CN102811169A - Virtual private network (VPN) implementation method and system for performing multi-core parallel processing by using Hash algorithm - Google Patents
Virtual private network (VPN) implementation method and system for performing multi-core parallel processing by using Hash algorithm Download PDFInfo
- Publication number
- CN102811169A CN102811169A CN2012102571709A CN201210257170A CN102811169A CN 102811169 A CN102811169 A CN 102811169A CN 2012102571709 A CN2012102571709 A CN 2012102571709A CN 201210257170 A CN201210257170 A CN 201210257170A CN 102811169 A CN102811169 A CN 102811169A
- Authority
- CN
- China
- Prior art keywords
- vpn
- hash
- data message
- processor core
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Abstract
The invention relates to the technical field of virtual private network (VPN), and discloses a VPN implementation method and a VPN implementation system for performing multi-core parallel processing by using a Hash algorithm. The method specifically comprises the following steps of: constructing a Hash bucket according to the number of processor cores in a VPN system, wherein the depth of the Hash bucket is equal to the number of the processor cores, and each Hash value in the Hash bucket corresponds to the number of a processor core; calculating a Hash value according to a quintuple of a received data message, and finding a corresponding processor core according to the Hash value; and transmitting the data message to the corresponding processor core for processing, wherein the quintuple comprises a source Internet protocol (IP) address, a destination IP address, a source transmission layer port, a destination transmission layer port and an IP message protocol number. Compared with the prior art, the method and the system have the advantages that the utilization efficiency of a plurality of processor cores can be greatly improved, a plurality of data streams can be encrypted and decrypted in parallel, and the high throughput of the VPN is ensured.
Description
Technical field
The present invention relates to the VPN technologies field, relate in particular to a kind of hash algorithm that adopts and carry out VPN implementation method and system that multi-core parallel concurrent is handled.
Background technology
VPN (Virtual Private Network; Be called for short VPN) be the abbreviation of VPN; At present, the Network Security Device on the market has gradually adopted the multi-core platform that is equipped with a plurality of hardware processor nuclears, to scheme to improve the throughput of network data; The equipment of this computation-intensive of IPSEC VPN particularly, the introducing of a plurality of processor cores should produce effect to improving whole system encryption and decryption transmission throughput very much.But effect and bad in practical application, otherwise be exactly that network card data is concentrated and sent indivedual or minority processor core to, however be exactly each data message very at random pass to different processor cores.The former causes being responsible for the serious imbalance of load distribution, thereby the multinuclear utilance is lower, the actual change of multinuclear monokaryon.The latter causes data message out of order serious; Because the used time difference of the data encrypting and deciphering of different message lengths is very big; This can cause frequent insignificant re-transmission for very unfavorable based on the higher application of reliability requirements such as TCP, and whole efficiency of transmission is sharply reduced.
Summary of the invention
The low technical problem that reaches poor reliability of nuclear utilance when handling to multinuclear in the vpn system that exists in the prior art the invention discloses a kind of hash algorithm that adopts and carries out the VPN implementation method that multi-core parallel concurrent is handled.Another object of the present invention provides a kind of hash algorithm that adopts and carries out the vpn system that multi-core parallel concurrent is handled.
The object of the invention is realized through following technical proposals:
A kind of hash algorithm that adopts carries out the VPN implementation method that multi-core parallel concurrent is handled; It specifically comprises following steps: the number according to processor core in the vpn system makes up hash; The degree of depth of hash equals the number of processor core, and a numbering of the corresponding processor core of each cryptographic hash in the hash calculates cryptographic hash according to the five-tuple of the data message that receives; And find out corresponding processing device nuclear according to cryptographic hash, data message is sent to corresponding processing device nuclear handle; Wherein: five-tuple comprises source and destination IP address, source and destination transport layer port and IP message protocol number.
More enter a ground, above-mentioned each processor core is created a VPN strategy separately, when processor core is received data message, searches the corresponding VPN strategy of data message, according to searching the VPN strategy that obtains the data message is handled.
More enter a ground, said method also is included as each cryptographic hash and distributes a fifo queue, and processor core takes out data and handles from fifo queue, and the data message after the processing is delivered to network interface card and sends.
More enter a ground; Said method also is included as each processor core the data payload processing upper limit is set; This upper limit is according to the average treatment load decision of the computing capability of monokaryon and a plurality of nuclears, in case data payload exceeds the processing upper limit, is about to data message and transfers to the lightest nuclear of load and handle.
More enter a ground, above-mentioned VPN strategy search the VPN Policy List of preferentially searching this processor core, can not the matched data message further search the VPN Policy List of other processor cores more one by one.
More enter a ground, the computing formula of above-mentioned cryptographic hash is following:
Wherein hash depth B D equals the number of the processor core of equipment, and the data message source IP address is that Sip, source port are that Sport, purpose IP address are that Dip, destination interface are that Dport and protocol number are Proto.
The invention also discloses a kind of system of above-mentioned VPN implementation method; Said system comprises: initialization module, data distribution module, data processing module and data transmission blocks; Said initialization module, data distribution module, data processing module and data transmission blocks connect in regular turn; Said initialization module is used to make up hash, and for fifo queue of each cryptographic hash distribution, for each processor core is created independently VPN Policy List; Said data distribution module is used for undressed data message that network interface card is received; Adopt hash algorithm to shunt processing according to the number of processor core and the five-tuple of data message, the data message that will have same cryptographic hash deposits same fifo queue in; Said data processing module carries out the encryption and decryption of VPN to be handled with the encapsulation decapsulation; Data message after said data transmission blocks will be handled passes to network interface card and sends.
Beneficial effect of the present invention: the present invention is through with the data message that receives; Adopt hash algorithm to shunt processing according to the number of processor core and the five-tuple of data message; And keep independently VPN Policy List for each processor core; Distribute to different processor core to different data flow and handle, distribute a FIFO (first in first out) formation realizing the order-preserving of same data flow data message for each cryptographic hash simultaneously, thereby can greatly improve the utilization ratio that multiprocessor is examined; Realize the parallel encryption and decryption processing of multiple data stream, reach very high VPN throughput.
Description of drawings
Fig. 1 is that the employing hash algorithm that the embodiment of the invention provides carries out the VPN realization flow figure that multi-core parallel concurrent is handled.
Fig. 2 is that the employing hash algorithm that the embodiment of the invention provides carries out the VPN concrete grammar that multi-core parallel concurrent is handled.
Fig. 3 is the structure chart that employing hash algorithm that the embodiment of the invention provides carries out the vpn system that multi-core parallel concurrent handles.
Embodiment
In order to make the object of the invention, technical scheme and advantage clearer,, the present invention is further elaborated below in conjunction with accompanying drawing and embodiment.Should be appreciated that specific embodiment described herein only in order to explanation the present invention, and be not used in qualification the present invention.
Fig. 1 is that the employing hash algorithm that the embodiment of the invention provides carries out the VPN realization flow figure that multi-core parallel concurrent is handled.
The invention discloses a kind of hash algorithm that adopts and carry out the VPN implementation method that multi-core parallel concurrent is handled; It specifically comprises following steps: the number according to processor core in the vpn system makes up hash, and the degree of depth of hash equals the number of processor core, a numbering of the corresponding processor core of each cryptographic hash in the hash; For example cryptographic hash is 1 corresponding processor core 1; Cryptographic hash is 2 corresponding processor core 2 ..., by that analogy.Five-tuple according to the data message that receives calculates cryptographic hash; And find out corresponding processing device nuclear according to cryptographic hash; And data message is sent to processor core handle, wherein: five-tuple comprises source and destination IP address, source and destination transport layer port and IP message protocol number.Calculate cryptographic hash according to above-mentioned five-tuple.Through making up hash to processor core, and adopt hash algorithm that the data message is shunted, greatly improved the utilization ratio of multiprocessor nuclear, realize that the parallel encryption and decryption of multiple data stream handles, reach very high VPN throughput.
Further, said each processor core is created a VPN strategy separately, when processor core is received data message, searches the corresponding VPN strategy of data message, according to searching the VPN strategy that obtains the data message is handled.On each processor core, create separately the VPN strategy, after processor core is received data message, can find out corresponding VPN strategy fast and handle, increased the efficient of parallel processing.
Further, said method also is included as each cryptographic hash and distributes a fifo queue, and processor core takes out data and handles from fifo queue, and the data message after the processing is delivered to network interface card and sends.Adopt the form of formation to preserve data message, realize the order-preserving of same data flow data message, further improved the efficient of parallel processing.
Further; For being provided with data payload, each processor core handles the upper limit; This upper limit is according to the average treatment load decision of the computing capability of monokaryon and a plurality of nuclears, in case data payload exceeds the processing upper limit, is about to data message and transfers to the lightest nuclear of load and handle.Thereby the data message of a big data flows of traffic can be by a plurality of nuclear parallel processings.
Further, said VPN strategy search the VPN Policy List of preferentially searching this processor core, can not the matched data message further search the VPN Policy List of other processor cores more one by one.So also be the efficient that has further improved parallel processing.
Further, the computing formula of said cryptographic hash can but be not limited to
Wherein hash depth B D equals the number of the processor core of equipment, and then any source IP address is that Sip, source port are that Sport, purpose IP address are that Dip, destination interface are that Dport and protocol number are Proto.Through above-mentioned hash function the parameter maps of five-tuple is become cryptographic hash, find the processor core of data message through cryptographic hash.
The employing hash algorithm that Fig. 2 shows the embodiment of the invention to be provided carries out the concrete grammar that multi-core parallel concurrent is handled, and details are as follows:
In step S201, make up hash according to the processor core number, for each processor core is created independently VPN Policy List, and be each cryptographic hash distribution FIFO (first in first out) formation according to the degree of depth (corresponding to the number of processor) of hash.
In step S202; When network interface card interrupts taking place; The data message that network interface card receives adopts hash algorithm to shunt processing according to the number of processor core and the five-tuple of data message (source and destination IP address, source and destination transport layer port and IP message protocol number), distributes to different processor cores to different data flow and handles.
In step S203, each processor is verified and is looked for the VPN Policy List, according to searching the VPN strategy that obtains the data message is handled.(preferentially search the VPN Policy List of this processor core, can not the matched data message further search the VPN Policy List of other processor cores more one by one)
In step S204, each processor core is according to the principle of first in first out, and the data message that taking-up has been handled from the fifo queue of correspondence is delivered to network interface card and sends.
Fig. 3 is the structure chart that employing hash algorithm that the embodiment of the invention provides carries out the vpn system that multi-core parallel concurrent handles.
The invention also discloses a kind of hash algorithm that adopts and carry out the vpn system that multi-core parallel concurrent is handled; Said system comprises: initialization module 321, data distribution module 322, data processing module 323 and data transmission blocks 324; Said initialization module 321, data distribution module 322, data processing module 323 and data transmission blocks 324 connect in regular turn; Said initialization module 321 is used for making up hash according to the number of processor core; The degree of depth of hash is corresponding to the number of processor core, is that each cryptographic hash is distributed a FIFO (first in first out) formation, and creates independently VPN Policy List for each processor core; Said data distribution module; Be used for undressed data message that network interface card is received; Adopt hash algorithm to shunt processing according to the number of processor core and the five-tuple of data message (source and destination IP address, source and destination transport layer port and IP message protocol number); The data message that will have same cryptographic hash deposits same fifo queue in and is labeled as " being untreated ", handles thereby distribute to different processor cores to different data flow.If having exceeded, the load of this processor core handles the upper limit (this upper limit is according to the computing capability of monokaryon and the average treatment load decision of a plurality of nuclears); Then this data message pointer is passed to the lightest processor core of load through the mode of interrupting between processor; Handle by this processor core, but still it is constant in the order of former fifo queue to keep this data message.
Carry out the encryption and decryption of IPSEC VPN and encapsulate decapsulation handling by data processing module after data message shunting and the mark.Each processor core can move the data processing module of a same code; Be used for taking out data message from the fifo queue of correspondence; And search the VPN strategy and it is carried out processing such as IPSEC encryption and decryption and encapsulation decapsulation, the data message that disposes is labeled as " handling ".The data message of the overweight nuclear of the load of coming through interrupt delivery between processor is also accepted and handled to each processor core.
According to the principle of first in first out and the mode of poll the data message that is labeled as " handling " in each fifo queue is passed to the network interface card transmission by data transmission blocks at last.
Here the present invention is described in detail through concrete examples of implementation; Provide the description of the foregoing description to make or be suitable for the present invention in order to make those skilled in the art, the various modifications of these embodiment are to understand easily for a person skilled in the art.The present invention is not limited to these examples, or some aspect wherein.Scope of the present invention is elaborated through additional claim.
Above-mentioned explanation illustrates and has described a preferred embodiment of the present invention; But as previously mentioned; Be to be understood that the present invention is not limited to the form that this paper discloses, should do not regard eliminating as, and can be used for various other combinations, modification and environment other embodiment; And can in invention contemplated scope described herein, change through the technology or the knowledge of above-mentioned instruction or association area.And change that those skilled in the art carried out and variation do not break away from the spirit and scope of the present invention, then all should be in the protection range of accompanying claims of the present invention.
Claims (7)
1. one kind is adopted hash algorithm to carry out the VPN implementation method that multi-core parallel concurrent is handled; It specifically comprises following steps: the number according to processor core in the vpn system makes up hash; The degree of depth of hash equals the number of processor core, and a numbering of the corresponding processor core of each cryptographic hash in the hash calculates cryptographic hash according to the five-tuple of the data message that receives; And find out corresponding processing device nuclear according to cryptographic hash, data message is sent to corresponding processing device nuclear handle; Wherein: five-tuple comprises source and destination IP address, source and destination transport layer port and IP message protocol number.
2. employing hash algorithm as claimed in claim 1 carries out the VPN implementation method that multi-core parallel concurrent is handled; It is characterized in that said each processor core VPN strategy of establishment separately; When processor core is received data message; Search the corresponding VPN strategy of data message, the data message is handled according to searching the VPN strategy that obtains.
3. employing hash algorithm as claimed in claim 1 carries out the VPN implementation method that multi-core parallel concurrent is handled; It is characterized in that said method also is included as each cryptographic hash and distributes a fifo queue; Processor core takes out data and handles from fifo queue, the data message after the processing is delivered to network interface card and sends.
4. employing hash algorithm as claimed in claim 1 carries out the VPN implementation method that multi-core parallel concurrent is handled; It is characterized in that said method also is included as each processor core the data payload processing upper limit is set; This upper limit is according to the computing capability of monokaryon and the average treatment load decision of a plurality of nuclears; In case data payload exceeds the processing upper limit, be about to data message and transfer to the lightest nuclear of load and handle.
5. employing hash algorithm as claimed in claim 1 carries out the VPN implementation method that multi-core parallel concurrent is handled; The VPN Policy List of preferentially searching this processor core of searching that it is characterized in that said VPN strategy can not the matched data message be further searched the VPN Policy List of other processor cores more one by one.
6. carry out the VPN implementation method that multi-core parallel concurrent is handled like the described employing hash algorithm of any claim of claim 1-5, it is characterized in that the computing formula of said cryptographic hash is following:
Wherein hash depth B D equals the number of the processor core of equipment, and the data message source IP address is that Sip, source port are that Sport, purpose IP address are that Dip, destination interface are that Dport and protocol number are Proto.
7. system that realizes any said VPN implementation method of claim of claim 1-5; It is characterized in that said system comprises: initialization module, data distribution module, data processing module and data transmission blocks; Said initialization module, data distribution module, data processing module and data transmission blocks connect in regular turn; Said initialization module is used to make up hash; And for fifo queue of each cryptographic hash distribution, for each processor core is created independently VPN Policy List; Said data distribution module is used for undressed data message that network interface card is received; Adopt hash algorithm to shunt processing according to the number of processor core and the five-tuple of data message, the data message that will have same cryptographic hash deposits same fifo queue in; Said data processing module carries out the encryption and decryption of VPN to be handled with the encapsulation decapsulation; Data message after said data transmission blocks will be handled passes to network interface card and sends.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210257170.9A CN102811169B (en) | 2012-07-24 | 2012-07-24 | Virtual private network (VPN) implementation method and system for performing multi-core parallel processing by using Hash algorithm |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210257170.9A CN102811169B (en) | 2012-07-24 | 2012-07-24 | Virtual private network (VPN) implementation method and system for performing multi-core parallel processing by using Hash algorithm |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102811169A true CN102811169A (en) | 2012-12-05 |
CN102811169B CN102811169B (en) | 2015-05-27 |
Family
ID=47234748
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210257170.9A Expired - Fee Related CN102811169B (en) | 2012-07-24 | 2012-07-24 | Virtual private network (VPN) implementation method and system for performing multi-core parallel processing by using Hash algorithm |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102811169B (en) |
Cited By (27)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103049336A (en) * | 2013-01-06 | 2013-04-17 | 浪潮电子信息产业股份有限公司 | Hash-based network card soft interrupt and load balancing method |
CN103414556A (en) * | 2013-08-16 | 2013-11-27 | 成都卫士通信息产业股份有限公司 | IKE key agreement strategy searching method |
CN104734993A (en) * | 2013-12-24 | 2015-06-24 | 杭州华为数字技术有限公司 | Data distribution method and distributor |
CN105159779A (en) * | 2015-08-17 | 2015-12-16 | 深圳中兴网信科技有限公司 | Method and system for improving data processing performance of multi-core CPU |
WO2016011894A1 (en) * | 2014-07-25 | 2016-01-28 | 华为技术有限公司 | Message processing method and apparatus |
WO2016041447A1 (en) * | 2014-09-15 | 2016-03-24 | 华为技术有限公司 | Multicore processor chip-based data processing method, device, and system |
CN105939312A (en) * | 2015-08-26 | 2016-09-14 | 杭州迪普科技有限公司 | Data transmission method and device |
CN105975433A (en) * | 2016-06-30 | 2016-09-28 | 瑞斯康达科技发展股份有限公司 | Message processing method and device |
CN106899512A (en) * | 2017-02-15 | 2017-06-27 | 北京浩瀚深度信息技术股份有限公司 | Multi engine realization method and system based on DPI in FPGA |
CN107483362A (en) * | 2017-07-11 | 2017-12-15 | 郑州云海信息技术有限公司 | A kind of method for dispatching message based on shift register |
CN107707479A (en) * | 2017-10-31 | 2018-02-16 | 北京锐安科技有限公司 | The lookup method and device of five-tuple rule |
CN107846364A (en) * | 2016-09-19 | 2018-03-27 | 阿里巴巴集团控股有限公司 | A kind for the treatment of method and apparatus of message |
CN108306832A (en) * | 2018-01-29 | 2018-07-20 | 北京启明星辰信息安全技术有限公司 | A kind of network flow quantity shunting method and device |
CN108667733A (en) * | 2018-03-29 | 2018-10-16 | 新华三信息安全技术有限公司 | A kind of network equipment and message processing method |
CN108718259A (en) * | 2018-05-30 | 2018-10-30 | 新华三信息安全技术有限公司 | A kind of message processing method and multi-core processor |
CN109062684A (en) * | 2018-07-04 | 2018-12-21 | 南京南大光电工程研究院有限公司 | A kind of real-time dynamic self-adapting dynamic load balancing method of release of the hardware of multi-core processor |
CN109327405A (en) * | 2017-07-31 | 2019-02-12 | 迈普通信技术股份有限公司 | Message order-preserving method and the network equipment |
CN110601950A (en) * | 2019-10-08 | 2019-12-20 | 河南省云安大数据安全防护产业技术研究院有限公司 | VPN gateway system based on DTLS protocol and implementation method |
CN110650020A (en) * | 2019-09-25 | 2020-01-03 | 天津市滨海新区信息技术创新中心 | Mimicry fuzzy decision method, device and system |
CN111669374A (en) * | 2020-05-25 | 2020-09-15 | 成都安恒信息技术有限公司 | Encryption and decryption performance expansion method for single tunnel software of IPsec VPN |
CN112383480A (en) * | 2020-10-29 | 2021-02-19 | 曙光网络科技有限公司 | Flow table processing method and device, monitoring device and storage medium |
CN112714069A (en) * | 2021-01-06 | 2021-04-27 | 上海交通大学 | Method for lowering shunting module to network card hardware in IPSec security gateway environment |
CN113296705A (en) * | 2021-05-27 | 2021-08-24 | 浙江萤火虫区块链科技有限公司 | Architecture system for parallel computing Poseidon Hash in Filecin |
CN113347230A (en) * | 2021-05-13 | 2021-09-03 | 长沙星融元数据技术有限公司 | Load balancing method, device, equipment and medium based on programmable switch |
CN113504989A (en) * | 2021-07-08 | 2021-10-15 | 山东科技大学 | Multi-core parallel processing method for near-bottom multi-beam orthogonal demodulation processing |
CN113626160A (en) * | 2021-07-07 | 2021-11-09 | 厦门市美亚柏科信息股份有限公司 | Network data packet high-concurrency processing method and system based on cavium processor |
CN116016035A (en) * | 2023-02-16 | 2023-04-25 | 北京天维信通科技有限公司 | Method for applying multipath service in same tunnel by utilizing quintuple |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101964749A (en) * | 2010-09-21 | 2011-02-02 | 北京网康科技有限公司 | Message retransmission method and system based on multi-core architecture |
CN102104544A (en) * | 2011-01-25 | 2011-06-22 | 无锡网芯科技有限公司 | Order preserving method for fragmented message flow in IP (Internet Protocol) tunnel of multi-nuclear processor with accelerated hardware |
US20110153724A1 (en) * | 2009-12-23 | 2011-06-23 | Murali Raja | Systems and methods for object rate limiting in multi-core system |
CN102483707A (en) * | 2009-06-22 | 2012-05-30 | 思杰系统有限公司 | Systems and methods for retaining source ip in a load balancing mutli-core environment |
-
2012
- 2012-07-24 CN CN201210257170.9A patent/CN102811169B/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102483707A (en) * | 2009-06-22 | 2012-05-30 | 思杰系统有限公司 | Systems and methods for retaining source ip in a load balancing mutli-core environment |
US20110153724A1 (en) * | 2009-12-23 | 2011-06-23 | Murali Raja | Systems and methods for object rate limiting in multi-core system |
CN101964749A (en) * | 2010-09-21 | 2011-02-02 | 北京网康科技有限公司 | Message retransmission method and system based on multi-core architecture |
CN102104544A (en) * | 2011-01-25 | 2011-06-22 | 无锡网芯科技有限公司 | Order preserving method for fragmented message flow in IP (Internet Protocol) tunnel of multi-nuclear processor with accelerated hardware |
Cited By (40)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103049336A (en) * | 2013-01-06 | 2013-04-17 | 浪潮电子信息产业股份有限公司 | Hash-based network card soft interrupt and load balancing method |
CN103414556A (en) * | 2013-08-16 | 2013-11-27 | 成都卫士通信息产业股份有限公司 | IKE key agreement strategy searching method |
CN103414556B (en) * | 2013-08-16 | 2016-06-01 | 成都卫士通信息产业股份有限公司 | A kind of IKE key consulting tactical lookup method |
CN104734993B (en) * | 2013-12-24 | 2018-05-18 | 杭州华为数字技术有限公司 | Data distribution method and current divider |
CN104734993A (en) * | 2013-12-24 | 2015-06-24 | 杭州华为数字技术有限公司 | Data distribution method and distributor |
WO2015096655A1 (en) * | 2013-12-24 | 2015-07-02 | 华为技术有限公司 | Data splitting method and splitter |
US10097466B2 (en) | 2013-12-24 | 2018-10-09 | Huawei Technologies Co., Ltd. | Data distribution method and splitter |
WO2016011894A1 (en) * | 2014-07-25 | 2016-01-28 | 华为技术有限公司 | Message processing method and apparatus |
CN105337896A (en) * | 2014-07-25 | 2016-02-17 | 华为技术有限公司 | Message processing method and device |
WO2016041447A1 (en) * | 2014-09-15 | 2016-03-24 | 华为技术有限公司 | Multicore processor chip-based data processing method, device, and system |
CN105589829A (en) * | 2014-09-15 | 2016-05-18 | 华为技术有限公司 | Data processing method based on multi-core processor chip, device and system |
CN105159779A (en) * | 2015-08-17 | 2015-12-16 | 深圳中兴网信科技有限公司 | Method and system for improving data processing performance of multi-core CPU |
CN105939312A (en) * | 2015-08-26 | 2016-09-14 | 杭州迪普科技有限公司 | Data transmission method and device |
CN105975433A (en) * | 2016-06-30 | 2016-09-28 | 瑞斯康达科技发展股份有限公司 | Message processing method and device |
CN105975433B (en) * | 2016-06-30 | 2019-04-19 | 瑞斯康达科技发展股份有限公司 | A kind of message processing method and device |
CN107846364A (en) * | 2016-09-19 | 2018-03-27 | 阿里巴巴集团控股有限公司 | A kind for the treatment of method and apparatus of message |
CN106899512A (en) * | 2017-02-15 | 2017-06-27 | 北京浩瀚深度信息技术股份有限公司 | Multi engine realization method and system based on DPI in FPGA |
CN107483362A (en) * | 2017-07-11 | 2017-12-15 | 郑州云海信息技术有限公司 | A kind of method for dispatching message based on shift register |
CN109327405A (en) * | 2017-07-31 | 2019-02-12 | 迈普通信技术股份有限公司 | Message order-preserving method and the network equipment |
CN107707479A (en) * | 2017-10-31 | 2018-02-16 | 北京锐安科技有限公司 | The lookup method and device of five-tuple rule |
CN107707479B (en) * | 2017-10-31 | 2021-08-31 | 北京锐安科技有限公司 | Five-tuple rule searching method and device |
CN108306832A (en) * | 2018-01-29 | 2018-07-20 | 北京启明星辰信息安全技术有限公司 | A kind of network flow quantity shunting method and device |
CN108667733A (en) * | 2018-03-29 | 2018-10-16 | 新华三信息安全技术有限公司 | A kind of network equipment and message processing method |
CN108718259A (en) * | 2018-05-30 | 2018-10-30 | 新华三信息安全技术有限公司 | A kind of message processing method and multi-core processor |
CN108718259B (en) * | 2018-05-30 | 2020-07-03 | 新华三信息安全技术有限公司 | Message processing method and multi-core processor |
CN109062684A (en) * | 2018-07-04 | 2018-12-21 | 南京南大光电工程研究院有限公司 | A kind of real-time dynamic self-adapting dynamic load balancing method of release of the hardware of multi-core processor |
CN110650020B (en) * | 2019-09-25 | 2022-05-10 | 天津市滨海新区信息技术创新中心 | Mimicry fuzzy decision method, device and system |
CN110650020A (en) * | 2019-09-25 | 2020-01-03 | 天津市滨海新区信息技术创新中心 | Mimicry fuzzy decision method, device and system |
CN110601950A (en) * | 2019-10-08 | 2019-12-20 | 河南省云安大数据安全防护产业技术研究院有限公司 | VPN gateway system based on DTLS protocol and implementation method |
CN110601950B (en) * | 2019-10-08 | 2021-06-01 | 河南省云安大数据安全防护产业技术研究院有限公司 | VPN gateway system based on DTLS protocol and implementation method |
CN111669374A (en) * | 2020-05-25 | 2020-09-15 | 成都安恒信息技术有限公司 | Encryption and decryption performance expansion method for single tunnel software of IPsec VPN |
CN111669374B (en) * | 2020-05-25 | 2022-05-27 | 成都安恒信息技术有限公司 | Encryption and decryption performance expansion method for single tunnel software of IPsec VPN |
CN112383480A (en) * | 2020-10-29 | 2021-02-19 | 曙光网络科技有限公司 | Flow table processing method and device, monitoring device and storage medium |
CN112714069A (en) * | 2021-01-06 | 2021-04-27 | 上海交通大学 | Method for lowering shunting module to network card hardware in IPSec security gateway environment |
CN113347230A (en) * | 2021-05-13 | 2021-09-03 | 长沙星融元数据技术有限公司 | Load balancing method, device, equipment and medium based on programmable switch |
CN113296705A (en) * | 2021-05-27 | 2021-08-24 | 浙江萤火虫区块链科技有限公司 | Architecture system for parallel computing Poseidon Hash in Filecin |
CN113626160A (en) * | 2021-07-07 | 2021-11-09 | 厦门市美亚柏科信息股份有限公司 | Network data packet high-concurrency processing method and system based on cavium processor |
CN113504989A (en) * | 2021-07-08 | 2021-10-15 | 山东科技大学 | Multi-core parallel processing method for near-bottom multi-beam orthogonal demodulation processing |
CN116016035A (en) * | 2023-02-16 | 2023-04-25 | 北京天维信通科技有限公司 | Method for applying multipath service in same tunnel by utilizing quintuple |
CN116016035B (en) * | 2023-02-16 | 2023-06-13 | 北京天维信通科技有限公司 | Method for applying multipath service in same tunnel by utilizing quintuple |
Also Published As
Publication number | Publication date |
---|---|
CN102811169B (en) | 2015-05-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102811169B (en) | Virtual private network (VPN) implementation method and system for performing multi-core parallel processing by using Hash algorithm | |
US11233778B2 (en) | Secure forwarding of tenant workloads in virtual networks | |
US9686294B2 (en) | Protection of communication on a vehicular network via a remote security service | |
CN105763557B (en) | Exchange chip or NP cooperate with the method and system for completing message IPSEC encryption with CPU | |
CN101834840B (en) | There is efficient key derivation system, the method and apparatus for end-to-end network security of business visuality | |
US11509638B2 (en) | Receive-side processing for encapsulated encrypted packets | |
US11687375B2 (en) | Technologies for hybrid field-programmable gate array application-specific integrated circuit code acceleration | |
US8474034B2 (en) | Method and apparatus for fast check and update of anti-replay window without bit-shifting in internet protocol security | |
US8006297B2 (en) | Method and system for combined security protocol and packet filter offload and onload | |
US11329966B2 (en) | System and method for transferring packets between kernel modules in different network stacks | |
CN101051891A (en) | Method and device for safety strategy uniformly treatment in safety gateway | |
US8175271B2 (en) | Method and system for security protocol partitioning and virtualization | |
CN102065021B (en) | IPSecVPN (Internet Protocol Security Virtual Private Network) realizing system and method based on NetFPGA (Net Field Programmable Gate Array) | |
CN1747380A (en) | The block encryption data are decrypted | |
Kim et al. | A case for smartnic-accelerated private communication | |
US20050063543A1 (en) | Hardware acceleration for Diffie Hellman in a device that integrates wired and wireless L2 and L3 switching functionality | |
Apiecionek et al. | Multi path transmission control protocols as a security solution | |
CN115174482B (en) | Message distribution method and device of network equipment | |
CN103227742A (en) | Method for IPSec (Internet protocol security) tunnel to rapidly process messages | |
CN101442470A (en) | Method, system and equipment for establishing tunnel | |
CN104660592A (en) | Load distributing method based on secure socket layer protocol characteristic | |
CN103685321B (en) | Packet forwards and safety protection detection, load-balancing method and device | |
CN114039795B (en) | Software defined router and data forwarding method based on same | |
CN204539191U (en) | A kind of mobile router of ciphering type | |
CN105635145A (en) | Chip-level safety protection method of CAPWAP DTLS tunnel |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20150527 Termination date: 20210724 |