CN104320398B - A kind of Ethernet it is thief-proof enter dual link communication control system and method - Google Patents
A kind of Ethernet it is thief-proof enter dual link communication control system and method Download PDFInfo
- Publication number
- CN104320398B CN104320398B CN201410590221.9A CN201410590221A CN104320398B CN 104320398 B CN104320398 B CN 104320398B CN 201410590221 A CN201410590221 A CN 201410590221A CN 104320398 B CN104320398 B CN 104320398B
- Authority
- CN
- China
- Prior art keywords
- data
- link
- control
- tcp
- service ends
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000004891 communication Methods 0.000 title claims abstract description 45
- 230000009977 dual effect Effects 0.000 title claims abstract description 26
- 238000000034 method Methods 0.000 title claims abstract description 14
- 230000003993 interaction Effects 0.000 claims description 4
- 230000005540 biological transmission Effects 0.000 abstract description 8
- 241001269238 Data Species 0.000 description 1
- 241000700605 Viruses Species 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 230000033764 rhythmic process Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0478—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0464—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload using hop-by-hop encryption, i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/16—Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
- H04L69/163—In-band adaptation of TCP data exchange; In-band control procedures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Small-Scale Networks (AREA)
Abstract
The invention discloses a kind of Ethernet it is thief-proof enter dual link communication control system and method, it is characterised in that:Including request of data end, data control end and equipment end;Request of data end sends the encrypted operation of request data and arrives data control end;Data control end is parsed to request data and the equipment of specified equipment end is attached;The equipment of equipment end receives the connection request of data control end, sends connection result through data control end to request of data end;If successful connection, the request of data end data to be transmitted of transmission are encrypted operation and operation are encrypted again to request of data end by data control end through data control end to equipment end or equipment end transmission data;The present invention builds safety communication link using control link and the communication of data link dual link and DES and RSA double-encryptions means, it is ensured that physical equipment access and data transmission security, can effectively reduce stealing into risk for leakage of data and third party software.
Description
Technical field
The present invention relates to ethernet communication field, and in particular to a kind of Ethernet it is thief-proof enter dual link communication control system and
Method.
Background technology
In ethernet communication, to save Internet resources, some clients need not connect all field apparatus for a long time
Service end, only reconnects equipment to check information needed whenever necessary, while from security standpoint, to ensure equipment access peace
Entirely, client does not often allow direct access equipment, it is necessary to data interaction could be carried out by transferring equipment, so for equipment
Its interface object is directly reduced to towards transferring equipment for service end, without towards more numerous and diverse clients, so that
The pure of device port data is ensure that, virus attack risk so can be effectively reduced.
In tradition application, transferring equipment is received after the connection request of client, then asks to connect to device service end,
Client can be formed after successful connection to the one-to-one communication link of equipment end, the structure of this communication link is generally by simple
Data transparent transmission passage realize, i.e., realize that data client to the data at device service end are handed in the way of route
Mutually, but so single transmission channel will not carry out IP checkings and associated encryption measure for client access, often give
System brings physical equipment access and data transfer security risk.
To ensure that the physical equipment of system is accessed and data transmission security, it is thief-proof to propose a kind of Ethernet in the present invention
Enter dual link Communication Control implementation method, using control link and the communication of data link dual link and DES and RSA double-encryption hands
Section builds safety communication link, and this method can effectively reduce the stealing into risk of third party's hardware or software, be Ethernet peace
All-pass news provide effective means.
The content of the invention
To solve deficiency of the prior art, the present invention provide a kind of Ethernet it is thief-proof enter dual link communication control system and
Method, safety communication chain is built using control link and the communication of data link dual link and DES and RSA double-encryptions means
Road, the problem of physical equipment access and data transfer for solving system have security risk.
In order to realize above-mentioned target, the present invention is adopted the following technical scheme that:A kind of Ethernet it is thief-proof enter dual link communication control
System processed, it is characterised in that:Including request of data end, data control end and equipment end;The request of data end sends number of request
Data control end is arrived according to encrypted operation;The data control end is parsed to request data and to the specified equipment end
Equipment be attached;The equipment of the equipment end receives the connection request of the data control end, sends connection result through institute
Data control end is stated to the request of data end;If successful connection, the request of data end sends the data to be transmitted and added
Close operation sends data through the data control end to equipment end or the equipment end and added again by the data control end
The request of data end is arrived in close operation.
A kind of foregoing Ethernet it is thief-proof enter dual link communication control system, it is characterized in that:The request of data end, including
Control link TCP Client and data link TCP Client A;The data control end includes control link TCP service ends, control
Link data processing module processed, data link TCP service ends A, data link TCP Client B and data link data processing mould
Block;The equipment end includes the TCP service end B of various equipment, IP address and PORT COM description in being instructed by control operation
Respectively specify that equipment and device target port.
A kind of foregoing Ethernet it is thief-proof enter dual link communication control system, it is characterized in that:
The control link TCP Client is connected with control link TCP service ends and data link TCP Client A;Institute
State the IP address and PORT COM of connection equipment required for control link TCP Client informs control link TCP service ends, control
Link TCP service ends are by through controlling the data link TCP Client B of link data processing module return connection result to be sent back to
Link TCP Client is controlled, control link TCP Client sends commands to data link TCP further according to the connection result of return
Customer end A connection data link TCP service ends A;
The data link TCP Client A is connected with data link TCP service ends A and control link TCP Client;
Data link TCP Client A receives the order from control link TCP Client to judge whether that connection data link TCP takes
Be engaged in end A, and data interaction is carried out with data link TCP service ends A after successful connection.
A kind of foregoing Ethernet it is thief-proof enter dual link communication control system, it is characterized in that:
The control link TCP service ends are connected with control link TCP Client and control link data processing module;
Control link TCP service ends are responsible for receiving the control operation instruction that control link TCP Client is sent, and by control instruction data
Control link data processing module is sent to, and receives the operating result that control link data processing module is returned, control is sent back to
Link TCP Client processed;
The control link data processing module is connected with control link TCP service ends and data link TCP Client B
Connect;Control link data processing module will be transmitted to data link after the data command parsing of control link TCP service ends
TCP Client B is to instruct it to connect or disconnect the connection with equipment TCP service ends B, while data link TCP client will be come from
End B connection result is transmitted to control link TCP service ends;
The data link TCP service ends A is connected with data link TCP Client A and data link data processing module
Connect;Data link TCP service ends A receives the data from data link TCP Client A, and forwards the data to data link
Data processing module, or the data from data link data processing module are received, and forward the data to data link TCP visitors
Family end A;
The data link TCP Client B and data link data processing module, control link data processing module and set
Standby end equipment TCP service ends B is connected;Data link TCP Client B receives the control from control link data processing module
Instruction receives the connection result from TCP service ends B to connect equipment TCP service end B;Data link TCP Client B is in the future
Equipment TCP service end B are given from the data forwarding of data link data processing module, while also equipment TCP service ends B can will be come from
Data forwarding give data link data processing module;
The data link data processing module is connected with data link TCP service ends A and data link TCP Client B
Connect;Data of the data link data processing from data link TCP service ends A simultaneously forward the data to data link TCP client
B is held, while also data link TCP service ends A can will be transmitted to from data link TCP Client B data.
A kind of foregoing Ethernet it is thief-proof enter dual link communication control system, it is characterized in that:The control link TCP client
Hold with controlling the communication data of link TCP service ends to be encrypted using des encryption mode;Data link TCP Client A and Data-Link
Road TCP service ends A communication data is encrypted using rsa encryption mode.
It is a kind of based on any of the above-described described Ethernet it is thief-proof enter dual link communication control system control method, its feature
It is:Comprise the following steps:
1)Link TCP Client is controlled to send control connection request data to control link TCP service ends according to demand;Even
Connect request data it is encrypted after be sent to control link TCP service ends, control link data processing module receive control link
After the control connection request data of TCP service ends forwarding, data parse and order data link TCP Client B is initiated
TCP connections are carried out to specified equipment;Data link TCP Client B is by connection result by control link data processing module
Control link TCP Client is returned to control link TCP service ends;
2)If successful connection, control link TCP Client order data link TCP Client A is serviced to data link TCP
A is held to initiate connection, after successful connection, data link TCP Client A sends data, Data-Link to data link TCP service ends A
Road TCP service ends A, which is received, forwards the data to data link data processing module after encrypted data, data link data
Processing module forwards the data to data link TCP Client B again, and data link TCP Client B sends the data to correspondence and set
Standby TCP service ends B;The equipment TCP service ends B of equipment end also can send the data to data link by this link simultaneously
TCP Client A, is thus built into data link TCP Client A to equipment TCP service ends B both-way communication link.
A kind of foregoing Ethernet it is thief-proof enter dual link communicating control method, it is characterized in that:In the connection request data
IP address and the PORT COM description of the specific equipment of equipment end including required connection.
The beneficial effect that the present invention is reached:The encrypted operation of request data is sent by request of data end to control to data
End, data control end is parsed to request data and the equipment of specified equipment end is attached, and the equipment of equipment end connects
The connection request of data control end is received, connection result is sent through data control end to request of data end;If successful connection, data please
Ask end to send the data to be transmitted and be encrypted to operate and pass through data through data control end to equipment end or equipment end transmission data
Control end is encrypted operation and arrives request of data end again;It is double using control link and the communication of data link dual link and DES and RSA
Re-encryption means build safety communication link, it is ensured that physical equipment is accessed and data transmission security, can effectively be reduced
Leakage of data and third party software are stolen into risk.
Brief description of the drawings
Fig. 1 be Ethernet it is thief-proof enter dual link communication control system functional module structure figure.
Embodiment
The invention will be further described below in conjunction with the accompanying drawings.Following examples are only used for clearly illustrating the present invention
Technical scheme, and can not be limited the scope of the invention with this.
As shown in figure 1, a kind of Ethernet it is thief-proof enter dual link communication control system, including:
Request of data end:TCP communication data request initiating terminal through taking, to collecting device end TCP service end B datas;
Data control end:Control data link TCP service ends B communication rhythm and its data relay.Including control link
TCP service ends, data link TCP service ends A, data link TCP Client B, control link data processing module, data link
Data processing module;
Equipment end:The TCP service ends B of various equipment is provided.
Request of data end:Including control link TCP Client, data link TCP Client A;
Control link TCP Client:Control link TCP Client and control link TCP service ends and data link TCP visitors
Family end A is connected.Control link TCP Client informs the required IP address for connecting equipment of control link TCP service ends and logical
Port is interrogated, control link TCP service ends will control the data link TCP Client B of link data processing module return connection
As a result control link TCP Client is sent back to, whether order data link client end A connects number to control link TCP Client again
According to link sen end A, control link TCP Client is with controlling the communication data of link TCP service ends to add using des encryption mode
It is close.
Data link TCP Client A:Data link TCP Client A and data link TCP service ends A and control link
TCP Client is connected.Data link TCP Client A receives the order from control link TCP Client to judge whether to connect
Data link TCP service end A are met, data interaction, data link TCP visitors is carried out after successful connection with data link TCP service ends A
Family end A and data link TCP service ends A communication data are encrypted using rsa encryption mode.
Data control end:Including control link TCP service ends, control link data processing module, data link TCP services
Hold A, data link TCP Client B and data link data processing module.
Control link TCP service ends:Control link TCP service ends and control link TCP Client and control link data
Processing module is connected.Control link TCP service ends are responsible for receiving the control operation instruction of control link TCP Client, and will
Control instruction data are sent after being sent to control link data processing module, control link data processing module analysis instruction data
The corresponding command gives data link customer end B, and the operating result returned it into is sent back to control link TCP service ends.
Control link data processing module:Control link data processing module and control link TCP service ends and Data-Link
Road TCP Client B is connected.Link data processing module is controlled to parse the data command from control link TCP service ends
Be transmitted to data link TCP Client B afterwards with instruct its connect or disconnect with equipment TCP service ends B connection, while also can be by
Alarm signal from data link TCP Client B(Connection/disconnection such as with equipment TCP service ends B is alerted)It is transmitted to control
Link TCP service ends.
Data link TCP service ends A:Data link TCP service ends A and data link TCP Client A and data number of links
It is connected according to processing module.Data link TCP service ends A receives the data from data link TCP Client A, and by data
It is transmitted to data link data processing module.
Data link TCP Client B:Data link TCP Client B and data link data processing module, control link
Data processing module is connected with equipment end equipment TCP service ends B.Data link TCP Client B is received from control number of links
According to processing module control instruction to decide whether to connect equipment TCP service end B, and by from data link data processing module
Data forwarding gives equipment TCP service end B, while control link data also can be given by the data forwarding from equipment TCP service ends B
Processing module and data link data processing module.
Data link data processing module:Data link data processing module and data link TCP service ends A and Data-Link
Road TCP Client B is connected.Data of the data link data processing from data link TCP service ends A are simultaneously forwarded the data to
Data link TCP Client B, while giving data link TCP service ends by the data forwarding from data link TCP Client B
A。
Equipment end:The TCP service ends B of various equipment is provided.The TCP service ends B of equipment is a code name, practical application
Multiple different TCP serve ports can be set on demand, during specific connection request user can be instructed by control operation IP address and
PORT COM describes to respectively specify that equipment and device target port.
Ethernet it is thief-proof enter dual link communicating control method:
1)Link TCP Client is controlled to send control connection request data to control link TCP service ends according to demand;Even
Connect request data it is encrypted after be sent to control link TCP service ends, control link data processing module receive control link
After the control connection request data of TCP service ends forwarding, data parse and order data link TCP Client B is initiated
TCP connections are carried out to specified equipment;Data link TCP Client B is by connection result by control link data processing module
Control link TCP Client is returned to control link TCP service ends;
2)If successful connection, control link TCP Client order data link TCP Client A is serviced to data link TCP
A is held to initiate connection, after successful connection, data link TCP Client A sends data, Data-Link to data link TCP service ends A
Road TCP service ends A, which is received, forwards the data to data link data processing module after encrypted data, data link data
Processing module forwards the data to data link TCP Client B again, and data link TCP Client B sends the data to correspondence and set
Standby TCP service ends B;The equipment TCP service ends B of equipment end also can send the data to data link by this link simultaneously
TCP Client A, is thus built into data link TCP Client A to equipment TCP service ends B both-way communication link.
To ensure data communication safety, the communication between control link TCP Client and control link TCP service ends is adopted
Des encryption method is used, the communication between data link TCP Client A and data link TCP service ends A employs rsa encryption
Method, by the communication encryption to dual link, can be prevented effectively from leakage of data and third party software steal into.
Described above is only the preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art
For member, without departing from the technical principles of the invention, some improvement and deformation can also be made, these improve and deformed
Also it should be regarded as protection scope of the present invention.
Claims (5)
1. a kind of Ethernet it is thief-proof enter dual link communication control system, it is characterised in that:Including request of data end, data control end
And equipment end;The request of data end sends the encrypted operation of request data and arrives data control end;The data control end is to asking
Data are asked to be parsed and be attached to the equipment of the specified equipment end;The equipment of the equipment end receives the data
The connection request of control end, sends connection result through the data control end to the request of data end;It is described if successful connection
Request of data end sends the data to be transmitted and operation is encrypted through the data control end to equipment end or equipment end hair
Send data that operation is encrypted again by the data control end and arrive the request of data end;
The request of data end, including control link TCP Client and data link TCP Client A;The data control end bag
Include control link TCP service ends, control link data processing module, data link TCP service ends A, data link TCP Client
B and data link data processing module;The equipment end includes the TCP service end B of various equipment, in being instructed by control operation
IP address and PORT COM description respectively specify that equipment and device target port;
The control link TCP service ends are connected with control link TCP Client and control link data processing module;Control
Link TCP service ends are responsible for receiving the control operation instruction that control link TCP Client is sent, and control instruction data are sent
Control link data processing module is given, and receives the operating result that control link data processing module is returned, Quality Initiative is sent back to
Road TCP Client;
The control link data processing module is connected with control link TCP service ends and data link TCP Client B;Control
Link data processing module processed will be transmitted to data link TCP visitors after the data command parsing of control link TCP service ends
Family end B is to instruct it to connect or disconnect the connection with equipment TCP service ends B, while by from data link TCP Client B's
Connection result is transmitted to control link TCP service ends;
The data link TCP service ends A is connected with data link TCP Client A and data link data processing module;Number
The data from data link TCP Client A are received according to link TCP service ends A, and are forwarded the data at data link data
Module is managed, or receives the data from data link data processing module, and forwards the data to data link TCP Client A;
The data link TCP Client B and data link data processing module, control link data processing module and equipment end
Equipment TCP service ends B is connected;Data link TCP Client B receives the control instruction from control link data processing module
To connect equipment TCP service end B, the connection result from TCP service ends B is received;Data link TCP Client B will be from number
Equipment TCP service end B are given according to the data forwarding of link data processing module, while also can be by the number from equipment TCP service ends B
According to being transmitted to data link data processing module;
The data link data processing module is connected with data link TCP service ends A and data link TCP Client B;Number
The data from data link TCP service ends A are handled according to link data and data link TCP Client B is forwarded the data to, together
When also can will be transmitted to data link TCP service ends A from data link TCP Client B data.
2. a kind of Ethernet according to claim 1 it is thief-proof enter dual link communication control system, it is characterized in that:
The control link TCP Client is connected with control link TCP service ends and data link TCP Client A;The control
The IP address and PORT COM of connection equipment required for link TCP Client processed informs control link TCP service ends, control link
TCP service ends are by through controlling the data link TCP Client B of link data processing module return connection result to be sent back to control
Link TCP Client, control link TCP Client sends commands to data link TCP client further according to the connection result of return
Hold A connection data link TCP service ends A;
The data link TCP Client A is connected with data link TCP service ends A and control link TCP Client;Data
Link TCP Client A receives the order from control link TCP Client to judge whether to connect data link TCP service ends
A, data interaction is carried out after successful connection with data link TCP service ends A.
3. a kind of Ethernet according to claim 1 it is thief-proof enter dual link communication control system, it is characterized in that:The control
Link TCP Client is with controlling the communication data of link TCP service ends to be encrypted using des encryption mode;Data link TCP client
End A and data link TCP service ends A communication data are encrypted using rsa encryption mode.
4. a kind of Ethernet according to any of the above-described claim it is thief-proof enter dual link communication control system controlling party
Method, it is characterized in that:Comprise the following steps:
1)Link TCP Client is controlled to send control connection request data to control link TCP service ends according to demand;Connection please
Control link TCP service ends are sent to after asking data encrypted, control link data processing module receives control link TCP clothes
It is engaged in after the control connection request data of end forwarding, data parse and order data link TCP Client B is initiated to specifying
Equipment carry out TCP connections;Data link TCP Client B is by connection result by control link data processing module and control
Link TCP service ends return to control link TCP Client;
2)If successful connection, link TCP Client order data link TCP Client A is controlled to data link TCP service ends A
Connection is initiated, after successful connection, data link TCP Client A sends data, data link to data link TCP service ends A
TCP service ends A is received and data link data processing module is forwarded the data to after encrypted data, at data link data
Reason module forwards the data to data link TCP Client B again, and data link TCP Client B sends the data to corresponding device
TCP service ends B;The equipment TCP service ends B of equipment end can also send the data to data link TCP by this link simultaneously
Customer end A, is thus built into data link TCP Client A to equipment TCP service ends B both-way communication link.
5. a kind of Ethernet according to claim 4 it is thief-proof enter dual link communicating control method, it is characterized in that:The connection
The IP address of the specific equipment of the equipment end of connection required for request data includes and port description.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410590221.9A CN104320398B (en) | 2014-10-29 | 2014-10-29 | A kind of Ethernet it is thief-proof enter dual link communication control system and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410590221.9A CN104320398B (en) | 2014-10-29 | 2014-10-29 | A kind of Ethernet it is thief-proof enter dual link communication control system and method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104320398A CN104320398A (en) | 2015-01-28 |
CN104320398B true CN104320398B (en) | 2017-08-11 |
Family
ID=52375568
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410590221.9A Active CN104320398B (en) | 2014-10-29 | 2014-10-29 | A kind of Ethernet it is thief-proof enter dual link communication control system and method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104320398B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105589447A (en) * | 2016-01-25 | 2016-05-18 | 海天塑机集团有限公司 | EtherCAT master-slave station integrated control card and control system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101286995A (en) * | 2008-05-23 | 2008-10-15 | 北京锐安科技有限公司 | Long-range control method and system |
CN103051629A (en) * | 2012-12-24 | 2013-04-17 | 华为技术有限公司 | Software defined network-based data processing system, method and node |
CN103312807A (en) * | 2013-06-20 | 2013-09-18 | 华为技术有限公司 | Data transmission method, data transmission device and data transmission system |
WO2013143427A1 (en) * | 2012-03-30 | 2013-10-03 | Hangzhou H3C Technologies Co., Ltd. | Ftp data transmission in stack system |
-
2014
- 2014-10-29 CN CN201410590221.9A patent/CN104320398B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101286995A (en) * | 2008-05-23 | 2008-10-15 | 北京锐安科技有限公司 | Long-range control method and system |
WO2013143427A1 (en) * | 2012-03-30 | 2013-10-03 | Hangzhou H3C Technologies Co., Ltd. | Ftp data transmission in stack system |
CN103051629A (en) * | 2012-12-24 | 2013-04-17 | 华为技术有限公司 | Software defined network-based data processing system, method and node |
CN103312807A (en) * | 2013-06-20 | 2013-09-18 | 华为技术有限公司 | Data transmission method, data transmission device and data transmission system |
Also Published As
Publication number | Publication date |
---|---|
CN104320398A (en) | 2015-01-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106685992B (en) | Cross-network security switching and interactive application system and method based on unidirectional transmission technology | |
JP3676809B2 (en) | Network interfacing apparatus and method | |
CN104168257B (en) | The data isolation method and system of data isolation apparatus based on non-network mode | |
US7685292B1 (en) | Techniques for establishment and use of a point-to-point tunnel between source and target devices | |
CN102006307A (en) | Application proxy-based network management system isolation control device | |
KR20150009517A (en) | System and method for reducing a call establishment time | |
CN104753752B (en) | A kind of on-demand connection method suitable for VPN | |
CN101924771A (en) | Core-level TCP adhering junction method for accelerating application proxy | |
CN106230870B (en) | Proprietary protocol document transmission system and method | |
KR101705440B1 (en) | Hybrid cloud media architecture for media communications | |
CN105282258A (en) | Method and system for controlling remote desktop | |
CN108156149A (en) | Communication means and system based on Transmission Control Protocol | |
CN107528923B (en) | Data transmission method of network adapter and network adapter | |
CN105337973A (en) | Message exchange method and system | |
CN105808364B (en) | Merge the dual system communication means and system of PC system and Android system | |
WO2018050116A1 (en) | Port multiplexing method and server in video conference system and computer storage medium | |
CN104580346B (en) | Data transmission method and device | |
CN107529229A (en) | The method of data transfer, apparatus and system | |
CN104320398B (en) | A kind of Ethernet it is thief-proof enter dual link communication control system and method | |
CN106936796B (en) | A kind of server load balancing method and apparatus based on SNI | |
CN109936566A (en) | A kind of data transmission method system, device and computer readable storage medium | |
CN104184729B (en) | A kind of message processing method and device | |
US6614803B1 (en) | Mechanism for conducting in-band communications between terminal adapter and digital terminal device during internet session | |
CN105978780A (en) | Port switching method and device | |
CN108092993A (en) | A kind of network data transmission control method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |