CN100566266C - Having the belt TCP streambuf of ageing dynamic bidirectional sets up and manner of execution - Google Patents

Having the belt TCP streambuf of ageing dynamic bidirectional sets up and manner of execution Download PDF

Info

Publication number
CN100566266C
CN100566266C CNB200710160247XA CN200710160247A CN100566266C CN 100566266 C CN100566266 C CN 100566266C CN B200710160247X A CNB200710160247X A CN B200710160247XA CN 200710160247 A CN200710160247 A CN 200710160247A CN 100566266 C CN100566266 C CN 100566266C
Authority
CN
China
Prior art keywords
buffering area
data
stream
tcp
address
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB200710160247XA
Other languages
Chinese (zh)
Other versions
CN101183998A (en
Inventor
王万良
蒋一波
陈伟杰
赵澄
徐新黎
赵燕伟
王海燕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang University of Technology ZJUT
Original Assignee
Zhejiang University of Technology ZJUT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang University of Technology ZJUT filed Critical Zhejiang University of Technology ZJUT
Priority to CNB200710160247XA priority Critical patent/CN100566266C/en
Publication of CN101183998A publication Critical patent/CN101183998A/en
Application granted granted Critical
Publication of CN100566266C publication Critical patent/CN100566266C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

A kind of have the ageing dynamic bidirectional TCP streambuf that goes in ring and set up and manner of execution.This method can be when carrying out flow analysis, carry out partial buffering to a large amount of Transmission Control Protocol and based on the data flow of the application protocol of Transmission Control Protocol with stream feature, and the transmitted in both directions state of the interim whole stream of preservation, the protocol characteristic in the record special time period.The invention provides a kind of can identification in a large number based on application protocol data Transmission Control Protocol, that have the stream feature, can also identify the characteristic newspaper of stream head and a large amount of intermediate data newspapers in the stream transmission procedure, improve the belt TCP streambuf of the ageing dynamic bidirectional of having of analytical effect greatly and set up and manner of execution.

Description

Having the belt TCP streambuf of ageing dynamic bidirectional sets up and manner of execution
Technical field
The invention belongs to network measure method field, relate in particular to a kind of TCP streambuf and set up and manner of execution.
Background technology
Along with the raising day by day of Internet importance and the complexity day by day of network configuration, more and more be necessary the overall topology and the network behavior of network are carried out deep understanding, analysis, be beneficial to find network bottleneck, optimize network configuration, and further find the potential hazard that may exist in the network., need dynamically describe, and according to the performance of the mutation analysis network of network traffics, for strengthening network management, increasing network utilization, take precautions against large scale network and attack technology platform is provided the large scale network structure for this reason.The measurement of Internet has become one of major issue that academia, business circles and national government department generally be concerned about with analyzing.
The criteria for classification of network measure has multiple.According to the mode of measuring, be divided into and initiatively measure and passive measurement; According to measurement point what, be divided into spot measurement and multimetering; Whether know the inside story according to the measured, be divided into cooperation measurement and non-cooperation measurement; According to measuring the agreement adopted, be divided into measurement, based on the measurement of ICP/IP protocol and based on the measurement of snmp protocol based on bgp protocol; According to the content of measuring, be divided into topology and measure and performance measurement.
In the passive measurement mode, the probe of record network activity is linked in the network, in most of the cases visits in the connection receive between the network node, gathers and writes down the information that is connected service traffics.The behavior of network is mainly observed in passive measurement at particular point, do not increase and revises data payload by network, and therefore the behavior to network does not influence.This method can reach the detailed understanding to the point of observation network behavior, but is difficult to obtain the integral body of network is understood, perhaps to the understanding of the end-to-end behavior of network.Passive measurement is through being usually used in measuring the feature of traffic carrying capacity.
Based on the network performance measurement of ICP/IP protocol and the purpose of analysis be: investigate stability of network, accessibility, reliability and network service quality.The performance parameter of need periodicity, continuous measurement comprises the average number of hops in packet loss, RTT, flow, path etc.; On this basis, serve as theme with the time and to analyze the dynamic change of every index on each path, with the space whole situation of a certain whole network of the moment of statistical analysis of serving as theme, as be in the node total number distribution etc. of different magnitude time delays, analyze end-to-end route and change (or the route of jumping figure changes).Other analyses also comprise, the data that detection obtains are carried out data mining, perhaps utilize its self similarity feature of existing scale-model investigation.Because the real-time of network performance measurement is had relatively high expectations, so look-in frequency is often very big, but must guarantee thus network not to be caused bigger extra duty, note hiding the detection trace simultaneously.
All adopt discrete Frame to catch and analysis engine when in the present network measure method flow being measured, the advantage of using this engine is consistent with the transfer of data framework of active computer network, all is based on the communication mode of independent data newspaper structure.Along with the fast development of computer networking technology, that a large amount of application level protocols all is based upon is stable, reliable, do not have on the Transmission Control Protocol basis of repeating.For these application protocols based on Transmission Control Protocol, adopt discrete flow analysis method, equally also can only identify the characteristic newspaper of stream head, and can not discern a large amount of intermediate data newspapers in the stream, cause analytical effect to be had a greatly reduced quality.
Summary of the invention
For the characteristic that can only discern the stream head that overcomes existing network measure method is reported, can not be discerned the relatively poor deficiency of mass data, analytical effect in the stream, the invention provides a kind of can identification in a large number based on application protocol data Transmission Control Protocol, that have the stream feature, can also identify the characteristic newspaper of stream head and a large amount of intermediate data newspapers in the stream transmission procedure, improve the belt TCP streambuf of the ageing dynamic bidirectional of having of analytical effect greatly and set up and manner of execution.
The technical solution adopted for the present invention to solve the technical problems is:
A kind of have the ageing dynamic bidirectional TCP streambuf that goes in ring and set up and manner of execution, and described method mainly may further comprise the steps:
(1) monitor and catch the network data frame: directly obtain original network data frame from hardware drive program, original hardware device can be ethernet nic, 802.11 wireless network cards etc.; After capturing the primitive network Frame Frame is analyzed, judged whether it is to have the Transmission Control Protocol head, if not then not handling;
(2) extract and analyze the Transmission Control Protocol head:
(2.1) obtain source IP address and port: from the Transmission Control Protocol head, source IP address and source port are extracted; Wherein the source port storage mode is the short shaping of no symbol of network format, the data of its former and later two bytes need be exchanged, with the short shaping of the no symbol that is converted to native format;
(2.2) obtain purpose IP address and port: from the Transmission Control Protocol head, purpose IP address and destination interface are extracted; Wherein the destination interface storage mode is the short shaping of no symbol of network format, the data of its former and later two bytes need be exchanged, with the short shaping of the no symbol that is converted to native format;
(3) set up the will of failing to be sold at auction: with source IP address, source port, purpose IP address and destination interface is basic data, is combined as a group mark, and this sign is used for TCP stream of unique description.Wherein, consistent with sign is forward TCP stream, and the sign after source address and the destination address exchange is used to describe reverse TCP and flows;
(4) judge whether buffering area exists:, search and whether set up corresponding buffer region, if exist, then to (6) according to failing to be sold at auction will.
(5) set up streambuf:
(5.1) set up forward and reverse flow buffering area: the space of two equal lengths of application is as forward and reverse flow buffering area in internal memory.The positive flow buffering area is used for buffer memory and is sent to the tcp data of purpose IP address from source IP address, and the reverse flow buffering area is used for buffer memory is sent to source IP address from purpose IP address tcp data.Buffer length is fixed;
(5.2) buffering area effective time is set: obtain the moment of current system clock, precision to second.Current time is added the effective time that is set to buffering area behind the time-out time, if promptly this buffering area does not upgrade, think that then this TCP stream disconnects in effective time, promptly buffering area is in disarmed state;
(5.3) initialization forward and oppositely the stream position of buffering area: the stream position that forward and reverse buffering area are set respectively is 0; When just setting up buffering area, must also not be cached to any data, so flow hereto, the position is to be in the beginning position;
(6) record data are to buffering area:
(6.1) the Frame load data is added the buffering area end: the end that the load data of the Transmission Control Protocol datagram that captures is joined buffering area;
(6.2) calculate new stream position: the numerical value of length that the current location of stream is added the data that newly join buffering area promptly flows the position and represents that all the time whole TCP flows the current location in transmission course as up-to-date stream position;
(6.3) check whether buffer contents overflows:, therefore when the data of stream surpass buffer length, after load data is joined buffering, will inevitably cause buffering area to overflow because the size of buffering area is fixed; Just need this time to check whether buffer contents occurs overflowing, and will carry out cutting to the data of buffering area head if overflow then;
(6.4) delete buffer header data: overflow the corresponding data that partial-length is a standard delete buffer head with buffering area, and buffering area is overflowed in the partial data immigration buffering area;
(7) check whether buffering area is expired: obtain current system time, precision is to second.This system's current time and buffering area are compared effective time, if, represent that then this buffering area is overtime, to (9) greater than buffering area effective time.
(8) buffering area effective time is set: obtain current system time, precision to second.System's current time is added that the buffering area time-out time is as new buffering area effective time.Being circulated to (1) handles.
(9) destroy buffering area: this TCP stream is ended, and then corresponding buffer region also just no longer includes effect, so discharge relevant buffering area internal memory, ends the work of buffering area.
Technical conceive of the present invention is: on the DISCRETE ANALYSIS METHOD basis of existing flow analysis, have ageing dynamic bidirectional buffer memory to Transmission Control Protocol and based on stream data in the application protocol of Transmission Control Protocol, reach better analytical effect.All adopt discrete Frame to catch and analysis engine when in the present network measure method flow being measured.When analyzing tcp data stream, existing DISCRETE ANALYSIS METHOD can only identify one or several datagram of TCP stream previous section, and can not identify entire stream all datagrams in transmission course.Along with the fast development of computer networking technology, that a large amount of application level protocols all is based upon is stable, reliable, do not have on the Transmission Control Protocol basis of repeating.For these application protocols based on Transmission Control Protocol, adopt discrete flow analysis method, equally also can only identify the characteristic newspaper of stream head, and can not discern a large amount of intermediate data newspapers in the stream, cause analytical effect to be had a greatly reduced quality.
The present invention proposes a kind of belt TCP streambuf method for building up of ageing dynamic bidirectional that has.This method can be when carrying out flow analysis, carry out partial buffering to a large amount of Transmission Control Protocol and based on the data flow of the application protocol of Transmission Control Protocol with stream feature, and the transmitted in both directions state of the interim whole stream of preservation, the protocol characteristic in the record special time period.Can discern in a large number based on application protocol data Transmission Control Protocol, that have the stream feature, can also identify the characteristic newspaper of stream head and a large amount of intermediate data in the stream transmission procedure and report, improve analytical effect greatly.
Beneficial effect of the present invention mainly shows: it is ageing that the TCP streambuf is had, the situation of can the adaptive state control data losing; 2, adopt the bidirectional buffering plot structure, can carry out unified management forward and reverse TCP stream; 3, adopt the buffer circle storage, effectively the save memory expense improves data access speed.
Description of drawings
Fig. 1 is the flow chart with the belt TCP streambuf foundation of ageing dynamic bidirectional and manner of execution.
Fig. 2 is the structure chart with the belt TCP streambuf analysis software of ageing dynamic bidirectional.
Embodiment
Below in conjunction with accompanying drawing the present invention is further described.
A kind of have the ageing dynamic bidirectional TCP streambuf that goes in ring and set up and manner of execution, and described method mainly may further comprise the steps:
(1) monitor and catch the network data frame: directly obtain original network data frame from hardware drive program, original hardware device can be ethernet nic, 802.11 wireless network cards etc.; After capturing the primitive network Frame Frame is analyzed, judged whether it is to have the Transmission Control Protocol head, if not then not handling;
(2) extract and analyze the Transmission Control Protocol head:
(2.1) obtain source IP address and port: from the Transmission Control Protocol head, source IP address and source port are extracted; Wherein the source port storage mode is the short shaping of no symbol of network format, the data of its former and later two bytes need be exchanged, with the short shaping of the no symbol that is converted to native format;
(2.2) obtain purpose IP address and port: from the Transmission Control Protocol head, purpose IP address and destination interface are extracted; Wherein the destination interface storage mode is the short shaping of no symbol of network format, the data of its former and later two bytes need be exchanged, with the short shaping of the no symbol that is converted to native format;
(3) set up the will of failing to be sold at auction: with source IP address, source port, purpose IP address and destination interface is basic data, is combined as a group mark, and this sign is used for TCP stream of unique description.Wherein, consistent with sign is forward TCP stream, and the sign after source address and the destination address exchange is used to describe reverse TCP and flows;
(4) judge whether buffering area exists:, search and whether set up corresponding buffer region, if exist, then to (6) according to failing to be sold at auction will.
(5) set up streambuf:
(5.1) set up forward and reverse flow buffering area: the space of two equal lengths of application is as forward and reverse flow buffering area in internal memory.The positive flow buffering area is used for buffer memory and is sent to the tcp data of purpose IP address from source IP address, and the reverse flow buffering area is used for buffer memory is sent to source IP address from purpose IP address tcp data.Buffer length is fixed;
(5.2) buffering area effective time is set: obtain the moment of current system clock, precision to second.Current time is added the effective time that is set to buffering area behind the time-out time, if promptly this buffering area does not upgrade, think that then this TCP stream disconnects in effective time, promptly buffering area is in disarmed state;
(5.3) initialization forward and oppositely the stream position of buffering area: the stream position that forward and reverse buffering area are set respectively is 0; When just setting up buffering area, must also not be cached to any data, so flow hereto, the position is to be in the beginning position;
(6) record data are to buffering area:
(6.1) the Frame load data is added the buffering area end: the end that the load data of the Transmission Control Protocol datagram that captures is joined buffering area;
(6.2) calculate new stream position: the numerical value of length that the current location of stream is added the data that newly join buffering area promptly flows the position and represents that all the time whole TCP flows the current location in transmission course as up-to-date stream position;
(6.3) check whether buffer contents overflows:, therefore when the data of stream surpass buffer length, after load data is joined buffering, will inevitably cause buffering area to overflow because the size of buffering area is fixed; Just need this time to check whether buffer contents occurs overflowing, and will carry out cutting to the data of buffering area head if overflow then;
(6.4) delete buffer header data: overflow the corresponding data that partial-length is a standard delete buffer head with buffering area, and buffering area is overflowed in the partial data immigration buffering area;
(7) check whether buffering area is expired: obtain current system time, precision is to second.This system's current time and buffering area are compared effective time, if, represent that then this buffering area is overtime, to (9) greater than buffering area effective time.
(8) buffering area effective time is set: obtain current system time, precision to second.System's current time is added that the buffering area time-out time is as new buffering area effective time.Being circulated to (1) handles.
(9) destroy buffering area: this TCP stream is ended, and then corresponding buffer region also just no longer includes effect, so discharge relevant buffering area internal memory, ends the work of buffering area.
With reference to Fig. 1, the belt TCP streambuf of ageing dynamic bidirectional that has of present embodiment is set up and manner of execution, may further comprise the steps:
The first step: directly from hardware drive program, obtain original network data frame.After capturing the primitive network Frame Frame is analyzed.
Second step: judge whether the network data frame that captures is to have the Transmission Control Protocol head, if not then not handling.
The 3rd step: from the Transmission Control Protocol head, source IP address and source port are extracted.Wherein the source port storage mode is the short shaping of no symbol of network format, the data of its former and later two bytes need be exchanged, with the short shaping of the no symbol that is converted to native format.
The 4th step: from the Transmission Control Protocol head, purpose IP address and destination interface are extracted.Wherein the destination interface storage mode is the short shaping of no symbol of network format, the data of its former and later two bytes need be exchanged, with the short shaping of the no symbol that is converted to native format.
The 5th step: with source IP address, source port, purpose IP address and destination interface is basic data, is combined as a group mark, and this sign is used for TCP stream of unique description.
The 6th step: according to failing to be sold at auction will, search and whether set up corresponding buffer region,, then jumped to for the tenth step if exist.
The 7th step: the space of two equal lengths of application is as forward and reverse flow buffering area in internal memory.The positive flow buffering area is used for buffer memory and is sent to the tcp data of purpose IP address from source IP address, and the reverse flow buffering area is used for buffer memory is sent to source IP address from purpose IP address tcp data.
The 8th step: the moment (unit: second) that obtains current system clock.Current time is added the effective time that is set to buffering area behind the time-out time.
The 9th step: the stream position of initialization forward and reverse buffering area: the stream position that forward and reverse buffering area are set respectively is 0.
The tenth step: the end that the load data of the Transmission Control Protocol datagram that captures is joined buffering area.
The 11 step: the numerical value of length that the current location that flows is added the up-to-date data that join buffering area is as up-to-date stream position.
The 12 step: check whether buffer contents occurs overflowing, and will carry out cutting to the data of buffering area head if overflow then.If do not overflow, then jumped to for the 14 step.
The 13 step: overflow the corresponding data that partial-length is a standard delete buffer head with buffering area, and buffering area is overflowed in the partial data immigration buffering area.
The 14 step: obtain current system time (unit: second).This system's current time and buffering area are compared effective time,, jumped to for the 16 step if, represent that then this buffering area is overtime greater than buffering area effective time.
The 15 step: obtain current system time, precision is to second.System's current time is added that the buffering area time-out time is as new buffering area effective time.Be circulated to the processing of second step.
The 16 step: the buffering area of corresponding TCP stream no longer plays a role, and discharges relevant buffering area internal memory, ends buffering area work.
With reference to Fig. 2, that uses that this method realizes has an ageing dynamic bidirectional TCP streambuf analysis software that goes in ring, and mainly comprises: network monitoring module and stream buffer module.
Described network monitoring module comprises:
(1) network data frame-grab module: be used for directly grasping the primitive network Frame, provide initial data to analysis software from network adapter hardware.
(2) Transmission Control Protocol head extraction module: analyze the initial data of extracting, therefrom extract the Transmission Control Protocol head, and obtain required stream information.
Described stream buffer module comprises:
(1) memory management module: the distribution and the release of management buffering area required memory.
(2) timer management module: be responsible for the clock of the system that obtains, and regularly trigger buffering area validity and detect incident.
(3) buffer management module: manage each and the corresponding two-way buffer circle of TCP stream.Comprise buffering area foundation, safeguard and destroy.
(4) data memory module: be used for the load data of tcp data newspaper is write buffering area, and detect buffering area and overflow with datacycle and delete.

Claims (1)

1, a kind of have the ageing dynamic bidirectional TCP streambuf that goes in ring and set up and manner of execution, and it is characterized in that: described method mainly may further comprise the steps:
(1), monitor and catch the network data frame: directly obtain original network data frame from hardware drive program, original hardware device comprises ethernet nic, 802.11 wireless network cards; After capturing the primitive network Frame Frame is analyzed, judged whether it is to have the Transmission Control Protocol head, if not then not handling;
(2), extract and analyze the Transmission Control Protocol head:
(2.1), obtain source IP address and port: from the Transmission Control Protocol head, source IP address and source port are extracted; Wherein the source port storage mode is the short shaping of no symbol of network format, the data of its former and later two bytes need be exchanged, with the short shaping of the no symbol that is converted to native format;
(2.2), obtain purpose IP address and port: from the Transmission Control Protocol head, purpose IP address and destination interface are extracted; Wherein the destination interface storage mode is the short shaping of no symbol of network format, the data of its former and later two bytes need be exchanged, with the short shaping of the no symbol that is converted to native format;
(3), set up the will of failing to be sold at auction: with source IP address, source port, purpose IP address and destination interface is basic data, is combined as a group mark, and this sign is used for TCP stream of unique description; Wherein, consistent with sign is forward TCP stream, and the sign after source address and the destination address exchange is used to describe reverse TCP and flows;
(4), judge whether buffering area exists:, search and whether set up corresponding buffer region, if exist, then to step (6) according to failing to be sold at auction will;
(5), set up streambuf:
(5.1), set up forward and reverse flow buffering area: the space of two equal lengths of application is as forward and reverse flow buffering area in internal memory; The positive flow buffering area is used for buffer memory and is sent to the tcp data of purpose IP address from source IP address, and the reverse flow buffering area is used for buffer memory is sent to source IP address from purpose IP address tcp data;
(5.2), buffering area effective time is set: obtain the moment of current system clock, precision to second; Current time is added the effective time that is set to buffering area behind the time-out time, if promptly this buffering area does not upgrade, think that then this TCP stream disconnects in effective time, promptly buffering area is in disarmed state;
(5.3), initialization forward and oppositely the stream position of buffering area: the stream position that forward and reverse buffering area are set respectively is 0; When just setting up buffering area, the stream position is to be in the beginning position;
(6), record data are to buffering area:
(6.1), the Frame load data is added the buffering area end: the end that the load data of the Transmission Control Protocol datagram that captures is joined buffering area;
(6.2), calculate new stream position: the current location of stream is added the numerical value of length of data that soil newly joins buffering area as up-to-date stream position, promptly flow the position and represent that all the time whole TCP flows the current location in transmission course;
(6.3), check whether buffer contents overflows:, therefore when the data of stream surpass buffer length, after load data is joined buffering area, will inevitably cause buffering area to overflow because the size of buffering area is fixed; Check whether buffer contents occurs overflowing, and will carry out cutting to the data of buffering area head if overflow then;
(6.4), delete buffer header data: overflow the corresponding data that partial-length is a standard delete buffer head with buffering area, and buffering area is overflowed in the partial data immigration buffering area;
(7), check whether buffering area is expired: obtain current system time, precision is to second; This system's current time and buffering area are compared effective time, if, represent that then this buffering area is overtime, to step (9) greater than buffering area effective time;
(8), buffering area effective time is set: obtain current system time, precision to second; System's current time is added that the buffering area time-out time is as new buffering area effective time; Being circulated to step (1) handles;
(9), destroy buffering area: this TCP stream is ended, and then corresponding buffer region also just no longer includes effect, so discharge relevant buffering area internal memory, ends the work of buffering area.
CNB200710160247XA 2007-12-14 2007-12-14 Having the belt TCP streambuf of ageing dynamic bidirectional sets up and manner of execution Expired - Fee Related CN100566266C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB200710160247XA CN100566266C (en) 2007-12-14 2007-12-14 Having the belt TCP streambuf of ageing dynamic bidirectional sets up and manner of execution

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB200710160247XA CN100566266C (en) 2007-12-14 2007-12-14 Having the belt TCP streambuf of ageing dynamic bidirectional sets up and manner of execution

Publications (2)

Publication Number Publication Date
CN101183998A CN101183998A (en) 2008-05-21
CN100566266C true CN100566266C (en) 2009-12-02

Family

ID=39449092

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB200710160247XA Expired - Fee Related CN100566266C (en) 2007-12-14 2007-12-14 Having the belt TCP streambuf of ageing dynamic bidirectional sets up and manner of execution

Country Status (1)

Country Link
CN (1) CN100566266C (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105553695B (en) * 2015-12-08 2018-08-24 南阳理工学院 A kind of IP traffic management method based on two-stage bidirectional ltsh chain table
CN106330764B (en) * 2016-08-15 2019-11-15 北京蓝海讯通科技股份有限公司 Manage method, application and the calculating equipment of data buffering
CN107423148A (en) * 2017-07-26 2017-12-01 广州路派电子科技有限公司 A kind of double buffering protocol data analysis system being applied under multi-task scheduling environment
CN113098832B (en) * 2019-12-23 2022-09-27 四川大学 Remote buffer overflow attack detection method based on machine learning
CN113286295A (en) * 2021-05-11 2021-08-20 博瑞得科技有限公司 Centralized data forwarding method and device and computer readable storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020124103A1 (en) * 2001-02-20 2002-09-05 International Business Machines Corporation System and method for regulating incoming traffic to a server farm
CN1812313A (en) * 2005-01-26 2006-08-02 华为技术有限公司 Method for controlling radio link control layer buffer area overflow
CN1848810A (en) * 2006-05-15 2006-10-18 武汉虹旭信息技术有限责任公司 Stream media transmitting rate controlling method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020124103A1 (en) * 2001-02-20 2002-09-05 International Business Machines Corporation System and method for regulating incoming traffic to a server farm
CN1812313A (en) * 2005-01-26 2006-08-02 华为技术有限公司 Method for controlling radio link control layer buffer area overflow
CN1848810A (en) * 2006-05-15 2006-10-18 武汉虹旭信息技术有限责任公司 Stream media transmitting rate controlling method

Also Published As

Publication number Publication date
CN101183998A (en) 2008-05-21

Similar Documents

Publication Publication Date Title
USRE49126E1 (en) Real-time adaptive processing of network data packets for analysis
CN110868336B (en) Data management method, device and computer readable storage medium
EP2852097B1 (en) Efficient data center monitoring
CN100566266C (en) Having the belt TCP streambuf of ageing dynamic bidirectional sets up and manner of execution
CN102571479B (en) Method, device and system for measuring time delay
CN100553206C (en) Internet, applications method for recognizing flux based on packet sampling and application signature
KR101602189B1 (en) traffic analysis and network monitoring system by packet capturing of 10-giga bit data
CN113055251B (en) High-speed network-oriented real-time sensing method for flow packet loss state
CN106572190A (en) Autonomous collection method for operational data of information communication
CN101719847A (en) High-performance monitoring method for DNS traffic
WO2015196636A1 (en) Packet collection method and system, network device and network management centre
CN111726410B (en) Programmable real-time computing and network load sensing method for decentralized computing network
CN112235154A (en) Data processing method, system, device and medium based on Internet of things
CN106161339B (en) Obtain the method and device of IP access relations
CN114189480B (en) Flow sampling method, device, electronic equipment and medium
CN111565132B (en) Overtime detection method and system for bidirectional forwarding detection message
CN114006872B (en) Data packet transmission method and device, electronic equipment and readable storage medium
CN116319468B (en) Network telemetry method, device, switch, network, electronic equipment and medium
AU2004201907B2 (en) A searching apparatus and method
CN114189565B (en) Head area restoration system, method and related equipment
KR101222209B1 (en) Combined system for collecting/analyzing internet protocol packet and method thereof
Wahl Observing TCP Round Trip Times with FlowScope
CN116781530A (en) Dynamic generation method, system, equipment and storage medium for digital asset network topology structure
CN116192738A (en) Information collection method and device, storage medium and electronic device
CN117061394A (en) eBPF-based container network TCP connection time delay monitoring method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20091202

Termination date: 20131214