CN106411656B - A kind of packet sequence recognition methods and equipment - Google Patents

A kind of packet sequence recognition methods and equipment Download PDF

Info

Publication number
CN106411656B
CN106411656B CN201610976303.6A CN201610976303A CN106411656B CN 106411656 B CN106411656 B CN 106411656B CN 201610976303 A CN201610976303 A CN 201610976303A CN 106411656 B CN106411656 B CN 106411656B
Authority
CN
China
Prior art keywords
extension
cryptographic hash
data packet
hash
sequence
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610976303.6A
Other languages
Chinese (zh)
Other versions
CN106411656A (en
Inventor
王继良
曹志超
刘云浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tsinghua University
Original Assignee
Tsinghua University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tsinghua University filed Critical Tsinghua University
Priority to CN201610976303.6A priority Critical patent/CN106411656B/en
Publication of CN106411656A publication Critical patent/CN106411656A/en
Application granted granted Critical
Publication of CN106411656B publication Critical patent/CN106411656B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0823Errors, e.g. transmission errors
    • H04L43/0847Transmission error

Landscapes

  • Engineering & Computer Science (AREA)
  • Environmental & Geological Engineering (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The present invention provides a kind of packet sequence recognition methods, comprising: combines extension cryptographic Hash and transmission number to emit to receiving end for the first of the data packet of transmission;Data packet calculates second and combines extension cryptographic Hash and receive number based on the received;And when the first combination extension cryptographic Hash extends cryptographic Hash equal to the second combination, and transmission number is equal to reception number, the sequence of data packet is errorless.The application greatly improves the efficiency of measurement, while need not make any change to data packet, greatly improves the use scope of this method, reduces the influence to network data flow, this method is applied in the network of high-speed large-scale data packet.

Description

A kind of packet sequence recognition methods and equipment
Technical field
The present invention relates to fields of communication technology, more particularly, to packet sequence recognition methods and equipment.
Background technique
Packet sequence is in an important attribute and network design, analysis, research and practical application for data packet One important parameter.The ordinal relation of data packet has reacted abnormal conditions that may be present in network to the performance of real system, Therefore in real network, for example in internet and data center network, packet sequence has been directly related to the property of network Energy and service quality.In traditional method, it is to send data sequence from sender that packet sequence, which restores simplest method, Number arrive recipient.More specifically, an additional sequence number restores data by sequence number when each data packet is sent Sequence and identification are out-of-order.Such measurement method requires to be modified addition sequence number to each data packet, to bring Very big overhead can not be suitable for the network of large-scale data packet, while measurement method can not logarithm in many cases, It is changed according to packet, therefore sequence number can not be added in the packet, also result in the failure of Packet Delay measurement method.
Summary of the invention
The present invention provides a kind of packet sequence identification for overcoming the above problem or at least being partially solved the above problem Method and apparatus.
According to an aspect of the present invention, a kind of packet sequence recognition methods is provided, comprising:
S1, transmission data packet first combine extension cryptographic Hash and send number to receiving end;
S2, based on the received data packet calculate second and combine extension cryptographic Hash and receive number;And
S3, according to it is described first combine extension cryptographic Hash and second combine extension cryptographic Hash relationship and send number and The relationship for receiving number, judges whether the sequence of data packet is wrong.
According to another aspect of the present invention, a kind of transmitting terminal is provided, the transmitting terminal is by the first of the data packet of transmission Emit in conjunction with extension cryptographic Hash and transmission number to receiving end.
Another method according to the present invention provides a kind of receiving end, and the receiving end is for data packet based on the received Second is calculated to combine extension cryptographic Hash and receive number;And
When the first combination extension cryptographic Hash combines extension cryptographic Hash equal to second, and transmission number is equal to reception number, Then assert that the sequence of data packet is errorless.
Out-of-order identification and order recovery method and apparatus present applicant proposes a kind of cryptographic Hash based on data packet, greatly The efficiency for improving measurement, while method of the invention need not make any change to data packet, greatly improve this method Use orientation, reduce the influence to network data flow, the out-of-order identification of data packet and order recovery applied In the network of high-speed large-scale data packet.
Detailed description of the invention
Fig. 1 is the flow diagram according to the embodiment of the present invention;
Fig. 2 is to determine flow diagram according to the packet sequence of the embodiment of the present invention.
Specific embodiment
With reference to the accompanying drawings and examples, specific embodiments of the present invention will be described in further detail.Implement below Example is not intended to limit the scope of the invention for illustrating the present invention.
Fig. 1 gives a kind of general illustration of packet sequence recognition methods according to an embodiment of the present invention.Total comes It says, method includes the following steps:
The data packet of transmission is grouped by transmitting terminal based on hash function, and first of the data packet in each group is combined and is extended Cryptographic Hash OiAnd it sends number w and emits to receiving end;
Data packet calculates the second combination extension cryptographic Hash O ' based on the received for receiving endiWith reception number w ';And
As the first combination extension cryptographic Hash OiExtension cryptographic Hash O ' is combined equal to secondi, and send number w be equal to connect When receiving number w ', then the sequence of data packet is errorless;Or cryptographic Hash is extended when the first combination extension cryptographic Hash is not equal to second, And when sending number greater than number is received, the sequence of received data packet is obtained in conjunction with cryptographic Hash according to first.
Out-of-order identification and order recovery method and apparatus present applicant proposes a kind of cryptographic Hash based on data packet, greatly The efficiency for improving measurement, while method of the invention need not make any change to data packet, greatly improve this method Use orientation, reduce the influence to network data flow, the out-of-order identification of data packet and order recovery applied In the network of high-speed large-scale data packet.
In a specific embodiment, the one piece of data packet of transmission is divided into group according to specific hash function by transmitting terminal, All data packets are mapped to the integer of [1, g] range by the hash function.Therefore the data packet in this section is divided into g group, also It is G1,G2,…,Gg.Every group contains ω data packet.According to transmission sequence, to the serial number of the packet marking ascending order in one group. Therefore, G is usedi=(Si1, Si2..., S) expression group GiIn data packet, wherein sijIt is a group GiIn j-th packet.
In a specific embodiment, it since cryptographic Hash does not include any order information, uses and compiles order information Code is into cryptographic Hash, i.e., this method identifies each data packet using extension cryptographic Hash: to a group Gi, transmitting terminal calculating jth A data packet sijExtension cryptographic Hash, that is, hij=Hash (sij) * j, wherein hijFor a group GiIn j-th of data packet extension Cryptographic Hash uses HiIndicate extension Hash vector, Hi=(hi1, hi2..., h)T
For one group of data packet Gi, transmitting terminal calculates the extension cryptographic Hash of all data packets of the group.In receiving end, if number It is identical in transmitting terminal according to the sequence of packet, then extension cryptographic Hash also should be identical, therefore receiving end can by from Transmitting terminal transmits cryptographic Hash and carrys out checks sequence information to receiving end.
Because each packet is owned by an extension cryptographic Hash and will lead to high expense.Meanwhile this method cannot be applied and lost In the case of packet.Compared to the data packet number in each group, loses and out-of-order data packet is considerably less.The data packet received is suitable Sequence should be much like with the sequence sent.In a specific embodiment, this method does not send the extension of all data packets Cryptographic Hash.Out-of-order information is only sent to receiving end by we.In order to realize the purpose, in transmitting terminal transmission group all packets expansion Open up the linear combination of cryptographic Hash.
Specifically, transmitting terminal calculating group GiIn ω data packet k linear combination Oi=(oi1, oi2..., oik )T.Wherein the coefficient of k linear combination is independent mutually, can choose each independent coefficient matrix M=of row (axy)1≤x≤k, 1≤y≤ω, αxyIndicate independent coefficient mutually, then Oi=MHi.Group GiVector Oi=(oi1, oi2..., oik)T Extension cryptographic Hash is combined for first.
It should be noted that OiThere are k value, HiThere is ω value.To a group Gi, transmitting terminal calculates first knot of this group of data packet Close extension Hash Oi, then send one group of data (Oi, ω) and arrive receiving end.This data group is called sequence typical value by we EXH, sequence typical value have k value.To every segment data packet, transmitting terminal can calculate all groups of sequence typical value in order.
In a specific embodiment, receiving end is with hash function identical with transmitting terminal received one piece of data packet point It is cut into group.It is assumed that the group received is G '1, G '2..., G 'g, to received group of G 'i, group is expressed as G ' by wei=(ri1, ri2..., r′)。
In a specific embodiment, receiving end is j-th of data packet r in i-th group receivedijExtension breathe out Uncommon value is expressed as h 'ij=Hash (rij) * j, j one specific hash function of expression, this hash function and Kazakhstan used in receiving end Uncommon function is consistent.Use HiIndicate extension Hash vector, H 'i=(h 'i1, h 'i2..., h 'iω′)T.To a group Gi
In a specific embodiment, the corresponding sequence typical value for calculating each group of data received in receiving end.Receiving end It calculates, if ω '=ω and Oi=O 'i, then G 'iIn data packet should be with the G of transmitting terminaliIn data packet it is identical.Q′i= MH′i, the sequence consensus for the data packet that the sequence for the data packet that thus receiving end judgement receives is issued with transmitting terminal.
In a specific embodiment, if Qi≠Q′iOr ω ' ≠ ω, then two groups of data packets are not just identical.This meaning Taste from a group GiTo G 'iMay there are the loss or random ordering of data packet.
In a specific embodiment, if ω ' < ω, show there is data-bag lost in this group of data packet.
Fig. 2 gives packet sequence and determines flow diagram.C=ω-ω ' is calculated at this time, illustrates the group received In have c data-bag lost, due to data-bag lost, the extension cryptographic Hash of this c data packet is unknown, it is assumed that extension cryptographic Hash be x1, x2..., xc.A data of the w ' received at this time are likely to be at any a possible position w ' in w data, according to reality Network condition traverses all possible situation of a data of w '.
Each possible situation of data a for w ' calculates the extension cryptographic Hash of a data packet of residue ω ', obtains one About x1, x2..., xcEquation, i.e.,
For each row coefficient in Metzler matrix, a corresponding equation can be obtained, and can be made of c equation One equation group, this c equation group solve x1, x2..., xcValue.
It arbitrarily chooses coefficient different in two groups of M and constitutes equation group, obtain two groups of x1, x2..., xcSolution, if two groups Solve it is identical, then represent this group solution x1, x2..., xcCorresponding c position is the position that data packet is really lost, and corresponding w ' is a The position of data packet is the home position of data packet, to obtain position and the sequence of all data packets.
In a specific embodiment, the present invention also provides a kind of transmitting terminal, the transmitting terminal is by the data packet of transmission First combines extension cryptographic Hash and transmission number to emit to receiving end.
In a specific embodiment, the transmitting terminal includes:
First cryptographic Hash module records the transmission number of data packet and arranges the data packet of transmission by ascending order, based on Kazakhstan Uncommon function obtains the extension cryptographic Hash of each data packet;
First Hash vector module is connect with the first cryptographic Hash module, the expansion based on the first cryptographic Hash module Exhibition cryptographic Hash is expanded Hash vector;
First combine hash module, connect with the first Hash vector module, based on the extension Hash vector be Matrix number M=(axy)1≤x≤k, 1≤y≤ωProduct obtain first and combine extension cryptographic Hash, each row of the matrix is independent;And
Sending module is combined hash module to connect with the first cryptographic Hash module and described first, is based on described first In conjunction with extension cryptographic Hash and number acquisition sequence typical value is sent, and is sent to receiving end.
In a specific embodiment, the present invention also provides a kind of receiving ends, and the receiving end for counting based on the received The second combination extension cryptographic Hash is calculated according to packet and receives number;And
When the first combination extension cryptographic Hash combines extension cryptographic Hash equal to second, and transmission number is equal to reception number, Then assert that the sequence of data packet is errorless.
In a specific embodiment, the receiving end is also used to combine extension cryptographic Hash not equal to second when described first When extending cryptographic Hash, and sending number greater than number is received, the sequence of received data packet is obtained in conjunction with cryptographic Hash according to first.
In a specific embodiment, the receiving end includes:
Second cryptographic Hash module records the reception number of data packet and obtains received each data packet based on hash function Extension cryptographic Hash;
Second Hash vector module is connect with the second cryptographic Hash module, is obtained based on the second cryptographic Hash module All extension cryptographic Hash obtain the second extension Hash vector;
Second combines hash module, connect with the second Hash vector module, based on the second extension Hash vector Second, which is obtained, with the product of the matrix is combined extension cryptographic Hash;And
Judgment module judges the sequence of data packet:
Cryptographic Hash is extended when the first combination extension cryptographic Hash is combined equal to second, and transmission number is equal to reception number When, then assert that the sequence of data packet is errorless;Or
Cryptographic Hash is extended not equal to second when first combination extends cryptographic Hash, and sends number greater than reception number When, the sequence of received data packet is obtained in conjunction with cryptographic Hash according to first.
In a specific embodiment, the judgment module obtains the suitable of received data packet in conjunction with cryptographic Hash according to first Sequence includes:
The sequence of the data packet sent is traversed, the coefficient of every a line based on the matrix obtains lost data packets and the One combines the equation group of extension cryptographic Hash;And
The equation that different coefficients are constituted in the equation group is arbitrarily chosen, the solution of two groups of lost data packets is obtained, if two groups Solve identical, then it is the position really lost of data packet that the group, which solves corresponding position, and the position of received data packet is data packet Home position.
Finally, the present processes are only preferable embodiment, it is not intended to limit the scope of the present invention.It is all Within the spirit and principles in the present invention, any modification, equivalent replacement, improvement and so on should be included in protection of the invention Within the scope of.

Claims (9)

1. a kind of packet sequence recognition methods characterized by comprising
S1, transmitting terminal combine the first of data packet extension cryptographic Hash and send number is sent to receiving end;
Data packet calculates the second combination extension cryptographic Hash and receives number based on the received for S2, receiving end;And
S3, receiving end combine extension cryptographic Hash and second to combine the relationship and transmission number of extension cryptographic Hash according to described first Relationship with number is received, judges whether the sequence of data packet is wrong;
Wherein, step S1 includes:
S11, the transmission number for recording data packet are simultaneously arranged the data packet of transmission by ascending order, obtain every number based on hash function According to the extension cryptographic Hash of packet;
S12, the extension cryptographic Hash based on all data packets are expanded Hash vector;
S13, obtain first based on the extension Hash vector and the product of a matrix and combined extension cryptographic Hash, the matrix it is each Row is independent;And
S14, extension cryptographic Hash is combined based on described first and sends number acquisition sequence typical value, and be sent to receiving end.
2. packet sequence recognition methods as described in claim 1, which is characterized in that the S3 further include:
When the first combination extension cryptographic Hash combines extension cryptographic Hash equal to second, and transmission number is equal to reception number, The sequence of data packet is errorless;Or
When the first combination extension cryptographic Hash is not equal to the second extension cryptographic Hash, and sends number greater than number is received, root The sequence of received data packet is obtained in conjunction with cryptographic Hash according to first.
3. packet sequence recognition methods as described in claim 1, which is characterized in that the S2 includes:
S21, the extension Hash for recording the reception number of data packet and obtaining received each data packet based on the hash function Value;
S22, the second extension Hash vector is obtained based on the step S21 all extension cryptographic Hash obtained;And
S23, it obtains second based on the second extension Hash vector and the product of the matrix and is combined to extend cryptographic Hash.
4. packet sequence recognition methods as claimed in claim 2, which is characterized in that described to be obtained according to first in conjunction with cryptographic Hash The sequence of received data packet includes:
The sequence of the data packet sent is traversed, the coefficient of every a line based on the matrix obtains lost data packets and the first knot Close the equation group of extension cryptographic Hash;And
The equation that different coefficients are constituted in the equation group is arbitrarily chosen, the solution of two groups of lost data packets is obtained, if two groups of solution phases Together, then it is the position that data packet is really lost that the group, which solves corresponding position, and the position of received data packet is the original of data packet Position.
5. a kind of transmitting terminal, which is characterized in that the transmitting terminal by the first of the data packet of transmission combine extension cryptographic Hash and It sends number to emit to receiving end, specifically, the transmitting terminal includes:
First cryptographic Hash module records the transmission number of data packet and arranges the data packet of transmission by ascending order, is based on Hash letter Number obtains the extension cryptographic Hash of each data packet;
First Hash vector module is connect with the first cryptographic Hash module, and the extension based on the first cryptographic Hash module is breathed out Uncommon value is expanded Hash vector;
First combines hash module, connect with the first Hash vector module, based on the extension Hash vector and a matrix Product obtain first and combine extension cryptographic Hash, each row of the matrix is independent;And
Sending module is combined hash module to connect with the first cryptographic Hash module and described first, is combined based on described first It extends cryptographic Hash and sends number acquisition sequence typical value, and be sent to receiving end.
6. a kind of receiving end, which is characterized in that the receiving end calculates second for data packet based on the received and extension is combined to breathe out Uncommon value and reception number;And
When the first combination extension cryptographic Hash combines extension cryptographic Hash equal to second, and transmission number is equal to reception number, then recognize The sequence for determining data packet is errorless;
Wherein, the receiving end includes at least: the second cryptographic Hash module, records the reception number of data packet and based on hash function Obtain the extension cryptographic Hash of received each data packet;
Second Hash vector module is connect with the second cryptographic Hash module, the institute obtained based on the second cryptographic Hash module There is extension cryptographic Hash to obtain the second extension Hash vector;
Second combines hash module, connect with the second Hash vector module, based on the second extension Hash vector and square The product of battle array obtains second and combines extension cryptographic Hash;
Wherein, described first the acquisition methods for extending cryptographic Hash are combined are as follows:
It arranges by the transmission number of transmitting terminal record data packet, and by the data packet of transmission by ascending order, is obtained based on hash function The extension cryptographic Hash of each data packet;Extension cryptographic Hash based on all data packets is expanded Hash vector;Based on the expansion Exhibition Hash vector obtains first with the product of a matrix and is combined extension cryptographic Hash, and each row of the matrix is independent;And based on institute It states first to combine extension cryptographic Hash and send number acquisition sequence typical value, and is sent to receiving end.
7. receiving end as claimed in claim 6, which is characterized in that the receiving end is also used to combine extension to breathe out when described first When wishing value not equal to the second extension cryptographic Hash, and sending number greater than number is received, received according to first in conjunction with cryptographic Hash Data packet sequence.
8. receiving end as claimed in claim 7, which is characterized in that the receiving end further include:
Judgment module judges the sequence of data packet:
When the first combination extension cryptographic Hash combines extension cryptographic Hash equal to second, and transmission number is equal to reception number, Then assert that the sequence of data packet is errorless;Or
When the first combination extension cryptographic Hash is not equal to the second extension cryptographic Hash, and sends number greater than number is received, root The sequence of received data packet is obtained in conjunction with cryptographic Hash according to first.
9. receiving end as claimed in claim 8, which is characterized in that the judgment module is connect according to first in conjunction with cryptographic Hash The sequence of the data packet of receipts includes:
The sequence of the data packet sent is traversed, the coefficient of every a line based on the matrix obtains lost data packets and the first knot Close the equation group of extension cryptographic Hash;And
The equation that different coefficients are constituted in the equation group is arbitrarily chosen, the solution of two groups of lost data packets is obtained, if two groups of solution phases Together, then it is the position that data packet is really lost that the group, which solves corresponding position, and the position of received data packet is the original of data packet Position.
CN201610976303.6A 2016-11-07 2016-11-07 A kind of packet sequence recognition methods and equipment Active CN106411656B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610976303.6A CN106411656B (en) 2016-11-07 2016-11-07 A kind of packet sequence recognition methods and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610976303.6A CN106411656B (en) 2016-11-07 2016-11-07 A kind of packet sequence recognition methods and equipment

Publications (2)

Publication Number Publication Date
CN106411656A CN106411656A (en) 2017-02-15
CN106411656B true CN106411656B (en) 2019-09-20

Family

ID=58015506

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610976303.6A Active CN106411656B (en) 2016-11-07 2016-11-07 A kind of packet sequence recognition methods and equipment

Country Status (1)

Country Link
CN (1) CN106411656B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112243160A (en) * 2020-09-14 2021-01-19 视联动力信息技术股份有限公司 Data transmission method, device, terminal equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102084360A (en) * 2008-04-06 2011-06-01 弗森-艾奥公司 Apparatus, system, and method for validating that a correct data segment is read from a data storage device
CN102307076A (en) * 2010-09-16 2012-01-04 清华大学 Redundancy-free anti-interference coding method
CN102915325A (en) * 2012-08-11 2013-02-06 深圳市极限网络科技有限公司 Md5 Hash list-based file decomposing and combining technique
CN103988189A (en) * 2011-12-08 2014-08-13 国际商业机器公司 Method for detecting data loss of data transfer between information devices
US9325586B1 (en) * 2014-03-26 2016-04-26 Marvell Israel (M.I.S.L.) Ltd. Packet duplication measurement in a network device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102084360A (en) * 2008-04-06 2011-06-01 弗森-艾奥公司 Apparatus, system, and method for validating that a correct data segment is read from a data storage device
CN102307076A (en) * 2010-09-16 2012-01-04 清华大学 Redundancy-free anti-interference coding method
CN103988189A (en) * 2011-12-08 2014-08-13 国际商业机器公司 Method for detecting data loss of data transfer between information devices
CN102915325A (en) * 2012-08-11 2013-02-06 深圳市极限网络科技有限公司 Md5 Hash list-based file decomposing and combining technique
US9325586B1 (en) * 2014-03-26 2016-04-26 Marvell Israel (M.I.S.L.) Ltd. Packet duplication measurement in a network device

Also Published As

Publication number Publication date
CN106411656A (en) 2017-02-15

Similar Documents

Publication Publication Date Title
EP3304853B1 (en) Detection of malware and malicious applications
CN107819828A (en) Data transmission method, device, computer equipment and storage medium
WO2008119672A4 (en) Method and system for resilient packet traceback in wireless mesh and sensor networks
CN105429968B (en) Network forensics load affiliation method based on Bloom filter and system
US9276853B2 (en) Hashing of network packet flows for efficient searching
EP1769993A3 (en) Vehicle control system
CN105847034A (en) Source verification and path authentication method and device
CN109766389A (en) A kind of light client revene lookup method of block chain based on bitmap index
CN107070895A (en) A kind of data flow source tracing method based on SDN
CN114050994B (en) Network telemetry method based on SRv6
CN106452972B (en) Method and device for obtaining delay time of data packet
CN106411656B (en) A kind of packet sequence recognition methods and equipment
CN107547346A (en) A kind of message transmitting method and device
CN109818824A (en) A kind of message transmitted test method, equipment and storage equipment, program product
CN108206795A (en) Blind authentication method and system based on the frequency selective fading channels that confidence is transmitted
US20180288072A1 (en) Fragmented malware hash lookup in cloud repository
CN107896141A (en) A kind of FC AE ASM network data redundancy approach
CN107426166A (en) A kind of acquisition methods of information, device and electronic equipment
SE0602336L (en) Procedure, device and system for multi-field classification in a data communication network
JP5348138B2 (en) Packet loss frequency measurement system, packet loss frequency measurement method and program
CN111628959B (en) Large-scale unmanned aerial vehicle group security authentication mechanism based on random label
CN115225550B (en) On-demand whole network telemetry device based on clustering path planning algorithm
CN108390764B (en) Broadcast content repacking method and system for broadcast storage network
CN106302006A (en) A kind of dynamic source tracing method of IP spoofing packet based on SDN
CN105376099B (en) Acquire the method and system of virtual network flow in data switching exchane

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant