CN115941547A - Method, device and system for processing ping message - Google Patents

Method, device and system for processing ping message Download PDF

Info

Publication number
CN115941547A
CN115941547A CN202110911902.0A CN202110911902A CN115941547A CN 115941547 A CN115941547 A CN 115941547A CN 202110911902 A CN202110911902 A CN 202110911902A CN 115941547 A CN115941547 A CN 115941547A
Authority
CN
China
Prior art keywords
address
ping
request message
proxy
response message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110911902.0A
Other languages
Chinese (zh)
Inventor
汪文明
徐昕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN202110911902.0A priority Critical patent/CN115941547A/en
Priority to PCT/CN2022/111259 priority patent/WO2023016470A1/en
Publication of CN115941547A publication Critical patent/CN115941547A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks

Abstract

The application provides a method, a device and a system for processing ping messages, so that when a user surfs the internet through a proxy server, the time delay and the packet loss rate of information passing through the proxy server can be measured through the ping messages. Specifically, the method comprises the following steps: acquiring a first ping request message, wherein an SIP (session initiation protocol) address of the first ping request message is an IP (Internet protocol) address of a terminal device, and a DIP (dual in-line protocol) address is an IP address of a destination server; generating a second ping request message according to the first ping request message, wherein the SIP address of the second ping request message is the IP address of a proxy gateway, the DIP address is the IP address of a proxy server, and the payload of the second ping request message comprises the payload of the first ping request message and the IP address of the destination server; and sending the second ping request message to the proxy server.

Description

Method, device and system for processing ping message
Technical Field
The present application relates to the field of communications, and in particular, to a method, an apparatus, and a system for processing a ping message.
Background
For the information exchange process between the terminal device and the destination server implemented by the proxy server, the proxy gateway sends a Transmission Control Protocol (TCP) message or a User Datagram Protocol (UDP) message sent by the terminal device to the proxy server, and the proxy server controls and registers corresponding information and then sends the TCP message or the UDP message to the destination server.
Disclosure of Invention
The application provides a method, a device and a system for processing ping messages, so that when a user surfs the internet through a proxy server, the time delay and the packet loss rate of information passing through the proxy server can be measured through the ping messages.
In a first aspect, a method for processing a ping message is provided, where the method includes: acquiring a first ping request message, wherein a Source Internet Protocol (SIP) address of the first ping request message is an IP address of a terminal device, and a Destination Internet Protocol (DIP) address of the first ping request message is an IP address of a destination server; generating a second ping request message according to the first ping request message, wherein the SIP address of the second ping request message is the IP address of a proxy gateway, the DIP address of the second ping request message is the IP address of a proxy server, and the payload of the second ping request message comprises the payload of the first ping request message and the IP address of the destination server; and sending the second ping request message to the proxy server.
It should be appreciated that the above method may be performed by a proxy gateway. It should also be understood that the proxy gateway may be independent of the terminal device or may be a software module in the terminal device.
In the technical scheme, the ping message is forwarded through the proxy gateway and is sent to the proxy server, so that the ping message can pass through the proxy server, and the time delay and the packet loss rate of the information passing through the proxy server can be measured through the ping message.
With reference to the first aspect, in certain implementations of the first aspect, the method further includes: receiving a first ping response message sent by the proxy server, wherein an SIP address of the first ping response message is an IP address of the proxy server, a DIP address of the first ping response message is an IP address of the proxy gateway, and a payload of the first ping response message is the same as a payload of the second ping request message; and generating a second ping response message according to the first ping response message, wherein the SIP address of the second ping response message is the IP address of the destination server, and the DIP address of the second ping response message is the IP address of the terminal equipment.
With reference to the first aspect, in certain implementations of the first aspect, a payload of the second ping request packet further includes authentication information of the proxy gateway.
With reference to the first aspect, in certain implementation manners of the first aspect, the authentication information of the proxy gateway includes a magic number of the proxy gateway.
With reference to the first aspect, in some implementation manners of the first aspect, the magic number is determined by negotiation between the proxy gateway and the proxy server.
In a second aspect, a method for processing a ping message is provided, where the method includes: the proxy server receives a second ping request message, wherein the SIP address of the second ping request message is the IP address of a proxy gateway, the DIP address of the second ping request message is the IP address of the proxy server, and the payload of the second ping request message comprises the IP address of a destination server; after determining that the IP address of the proxy gateway is included in a database of the proxy server, the proxy server generates a third ping request message according to the second ping request message, wherein the SIP address of the third ping request message is the IP address of the proxy server, and the DIP address of the third ping request message is the IP address of the destination server; and the proxy server sends the third ping request message to the destination server.
In the technical scheme, the proxy server receives and forwards the ping message, so that the ping message passes through the proxy server, and the time delay and the packet loss rate of the information passing through the proxy server can be measured through the ping message.
With reference to the second aspect, in certain implementations of the second aspect, the method further includes: the proxy server receives a third ping response message, wherein the SIP address of the third ping response message is the IP address of the destination server, the DIP address is the IP address of the proxy server, and the payload of the third ping response message is the same as that of the third ping request message; the proxy server generates a first ping response message according to the third ping response message, wherein the SIP address of the first ping response message is the IP address of the proxy server, the DIP address of the first ping response message is the IP address of the proxy gateway, and the payload of the first ping response message comprises the payload of the third ping response message and the IP address of the destination server; and the proxy server sends the first ping response message.
With reference to the second aspect, in some implementations of the second aspect, the payload of the second ping request message further includes authentication information of the proxy gateway, and the payload of the first ping response message further includes authentication information of the proxy gateway.
With reference to the second aspect, in some implementations of the second aspect, the authentication information of the proxy gateway includes a magic number of the proxy gateway.
With reference to the second aspect, in some implementations of the second aspect, the magic number is determined by negotiation between the proxy gateway and the proxy server.
In a third aspect, a device for processing a ping message is provided, where the device includes a receiving module, a processing module, and a sending module, where the receiving module is configured to obtain a first ping request message, a source internet protocol address SIP address of the first ping request message is an IP address of a terminal device, and a destination internet protocol address DIP address of the first ping request message is an IP address of a destination server; the processing module is used for generating a second ping request message according to the first ping request message, wherein the SIP address of the second ping request message is the IP address of a proxy gateway, the DIP address of the second ping request message is the IP address of a proxy server, and the payload of the second ping request message comprises the payload of the first ping request message and the IP address of the destination server; the sending module is used for sending the second ping request message to the proxy server.
With reference to the third aspect, in some implementation manners of the third aspect, the receiving module is further configured to receive a first ping response packet sent by the proxy server, where an SIP address of the first ping response packet is an IP address of the proxy server, a DIP address of the first ping response packet is an IP address of the proxy gateway, and a payload of the first ping response packet is the same as a payload of the second ping response packet; the processing module is further configured to generate a second ping response message according to the first ping response message, where an SIP address of the second ping response message is an IP address of the destination server, and a DIP address of the second ping response message is an IP address of the terminal device.
With reference to the third aspect, in some implementations of the third aspect, a payload of the second ping request packet further includes authentication information of the proxy gateway.
With reference to the third aspect, in some implementations of the third aspect, the authentication information of the proxy gateway includes a magic number of the proxy gateway.
With reference to the third aspect, in some implementations of the third aspect, the magic number is determined by negotiation between the proxy gateway and the proxy server.
The beneficial effects of any one of the possible implementation manners of the third aspect and the third aspect correspond to the beneficial effects of the first aspect and any one of the possible implementation manners of the first aspect, and therefore, the detailed description is omitted here.
In a fourth aspect, an apparatus for processing a ping message is provided, where the apparatus includes a receiving module, a processing module, and a sending module, the receiving module is configured to receive a second ping request message, an SIP address of the second ping request message is an IP address of a proxy gateway, a DIP address of the second ping request message is an IP address of the proxy server, and a payload of the second ping request message includes an IP address of a destination server; the processing module is configured to generate a third ping request message according to the second ping request message after determining that the database of the proxy server includes the IP address of the proxy gateway, where an SIP address of the third ping request message is the IP address of the proxy server, and a DIP address of the third ping request message is the IP address of the destination server; the sending module is configured to send the third ping request message to the destination server.
With reference to the fourth aspect, in some implementation manners of the fourth aspect, the receiving module is further configured to receive a third ping response packet, where an SIP address of the third ping response packet is an IP address of the destination server, a DIP address is an IP address of the proxy server, and a payload of the third ping response packet is the same as a payload of the third ping request packet; the processing module is further configured to generate a first ping response message according to the third ping response message, where an SIP address of the first ping response message is an IP address of the proxy server, a DIP address of the first ping response message is an IP address of the proxy gateway, and a payload of the first ping response message includes a payload of the third ping response message and an IP address of the destination server; the sending module is further configured to send the first ping response message.
With reference to the fourth aspect, in some implementations of the fourth aspect, the payload of the second ping request message further includes authentication information of the proxy gateway, and the payload of the first ping response message further includes authentication information of the proxy gateway.
With reference to the fourth aspect, in some implementations of the fourth aspect, the authentication information of the proxy gateway includes a magic number of the proxy gateway.
With reference to the fourth aspect, in some implementations of the fourth aspect, the magic number is determined by negotiation between the proxy gateway and the proxy server.
The beneficial effects of the fourth aspect and any possible implementation manner of the fourth aspect correspond to the beneficial effects of the second aspect and any possible implementation manner of the second aspect, and are not described again here.
In a fifth aspect, a proxy gateway is provided, which has the function of implementing the apparatus of the third aspect. The functions may be implemented on the basis of hardware, and corresponding software may also be implemented on the basis of hardware, where the hardware or software includes one or more modules corresponding to the functions.
In one possible design, the proxy gateway includes a processor in its structure, and the processor is configured to support the proxy gateway to perform the corresponding functions in the above method.
The proxy gateway may also include a memory, coupled to the processor, that holds program instructions and data necessary for the proxy gateway.
In a sixth aspect, a proxy server is provided, which has the function of implementing the apparatus of the fourth aspect. The functions may be implemented on the basis of hardware, and corresponding software may also be implemented on the basis of hardware, where the hardware or software includes one or more modules corresponding to the functions.
In one possible design, the proxy server includes a processor in the structure, and the processor is configured to support the proxy server to execute the corresponding functions in the above method.
The proxy server may also include a memory, coupled to the processor, that stores program instructions and data necessary for the proxy server.
In another possible design, the proxy server includes a network card driver module and a user space module, and is configured to execute any one of the possible implementation manners of the second aspect or the second aspect.
In a seventh aspect, a computer program product is provided, the computer program product comprising: computer program code which, when run on a computer, causes the computer to perform a method as described above in relation to any one of the first aspect or the first aspect, or a method as described above in relation to any one of the second aspect or the second aspect.
In an eighth aspect, there is provided a computer readable medium having stored program code means for causing a computer to perform a method as described above in relation to any one of the first aspect or the first aspect as it might perform, or for causing a computer to perform a method as described above in relation to any one of the second aspect or the second aspect as it might perform, when the computer program code means is run on a computer. These computer-readable memories include, but are not limited to, one or more of the following: read-only memory (ROM), programmable ROM (PROM), erasable PROM (EPROM), flash memory, electrically EPROM (EEPROM), and hard drive (hard drive).
In a ninth aspect, a chip is provided, where the chip includes a processor and a data interface, where the processor reads instructions stored in a memory through the data interface to perform the method of the first aspect or any one of the possible implementations of the first aspect, or to perform the method of the second aspect or any one of the possible implementations of the second aspect. In a specific implementation process, the chip may be implemented in the form of a Central Processing Unit (CPU), a Micro Controller Unit (MCU), a Micro Processing Unit (MPU), a Digital Signal Processor (DSP), a system on chip (SoC), an application-specific integrated circuit (ASIC), a Field Programmable Gate Array (FPGA), or a Programmable Logic Device (PLD).
A tenth aspect provides a system for processing a ping message, where the system includes the apparatus for processing a ping message in any one of the foregoing possible implementations of the third aspect or the third aspect and any one of the possible implementations of the fourth aspect or the fourth aspect.
Drawings
Fig. 1 is a schematic view of an application scenario applicable to an embodiment of the present application.
Fig. 2 is a schematic flowchart of a method for processing a ping message according to an embodiment of the present application.
Fig. 3 is a schematic flow chart of an embodiment of a method for processing a ping message according to an embodiment of the present application.
Fig. 4 is a schematic flow chart of another embodiment of a method for processing a ping message according to an embodiment of the present application.
Fig. 5 is a schematic flowchart of an apparatus for processing a ping message according to an embodiment of the present application.
Fig. 6 is a schematic flowchart of an apparatus for processing a ping message according to an embodiment of the present application.
Fig. 7 is a schematic flowchart of an apparatus for processing a ping message according to an embodiment of the present application.
Detailed Description
The technical solution in the present application will be described below with reference to the accompanying drawings.
The terminology used in the description of the embodiments section of the present application is for the purpose of describing particular embodiments of the present application only and is not intended to be limiting of the present application.
The terms "first," "second," "third," and the like in this application are used for distinguishing between similar items and items that have substantially the same function or similar functionality, and there is no logical or temporal dependency between "first," "second," and "third," nor is there any limitation on the number or order of execution.
This application is intended to present various aspects, embodiments or features around a system that may include a number of devices, components, modules, and the like. It is to be understood and appreciated that the various systems may include additional devices, components, modules, etc. and/or may not include all of the devices, components, modules etc. discussed in connection with the figures. Furthermore, a combination of these schemes may also be used.
In addition, in the embodiments of the present application, words such as "exemplary", "for example", etc. are used to mean serving as examples, illustrations or explanations. Any embodiment or design described herein as "exemplary" is not necessarily to be construed as preferred or advantageous over other embodiments or designs. Rather, the term using examples is intended to present concepts in a concrete fashion.
The network architecture and the service scenario described in the embodiment of the present application are for more clearly illustrating the technical solution of the embodiment of the present application, and do not form a limitation on the technical solution provided in the embodiment of the present application, and as a person of ordinary skill in the art knows that along with the evolution of the network architecture and the appearance of a new service scenario, the technical solution provided in the embodiment of the present application is also applicable to similar technical problems.
Reference throughout this specification to "one embodiment" or "some embodiments," or the like, means that a particular feature, structure, or characteristic described in connection with the embodiment is included in one or more embodiments of the present application. Thus, appearances of the phrases "in one embodiment," "in some embodiments," "in other embodiments," or the like, in various places throughout this specification are not necessarily all referring to the same embodiment, but rather mean "one or more but not all embodiments" unless specifically stated otherwise. The terms "comprising," "including," "having," and variations thereof mean "including, but not limited to," unless expressly specified otherwise.
In the present application, "at least one" means one or more, "a plurality" means two or more. "and/or" describes the association relationship of the associated objects, meaning that there may be three relationships, e.g., a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone, wherein A and B can be singular or plural. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship. "at least one of the following" or similar expressions refer to any combination of these items, including any combination of the singular or plural items. For example, at least one (one) of a, b, or c, may represent: a, b, c, a-b, a-c, b-c, or a-b-c, wherein a, b, c may be single or multiple.
In the embodiments of the present application, "corresponding" and "corresponding" may be sometimes used in a mixed manner, and it should be noted that, when differences are not emphasized, intended meanings thereof are consistent.
In the following, a scenario applicable to the embodiment of the present application is described in detail with reference to fig. 1.
Fig. 1 is a schematic diagram of an application scenario 100 suitable for use in embodiments of the present application. As shown in fig. 1, the application scenario 100 includes a terminal device 101, a proxy gateway 102, a proxy server 103, and a destination server 104. The terminal equipment and the target server can perform message interaction through the proxy gateway and the proxy server. For example, the proxy gateway and the proxy server forward a request packet sent by the terminal device to the destination server, and then forward a response packet sent by the destination server to the terminal device. The proxy gateway may be a software module in the terminal device, or may also be a device independent from the terminal device, which is not limited in this application. It should be understood that when the proxy gateway is one software module in the terminal device, the message interaction between the proxy gateway and the terminal device is the message transfer between different software modules in the terminal device.
It should be appreciated that a proxy server (proxy server) is used to proxy a network user to retrieve network information. The proxy server can be vividly understood as a transfer station of the network information, which is an intermediate proxy mechanism between a personal network and an internet service provider and is responsible for forwarding legal network information, controlling and registering the forwarding. The proxy server is an intermediate program which is a server and a client and is mainly used for forwarding network access requests of a client system. However, rather than simply forwarding the request to the real internet server, the proxy server may also control the user's behavior, make decisions on the received client requests, and filter the user's requests according to filtering rules.
By means of the proxy server, the network administrator can implement a more stringent security policy than with packet filtering routers, unlike using a general packet filtering router to manage the flow of internet services through a firewall, the proxy server works by installing dedicated code (proxy service) on the proxy gateway for each required application. If the network administrator does not install a proxy service code for a particular service, the service will not be supported and the corresponding client request will not be forwarded through the firewall. Also, such proxy service code can be configured to support only those portions of a service that a network administrator considers acceptable, and not others.
Terminal equipment in embodiments of the present application may refer to user equipment, an access terminal, a subscriber unit, a subscriber station, a mobile station, a remote terminal, a mobile device, a user terminal, a wireless communication device, a user agent, or a user device. The terminal device may also be a cellular phone, a cordless phone, a Session Initiation Protocol (SIP) phone, a Wireless Local Loop (WLL) station, a Personal Digital Assistant (PDA), a handheld device with Wireless communication function, a computing device or other processing device connected to a Wireless modem, a vehicle-mounted device, a wearable device, a terminal device in a fifth generation (5 th generation,5 g) Network or a terminal device in a future evolution Public Land Mobile Network (PLMN), and the like, which is not limited in this embodiment.
In order to facilitate better understanding of the technical solutions of the present application, the technical solutions of the present application related to the related art will be described below.
1. Network diagnostic tool (packet internet groper, ping): the method is a computer network tool and is used for determining whether a local host can successfully exchange (send and receive) data packets with another host, and then whether transmission control protocol/internet protocol (TCP/IP) parameters are correctly set, whether the operation is normal and whether the network is smooth can be inferred according to returned information. The exchanged data packets may be referred to as ping messages, and the ping messages may include request messages (ping request messages) and response messages (ping reply messages). That is, according to the transmission time of the ping message and the number of successful responses, the packet loss rate (packet loss rate) and the packet round-trip time can be estimated.
2. Internet Control Message Protocol (ICMP), user Datagram Protocol (UDP), TCP, and the like: are all sub-protocols of the TCP/IP protocol cluster, wherein ICMP is used to convey control messages and not used to transport user data, while TCP and UDP are used to transport user data.
3. ICMP message: the method comprises two types of messages, namely an ICMP error report message and an ICMP inquiry message. ping message belongs to one of ICMP inquiry messages, and can be used to measure the delay and packet loss rate of information passing through a certain server.
4. And (3) stacking: which may also be referred to as stacking or pushing, refers to inserting a new element into a stack. A stack (stack), also known as a stack, is an arithmetic-limited linear table that defines insertion and deletion operations only at the tail of the table, referred to as the top of the stack, versus the other end as the bottom of the stack. The push is to put the new element on the top of the stack element to make it become the new top of the stack element. In addition, deleting an element from a stack, also known as popping or popping, deletes the top-of-stack element, leaving its neighbors as new top-of-stack elements.
5. NAT translation table: a network address translation protocol (NAT) table may be understood as a process of processing and forwarding a message recorded in the NAT table when a server processes and forwards the message, and is used for processing a subsequent related message. Alternatively, it can be understood that the NAT translation table is mainly used to map IP addresses and port numbers of packets to other IP addresses and port numbers when data packets are sent from one network to another.
The application provides a method for processing ping messages by a proxy server, so that a user can measure the time delay and the packet loss rate of information passing through the proxy server through the ping messages when surfing the Internet through the proxy server.
Fig. 2 shows a schematic flow chart of a method for processing a ping message, which is proposed in the present application, and the method 200 includes:
s201, the proxy gateway obtains a first ping request message, where a Source Internet Protocol (SIP) address of the first ping request message is an IP address of the terminal device, and a Destination Internet Protocol (DIP) address is an IP address of the destination server.
Specifically, in this embodiment of the present application, when the proxy gateway is independent of the terminal device, the manner of acquiring the first ping request packet by the proxy gateway is as follows: the terminal device sends a first ping request message to the proxy gateway, so that the proxy gateway receives the first ping request message. Optionally, when the proxy gateway is a software module in the terminal device, the manner of acquiring the first ping request message by the proxy gateway is as follows: the proxy gateway obtains the first ping request message from other software modules of the terminal equipment.
It should be understood that when the proxy gateway is a software module in the terminal device, the IP address of the proxy gateway is the same as the IP address of the terminal device.
And S202, the proxy gateway generates a second ping request message according to the first ping request message, wherein the SIP address of the second ping request message is the IP address of the proxy gateway, the DIP address is the IP address of the proxy server, and the payload (payload) comprises the payload of the first ping request message and the IP address of the destination server.
Specifically, in this embodiment of the present application, when the proxy gateway generates the second ping request message according to the first ping request message, the proxy gateway pushes the IP address of the destination server into the payload of the first ping request message, so that the payload of the generated second ping message includes the payload of the first ping request message and the IP address of the destination server.
Optionally, the second ping request message may further include authentication information of the proxy gateway. The authentication information of the proxy gateway may be magic num.
S203, the proxy gateway sends a second ping request message to the proxy server, and correspondingly, the proxy server receives the second ping request message.
And S204, after the proxy server determines that the IP address of the proxy gateway is included in the database, a third ping request message is generated according to the second ping request message, the SIP address of the third ping request message is the IP address of the proxy server, and the DIP address is the IP address of the destination server.
Specifically, in this embodiment of the application, the proxy server may query or match in the database of the proxy server according to the IP address of the proxy gateway in the second ping request message, and generate the third ping request message according to the second ping request message after determining that the database of the proxy server includes the IP address of the proxy gateway. In addition, when the proxy server generates the third ping request message, the proxy server may determine the IP address of the destination server in the payload of the second ping request message as the DIP address of the third ping request message.
Optionally, a payload of the third ping request message includes authentication information of the proxy gateway and an IP address of the proxy gateway.
In a possible implementation manner, the proxy server may query or match the authentication information of the proxy gateway and the IP address of the proxy gateway in the database at the same time, and generate the third ping request message according to the second ping request message after determining that the database includes the authentication information of the proxy gateway and the IP address of the proxy gateway at the same time.
Optionally, the database is a database a of the proxy server. It should be understood that the proxy server may record the authentication information of the proxy gateway and the IP address of the proxy gateway into the database a of the proxy server when the proxy gateway is registered with the proxy server.
Alternatively, the authentication information of the proxy gateway may be a magic num (magic num) determined after negotiation with the proxy server. For example, when the proxy gateway registers with the proxy server, negotiation with the proxy server is performed, and the magic number is determined.
In another possible implementation manner, the proxy server may also query or match the metadata of the second ping request message and the IP address of the proxy gateway in the database at the same time, and generate the third ping request message according to the second ping request message after determining that the database includes the metadata of the second ping request message and the IP address of the proxy gateway.
It should be understood that the metadata of the second ping request message may be identification information of the terminal device, and the identification information of the terminal device is included in the ping message, for example, the payloads of the first ping request message to the third ping request message and the payloads of the first ping response message to the third ping response message each include the identification information of the terminal device. Alternatively, the identification information of the terminal device may be referred to as a user identification.
S205, the proxy server sends a third ping request message to the destination server, and the destination server receives the third ping request message accordingly.
And S206, the destination server generates a third ping response message according to the third ping request message, wherein the SIP address of the third ping response message is the IP address of the destination server, the DIP address is the IP address of the proxy server, and the payload is the same as the payload of the third ping request message.
Optionally, when the payload of the third ping request message includes the authentication information of the proxy gateway and the IP address of the proxy gateway, the payload of the third ping response message also includes the authentication information of the proxy gateway and the IP address of the proxy gateway.
And S207, the destination server sends a third ping response message to the proxy server, and correspondingly, the proxy server receives the third ping response message.
And S208, the proxy server generates a first ping response message according to the third ping response message, wherein the SIP address of the first ping response message is the IP address of the proxy server, the DIP address is the IP address of the proxy gateway, and the payload comprises the payload of the third ping response message and the IP address of the destination server.
Optionally, in this embodiment of the application, before the proxy server generates the first ping response message according to the third ping response message, the proxy server may query the authentication information of the proxy gateway, or may also query the NAT translation table to determine whether the ping message may be forwarded.
It should be understood that the proxy server querying the authentication information of the proxy gateway may be that the proxy server queries the database for the authentication information of the proxy gateway, for example, when the payload of the third ping response message includes the authentication information of the proxy gateway and the IP address of the proxy gateway, the proxy server queries whether the database includes the authentication information of the proxy gateway.
It should also be understood that, the proxy server may query the NAT translation table, where the proxy server determines, according to the SIP address and the DIP address of the third ping response message, that the NAT translation table includes translation information of the SIP address and the DIP address.
Optionally, the first ping response message may further include authentication information of the proxy gateway. The authentication information of the proxy gateway may be magic num.
S209, the proxy server sends a first ping response message to the proxy gateway, and correspondingly, the proxy gateway receives the first ping response message.
It should be appreciated that the payload of the first ping response message is the same as the payload of the second ping request message.
And S210, the proxy gateway generates a second ping response message according to the first ping response message, wherein the SIP address of the second ping response message is the IP address of the destination server, and the DIP address is the IP address of the terminal equipment.
Specifically, in this embodiment of the application, when the proxy gateway is independent of the terminal device, the proxy gateway may send the second ping response message to the terminal device. When the proxy gateway is a software module in the terminal device, the second ping response message may be transmitted to a corresponding software module in the terminal device. This is not a limitation of the present application.
Therefore, the proxy server forwards the ping message, so that the time delay and the packet loss rate of the information passing through the proxy server can be measured through the ping message.
Optionally, in this embodiment, the proxy server may be an alternative point of presence (POP), which may be referred to as a point of presence.
It should be understood that, in the various embodiments of the present application, the sequence numbers of the above-mentioned processes do not mean the execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present application.
In the following, with reference to fig. 3 to fig. 4, by taking a proxy gateway as an example and independently from a terminal device, a method for processing a ping message according to an embodiment of the present application is specifically described.
It should be noted that, some steps in the methods 300-400 of fig. 3-4 are the same as the method 200, and are not described again here.
Fig. 3 is a schematic flow chart of an embodiment of a method for processing a ping message according to an embodiment of the present application. The method 300 includes:
s301, the terminal device generates a first ping request message, wherein the SIP address of the first ping request message is the IP address of the terminal device, and the DIP address is the IP address of the destination server.
Specifically, in this embodiment of the present application, the step S301 may be referred to as the terminal device initiating a ping operation to the destination server.
S302, the terminal device sends a first ping request message to the proxy gateway, and correspondingly, the proxy gateway receives the first ping request message.
And S303, the proxy gateway generates a second ping request message according to the first ping request message, wherein the SIP address of the second ping request message is the IP address of the proxy gateway, the DIP address is the IP address of the proxy server, and the payload (payload) comprises the payload of the first ping request message and the IP address of the destination server.
For a detailed description of step S303, reference may be made to step S202 in the method 200, which is not described herein again.
S304, the proxy gateway sends a second ping request message to the proxy server, and correspondingly, the proxy server receives the second ping request message.
S305, after determining that the IP address of the proxy gateway is included in the database, the proxy server generates a third ping request message according to the second ping request message, wherein the SIP address of the third ping request message is the IP address of the proxy server, and the DIP address is the IP address of the destination server; and recording the process of converting the second ping request message into the third ping request message into an NAT conversion table.
For the detailed description of step S305, reference may be made to step S204 in the method 200, which is not described herein again.
S306, the proxy server sends a third ping request message to the destination server, and correspondingly, the destination server receives the third ping request message.
And S307, the destination server generates a third ping response message according to the third ping request message, wherein the SIP address of the third ping response message is the IP address of the destination server, the DIP address is the IP address of the proxy server, and the payload is the same as the payload of the third ping request message.
S308, the destination server sends a third ping response message to the proxy server, and correspondingly, the proxy server receives the third ping response message.
And S309, the proxy server inquires an NAT conversion table, after determining that the NAT conversion table comprises the conversion information of the ping message, generates a first ping response message according to a third ping response message, wherein the SIP address of the first ping response message is the IP address of the proxy server, the DIP address is the IP address of the proxy gateway, and the payload comprises the payload of the third ping response message and the IP address of the destination server.
For a more detailed description of step S309, reference may be made to step S208 of method 200, which is not described herein again.
S310, the proxy server sends a first ping response message to the proxy gateway, and correspondingly, the proxy gateway receives the first ping response message.
For a more detailed description of step S310, reference may be made to step S209 of the method 200, which is not described herein again.
And S311, when the SIP address of the first ping response message is the IP address of the proxy server, the proxy gateway generates a second ping response message according to the first ping response message, wherein the SIP address of the second ping response message is the IP address of the destination server, and the DIP address is the IP address of the terminal equipment.
And S312, the proxy gateway sends a second ping response message to the terminal equipment, and correspondingly, the terminal equipment receives the second ping response message.
Fig. 4 is a schematic flow chart of another embodiment of a method for processing a ping message according to an embodiment of the present application. The method 400 includes:
s401, the terminal device generates a first ping request message, wherein the SIP address of the first ping request message is the IP address of the terminal device, and the DIP address is the IP address of the destination server.
Specifically, in this embodiment, step S401 may be referred to as that the terminal device initiates a ping operation to the destination server.
S402, the terminal device sends a first ping request message to the proxy gateway, and correspondingly, the proxy gateway receives the first ping request message.
And S403, the proxy gateway generates a second ping request message according to the first ping request message, wherein the SIP address of the second ping request message is the IP address of the proxy gateway, the DIP address is the IP address of the proxy server, and the payload (payload) comprises the payload of the first ping request message and the IP address of the destination server.
For a detailed description of step S403, reference may be made to step S202 in the method 200, which is not described herein again.
S404, the proxy gateway sends a second ping request message to the proxy server, and correspondingly, the proxy server receives the second ping request message.
S405, after the proxy server determines that the IP address of the proxy gateway is included in the database, a third ping request message is generated according to the second ping request message, the SIP address of the third ping request message is the IP address of the proxy server, and the DIP address is the IP address of the destination server; and pushing the authentication information of the proxy gateway and the IP address of the proxy gateway into the payload of the third ping request message.
For a more detailed description of step S405, reference may be made to step S204 in the method 200, which is not described herein again.
S406, the proxy server sends a third ping request message to the destination server, and correspondingly, the destination server receives the third ping request message.
And S407, the destination server generates a third ping response message according to the third ping request message, wherein the SIP address of the third ping response message is the IP address of the destination server, the DIP address is the IP address of the proxy server, and the payload is the same as the payload of the third ping request message.
S408, the destination server sends a third ping response message to the proxy server, and correspondingly, the proxy server receives the third ping response message.
And S409, the proxy server inquires whether the database comprises the authentication information of the proxy gateway or not, and generates a first ping response message according to a third ping response message after the inquiry is finished, wherein the SIP address of the first ping response message is the IP address of the proxy server, the DIP address is the IP address of the proxy gateway, and the payload comprises the payload of the third ping response message and the IP address of the destination server.
For a more detailed description of step S409, reference may be made to step S208 in the above method 200, which is not described herein again.
S410, the proxy server sends a first ping response message to the proxy gateway, and correspondingly, the proxy gateway receives the first ping response message.
For more detailed description of step S410, reference may be made to step S209 in the method 200, which is not described herein again.
S411, when the SIP address of the first ping response message is the IP address of the proxy server, the proxy gateway generates a second ping response message according to the first ping response message, the SIP address of the second ping response message is the IP address of the destination server, and the DIP address is the IP address of the terminal device.
And S412, the proxy gateway sends a second ping response message to the terminal device, and correspondingly, the terminal device receives the second ping response message.
The method for processing a ping message according to the embodiment of the present application is described in detail above with reference to fig. 1 to 4, and an embodiment of the apparatus of the present application is described in detail below with reference to fig. 5 to 7. It is to be understood that the description of the method embodiments corresponds to the description of the apparatus embodiments, and therefore reference may be made to the preceding method embodiments for parts not described in detail.
Fig. 5 is a schematic structural diagram of an apparatus 500 for processing a ping message according to an embodiment of the present application. The device can be a proxy gateway, and can also be a chip or a component applied to the proxy gateway. Alternatively, the apparatus may be disposed in the terminal device, that is, the proxy gateway may be disposed in the terminal device. The apparatus 500 shown in fig. 5 may perform the corresponding steps of the method for processing a ping message performed by the proxy gateway in the above embodiment. As shown in fig. 5, the apparatus 500 includes: a receiving module 510, a processing module 520, and a sending module 530.
In a possible implementation manner, the receiving module is configured to obtain a first ping request packet, where a source internet protocol address SIP address of the first ping request packet is an IP address of a terminal device, and a destination internet protocol address DIP address of the first ping request packet is an IP address of a destination server; the processing module is used for generating a second ping request message according to the first ping request message, wherein the SIP address of the second ping request message is the IP address of a proxy gateway, the DIP address of the second ping request message is the IP address of a proxy server, and the payload of the second ping request message comprises the payload of the first ping request message and the IP address of the destination server; the sending module is used for sending the second ping request message to the proxy server.
For a more detailed description of the functions performed by the apparatus, reference may be made to the corresponding descriptions in the above method embodiments, which are not further described herein.
Fig. 6 is a schematic structural diagram of an apparatus 600 for processing a ping message according to an embodiment of the present application. The device can be a proxy server, and also can be a chip or a component applied to the proxy server. The apparatus 600 shown in fig. 6 may perform the corresponding steps of the method for processing a ping message performed by the proxy server in the above-described embodiment. As shown in fig. 6, the apparatus 600 includes: a receiving module 610, a processing module 620 and a sending module 630.
In a possible implementation manner, the receiving module is configured to receive a second ping request packet, where an SIP address of the second ping request packet is an IP address of a proxy gateway, a DIP address of the second ping request packet is an IP address of the proxy server, and a payload of the second ping request packet includes an IP address of a destination server; the processing module is configured to generate a third ping request message according to the second ping request message after determining that the database of the proxy server includes the IP address of the proxy gateway, where an SIP address of the third ping request message is the IP address of the proxy server, and a DIP address of the third ping request message is the IP address of the destination server; the sending module is used for sending the third ping request message to the destination server.
Fig. 7 is a schematic structural diagram illustrating an apparatus for processing a ping message according to an embodiment of the present application, where the apparatus may be a terminal device, a proxy gateway, a proxy server, or a destination server, and includes at least one processor 702 (e.g., a CPU), at least one network interface 705 or other communication interfaces, and a memory 706. Communication connections between these components. The processor 702 is configured to execute executable modules, such as computer programs, stored in the memory 706. The memory 706 may comprise a Random Access Memory (RAM) and may also include a non-volatile memory (non-volatile memory), such as at least one disk memory. The communication connection with at least one other network element is realized through at least one network interface 705 (which may be wired or wireless).
In some implementations, the memory 706 stores the program 7061 and the processor 702 executes the program 7061 for performing the methods described in the various embodiments of the present application.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, it may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, cause the processes or functions described in accordance with the embodiments of the application to occur, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, from one website site, computer, server, or data center to another website site, computer, server, or data center via wired (e.g., coaxial cable, fiber optic, digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that incorporates one or more of the available media. The usable medium may be a magnetic medium (e.g., floppy disk, hard disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., solid State Disk (SSD)), among others.
For a more detailed description of the functions performed by the apparatus, reference may be made to the corresponding descriptions in the above method embodiments, which are not further described herein.
The present application also provides a computer-readable medium, which stores program codes, and when the computer program codes run on a computer, the computer is caused to execute the corresponding method in the above method embodiments. These computer-readable memories include, but are not limited to, one or more of the following: read-only memory (ROM), programmable ROM (PROM), erasable PROM (EPROM), flash memory, electrically EPROM (EEPROM), and hard drive (hard drive).
The embodiment of the present application further provides a chip, which is applied to a terminal device, a proxy gateway, a proxy server, or a destination server, and the chip includes: the chip comprises at least one processor, at least one memory and an interface circuit, wherein the interface circuit is responsible for information interaction between the chip and the outside, the at least one memory, the interface circuit and the at least one processor are interconnected through lines, and instructions are stored in the at least one memory; the instructions are executed by the at least one processor to perform corresponding operations in the methods of the various aspects described above. In a specific implementation process, the chip may be implemented in the form of a Central Processing Unit (CPU), a Micro Controller Unit (MCU), a Micro Processing Unit (MPU), a Digital Signal Processor (DSP), a system on chip (SoC), an application-specific integrated circuit (ASIC), a Field Programmable Gate Array (FPGA), or a Programmable Logic Device (PLD).
The present invention also provides a computer program product, which includes a series of instructions for performing corresponding operations in the method of the above aspects when the instructions are executed.
The embodiment of the present application further provides a system for processing ping messages, including: the proxy gateway and the proxy server. Optionally, the system may further include a terminal device or a destination server.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one type of logical functional division, and other divisions may be realized in practice, for example, multiple units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a read-only memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (23)

1. A method for processing a ping message, comprising:
acquiring a first ping request message, wherein a Source Internet Protocol (SIP) address of the first ping request message is an IP address of a terminal device, and a Destination Internet Protocol (DIP) address of the first ping request message is an IP address of a destination server;
generating a second ping request message according to the first ping request message, wherein the SIP address of the second ping request message is the IP address of a proxy gateway, the DIP address of the second ping request message is the IP address of a proxy server, and the payload of the second ping request message comprises the payload of the first ping request message and the IP address of the destination server;
and sending the second ping request message to the proxy server.
2. The method of claim 1, further comprising:
receiving a first ping response message sent by the proxy server, wherein the SIP address of the first ping response message is the IP address of the proxy server, the DIP address of the first ping response message is the IP address of the proxy gateway, and the payload of the first ping response message is the same as that of the second ping request message;
and generating a second ping response message according to the first ping response message, wherein the SIP address of the second ping response message is the IP address of the destination server, and the DIP address of the second ping response message is the IP address of the terminal equipment.
3. The method of claim 1 or 2, wherein the payload of the second ping request message further comprises authentication information of the proxy gateway.
4. A method according to any of claims 1-3, wherein the authentication information of the proxy gateway comprises a magic number of the proxy gateway.
5. The method of claim 4, wherein the magic number is determined by negotiation between the proxy gateway and the proxy server.
6. A method for processing ping messages, comprising:
the proxy server receives a second ping request message, wherein the SIP address of the second ping request message is the IP address of the proxy gateway, the DIP address of the second ping request message is the IP address of the proxy server, and the payload of the second ping request message comprises the IP address of the destination server;
after determining that the IP address of the proxy gateway is included in a database of the proxy server, the proxy server generates a third ping request message according to the second ping request message, wherein the SIP address of the third ping request message is the IP address of the proxy server, and the DIP address of the third ping request message is the IP address of the destination server;
and the proxy server sends the third ping request message to the destination server.
7. The method of claim 6, further comprising:
the proxy server receives a third ping response message, wherein the SIP address of the third ping response message is the IP address of the destination server, the DIP address is the IP address of the proxy server, and the payload of the third ping response message is the same as that of the third ping request message;
the proxy server generates a first ping response message according to the third ping response message, wherein the SIP address of the first ping response message is the IP address of the proxy server, the DIP address of the first ping response message is the IP address of the proxy gateway, and the payload of the first ping response message comprises the payload of the third ping response message and the IP address of the destination server;
and the proxy server sends the first ping response message.
8. The method of claim 6 or 7, wherein the payload of the second ping request message further comprises authentication information of the proxy gateway, and wherein the payload of the first ping response message further comprises authentication information of the proxy gateway.
9. A method according to any of claims 6-8, wherein the authentication information of the proxy gateway comprises a magic number of the proxy gateway.
10. The method of claim 9, wherein the magic number is determined by negotiation between the proxy gateway and the proxy server.
11. An apparatus for processing a ping message, comprising:
a receiving module, configured to obtain a first ping request message, where a source internet protocol address SIP address of the first ping request message is an IP address of a terminal device, and a destination internet protocol address DIP address of the first ping request message is an IP address of a destination server;
a processing module: the second ping request message is generated according to the first ping request message, wherein the SIP address of the second ping request message is the IP address of a proxy gateway, the DIP address of the second ping request message is the IP address of a proxy server, and the payload of the second ping request message comprises the payload of the first ping request message and the IP address of the destination server;
and the sending module is used for sending the second ping request message to the proxy server.
12. The apparatus of claim 11, wherein the receiving module is further configured to receive a first ping response message sent by the proxy server, a SIP address of the first ping response message is an IP address of the proxy server, a DIP address of the first ping response message is an IP address of the proxy gateway, and a payload of the first ping response message is the same as a payload of the second ping request message;
the processing module is further configured to generate a second ping response message according to the first ping response message, where an SIP address of the second ping response message is an IP address of the destination server, and a DIP address of the second ping response message is an IP address of the terminal device.
13. The apparatus of claim 11 or 12, wherein the payload of the second ping request message further comprises authentication information of the proxy gateway.
14. An apparatus according to any of claims 11-13, wherein the authentication information of the proxy gateway comprises a magic number of the proxy gateway.
15. The apparatus of claim 14, wherein the magic number is determined by negotiation between the proxy gateway and the proxy server.
16. An apparatus for processing a ping message, comprising:
a receiving module, configured to receive a second ping request message, where an SIP address of the second ping request message is an IP address of a proxy gateway, a DIP address of the second ping request message is an IP address of the proxy server, and a payload of the second ping request message includes an IP address of a destination server;
a processing module, configured to generate a third ping request message according to the second ping request message after determining that the database of the proxy server includes the IP address of the proxy gateway, where an SIP address of the third ping request message is the IP address of the proxy server, and a DIP address of the third ping request message is the IP address of the destination server;
and the sending module is used for sending the third ping request message to the destination server.
17. The apparatus of claim 16, wherein the receiving module is further configured to receive a third ping response message, wherein an SIP address of the third ping response message is an IP address of the destination server, a DIP address is an IP address of the proxy server, and a payload of the third ping response message is the same as a payload of the third ping request message;
the processing module is further configured to generate a first ping response message according to the third ping response message, where an SIP address of the first ping response message is an IP address of the proxy server, a DIP address of the first ping response message is an IP address of the proxy gateway, and a payload of the first ping response message includes a payload of the third ping response message and an IP address of the destination server;
the sending module is further configured to send the first ping response message.
18. The apparatus of claim 16 or 17, wherein the payload of the second ping request message further comprises authentication information of the proxy gateway, and wherein the payload of the first ping response message further comprises authentication information of the proxy gateway.
19. An apparatus according to any of claims 16-18, wherein the authentication information of the proxy gateway comprises a magic number of the proxy gateway.
20. The apparatus of claim 19, wherein the magic number is determined by negotiation between the proxy gateway and the proxy server.
21. A proxy gateway, comprising: a processor and a memory, the memory for storing a program or code, the processor for invoking and running the program from the memory to perform the method of any of claims 1-5.
22. A proxy server, comprising: a processor and a memory, the memory for storing a program or code, the processor for invoking and running the program from the memory to perform the method of any of claims 6-10.
23. A system for handling ping messages, comprising an apparatus according to any of claims 11-20.
CN202110911902.0A 2021-08-10 2021-08-10 Method, device and system for processing ping message Pending CN115941547A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202110911902.0A CN115941547A (en) 2021-08-10 2021-08-10 Method, device and system for processing ping message
PCT/CN2022/111259 WO2023016470A1 (en) 2021-08-10 2022-08-09 Method, apparatus and system for processing ping message

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110911902.0A CN115941547A (en) 2021-08-10 2021-08-10 Method, device and system for processing ping message

Publications (1)

Publication Number Publication Date
CN115941547A true CN115941547A (en) 2023-04-07

Family

ID=85199883

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110911902.0A Pending CN115941547A (en) 2021-08-10 2021-08-10 Method, device and system for processing ping message

Country Status (2)

Country Link
CN (1) CN115941547A (en)
WO (1) WO2023016470A1 (en)

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100454849C (en) * 2005-08-05 2009-01-21 华为技术有限公司 Fault detecting method in next generation network
CN105471596B (en) * 2014-08-04 2019-05-07 新华三技术有限公司 The method and apparatus of network management
CN106060134A (en) * 2016-05-30 2016-10-26 乐视控股(北京)有限公司 Data transmission method and system
US10116544B2 (en) * 2016-06-21 2018-10-30 Juniper Networks, Inc. Extended ping protocol for determining status for remote interfaces without requiring network reachability
US10681001B2 (en) * 2018-03-29 2020-06-09 Akamai Technologies, Inc. High precision mapping with intermediary DNS filtering
CN109803030A (en) * 2018-12-20 2019-05-24 深圳市任子行科技开发有限公司 A kind of anonymity intermediate proxy server and its communication means

Also Published As

Publication number Publication date
WO2023016470A1 (en) 2023-02-16

Similar Documents

Publication Publication Date Title
US11451510B2 (en) Method and apparatus for processing service request
US7107609B2 (en) Stateful packet forwarding in a firewall cluster
EP2913972A1 (en) Resource subscription method and device
EP2633667B1 (en) System and method for on the fly protocol conversion in obtaining policy enforcement information
CN109660637B (en) P2P hole punching transmission method and system, electronic device and computer readable storage medium
CN110247848B (en) Method for sending message, network equipment and computer readable storage medium
CN105430059A (en) Smart client routing
CN102811335B (en) Set up the method, apparatus and system of video session
CN111866956A (en) Data transmission method and corresponding equipment
CN111526132B (en) Attack transfer method, device, equipment and computer readable storage medium
CN111510476B (en) Communication method, communication device, computer equipment and computer readable storage medium
CN106507414B (en) Message forwarding method and device
CN110892697B (en) Acceleration system for assisting API call processing
CN112351115B (en) Port prediction method and device of symmetric NAT equipment
Metongnon et al. Fast and efficient probing of heterogeneous IoT networks
CN110995763B (en) Data processing method and device, electronic equipment and computer storage medium
CN113473493B (en) Communication method and device
EP2835950A2 (en) Access control method, access control system and access control device
CN108848202B (en) Electronic device, data transmission method and related product
WO2017166038A1 (en) Communication method and terminal
EP1809000A1 (en) Information processing device, information processing system, information processing method, and program
CN115941547A (en) Method, device and system for processing ping message
US7860021B2 (en) Apparatus, system and method for maintaining communication between an information processing device and a server
CN112511440B (en) Message forwarding method, system, storage medium and electronic equipment
CN114697269A (en) Data communication method, apparatus, device and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication