CN114039917A - Network traffic scheduling comprehensive judgment method and system - Google Patents
Network traffic scheduling comprehensive judgment method and system Download PDFInfo
- Publication number
- CN114039917A CN114039917A CN202111418701.3A CN202111418701A CN114039917A CN 114039917 A CN114039917 A CN 114039917A CN 202111418701 A CN202111418701 A CN 202111418701A CN 114039917 A CN114039917 A CN 114039917A
- Authority
- CN
- China
- Prior art keywords
- port
- flow
- schedulable
- bandwidth
- source
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 24
- 230000005540 biological transmission Effects 0.000 claims abstract description 21
- 238000004458 analytical method Methods 0.000 claims description 8
- 230000006870 function Effects 0.000 claims description 7
- 230000008569 process Effects 0.000 claims description 4
- 238000004891 communication Methods 0.000 description 4
- 239000008186 active pharmaceutical agent Substances 0.000 description 3
- 238000012360 testing method Methods 0.000 description 3
- 238000011161 development Methods 0.000 description 2
- 201000010099 disease Diseases 0.000 description 2
- 208000037265 diseases, disorders, signs and symptoms Diseases 0.000 description 2
- 241000700605 Viruses Species 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000007405 data analysis Methods 0.000 description 1
- 238000013480 data collection Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000007123 defense Effects 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 230000014509 gene expression Effects 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 239000000523 sample Substances 0.000 description 1
- 238000013024 troubleshooting Methods 0.000 description 1
- 238000010626 work up procedure Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/10—Flow control; Congestion control
- H04L47/11—Identifying congestion
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/10—Flow control; Congestion control
- H04L47/12—Avoiding congestion; Recovering from congestion
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/10—Flow control; Congestion control
- H04L47/12—Avoiding congestion; Recovering from congestion
- H04L47/122—Avoiding congestion; Recovering from congestion by diverting traffic away from congested entities
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a network flow scheduling comprehensive judgment method and a system, which comprises the steps of constructing a Netconf command set for acquiring real-time flow, identifying the bandwidth flow of an application port by combining python language, and shunting if the bandwidth flow of a source port is higher than a set alarm threshold; respectively carrying out schedulable port retrieval, historical data acquisition and introduced bandwidth flow pre-estimation to obtain an optimal schedulable port; and transferring the network strategy of the source port to the optimal schedulable port according to the service requirement and the network characteristics, simultaneously carrying out automatic identification of the flow source IP and judgment of the transmission stability of the port network through the automatic identification module of the flow source IP, storing the flow introducing time, the source IP and the introducing identification into a historical database, and storing the flow introducing time into the historical database after the scheduling is finished. The invention not only improves the efficiency and flexibility of the deployment of the flow scheduling strategy, but also ensures the continuous stability of the target scheduling port.
Description
Technical Field
The invention belongs to the technical field of network security, and particularly relates to a comprehensive judgment method and a comprehensive judgment system for network traffic scheduling.
Background
With the rapid development of computer technology, information networks have become an important guarantee for social development. There are many sensitive information, even national secrets. It is inevitable to attract various human attacks from all over the world (e.g., information disclosure, information theft, data tampering, data deletion and addition, computer viruses, etc.).
The network communication has the characteristic of whole-course whole-network combined operation. As far as communication is concerned, it consists of five major parts: transmission and switching, network standards, protocols and coding, communication terminals, communication sources, personnel. Most of these five major components are seriously threatened and attacked, and all of them become attack points for networks and information. In the network, ensuring information security is the core of network security.
Under the large-scale and ultra-large-scale networking scales, the problems of large network service scale, complex application relation, multiple dependence layers and difficulty in problem troubleshooting in a machine room operation and maintenance scene exist, when the flow of a network equipment port is too large and the flow is scheduled, the scheduling target port needs to be comprehensively evaluated, and the flow is scheduled to a stable port. It is not only necessary to improve the efficiency and flexibility of traffic scheduling policy deployment, but also to ensure the continuous stability of the destination scheduling port.
Disclosure of Invention
The technical problem to be solved by the present invention is to provide a method and a system for comprehensively determining network traffic scheduling, which introduces a more intelligent method for comprehensively determining the stability of a destination port of network traffic scheduling, in view of the above-mentioned deficiencies of the prior art.
In order to achieve the technical purpose, the technical scheme adopted by the invention is as follows:
a comprehensive judgment method for network traffic scheduling comprises the following steps:
step one, constructing a Netconf command set for acquiring real-time flow, identifying the bandwidth flow of an application port by combining a python language, and entering step two if the bandwidth flow of a source port is higher than a set alarm threshold;
secondly, performing schedulable port retrieval, historical data acquisition and introduced bandwidth flow estimation respectively based on a schedulable port retrieval module, a historical data acquisition module and an introduced bandwidth estimation value module to obtain an optimal schedulable port;
and step three, transferring the network strategy of the source port to the optimal schedulable port according to the service requirement and the network characteristics, simultaneously carrying out flow source IP automatic identification and port network transmission stability judgment through a flow source IP automatic identification module, storing the introduced flow time, the source IP and the introduced identification into a historical database, and storing the introduced flow time into the historical database after the scheduling is finished.
In order to optimize the technical scheme, the specific measures adopted further comprise:
the method also comprises the step of storing data of the whole flow scheduling process and providing basic analysis data for the next flow scheduling operation.
And the schedulable port retrieval module in the second step acquires all schedulable flow distribution network ports and the real-time schedulable port bandwidth flow.
And the historical data acquisition module in the second step acquires the historical network flow and the historical scheduling times of the ports by accessing the historical database.
And the introduced bandwidth pre-estimation module in the second step introduces bandwidth flow pre-estimation, acquires the number of strategies on a network port through a Netconf command set, acquires flow bandwidth flow, and calculates the average flow bandwidth flow corresponding to each strategy by weighted average.
In the second step, when drainage is needed, based on the schedulable port retrieval module, the historical data acquisition module and the schedulable port retrieval, historical data acquisition and introduced bandwidth flow prediction of the introduced bandwidth pre-estimation module, the average historical bandwidth flow and the optimal judgment index of the schedulable port are calculated, the three indexes of the average historical bandwidth flow and the optimal judgment index of the schedulable port and the bandwidth flow of the real-time schedulable port are calculated, and the optimal shunting port is comprehensively selected as the optimal schedulable port based on the three indexes.
The optimal judgment index value is obtained by acquiring the sum of the bandwidth flow of the port with the scheduling ability from the historical database within the time range of bearing the shunting task and introducing the sum of the bandwidth flow of the port with the scheduling ability, namely, the historical bandwidth flow of the port with the scheduling ability.
The third step, the traffic source IP automatic identification module performs traffic source IP automatic identification and port network transmission stability judgment, including:
step 1, executing through a python program, and performing purposeful message sniffing packet grabbing according to a destination port by using a sniff () function;
step 2, performing data sniffing packet grabbing on the scheduled network strategy, analyzing a five-tuple of the sniffed message, including a source address, a destination address, a source port, a destination port and a protocol, and adding a timestamp for classified storage;
step 3, analyzing the five-tuple information of the message by combining the timestamp, and acquiring message analysis characteristics within a time range from the beginning to the end of scheduling:
the stability of network transmission of a network traffic scheduling destination port is comprehensively judged by analyzing whether a source IP address in traffic is from an IP address section of a specified source port within a certain time range and abstracting the source IP address section as an introduction identifier and combining indexes which influence the network transmission quality such as the packet loss rate, delay millisecond and the like of a current network port.
In the introduction mark, 0 is taken to represent that the flow belongs to the introduction flow, and 1 is taken to represent that the flow does not belong to the introduction flow.
A network traffic scheduling comprehensive decision system includes:
the application port bandwidth flow identification module is used for constructing a Netconf command set for acquiring real-time flow, identifying the application port bandwidth flow by combining python language, and entering the optimal schedulable port selection module for shunting if the source port bandwidth flow is higher than a set alarm threshold;
the optimal schedulable port selecting module is used for performing schedulable port retrieval, historical data acquisition and introduced bandwidth flow prediction on the basis of the schedulable port retrieval module, the historical data acquisition module and the introduced bandwidth prediction value module respectively to obtain an optimal schedulable port;
and the port network transmission stability judgment module is used for transferring the network strategy of the source port to the optimal schedulable port according to the service requirement and the network characteristics, simultaneously carrying out automatic identification of the flow source IP and judgment of the port network transmission stability through the automatic identification module of the flow source IP, storing the introduced flow time, the source IP and the introduced identification into a historical database, and storing the introduced flow time into the historical database after the scheduling is finished.
The invention has the following beneficial effects:
the invention completes data collection, analysis and storage of the whole flow scheduling process by combining the Netconf command and the python language. Python itself is extensible, providing rich APIs and tools for programmers to easily write expansion modules using C language, C + +, Cython. The Python compiler itself can also be integrated into other programs that require a scripting language. The Netconf protocol, which may also be referred to as a network configuration protocol, provides a set of mechanisms for managing network devices, which a user may use to add, modify, delete configurations of network devices, and obtain configuration and status information of network devices. Through the Netconf protocol, the network device can provide canonical application programming interface APIs that the application can directly use to send and retrieve configurations to the network device. The invention combines the Netconf command and the python language, thereby not only improving the efficiency and the flexibility of the deployment of the flow scheduling strategy, but also ensuring the continuous stability of the target scheduling port.
Drawings
FIG. 1 is a flow chart of the method of the present invention.
Detailed Description
Embodiments of the present invention are described in further detail below with reference to the accompanying drawings.
Referring to fig. 1, a method for comprehensively determining network traffic scheduling includes:
step one, constructing a Netconf command set for acquiring real-time flow, identifying the bandwidth flow of an application port by combining a python language, and entering step two if the bandwidth flow of a source port is higher than a set alarm threshold;
the bandwidth traffic is for example: one maximum rate is 100Mb switch ports, incoming traffic is 20Mbps, and outgoing traffic is 10 Mbps. The network bandwidth traffic is: 20+10) Mb/100 Mb-30%.
With respect to the pyton language, Python itself is designed to be extensible. Not all features and functions are integrated into the language core. Python provides rich APIs and tools so that programmers can easily write expansion modules using C language, C + +, Cython. The Python compiler itself can also be integrated into other programs that require a scripting language, the present invention taking advantage of its following properties:
embeddability: python may be embedded in a C/C + + program to provide scripting functions to program users.
Rich libraries: the Python standard library is really large. It can help handle a variety of tasks including regular expressions, document generation, cell testing, threads, databases, web browsers, CGI, FTP, email, XML-RPC, HTML, WAV files, cryptographic systems, GUI (graphical user interface), Tk, and other system-related operations. This is called the "fully functional" concept of Python. In addition to standard libraries, there are many other high quality libraries such as wxPython, Twisted and Python image libraries, and so on. The following functions are utilized in the implementation of the invention:
pyton- > scapy library of functions:
scapy is a Python program that enables users to send, sniff, and parse and forge network packets. This functionality allows the construction of tools that can probe, scan or attack the network. In other words, Scapy is a powerful interactive packet handler. It can forge or decode packets of a large number of protocols, send over wires, capture them, match requests and replies, etc. Scapy can easily handle most classical tasks such as scanning, trace routing, probing, unit testing, attacks or network discovery. It may replace some of hping, arppoof, arp-sk, arping, p0f or even Nmap, tcpdump and tshark.
pyton- > sr1 module
Scapy is a powerful tool written by Python, and many excellent network scanning attack tools use the module at present. The module can also be used in the own program to realize the sending, monitoring and resolving of the network data packet. This module is the bottom layer with respect to Nmap. Various scanning attack behaviors in the network can be more intuitively known.
For example, when you go to a hospital to examine a body, the hospital gives you a test result on various indicators of the body, and the doctor tells you what disease you get or there is no disease. Then Nmap is like a doctor who makes his/her work-up and gives you the results according to his/her experience. The Scapy is a physical examination device, and only informs you of the results of various examinations, and if you are a doctor with rich experience, the results of the examinations are obviously more worth referring than the suggestions of the same lines.
pyton- > sendp module
(sendp: sending two-layer packets, Inter: packet send interval (seconds), loop: setting program to send all the time, setting the item to 1, otherwise setting 0).
Secondly, performing schedulable port retrieval, historical data acquisition and introduced bandwidth flow estimation respectively based on a schedulable port retrieval module, a historical data acquisition module and an introduced bandwidth estimation value module to obtain an optimal schedulable port;
and step three, transferring the network strategy of the source port to the optimal schedulable port according to the service requirement and the network characteristics, simultaneously carrying out flow source IP automatic identification and port network transmission stability judgment through a flow source IP automatic identification module, storing the introduced flow time, the source IP and the introduced identification into a historical database, and storing the introduced flow time into the historical database after the scheduling is finished.
In the embodiment, a schedulable port source IP, a port index, a protocol type, a security policy name and a defense result state identifier are stored.
The method also comprises the steps of storing data of the whole flow scheduling process and providing basic analysis data for the next flow scheduling operation;
in the embodiment, the schedulable port retrieval module in the second step acquires all schedulable flow distribution network ports and the bandwidth flow of the real-time schedulable port.
And the historical data acquisition module acquires the historical network flow and the historical scheduling times of the ports of each port to be selected by accessing the historical database.
The introduced bandwidth pre-estimation module introduces bandwidth flow pre-estimation, acquires the number of strategies on a network port through a Netconf command set, acquires flow bandwidth flow at the same time, and calculates the average flow bandwidth flow corresponding to each strategy by weighted average.
The specific description is as follows: for example: and discovering that 5 network strategies exist on the ports of the network equipment through Netconf, and calculating the real-time bandwidth flow of the ports, namely the real-time network port flow/bandwidth upper limit. And finally, the port real-time bandwidth flow/5 strategies obtain the average real-time bandwidth flow of each strategy.
In the second step, when drainage is needed, based on the schedulable port retrieval module, the historical data acquisition module and the schedulable port retrieval, historical data acquisition and introduced bandwidth flow prediction of the introduced bandwidth pre-estimation module, the average historical bandwidth flow and the optimal judgment index of the schedulable port are calculated, the three indexes of the average historical bandwidth flow and the optimal judgment index of the schedulable port and the bandwidth flow of the real-time schedulable port are calculated, and the optimal shunting port is comprehensively selected as the optimal schedulable port based on the three indexes.
And the optimal judgment index value is obtained from the historical database, and the historical bandwidth flow of the port can be scheduled by introducing the bandwidth flow sum of the flow port within the time range of the port capable of being scheduled to undertake the shunting task.
The average historical bandwidth flow is the sum of all historical bandwidth flows of the current network port IP/the total number of all historical bandwidth flows of the current network port IP;
the historical bandwidth flow of the schedulable port is equal to the average historical bandwidth flow/the maximum bandwidth upper limit of the current bandwidth (100M or 1000M);
real-time schedulable port bandwidth traffic-real-time bandwidth traffic/current maximum bandwidth cap (100M or 1000M).
In the embodiment, the step three, the traffic source IP automatic identification module performs traffic source IP automatic identification and port network transmission stability judgment, and includes:
step 1, executing through a python program, and performing purposeful message sniffing packet capturing filter to perform network policy message filtering scheduling according to a destination port by using a sniff () function; (sniff action is sniffing to grab a packet, filter sets Filter conditions for packet)
Step 2, performing data sniffing packet grabbing on the scheduled network strategy, analyzing a five-tuple of the sniffed message, including a source address, a destination address, a source port, a destination port and a protocol, and adding a timestamp for classified storage;
step 3, analyzing the five-tuple information of the message by combining the timestamp, and acquiring message analysis characteristics within a time range from the beginning to the end of scheduling:
within a certain time range, for example, between the point 0 today and the point 0 ending the next day, when the traffic is scheduled to a new network port, information such as a source IP (Internet protocol) and a destination IP (Internet protocol) is acquired and stored in a database for analysis through program execution and analysis of quintuple. For example: the network traffic value introduced by the quintuple source IP is 20M, the traffic introduced by the 2 policies of the source port to the new port is 25M, and the introduction efficiency 20/25 of the existing port is 80%. The higher the index, the better the drainage effect. It may not be 100% due to network anomalies, or transmission problems.
The stability of network transmission of a network traffic scheduling destination port is comprehensively judged by analyzing whether a source IP address in traffic is from an IP address section of a specified source port within a certain time range and abstracting the source IP address section as an introduction identifier and combining indexes which influence the network transmission quality such as the packet loss rate, delay millisecond and the like of a current network port.
And taking 0 as the introduction identifier to represent that the introduction identifier belongs to the introduction flow, and taking 1 as the introduction identifier not belongs to the introduction flow.
A network traffic scheduling comprehensive decision system includes:
the application port bandwidth flow identification module is used for constructing a Netconf command set for acquiring real-time flow, identifying the application port bandwidth flow by combining python language, and entering the optimal schedulable port selection module for shunting if the source port bandwidth flow is higher than a set alarm threshold;
the optimal schedulable port selecting module is used for performing schedulable port retrieval, historical data acquisition and introduced bandwidth flow prediction on the basis of the schedulable port retrieval module, the historical data acquisition module and the introduced flow prediction value module respectively to obtain an optimal schedulable port;
and the port network transmission stability judgment module is used for transferring the network strategy of the source port to the optimal schedulable port according to the service requirement and the network characteristics, simultaneously carrying out automatic identification of the flow source IP and judgment of the port network transmission stability through the automatic identification module of the flow source IP, storing the introduced flow time, the source IP and the introduced identification into a historical database, and storing the introduced flow time into the historical database after the scheduling is finished.
The above is only a preferred embodiment of the present invention, and the protection scope of the present invention is not limited to the above-mentioned embodiments, and all technical solutions belonging to the idea of the present invention belong to the protection scope of the present invention. It should be noted that modifications and embellishments within the scope of the invention may be made by those skilled in the art without departing from the principle of the invention.
Claims (10)
1. A comprehensive judgment method for network traffic scheduling is characterized by comprising the following steps:
step one, constructing a Netconf command set for acquiring real-time flow, identifying the bandwidth flow of an application port by combining a python language, and entering step two if the bandwidth flow of a source port is higher than a set alarm threshold;
secondly, performing schedulable port retrieval, historical data acquisition and introduced bandwidth flow estimation respectively based on a schedulable port retrieval module, a historical data acquisition module and an introduced bandwidth estimation value module to obtain an optimal schedulable port;
and step three, transferring the network strategy of the source port to the optimal schedulable port according to the service requirement and the network characteristics, simultaneously carrying out flow source IP automatic identification and port network transmission stability judgment through a flow source IP automatic identification module, storing the introduced flow time, the source IP and the introduced identification into a historical database, and storing the introduced flow time into the historical database after the scheduling is finished.
2. The method according to claim 1, further comprising storing data of the whole process of traffic scheduling to provide basic analysis data for the next traffic scheduling operation.
3. The method according to claim 1, wherein the schedulable port retrieval module of step two obtains all schedulable offload network ports and real-time schedulable port bandwidth traffic.
4. The method according to claim 1, wherein in step two, the historical data obtaining module obtains the historical network traffic and the historical port scheduling times of each port to be selected by accessing a historical database.
5. The method according to claim 1, wherein the bandwidth prediction estimation module in step two introduces bandwidth traffic prediction, obtains the number of policies on a network port through a Netconf command set, obtains traffic bandwidth traffic, and calculates the average traffic bandwidth traffic corresponding to each policy by weighted average.
6. The method according to claim 1, wherein in the second step, when drainage is needed, an average historical bandwidth flow and an optimal decision index of the schedulable port are calculated based on the schedulable port retrieval module, the historical data acquisition module and the schedulable port retrieval, the historical data acquisition and the introduced bandwidth flow prediction of the introduced bandwidth prediction value module, and the bandwidth flow of the schedulable port and the bandwidth flow of the real-time schedulable port are three indexes, and an optimal shunting port is selected as the optimal schedulable port based on the three indexes.
7. The method according to claim 6, wherein the optimal decision index value is obtained by taking the sum of bandwidth flows of the schedulable port in a time range of assuming the shunting task from the historical database, that is, the historical bandwidth flow of the schedulable port.
8. The method according to claim 1, wherein the step three in which the traffic source IP automatic identification module performs traffic source IP automatic identification and port network transmission stability determination comprises:
step 1, executing through a python program, and performing purposeful message sniffing packet grabbing according to a destination port by using a sniff () function;
step 2, performing data sniffing packet grabbing on the scheduled network strategy, analyzing a five-tuple of the sniffed message, including a source address, a destination address, a source port, a destination port and a protocol, and adding a timestamp for classified storage;
step 3, analyzing the five-tuple information of the message by combining the timestamp, and acquiring message analysis characteristics within a time range from the beginning to the end of scheduling:
the stability of network transmission of a network traffic scheduling destination port is comprehensively judged by analyzing whether a source IP address in traffic is from an IP address section of a specified source port within a certain time range and abstracting the source IP address section as an introduction identifier and combining indexes which influence the network transmission quality such as the packet loss rate, delay millisecond and the like of a current network port.
9. The method of claim 8, wherein the incoming id takes 0 for incoming traffic and 1 for incoming traffic.
10. A network traffic scheduling comprehensive decision system is characterized by comprising:
the application port bandwidth flow identification module is used for constructing a Netconf command set for acquiring real-time flow, identifying the application port bandwidth flow by combining python language, and entering the optimal schedulable port selection module for shunting if the source port bandwidth flow is higher than a set alarm threshold;
the optimal schedulable port selecting module is used for performing schedulable port retrieval, historical data acquisition and introduced bandwidth flow prediction on the basis of the schedulable port retrieval module, the historical data acquisition module and the introduced bandwidth prediction value module respectively to obtain an optimal schedulable port;
and the port network transmission stability judgment module is used for transferring the network strategy of the source port to the optimal schedulable port according to the service requirement and the network characteristics, simultaneously carrying out automatic identification of the flow source IP and judgment of the port network transmission stability through the automatic identification module of the flow source IP, storing the introduced flow time, the source IP and the introduced identification into a historical database, and storing the introduced flow time into the historical database after the scheduling is finished.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111418701.3A CN114039917A (en) | 2021-11-26 | 2021-11-26 | Network traffic scheduling comprehensive judgment method and system |
PCT/CN2021/139546 WO2023092769A1 (en) | 2021-11-26 | 2021-12-20 | Comprehensive determination method and system for network traffic scheduling |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111418701.3A CN114039917A (en) | 2021-11-26 | 2021-11-26 | Network traffic scheduling comprehensive judgment method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114039917A true CN114039917A (en) | 2022-02-11 |
Family
ID=80145580
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111418701.3A Pending CN114039917A (en) | 2021-11-26 | 2021-11-26 | Network traffic scheduling comprehensive judgment method and system |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN114039917A (en) |
WO (1) | WO2023092769A1 (en) |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103200124A (en) * | 2013-03-07 | 2013-07-10 | 北京华为数字技术有限公司 | Service strategy adjustment method and service strategy adjustment device |
CN103618646A (en) * | 2013-11-28 | 2014-03-05 | 瑞斯康达科技发展股份有限公司 | Method for detecting network performance, packet loss probability and time delay and network fringe node equipment |
CN104717158A (en) * | 2015-03-02 | 2015-06-17 | 中国联合网络通信集团有限公司 | Method and device for adjusting bandwidth scheduling strategy |
CN105471759A (en) * | 2016-01-11 | 2016-04-06 | 北京百度网讯科技有限公司 | Network traffic scheduling method and apparatus for data centers |
CN106302221A (en) * | 2016-09-12 | 2017-01-04 | 中国联合网络通信集团有限公司 | Traffic scheduling method based on end office's cloud and system |
CN109257254A (en) * | 2018-09-21 | 2019-01-22 | 平安科技(深圳)有限公司 | Network connectivty inspection method, device, computer equipment and storage medium |
CN109600259A (en) * | 2018-12-11 | 2019-04-09 | 浙江工商大学 | A kind of real-time Transmission mechanism based on software definable |
CN110177054A (en) * | 2019-05-22 | 2019-08-27 | 新华三技术有限公司 | A kind of port queue dispatching method, device, network controller and storage medium |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105429886A (en) * | 2015-10-30 | 2016-03-23 | 南京优速网络科技有限公司 | Comprehensive unified flow scheduling system and scheduling method based on SDN |
CN110035012B (en) * | 2018-12-25 | 2021-09-14 | 中国银联股份有限公司 | SDN-based VPN flow scheduling method and SDN-based VPN flow scheduling system |
CN109547343B (en) * | 2019-01-04 | 2020-09-18 | 网宿科技股份有限公司 | Traffic scheduling method and system |
CN112995056B (en) * | 2019-12-16 | 2023-09-15 | 中兴通讯股份有限公司 | Traffic scheduling method, electronic equipment and storage medium |
CN112073445B (en) * | 2020-11-16 | 2021-01-29 | 浙江山迅网络科技有限公司 | Hybrid port traffic scheduling method and device, readable storage medium and electronic equipment |
-
2021
- 2021-11-26 CN CN202111418701.3A patent/CN114039917A/en active Pending
- 2021-12-20 WO PCT/CN2021/139546 patent/WO2023092769A1/en unknown
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103200124A (en) * | 2013-03-07 | 2013-07-10 | 北京华为数字技术有限公司 | Service strategy adjustment method and service strategy adjustment device |
CN103618646A (en) * | 2013-11-28 | 2014-03-05 | 瑞斯康达科技发展股份有限公司 | Method for detecting network performance, packet loss probability and time delay and network fringe node equipment |
CN104717158A (en) * | 2015-03-02 | 2015-06-17 | 中国联合网络通信集团有限公司 | Method and device for adjusting bandwidth scheduling strategy |
CN105471759A (en) * | 2016-01-11 | 2016-04-06 | 北京百度网讯科技有限公司 | Network traffic scheduling method and apparatus for data centers |
CN106302221A (en) * | 2016-09-12 | 2017-01-04 | 中国联合网络通信集团有限公司 | Traffic scheduling method based on end office's cloud and system |
CN109257254A (en) * | 2018-09-21 | 2019-01-22 | 平安科技(深圳)有限公司 | Network connectivty inspection method, device, computer equipment and storage medium |
CN109600259A (en) * | 2018-12-11 | 2019-04-09 | 浙江工商大学 | A kind of real-time Transmission mechanism based on software definable |
CN110177054A (en) * | 2019-05-22 | 2019-08-27 | 新华三技术有限公司 | A kind of port queue dispatching method, device, network controller and storage medium |
Non-Patent Citations (1)
Title |
---|
(美)贝诺特•克莱斯等编著,闫林等翻译: "《基于YANG的可编程网络 用YANG NETCONF RESTCONF和gNMI实现网络自动化架构》", 北京:北京邮电大学出版社, pages: 123 - 125 * |
Also Published As
Publication number | Publication date |
---|---|
WO2023092769A1 (en) | 2023-06-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106789177B (en) | A kind of system of dealing with network breakdown | |
EP2563062B1 (en) | Long connection management apparatus and link resource management method for long connection communication | |
JP5840788B2 (en) | Method, apparatus and communication network for root cause analysis | |
CN101924757B (en) | Method and system for reviewing Botnet | |
EP1742416B1 (en) | Method, computer readable medium and system for analyzing and management of application traffic on networks | |
CN102158360B (en) | Network fault self-diagnosis method based on causal relationship positioning of time factors | |
CN102045363B (en) | Establishment, identification control method and device for network flow characteristic identification rule | |
CN107404421A (en) | Flow monitoring, monitoring and managing method and system | |
Qiao et al. | Characterizing flow, application, and user behavior in mobile networks: A framework for mobile big data | |
CN109818820A (en) | Data on flows monitoring method, device, electronic equipment and storage medium | |
CN112333020B (en) | Network security monitoring and data message analysis system based on quintuple | |
CN114363222A (en) | Network equipment inspection method and system based on Netconf protocol | |
CN104539556A (en) | Method for providing satisfaction service quality for users under heterogeneous network environment | |
CN117459457A (en) | Access method based on distributed core network | |
CN114158080B (en) | Monitoring method, device and computer readable storage medium | |
CN107846310B (en) | IPTV video quality difference linkage dial testing delimitation method based on client resource tree | |
CN114301640B (en) | Attack and defense exercise method and system based on SRv6 network protocol | |
CN114039917A (en) | Network traffic scheduling comprehensive judgment method and system | |
CN105784937A (en) | Visualization method and system for detection data of gas benzene compounds | |
CN102123092B (en) | A kind of multicast performance analytical method and system | |
CN109462283A (en) | Intelligent substation individual equipment flux monitoring method and system | |
CN111654413B (en) | Method, equipment and storage medium for selecting effective measurement points of network flow | |
Yang et al. | Traffic anomaly detection and prediction based on SDN-enabled ICN | |
CN114338470A (en) | Port network traffic scheduling judgment method and system | |
KR100812946B1 (en) | System and Method for Managing Quality of Service in Mobile Communication Network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: Room 1308, 13th floor, East Tower, 33 Fuxing Road, Haidian District, Beijing 100036 Applicant after: China Telecom Digital Intelligence Technology Co.,Ltd. Address before: Room 1308, 13th floor, East Tower, 33 Fuxing Road, Haidian District, Beijing 100036 Applicant before: CHINA TELECOM GROUP SYSTEM INTEGRATION Co.,Ltd. |
|
CB02 | Change of applicant information |