CN104580003B - Paralleling model P2P scrambling method, apparatus and system - Google Patents

Paralleling model P2P scrambling method, apparatus and system Download PDF

Info

Publication number
CN104580003B
CN104580003B CN201410549591.8A CN201410549591A CN104580003B CN 104580003 B CN104580003 B CN 104580003B CN 201410549591 A CN201410549591 A CN 201410549591A CN 104580003 B CN104580003 B CN 104580003B
Authority
CN
China
Prior art keywords
client
data flow
packet
server
link
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410549591.8A
Other languages
Chinese (zh)
Other versions
CN104580003A (en
Inventor
朱玉石
李冰
吴丽梅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201410549591.8A priority Critical patent/CN104580003B/en
Publication of CN104580003A publication Critical patent/CN104580003A/en
Application granted granted Critical
Publication of CN104580003B publication Critical patent/CN104580003B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks

Abstract

The invention discloses a kind of paralleling model P2P scrambling methods, apparatus and system, wherein, this method comprises: obtaining the data flow of core network, protocol identification is carried out to the corresponding message of the data flow of core network, the P2P data flow for determining point-tor point P 2 P class agreement sends interference packet to P2P link corresponding with P2P data flow, carries out scrambling code to P2P data flow, wherein, the sender for sending interference packet is connected in parallel with core network.The present invention solves the problems, such as network congestion caused by P-2-P technology, improves network bandwidth resources utilization rate.

Description

Paralleling model P2P scrambling method, apparatus and system
Technical field
The present invention relates to the communications fields, in particular to a kind of paralleling model P2P scrambling method, apparatus and system.
Background technique
With the continuous development of point-to-point (peer-2-peer, referred to as P2P) technology, internet (internet) at present Upper main flow be more than traditional hypertext transfer protocol (Hypertext Transfer Protocol, referred to as HTTP) flow, P2P flow occupy a big chunk of total flow, occupy a large amount of network bandwidth resources, network is caused to gather around Plug, affects being normally carried out for other network services.
Caused by P-2-P technology in the related technology aiming at the problem that network congestion, effective solution side is not yet proposed at present Case.
Summary of the invention
The present invention provides a kind of paralleling model P2P scrambling methods, apparatus and system, at least to solve the above problems.
According to an aspect of the invention, there is provided a kind of paralleling model P2P scrambling method, this method comprises: obtaining master The data flow of dry network carries out protocol identification to the corresponding message of the data flow of the core network, determines that point-tor point P 2 P class is assisted The P2P data flow of view;Interference packet is sent to P2P link corresponding with the P2P data flow, the P2P data flow is disturbed Code;Wherein, the sender for sending the interference packet is connected in parallel with the core network.
Preferably, carrying out scrambling code to the P2P data flow includes at least one of: passing through TCP window dislocation method pair The P2P data flow carries out flow control, wherein TCP window dislocation method is used for by sending described in the interference packet control The transmitting-receiving speed packet of P2P link;The P2P data flow is blocked.
Preferably, TCP window dislocation method includes: the client of the P2P link of disguising oneself as, to institute within the unit time The server for stating P2P link sends multiple confirmation ACK packets, so that the client abandons multiple data that the server is sent Packet;Disguise oneself as the client of the P2P link, asks for the client to the server according to preset speed of giving out a contract for a project and abandons Multiple data packets, and the server that disguises oneself as sends multiple data packets that the client abandons to the client.
Preferably, the quantity of the multiple ACK packet is greater than first threshold, so that the server responds the multiple ACK It wraps to the client and sends multiple data packets, the window of the client is exceeded so as to cause the multiple data packet, it is described Multiple data packets are abandoned by the client, the transmission window misalignment of the reception window and the server of the client, institute The ACK packet that server sends data packet of the client in processing caching is stated not to respond.
Preferably, sending the interference to the P2P link corresponding with the P2P data flow includes: described in detection The bandwidth of user where P2P data flow;In the case where the bandwidth exceeds permitted maximum bandwidth, Xiang Suoshu P2P link Send the interference packet.
According to another aspect of the present invention, a kind of paralleling model P2P scrambling device, the device and core network are provided Parallel connection, the device include: identification module, for obtaining the data flow of the core network, to the data flow of the core network Corresponding message carries out protocol identification, determines the P2P data flow of point-tor point P 2 P class agreement;Scrambling code module, for it is described The corresponding P2P link of P2P data flow sends interference packet, carries out scrambling code to the P2P data flow.
Preferably, the scrambling code module is used to carry out scrambling code to the P2P data flow to include at least one of: passing through TCP window misplaces method to P2P data flow progress flow control, wherein TCP window dislocation method is used for by sending institute State the transmitting-receiving speed packet of interference packet control P2P link;The P2P data flow is blocked.
Preferably, TCP window dislocation method includes: the client of the P2P link of disguising oneself as, to institute within the unit time The server for stating P2P link sends multiple confirmation ACK packets, so that the client abandons multiple data that the server is sent Packet;Disguise oneself as the client of the P2P link, asks for the client to the server according to preset speed of giving out a contract for a project and abandons Multiple data packets, and the server that disguises oneself as sends multiple data packets that the client abandons to the client.
Preferably, the quantity of the multiple ACK packet is greater than first threshold, so that the server responds the multiple ACK It wraps to the client and sends multiple data packets, the window of the client is exceeded so as to cause the multiple data packet, it is described Multiple data packets are abandoned by the client, the transmission window misalignment of the reception window and the server of the client, institute The ACK packet that server sends data packet of the client in processing caching is stated not to respond.
Preferably, the bandwidth of user where the scrambling code module is also used to detect the P2P data flow is super in the bandwidth Out in the case where permitted maximum bandwidth, Xiang Suoshu P2P link sends the interference packet.
According to a further aspect of the invention, a kind of paralleling model P2P scrambling system, including core network are provided, is used In transmission data flow;Device described in any one of above-mentioned six to ten scheme, it is in parallel with the core network, for identification P2P data flow in the data flow, and the P2P data flow is disturbed by sending interference packet to the Backbone network Code.
Through the invention, the data flow for obtaining core network carries out the corresponding message of the data flow of the core network Protocol identification determines the P2P data flow of point-tor point P 2 P class agreement, sends to P2P link corresponding with the P2P data flow dry Packet is disturbed, scrambling code is carried out to the P2P data flow, wherein sends the sender company in parallel with the core network of the interference packet It connects, solves the problems, such as network congestion caused by P-2-P technology, improve network bandwidth resources utilization rate.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present invention, constitutes part of this application, this hair Bright illustrative embodiments and their description are used to explain the present invention, and are not constituted improper limitations of the present invention.In the accompanying drawings:
Fig. 1 is the flow chart of paralleling model P2P scrambling method according to an embodiment of the present invention;
Fig. 2 is the structure chart of paralleling model P2P scrambling device according to an embodiment of the present invention;
Fig. 3 is the frame diagram of paralleling model P2P scrambling system according to the preferred embodiment of the invention;
Fig. 4 is the process for the method that paralleling model P2P scrambling system according to the preferred embodiment of the invention carries out P2P scrambling code Figure;And
Fig. 5 is the schematic diagram of TCP window dislocation method according to the preferred embodiment of the invention.
Specific embodiment
It should be noted that in the absence of conflict, the features in the embodiments and the embodiments of the present application can phase Mutually combination.The present invention will be described in detail below with reference to the accompanying drawings and embodiments.
A kind of paralleling model P2P scrambling method is present embodiments provided, Fig. 1 is paralleling model according to an embodiment of the present invention The flow chart of P2P scrambling method, as shown in Figure 1, this method comprises the following steps:
Step S102 obtains the data flow of core network, carries out agreement to the corresponding message of the data flow of the core network Identification, determines the P2P data flow of point-tor point P 2 P class agreement;
Step S104 sends interference packet to P2P link corresponding with P2P data flow, carries out scrambling code to the P2P data flow.
Wherein, the sender for sending the interference packet is connected in parallel with the core network.
Through the above steps, network data flow is obtained, protocol identification is carried out to the corresponding message of the network data flow, is determined The P2P data flow of point-tor point P 2 P class agreement sends interference packet to the P2P data flow, carries out scrambling code to the P2P data flow, solve The problem of network congestion caused by P-2-P technology, improve network bandwidth resources utilization rate.
In a preferred embodiment of the present embodiment, to the P2P data flow carry out scrambling code may include it is following at least One of: method is misplaced to P2P data flow progress flow control by TCP window, wherein TCP window dislocation method is for passing through transmission The transmitting-receiving speed packet of interference packet control P2P link is to block P2P data flow.Through the above steps, reached to P2P The flow control and blocking of stream.
In a preferred embodiment of the present embodiment, TCP window dislocation method may include: the P2P link that disguises oneself as Client, multiple ACK packets are sent to the server of P2P link within the unit time, so that the client abandons server and sends out The multiple data packets sent;Disguise oneself as the client of P2P link, asks for the client to server according to preset speed of giving out a contract for a project and loses The multiple data packets abandoned, and the server that disguises oneself as sends multiple data packets that the client abandons to the client, it is in parallel in this way Mode P2P scrambling system just controls the transmitting-receiving speed packet of P2P link, not will lead to Fast retransmission.Wherein, multiple ACK packets are The ACK packet of preset quantity, multiple data packets are the data packets of preset quantity corresponding with the multiple ACK packet.
In a preferred embodiment of the present embodiment, TCP window dislocation method can also include: the P2P chain that disguises oneself as The client on road sends multiple ACK packets to the server of P2P link within the unit time, wherein the number of the multiple ACK packet Amount is greater than first threshold, so that server, which responds multiple ACK packets, sends multiple data packets to client, so as to cause multiple number Exceed the window of client according to packet, multiple data packets are abandoned by client, the transmission window for receiving window and servicing device of client Mouth dislocation, the ACK packet that server sends data packet of the client in processing caching are refused to respond.TCP is just realized in this way Window misalignment.
In a preferred embodiment of the present embodiment, the feelings of network service normal operation are not influenced in P2P data flow Under condition, interference packet can not be sent to P2P data flow, P2P data flow is controlled.Exceed in the bandwidth that P2P data flow occupies In the case where permitted maximum bandwidth, interference packet is sent to the P2P data flow, P2P data flow is controlled, is improved in this way Bandwidth availability ratio.
Additionally provide a kind of paralleling model P2P scrambling device in the present embodiment, the device for realizing above-mentioned method, Explanation had been carried out in the above-described embodiments, and details are not described herein.It should be noted that the name of the module in following apparatus Claim not constituting the practical restriction to the module, for example, identification module can be expressed as " network data flow being obtained, to the network The corresponding message of data flow carries out protocol identification, determines the P2P data flow of point-tor point P 2 P class agreement ", module below can be with It realizes in the processor, for example, identification module can be expressed as, " a kind of processor obtains network data flow, to the network data Flow corresponding message and carry out protocol identification, determine the P2P data flow of point-tor point P 2 P class agreement ", alternatively, " a kind of processor, packet Include identification module " etc..
Fig. 2 is the structure chart of paralleling model P2P scrambling device according to an embodiment of the present invention, described device and core network Parallel connection is below described in detail the device as shown in Fig. 2, the device 20 includes: identification module 22 and scrambling code module 24.
Identification module 22, it is corresponding to the data flow of the core network for obtaining the data flow of the core network Message carries out protocol identification, determines the P2P data flow of point-tor point P 2 P class agreement;
Scrambling code module 24, for sending interference packet to P2P link corresponding with the P2P data flow, to the P2P data Stream carries out scrambling code;
By above-mentioned apparatus, solves the problems, such as network congestion caused by P-2-P technology, improve network bandwidth resources Utilization rate.
In a preferred embodiment of the present embodiment, scrambling code module 24 includes for carrying out scrambling code to P2P data flow At least one of: method is misplaced to P2P data flow progress flow control by TCP window, wherein TCP window dislocation method is for leading to Cross the transmitting-receiving speed packet for sending interference packet control P2P link;P2P data flow is blocked.Specifically, TCP window dislocation side Method may include: the client of the P2P link of disguising oneself as, and send within the unit time to the server of the P2P link more A confirmation ACK packet, so that the client abandons multiple data packets that the server is sent;Disguise oneself as the P2P link Client asks for multiple data packets that the client abandons to the server according to preset speed of giving out a contract for a project, and disguises oneself as The server sends multiple data packets that the client abandons to the client.Wherein, the quantity of the multiple ACK packet Greater than first threshold, so that the server, which responds the multiple ACK packet, sends multiple data packets to the client, to lead The multiple data packet is caused to exceed the window of the client, the multiple data packet is abandoned by the client, the client The transmission window misalignment of the reception window and the server at end, number of the server to the client in processing caching The ACK packet sent according to packet not responds.
In a preferred embodiment of the present embodiment, scrambling code module 24 is also used to detect where the P2P data flow The bandwidth of user;In the case where bandwidth exceeds permitted maximum bandwidth, interference packet is sent to the P2P data flow.
Below with reference to preferred embodiment and preferred embodiment, the present invention will be described.
Preferred embodiment 1
This preferred embodiment is realized in integrated service gateway system, and Fig. 3 is according to the preferred embodiment of the invention The frame diagram of paralleling model P2P scrambling system, as shown in figure 3, paralleling model P2P scrambling system includes that paralleling model P2P is disturbed Code device 30 and core network 38.Paralleling model P2P scrambling device 30 includes depth service-aware (DeepPacket Inspection, referred to as DPI) protocol resolution module 32, packet is interfered in the analysis of P2P stream mode and flow rate detection module 34 and P2P Sending module 36, wherein DPI protocol resolution module 32 and the analysis of P2P stream mode and flow rate detection module 34 are equivalent in Fig. 2 Identification module 22, P2P interference packet sending module 36 are equivalent to the scrambling code module 24 in Fig. 2.30 He of paralleling model P2P scrambling device Core network 38 is in parallel, and specifically connection type is as follows: DPI protocol resolution module 32 and core network 38 phase in parallel Even, data flow is obtained from core network 38;The analysis of P2P stream mode and 32 phase of flow rate detection module 34 and DPI protocol resolution module Even, the data flow obtained according to DPI protocol resolution module 32 identifies P2P data flow, and determines the need for sending interference packet; 36 one end of packet sending module is interfered to analyze with P2P stream mode by P2P and flow rate detection module 34 is connected, the other end and core network 38 Parallel connection sends interference packet to core network 38 for the notice according to P2P stream mode analysis and flow rate detection module 34.Below The device is described in detail:
DPI protocol resolution module 32, for carrying out protocol identification to all messages in core network 38, and will identification The analysis of P2P stream mode and flow rate detection module 34 are sent to for the data flow of P2P class agreement.
The analysis of P2P stream mode detects current P2P for analyzing the state of current P2P data flow with flow rate detection module 34 The P2P bandwidth of user where data flow, notifies P2P that packet sending module 36 is interfered to be sent out if beyond the maximum bandwidth allowed It is responsible for a task until it is completed and disturbs.
P2P interferes packet sending module 36, for sending interference packet to backbone network 38.It specifically can be wrong using TCP window Position method sends interference packet: the client for the P2P link that disguises oneself as is sent out within the unit time to the server of the P2P link Multiple confirmation ACK packets are sent, so that the client abandons multiple data packets that the server is sent;Disguise oneself as the P2P chain The client on road asks for multiple data packets that the client abandons to the server according to preset speed of giving out a contract for a project, and pseudo- It dresses up the server and sends multiple data packets that the client abandons to the client.Wherein, the multiple ACK packet Quantity is greater than first threshold, so that the server, which responds the multiple ACK packet, sends multiple data packets to the client, from And the multiple data packet is caused to exceed the window of the client, the multiple data packet is abandoned by the client, described The transmission window misalignment of the reception window and the server of client, the server is to the client in processing caching Data packet send ACK packet refuse response.
By above system, P2P data traffic ratio shared in total flow can be effectively reduced, control P2P is answered With the occupancy to network bandwidth resources, solve the problems, such as due to the excessive caused network congestion of P2P data traffic.
Preferred embodiment 2
Fig. 4 is the process for the method that paralleling model P2P scrambling system according to the preferred embodiment of the invention carries out P2P scrambling code Figure, as shown in Fig. 4 and Fig. 3, this method comprises the following steps:
Step S402, DPI protocol resolution module 32 obtains all network traffic datas by light-dividing device.
Step S404, DPI protocol resolution module 32 carries out protocol identification to all messages, and will be identified as P2P class association The data flow of view is sent to the analysis of P2P stream mode and flow rate detection module 34.
The analysis of step S406, P2P stream mode and flow rate detection module 34 analyze the state of current P2P data flow, and detection is worked as The P2P bandwidth of user where preceding P2P data flow, notifies P2P to interfere packet sending module 36 if beyond the maximum bandwidth allowed Carry out interference of giving out a contract for a project.
Step S408, P2P interfere packet sending module 36 to send by control channel to the corresponding P2P link of P2P data flow Interference packet carries out flow control or blocking purpose to P2P data flow to reach.
Through the above steps, paralleling model P2P scrambling device uses the mode of deployment in parallel with backbone network, and whole device is not Belong to the network element of backbone network, so not leading to entire core network because of the possible breakdown of paralleling model P2P scrambling device The danger broken down.Paralleling model P2P scrambling device can effectively reduce P2P data traffic ratio shared in total flow Example, control P2P apply the occupancy to network bandwidth resources, solve asking due to the excessive caused network congestion of P2P data traffic Topic.
Preferred embodiment 3
This preferred embodiment is the blocking and flow control to the P2P data flow based on Transmission Control Protocol, below to blocking-up method and stream Prosecutor method is introduced respectively:
(1) blocking-up method.
It can be the combination of following three kinds of methods to the blocking of P2P data flow, paralleling model P2P scrambling device is in discovery one Other methods can be switched in the case that kind method is invalid to be blocked again.
First method: unidirectional to send RST packet method.That is paralleling model P2P scrambling device disguises oneself as client (Client) RST packet is sent to server (Server), or the Client that disguises oneself as sends RST packet to Server, keeps link disconnected Chain has reached to by the barrier effect of control stream.
Second method: bi-directionally sent RST packet method.I.e. paralleling model P2P scrambling device disguise oneself as Client to Server sends packet RST packet, while internet service group (Internet Service Group, referred to as ISG) is pretended Server gives out a contract for a project to Client.Make to link chain rupture, have reached to by the barrier effect of control stream.
The third method: SYN packet method is sent.That is paralleling model P2P scrambling device disguises oneself as Client, pass through to Server sends the SYN packet being located in window, makes to link chain rupture, to reach to by the barrier effect of control stream.
(2) flow control method
It can be the combination of following two method to the flow control of P2P data flow, paralleling model P2P scrambling system is in discovery one Other methods, which can be switched to, in the case that kind method is invalid carries out flow control again.
First method: modification transmission control protocol (Transmission Control Protocol, referred to as TCP) Sliding window method
This method is that the speed of data transmission is controlled using the receiving window size of data sender notification data recipient Degree.
Second method: TCP window dislocation method
Fig. 5 is the schematic diagram of TCP window dislocation method according to the preferred embodiment of the invention, as shown in figure 5, the TCP window The particular content of mouthful dislocation method is as follows: paralleling model P2P scrambling system disguises oneself as client (Client) to server (Server) legal ACK packet is quickly sent, Server is made to send data packet (Data) to Client as soon as possible, when data packet is super Out when the window of Client, data packet can be abandoned by Client.When the message amount being dropped is enough, the reception of Client The transmission window of window and Server can misplace completely.Client issues the ACK of Server when handling the data packet in caching Packet can be considered duplicate ACK packet (paralleling model P2P scrambling device has pretended Client and distributed ACK packet) by Server, So Server will not comprehend the ACK packet of Client.When window misalignment is sufficiently large, Client has handled the packet institute in all cachings The ACK packet of transmission is all considered duplicate ACK packet by Server, so Server will not repeatedly send the packet abandoned by Client To Client.At this moment the ISG Server that disguises oneself as again to Client sends the packet that is abandoned by Client, at the same disguise oneself as Client to Server sends ACK and asks for new data packet.In this way paralleling model P2P scrambling device just control entire link send and receive packets speed Degree.During paralleling model P2P scrambling system controls link, each data packet Server can be received in different time Two identical ACK packets, so not will lead to Fast retransmission.
Preferred embodiment 4
This preferred embodiment is based on to User Datagram Protocol (User Datagram Protocol, referred to as UDP) The blocking and flow control of the P2P of agreement, content are as follows: obtaining network data flow, carry out UDP to the corresponding message of the network data flow Protocol identification determines the P2P data flow of udp protocol, sends icmp interference packet to P2P data flow, disturbs to the P2P data flow Code.Keep port unreachable by sending icmp interference packet, reaches to by the blocking of control stream and fluid control effect.
Above preferred embodiment is that paralleling model P2P scrambling device is attached in high-performance ISG system, by P2P number Give out a contract for a project interference according to stream to reach flow control and blocking to P2P data flow, realizes to the appropriate control to P2P data traffic System not only can be solved network congestion problem, other network services can also be allow to be normally carried out with envoy's bandwidth-saving resource.
Obviously, those skilled in the art should be understood that each module of the above invention or each step can be with general Computing device realize that they can be concentrated on a single computing device, or be distributed in multiple computing devices and formed Network on, optionally, they can be realized with the program code that computing device can perform, it is thus possible to which they are stored Be performed by computing device in the storage device, perhaps they are fabricated to each integrated circuit modules or by they In multiple modules or step be fabricated to single integrated circuit module to realize.In this way, the present invention is not limited to any specific Hardware and software combines.
These are only the preferred embodiment of the present invention, is not intended to restrict the invention, for those skilled in the art For member, the invention may be variously modified and varied.All within the spirits and principles of the present invention, it is made it is any modification, Equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.

Claims (11)

1. a kind of paralleling model P2P scrambling method characterized by comprising
The data flow for obtaining core network carries out protocol identification to the corresponding message of the data flow of the core network, determines a little To the P2P data flow of point P2P class agreement;
Interference packet is sent to P2P link corresponding with the P2P data flow, scrambling code is carried out to the P2P data flow;
Wherein, the sender for sending the interference packet is connected in parallel with the core network.
2. the method according to claim 1, wherein to the P2P data flow carry out scrambling code include it is following at least One of:
Method is misplaced to P2P data flow progress flow control, wherein TCP window dislocation method is for leading to by TCP window It crosses and sends the transmitting-receiving speed packet that the interference packet controls the P2P link;
The P2P data flow is blocked.
3. according to the method described in claim 2, it is characterized in that, TCP window dislocation method includes:
Disguise oneself as the client of the P2P link, sends multiple confirmations to the server of the P2P link within the unit time ACK packet, so that the client abandons multiple data packets that the server is sent;
Disguise oneself as the client of the P2P link, asks for the client to the server according to preset speed of giving out a contract for a project and loses The multiple data packets abandoned, and the server that disguises oneself as sends multiple data packets that the client abandons to the client.
4. according to the method described in claim 3, it is characterized in that, the quantity of the multiple ACK packet be greater than first threshold so that The server responds the multiple ACK packet and sends multiple data packets to the client, so as to cause the multiple data packet Window beyond the client, the multiple data packet are abandoned by the client, the reception window of the client and institute State the transmission window misalignment of server, the ACK packet that the server sends data packet of the client in processing caching Not respond.
5. the method according to claim 1, wherein being sent out to the P2P link corresponding with the P2P data flow The interference is sent to include:
The bandwidth of user where detecting the P2P data flow;
In the case where the bandwidth exceeds permitted maximum bandwidth, Xiang Suoshu P2P link sends the interference packet.
6. a kind of paralleling model P2P scrambling device, which is characterized in that described device is in parallel with core network, and described device includes:
Identification module, for obtaining the data flow of the core network, to the corresponding message of the data flow of the core network into Row protocol identification determines the P2P data flow of point-tor point P 2 P class agreement;
Scrambling code module carries out the P2P data flow for sending interference packet to P2P link corresponding with the P2P data flow Scrambling code.
7. device according to claim 6, which is characterized in that the scrambling code module is used to carry out the P2P data flow Scrambling code includes at least one of:
Method is misplaced to P2P data flow progress flow control, wherein TCP window dislocation method is for leading to by TCP window Cross the transmitting-receiving speed packet for sending the interference packet control P2P link;
The P2P data flow is blocked.
8. device according to claim 7, which is characterized in that TCP window dislocation method include:
Disguise oneself as the client of the P2P link, sends multiple confirmations to the server of the P2P link within the unit time ACK packet, so that the client abandons multiple data packets that the server is sent;
Disguise oneself as the client of the P2P link, asks for the client to the server according to preset speed of giving out a contract for a project and loses The multiple data packets abandoned, and the server that disguises oneself as sends multiple data packets that the client abandons to the client.
9. device according to claim 8, which is characterized in that the quantity of the multiple ACK packet is greater than first threshold, so that The server responds the multiple ACK packet and sends multiple data packets to the client, so as to cause the multiple data packet Window beyond the client, the multiple data packet are abandoned by the client, the reception window of the client and institute State the transmission window misalignment of server, the ACK packet that the server sends data packet of the client in processing caching Not respond.
10. device according to claim 6, which is characterized in that the scrambling code module is also used to detect the P2P data flow The bandwidth of place user, in the case where the bandwidth exceeds permitted maximum bandwidth, Xiang Suoshu P2P link sends described dry Disturb packet.
11. a kind of paralleling model P2P scrambling system characterized by comprising
Core network, for transmitting data flow;
Device described in any one of claim 6 to 10, it is in parallel with the core network, for identification in the data flow P2P data flow, and scrambling code is carried out to the P2P data flow by sending interference packet to the Backbone network.
CN201410549591.8A 2013-10-16 2014-10-16 Paralleling model P2P scrambling method, apparatus and system Active CN104580003B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410549591.8A CN104580003B (en) 2013-10-16 2014-10-16 Paralleling model P2P scrambling method, apparatus and system

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
CN2013104863759 2013-10-16
CN201310486375 2013-10-16
CN201410549591.8A CN104580003B (en) 2013-10-16 2014-10-16 Paralleling model P2P scrambling method, apparatus and system

Publications (2)

Publication Number Publication Date
CN104580003A CN104580003A (en) 2015-04-29
CN104580003B true CN104580003B (en) 2019-05-24

Family

ID=51932952

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410549591.8A Active CN104580003B (en) 2013-10-16 2014-10-16 Paralleling model P2P scrambling method, apparatus and system

Country Status (2)

Country Link
CN (1) CN104580003B (en)
WO (1) WO2014187406A1 (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101159683A (en) * 2007-10-15 2008-04-09 华为技术有限公司 Method and apparatus for controlling data flow
CN101964754A (en) * 2010-11-01 2011-02-02 南京邮电大学 Point to point (P2P) service identification-based quality of service (QoS) routing method

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100474819C (en) * 2007-05-17 2009-04-01 华为技术有限公司 A deep message detection method, network device and system
CN101286937B (en) * 2008-05-16 2011-01-05 成都市华为赛门铁克科技有限公司 Network flow control method, device and system
US8326992B2 (en) * 2009-05-27 2012-12-04 Ray-V Technologies, Ltd. Controlling the provision of resources for streaming of video swarms in a peer-to-peer network
CN102893635B (en) * 2010-03-31 2015-11-25 香港科技大学 Sent and/or receive the method for data by subchannel
CN102387045B (en) * 2011-09-30 2015-07-08 北京信息科技大学 Embedded point to point (P2P) flow monitoring system and method thereof

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101159683A (en) * 2007-10-15 2008-04-09 华为技术有限公司 Method and apparatus for controlling data flow
CN101964754A (en) * 2010-11-01 2011-02-02 南京邮电大学 Point to point (P2P) service identification-based quality of service (QoS) routing method

Also Published As

Publication number Publication date
CN104580003A (en) 2015-04-29
WO2014187406A1 (en) 2014-11-27

Similar Documents

Publication Publication Date Title
JP6568270B2 (en) Service tier southbound interface and quality of service
CN108512885B (en) Method, system and storage medium for network packet processing
JP6672340B2 (en) System and method for regulating data flow
CN103650420B (en) Carrier control based on detection
US20130204988A1 (en) Method and system for loopback proxy
US20130160122A1 (en) Two-stage intrusion detection system for high-speed packet processing using network processor and method thereof
US20150237525A1 (en) Traffic Shaping and Steering for a Multipath Transmission Control Protocol Connection
EP3482554A1 (en) Methods to monitor resources through http/2
US9825909B2 (en) Dynamic detection and application-based policy enforcement of proxy connections
US10355961B2 (en) Network traffic capture analysis
KR20090031778A (en) Methods and apparatus for policy enforcement in a wireless communication system
CN107645409B (en) Method and device for determining transmission fault reason of data
Qian et al. Achieving robust mobile web content delivery performance based on multiple coordinated QUIC connections
EP3207737B1 (en) Methods and apparatuses for flexible mobile steering in cellular networks
JP2008048131A (en) P2p traffic monitoring and control system, and method therefor
KR101211147B1 (en) System for network inspection and providing method thereof
CN107104892A (en) The method and apparatus of network acceleration
CN105791239B (en) A kind of TCP go-between processing method
CN104580003B (en) Paralleling model P2P scrambling method, apparatus and system
Elmangoush et al. A framework for handling heterogeneous M2M traffic
EP2860911B1 (en) Method and device for classifying encrypted data flows between at least one web client and at least one web server
CN104283647B (en) Data transmission method, device and network communication equipment based on air interface
CN110417679B (en) Method, device and system for avoiding bypass blocking
Zhou et al. Goodput improvement for multipath transport control protocol in cooperative relay‐based wireless networks
Khurshid et al. Protocols for transferring bulk data over internet: Current solutions and future challenges

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant