Embodiment
A kind of method through the WLAN remotely starting transparent computing system client that the present invention proposes specifies as follows in conjunction with accompanying drawing and embodiment:
The inventive method is based on the transparent computing system of being made up of client, server and wireless network; Client can be the computing equipment of support of wireless communication such as notebook computer, PDA, mobile phone; Server can be common PC or server, connects through wireless network between the client and server.(Access Point AP) can be wireless network card on wireless router or the server to the access point of wireless network.Server stores the client relative operation system, and client itself does not preset any operating system, but utilizes the chip guide (ROM or EPROM) that is provided with on the client, obtains the corresponding operating system through wireless network from server and realizes remote activation.
The method of passing through the WLAN remotely starting transparent computing system client that the present invention proposes is: client utilizes chip guide to carry out remote activation through wireless network.This method flow is as shown in Figure 1, may further comprise the steps:
Step (1): client powers up; Carry out the guidance code in the chip guide, according to the transparent network in the search cycle search current region that is provided with in advance, if search transparent network in the given time; The average bandwidth of the last remote activation of all operations system that the number of the operating system that the signal strength signal intensity of acquisition transparent network, transparent network are supported, transparent network are supported; Change step (2), otherwise stop search, the remote activation failure;
The embodiment of this step may further comprise the steps:
Step (1.1): the guidance code among client executing chip guide ROM or the EPROM, the legitimacy and the integrality of inspection code self drive wireless network card, prepare the search wireless network;
Step (1.2): client picks up counting;
Step (1.3): client is broadcasted this network search request message after in the manufacturer self-defined information territory of network search request message, inserting the transparent computing system sign;
Step (1.4): after transparent network AP receives network search request message, inspection manufacturer self-defined information territory, the request if not transparent computing system client then abandons it; If the request of transparent computing system client, then in the manufacturer custom zone of web search response message, insert the transparent network information of the transparent network at this AP place, return the web search response message to client;
The content of said transparent network information is as shown in table 1 for example, the contents are as follows (being the length of this content in the bracket) that comprises in this table:
1) transparent computing system sign (4 byte);
2) ID of transparent network (32 byte);
3) number (2 byte) of the operating system of this transparent network support;
4) average bandwidth (8 byte) of the last remote activation of all operations system of this transparent network support;
The ID (2 byte) of each operating system of 5) supporting;
The length (1 byte) of each operating system follow-up data of 6) supporting;
The title (1~50 byte) of each operating system of 7) supporting;
The bandwidth (8 byte) of the last remote activation of 8) supporting of each operating system;
The content of table 1 transparent network information
Title |
Length (byte) |
The transparent computing system sign |
4 |
The ID of transparent network |
32 |
The operating system number of network support |
2 |
The average bandwidth of the last remote activation of all operations system of network support |
8 |
The ID of first operating system |
2 |
The length of first operating system follow-up data |
1 |
The title of first operating system |
1~50 |
The bandwidth of the last remote activation of first operating system |
8 |
...... |
|
The ID of N operating system |
2 |
The length of N operating system follow-up data |
1 |
The title of N operating system |
1~50 |
The bandwidth of N the last remote activation of operating system |
8 |
Step (1.5): after client is received the web search response message, the message of whether returning through this message of manufacturer self-defined information territory checking for transparent network AP; If this message is not the message that transparent network AP returns, then it is abandoned; If this message is the message that transparent network AP returns, then write down the signal strength signal intensity (signal strength signal intensity of transparent network be the client wireless network interface card obtain) of average bandwidth and this transparent network of the number of the ID of this transparent network, operating system that this transparent network is supported, the last remote activation of all operations system that this transparent network is supported according to the size of the electromagnetic amplitude of receiving of wireless signal;
Step (1.6): arrive at every turn the search cycle (the search cycle general range is 1s~5s), then client judge current search to network whether meet the following conditions simultaneously:
1) searches a transparent network at least;
2) transparent network that searches of double search cycle comes to the same thing;
If satisfy, then search procedure finishes, and forwards step (2) to; Otherwise client timing zero clearing, reclocking forwards step (1.3) to;
Step (1.7): (general range does not search any transparent network when being 10s~30s), then stops search if timing arrives the scheduled time; The search of Client-Prompt user current region can not provide transparent calculation services less than any transparent network, the failure of client remote activation;
Step (2): client sorts the average bandwidth of the transparent network that searches according to the last remote activation of all operations system of the number of the operating system of the signal strength signal intensity of transparent network, transparent network support, transparent network support, and the transparent network tabulation that obtains after the ordering is shown to the user;
This step embodiment may further comprise the steps that (number of supposing the transparent network that step (1) searches is N, and N is a positive integer, and N transparent network is expressed as W respectively
1, W
2..., W
N):
Step (2.1): basis signal intensity is by to weak N transparent network being sorted ordering back W by force
1, W
2..., W
NRank be expressed as R successively
1,1, R
1,2..., R
1, N
Step (2.2): the number according to the operating system of supporting sorts to N transparent network from more to less, ordering back W
1, W
2..., W
NRank be expressed as R successively
2,1, R
2,2..., R
2, N
Step (2.3): the average bandwidth according to the last remote activation of all operations system that supports sorts to N transparent network from high to low, ordering back W
1, W
2..., W
NRank be expressed as R successively
3,1, R
3,2..., R
3, N
Step (2.4): define the corresponding weight coefficient of three ranks and be respectively α, β, γ (α>0, β>0, γ>0, alpha+beta+γ=1), calculate W
1, W
2..., W
NFinal ranking coefficients R separately
T, 1, R
T, 2..., R
T, N:
R
t,i=α*R
1,1+β*R
2,i+γ*R
3,i(i=1,2,...,N);
Step (2.5): according to R
T, iAscending N transparent network sorted, the transparent network tabulation that obtains after the ordering is shown to the user;
Step (3): the transparent network that the user selects remote activation to use, client is carried out network identity validation to the transparent network that the user selects, if verify successfully, then changes step (4); Otherwise change step (3); This step embodiment may further comprise the steps:
Step (3.1): the user selects transparent network;
Step (3.2): client is inserted transparent computing system sign in the manufacturer self-defined information territory of network authentication request message, and the AP of the transparent network of selecting to the user sends network authentication request message;
Step (3.3): after transparent network AP received network authentication request message, the manufacturer self-defined information territory in the inspection message was to judge whether this message is the request message of transparent computing system client; If not the request message of transparent computing system client, then directly this network authentication request message is abandoned; If the request message of transparent computing system client then extracts the authorization information in the message, in the manufacturer self-defined information territory of network verification response message, insert the transparent computing system sign, return the network verification response message to client;
Step (3.4): after client is received the network verification response message, the message of whether returning through this message of manufacturer self-defined information territory checking for transparent network AP; If this message is not the message that transparent network AP returns, then it is abandoned; If this message is the message that transparent network AP returns, then from message, extract the checking result, will verify that the result is shown to the user; If verify successfully, then change step (4) over to; If authentication failed then changes step (3.1) over to, the prompting user reselects transparent network;
Above-mentioned step (3.2) and step (3.3) have constituted a reciprocal process of network authentication request message and network verification response message; According to the difference of the indentification protocol of using, the mutual number of times of network authentication request message and network verification response message is different; For some agreement, possibly exist repeatedly reciprocal process;
Step (4): client is selected the user and the successful transparent network of checking is tested, if transparent network satisfies the demand of client remote activation, then changes step (5), otherwise goes back to step (3);
This step prevents that transparent network that the user selects from can not effectively support the demand of client remote activation because the network bandwidth is low excessively, network delay is excessive, and this step embodiment step is as shown in Figure 2, comprising:
Step (4.1): the Client-Prompt user selects to test the parameter type of use, comprises two kinds of custom parameter and system default parameters; If the user selects custom parameter, then change step (4.2) over to; If user's selective system default parameters then changes step (4.3) over to;
Step (4.2): the Client-Prompt user imports following four test parameters successively: the minimum average bandwidth that the time that the ID of the operating system that test, test continue, test allow and the maximum average delay of permission; After user's input finished, four test parameters were set to user input values, change step (4.4) over to;
Step (4.3): test parameter is set to the system default parameter, comprising: the time that the ID of the operating system that test, test continue, (general range was that (general range is 100Kbps~1Mbps) to the minimum average bandwidth that allows of 10s~30s), test and (general range is 10ms~100ms) to the maximum average delay that allows;
Step (4.4): user end to server sends test beginning request message; Include the test parameter that is provided with in step (4.2) or the step (4.3) in the message: time, the minimum average bandwidth of permission and the maximum average delay of permission that the operating system ID of test, test continue;
Step (4.5): after server is received test beginning request message, return test beginning response message; Include first read-write requests information that client will be sent in the test beginning response message; Read-write requests information comprises following content:
1) action type: read request/write request;
2) original position: the original position of the disk of read-write requests operation;
3) working length: the data length that reads or writes;
Step (4.6): client extracts read-write requests information wherein after receiving test beginning response message, in view of the above first read-write requests message is sent to server; Pick up counting simultaneously;
Step (4.7): after server is received read-write requests message, return the read-write response message; Comprised client read-write requests information next time in the read-write response message;
Step (4.8): client extracts read-write requests information wherein after receiving the read-write response message, sends read-write requests message next time to server;
In above-mentioned step (4.5) and step (4.7), server is confirmed client read-write requests information next time at every turn as follows:
1) in client remote activation operating system process, each read-write requests of client under the server record deposits start-up course read-write daily record successively in;
2) 1) afterwards, as client-requested test and 1) in during the identical operations system, article one recording start of reading and writing daily record from corresponding start-up course reads next bar record successively, as the read-write requests next time of client;
Step (4.9): judge whether test finishes: when timing arrived the time that the test of appointment continues, client stopped to send read-write requests message, and sends the EOT request message to server; Otherwise change step (4.8);
Step (4.10): after server is received the EOT request message, return the EOT response message;
Step (4.11): after client is received the EOT response message, send the test result request message to server; The test result request message comprises three information of operating system ID, average bandwidth, average delay of this test;
Step (4.12): after server was received the test result request message, logging test results returned the test result response message;
Step (4.13): after client is received the test result response message, judge whether whether test result satisfies the remote activation requirement, promptly meet the following conditions simultaneously:
1) average bandwidth in the test result is not less than the minimum average bandwidth of permission;
2) average delay in the test result is not higher than the maximum average delay of permission;
If satisfy, then forward step (5) to; Otherwise forward step (3.1) to, the user reselects transparent network;
Step (5): the start-up code of chip guide obtains the sign of this client from server;
Step (6): client is downloaded a script explanation program and load operating from server;
Step (7): under the environment of above-mentioned script explanation program running, carry out, let the user need select the operating system of loading through explanation to language scripts;
Step (8): client is from server down operation system kernel mirror image and load operating; Each read-write requests of server record client; Deposit start-up course read-write daily record in; Use when having client carry out same operating system testing later on (in above-mentioned step (4.5) and step (4.7), read start-up course just and read and write the information in the daily record).
(above-mentioned steps (1)~step (4) is the treatment step of distinguishing characteristics of the present invention; Step (5)~step (7) is the treatment step of the existing remote start-up method of transparent computing system, and step (8) is for the present invention is based on the step that the existing remote start-up method of transparent computing system is revised.)
The present invention is applicable to all kinds of transparent calculating client device of radio communications such as supporting Wi-Fi, ZigBee, Bluetooth, like notebook computer, PDA, mobile phone etc.The AP of wireless network can be the wireless network card of wireless router or server.Be that client, Wi-Fi are that the wireless network card of wireless network, server is that AP is elaborated as preferred embodiment below with PC.
The equipment that the embodiment of this method relates to comprises: remote activation client, remote start server and AP.Remote activation client hardware structure is identical with general PC, but does not have local hard drive, and on mainboard, is provided with one and is used for the chip guide (adopting ROM or EPROM) that starts the operating system through the Wi-Fi network remote.Server adopts general PC or server to get final product, and the remote activation service is installed on it.AP uses the wireless network card on the remote start server, only serves transparent network.
The equipment disposition that present embodiment adopts is following:
Client: Intel Celeron M 353 634MHz CPU, Intel i915GMS chipset, DDR2 667MHz512MB internal memory, Atheros AR5007EG 54Mbps wireless network card.
Server: Intel Core 2Duo T7200 2.0GHz CPU, Intel i945PM chipset, DDR2 667MHz2.0GB internal memory, HITACHI 120GB 5400RPM hard disk, Intel (R) PRO/Wireless 3945ABG 54Mbps wireless network card.
The flow process of client remote activation is as shown in Figure 1 in the present embodiment, specifically may further comprise the steps:
Step (1): client powers up; Carry out the guidance code in the chip guide; According to the transparent network in the search cycle search current region that is provided with in advance, if search transparent network in the given time, the average bandwidth of the last remote activation of all operations system that the number of the operating system that the signal strength signal intensity of acquisition transparent network, transparent network are supported, transparent network are supported changes step (2); Otherwise stop search, the remote activation failure.
According to IEEE 802.11 standards, the search of Wi-Fi network comprises two kinds of active searching and passive search:
(a) active searching: the searching request node is to Web broadcast Probe Request message, and AP can respond Probe Response message after receiving ProbeRequest message.The ProbeResponse message that the utilization of searching request node is received is known the network information.
(b) passive search: AP can periodically broadcast Beacon message and comes communication network information, and the searching request node is known the network information through monitoring Beacon message.
Above-mentioned Probe Request message is used for surveying the Wi-Fi network of current region, and Probe Response then is the message that AP returns to searching request side.The form of Probe Request message is as shown in table 2, comprises the information unit such as transmission rate, manufacturer's self-defined information of the SSID that will survey, this network support.The form of Probe Response message is as shown in table 2, comprise message delivery time transmitting terminal time, join the information such as functional requirement that the equipment of present networks need satisfy.The form of Beacon message and Probe Response are similar, do not do explanation here.
Table 2Probe Request message format
Sequence number |
Information unit |
Describe |
1 |
SSID |
The SSID of the network of surveying (value is 0 o'clock detection all-network) |
2 |
Supported?Rates |
The transmission rate of supporting |
3 |
Request?Information |
The information that will comprise among the indication Probe Response |
4 |
Extended?Supported Rates |
The transmission rate of other support except Supported Rates |
Last |
Vendor?Specific |
Manufacturer's self-defined information |
Table 3Probe Response message format
Sequence number |
Information unit |
Describe |
1 |
Timestamp |
The time of message delivery time transmitting terminal |
2 |
Beacon?Interval |
Time difference between the adjacent twice Beacon message |
3 |
Capability |
Indication joins the functional requirement that the equipment of present networks need satisfy |
4 |
Service?Set?Identifier (SSID) |
Network identity |
5 |
Supported?Rates |
The transmission rate of network support |
6-22 |
Omit |
Omit |
Last-I |
Vendor?Specific |
Manufacturer's self-defined information |
Last-n |
Requested?Information |
Information requested among the corresponding Probe Request |
In order only to let transparent calculating client search transparent network, and general device can't search transparent network, and the AP of present embodiment only supports active searching.That is: the AP of present embodiment monitors Probe Request message, and returns ProbeResponse message; But active broadcast Beacon message not.
The detailed process of transparent network search is following:
Step (1.1): the guidance code among client executing ROM or the EPROM, the legitimacy and the integrality of inspection code self drive the Wi-Fi network interface card, prepare search Wi-Fi network.
Step (1.2): client picks up counting.
Step (1.3): client assembling Probe Request message, in the VendorSpecific information unit of Probe Request message, insert transparent computing information.The form of Vendor Specific information unit is as shown in table 4.Wherein, insert transparent network information among the Vendor-specific Content, the form of transparent network information is as shown in table 1, and the field that comprises has:
1) transparent computing system sign (4 byte);
2) ID of transparent network (32 byte);
3) number (2 byte) of the operating system of this transparent network support;
4) average bandwidth (8 byte) of the last remote activation of all operations system of this transparent network support;
The ID (2 byte) of each operating system of 5) supporting;
The length (1 byte) of each operating system follow-up data of 6) supporting;
The title (1~50 byte) of each operating system of 7) supporting;
The bandwidth (8 byte) of the last remote activation of 8) supporting of each operating system.
In Probe Request message, " transparent computing system sign " field is inserted " 54:72:61:6e ", other field zero setting.
Table 4Vendor Specific information unit form
The territory |
Length (byte) |
Describe |
?Element?ID |
1 |
The ID of information unit |
?Length |
1 |
The length of the information content (two the length sums in back) |
?OUI |
3 |
Identification of the manufacturer |
?Vendor-specific?Content |
0~252 |
The information content |
Whether step (1.4): after transparent network AP received Probe Request message, whether the VendorSpecific information unit in the inspection message comprised " transparent computing system sign " (54:72:61:6e), should ask from transparent calculating client to judge.Request if not transparent calculating client then abandons it; If Probe Response message is then assembled in the request of transparent calculating client, the Vendor-specific Content in Vendor Specific territory inserts the transparent network information of this network in Probe Response message.Wherein, " transparent computing system sign " field is inserted " 54:72:61:6e "; " ID of transparent network " field is inserted the SSID of this transparent network; Ensuing field is then inserted the operation system information of this network support respectively by form shown in the table 1, comprising: the bandwidth of the average bandwidth of the last remote activation of all operations system that the number of the operating system that this transparent network is supported, this transparent network are supported, the ID of each operating system, title, the last remote activation.After transparent network information is filled in and finished, Probe Response message is returned to client.
Step (1.5): after client is received Probe Response message, whether comprise " transparent computing system sign " (54:72:61:6e) to judge whether this network is transparent network in the inspection message.Message for nontransparent network directly abandons; Message for transparent network; The corresponding network information of client records comprises the average bandwidth of the number of the ID of this transparent network, operating system that this transparent network is supported, the last remote activation of all operations system that this transparent network is supported, the signal strength signal intensity of this transparent network.The average bandwidth of the last remote activation of all operations system of the number of the ID of transparent network, the operating system of support and support is that the Vendor-specific Content from the Vendor Specific unit of Probe Response message obtains.The mode that the signal strength signal intensity of transparent network obtains is: when the Wi-Fi network interface card is received message; Can add that an extension header, this extension header include network signal intensity information (wireless network card obtains network signal intensity according to the size of the electromagnetic amplitude of receiving of wireless signal) in the message front; Through extracting the network signal intensity information that extension header comprises, client can be known the signal strength signal intensity of this network.
Step (1.6): arrive the search cycle (default value is 2s) at every turn, then client judge current search to network whether meet the following conditions simultaneously:
1) searches a transparent network at least;
2) transparent network that searches of double search cycle comes to the same thing.
If satisfy, then search procedure finishes, and forwards step (2) to; Otherwise client timing zero clearing, reclocking forwards step (1.3) to.
Step (1.7):, then stop search if timing does not search any transparent network when arriving the scheduled time (default value is 15s).The search of Client-Prompt user current region can not provide transparent calculation services less than any transparent network, the failure of client remote activation.
Step (2): client sorts the average bandwidth of the transparent network that searches according to the last remote activation of all operations system of the number of the operating system of the signal strength signal intensity of transparent network, transparent network support, transparent network support, and the transparent network tabulation that obtains after the ordering is shown to the user.(number of supposing the transparent network that step (1) searches is N to the detailed process of this step, and N is a positive integer, and N transparent network is expressed as W respectively as follows
1, W
2..., W
N):
Step (2.1): basis signal intensity is by to weak N transparent network being sorted ordering back W by force
1, W
2..., W
NRank be expressed as R successively
1,1, R
1,2..., R
1, N
Step (2.2): the number according to the operating system of supporting sorts to N transparent network from more to less, ordering back W
1, W
2..., W
NRank be expressed as R successively
2,1, R
2,2..., R
2, N
Step (2.3): the average bandwidth according to the last remote activation of all operations system that supports sorts to N transparent network from high to low, ordering back W
1, W
2..., W
NRank be expressed as R successively
3,1, R
3,2..., R
3, N
Step (2.4): define the corresponding weight coefficient of three ranks and be respectively α, β, γ (α>0, β>0, γ>0, alpha+beta+γ=1), calculate W
1, W
2..., W
NFinal ranking coefficients R separately
T, 1, R
T, 2..., R
T, N:
R
t,i=α*R
1,i+β*R
2,i+γ*R
3,i(i=1,2,...,N);
The value of α, β, γ is respectively 0.3,0.4 in the present embodiment, and 0.3.
Step (2.5): according to R
T, iAscending N transparent network sorted, the transparent network tabulation that obtains after the ordering is shown to the user.
Step (3): the transparent network that the user selects remote activation to use, client is carried out network identity validation to the transparent network that the user selects, if verify successfully, then changes step (4); Otherwise change step (3).
After step (2) is shown to the user with the transparent network tabulation, the transparent network that the user selects remote activation to use from the transparent network tabulation, the input key, client is accomplished network identity validation according to IEEE 802.11 standards afterwards.According to the IEEE802.11 standard, network identity validation uses Authentication message.The form of Authentication message is as shown in table 5.The client of embodiment has been inserted transparent computing information in the Vendor of Authentication message Specific information unit.Transparent network AP only provides the service for checking credentials to the request that comprises transparent computing information, and ignores other checking request message.
Concrete proof procedure is following:
Step (3.1): the transparent network that the user selects remote activation to use.
Step (3.2): client is inserted transparent network information according to the form assembling network authentication request message of Authentication message in the Vendor Specific information unit in message.The form of transparent network information is as shown in table 1.The same with Probe Request message, " transparent computing system sign " field is inserted " 54:72:61:6e ", other field zero setting in this transparent network information.
Step (3.3): after transparent network AP receives network authentication request message; Whether whether the Vendor Specific information unit in the checking message comprises " transparent computing system sign " (54:72:61:6e), should ask from transparent computing system client to judge.If not the message of transparent computing system client, then directly this network authentication request message is abandoned; If the request message of transparent computing system client; Then extract the authorization information in the message; Handle the form assembling network verification response message of back, insert transparent network information in the VendorSpecific information unit in the network verification response message according to Authentication message; " transparent computing system sign " field is inserted " 54:72:61:6e ", other field zero setting in the transparent network information; After transparent network information is filled in and finished this network verification response message is returned to client.
Step (3.4): after client was received the network verification response message, whether whether the Vendor Specific information unit in the inspection message comprised " transparent computing system sign " (54:72:61:6e), be transparent network to judge this network.Message for nontransparent network directly abandons; For the message of transparent network, from message, extract the checking result, will verify that the result is shown to the user.If verify successfully, then change step (4) over to; If authentication failed then changes step (3.1) over to, the prompting user reselects transparent network.
Above-mentioned step (3.2) and step (3.3) have constituted a reciprocal process of network authentication request message and network verification response message.According to the difference of the indentification protocol of using, the mutual number of times of network authentication request message and network verification response message is different.For some agreement, possibly exist repeatedly reciprocal process.
Table 5Authentication message format
Sequence number |
Information unit |
Describe |
1 |
Authentication?Algorithm?Number |
Identify different indentification protocols |
2 |
Authentication?Transaction?Sequence Number |
The present located Qualify Phase is described |
3 |
Status?Code |
Whether the indication checking is successful |
4 |
Challenge?Text |
The challenge text that uses in the network verification process |
Last |
Vendor?Specific |
Manufacturer's self-defined information |
Step (4): client is selected the user and the successful transparent network of checking is tested, if transparent network satisfies the demand of client remote activation, then changes step (5), otherwise goes back to step (3).
This step prevents that transparent network that the user selects from can not effectively support the demand of client remote activation because the network bandwidth is low excessively, network delay is excessive, and concrete steps are as shown in Figure 2, comprising:
Step (4.1): the Client-Prompt user selects to test the parameter type of use, comprises two kinds of custom parameter and system default parameters; If the user selects custom parameter, then change step (4.2) over to; If user's selective system default parameters then changes step (4.3) over to.
Step (4.2): the Client-Prompt user imports following four test parameters successively: the minimum average bandwidth that the time that the ID of the operating system that test, test continue, test allow and the maximum average delay of permission; After user's input finished, four test parameters were set to user input values, change step (4.4) over to.
Step (4.3): test parameter is set to the system default parameter, comprising: minimum average bandwidth (300Kbps) that the time (15s) that the ID of the operating system that test (ID of first operating system of this network support), test continue, test allow and the maximum average delay (10ms) that allows.
Step (4.4): user end to server sends test beginning request message; This message format is as shown in table 6, includes the test parameter that step (4.2) or step (4.3) are provided with in the message: time, the minimum average bandwidth of permission and the maximum average delay of permission that the operating system ID of test, test continue.
Table 6 test beginning request message
The territory |
Length (byte) |
Describe |
?Type |
1 |
Type of message (value is 1) |
?OSID |
2 |
The ID of the operating system of test |
?Duration |
2 |
Time (the unit: s) that test continues |
?MinThroughput |
8 |
Minimum average bandwidth (the unit: bit/s) that allows |
?MaxDelay |
2 |
Maximum average delay (the unit: ms) that allows |
Step (4.5): after server was received test beginning request message, the solicited message of record client was returned test beginning response message, and form is as shown in table 7.Include first read-write requests information that client will be sent in the test beginning response message, read-write requests information comprises:
1) action type: read request/write request;
2) original position: the original position of the disk of read-write requests operation;
3) working length: the data length that reads or writes.
The action type first time (NextOptType), original position (NextOffset) and working length (NextSize) in the test beginning response message is to read and write daily record from the start-up course of server to obtain, and back literary composition will be described this.
Table 7 test beginning response message
The territory |
Length (byte) |
Describe |
?Type |
1 |
Type of message (value is 2) |
?OSID |
2 |
The ID of the operating system of testing |
?Duration |
2 |
Time (the unit: s) that test continues |
?MinThroughput |
8 |
Minimum average bandwidth (the unit: bit/s) that allows |
?MaxDelay |
2 |
Maximum average delay (the unit: ms) that allows |
?NextOptType |
1 |
For the first time action type (value be 1 o'clock for writing request, be 0 o'clock be read request) |
?NextOffset |
8 |
The original position of the disk of read-write requests operation for the first time |
?NextSize |
2 |
The data length that reads or writes for the first time |
Step (4.6): client is sent read-write requests message to server after receiving test beginning response message, picks up counting.The form of read-write requests message is as shown in table 8.The test returned by server of action type, original position, the working length of read-write requests message for the first time begins response message and obtains.For writing request, according to the value of Size with the corresponding length zero setting in Data territory.
Table 8 read-write requests message format
The territory |
Length (byte) |
Describe |
Type |
1 |
Type of message (value is 3) |
OSID |
2 |
The ID of the operating system of test |
TimeStamp |
8 |
The time of message delivery time client |
OptType |
1 |
Action type (value be 1 o'clock for writing request, be 0 o'clock be read request) |
Offset |
8 |
The original position of the disk of read-write requests operation |
Size |
2 |
The data length that reads or writes |
Data |
0~1482 |
When writing request this is arranged |
Step (4.7): server returns the read-write response message to client after receiving the read-write requests message of client.The form of read-write response message is as shown in table 9.The same with test beginning response message; The next operation type (NextOptType) of read-write in the response message, original position (NextOffset) is to read and write daily record from the start-up course of server to obtain with next operation length (NextSize) next time, and back literary composition will be described this.For read request, according to the value of Size with the corresponding length zero setting in Data territory.
Table 9 read-write response message
The territory |
Length (byte) |
Describe |
Type |
1 |
Type of message (value is 4) |
OSID |
2 |
The ID of the operating system of testing |
OptType |
1 |
This action type (value be 1 o'clock for writing request, be 0 o'clock be read request) |
Offset |
8 |
The original position of the disk of this read-write requests operation |
Size |
2 |
The data length of this read-write |
NextOptType |
1 |
The next operation type (value be 1 o'clock for writing request, be 0 o'clock be read request) |
NextOffset |
8 |
The original position of the disk of read-write requests operation next time |
NextSize |
2 |
The data length that next time reads or writes |
Data |
0~1482 |
The response message of read request just has this |
Step (4.8): after client is received the read-write response message of server; Extract the reading writing information (OptType, Offset, Size) in the message; If the read-write requests message that this reading writing information and client the last time send is different, then ignores this read-write response message, otherwise extract NextOptType in the read-write response message, NextOffset, NextSize as next time reading writing information; Insert read-write requests message, mail to server.For writing request, according to the value of Size with the corresponding length zero setting in Data territory.
For the statistical test result; Embodiment has defined three variablees and has come record test data: the total amount of data of using the current success of variable TotalSize record to read and write; Total time-delay of using TotalDelay to write down current read-write requests; Use total number of TotalRequests record read-write requests, the initial value of above-mentioned three variablees is 0.
Client is obtained the Size value in the read-write response message when receiving each read-write response message, upgrade three variablees as follows:
TotalSize=TotalSize+Size;
TotalDelay=TotalDelay+ (current time-TimeStamp);
TotalRequests=TotalRequests+1;
TimeStamp in the following formula is the time (seeing the TimeStamp item in the table 8) of client client when sending the read-write requests message corresponding to this read-write response message.
In above-mentioned step (4.5) and step (4.7), server is confirmed client read-write requests information next time at every turn as follows:
1) in client remote activation operating system process, each read-write requests of client under the server record deposits start-up course read-write daily record successively in, and table 10 is examples of one section start-up course read-write daily record.
2) 1) afterwards, as client-requested test and 1) in during the identical operations system, article one recording start of reading and writing daily record from corresponding start-up course reads next bar record successively, as the read-write requests next time of client.First line item of the daily record of the corresponding start-up course read-write of action type (NextOptType), original position (NextOffset) and working length (NextSize) for the first time in the step (4.5).Each in the step (4.7) confirmed next operation type (NextOptType), original position (NextOffset) and next operation length (NextSize) then are to begin to read successively from second line item that start-up course is read and write daily record next time.
3) if before the operating system of client-requested test not by the remote activation mistake, then server produces client read-write requests message next time at random.The distribution principle that produces at random is following:
(a) action type: read request, the request of writing respectively account for 50%;
(b) original position: the original position of read-write is evenly distributed in the disk scope;
(c) working length: the length that reads and writes data is 1KB.
Table 10 start-up course read-write daily record
Sequence number |
Action type |
Original position (byte) |
Working length (byte) |
1 |
Read |
8510485762 |
572 |
2 |
Write |
2469852352 |
1242 |
3 |
Write |
1323741824 |
748 |
... |
|
|
|
Step (4.9): judge whether test finishes: when timing arrived the time that the test of appointment continues, client stopped to send read-write requests message, and simultaneously, user end to server sends the EOT request message; Otherwise change step (4.8).
Table 11 EOT request message
The territory |
Length (byte) |
Describe |
Type |
1 |
Type of message (value is 5) |
OSID |
2 |
The ID of the operating system of test |
Step (4.10): after server is received the EOT request message of client, send the EOT response message to client.The form of EOT response message is as shown in table 12.
Table 12 EOT response message
The territory |
Length (byte) |
Describe |
Type |
1 |
Type of message (value is 6) |
OSID |
2 |
The ID of the operating system of test |
Step (4.11): after client received that server test finishes response message, the statistical test data were sent the test result request message to server.The form of test result request message is as shown in table 13.
Table 13 test result request message
The territory |
Length (byte) |
Describe |
Type |
1 |
Type of message (value is 7) |
OSID |
2 |
The ID of the operating system of test |
AvgThroughput |
8 |
The average bandwidth of this test |
AvgDelay |
2 |
The average delay of this test |
Averaging network bandwidth, the AvgDelay that AvgThroughput in the test result message refers to client in the test process refers to the average delay of each read-write requests message of client; Three variable: TotalSize in the integrating step (4.8), TotalDelay, TotalRequests, calculate acquisition through following mode:
AvgThroughput=TotalSize/Duration;
AvgDelay=TotalDelay/TotalRequests;
(Duration in the following formula is the time that test continues, and sees table 6.)
Step (4.12): after server is received the test result request message of client, send the test result response message to client.The form of test result response message is as shown in table 14.
Table 14 test result response message
The territory |
Length (byte) |
Describe |
Type |
1 |
Type of message (value is 8) |
OSID |
2 |
The ID of the operating system of test |
?AvgThroughput |
8 |
The average bandwidth of this test |
?AvgDelay |
2 |
The average delay of this test |
Step (4.13): after client is received the test result response message, judge whether whether test result satisfies the remote activation requirement, promptly meet the following conditions simultaneously:
1) average bandwidth in the test result is not less than the minimum average bandwidth (AvgThroughput>=MinThroughput) of permission;
2) average delay in the test result is not higher than the maximum average delay (AvgDelay<=MaxDelay) of permission.
If satisfy, then forward step (5) to; Otherwise forward step (3.1) to, the user reselects transparent network.
Step (5): the start-up code of chip guide obtains the sign of this client from server.
Step (6): client is downloaded a script explanation program and load operating from server.
Step (7): under the environment of above-mentioned script explanation program running, carry out, let the user need select the operating system of loading through explanation to language scripts.
Step (8): client is from server down operation system kernel mirror image and load operating.In downloading process, server can write down each read-write requests of client, as start-up course read-write daily record, uses when having client to carry out same operating system testing later on.Table 10 is examples of one section start-up course read-write daily record.In above-mentioned step (4.5) and step (4.7), read the information in the start-up course read-write daily record just.In downloading process, server also can write down the bandwidth in the client terminal start-up process, and the content that record comprises is as shown in Tble 15.After download finishes, calculate the average bandwidth (the startup bandwidth record of other operating system that has had before comprehensive) of all operations system remote startup of this server support according to the bandwidth in the start-up course." bandwidth of the last remote activation of each operating system of support " among the Vendor-specific Content in the ProbeResponse message that web search stage transparent network AP (wireless network card of server) sends, " average bandwidth of the last remote activation of all operations system of support " are exactly to obtain thus.Start-up course read-write daily record can be stored in the databases such as MySQL, Oracle with startup bandwidth record, also can store with document form.Present embodiment is stored in the text.
Table 15 starts the bandwidth record
Title |
Describe |
OSID |
Operating system ID |
OSName |
OS name |
SSID |
Network identity |
ClientID |
Client identification |
Throughput |
The bandwidth of start-up course |
So far, all implementation steps of present embodiment have all been carried out detailed explanation.The present invention is not limited to the foregoing description, and those skilled in the art all are regarded as within scope of the present invention in the technical scheme of carrying out on the basis that does not break away from the substantive thought of the present invention obtaining after various modifications and the improvement.Applicable scope of the present invention is as the criterion with claims and confirms.