CN106411656B - A kind of packet sequence recognition methods and equipment - Google Patents
A kind of packet sequence recognition methods and equipment Download PDFInfo
- Publication number
- CN106411656B CN106411656B CN201610976303.6A CN201610976303A CN106411656B CN 106411656 B CN106411656 B CN 106411656B CN 201610976303 A CN201610976303 A CN 201610976303A CN 106411656 B CN106411656 B CN 106411656B
- Authority
- CN
- China
- Prior art keywords
- extension
- cryptographic hash
- data packet
- hash
- sequence
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
- H04L43/0823—Errors, e.g. transmission errors
- H04L43/0847—Transmission error
Landscapes
- Engineering & Computer Science (AREA)
- Environmental & Geological Engineering (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The present invention provides a kind of packet sequence recognition methods, comprising: combines extension cryptographic Hash and transmission number to emit to receiving end for the first of the data packet of transmission;Data packet calculates second and combines extension cryptographic Hash and receive number based on the received;And when the first combination extension cryptographic Hash extends cryptographic Hash equal to the second combination, and transmission number is equal to reception number, the sequence of data packet is errorless.The application greatly improves the efficiency of measurement, while need not make any change to data packet, greatly improves the use scope of this method, reduces the influence to network data flow, this method is applied in the network of high-speed large-scale data packet.
Description
Technical field
The present invention relates to fields of communication technology, more particularly, to packet sequence recognition methods and equipment.
Background technique
Packet sequence is in an important attribute and network design, analysis, research and practical application for data packet
One important parameter.The ordinal relation of data packet has reacted abnormal conditions that may be present in network to the performance of real system,
Therefore in real network, for example in internet and data center network, packet sequence has been directly related to the property of network
Energy and service quality.In traditional method, it is to send data sequence from sender that packet sequence, which restores simplest method,
Number arrive recipient.More specifically, an additional sequence number restores data by sequence number when each data packet is sent
Sequence and identification are out-of-order.Such measurement method requires to be modified addition sequence number to each data packet, to bring
Very big overhead can not be suitable for the network of large-scale data packet, while measurement method can not logarithm in many cases,
It is changed according to packet, therefore sequence number can not be added in the packet, also result in the failure of Packet Delay measurement method.
Summary of the invention
The present invention provides a kind of packet sequence identification for overcoming the above problem or at least being partially solved the above problem
Method and apparatus.
According to an aspect of the present invention, a kind of packet sequence recognition methods is provided, comprising:
S1, transmission data packet first combine extension cryptographic Hash and send number to receiving end;
S2, based on the received data packet calculate second and combine extension cryptographic Hash and receive number;And
S3, according to it is described first combine extension cryptographic Hash and second combine extension cryptographic Hash relationship and send number and
The relationship for receiving number, judges whether the sequence of data packet is wrong.
According to another aspect of the present invention, a kind of transmitting terminal is provided, the transmitting terminal is by the first of the data packet of transmission
Emit in conjunction with extension cryptographic Hash and transmission number to receiving end.
Another method according to the present invention provides a kind of receiving end, and the receiving end is for data packet based on the received
Second is calculated to combine extension cryptographic Hash and receive number;And
When the first combination extension cryptographic Hash combines extension cryptographic Hash equal to second, and transmission number is equal to reception number,
Then assert that the sequence of data packet is errorless.
Out-of-order identification and order recovery method and apparatus present applicant proposes a kind of cryptographic Hash based on data packet, greatly
The efficiency for improving measurement, while method of the invention need not make any change to data packet, greatly improve this method
Use orientation, reduce the influence to network data flow, the out-of-order identification of data packet and order recovery applied
In the network of high-speed large-scale data packet.
Detailed description of the invention
Fig. 1 is the flow diagram according to the embodiment of the present invention;
Fig. 2 is to determine flow diagram according to the packet sequence of the embodiment of the present invention.
Specific embodiment
With reference to the accompanying drawings and examples, specific embodiments of the present invention will be described in further detail.Implement below
Example is not intended to limit the scope of the invention for illustrating the present invention.
Fig. 1 gives a kind of general illustration of packet sequence recognition methods according to an embodiment of the present invention.Total comes
It says, method includes the following steps:
The data packet of transmission is grouped by transmitting terminal based on hash function, and first of the data packet in each group is combined and is extended
Cryptographic Hash OiAnd it sends number w and emits to receiving end;
Data packet calculates the second combination extension cryptographic Hash O ' based on the received for receiving endiWith reception number w ';And
As the first combination extension cryptographic Hash OiExtension cryptographic Hash O ' is combined equal to secondi, and send number w be equal to connect
When receiving number w ', then the sequence of data packet is errorless;Or cryptographic Hash is extended when the first combination extension cryptographic Hash is not equal to second,
And when sending number greater than number is received, the sequence of received data packet is obtained in conjunction with cryptographic Hash according to first.
Out-of-order identification and order recovery method and apparatus present applicant proposes a kind of cryptographic Hash based on data packet, greatly
The efficiency for improving measurement, while method of the invention need not make any change to data packet, greatly improve this method
Use orientation, reduce the influence to network data flow, the out-of-order identification of data packet and order recovery applied
In the network of high-speed large-scale data packet.
In a specific embodiment, the one piece of data packet of transmission is divided into group according to specific hash function by transmitting terminal,
All data packets are mapped to the integer of [1, g] range by the hash function.Therefore the data packet in this section is divided into g group, also
It is G1,G2,…,Gg.Every group contains ω data packet.According to transmission sequence, to the serial number of the packet marking ascending order in one group.
Therefore, G is usedi=(Si1, Si2..., Siω) expression group GiIn data packet, wherein sijIt is a group GiIn j-th packet.
In a specific embodiment, it since cryptographic Hash does not include any order information, uses and compiles order information
Code is into cryptographic Hash, i.e., this method identifies each data packet using extension cryptographic Hash: to a group Gi, transmitting terminal calculating jth
A data packet sijExtension cryptographic Hash, that is, hij=Hash (sij) * j, wherein hijFor a group GiIn j-th of data packet extension
Cryptographic Hash uses HiIndicate extension Hash vector, Hi=(hi1, hi2..., hiω)T。
For one group of data packet Gi, transmitting terminal calculates the extension cryptographic Hash of all data packets of the group.In receiving end, if number
It is identical in transmitting terminal according to the sequence of packet, then extension cryptographic Hash also should be identical, therefore receiving end can by from
Transmitting terminal transmits cryptographic Hash and carrys out checks sequence information to receiving end.
Because each packet is owned by an extension cryptographic Hash and will lead to high expense.Meanwhile this method cannot be applied and lost
In the case of packet.Compared to the data packet number in each group, loses and out-of-order data packet is considerably less.The data packet received is suitable
Sequence should be much like with the sequence sent.In a specific embodiment, this method does not send the extension of all data packets
Cryptographic Hash.Out-of-order information is only sent to receiving end by we.In order to realize the purpose, in transmitting terminal transmission group all packets expansion
Open up the linear combination of cryptographic Hash.
Specifically, transmitting terminal calculating group GiIn ω data packet k linear combination Oi=(oi1, oi2..., oik
)T.Wherein the coefficient of k linear combination is independent mutually, can choose each independent coefficient matrix M=of row
(axy)1≤x≤k, 1≤y≤ω, αxyIndicate independent coefficient mutually, then Oi=MHi.Group GiVector Oi=(oi1, oi2..., oik)T
Extension cryptographic Hash is combined for first.
It should be noted that OiThere are k value, HiThere is ω value.To a group Gi, transmitting terminal calculates first knot of this group of data packet
Close extension Hash Oi, then send one group of data (Oi, ω) and arrive receiving end.This data group is called sequence typical value by we
EXH, sequence typical value have k value.To every segment data packet, transmitting terminal can calculate all groups of sequence typical value in order.
In a specific embodiment, receiving end is with hash function identical with transmitting terminal received one piece of data packet point
It is cut into group.It is assumed that the group received is G '1, G '2..., G 'g, to received group of G 'i, group is expressed as G ' by wei=(ri1,
ri2..., riω′)。
In a specific embodiment, receiving end is j-th of data packet r in i-th group receivedijExtension breathe out
Uncommon value is expressed as h 'ij=Hash (rij) * j, j one specific hash function of expression, this hash function and Kazakhstan used in receiving end
Uncommon function is consistent.Use HiIndicate extension Hash vector, H 'i=(h 'i1, h 'i2..., h 'iω′)T.To a group Gi。
In a specific embodiment, the corresponding sequence typical value for calculating each group of data received in receiving end.Receiving end
It calculates, if ω '=ω and Oi=O 'i, then G 'iIn data packet should be with the G of transmitting terminaliIn data packet it is identical.Q′i=
MH′i, the sequence consensus for the data packet that the sequence for the data packet that thus receiving end judgement receives is issued with transmitting terminal.
In a specific embodiment, if Qi≠Q′iOr ω ' ≠ ω, then two groups of data packets are not just identical.This meaning
Taste from a group GiTo G 'iMay there are the loss or random ordering of data packet.
In a specific embodiment, if ω ' < ω, show there is data-bag lost in this group of data packet.
Fig. 2 gives packet sequence and determines flow diagram.C=ω-ω ' is calculated at this time, illustrates the group received
In have c data-bag lost, due to data-bag lost, the extension cryptographic Hash of this c data packet is unknown, it is assumed that extension cryptographic Hash be
x1, x2..., xc.A data of the w ' received at this time are likely to be at any a possible position w ' in w data, according to reality
Network condition traverses all possible situation of a data of w '.
Each possible situation of data a for w ' calculates the extension cryptographic Hash of a data packet of residue ω ', obtains one
About x1, x2..., xcEquation, i.e.,
For each row coefficient in Metzler matrix, a corresponding equation can be obtained, and can be made of c equation
One equation group, this c equation group solve x1, x2..., xcValue.
It arbitrarily chooses coefficient different in two groups of M and constitutes equation group, obtain two groups of x1, x2..., xcSolution, if two groups
Solve it is identical, then represent this group solution x1, x2..., xcCorresponding c position is the position that data packet is really lost, and corresponding w ' is a
The position of data packet is the home position of data packet, to obtain position and the sequence of all data packets.
In a specific embodiment, the present invention also provides a kind of transmitting terminal, the transmitting terminal is by the data packet of transmission
First combines extension cryptographic Hash and transmission number to emit to receiving end.
In a specific embodiment, the transmitting terminal includes:
First cryptographic Hash module records the transmission number of data packet and arranges the data packet of transmission by ascending order, based on Kazakhstan
Uncommon function obtains the extension cryptographic Hash of each data packet;
First Hash vector module is connect with the first cryptographic Hash module, the expansion based on the first cryptographic Hash module
Exhibition cryptographic Hash is expanded Hash vector;
First combine hash module, connect with the first Hash vector module, based on the extension Hash vector be
Matrix number M=(axy)1≤x≤k, 1≤y≤ωProduct obtain first and combine extension cryptographic Hash, each row of the matrix is independent;And
Sending module is combined hash module to connect with the first cryptographic Hash module and described first, is based on described first
In conjunction with extension cryptographic Hash and number acquisition sequence typical value is sent, and is sent to receiving end.
In a specific embodiment, the present invention also provides a kind of receiving ends, and the receiving end for counting based on the received
The second combination extension cryptographic Hash is calculated according to packet and receives number;And
When the first combination extension cryptographic Hash combines extension cryptographic Hash equal to second, and transmission number is equal to reception number,
Then assert that the sequence of data packet is errorless.
In a specific embodiment, the receiving end is also used to combine extension cryptographic Hash not equal to second when described first
When extending cryptographic Hash, and sending number greater than number is received, the sequence of received data packet is obtained in conjunction with cryptographic Hash according to first.
In a specific embodiment, the receiving end includes:
Second cryptographic Hash module records the reception number of data packet and obtains received each data packet based on hash function
Extension cryptographic Hash;
Second Hash vector module is connect with the second cryptographic Hash module, is obtained based on the second cryptographic Hash module
All extension cryptographic Hash obtain the second extension Hash vector;
Second combines hash module, connect with the second Hash vector module, based on the second extension Hash vector
Second, which is obtained, with the product of the matrix is combined extension cryptographic Hash;And
Judgment module judges the sequence of data packet:
Cryptographic Hash is extended when the first combination extension cryptographic Hash is combined equal to second, and transmission number is equal to reception number
When, then assert that the sequence of data packet is errorless;Or
Cryptographic Hash is extended not equal to second when first combination extends cryptographic Hash, and sends number greater than reception number
When, the sequence of received data packet is obtained in conjunction with cryptographic Hash according to first.
In a specific embodiment, the judgment module obtains the suitable of received data packet in conjunction with cryptographic Hash according to first
Sequence includes:
The sequence of the data packet sent is traversed, the coefficient of every a line based on the matrix obtains lost data packets and the
One combines the equation group of extension cryptographic Hash;And
The equation that different coefficients are constituted in the equation group is arbitrarily chosen, the solution of two groups of lost data packets is obtained, if two groups
Solve identical, then it is the position really lost of data packet that the group, which solves corresponding position, and the position of received data packet is data packet
Home position.
Finally, the present processes are only preferable embodiment, it is not intended to limit the scope of the present invention.It is all
Within the spirit and principles in the present invention, any modification, equivalent replacement, improvement and so on should be included in protection of the invention
Within the scope of.
Claims (9)
1. a kind of packet sequence recognition methods characterized by comprising
S1, transmitting terminal combine the first of data packet extension cryptographic Hash and send number is sent to receiving end;
Data packet calculates the second combination extension cryptographic Hash and receives number based on the received for S2, receiving end;And
S3, receiving end combine extension cryptographic Hash and second to combine the relationship and transmission number of extension cryptographic Hash according to described first
Relationship with number is received, judges whether the sequence of data packet is wrong;
Wherein, step S1 includes:
S11, the transmission number for recording data packet are simultaneously arranged the data packet of transmission by ascending order, obtain every number based on hash function
According to the extension cryptographic Hash of packet;
S12, the extension cryptographic Hash based on all data packets are expanded Hash vector;
S13, obtain first based on the extension Hash vector and the product of a matrix and combined extension cryptographic Hash, the matrix it is each
Row is independent;And
S14, extension cryptographic Hash is combined based on described first and sends number acquisition sequence typical value, and be sent to receiving end.
2. packet sequence recognition methods as described in claim 1, which is characterized in that the S3 further include:
When the first combination extension cryptographic Hash combines extension cryptographic Hash equal to second, and transmission number is equal to reception number,
The sequence of data packet is errorless;Or
When the first combination extension cryptographic Hash is not equal to the second extension cryptographic Hash, and sends number greater than number is received, root
The sequence of received data packet is obtained in conjunction with cryptographic Hash according to first.
3. packet sequence recognition methods as described in claim 1, which is characterized in that the S2 includes:
S21, the extension Hash for recording the reception number of data packet and obtaining received each data packet based on the hash function
Value;
S22, the second extension Hash vector is obtained based on the step S21 all extension cryptographic Hash obtained;And
S23, it obtains second based on the second extension Hash vector and the product of the matrix and is combined to extend cryptographic Hash.
4. packet sequence recognition methods as claimed in claim 2, which is characterized in that described to be obtained according to first in conjunction with cryptographic Hash
The sequence of received data packet includes:
The sequence of the data packet sent is traversed, the coefficient of every a line based on the matrix obtains lost data packets and the first knot
Close the equation group of extension cryptographic Hash;And
The equation that different coefficients are constituted in the equation group is arbitrarily chosen, the solution of two groups of lost data packets is obtained, if two groups of solution phases
Together, then it is the position that data packet is really lost that the group, which solves corresponding position, and the position of received data packet is the original of data packet
Position.
5. a kind of transmitting terminal, which is characterized in that the transmitting terminal by the first of the data packet of transmission combine extension cryptographic Hash and
It sends number to emit to receiving end, specifically, the transmitting terminal includes:
First cryptographic Hash module records the transmission number of data packet and arranges the data packet of transmission by ascending order, is based on Hash letter
Number obtains the extension cryptographic Hash of each data packet;
First Hash vector module is connect with the first cryptographic Hash module, and the extension based on the first cryptographic Hash module is breathed out
Uncommon value is expanded Hash vector;
First combines hash module, connect with the first Hash vector module, based on the extension Hash vector and a matrix
Product obtain first and combine extension cryptographic Hash, each row of the matrix is independent;And
Sending module is combined hash module to connect with the first cryptographic Hash module and described first, is combined based on described first
It extends cryptographic Hash and sends number acquisition sequence typical value, and be sent to receiving end.
6. a kind of receiving end, which is characterized in that the receiving end calculates second for data packet based on the received and extension is combined to breathe out
Uncommon value and reception number;And
When the first combination extension cryptographic Hash combines extension cryptographic Hash equal to second, and transmission number is equal to reception number, then recognize
The sequence for determining data packet is errorless;
Wherein, the receiving end includes at least: the second cryptographic Hash module, records the reception number of data packet and based on hash function
Obtain the extension cryptographic Hash of received each data packet;
Second Hash vector module is connect with the second cryptographic Hash module, the institute obtained based on the second cryptographic Hash module
There is extension cryptographic Hash to obtain the second extension Hash vector;
Second combines hash module, connect with the second Hash vector module, based on the second extension Hash vector and square
The product of battle array obtains second and combines extension cryptographic Hash;
Wherein, described first the acquisition methods for extending cryptographic Hash are combined are as follows:
It arranges by the transmission number of transmitting terminal record data packet, and by the data packet of transmission by ascending order, is obtained based on hash function
The extension cryptographic Hash of each data packet;Extension cryptographic Hash based on all data packets is expanded Hash vector;Based on the expansion
Exhibition Hash vector obtains first with the product of a matrix and is combined extension cryptographic Hash, and each row of the matrix is independent;And based on institute
It states first to combine extension cryptographic Hash and send number acquisition sequence typical value, and is sent to receiving end.
7. receiving end as claimed in claim 6, which is characterized in that the receiving end is also used to combine extension to breathe out when described first
When wishing value not equal to the second extension cryptographic Hash, and sending number greater than number is received, received according to first in conjunction with cryptographic Hash
Data packet sequence.
8. receiving end as claimed in claim 7, which is characterized in that the receiving end further include:
Judgment module judges the sequence of data packet:
When the first combination extension cryptographic Hash combines extension cryptographic Hash equal to second, and transmission number is equal to reception number,
Then assert that the sequence of data packet is errorless;Or
When the first combination extension cryptographic Hash is not equal to the second extension cryptographic Hash, and sends number greater than number is received, root
The sequence of received data packet is obtained in conjunction with cryptographic Hash according to first.
9. receiving end as claimed in claim 8, which is characterized in that the judgment module is connect according to first in conjunction with cryptographic Hash
The sequence of the data packet of receipts includes:
The sequence of the data packet sent is traversed, the coefficient of every a line based on the matrix obtains lost data packets and the first knot
Close the equation group of extension cryptographic Hash;And
The equation that different coefficients are constituted in the equation group is arbitrarily chosen, the solution of two groups of lost data packets is obtained, if two groups of solution phases
Together, then it is the position that data packet is really lost that the group, which solves corresponding position, and the position of received data packet is the original of data packet
Position.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610976303.6A CN106411656B (en) | 2016-11-07 | 2016-11-07 | A kind of packet sequence recognition methods and equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610976303.6A CN106411656B (en) | 2016-11-07 | 2016-11-07 | A kind of packet sequence recognition methods and equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106411656A CN106411656A (en) | 2017-02-15 |
CN106411656B true CN106411656B (en) | 2019-09-20 |
Family
ID=58015506
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610976303.6A Active CN106411656B (en) | 2016-11-07 | 2016-11-07 | A kind of packet sequence recognition methods and equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106411656B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112243160A (en) * | 2020-09-14 | 2021-01-19 | 视联动力信息技术股份有限公司 | Data transmission method, device, terminal equipment and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102084360A (en) * | 2008-04-06 | 2011-06-01 | 弗森-艾奥公司 | Apparatus, system, and method for validating that a correct data segment is read from a data storage device |
CN102307076A (en) * | 2010-09-16 | 2012-01-04 | 清华大学 | Redundancy-free anti-interference coding method |
CN102915325A (en) * | 2012-08-11 | 2013-02-06 | 深圳市极限网络科技有限公司 | Md5 Hash list-based file decomposing and combining technique |
CN103988189A (en) * | 2011-12-08 | 2014-08-13 | 国际商业机器公司 | Method for detecting data loss of data transfer between information devices |
US9325586B1 (en) * | 2014-03-26 | 2016-04-26 | Marvell Israel (M.I.S.L.) Ltd. | Packet duplication measurement in a network device |
-
2016
- 2016-11-07 CN CN201610976303.6A patent/CN106411656B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102084360A (en) * | 2008-04-06 | 2011-06-01 | 弗森-艾奥公司 | Apparatus, system, and method for validating that a correct data segment is read from a data storage device |
CN102307076A (en) * | 2010-09-16 | 2012-01-04 | 清华大学 | Redundancy-free anti-interference coding method |
CN103988189A (en) * | 2011-12-08 | 2014-08-13 | 国际商业机器公司 | Method for detecting data loss of data transfer between information devices |
CN102915325A (en) * | 2012-08-11 | 2013-02-06 | 深圳市极限网络科技有限公司 | Md5 Hash list-based file decomposing and combining technique |
US9325586B1 (en) * | 2014-03-26 | 2016-04-26 | Marvell Israel (M.I.S.L.) Ltd. | Packet duplication measurement in a network device |
Also Published As
Publication number | Publication date |
---|---|
CN106411656A (en) | 2017-02-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3304853B1 (en) | Detection of malware and malicious applications | |
CN107819828A (en) | Data transmission method, device, computer equipment and storage medium | |
WO2008119672A4 (en) | Method and system for resilient packet traceback in wireless mesh and sensor networks | |
CN105429968B (en) | Network forensics load affiliation method based on Bloom filter and system | |
US9276853B2 (en) | Hashing of network packet flows for efficient searching | |
EP1769993A3 (en) | Vehicle control system | |
CN105847034A (en) | Source verification and path authentication method and device | |
CN109766389A (en) | A kind of light client revene lookup method of block chain based on bitmap index | |
CN107070895A (en) | A kind of data flow source tracing method based on SDN | |
CN114050994B (en) | Network telemetry method based on SRv6 | |
CN106452972B (en) | Method and device for obtaining delay time of data packet | |
CN106411656B (en) | A kind of packet sequence recognition methods and equipment | |
CN107547346A (en) | A kind of message transmitting method and device | |
CN109818824A (en) | A kind of message transmitted test method, equipment and storage equipment, program product | |
CN108206795A (en) | Blind authentication method and system based on the frequency selective fading channels that confidence is transmitted | |
US20180288072A1 (en) | Fragmented malware hash lookup in cloud repository | |
CN107896141A (en) | A kind of FC AE ASM network data redundancy approach | |
CN107426166A (en) | A kind of acquisition methods of information, device and electronic equipment | |
SE0602336L (en) | Procedure, device and system for multi-field classification in a data communication network | |
JP5348138B2 (en) | Packet loss frequency measurement system, packet loss frequency measurement method and program | |
CN111628959B (en) | Large-scale unmanned aerial vehicle group security authentication mechanism based on random label | |
CN115225550B (en) | On-demand whole network telemetry device based on clustering path planning algorithm | |
CN108390764B (en) | Broadcast content repacking method and system for broadcast storage network | |
CN106302006A (en) | A kind of dynamic source tracing method of IP spoofing packet based on SDN | |
CN105376099B (en) | Acquire the method and system of virtual network flow in data switching exchane |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |