CN114039917A - Network traffic scheduling comprehensive judgment method and system - Google Patents

Network traffic scheduling comprehensive judgment method and system Download PDF

Info

Publication number
CN114039917A
CN114039917A CN202111418701.3A CN202111418701A CN114039917A CN 114039917 A CN114039917 A CN 114039917A CN 202111418701 A CN202111418701 A CN 202111418701A CN 114039917 A CN114039917 A CN 114039917A
Authority
CN
China
Prior art keywords
port
flow
schedulable
bandwidth
source
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111418701.3A
Other languages
Chinese (zh)
Inventor
朱文进
王玉梁
薛希俊
李忠
张宇峰
李金岭
徐俊华
刘少卿
张宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Group System Integration Co Ltd
Original Assignee
China Telecom Group System Integration Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Group System Integration Co Ltd filed Critical China Telecom Group System Integration Co Ltd
Priority to CN202111418701.3A priority Critical patent/CN114039917A/en
Priority to PCT/CN2021/139546 priority patent/WO2023092769A1/en
Publication of CN114039917A publication Critical patent/CN114039917A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/11Identifying congestion
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/12Avoiding congestion; Recovering from congestion
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/12Avoiding congestion; Recovering from congestion
    • H04L47/122Avoiding congestion; Recovering from congestion by diverting traffic away from congested entities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a network flow scheduling comprehensive judgment method and a system, which comprises the steps of constructing a Netconf command set for acquiring real-time flow, identifying the bandwidth flow of an application port by combining python language, and shunting if the bandwidth flow of a source port is higher than a set alarm threshold; respectively carrying out schedulable port retrieval, historical data acquisition and introduced bandwidth flow pre-estimation to obtain an optimal schedulable port; and transferring the network strategy of the source port to the optimal schedulable port according to the service requirement and the network characteristics, simultaneously carrying out automatic identification of the flow source IP and judgment of the transmission stability of the port network through the automatic identification module of the flow source IP, storing the flow introducing time, the source IP and the introducing identification into a historical database, and storing the flow introducing time into the historical database after the scheduling is finished. The invention not only improves the efficiency and flexibility of the deployment of the flow scheduling strategy, but also ensures the continuous stability of the target scheduling port.

Description

Network traffic scheduling comprehensive judgment method and system
Technical Field
The invention belongs to the technical field of network security, and particularly relates to a comprehensive judgment method and a comprehensive judgment system for network traffic scheduling.
Background
With the rapid development of computer technology, information networks have become an important guarantee for social development. There are many sensitive information, even national secrets. It is inevitable to attract various human attacks from all over the world (e.g., information disclosure, information theft, data tampering, data deletion and addition, computer viruses, etc.).
The network communication has the characteristic of whole-course whole-network combined operation. As far as communication is concerned, it consists of five major parts: transmission and switching, network standards, protocols and coding, communication terminals, communication sources, personnel. Most of these five major components are seriously threatened and attacked, and all of them become attack points for networks and information. In the network, ensuring information security is the core of network security.
Under the large-scale and ultra-large-scale networking scales, the problems of large network service scale, complex application relation, multiple dependence layers and difficulty in problem troubleshooting in a machine room operation and maintenance scene exist, when the flow of a network equipment port is too large and the flow is scheduled, the scheduling target port needs to be comprehensively evaluated, and the flow is scheduled to a stable port. It is not only necessary to improve the efficiency and flexibility of traffic scheduling policy deployment, but also to ensure the continuous stability of the destination scheduling port.
Disclosure of Invention
The technical problem to be solved by the present invention is to provide a method and a system for comprehensively determining network traffic scheduling, which introduces a more intelligent method for comprehensively determining the stability of a destination port of network traffic scheduling, in view of the above-mentioned deficiencies of the prior art.
In order to achieve the technical purpose, the technical scheme adopted by the invention is as follows:
a comprehensive judgment method for network traffic scheduling comprises the following steps:
step one, constructing a Netconf command set for acquiring real-time flow, identifying the bandwidth flow of an application port by combining a python language, and entering step two if the bandwidth flow of a source port is higher than a set alarm threshold;
secondly, performing schedulable port retrieval, historical data acquisition and introduced bandwidth flow estimation respectively based on a schedulable port retrieval module, a historical data acquisition module and an introduced bandwidth estimation value module to obtain an optimal schedulable port;
and step three, transferring the network strategy of the source port to the optimal schedulable port according to the service requirement and the network characteristics, simultaneously carrying out flow source IP automatic identification and port network transmission stability judgment through a flow source IP automatic identification module, storing the introduced flow time, the source IP and the introduced identification into a historical database, and storing the introduced flow time into the historical database after the scheduling is finished.
In order to optimize the technical scheme, the specific measures adopted further comprise:
the method also comprises the step of storing data of the whole flow scheduling process and providing basic analysis data for the next flow scheduling operation.
And the schedulable port retrieval module in the second step acquires all schedulable flow distribution network ports and the real-time schedulable port bandwidth flow.
And the historical data acquisition module in the second step acquires the historical network flow and the historical scheduling times of the ports by accessing the historical database.
And the introduced bandwidth pre-estimation module in the second step introduces bandwidth flow pre-estimation, acquires the number of strategies on a network port through a Netconf command set, acquires flow bandwidth flow, and calculates the average flow bandwidth flow corresponding to each strategy by weighted average.
In the second step, when drainage is needed, based on the schedulable port retrieval module, the historical data acquisition module and the schedulable port retrieval, historical data acquisition and introduced bandwidth flow prediction of the introduced bandwidth pre-estimation module, the average historical bandwidth flow and the optimal judgment index of the schedulable port are calculated, the three indexes of the average historical bandwidth flow and the optimal judgment index of the schedulable port and the bandwidth flow of the real-time schedulable port are calculated, and the optimal shunting port is comprehensively selected as the optimal schedulable port based on the three indexes.
The optimal judgment index value is obtained by acquiring the sum of the bandwidth flow of the port with the scheduling ability from the historical database within the time range of bearing the shunting task and introducing the sum of the bandwidth flow of the port with the scheduling ability, namely, the historical bandwidth flow of the port with the scheduling ability.
The third step, the traffic source IP automatic identification module performs traffic source IP automatic identification and port network transmission stability judgment, including:
step 1, executing through a python program, and performing purposeful message sniffing packet grabbing according to a destination port by using a sniff () function;
step 2, performing data sniffing packet grabbing on the scheduled network strategy, analyzing a five-tuple of the sniffed message, including a source address, a destination address, a source port, a destination port and a protocol, and adding a timestamp for classified storage;
step 3, analyzing the five-tuple information of the message by combining the timestamp, and acquiring message analysis characteristics within a time range from the beginning to the end of scheduling:
the stability of network transmission of a network traffic scheduling destination port is comprehensively judged by analyzing whether a source IP address in traffic is from an IP address section of a specified source port within a certain time range and abstracting the source IP address section as an introduction identifier and combining indexes which influence the network transmission quality such as the packet loss rate, delay millisecond and the like of a current network port.
In the introduction mark, 0 is taken to represent that the flow belongs to the introduction flow, and 1 is taken to represent that the flow does not belong to the introduction flow.
A network traffic scheduling comprehensive decision system includes:
the application port bandwidth flow identification module is used for constructing a Netconf command set for acquiring real-time flow, identifying the application port bandwidth flow by combining python language, and entering the optimal schedulable port selection module for shunting if the source port bandwidth flow is higher than a set alarm threshold;
the optimal schedulable port selecting module is used for performing schedulable port retrieval, historical data acquisition and introduced bandwidth flow prediction on the basis of the schedulable port retrieval module, the historical data acquisition module and the introduced bandwidth prediction value module respectively to obtain an optimal schedulable port;
and the port network transmission stability judgment module is used for transferring the network strategy of the source port to the optimal schedulable port according to the service requirement and the network characteristics, simultaneously carrying out automatic identification of the flow source IP and judgment of the port network transmission stability through the automatic identification module of the flow source IP, storing the introduced flow time, the source IP and the introduced identification into a historical database, and storing the introduced flow time into the historical database after the scheduling is finished.
The invention has the following beneficial effects:
the invention completes data collection, analysis and storage of the whole flow scheduling process by combining the Netconf command and the python language. Python itself is extensible, providing rich APIs and tools for programmers to easily write expansion modules using C language, C + +, Cython. The Python compiler itself can also be integrated into other programs that require a scripting language. The Netconf protocol, which may also be referred to as a network configuration protocol, provides a set of mechanisms for managing network devices, which a user may use to add, modify, delete configurations of network devices, and obtain configuration and status information of network devices. Through the Netconf protocol, the network device can provide canonical application programming interface APIs that the application can directly use to send and retrieve configurations to the network device. The invention combines the Netconf command and the python language, thereby not only improving the efficiency and the flexibility of the deployment of the flow scheduling strategy, but also ensuring the continuous stability of the target scheduling port.
Drawings
FIG. 1 is a flow chart of the method of the present invention.
Detailed Description
Embodiments of the present invention are described in further detail below with reference to the accompanying drawings.
Referring to fig. 1, a method for comprehensively determining network traffic scheduling includes:
step one, constructing a Netconf command set for acquiring real-time flow, identifying the bandwidth flow of an application port by combining a python language, and entering step two if the bandwidth flow of a source port is higher than a set alarm threshold;
the bandwidth traffic is for example: one maximum rate is 100Mb switch ports, incoming traffic is 20Mbps, and outgoing traffic is 10 Mbps. The network bandwidth traffic is: 20+10) Mb/100 Mb-30%.
With respect to the pyton language, Python itself is designed to be extensible. Not all features and functions are integrated into the language core. Python provides rich APIs and tools so that programmers can easily write expansion modules using C language, C + +, Cython. The Python compiler itself can also be integrated into other programs that require a scripting language, the present invention taking advantage of its following properties:
embeddability: python may be embedded in a C/C + + program to provide scripting functions to program users.
Rich libraries: the Python standard library is really large. It can help handle a variety of tasks including regular expressions, document generation, cell testing, threads, databases, web browsers, CGI, FTP, email, XML-RPC, HTML, WAV files, cryptographic systems, GUI (graphical user interface), Tk, and other system-related operations. This is called the "fully functional" concept of Python. In addition to standard libraries, there are many other high quality libraries such as wxPython, Twisted and Python image libraries, and so on. The following functions are utilized in the implementation of the invention:
pyton- > scapy library of functions:
scapy is a Python program that enables users to send, sniff, and parse and forge network packets. This functionality allows the construction of tools that can probe, scan or attack the network. In other words, Scapy is a powerful interactive packet handler. It can forge or decode packets of a large number of protocols, send over wires, capture them, match requests and replies, etc. Scapy can easily handle most classical tasks such as scanning, trace routing, probing, unit testing, attacks or network discovery. It may replace some of hping, arppoof, arp-sk, arping, p0f or even Nmap, tcpdump and tshark.
pyton- > sr1 module
Scapy is a powerful tool written by Python, and many excellent network scanning attack tools use the module at present. The module can also be used in the own program to realize the sending, monitoring and resolving of the network data packet. This module is the bottom layer with respect to Nmap. Various scanning attack behaviors in the network can be more intuitively known.
For example, when you go to a hospital to examine a body, the hospital gives you a test result on various indicators of the body, and the doctor tells you what disease you get or there is no disease. Then Nmap is like a doctor who makes his/her work-up and gives you the results according to his/her experience. The Scapy is a physical examination device, and only informs you of the results of various examinations, and if you are a doctor with rich experience, the results of the examinations are obviously more worth referring than the suggestions of the same lines.
pyton- > sendp module
(sendp: sending two-layer packets, Inter: packet send interval (seconds), loop: setting program to send all the time, setting the item to 1, otherwise setting 0).
Secondly, performing schedulable port retrieval, historical data acquisition and introduced bandwidth flow estimation respectively based on a schedulable port retrieval module, a historical data acquisition module and an introduced bandwidth estimation value module to obtain an optimal schedulable port;
and step three, transferring the network strategy of the source port to the optimal schedulable port according to the service requirement and the network characteristics, simultaneously carrying out flow source IP automatic identification and port network transmission stability judgment through a flow source IP automatic identification module, storing the introduced flow time, the source IP and the introduced identification into a historical database, and storing the introduced flow time into the historical database after the scheduling is finished.
In the embodiment, a schedulable port source IP, a port index, a protocol type, a security policy name and a defense result state identifier are stored.
The method also comprises the steps of storing data of the whole flow scheduling process and providing basic analysis data for the next flow scheduling operation;
in the embodiment, the schedulable port retrieval module in the second step acquires all schedulable flow distribution network ports and the bandwidth flow of the real-time schedulable port.
And the historical data acquisition module acquires the historical network flow and the historical scheduling times of the ports of each port to be selected by accessing the historical database.
The introduced bandwidth pre-estimation module introduces bandwidth flow pre-estimation, acquires the number of strategies on a network port through a Netconf command set, acquires flow bandwidth flow at the same time, and calculates the average flow bandwidth flow corresponding to each strategy by weighted average.
The specific description is as follows: for example: and discovering that 5 network strategies exist on the ports of the network equipment through Netconf, and calculating the real-time bandwidth flow of the ports, namely the real-time network port flow/bandwidth upper limit. And finally, the port real-time bandwidth flow/5 strategies obtain the average real-time bandwidth flow of each strategy.
In the second step, when drainage is needed, based on the schedulable port retrieval module, the historical data acquisition module and the schedulable port retrieval, historical data acquisition and introduced bandwidth flow prediction of the introduced bandwidth pre-estimation module, the average historical bandwidth flow and the optimal judgment index of the schedulable port are calculated, the three indexes of the average historical bandwidth flow and the optimal judgment index of the schedulable port and the bandwidth flow of the real-time schedulable port are calculated, and the optimal shunting port is comprehensively selected as the optimal schedulable port based on the three indexes.
And the optimal judgment index value is obtained from the historical database, and the historical bandwidth flow of the port can be scheduled by introducing the bandwidth flow sum of the flow port within the time range of the port capable of being scheduled to undertake the shunting task.
The average historical bandwidth flow is the sum of all historical bandwidth flows of the current network port IP/the total number of all historical bandwidth flows of the current network port IP;
the historical bandwidth flow of the schedulable port is equal to the average historical bandwidth flow/the maximum bandwidth upper limit of the current bandwidth (100M or 1000M);
real-time schedulable port bandwidth traffic-real-time bandwidth traffic/current maximum bandwidth cap (100M or 1000M).
In the embodiment, the step three, the traffic source IP automatic identification module performs traffic source IP automatic identification and port network transmission stability judgment, and includes:
step 1, executing through a python program, and performing purposeful message sniffing packet capturing filter to perform network policy message filtering scheduling according to a destination port by using a sniff () function; (sniff action is sniffing to grab a packet, filter sets Filter conditions for packet)
Step 2, performing data sniffing packet grabbing on the scheduled network strategy, analyzing a five-tuple of the sniffed message, including a source address, a destination address, a source port, a destination port and a protocol, and adding a timestamp for classified storage;
step 3, analyzing the five-tuple information of the message by combining the timestamp, and acquiring message analysis characteristics within a time range from the beginning to the end of scheduling:
within a certain time range, for example, between the point 0 today and the point 0 ending the next day, when the traffic is scheduled to a new network port, information such as a source IP (Internet protocol) and a destination IP (Internet protocol) is acquired and stored in a database for analysis through program execution and analysis of quintuple. For example: the network traffic value introduced by the quintuple source IP is 20M, the traffic introduced by the 2 policies of the source port to the new port is 25M, and the introduction efficiency 20/25 of the existing port is 80%. The higher the index, the better the drainage effect. It may not be 100% due to network anomalies, or transmission problems.
The stability of network transmission of a network traffic scheduling destination port is comprehensively judged by analyzing whether a source IP address in traffic is from an IP address section of a specified source port within a certain time range and abstracting the source IP address section as an introduction identifier and combining indexes which influence the network transmission quality such as the packet loss rate, delay millisecond and the like of a current network port.
And taking 0 as the introduction identifier to represent that the introduction identifier belongs to the introduction flow, and taking 1 as the introduction identifier not belongs to the introduction flow.
A network traffic scheduling comprehensive decision system includes:
the application port bandwidth flow identification module is used for constructing a Netconf command set for acquiring real-time flow, identifying the application port bandwidth flow by combining python language, and entering the optimal schedulable port selection module for shunting if the source port bandwidth flow is higher than a set alarm threshold;
the optimal schedulable port selecting module is used for performing schedulable port retrieval, historical data acquisition and introduced bandwidth flow prediction on the basis of the schedulable port retrieval module, the historical data acquisition module and the introduced flow prediction value module respectively to obtain an optimal schedulable port;
and the port network transmission stability judgment module is used for transferring the network strategy of the source port to the optimal schedulable port according to the service requirement and the network characteristics, simultaneously carrying out automatic identification of the flow source IP and judgment of the port network transmission stability through the automatic identification module of the flow source IP, storing the introduced flow time, the source IP and the introduced identification into a historical database, and storing the introduced flow time into the historical database after the scheduling is finished.
The above is only a preferred embodiment of the present invention, and the protection scope of the present invention is not limited to the above-mentioned embodiments, and all technical solutions belonging to the idea of the present invention belong to the protection scope of the present invention. It should be noted that modifications and embellishments within the scope of the invention may be made by those skilled in the art without departing from the principle of the invention.

Claims (10)

1. A comprehensive judgment method for network traffic scheduling is characterized by comprising the following steps:
step one, constructing a Netconf command set for acquiring real-time flow, identifying the bandwidth flow of an application port by combining a python language, and entering step two if the bandwidth flow of a source port is higher than a set alarm threshold;
secondly, performing schedulable port retrieval, historical data acquisition and introduced bandwidth flow estimation respectively based on a schedulable port retrieval module, a historical data acquisition module and an introduced bandwidth estimation value module to obtain an optimal schedulable port;
and step three, transferring the network strategy of the source port to the optimal schedulable port according to the service requirement and the network characteristics, simultaneously carrying out flow source IP automatic identification and port network transmission stability judgment through a flow source IP automatic identification module, storing the introduced flow time, the source IP and the introduced identification into a historical database, and storing the introduced flow time into the historical database after the scheduling is finished.
2. The method according to claim 1, further comprising storing data of the whole process of traffic scheduling to provide basic analysis data for the next traffic scheduling operation.
3. The method according to claim 1, wherein the schedulable port retrieval module of step two obtains all schedulable offload network ports and real-time schedulable port bandwidth traffic.
4. The method according to claim 1, wherein in step two, the historical data obtaining module obtains the historical network traffic and the historical port scheduling times of each port to be selected by accessing a historical database.
5. The method according to claim 1, wherein the bandwidth prediction estimation module in step two introduces bandwidth traffic prediction, obtains the number of policies on a network port through a Netconf command set, obtains traffic bandwidth traffic, and calculates the average traffic bandwidth traffic corresponding to each policy by weighted average.
6. The method according to claim 1, wherein in the second step, when drainage is needed, an average historical bandwidth flow and an optimal decision index of the schedulable port are calculated based on the schedulable port retrieval module, the historical data acquisition module and the schedulable port retrieval, the historical data acquisition and the introduced bandwidth flow prediction of the introduced bandwidth prediction value module, and the bandwidth flow of the schedulable port and the bandwidth flow of the real-time schedulable port are three indexes, and an optimal shunting port is selected as the optimal schedulable port based on the three indexes.
7. The method according to claim 6, wherein the optimal decision index value is obtained by taking the sum of bandwidth flows of the schedulable port in a time range of assuming the shunting task from the historical database, that is, the historical bandwidth flow of the schedulable port.
8. The method according to claim 1, wherein the step three in which the traffic source IP automatic identification module performs traffic source IP automatic identification and port network transmission stability determination comprises:
step 1, executing through a python program, and performing purposeful message sniffing packet grabbing according to a destination port by using a sniff () function;
step 2, performing data sniffing packet grabbing on the scheduled network strategy, analyzing a five-tuple of the sniffed message, including a source address, a destination address, a source port, a destination port and a protocol, and adding a timestamp for classified storage;
step 3, analyzing the five-tuple information of the message by combining the timestamp, and acquiring message analysis characteristics within a time range from the beginning to the end of scheduling:
the stability of network transmission of a network traffic scheduling destination port is comprehensively judged by analyzing whether a source IP address in traffic is from an IP address section of a specified source port within a certain time range and abstracting the source IP address section as an introduction identifier and combining indexes which influence the network transmission quality such as the packet loss rate, delay millisecond and the like of a current network port.
9. The method of claim 8, wherein the incoming id takes 0 for incoming traffic and 1 for incoming traffic.
10. A network traffic scheduling comprehensive decision system is characterized by comprising:
the application port bandwidth flow identification module is used for constructing a Netconf command set for acquiring real-time flow, identifying the application port bandwidth flow by combining python language, and entering the optimal schedulable port selection module for shunting if the source port bandwidth flow is higher than a set alarm threshold;
the optimal schedulable port selecting module is used for performing schedulable port retrieval, historical data acquisition and introduced bandwidth flow prediction on the basis of the schedulable port retrieval module, the historical data acquisition module and the introduced bandwidth prediction value module respectively to obtain an optimal schedulable port;
and the port network transmission stability judgment module is used for transferring the network strategy of the source port to the optimal schedulable port according to the service requirement and the network characteristics, simultaneously carrying out automatic identification of the flow source IP and judgment of the port network transmission stability through the automatic identification module of the flow source IP, storing the introduced flow time, the source IP and the introduced identification into a historical database, and storing the introduced flow time into the historical database after the scheduling is finished.
CN202111418701.3A 2021-11-26 2021-11-26 Network traffic scheduling comprehensive judgment method and system Pending CN114039917A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202111418701.3A CN114039917A (en) 2021-11-26 2021-11-26 Network traffic scheduling comprehensive judgment method and system
PCT/CN2021/139546 WO2023092769A1 (en) 2021-11-26 2021-12-20 Comprehensive determination method and system for network traffic scheduling

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111418701.3A CN114039917A (en) 2021-11-26 2021-11-26 Network traffic scheduling comprehensive judgment method and system

Publications (1)

Publication Number Publication Date
CN114039917A true CN114039917A (en) 2022-02-11

Family

ID=80145580

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111418701.3A Pending CN114039917A (en) 2021-11-26 2021-11-26 Network traffic scheduling comprehensive judgment method and system

Country Status (2)

Country Link
CN (1) CN114039917A (en)
WO (1) WO2023092769A1 (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103200124A (en) * 2013-03-07 2013-07-10 北京华为数字技术有限公司 Service strategy adjustment method and service strategy adjustment device
CN103618646A (en) * 2013-11-28 2014-03-05 瑞斯康达科技发展股份有限公司 Method for detecting network performance, packet loss probability and time delay and network fringe node equipment
CN104717158A (en) * 2015-03-02 2015-06-17 中国联合网络通信集团有限公司 Method and device for adjusting bandwidth scheduling strategy
CN105471759A (en) * 2016-01-11 2016-04-06 北京百度网讯科技有限公司 Network traffic scheduling method and apparatus for data centers
CN106302221A (en) * 2016-09-12 2017-01-04 中国联合网络通信集团有限公司 Traffic scheduling method based on end office's cloud and system
CN109257254A (en) * 2018-09-21 2019-01-22 平安科技(深圳)有限公司 Network connectivty inspection method, device, computer equipment and storage medium
CN109600259A (en) * 2018-12-11 2019-04-09 浙江工商大学 A kind of real-time Transmission mechanism based on software definable
CN110177054A (en) * 2019-05-22 2019-08-27 新华三技术有限公司 A kind of port queue dispatching method, device, network controller and storage medium

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105429886A (en) * 2015-10-30 2016-03-23 南京优速网络科技有限公司 Comprehensive unified flow scheduling system and scheduling method based on SDN
CN110035012B (en) * 2018-12-25 2021-09-14 中国银联股份有限公司 SDN-based VPN flow scheduling method and SDN-based VPN flow scheduling system
CN109547343B (en) * 2019-01-04 2020-09-18 网宿科技股份有限公司 Traffic scheduling method and system
CN112995056B (en) * 2019-12-16 2023-09-15 中兴通讯股份有限公司 Traffic scheduling method, electronic equipment and storage medium
CN112073445B (en) * 2020-11-16 2021-01-29 浙江山迅网络科技有限公司 Hybrid port traffic scheduling method and device, readable storage medium and electronic equipment

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103200124A (en) * 2013-03-07 2013-07-10 北京华为数字技术有限公司 Service strategy adjustment method and service strategy adjustment device
CN103618646A (en) * 2013-11-28 2014-03-05 瑞斯康达科技发展股份有限公司 Method for detecting network performance, packet loss probability and time delay and network fringe node equipment
CN104717158A (en) * 2015-03-02 2015-06-17 中国联合网络通信集团有限公司 Method and device for adjusting bandwidth scheduling strategy
CN105471759A (en) * 2016-01-11 2016-04-06 北京百度网讯科技有限公司 Network traffic scheduling method and apparatus for data centers
CN106302221A (en) * 2016-09-12 2017-01-04 中国联合网络通信集团有限公司 Traffic scheduling method based on end office's cloud and system
CN109257254A (en) * 2018-09-21 2019-01-22 平安科技(深圳)有限公司 Network connectivty inspection method, device, computer equipment and storage medium
CN109600259A (en) * 2018-12-11 2019-04-09 浙江工商大学 A kind of real-time Transmission mechanism based on software definable
CN110177054A (en) * 2019-05-22 2019-08-27 新华三技术有限公司 A kind of port queue dispatching method, device, network controller and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
(美)贝诺特•克莱斯等编著,闫林等翻译: "《基于YANG的可编程网络 用YANG NETCONF RESTCONF和gNMI实现网络自动化架构》", 北京:北京邮电大学出版社, pages: 123 - 125 *

Also Published As

Publication number Publication date
WO2023092769A1 (en) 2023-06-01

Similar Documents

Publication Publication Date Title
CN106789177B (en) A kind of system of dealing with network breakdown
EP2563062B1 (en) Long connection management apparatus and link resource management method for long connection communication
JP5840788B2 (en) Method, apparatus and communication network for root cause analysis
CN101924757B (en) Method and system for reviewing Botnet
EP1742416B1 (en) Method, computer readable medium and system for analyzing and management of application traffic on networks
CN102158360B (en) Network fault self-diagnosis method based on causal relationship positioning of time factors
CN102045363B (en) Establishment, identification control method and device for network flow characteristic identification rule
CN107404421A (en) Flow monitoring, monitoring and managing method and system
Qiao et al. Characterizing flow, application, and user behavior in mobile networks: A framework for mobile big data
CN109818820A (en) Data on flows monitoring method, device, electronic equipment and storage medium
CN112333020B (en) Network security monitoring and data message analysis system based on quintuple
CN114363222A (en) Network equipment inspection method and system based on Netconf protocol
CN104539556A (en) Method for providing satisfaction service quality for users under heterogeneous network environment
CN117459457A (en) Access method based on distributed core network
CN114158080B (en) Monitoring method, device and computer readable storage medium
CN107846310B (en) IPTV video quality difference linkage dial testing delimitation method based on client resource tree
CN114301640B (en) Attack and defense exercise method and system based on SRv6 network protocol
CN114039917A (en) Network traffic scheduling comprehensive judgment method and system
CN105784937A (en) Visualization method and system for detection data of gas benzene compounds
CN102123092B (en) A kind of multicast performance analytical method and system
CN109462283A (en) Intelligent substation individual equipment flux monitoring method and system
CN111654413B (en) Method, equipment and storage medium for selecting effective measurement points of network flow
Yang et al. Traffic anomaly detection and prediction based on SDN-enabled ICN
CN114338470A (en) Port network traffic scheduling judgment method and system
KR100812946B1 (en) System and Method for Managing Quality of Service in Mobile Communication Network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: Room 1308, 13th floor, East Tower, 33 Fuxing Road, Haidian District, Beijing 100036

Applicant after: China Telecom Digital Intelligence Technology Co.,Ltd.

Address before: Room 1308, 13th floor, East Tower, 33 Fuxing Road, Haidian District, Beijing 100036

Applicant before: CHINA TELECOM GROUP SYSTEM INTEGRATION Co.,Ltd.

CB02 Change of applicant information