CN107528923B - Data transmission method of network adapter and network adapter - Google Patents

Data transmission method of network adapter and network adapter Download PDF

Info

Publication number
CN107528923B
CN107528923B CN201710916380.7A CN201710916380A CN107528923B CN 107528923 B CN107528923 B CN 107528923B CN 201710916380 A CN201710916380 A CN 201710916380A CN 107528923 B CN107528923 B CN 107528923B
Authority
CN
China
Prior art keywords
session
processing
data
destination
network adapter
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710916380.7A
Other languages
Chinese (zh)
Other versions
CN107528923A (en
Inventor
王彩萍
许同伟
刘金华
李娜
许评
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Polytechnic College of Agriculture and Forestry
Original Assignee
Jiangsu Polytechnic College of Agriculture and Forestry
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Polytechnic College of Agriculture and Forestry filed Critical Jiangsu Polytechnic College of Agriculture and Forestry
Priority to CN201710916380.7A priority Critical patent/CN107528923B/en
Publication of CN107528923A publication Critical patent/CN107528923A/en
Application granted granted Critical
Publication of CN107528923B publication Critical patent/CN107528923B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/561Adding application-functional data or data for application control, e.g. adding metadata
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/565Conversion or adaptation of application format or content
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/16Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
    • H04L69/161Implementation details of TCP/IP or UDP/IP stack architecture; Specification of modified or new header fields
    • H04L69/162Implementation details of TCP/IP or UDP/IP stack architecture; Specification of modified or new header fields involving adaptations of sockets based mechanisms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/30Definitions, standards or architectural aspects of layered protocol stacks
    • H04L69/32Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
    • H04L69/321Interlayer communication protocols or service data unit [SDU] definitions; Interfaces between layers

Abstract

The invention discloses a novel network adapter supporting a TCP/IP protocol cluster and a data transmission method thereof. Both sent and received by the host application layer are metadata. The novel network adapter can independently complete some protocol negotiations, such as functions of establishing data connection, encapsulating/de-encapsulating network data, encrypting/decrypting data, compressing/decompressing network data, a hardware firewall, responding network detection messages, various routing and link detection mechanisms, even PPP/DHCP user dialing and the like by realizing a TCP/IP protocol stack. It provides the possibility for the operating system and existing hardware to process only the metadata. The data throughput of the core hardware is greatly improved. The invention can form a novel host framework which is as small as a PC and as large as various servers, and is suitable for wide application.

Description

Data transmission method of network adapter and network adapter
Technical Field
The invention relates to a computer network technology, in particular to a data transmission technology in a computer network, and particularly relates to a novel network adapter supporting a TCP/IP protocol cluster and a data transmission method thereof.
Background
At present, because of the wide use of the TCP/IP protocol, the use of the TCP/IP protocol for data communication is the mainstream configuration of the host. In the OSI seven-layer model of a network, a common network adapter is a network component working at a link layer, covers a physical layer and a data link layer, is an interface for connecting a computer and a transmission medium in a local area network, and implements the functions of physical connection and electrical signal matching with the transmission medium of the local area network, sending and receiving of data frames, encapsulating and decapsulating of frames, media access control, encoding and decoding of data, and data caching. With the widespread application of cloud computing and cloud storage, the data volume of network data is increased sharply, and the relationship between the network data and users is more and more intimate. In the future, a vast majority of data from personal PCs and cloud servers will originate from the network.
Today, electronic manufacturing technology is more and more mature, hardware products are more and more updated, and hardware manufacturing cost is less and less. All this stems from the increasing maturity of electronic manufacturing technologies. At present, hardware configuration of a plurality of household PCs can reach the configuration standard of a small and medium-sized server. It is also stated from the side that the processing speed of the host is more and more relevant to the user experience.
In this context, the desire for high performance CPU + large memory to increase host processing speed will be encumbered by the mode of operating systems hosting simple network adapters. Fig. 1 illustrates an operation mode of a conventional network adapter on a host, in which the network adapter operates in a data link layer, and operations such as data packet parsing/checking, data packet encapsulation/checking, user data packet encryption/decryption (user IPSec VPN access scenario), user packet compression/decompression, deep parsing of network data, and virus identification consume a large part of software and hardware resources of the host. Meanwhile, in the 'ill-conditioned' mode, the user experience can be maintained only by continuously upgrading the CPU, the memory and even the mainboard. This can be a significant overhead worldwide.
Meanwhile, due to the fact that task scheduling exists in the operation of the operating system, response to the link detection message is difficult to respond quickly like hardware. Therefore, once a link is interrupted or traffic is congested, the host cannot timely converge data processing, and data loss is caused. It must often be ensured that the communication data is not lost by means of a connection-oriented communication protocol, which is relatively communication-intensive. If the host has a hardware capable of independently supporting the probing protocol, the link convergence rate of the host is greatly increased.
If the overhead is removed from the existing operating system and hardware resources, the overhead is handed to an independent hardware to be completed independently. The operating system and the application program only need to be responsible for processing the metadata, so that the user experience is greatly improved, and more software and hardware resources can be focused on data service processing by the cloud host and the distributed server.
Therefore, it is highly desirable to have a new type of network adapter that supports the TCP/IP protocol suite.
Disclosure of Invention
The purpose of the invention is as follows: aiming at the defects of the prior art, the invention provides a data transmission method of a network adapter and the network adapter, which can realize network data processing based on a TCP/IP protocol cluster.
The technical scheme is as follows: the data transmission method of the network adapter comprises the following steps:
the application program constructs a unique identifier of the application in the local computer according to the module ID or the task identifier;
the application program informs the information of the opposite end of the novel network adapter through the destination IP address and the destination port, and then initiates a session;
the application program registers a message receiving and processing interface for processing return data to the novel network adapter;
and the return data is transmitted to the application program through a message receiving and processing interface corresponding to the session, and the data receiving is completed.
The data sending method comprises the following steps:
constructing information required by an application layer to send data to a network adapter, wherein the information comprises an application program module ID or a task identifier, a destination IP address or a destination IP address plus a destination port and a message receiving and processing interface;
the application layer calls an interface provided by the network adapter and transmits the constructed data;
the network adapter searches corresponding session information according to the transmitted data information, packages the metadata of the application layer by layer, and initiates a session request to a far end;
a session is created and a session table is established.
The data receiving method comprises the following steps:
acquiring data from a link layer, and decapsulating the data layer by layer;
inquiring a session table according to the current session information;
if the session table is valid, calling a corresponding message receiving and processing function, and transmitting the metadata to an application program for processing; if the session table is not present or invalid, the data is discarded.
A network adapter, comprising:
the hardware processor can independently complete common protocol interaction and data processing;
the independent hardware memory or the host memory which can be used independently is used for caching the messages and data interacted by the protocol;
the independent nonvolatile storage unit stores software, user configuration and operation logs required by the operation of the independent nonvolatile storage unit;
and the plurality of link transceiver module slots are used for supporting the driving and automatic identification of various physical layer transceiver modules or flexible plug-in cards.
Has the advantages that: the invention discloses a novel network adapter supporting a TCP/IP protocol cluster and a data transmission method thereof. Both sent and received by the host application layer are metadata. The novel network adapter can independently complete some protocol negotiations, such as functions of establishing data connection, encapsulating/de-encapsulating network data, encrypting/decrypting data, compressing/decompressing network data, a hardware firewall, responding network detection messages, various routing and link detection mechanisms, even PPP/DHCP user dialing and the like by realizing a TCP/IP protocol stack. It provides the possibility for the operating system and existing hardware to process only the metadata. The data throughput of the core hardware is greatly improved. The invention can form a novel host framework which is as small as a PC and as large as various servers, and is suitable for wide application.
Drawings
Fig. 1 illustrates a host operating mode based on a conventional network adapter.
Fig. 2 shows the host working mode of the new network adapter supporting the TCP/IP protocol cluster according to the present invention.
Fig. 3 is a flowchart of data transmission performed by the new network adapter according to the present invention.
Fig. 4 is a flowchart of message reception performed by the novel network adapter according to the present invention.
Fig. 5 is a system structure diagram of the novel network adapter according to the present invention.
Detailed Description
The technical scheme of the invention is further explained by combining the attached drawings.
The invention discloses a novel network adapter supporting a TCP/IP protocol cluster. As shown in fig. 2, the new network adapter covers the complete TCP/IP protocol stack, and can independently complete the functions of encapsulating/decapsulating network data, encrypting/decrypting data, compressing/decompressing network data, firewall, responding network probe message, various routing and link detection mechanisms, and even PPP/DHCP/L2TP user dialing. The processing of the protocol stack of the operating system to the message is reduced as much as possible, the processing speed of the network data is improved through hardware, and core resources such as a CPU (central processing unit), a memory and the like of the host are saved.
The main functions of the novel network adapter are realized as follows:
1) independent data transmission and reception
The application program constructs a unique identifier of the application in the local computer according to the module ID or the task identifier;
the application program informs the information of the opposite end of the novel network adapter through the destination IP address and the destination port, and then the session can be initiated;
meanwhile, the application program needs to register a message receiving and processing interface to the novel network adapter to process return data;
the return data can be transmitted to the application program through a message receiving and processing interface corresponding to the session, and the data receiving is completed;
in the above process, the application layer does not need to create a session, maintain the session state and participate in the encapsulation and decapsulation of data. Both sent and received by the host application layer are metadata.
2) In the network layer processing of the novel network adapter, the processing of firewall and deep virus analysis is added, and the safety of the host is effectively protected.
3) The novel network adapter can complete PPP/DHCP/L2TP autonomous dialing through the dialing mode configured by the user, the user name, the password and other information, and can maintain the user shielding network.
4) The novel network adapter can encrypt or decrypt data transmitted and received in a network layer under an IPSec VPN scene.
5) And common network link detection and maintenance protocols such as BFD, VRRP, STP and the like are supported, and protocol negotiation and response are automatically completed. But the application program can be informed only by hooking corresponding processing in the event of protocol state change by the user.
Specifically, the following data transmission and reception are taken as examples to describe in detail the working process of the network adapter of the present invention.
As shown in fig. 3, the data transmission through the new network adapter includes the following steps:
step 301, constructing an application layer to send required information to the new network adapter once, including but not limited to: application program module ID or task identification, destination IP address or destination IP address plus destination port, message receiving and processing interface.
Wherein, the application module ID or task identification is used for distinguishing different applications of the computer in the novel network adapter;
the destination IP address or the destination IP address plus the destination port is used for the network adapter to establish a session with the remote end;
the message receiving and processing interface is responsible for delivering return data to a corresponding application layer program for processing;
step 302, the application layer calls an interface provided by the novel network adapter, transmits the constructed data and prepares for data transmission;
step 303, the network adapter queries corresponding session information according to the incoming application ID or task identifier, destination IP address or destination IP address plus destination port as Key value;
step 304, judging whether session information exists, if the session information does not exist, turning to 312 processing, and if the session exists, turning to 305 processing;
step 305, judging whether the inquired session table is valid, if the session table is valid, turning to step 306 for processing, and if not, turning to step 310 for processing;
step 306, acquiring socket information corresponding to the session, and refreshing a last use time stamp of the session table, wherein the time stamp indicates the last use time of the table entry and can be used for comparing the table entry aging mechanism with the current time so as to determine whether the table entry exceeds an aging period and needs to be deleted and recycled;
307, performing TCP/UDP encapsulation on the metadata of the application program;
308, packaging the application program metadata or the data frame which is packaged by the TCP/UDP by an IP layer;
step 309, completing link layer encapsulation of the data frame;
step 310, if the time of initiating the conversation last time is overtime, then processing is switched to 312, otherwise, processing is switched to 311; the connection timeout time is used for inhibiting the connection establishment request triggered frequently by the data sending request, so as to reduce network congestion, and the timeout time is allowed to be configured by the user;
step 311, returning an error value to the application program, and informing the application program that no available session exists currently;
step 312, initiating a session establishment request to the remote end according to the destination IP address or the destination IP address + the destination port;
step 313, if the new network adapter initiates a session successfully according to the information specified by the application program, turning to 315 for processing, otherwise, turning to 314 for processing;
step 314, establishing a pseudo session table according to the module ID or task identifier, the IP address or the destination IP address plus the destination port group Key, and storing information such as a session failure flag, a time stamp of the session initiation time and the like;
compared with a real session table, the pseudo session table is characterized in that the failure mark is proper and is used for recording a first session initiation timestamp, ensuring that the session is not initiated frequently within a period of time after the timestamp, reducing unnecessary system consumption, and trying to establish the session with a remote terminal again after the specified time is exceeded;
315, inquiring a message receiving and processing interface corresponding to the task according to the module ID or the task identifier;
step 316, after the session is successfully created, a session table is established according to the module ID or the task identifier, the IP address or the destination IP address plus the destination port group key, and a message receiving and processing interface is associated. If a dummy session table exists, it is overwritten. And executing the operations of the steps 306-309 to finish message encapsulation.
After the return data reach the novel network adapter of the home terminal, the data layer by layer can be unpacked. Then according to the conversation information, inquiring a conversation table and a corresponding message receiving and processing interface, and delivering the data to an application program for processing. As shown in fig. 4, the specific steps performed to receive data are as follows:
step 401, acquiring data from a link layer, and removing link layer encapsulation;
step 402, analyzing and checking the IP layer encapsulation, and then stripping the IP layer encapsulation;
step 403, analyzing and checking TCP/UDP encapsulation, and then stripping off TCP/UDP layer encapsulation;
step 404, acquiring corresponding session information according to the current session information;
step 405, constructing a Key according to the current session information, and inquiring a session table;
step 406, judging whether the session table exists and is valid, if the session table exists and is valid, turning to 408 for processing, and if not, turning to 407 for processing;
step 407, if the current session table does not exist or the session table is invalid, discarding the current data;
and step 408, if the current session table exists and is valid, calling a corresponding message receiving and processing function, delivering the metadata to an application program for processing, and then updating the timestamp used by the session table.
In addition, a set of session table/pseudo session table aging mechanism is required for the network adapter. The session table and dummy session table that ensure that the aging time is reached are deleted for reclamation.
Compared with the conventional network adapter, the new network adapter supporting the TCP/IP protocol cluster can implement the above functions only by performing a certain extension on the hardware architecture, as shown in fig. 5, the new network adapter includes, but is not limited to, the following components:
1) and the hardware processor can independently complete common protocol interaction and data processing. In addition, a coprocessor, such as a coprocessor for TCP/UDP/IP header checksum calculation or other hardware units with the function can be further included; the network adapter for the secure application scenario preferably has a co-processor or other hardware unit that supports the usual encryption/decryption algorithms.
3) And the independent hardware memory or the host memory which can be independently used is used for caching the messages and data interacted by the protocol.
4) And the independent nonvolatile storage unit stores software, user configuration and operation logs required by the operation of the independent nonvolatile storage unit. After the host computer is started or restarted, the network adapter can automatically recover to a normal working state and the running log is not lost.
5) Certain service data processing capacity and service configuration interface are provided to meet the service requirements of user firewall, virus defense and the like.
6) And the plurality of link transceiver module slots are used for supporting the driving and automatic identification of various physical layer transceiver modules or flexible plug-in cards. The working mode of the network adapter is similar to an independent network terminal, and the physical layer link connection module can support flexible card insertion and automatic identification, such as an ETH link transceiver module, a wireless link transceiver module, a PPP link transceiver module and an ATM link transceiver module, so that the practicability of the network adapter under different link scenes can be enhanced to a great extent without paying the cost of a plurality of complete network adapters. For example, in an ETH link scenario, an ETH transceiver card or module is used in cooperation with the network adapter, and when the network adapter is used in a wireless scenario, one wireless transceiver card or module may be replaced or added, and the main body of the network adapter does not need to be replaced. This hardware architecture reduces the cost of the network adapter to some extent.
In the aspect of maintainability, the novel network adapter provides a simple management interface or interface for a user, so that the user can conveniently configure or upgrade, and the network access mode, IP/DNS configuration and the like of the network adapter are completed.

Claims (1)

1. A data transmission method of a network adapter, characterized in that, the data transmission process comprises the following steps:
step 301, constructing information required by the application layer to send data to the network adapter for one time, including: an application program module ID or task identification, a destination IP address or a destination IP address plus a destination port and a message receiving and processing interface;
step 302, the application layer calls an interface provided by the network adapter, transmits the constructed data and prepares for data transmission;
step 303, the network adapter queries corresponding session information according to the incoming application ID or task identifier, destination IP address or destination IP address plus destination port as Key value;
step 304, judging whether session information exists, if the session information does not exist, turning to 312 processing, and if the session exists, turning to 305 processing;
step 305, judging whether the inquired session table is valid, if the session table is valid, turning to step 306 for processing, and if not, turning to step 310 for processing;
step 306, acquiring socket information corresponding to the session, and refreshing a last use time stamp of the session table, wherein the time stamp indicates the last use time of the table entry for comparing the table entry aging mechanism with the current time so as to determine whether the table entry exceeds the aging period and needs to be deleted and recycled;
307, performing TCP/UDP encapsulation on the metadata of the application program;
308, packaging the application program metadata or the data frame which is packaged by the TCP/UDP by an IP layer;
step 309, completing link layer encapsulation of the data frame;
step 310, if the time of initiating the conversation last time is overtime, then processing is switched to 312, otherwise, processing is switched to 311;
step 311, returning an error value to the application program, and informing the application program that no available session exists currently;
step 312, initiating a session establishment request to the remote end according to the destination IP address or the destination IP address plus the destination port;
step 313, if the network adapter initiates the session successfully according to the information specified by the application program, then processing is switched to 315, otherwise, processing is switched to 314;
step 314, establishing a pseudo session table according to the module ID or the task identifier, the destination IP address or the destination IP address plus the destination port as a Key value, and storing a session failure flag and a time stamp of the session initiation time;
315, inquiring a message receiving and processing interface corresponding to the task according to the module ID or the task identifier;
step 316, after the session is successfully established, establishing a session table according to the module ID or the task identifier, the destination IP address or the destination IP address plus the destination port as a key value, associating a message receiving and processing interface, executing the operations of the steps 306 to 309, and finishing message encapsulation;
the data receiving process comprises the following steps:
step 401, acquiring data from a link layer, and removing link layer encapsulation;
step 402, analyzing and checking the IP layer encapsulation, and then stripping the IP layer encapsulation;
step 403, analyzing and checking TCP/UDP encapsulation, and then stripping off TCP/UDP layer encapsulation;
step 404, acquiring corresponding session information according to the current session information;
step 405, constructing a Key value according to the current session information, and inquiring a session table;
step 406, judging whether the session table exists and is valid, if the session table exists and is valid, turning to 408 for processing, and if not, turning to 407 for processing;
step 407, if the current session table does not exist or the session table is invalid, discarding the current data;
and step 408, if the current session table exists and is valid, calling a corresponding message receiving and processing function, delivering the metadata to an application program for processing, and then updating the timestamp used by the session table.
CN201710916380.7A 2017-09-30 2017-09-30 Data transmission method of network adapter and network adapter Active CN107528923B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710916380.7A CN107528923B (en) 2017-09-30 2017-09-30 Data transmission method of network adapter and network adapter

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710916380.7A CN107528923B (en) 2017-09-30 2017-09-30 Data transmission method of network adapter and network adapter

Publications (2)

Publication Number Publication Date
CN107528923A CN107528923A (en) 2017-12-29
CN107528923B true CN107528923B (en) 2020-08-25

Family

ID=60684159

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710916380.7A Active CN107528923B (en) 2017-09-30 2017-09-30 Data transmission method of network adapter and network adapter

Country Status (1)

Country Link
CN (1) CN107528923B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111988264A (en) * 2019-05-22 2020-11-24 阿里巴巴集团控股有限公司 Block chain and network system, data receiving and sending method and equipment
CN112953977B (en) * 2021-05-13 2021-11-02 华锐分布式(北京)技术有限公司 System data sending method and system
CN115103042B (en) * 2022-05-07 2024-01-05 深圳市广和通无线股份有限公司 System based on CPE wide area network management protocol and wireless communication module
CN116055542B (en) * 2022-12-29 2024-03-15 南京先进计算产业发展有限公司 Network adapter and high-performance computing cluster server communication connection method

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101409673A (en) * 2008-11-12 2009-04-15 北京恒光创新科技股份有限公司 Method for transmitting network adapter data, network adapter and system
CN105005507A (en) * 2015-06-25 2015-10-28 黎亮 Combinative middleware system based on market

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101409673A (en) * 2008-11-12 2009-04-15 北京恒光创新科技股份有限公司 Method for transmitting network adapter data, network adapter and system
CN105005507A (en) * 2015-06-25 2015-10-28 黎亮 Combinative middleware system based on market

Also Published As

Publication number Publication date
CN107528923A (en) 2017-12-29

Similar Documents

Publication Publication Date Title
CN107528923B (en) Data transmission method of network adapter and network adapter
CN107682284B (en) Method and network equipment for sending message
US9258305B2 (en) Authentication method, transfer apparatus, and authentication server
CN107026764B (en) Remote debugging method, device, server and system
WO2001055880A1 (en) Messaging method and apparatus for transceiving messages in client/server environment over multiple wireless networks
US8700820B2 (en) Method for accessing USB device attached to home gateway, home gateway and terminal
WO2014082577A1 (en) Remote debugging method and system
CN101207604A (en) Virtual machine system and communication processing method thereof
US9191406B2 (en) Message relaying apparatus, communication establishing method, and computer program product
US11689564B2 (en) Method and apparatus for processing data in cleaning device
CN101729543A (en) Method for improving performance of mobile SSL VPN by utilizing remote Socks5 technology
US10742768B2 (en) Relaying system and method of transmitting IP address of client to server using encapsulation protocol
CN112202872A (en) Data forwarding method, API gateway and message service system
EP3678333B1 (en) Data processing method and device, and computer
AU2004297923A1 (en) Method and apparatus to inline encryption and decryption for a wireless station
US7523179B1 (en) System and method for conducting direct data placement (DDP) using a TOE (TCP offload engine) capable network interface card
CN108924157B (en) Message forwarding method and device based on IPSec VPN
KR100602633B1 (en) apparatus and method for header compression in packet
CN107547618B (en) Session dismantling method and device
CN112887312B (en) Slow protocol message processing method and related device
CN111866060A (en) TLS (transport layer service) connection method of communication equipment, communication equipment and communication system
US20100166011A1 (en) Method, apparatus and system for realizing dynamic correlation of control plane traffic rate
CN113162922A (en) Client data acquisition method and device, storage medium and electronic equipment
JP2002026927A (en) Capsulating method and unit, and program recording medium
CN115801629B (en) Bidirectional forwarding detection method and device, electronic equipment and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant