CN102811169A - Virtual private network (VPN) implementation method and system for performing multi-core parallel processing by using Hash algorithm - Google Patents

Virtual private network (VPN) implementation method and system for performing multi-core parallel processing by using Hash algorithm Download PDF

Info

Publication number
CN102811169A
CN102811169A CN2012102571709A CN201210257170A CN102811169A CN 102811169 A CN102811169 A CN 102811169A CN 2012102571709 A CN2012102571709 A CN 2012102571709A CN 201210257170 A CN201210257170 A CN 201210257170A CN 102811169 A CN102811169 A CN 102811169A
Authority
CN
China
Prior art keywords
vpn
hash
data message
processor core
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012102571709A
Other languages
Chinese (zh)
Other versions
CN102811169B (en
Inventor
罗俊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Westone Information Industry Inc
Original Assignee
Chengdu Westone Information Industry Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Westone Information Industry Inc filed Critical Chengdu Westone Information Industry Inc
Priority to CN201210257170.9A priority Critical patent/CN102811169B/en
Publication of CN102811169A publication Critical patent/CN102811169A/en
Application granted granted Critical
Publication of CN102811169B publication Critical patent/CN102811169B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention relates to the technical field of virtual private network (VPN), and discloses a VPN implementation method and a VPN implementation system for performing multi-core parallel processing by using a Hash algorithm. The method specifically comprises the following steps of: constructing a Hash bucket according to the number of processor cores in a VPN system, wherein the depth of the Hash bucket is equal to the number of the processor cores, and each Hash value in the Hash bucket corresponds to the number of a processor core; calculating a Hash value according to a quintuple of a received data message, and finding a corresponding processor core according to the Hash value; and transmitting the data message to the corresponding processor core for processing, wherein the quintuple comprises a source Internet protocol (IP) address, a destination IP address, a source transmission layer port, a destination transmission layer port and an IP message protocol number. Compared with the prior art, the method and the system have the advantages that the utilization efficiency of a plurality of processor cores can be greatly improved, a plurality of data streams can be encrypted and decrypted in parallel, and the high throughput of the VPN is ensured.

Description

Adopt hash algorithm to carry out VPN implementation method and system that multi-core parallel concurrent is handled
Technical field
The present invention relates to the VPN technologies field, relate in particular to a kind of hash algorithm that adopts and carry out VPN implementation method and system that multi-core parallel concurrent is handled.
Background technology
VPN (Virtual Private Network; Be called for short VPN) be the abbreviation of VPN; At present, the Network Security Device on the market has gradually adopted the multi-core platform that is equipped with a plurality of hardware processor nuclears, to scheme to improve the throughput of network data; The equipment of this computation-intensive of IPSEC VPN particularly, the introducing of a plurality of processor cores should produce effect to improving whole system encryption and decryption transmission throughput very much.But effect and bad in practical application, otherwise be exactly that network card data is concentrated and sent indivedual or minority processor core to, however be exactly each data message very at random pass to different processor cores.The former causes being responsible for the serious imbalance of load distribution, thereby the multinuclear utilance is lower, the actual change of multinuclear monokaryon.The latter causes data message out of order serious; Because the used time difference of the data encrypting and deciphering of different message lengths is very big; This can cause frequent insignificant re-transmission for very unfavorable based on the higher application of reliability requirements such as TCP, and whole efficiency of transmission is sharply reduced.
Summary of the invention
The low technical problem that reaches poor reliability of nuclear utilance when handling to multinuclear in the vpn system that exists in the prior art the invention discloses a kind of hash algorithm that adopts and carries out the VPN implementation method that multi-core parallel concurrent is handled.Another object of the present invention provides a kind of hash algorithm that adopts and carries out the vpn system that multi-core parallel concurrent is handled.
The object of the invention is realized through following technical proposals:
A kind of hash algorithm that adopts carries out the VPN implementation method that multi-core parallel concurrent is handled; It specifically comprises following steps: the number according to processor core in the vpn system makes up hash; The degree of depth of hash equals the number of processor core, and a numbering of the corresponding processor core of each cryptographic hash in the hash calculates cryptographic hash according to the five-tuple of the data message that receives; And find out corresponding processing device nuclear according to cryptographic hash, data message is sent to corresponding processing device nuclear handle; Wherein: five-tuple comprises source and destination IP address, source and destination transport layer port and IP message protocol number.
More enter a ground, above-mentioned each processor core is created a VPN strategy separately, when processor core is received data message, searches the corresponding VPN strategy of data message, according to searching the VPN strategy that obtains the data message is handled.
More enter a ground, said method also is included as each cryptographic hash and distributes a fifo queue, and processor core takes out data and handles from fifo queue, and the data message after the processing is delivered to network interface card and sends.
More enter a ground; Said method also is included as each processor core the data payload processing upper limit is set; This upper limit is according to the average treatment load decision of the computing capability of monokaryon and a plurality of nuclears, in case data payload exceeds the processing upper limit, is about to data message and transfers to the lightest nuclear of load and handle.
More enter a ground, above-mentioned VPN strategy search the VPN Policy List of preferentially searching this processor core, can not the matched data message further search the VPN Policy List of other processor cores more one by one.
More enter a ground, the computing formula of above-mentioned cryptographic hash is following:
Figure 2012102571709100002DEST_PATH_IMAGE002
Wherein hash depth B D equals the number of the processor core of equipment, and the data message source IP address is that Sip, source port are that Sport, purpose IP address are that Dip, destination interface are that Dport and protocol number are Proto.
The invention also discloses a kind of system of above-mentioned VPN implementation method; Said system comprises: initialization module, data distribution module, data processing module and data transmission blocks; Said initialization module, data distribution module, data processing module and data transmission blocks connect in regular turn; Said initialization module is used to make up hash, and for fifo queue of each cryptographic hash distribution, for each processor core is created independently VPN Policy List; Said data distribution module is used for undressed data message that network interface card is received; Adopt hash algorithm to shunt processing according to the number of processor core and the five-tuple of data message, the data message that will have same cryptographic hash deposits same fifo queue in; Said data processing module carries out the encryption and decryption of VPN to be handled with the encapsulation decapsulation; Data message after said data transmission blocks will be handled passes to network interface card and sends.
Beneficial effect of the present invention: the present invention is through with the data message that receives; Adopt hash algorithm to shunt processing according to the number of processor core and the five-tuple of data message; And keep independently VPN Policy List for each processor core; Distribute to different processor core to different data flow and handle, distribute a FIFO (first in first out) formation realizing the order-preserving of same data flow data message for each cryptographic hash simultaneously, thereby can greatly improve the utilization ratio that multiprocessor is examined; Realize the parallel encryption and decryption processing of multiple data stream, reach very high VPN throughput.
Description of drawings
Fig. 1 is that the employing hash algorithm that the embodiment of the invention provides carries out the VPN realization flow figure that multi-core parallel concurrent is handled.
Fig. 2 is that the employing hash algorithm that the embodiment of the invention provides carries out the VPN concrete grammar that multi-core parallel concurrent is handled.
Fig. 3 is the structure chart that employing hash algorithm that the embodiment of the invention provides carries out the vpn system that multi-core parallel concurrent handles.
Embodiment
In order to make the object of the invention, technical scheme and advantage clearer,, the present invention is further elaborated below in conjunction with accompanying drawing and embodiment.Should be appreciated that specific embodiment described herein only in order to explanation the present invention, and be not used in qualification the present invention.
Fig. 1 is that the employing hash algorithm that the embodiment of the invention provides carries out the VPN realization flow figure that multi-core parallel concurrent is handled.
The invention discloses a kind of hash algorithm that adopts and carry out the VPN implementation method that multi-core parallel concurrent is handled; It specifically comprises following steps: the number according to processor core in the vpn system makes up hash, and the degree of depth of hash equals the number of processor core, a numbering of the corresponding processor core of each cryptographic hash in the hash; For example cryptographic hash is 1 corresponding processor core 1; Cryptographic hash is 2 corresponding processor core 2 ..., by that analogy.Five-tuple according to the data message that receives calculates cryptographic hash; And find out corresponding processing device nuclear according to cryptographic hash; And data message is sent to processor core handle, wherein: five-tuple comprises source and destination IP address, source and destination transport layer port and IP message protocol number.Calculate cryptographic hash according to above-mentioned five-tuple.Through making up hash to processor core, and adopt hash algorithm that the data message is shunted, greatly improved the utilization ratio of multiprocessor nuclear, realize that the parallel encryption and decryption of multiple data stream handles, reach very high VPN throughput.
Further, said each processor core is created a VPN strategy separately, when processor core is received data message, searches the corresponding VPN strategy of data message, according to searching the VPN strategy that obtains the data message is handled.On each processor core, create separately the VPN strategy, after processor core is received data message, can find out corresponding VPN strategy fast and handle, increased the efficient of parallel processing.
Further, said method also is included as each cryptographic hash and distributes a fifo queue, and processor core takes out data and handles from fifo queue, and the data message after the processing is delivered to network interface card and sends.Adopt the form of formation to preserve data message, realize the order-preserving of same data flow data message, further improved the efficient of parallel processing.
Further; For being provided with data payload, each processor core handles the upper limit; This upper limit is according to the average treatment load decision of the computing capability of monokaryon and a plurality of nuclears, in case data payload exceeds the processing upper limit, is about to data message and transfers to the lightest nuclear of load and handle.Thereby the data message of a big data flows of traffic can be by a plurality of nuclear parallel processings.
Further, said VPN strategy search the VPN Policy List of preferentially searching this processor core, can not the matched data message further search the VPN Policy List of other processor cores more one by one.So also be the efficient that has further improved parallel processing.
Further, the computing formula of said cryptographic hash can but be not limited to
Figure DEST_PATH_IMAGE003
Wherein hash depth B D equals the number of the processor core of equipment, and then any source IP address is that Sip, source port are that Sport, purpose IP address are that Dip, destination interface are that Dport and protocol number are Proto.Through above-mentioned hash function the parameter maps of five-tuple is become cryptographic hash, find the processor core of data message through cryptographic hash.
The employing hash algorithm that Fig. 2 shows the embodiment of the invention to be provided carries out the concrete grammar that multi-core parallel concurrent is handled, and details are as follows:
In step S201, make up hash according to the processor core number, for each processor core is created independently VPN Policy List, and be each cryptographic hash distribution FIFO (first in first out) formation according to the degree of depth (corresponding to the number of processor) of hash.
In step S202; When network interface card interrupts taking place; The data message that network interface card receives adopts hash algorithm to shunt processing according to the number of processor core and the five-tuple of data message (source and destination IP address, source and destination transport layer port and IP message protocol number), distributes to different processor cores to different data flow and handles.
In step S203, each processor is verified and is looked for the VPN Policy List, according to searching the VPN strategy that obtains the data message is handled.(preferentially search the VPN Policy List of this processor core, can not the matched data message further search the VPN Policy List of other processor cores more one by one)
In step S204, each processor core is according to the principle of first in first out, and the data message that taking-up has been handled from the fifo queue of correspondence is delivered to network interface card and sends.
Fig. 3 is the structure chart that employing hash algorithm that the embodiment of the invention provides carries out the vpn system that multi-core parallel concurrent handles.
The invention also discloses a kind of hash algorithm that adopts and carry out the vpn system that multi-core parallel concurrent is handled; Said system comprises: initialization module 321, data distribution module 322, data processing module 323 and data transmission blocks 324; Said initialization module 321, data distribution module 322, data processing module 323 and data transmission blocks 324 connect in regular turn; Said initialization module 321 is used for making up hash according to the number of processor core; The degree of depth of hash is corresponding to the number of processor core, is that each cryptographic hash is distributed a FIFO (first in first out) formation, and creates independently VPN Policy List for each processor core; Said data distribution module; Be used for undressed data message that network interface card is received; Adopt hash algorithm to shunt processing according to the number of processor core and the five-tuple of data message (source and destination IP address, source and destination transport layer port and IP message protocol number); The data message that will have same cryptographic hash deposits same fifo queue in and is labeled as " being untreated ", handles thereby distribute to different processor cores to different data flow.If having exceeded, the load of this processor core handles the upper limit (this upper limit is according to the computing capability of monokaryon and the average treatment load decision of a plurality of nuclears); Then this data message pointer is passed to the lightest processor core of load through the mode of interrupting between processor; Handle by this processor core, but still it is constant in the order of former fifo queue to keep this data message.
Carry out the encryption and decryption of IPSEC VPN and encapsulate decapsulation handling by data processing module after data message shunting and the mark.Each processor core can move the data processing module of a same code; Be used for taking out data message from the fifo queue of correspondence; And search the VPN strategy and it is carried out processing such as IPSEC encryption and decryption and encapsulation decapsulation, the data message that disposes is labeled as " handling ".The data message of the overweight nuclear of the load of coming through interrupt delivery between processor is also accepted and handled to each processor core.
According to the principle of first in first out and the mode of poll the data message that is labeled as " handling " in each fifo queue is passed to the network interface card transmission by data transmission blocks at last.
Here the present invention is described in detail through concrete examples of implementation; Provide the description of the foregoing description to make or be suitable for the present invention in order to make those skilled in the art, the various modifications of these embodiment are to understand easily for a person skilled in the art.The present invention is not limited to these examples, or some aspect wherein.Scope of the present invention is elaborated through additional claim.
Above-mentioned explanation illustrates and has described a preferred embodiment of the present invention; But as previously mentioned; Be to be understood that the present invention is not limited to the form that this paper discloses, should do not regard eliminating as, and can be used for various other combinations, modification and environment other embodiment; And can in invention contemplated scope described herein, change through the technology or the knowledge of above-mentioned instruction or association area.And change that those skilled in the art carried out and variation do not break away from the spirit and scope of the present invention, then all should be in the protection range of accompanying claims of the present invention.

Claims (7)

1. one kind is adopted hash algorithm to carry out the VPN implementation method that multi-core parallel concurrent is handled; It specifically comprises following steps: the number according to processor core in the vpn system makes up hash; The degree of depth of hash equals the number of processor core, and a numbering of the corresponding processor core of each cryptographic hash in the hash calculates cryptographic hash according to the five-tuple of the data message that receives; And find out corresponding processing device nuclear according to cryptographic hash, data message is sent to corresponding processing device nuclear handle; Wherein: five-tuple comprises source and destination IP address, source and destination transport layer port and IP message protocol number.
2. employing hash algorithm as claimed in claim 1 carries out the VPN implementation method that multi-core parallel concurrent is handled; It is characterized in that said each processor core VPN strategy of establishment separately; When processor core is received data message; Search the corresponding VPN strategy of data message, the data message is handled according to searching the VPN strategy that obtains.
3. employing hash algorithm as claimed in claim 1 carries out the VPN implementation method that multi-core parallel concurrent is handled; It is characterized in that said method also is included as each cryptographic hash and distributes a fifo queue; Processor core takes out data and handles from fifo queue, the data message after the processing is delivered to network interface card and sends.
4. employing hash algorithm as claimed in claim 1 carries out the VPN implementation method that multi-core parallel concurrent is handled; It is characterized in that said method also is included as each processor core the data payload processing upper limit is set; This upper limit is according to the computing capability of monokaryon and the average treatment load decision of a plurality of nuclears; In case data payload exceeds the processing upper limit, be about to data message and transfer to the lightest nuclear of load and handle.
5. employing hash algorithm as claimed in claim 1 carries out the VPN implementation method that multi-core parallel concurrent is handled; The VPN Policy List of preferentially searching this processor core of searching that it is characterized in that said VPN strategy can not the matched data message be further searched the VPN Policy List of other processor cores more one by one.
6. carry out the VPN implementation method that multi-core parallel concurrent is handled like the described employing hash algorithm of any claim of claim 1-5, it is characterized in that the computing formula of said cryptographic hash is following:
Wherein hash depth B D equals the number of the processor core of equipment, and the data message source IP address is that Sip, source port are that Sport, purpose IP address are that Dip, destination interface are that Dport and protocol number are Proto.
7. system that realizes any said VPN implementation method of claim of claim 1-5; It is characterized in that said system comprises: initialization module, data distribution module, data processing module and data transmission blocks; Said initialization module, data distribution module, data processing module and data transmission blocks connect in regular turn; Said initialization module is used to make up hash; And for fifo queue of each cryptographic hash distribution, for each processor core is created independently VPN Policy List; Said data distribution module is used for undressed data message that network interface card is received; Adopt hash algorithm to shunt processing according to the number of processor core and the five-tuple of data message, the data message that will have same cryptographic hash deposits same fifo queue in; Said data processing module carries out the encryption and decryption of VPN to be handled with the encapsulation decapsulation; Data message after said data transmission blocks will be handled passes to network interface card and sends.
CN201210257170.9A 2012-07-24 2012-07-24 Virtual private network (VPN) implementation method and system for performing multi-core parallel processing by using Hash algorithm Expired - Fee Related CN102811169B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210257170.9A CN102811169B (en) 2012-07-24 2012-07-24 Virtual private network (VPN) implementation method and system for performing multi-core parallel processing by using Hash algorithm

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210257170.9A CN102811169B (en) 2012-07-24 2012-07-24 Virtual private network (VPN) implementation method and system for performing multi-core parallel processing by using Hash algorithm

Publications (2)

Publication Number Publication Date
CN102811169A true CN102811169A (en) 2012-12-05
CN102811169B CN102811169B (en) 2015-05-27

Family

ID=47234748

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210257170.9A Expired - Fee Related CN102811169B (en) 2012-07-24 2012-07-24 Virtual private network (VPN) implementation method and system for performing multi-core parallel processing by using Hash algorithm

Country Status (1)

Country Link
CN (1) CN102811169B (en)

Cited By (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103049336A (en) * 2013-01-06 2013-04-17 浪潮电子信息产业股份有限公司 Hash-based network card soft interrupt and load balancing method
CN103414556A (en) * 2013-08-16 2013-11-27 成都卫士通信息产业股份有限公司 IKE key agreement strategy searching method
CN104734993A (en) * 2013-12-24 2015-06-24 杭州华为数字技术有限公司 Data distribution method and distributor
CN105159779A (en) * 2015-08-17 2015-12-16 深圳中兴网信科技有限公司 Method and system for improving data processing performance of multi-core CPU
WO2016011894A1 (en) * 2014-07-25 2016-01-28 华为技术有限公司 Message processing method and apparatus
WO2016041447A1 (en) * 2014-09-15 2016-03-24 华为技术有限公司 Multicore processor chip-based data processing method, device, and system
CN105939312A (en) * 2015-08-26 2016-09-14 杭州迪普科技有限公司 Data transmission method and device
CN105975433A (en) * 2016-06-30 2016-09-28 瑞斯康达科技发展股份有限公司 Message processing method and device
CN106899512A (en) * 2017-02-15 2017-06-27 北京浩瀚深度信息技术股份有限公司 Multi engine realization method and system based on DPI in FPGA
CN107483362A (en) * 2017-07-11 2017-12-15 郑州云海信息技术有限公司 A kind of method for dispatching message based on shift register
CN107707479A (en) * 2017-10-31 2018-02-16 北京锐安科技有限公司 The lookup method and device of five-tuple rule
CN107846364A (en) * 2016-09-19 2018-03-27 阿里巴巴集团控股有限公司 A kind for the treatment of method and apparatus of message
CN108306832A (en) * 2018-01-29 2018-07-20 北京启明星辰信息安全技术有限公司 A kind of network flow quantity shunting method and device
CN108667733A (en) * 2018-03-29 2018-10-16 新华三信息安全技术有限公司 A kind of network equipment and message processing method
CN108718259A (en) * 2018-05-30 2018-10-30 新华三信息安全技术有限公司 A kind of message processing method and multi-core processor
CN109062684A (en) * 2018-07-04 2018-12-21 南京南大光电工程研究院有限公司 A kind of real-time dynamic self-adapting dynamic load balancing method of release of the hardware of multi-core processor
CN109327405A (en) * 2017-07-31 2019-02-12 迈普通信技术股份有限公司 Message order-preserving method and the network equipment
CN110601950A (en) * 2019-10-08 2019-12-20 河南省云安大数据安全防护产业技术研究院有限公司 VPN gateway system based on DTLS protocol and implementation method
CN110650020A (en) * 2019-09-25 2020-01-03 天津市滨海新区信息技术创新中心 Mimicry fuzzy decision method, device and system
CN111669374A (en) * 2020-05-25 2020-09-15 成都安恒信息技术有限公司 Encryption and decryption performance expansion method for single tunnel software of IPsec VPN
CN112383480A (en) * 2020-10-29 2021-02-19 曙光网络科技有限公司 Flow table processing method and device, monitoring device and storage medium
CN112714069A (en) * 2021-01-06 2021-04-27 上海交通大学 Method for lowering shunting module to network card hardware in IPSec security gateway environment
CN113296705A (en) * 2021-05-27 2021-08-24 浙江萤火虫区块链科技有限公司 Architecture system for parallel computing Poseidon Hash in Filecin
CN113347230A (en) * 2021-05-13 2021-09-03 长沙星融元数据技术有限公司 Load balancing method, device, equipment and medium based on programmable switch
CN113504989A (en) * 2021-07-08 2021-10-15 山东科技大学 Multi-core parallel processing method for near-bottom multi-beam orthogonal demodulation processing
CN113626160A (en) * 2021-07-07 2021-11-09 厦门市美亚柏科信息股份有限公司 Network data packet high-concurrency processing method and system based on cavium processor
CN116016035A (en) * 2023-02-16 2023-04-25 北京天维信通科技有限公司 Method for applying multipath service in same tunnel by utilizing quintuple

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101964749A (en) * 2010-09-21 2011-02-02 北京网康科技有限公司 Message retransmission method and system based on multi-core architecture
CN102104544A (en) * 2011-01-25 2011-06-22 无锡网芯科技有限公司 Order preserving method for fragmented message flow in IP (Internet Protocol) tunnel of multi-nuclear processor with accelerated hardware
US20110153724A1 (en) * 2009-12-23 2011-06-23 Murali Raja Systems and methods for object rate limiting in multi-core system
CN102483707A (en) * 2009-06-22 2012-05-30 思杰系统有限公司 Systems and methods for retaining source ip in a load balancing mutli-core environment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102483707A (en) * 2009-06-22 2012-05-30 思杰系统有限公司 Systems and methods for retaining source ip in a load balancing mutli-core environment
US20110153724A1 (en) * 2009-12-23 2011-06-23 Murali Raja Systems and methods for object rate limiting in multi-core system
CN101964749A (en) * 2010-09-21 2011-02-02 北京网康科技有限公司 Message retransmission method and system based on multi-core architecture
CN102104544A (en) * 2011-01-25 2011-06-22 无锡网芯科技有限公司 Order preserving method for fragmented message flow in IP (Internet Protocol) tunnel of multi-nuclear processor with accelerated hardware

Cited By (40)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103049336A (en) * 2013-01-06 2013-04-17 浪潮电子信息产业股份有限公司 Hash-based network card soft interrupt and load balancing method
CN103414556A (en) * 2013-08-16 2013-11-27 成都卫士通信息产业股份有限公司 IKE key agreement strategy searching method
CN103414556B (en) * 2013-08-16 2016-06-01 成都卫士通信息产业股份有限公司 A kind of IKE key consulting tactical lookup method
CN104734993B (en) * 2013-12-24 2018-05-18 杭州华为数字技术有限公司 Data distribution method and current divider
CN104734993A (en) * 2013-12-24 2015-06-24 杭州华为数字技术有限公司 Data distribution method and distributor
WO2015096655A1 (en) * 2013-12-24 2015-07-02 华为技术有限公司 Data splitting method and splitter
US10097466B2 (en) 2013-12-24 2018-10-09 Huawei Technologies Co., Ltd. Data distribution method and splitter
WO2016011894A1 (en) * 2014-07-25 2016-01-28 华为技术有限公司 Message processing method and apparatus
CN105337896A (en) * 2014-07-25 2016-02-17 华为技术有限公司 Message processing method and device
WO2016041447A1 (en) * 2014-09-15 2016-03-24 华为技术有限公司 Multicore processor chip-based data processing method, device, and system
CN105589829A (en) * 2014-09-15 2016-05-18 华为技术有限公司 Data processing method based on multi-core processor chip, device and system
CN105159779A (en) * 2015-08-17 2015-12-16 深圳中兴网信科技有限公司 Method and system for improving data processing performance of multi-core CPU
CN105939312A (en) * 2015-08-26 2016-09-14 杭州迪普科技有限公司 Data transmission method and device
CN105975433A (en) * 2016-06-30 2016-09-28 瑞斯康达科技发展股份有限公司 Message processing method and device
CN105975433B (en) * 2016-06-30 2019-04-19 瑞斯康达科技发展股份有限公司 A kind of message processing method and device
CN107846364A (en) * 2016-09-19 2018-03-27 阿里巴巴集团控股有限公司 A kind for the treatment of method and apparatus of message
CN106899512A (en) * 2017-02-15 2017-06-27 北京浩瀚深度信息技术股份有限公司 Multi engine realization method and system based on DPI in FPGA
CN107483362A (en) * 2017-07-11 2017-12-15 郑州云海信息技术有限公司 A kind of method for dispatching message based on shift register
CN109327405A (en) * 2017-07-31 2019-02-12 迈普通信技术股份有限公司 Message order-preserving method and the network equipment
CN107707479A (en) * 2017-10-31 2018-02-16 北京锐安科技有限公司 The lookup method and device of five-tuple rule
CN107707479B (en) * 2017-10-31 2021-08-31 北京锐安科技有限公司 Five-tuple rule searching method and device
CN108306832A (en) * 2018-01-29 2018-07-20 北京启明星辰信息安全技术有限公司 A kind of network flow quantity shunting method and device
CN108667733A (en) * 2018-03-29 2018-10-16 新华三信息安全技术有限公司 A kind of network equipment and message processing method
CN108718259A (en) * 2018-05-30 2018-10-30 新华三信息安全技术有限公司 A kind of message processing method and multi-core processor
CN108718259B (en) * 2018-05-30 2020-07-03 新华三信息安全技术有限公司 Message processing method and multi-core processor
CN109062684A (en) * 2018-07-04 2018-12-21 南京南大光电工程研究院有限公司 A kind of real-time dynamic self-adapting dynamic load balancing method of release of the hardware of multi-core processor
CN110650020B (en) * 2019-09-25 2022-05-10 天津市滨海新区信息技术创新中心 Mimicry fuzzy decision method, device and system
CN110650020A (en) * 2019-09-25 2020-01-03 天津市滨海新区信息技术创新中心 Mimicry fuzzy decision method, device and system
CN110601950A (en) * 2019-10-08 2019-12-20 河南省云安大数据安全防护产业技术研究院有限公司 VPN gateway system based on DTLS protocol and implementation method
CN110601950B (en) * 2019-10-08 2021-06-01 河南省云安大数据安全防护产业技术研究院有限公司 VPN gateway system based on DTLS protocol and implementation method
CN111669374A (en) * 2020-05-25 2020-09-15 成都安恒信息技术有限公司 Encryption and decryption performance expansion method for single tunnel software of IPsec VPN
CN111669374B (en) * 2020-05-25 2022-05-27 成都安恒信息技术有限公司 Encryption and decryption performance expansion method for single tunnel software of IPsec VPN
CN112383480A (en) * 2020-10-29 2021-02-19 曙光网络科技有限公司 Flow table processing method and device, monitoring device and storage medium
CN112714069A (en) * 2021-01-06 2021-04-27 上海交通大学 Method for lowering shunting module to network card hardware in IPSec security gateway environment
CN113347230A (en) * 2021-05-13 2021-09-03 长沙星融元数据技术有限公司 Load balancing method, device, equipment and medium based on programmable switch
CN113296705A (en) * 2021-05-27 2021-08-24 浙江萤火虫区块链科技有限公司 Architecture system for parallel computing Poseidon Hash in Filecin
CN113626160A (en) * 2021-07-07 2021-11-09 厦门市美亚柏科信息股份有限公司 Network data packet high-concurrency processing method and system based on cavium processor
CN113504989A (en) * 2021-07-08 2021-10-15 山东科技大学 Multi-core parallel processing method for near-bottom multi-beam orthogonal demodulation processing
CN116016035A (en) * 2023-02-16 2023-04-25 北京天维信通科技有限公司 Method for applying multipath service in same tunnel by utilizing quintuple
CN116016035B (en) * 2023-02-16 2023-06-13 北京天维信通科技有限公司 Method for applying multipath service in same tunnel by utilizing quintuple

Also Published As

Publication number Publication date
CN102811169B (en) 2015-05-27

Similar Documents

Publication Publication Date Title
CN102811169B (en) Virtual private network (VPN) implementation method and system for performing multi-core parallel processing by using Hash algorithm
US11233778B2 (en) Secure forwarding of tenant workloads in virtual networks
US9686294B2 (en) Protection of communication on a vehicular network via a remote security service
CN105763557B (en) Exchange chip or NP cooperate with the method and system for completing message IPSEC encryption with CPU
CN101834840B (en) There is efficient key derivation system, the method and apparatus for end-to-end network security of business visuality
US11509638B2 (en) Receive-side processing for encapsulated encrypted packets
US11687375B2 (en) Technologies for hybrid field-programmable gate array application-specific integrated circuit code acceleration
US8474034B2 (en) Method and apparatus for fast check and update of anti-replay window without bit-shifting in internet protocol security
US8006297B2 (en) Method and system for combined security protocol and packet filter offload and onload
US11329966B2 (en) System and method for transferring packets between kernel modules in different network stacks
CN101051891A (en) Method and device for safety strategy uniformly treatment in safety gateway
US8175271B2 (en) Method and system for security protocol partitioning and virtualization
CN102065021B (en) IPSecVPN (Internet Protocol Security Virtual Private Network) realizing system and method based on NetFPGA (Net Field Programmable Gate Array)
CN1747380A (en) The block encryption data are decrypted
Kim et al. A case for smartnic-accelerated private communication
US20050063543A1 (en) Hardware acceleration for Diffie Hellman in a device that integrates wired and wireless L2 and L3 switching functionality
Apiecionek et al. Multi path transmission control protocols as a security solution
CN115174482B (en) Message distribution method and device of network equipment
CN103227742A (en) Method for IPSec (Internet protocol security) tunnel to rapidly process messages
CN101442470A (en) Method, system and equipment for establishing tunnel
CN104660592A (en) Load distributing method based on secure socket layer protocol characteristic
CN103685321B (en) Packet forwards and safety protection detection, load-balancing method and device
CN114039795B (en) Software defined router and data forwarding method based on same
CN204539191U (en) A kind of mobile router of ciphering type
CN105635145A (en) Chip-level safety protection method of CAPWAP DTLS tunnel

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20150527

Termination date: 20210724