantage clearly understand, below in conjunction with drawings and Examples, the present invention is further elaborated.Should be appreciated that specific embodiment described herein only in order to explain the present invention, be not intended to limit the present invention.
Fig. 1 is the VPN realization flow figure that employing hash algorithm that the embodiment of the present invention provides carries out multi-core parallel concurrent process.
The invention discloses a kind of VPN realization method adopting hash algorithm to carry out multi-core parallel concurrent process, it specifically comprises following steps: the number according to processor core in vpn system builds Hash bucket, the degree of depth of Hash bucket equals the number of processor core, a numbering of each cryptographic Hash alignment processing device core in Hash bucket, such as cryptographic Hash is the alignment processing device core 1 of 1, cryptographic Hash is the alignment processing device core 2 of 2 ..., by that analogy.Five-tuple according to the data message received calculates cryptographic Hash, and find out corresponding processor core according to cryptographic Hash, and send to processor core to process data message, wherein: five-tuple comprises source and destination IP address, source and destination transport layer port and IP message protocol number.Cryptographic Hash is calculated according to above-mentioned five-tuple.By building Hash bucket to processor core, and adopting hash algorithm to shunt data message, drastically increasing the utilization ratio of multi-processor core, realize multiple data stream and to walk abreast encryption and decryption process, reach very high VPN throughput.
Further, described each processor core creates separately a VPN strategy, when processor core receives data message, searches the VPN strategy that data message is corresponding, processes data message according to searching the VPN strategy obtained.Each processor core creates separately VPN strategy, corresponding VPN strategy can be gone out to go forward side by side row relax by fast finding after processor core receives data message, add the efficiency of parallel processing.
Further, described method also comprises for each cryptographic Hash distributes a fifo queue, and processor core takes out data and to go forward side by side row relax from fifo queue, and the data message after process is delivered to network interface card and sends.Adopt the form of queue to preserve data message, realize the order-preserving of same data flow data message, further increase the efficiency of parallel processing.
Further, for each processor core setting data load process upper limit, this upper limit determines according to the average treatment load of the computing capability of monokaryon and multiple core, once data payload exceeds the process upper limit, transfers to the lightest core of load to process by data message.Thus the data message of a massive dataflow stream can by multiple core parallel processing.
Further, described VPN strategy search the VPN Policy List preferentially searching present treatment device core, the VPN Policy List of other processor cores can not be searched again further one by one by matched data message.So also be the efficiency further increasing parallel processing.
Further, the computing formula of described cryptographic Hash can be, but not limited to
Wherein Hash bucket depth B D equals the number of the processor core of equipment, then any source IP address is Sip, source port is Sport, object IP address is Dip, destination interface be Dport and protocol number is Proto.By above-mentioned hash function, the Parameter Mapping of five-tuple is become cryptographic Hash, found the processor core of data message by cryptographic Hash.
The employing hash algorithm that Fig. 2 shows the embodiment of the present invention to be provided carries out the concrete grammar of multi-core parallel concurrent process, and details are as follows:
In step s 201, build Hash bucket according to processor core number, for each processor core creates independently VPN Policy List, and distribute a FIFO(first in first out according to the degree of depth (number corresponding to processor) of Hash bucket for each cryptographic Hash) queue.
In step S202, when network interface card interrupts occurring, the data message that network interface card receives adopts hash algorithm to carry out shunting process according to the five-tuple (source and destination IP address, source and destination transport layer port and IP message protocol number) of the number of processor core and data message, gives different processor core process different distribution of flows.
In step S203, each processor is verified and is looked for VPN Policy List, processes data message according to searching the VPN strategy obtained.(preferentially search the VPN Policy List of present treatment device core, can not matched data message search the VPN Policy List of other processor cores more further one by one)
In step S204, each processor core, according to the principle of first in first out, takes out the data message processed and is delivered to network interface card and sends from the fifo queue of correspondence.
Fig. 3 is the structure chart that employing hash algorithm that the embodiment of the present invention provides carries out the vpn system of multi-core parallel concurrent process.
The invention also discloses a kind of vpn system adopting hash algorithm to carry out multi-core parallel concurrent process, described system comprises: initialization module 321, data distribution module 322, data processing module 323 and data transmission blocks 324, described initialization module 321, data distribution module 322, data processing module 323 and data transmission blocks 324 sequentially connect, described initialization module 321 builds Hash bucket for the number according to processor core, the degree of depth of Hash bucket corresponds to the number of processor core, for each cryptographic Hash distributes a FIFO(first in first out) queue, and create independently VPN Policy List for each processor core, described data distribution module, for the undressed data message that network interface card is received, hash algorithm is adopted to carry out shunting process according to the number of processor core and the five-tuple (source and destination IP address, source and destination transport layer port and IP message protocol number) of data message, the data message with same cryptographic Hash is labeled as " untreated " stored in same fifo queue, thus gives different processor core process different distribution of flows.If the load of this processor core has exceeded the process upper limit (this upper limit determines according to the average treatment load of the computing capability of monokaryon and multiple core), this data message pointer is passed to the lightest processor core of load by the mode then by interrupting between processor, processed by this processor core, but still it is constant in the order of former fifo queue to maintain this data message.
Data message is shunted and is carried out encryption and decryption and the encapsulation decapsulation process of IPSEC VPN after marking by data processing module.Each processor core can run the data processing module of a same code, data message is taken out for the fifo queue from correspondence, and search VPN strategy IPSEC encryption and decryption and process such as encapsulation decapsulation etc. are carried out to it, the data message be disposed is labeled as " processed ".Each processor core is also accepted and processes the data message of the core of the overload of being come by interrupt delivery between processor.
Finally according to the principle of first in first out and the mode of poll, the data message being labeled as " processed " in each fifo queue is passed to network interface card by data transmission blocks to send.
Here sub to invention has been detailed description by specific embodiment, there is provided the description of above-described embodiment in order to make those skilled in the art manufacture or be suitable for the present invention, the various amendments of these embodiments are easy understand for a person skilled in the art.The present invention is not limited to these examples, or some aspect wherein.Scope of the present invention is described in detail by additional claim.
Above-mentioned explanation illustrate and describes a preferred embodiment of the present invention, but as previously mentioned, be to be understood that the present invention is not limited to the form disclosed by this paper, should not regard the eliminating to other embodiments as, and can be used for other combinations various, amendment and environment, and can in invention contemplated scope described herein, changed by the technology of above-mentioned instruction or association area or knowledge.And the change that those skilled in the art carry out and change do not depart from the spirit and scope of the present invention, then all should in the protection range of claims of the present invention.
Claims (5)
1. the VPN realization method adopting hash algorithm to carry out multi-core parallel concurrent process, it specifically comprises following steps: the number according to processor core in vpn system builds Hash bucket, the degree of depth of Hash bucket equals the number of processor core, a numbering of each cryptographic Hash alignment processing device core in Hash bucket, five-tuple according to the data message received calculates cryptographic Hash, and find out corresponding processor core according to cryptographic Hash, sent to by data message corresponding processor core to process; Wherein: five-tuple comprises source and destination IP address, source and destination transport layer port and IP message protocol number; Each described processor core creates separately a VPN strategy, when processor core receives data message, searches the VPN strategy that data message is corresponding, processes data message according to searching the VPN strategy obtained; Described VPN strategy search the VPN Policy List preferentially searching present treatment device core, the VPN Policy List of other processor cores can not be searched again further one by one by matched data message.
2. the VPN realization method adopting hash algorithm to carry out multi-core parallel concurrent process as claimed in claim 1, it is characterized in that described method also comprises for each cryptographic Hash distributes a fifo queue, processor core takes out data and to go forward side by side row relax from fifo queue, and the data message after process is delivered to network interface card and sends.
3. the VPN realization method adopting hash algorithm to carry out multi-core parallel concurrent process as claimed in claim 1, it is characterized in that described method also comprises for each processor core setting data load process upper limit, this upper limit determines according to the average treatment load of the computing capability of monokaryon and multiple core, once data payload exceeds the process upper limit, the lightest core of load is transferred to process by data message.
4. the employing hash algorithm as described in any one claim of claim 1-3 carries out the VPN realization method of multi-core parallel concurrent process, it is characterized in that the computing formula of described cryptographic Hash is as follows:
Wherein Hash bucket depth B D equals the number of the processor core of equipment, and data message source IP address is Sip, source port is Sport, object IP address is Dip, destination interface is Dport and protocol number is Proto.
5. one kind realizes the system of VPN realization method described in any one claim of claim 1-4, it is characterized in that described system comprises: initialization module, data distribution module, data processing module and data transmission blocks, described initialization module, data distribution module, data processing module and data transmission blocks sequentially connect, described initialization module is for building Hash bucket, and distribute a fifo queue for each cryptographic Hash, for each processor core creates independently VPN Policy List; Described data distribution module is used for the undressed data message received by network interface card, adopt hash algorithm to carry out shunting process according to the number of processor core and the five-tuple of data message, will there is the data message of same cryptographic Hash stored in same fifo queue; Described data processing module carries out encryption and decryption and the encapsulation decapsulation process of VPN; Data message after process is passed to network interface card and sends by described data transmission blocks.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210257170.9A CN102811169B (en) | 2012-07-24 | 2012-07-24 | Virtual private network (VPN) implementation method and system for performing multi-core parallel processing by using Hash algorithm |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210257170.9A CN102811169B (en) | 2012-07-24 | 2012-07-24 | Virtual private network (VPN) implementation method and system for performing multi-core parallel processing by using Hash algorithm |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102811169A CN102811169A (en) | 2012-12-05 |
CN102811169B true CN102811169B (en) | 2015-05-27 |
Family
ID=47234748
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210257170.9A Expired - Fee Related CN102811169B (en) | 2012-07-24 | 2012-07-24 | Virtual private network (VPN) implementation method and system for performing multi-core parallel processing by using Hash algorithm |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102811169B (en) |
Families Citing this family (27)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103049336A (en) * | 2013-01-06 | 2013-04-17 | 浪潮电子信息产业股份有限公司 | Hash-based network card soft interrupt and load balancing method |
CN103414556B (en) * | 2013-08-16 | 2016-06-01 | 成都卫士通信息产业股份有限公司 | A kind of IKE key consulting tactical lookup method |
CN104734993B (en) * | 2013-12-24 | 2018-05-18 | 杭州华为数字技术有限公司 | Data distribution method and current divider |
CN105337896A (en) * | 2014-07-25 | 2016-02-17 | 华为技术有限公司 | Message processing method and device |
CN105589829A (en) * | 2014-09-15 | 2016-05-18 | 华为技术有限公司 | Data processing method based on multi-core processor chip, device and system |
CN105159779B (en) * | 2015-08-17 | 2020-03-13 | 深圳中兴网信科技有限公司 | Method and system for improving data processing performance of multi-core CPU |
CN105939312A (en) * | 2015-08-26 | 2016-09-14 | 杭州迪普科技有限公司 | Data transmission method and device |
CN105975433B (en) * | 2016-06-30 | 2019-04-19 | 瑞斯康达科技发展股份有限公司 | A kind of message processing method and device |
CN107846364A (en) * | 2016-09-19 | 2018-03-27 | 阿里巴巴集团控股有限公司 | A kind for the treatment of method and apparatus of message |
CN106899512A (en) * | 2017-02-15 | 2017-06-27 | 北京浩瀚深度信息技术股份有限公司 | Multi engine realization method and system based on DPI in FPGA |
CN107483362A (en) * | 2017-07-11 | 2017-12-15 | 郑州云海信息技术有限公司 | A kind of method for dispatching message based on shift register |
CN109327405B (en) * | 2017-07-31 | 2022-08-12 | 迈普通信技术股份有限公司 | Message order-preserving method and network equipment |
CN107707479B (en) * | 2017-10-31 | 2021-08-31 | 北京锐安科技有限公司 | Five-tuple rule searching method and device |
CN108306832B (en) * | 2018-01-29 | 2021-07-27 | 北京启明星辰信息安全技术有限公司 | Network traffic shunting method and device |
CN108667733A (en) * | 2018-03-29 | 2018-10-16 | 新华三信息安全技术有限公司 | A kind of network equipment and message processing method |
CN108718259B (en) * | 2018-05-30 | 2020-07-03 | 新华三信息安全技术有限公司 | Message processing method and multi-core processor |
CN109062684A (en) * | 2018-07-04 | 2018-12-21 | 南京南大光电工程研究院有限公司 | A kind of real-time dynamic self-adapting dynamic load balancing method of release of the hardware of multi-core processor |
CN110650020B (en) * | 2019-09-25 | 2022-05-10 | 天津市滨海新区信息技术创新中心 | Mimicry fuzzy decision method, device and system |
CN110601950B (en) * | 2019-10-08 | 2021-06-01 | 河南省云安大数据安全防护产业技术研究院有限公司 | VPN gateway system based on DTLS protocol and implementation method |
CN111669374B (en) * | 2020-05-25 | 2022-05-27 | 成都安恒信息技术有限公司 | Encryption and decryption performance expansion method for single tunnel software of IPsec VPN |
CN112383480B (en) * | 2020-10-29 | 2022-11-04 | 曙光网络科技有限公司 | Flow table processing method and device, monitoring device and storage medium |
CN112714069A (en) * | 2021-01-06 | 2021-04-27 | 上海交通大学 | Method for lowering shunting module to network card hardware in IPSec security gateway environment |
CN113347230B (en) * | 2021-05-13 | 2022-09-06 | 长沙星融元数据技术有限公司 | Load balancing method, device, equipment and medium based on programmable switch |
CN113296705B (en) * | 2021-05-27 | 2022-09-27 | 浙江萤火虫区块链科技有限公司 | Framework system for parallel computing Poseido Hash in Filecin |
CN113626160B (en) * | 2021-07-07 | 2023-03-24 | 厦门市美亚柏科信息股份有限公司 | Network data packet high-concurrency processing method and system based on cavium processor |
CN113504989A (en) * | 2021-07-08 | 2021-10-15 | 山东科技大学 | Multi-core parallel processing method for near-bottom multi-beam orthogonal demodulation processing |
CN116016035B (en) * | 2023-02-16 | 2023-06-13 | 北京天维信通科技有限公司 | Method for applying multipath service in same tunnel by utilizing quintuple |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102483707A (en) * | 2009-06-22 | 2012-05-30 | 思杰系统有限公司 | Systems and methods for retaining source ip in a load balancing mutli-core environment |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8452835B2 (en) * | 2009-12-23 | 2013-05-28 | Citrix Systems, Inc. | Systems and methods for object rate limiting in multi-core system |
CN101964749A (en) * | 2010-09-21 | 2011-02-02 | 北京网康科技有限公司 | Message retransmission method and system based on multi-core architecture |
CN102104544B (en) * | 2011-01-25 | 2012-06-20 | 无锡网芯科技有限公司 | Order preserving method for fragmented message flow in IP (Internet Protocol) tunnel of multi-nuclear processor with accelerated hardware |
-
2012
- 2012-07-24 CN CN201210257170.9A patent/CN102811169B/en not_active Expired - Fee Related
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102483707A (en) * | 2009-06-22 | 2012-05-30 | 思杰系统有限公司 | Systems and methods for retaining source ip in a load balancing mutli-core environment |
Also Published As
Publication number | Publication date |
---|---|
CN102811169A (en) | 2012-12-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102811169B (en) | Virtual private network (VPN) implementation method and system for performing multi-core parallel processing by using Hash algorithm | |
EP3603003B1 (en) | Hardware-accelerated secure communication management | |
US20200356699A1 (en) | Security plugin for a system-on-a-chip platform | |
CN105763557B (en) | Exchange chip or NP cooperate with the method and system for completing message IPSEC encryption with CPU | |
US8474034B2 (en) | Method and apparatus for fast check and update of anti-replay window without bit-shifting in internet protocol security | |
US8327129B2 (en) | Method, apparatus and system for internet key exchange negotiation | |
US11372684B2 (en) | Technologies for hybrid field-programmable gate array application-specific integrated circuit code acceleration | |
US11509638B2 (en) | Receive-side processing for encapsulated encrypted packets | |
CN101051891A (en) | Method and device for safety strategy uniformly treatment in safety gateway | |
Ozmen et al. | Dronecrypt-an efficient cryptographic framework for small aerial drones | |
KR20150013041A (en) | Network interface card with virtual switch and traffic flow policy enforcement | |
CN101834840A (en) | Efficient key derivation for end-to-end network security with traffic visibility | |
CN1747380A (en) | The block encryption data are decrypted | |
Kim et al. | A case for smartnic-accelerated private communication | |
Bays et al. | A heuristic-based algorithm for privacy-oriented virtual network embedding | |
CN102065021A (en) | IPSecVPN (Internet Protocol Security Virtual Private Network) realizing system and method based on NetFPGA (Net Field Programmable Gate Array) | |
US20050063543A1 (en) | Hardware acceleration for Diffie Hellman in a device that integrates wired and wireless L2 and L3 switching functionality | |
CN115174482B (en) | Message distribution method and device of network equipment | |
CN116260579A (en) | Message encryption and decryption method for IP packet | |
US10951520B2 (en) | SDN, method for forwarding packet by SDN, and apparatus | |
CN115314195A (en) | Method for realizing high-speed IPSec by using network card with password function | |
US10958620B1 (en) | Systems and methods for improving packet forwarding throughput for encapsulated tunnels | |
CN103227742A (en) | Method for IPSec (Internet protocol security) tunnel to rapidly process messages | |
CN106658490B (en) | A kind of wireless sensor network homomorphic cryptography method for secret protection | |
CN114039795B (en) | Software defined router and data forwarding method based on same |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20150527 Termination date: 20210724 |
|
CF01 | Termination of patent right due to non-payment of annual fee |