KR20120069148A - Method for detecting request error packet and discriminating host in public network, and system thereof - Google Patents

Method for detecting request error packet and discriminating host in public network, and system thereof Download PDF

Info

Publication number
KR20120069148A
KR20120069148A KR1020100130566A KR20100130566A KR20120069148A KR 20120069148 A KR20120069148 A KR 20120069148A KR 1020100130566 A KR1020100130566 A KR 1020100130566A KR 20100130566 A KR20100130566 A KR 20100130566A KR 20120069148 A KR20120069148 A KR 20120069148A
Authority
KR
South Korea
Prior art keywords
request packet
failure
request
host
interworking
Prior art date
Application number
KR1020100130566A
Other languages
Korean (ko)
Inventor
김근용
Original Assignee
에스케이 텔레콤주식회사
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 에스케이 텔레콤주식회사 filed Critical 에스케이 텔레콤주식회사
Priority to KR1020100130566A priority Critical patent/KR20120069148A/en
Publication of KR20120069148A publication Critical patent/KR20120069148A/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0631Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0823Errors, e.g. transmission errors
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/16Threshold monitoring
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L49/00Packet switching elements
    • H04L49/55Prevention, detection or correction of errors
    • H04L49/555Error detection

Abstract

According to the present invention, when a system that provides data to a user such as an open application platform and a customer terminal information (UAPS) and services a system that performs a specific function by interworking in an external public network, the requested packet reaches the server normally. The present invention relates to a method and a system for detecting a failure of a request packet and identifying a host in an open service, which can identify information about whether a request has been made, and to detect a real host that has actually called.
An open service failure detection system according to the present invention comprises: an interworking host for transmitting a request packet including a request packet unique ID, a request packet timeout value, a MAC address, and an interworking method according to a service request from a service request terminal; For the request packet received from the companion host, the request packet unique ID and the request packet timeout value are logged and stored in a request packet database, and the MAC address and the linkage scheme are stored in a link host database, and the link A platform server for transmitting the method to the request packet analyzer; A request packet analysis device for detecting a failure by analyzing the request packet according to an interworking method received from the platform server, and identifying a coordinated host for the request packet detected as a failure; A request packet database for storing the request packet unique ID and the request packet Timeout value; A request packet failure database for storing a request packet count, a failure time information, a duration, a failed MAC address, for the request packet detected as the failure; And an interlocking host database for storing information about the interlocking host, including the MAC address and the interlocking scheme.

Description

Method for detecting request error packet and discriminating host in public network, and system

The present invention relates to a method and system for detecting a transmission failure of a request packet and identifying a host in an open service, and more specifically, provides data to a user such as an open application platform and a customer terminal information (UAPS). When interworking with a system that performs a specific function in an external public network, check the information on whether the requested packet has reached the server normally, and identify the real host that has actually called. It can be detected.

Recently, various services such as cloud computing services have been provided through a platform for providing an open interworking service between legacy systems.

7 is a diagram illustrating a configuration of a communication system of an existing open service interworking method. In the case of the existing open service interworking method as shown in FIG. 7, the service interworking system to provide an interface is requested to the platform server 140 to receive data and a specific function to receive a result value. If the result value is not received or fails at (120 ~ 124), it is retransmitted and linked.

With the diversification of open services and the increase of new interworking services, the stability of the platform server 140 is most important. This is because failure of a response to a request can cause a failure or delay on the user side of the traffic. In the prior art, a sequence is used for retransmission in case of failure from a failover point of view.

By the way, the request packet received from the specific interlocking host 120 reaches the platform server 140 and the log is left in the platform server 140, so that the monitoring and detection is possible. However, if there is any problem such as a host problem, network / network problem, abnormal traffic, lost traffic, etc., but the request packet does not reach the platform server 140 normally (the host is in the SYN_SENT state and the SYN_ACK is not received in the host state). If the server does not receive the SYN packet), there is no log of the request packet left on the platform server 140, so monitoring and failure detection are not performed, thus prolonging the failure detection time and delaying the failure response. There is a problem of difficulty.

The present invention for solving the above problems, when providing a data to the user, such as an open application (Open API) platform and customer terminal information (UAPS) and the system performing a specific function in conjunction with the service in the external public network, request In the open service, it is possible to detect the failure of the request packet and identify the host by checking the information on whether the received packet has reached the server normally, and identifying the real host that has actually called. Its purpose is to provide a method and a system thereof.

According to an aspect of the present invention for achieving the above object, according to the service request from the service request terminal for transmitting a request packet including the request packet unique ID, request packet Timeout value, MAC address, interworking method to the platform server Interworking host; For the request packet received from the companion host, the request packet unique ID and the request packet timeout value are logged and stored in a request packet database, and the MAC address and the linkage scheme are stored in a link host database, and the link A platform server for transmitting the method to the request packet analyzer; A request packet analysis device for detecting a failure by analyzing the request packet according to an interworking method received from the platform server, and identifying a coordinated host for the request packet detected as a failure; A request packet database for storing the request packet unique ID and the request packet Timeout value; A request packet failure database for storing a request packet count, a failure time information, a duration, a failed MAC address, for the request packet detected as the failure; And an interlocking host database for storing information on the interlocking host, including the MAC address and the interlocking scheme.

On the other hand, according to another aspect of the present invention for achieving the above object, in accordance with the service request of the service request terminal, the interlocking host to provide an interlocking service by interworking with the platform server through a communication network, from the service request terminal to the service request; A requesting packet including a request packet unique ID, a request packet timeout value, a MAC address, and an interworking method is transmitted to the platform server.

On the other hand, according to another aspect of the present invention for achieving the above object, a control unit for detecting a failure by analyzing the request packet according to the interworking method received from the platform server; And a host identification manager for identifying a coordinated host through a MAC address included in the request packet detected as a failure by the controller.

In addition, when the interworking method is a sequential processing method, the controller may detect a failure if a difference value between a current request packet unique ID value and a previous request packet unique ID value is not a reference value.

In this case, the reception time of the request packet, and a timer for counting the request delay time from receiving the previous request packet to receiving the next request packet to inform the control unit, wherein the control unit of each request packet Request average delay time is calculated by aggregating the request delay time by a certain unit, and when the interworking method is a sequential processing interworking method, the time is counted through the timer so that the request average delay time elapses from the reception time of the previous request packet. If the current request packet is not received, it can be detected as a failure.

In addition, the control unit may collect the reception time of each request packet to check the number of requests for each time zone, and may detect a failure when the number of requests for each time zone is outside the threshold by using the number of requests for each time zone as a threshold.

In addition, when the interworking method is a parallel processing method, the controller checks the expiration status of the request packet, sorts the request packets in the expiration status into a list according to the request packet unique ID value, and then, If the difference between each request packet's unique ID values is not the reference value, it can be detected as a failure.

And, the request packet detected as a failure may further include a request packet failure database for storing the number of request failure count, failure time information, duration, failure MAC address.

On the other hand, according to another aspect of the present invention for achieving the above object, (a) receiving a sequential processing interworking method from the platform server; b) calculating a difference value between a current request packet unique ID value and a previous request packet unique ID value included in the request packet when the interworking method is a sequential processing interworking method; (c) detecting the failure if the difference is not a reference value; And (d) provides a real-time request packet failure detection method according to the sequential processing interlocking method of the request packet analysis device comprising the step of storing information about the request packet detected as the failure.

The request packet is generated according to a sequentially incremented sequence, and the request packet unique ID value is a sequence number.

In addition, when the request packet is not received in step (b), step (c) is performed by counting a time through a timer so that the current request packet is received so that the average request delay time elapses from the reception time of the previous request packet. If not, it can be detected as a failure.

The step (d) may store a request failure count, a failure time information, a duration, and a failed MAC address for the request packet detected as the failure.

On the other hand, according to another aspect of the present invention for achieving the above object, (a) receiving a parallel processing interworking method from the platform server; (b) searching for an analysis target list by checking an expiration state for a request packet when the interworking method is a parallel processing interworking method; (c) sorting the request object list based on a request packet unique ID value; (d) sequentially calculating difference values of respective request packet unique ID values of the sorted analysis target list; (e) detecting as a failure if the difference is not a reference value; And (f) there is provided a failure detection method after the request packet processing according to the parallel processing interlocking scheme of the request packet analysis apparatus comprising the step of storing information about the request packet detected as the failure.

The request packet is generated according to a sequentially incremented sequence, and the request packet unique ID value is a sequence number.

In addition, in the step (b), the expiration state of the request packet may be checked based on the current reception time, the request time, and the timeout value of the request packet.

In addition, the step (f) may store the request failure count, failure time information, duration, and failure MAC address for the request packet detected as the failure.

The methods according to the present invention can be recorded as a program on a computer readable medium such as a CD or a USB memory device.

On the other hand, according to another aspect of the present invention for achieving the above object, the request packet database that stores the request packet unique ID and the request packet Timeout value, and the interworking host that stores the MAC address and interworking method of the coordinated host CLAIMS What is claimed is: 1. A method of identifying a failed host in detecting a request packet failure of a request packet analyzing apparatus having a database, the method comprising: detecting a failure of a request packet according to the interworking method; (b) if the request packet is detected as a failure, storing the request packet including a MAC address; And (c) identifying a failed host by associating host information where the MAC address included in the request packet and the MAC address stored in the interworking host database match. A host identification method is provided.

According to the present invention, even if the request packet requested by the platform service interworking host provided by the open network does not reach the server, monitoring and detection is possible.

In addition, a request failure can be detected in real time when a service request is made. That is, in the case of the sequential processing method, it is possible to detect the failure between the previous request time, request failure count, etc. when the service interworking request.

In addition, it is possible to identify the actual host of the host that failed the service request.

In addition, through the present invention can obtain the statistical information on the request failure, it is possible to calculate the actual service request attempt count and can obtain a correction value when a failure of the statistical system provided separately.

And if the normal request packet can not be received, it is possible to immediately identify the host where the problem occurred.

1 is a configuration diagram schematically showing the overall configuration of an open service failure detection system according to an embodiment of the present invention.
2 is a block diagram schematically showing a functional block of a request packet analysis apparatus according to an embodiment of the present invention.
3 is a view for explaining a real-time request packet failure detection method of the sequential processing interworking method according to an embodiment of the present invention.
4 is a diagram illustrating a failure detection method after processing a request packet in a parallel processing interworking method according to an embodiment of the present invention.
5 is a view for explaining a method of identifying a failed host when detecting a request packet failure used in the present invention.
6 is a flowchart illustrating an open service failure detection method according to an exemplary embodiment of the present invention.
7 is a diagram illustrating a configuration of a communication system of an existing open service interworking method.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS Reference will now be made in detail to the preferred embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like reference numerals refer to the like elements throughout. Hereinafter, exemplary embodiments of the present invention will be described in detail with reference to the accompanying drawings.

1 is a configuration diagram schematically showing the overall configuration of an open service failure detection system according to an embodiment of the present invention.

Referring to FIG. 1, the open service failure detection system 100 according to the present invention includes a service request terminal 110, a coordinated host 120 through 124, an open network 130, a platform server 140, and a linked host database. 142, the request packet database 144, the request packet analysis device 150, the request packet failure database 152, and a legacy system 160.

The service request terminal 110 requests various services such as a multimedia service or a web service related to video or data through the interlocking hosts 120 to 124 using a wired or wireless network, and then through the interlocking hosts 120 to 124. Receive the requested multimedia service or web service. Here, the service request terminal 110 may be a mobile phone terminal, it may be a computer terminal.

The interworking hosts 120 to 124 may request a packet according to a service request from the service request terminal 110, and request a unique packet ID and a timeout of the request packet through a host interworking module for communicating with the platform server 140. It transmits the service request information to the platform server 140 including the value, the MAC address, the interworking method, and the like, and receives the result value from the platform server 140. Here, the interworking host (120 ~ 124) generates a request packet unique ID using a sequence (1-> 2-> 3) that is sequentially incremented. Here, the interlocking host 120 to 124 operates in one of a sequential interlocking method or a parallel interlocking method.

The open network 130 is, for example, a network used to receive an Open API service, and includes a wired network or a wireless network.

The platform server 140 transmits the service request information received from the interlocking hosts 120 to 124 to the legacy system 160, and receives the execution result value for the service request from the legacy system 160. 124), and logs all received packets and stores them in the request packet DB 144. At this time, the platform server 140 performs a failure detection method according to the interworking method of the interlocking host. If the interlocking host is a sequential processing interworking method, the platform server 140 performs a real-time failure detection method, and the packet processing when the interlocking host is a parallel processing interworking method. After the failure detection method is performed.

In addition, when receiving the service request information from the interlocking host (120 ~ 124), the platform server 140 checks the existence of the identifier (MAC address) of the interlocked interlocking host in the interlocking host DB (142) and saves it if it does not exist. Release.

In addition, the platform server 140 stores the request packet unique ID and the request packet timeout value included in the service request information received from the interworking hosts 120 to 124 in the request packet database 144, and the MAC address and the interworking method are It is stored in the interlocking host database (142).

The interworking host DB 142 is a database containing information on a host to be interlocked when interworking for the first time. The interworking host DB 142 provides host related information to the host identification manager 230 including the SMS receiving number of the person in charge and the interworking host classification information.

The request packet database 144 logs and stores the received packets received by the platform server 140. The main field information to store includes the request packet unique ID, the timeout value of the request packet, the MAC address, the processing result, and the status code. , Request time, processing completion time, and analysis completion status. At this time, the request packet unique ID is loaded into the request packet DB (152) by branching to the interworking host information, the request date, the sequence number (request ID value).

The request packet analyzing apparatus 150 detects a failure by analyzing a request packet according to a service interworking method of a sequential processing method or a parallel processing method, and identifies a linking host that has transmitted a request packet with a failure.

The request packet failure DB 152 is a database that records the number of request failure counts, failure time information, duration, and MAC address of failure based on the detected error value and failure time interval according to the interworking processing method (sequential / parallel).

The legacy system 160 is a system that performs, for example, a function of providing location information, a function of providing an SMS or an MMS through an Open API. Here, the legacy system 160 refers to the entire accumulated system including information and functions that are added or changed continuously through additional development or improvement after the system is first developed.

2 is a block diagram schematically showing a functional block of a request packet analysis apparatus according to an embodiment of the present invention.

Referring to FIG. 2, the request packet analysis apparatus 150 according to the present invention includes a controller 210, a timer 220, and a host identification manager 230.

The controller 210 detects a failure by analyzing a request packet according to a sequential processing method and a parallel processing method according to a service interworking method, and identifies the interworking host that has transmitted a request packet having a failure. That is, the controller 210 analyzes the request packet according to a sequential processing method or a parallel processing method so as to identify a linked host having a failure.

The timer 220 transmits a request packet from the companion host 120 to count the time required for the platform server 140 to receive and notify the controller 210. That is, the timer 220 counts the request delay time required for the platform server 140 to receive the next request packet from the time when the platform server 140 receives the previous request packet and informs the controller 210. Therefore, the controller 210 may calculate the average request delay time by collecting the request delay time of each request packet by a predetermined unit, for example, 10 or 20.

In addition, the timer 220 informs the controller 210 of the reception time of each request packet. Therefore, the controller 210 may collect the reception time of each request packet to calculate the number of requests per time zone and the like.

In addition, the controller 210 may detect a failure of the request packet by using the request average delay time or the number of requests per time zone as a threshold.

Request packet failure detection based on the sequential interworking method detects a failure based on the current request packet, and in the case of parallel processing interworking method, a failure is detected from the expired request packet list.

However, if the current request packet is not continuously received, the presence or absence of request failure in the section from the past point of time to the present time cannot be checked, so the controller 210 requests for each request average delay time or time zone based on the request packet data in the past. Faults can be detected using thresholds such as numbers. In this case, for example, if a unique ID value is generated on a daily basis, the last value of 23:59:59 seconds is the total number of requests per day. That is, if the last ID value is BP2012101_51, the total number of attempts per day is 51. The threshold may be calculated based on this information.

When the host identification manager 230 detects a failure as a result of analyzing the request packet, the host identification manager 230 identifies a companion host through MAC information.

3 is a flowchart illustrating an open service failure detection method according to an exemplary embodiment of the present invention.

In the embodiment of FIG. 3, the mobile phone terminal 110 using the open service as the service request terminal 110 will be described as an example, and the BP system will be described as the interworking host 120 as an example.

Referring to FIG. 3, when the mobile phone terminal 110 requests a service from the companion host 120 (S302), the companion host 120 may request a platform including a unique ID, a timeout, a MAC address, and a linkage scheme. The interworking service is requested by transmitting to the server 140 (S304).

Accordingly, the platform server 140 stores the request packet unique ID and the request packet timeout value in the request packet DB 144 for the request packet received from the interworking host 120, and the MAC address and the interworking method are the interworking host database. Store at 142.

Here, the request packet is generated according to a sequentially incremented sequence, and the request packet unique ID value is a sequence number. Accordingly, since the request packet unique ID value, that is, sequence numbers are sequentially checked and the error value is 1 for each sequence number, 1 is an error reference value.

Subsequently, the platform server 140 confirms whether the interworking method is a sequential processing method or a parallel processing method through the interworking host DB 142, and transmits the checked interworking method to the request packet analyzing apparatus 150 (S306). ).

Subsequently, the request packet analyzing apparatus 150 checks the error between the current request packet unique ID value and the previous request packet unique ID value when the received interworking method is a sequential processing interworking method, that is, the sequence of the current request packet. When the error value between the number and the sequence number of the previous request packet is the error reference value 1, it is recognized as normal without detecting a failure, and the service request is transmitted to the legacy system 160 (S310).

Therefore, the legacy system 160 executes the corresponding service for the service request and transmits the result value for the service request to the platform server 140 (S312), and the platform server 140 transmits the received result value to the interworking host. In step S314, the companion host 120 transmits a result value for the service request to the mobile phone terminal 110, so that the mobile phone terminal 110 receives the corresponding service (S316).

However, the request packet analyzing apparatus 150 checks the error between the current request packet unique ID value and the previous request packet unique ID value in the sequential processing interworking method, and the error value is not the reference value 1, or the previous request packet unique ID value is If it does not exist, it is detected as a failure and stored in the request packet failure DB 152 as the information on the request packet, request failure count number, failure time information, duration, MAC address of failure, etc. based on the failure time interval ( S318).

Subsequently, the request packet analyzing apparatus 150 updates the current request packet unique ID value with reference information (S320). That is, the sequence number of the current request packet is stored as reference information.

In addition, the request packet analyzer 150 calculates the average average delay time by collecting the request delay time of each request packet by a predetermined unit through the control unit 210, through the timer 220 in the sequential processing interworking method If the current request packet is not received so that the request average delay time elapses from the reception time of the previous request packet, the time can be detected as a failure.

On the other hand, the request packet analysis device 150 searches for an analysis target list by checking the request packet expiration state in the request packet DB (142) when the interworking method received from the platform server 140 is a parallel processing interworking method (S322). After sorting the analysis target list, the error is sequentially checked in the request packet unique ID value list, and if it is not 1 or the previous request packet unique ID value does not exist, the request packet failure DB is detected as a failure. As the information on the request packet detected as a failure in the request, the number of request failure count, failure time information, duration, failure MAC address, etc. based on the failure time interval is stored (S324).

Subsequently, the request packet analyzing apparatus 150 updates the value of the analysis completion field of the analysis target list in which analysis is completed (S326).

On the other hand, the request packet analysis device 150 counts the request delay time of the request packet through the timer 220 and detects a failure when the request average delay time corresponding to the threshold is exceeded, and the values for the request packet failure The data is stored in the DB 152 (S328).

In addition, the request packet analysis device 150 detects the request packet containing the MAC address as a failure through the host identification manager 230 to the interworking host (120 ~ 124) that transmitted the failure request packet as a request packet The failure is stored in the DB 152 (S330). That is, the host identification manager 230 of the request packet analyzing apparatus 150 stores the MAC address of the host stored in the request packet DB 142 and the MAC information stored at the first host interworking in the interworking host DB 160. By comparison, matching host information is identified as a failed host.

4 is a view for explaining a real-time request packet failure detection method of the request packet analysis apparatus in the sequential processing interworking method of FIG. 3 according to an embodiment of the present invention.

Referring to FIG. 4, as shown in FIG. 4, the interworking host 120 displays the first request packet including a request ID value of BP001_20101011_1 and a timeout value of 1 minute, a MAC address, and a sequential processing interworking method. To request a service.

Accordingly, when the server 1 receives a request packet with a request ID value of BP001_20101011_1 and a timeout value of 1 minute, the platform server 140 transmits the first request packet result value indicating that the reception is successful to the companion host 120. do.

At this time, the platform server 140 logs and stores the first request packet in which the request packet unique ID value is BP001_20101011_1 and the timeout value is 1 minute in the request packet DB 144.

Subsequently, the interworking host 120 requests the second request packet including the request packet unique ID value BP001_20101011_2 and the timeout value for 1 minute, the MAC address address, and the sequential interworking method according to the sequentially incremented sequence. In this case, the platform server 140 does not receive the second request packet because the transmission failed.

Subsequently, the interworking host 120 according to the sequentially incremented sequence, the platform server 140 receives the third request packet including a request packet unique ID value of BP001_20101011_3 and a timeout value of 1 minute, a MAC address address, and a sequential interworking method. In this case, the platform server 140 does not receive the third request packet.

Subsequently, the interworking host 120 requests the service by transmitting a fourth request packet including the request packet unique ID value BP001_20101011_4 and the timeout value for 1 minute and the MAC address to the platform server 140 according to the sequentially incremented sequence. do.

Accordingly, the platform server 140 receives the request packet unique ID value received from the interlocking host 120 and the fourth request packet including a BP001_20101011_4 and a timeout value of 1 minute, a MAC address address, and a sequential interworking method. Request packet unique ID and Timeout value is logged and stored in request packet DB (144).

At this time, the request packet analysis apparatus 150 checks the current request packet unique ID value and the previous request packet unique ID value based on the request packet DB 144 to determine whether the error value is the error reference value 1. That is, the sequence number BP001_20101011_4 and the sequence number of the previous third request packet of the fourth requested request packet must be checked, but since the third and second request packets do not exist, the request packet analyzer 150 requests the current request. Check the sequence number BP001_20101011_4 of the fourth request packet and the sequence number BP001_20101011_1 of the first request packet.

Therefore, the request packet analyzing apparatus 150 checks the current request packet unique ID value BP001_20101011_4 and the previous request packet unique ID value BP001_20101011_1 and determines that the error value is not 3, so that it is not the error reference value 1, and thus, between the first request packet and the fourth request packet. Is detected as a failure has occurred, and the values for it are stored in the request packet failure DB (152).

In addition, the request packet analyzer 150 counts the reception time of the first request packet through the timer 220, counts the reception time of the fourth request packet, and thereby requests between the reference time and the current request packet time. You can see the failure count (request failures) and the time interval between failures.

In addition, in the request packet analyzing apparatus 150, the control unit 210 counts the time through the timer 220 when the interworking method is a sequential processing method so that the request average delay time elapses from the reception time of the previous request packet. If the request packet is not received, it can be detected as a failure. In addition, since the controller 210 receives the reception time of each request packet from the timer 220, the controller 210 may recognize the number of requests for each time zone by checking how many reception times of the request packets are received in each time zone.

Subsequently, the request packet analyzer 150 updates the fourth request packet unique ID value, that is, the sequence number, with reference information.

Here, according to an embodiment of the present invention, the real-time request packet failure detection method according to the sequential processing interworking method of the request packet analyzing apparatus may be recorded as a program in a computer-readable medium, for example, a CD or a USB memory device.

5 is a view for explaining a failure detection method after the request packet processing of the request packet analysis apparatus in the parallel processing interworking method of FIG. 3 according to an embodiment of the present invention.

In the parallel processing interworking method according to the present invention, there is no guarantee that the request IDs of the requested packets arrive sequentially according to the sequentially incremented sequence. As shown in the example of FIG. 5, the request packet ID of the interworking host 120 is 1,2,3,4. It may not arrive sequentially. Therefore, the failure of the request packet cannot be detected through the error between the reference value and the present value as in the sequential processing interworking method of FIG. 4. Therefore, a method of detecting a failure after processing the request packet will be described with reference to FIG. 5.

Referring to FIG. 5, the interworking host 120 requests a service by transmitting a first request packet including a request ID value of BP001_20101011_1 and a timeout value of 1 minute, a MAC address, and a parallel processing interworking method to the platform server 140. do.

Accordingly, when the request packet unique ID value is BP001_20101011_1 and the first request packet including the timeout value is safely received, the platform server 140 interoperates the first request packet result value indicating that the reception is successful. To transmit.

At this time, the platform server 140 logs and stores the first request packet including the request packet unique ID value of BP001_20101011_1 and a timeout value of 1 minute in the request packet DB 144.

Subsequently, the interworking host 120 requests the platform server 140 for the second request packet including the request packet unique ID value BP001_20101011_2 and the timeout value for 1 minute, the MAC address, and the parallel processing interworking method according to the sequentially incremented sequence. On the other hand, the platform server 140 receives the second request packet after receiving the fourth request packet. At this time, the platform server 140 logs and stores the second request packet in the request packet DB 144.

Subsequently, the interworking host 120 transmits the third request packet including the request packet unique ID value BP001_20101011_3 and the timeout value for 1 minute and the MAC address to the platform server 140 according to the sequentially incremented sequence. The platform server 140 fails to receive the third request packet.

Subsequently, the interworking host 120 sequentially requests the fourth request packet including the request packet unique ID value BP001_20101011_4 and the timeout value for 1 minute, the MAC address, and the parallel processing interworking method to the platform server 140 according to the sequentially incremented sequence. Request for service by sending.

Accordingly, the platform server 140 receives the unique request packet ID value BP001_20101011_4 received from the companion host 120 and the timeout value is 1 minute and is unique for the fourth request packet including the MAC address and the parallel processing interworking method. The ID and timeout value are logged and stored in the request packet DB 144.

On the other hand, the request packet analysis device 150 searches the analysis target list by checking the request packet expiration state for each request packet in the request packet DB 144 in the parallel processing interworking method. This checks the expiration state based on the current reception time and each request time / timeout value of the request packet according to Equation 1 below. Equation 1 shows a case where the analysis target list condition is satisfied.

Figure pat00001

Subsequently, the request packet analyzing apparatus 150 sorts the request packet unique ID value in the analysis target list. For example, before sorting, 1, 4, 2, 5, 6, 9... If requested in order, 1,2,4,5,6,9... In order.

That is, as shown in Figure 5, if the sorted in the order of the first request packet, the fourth request packet, the second request packet to the platform server 140, the first request packet, the second request packet, the fourth In order of request packet.

Subsequently, the request packet analyzing apparatus 150 sequentially checks each request packet unique ID value in the request packet unique ID value list after sorting, so that the error value is not the error reference value 1 or the previous request packet unique ID value does not exist. In this case, the packet is detected as a failure and the request packet failure DB 152 stores information on the request packet as a request packet count, failure time information, duration, failure MAC address, etc. based on the failure time interval. Therefore, in the request packet analyzing apparatus 150, the controller 210 may recognize the request failure count number (request failure count) and the failure time interval through the timer 220 when the failure of the request packet is detected. For example, in the above example, there will be one request failure between 2 and 4, and in the above example there will be two request failures between 6 and 9.

That is, the request packet analyzing apparatus 150 analyzes each error by sorting the first request packet, the second request packet, and the fourth request packet with respect to the received request packet as shown in FIG. The first request packet detects a failure.

Subsequently, the request packet analyzing apparatus 150 updates the value of the analysis completion status field of the analysis target list on which analysis is completed and excludes it from the next analysis target.

Here, according to an embodiment of the present invention, the failure detection method after the request packet processing of the request packet analyzer can be recorded as a program in a computer-readable medium, for example, a CD or a USB memory device.

6 is a view for explaining a failure host identification method when detecting a request packet failure of the request packet analysis apparatus according to the present invention.

In the request packet failure detection according to the present invention, the identification method of the failed host transmits the request packet including the MAC address in the service request step. The existing identification method through IP may not be unique when transmitting Real IP information under the L4 switch / LVS load balancing structure because there is a possibility of overlap in the nature of the private IP address system. In addition, VIPs (virtual IPs) do not exactly identify the failed host.

Referring to FIG. 6, in the interworking host 120, a private IP host and a public IP host may be interworked.

First, the interworking host 120 includes a MAC address in a request packet when a service request is made to the platform server 140. That is, the interworking host 120 transmits the service request information including the request packet unique ID, timeout, MAC address, and interworking method to the platform server 140 (S610).

Accordingly, the platform server 140 stores a request packet unique ID and a timeout value in the request packet DB 144 for a request packet including a request packet unique ID, a timeout, a MAC address, and an interworking scheme. The method is stored in the interlocking host DB (142) (S620).

Subsequently, the request packet analyzer 150 detects a failure by analyzing the request packet according to the interworking method as described above (S630). Therefore, the controller 210 of the request packet analyzing apparatus 150 stores information on the request packet detected as a failure in the request packet failure DB 152. At this time, the MAC packet is included in the request packet detected as a failure.

Subsequently, the host identification manager 230 of the request packet analyzing apparatus 150 checks the interworking host DB 142 which stores the MAC information when interworking with the request packet DB 144 and connects the corresponding host information. Identifies a failed host (S640).

Therefore, the request packet analyzer 150 stores the host information identified as the failed host in the request packet failure DB 152.

Here, according to an embodiment of the present invention, when detecting a request packet failure of the request packet analyzer, the method of identifying a failed host may be recorded as a program in a computer-readable medium, for example, a CD or a USB memory device.

As described above, according to the present invention, when a system that provides data to a user, such as an open API platform and a customer terminal information (UAPS) and performs a specific function in interworking services in an external public network, the requested packet The method of detecting a failure of a request packet and identifying a host in an open service, which can confirm information on whether the server has reached the server normally, and can identify a real host that has actually called, and detect a transmission failure of a request packet. The system can be realized.

It will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the present invention as defined by the following claims and their equivalents. Only. The scope of the present invention is defined by the appended claims rather than the detailed description and all changes or modifications derived from the meaning and scope of the claims and their equivalents are to be construed as being included within the scope of the present invention do.

The present invention can be applied to an open service that is designed to interwork with an API.

100: open service failure detection system 110: service request terminal
120 ~ 124: Interworking host 130: Open network
140: platform server 142: interworking host DB
144: request packet DB 150: request packet analysis device
152: request packet failure DB 160: legacy system
210: control unit 220: timer
230: Host Identification Manager

Claims (18)

An interlocking host for transmitting a request packet including a request packet unique ID, a request packet timeout value, a MAC address, and an interworking method to a platform server according to a service request from a service request terminal;
For the request packet received from the companion host, the request packet unique ID and the request packet timeout value are logged and stored in a request packet database, and the MAC address and the linkage scheme are stored in a link host database, and the link A platform server for transmitting the method to the request packet analyzer;
A request packet analysis device for detecting a failure by analyzing the request packet according to an interworking method received from the platform server, and identifying a coordinated host for the request packet detected as a failure;
A request packet database for storing the request packet unique ID and the request packet Timeout value;
A request packet failure database for storing a request packet count, a failure time information, a duration, a failed MAC address, for the request packet detected as the failure; And
An interlocking host database for storing information about the interlocking host, including the MAC address and the interlocking scheme;
Open service failure detection system comprising a.
Interworking host providing an interlocking service by interworking with a platform server through a communication network according to a service request of a service request terminal.
And a request packet including a request packet unique ID, a request packet timeout value, a MAC address, and an interworking method for the service request from the service request terminal to the platform server.
A controller for detecting a failure by analyzing a request packet according to an interworking method received from a platform server; And
A host identification manager identifying a companion host through a MAC address included in a request packet detected as a failure by the controller;
Request packet analysis device comprising a.
The method of claim 3, wherein
The control unit, if the interworking method is a sequential processing method, request packet analysis apparatus, characterized in that detecting the failure if the difference between the current request packet unique ID value and the previous request packet unique ID value is not the reference value.
The method of claim 3, wherein
And a timer for counting a request delay time required to receive the next request packet from the reception time of the request packet and receiving the previous request packet, and informing the controller.
The control unit calculates the average average delay time by collecting the request delay time of each request packet by a predetermined unit, and if the interworking method is a sequential processing interworking method by counting the time through the timer from the reception time of the previous request packet Request packet analysis apparatus, characterized in that detected as a failure if the current request packet is not received so that the average delay time.
The method of claim 5, wherein
The control unit collects the reception time of each request packet, checks the number of requests per time zone, and uses the request number per time zone as a threshold to detect a failure when the number of requests in each time zone is out of the threshold. .
The method of claim 3, wherein
When the interworking method is a parallel processing method, the controller checks the expiration state of the request packet, sorts the request packets in the expiration state into a list according to the request packet unique ID value, and then requests each of the sorted lists. Request packet analysis apparatus, characterized in that the detection of the failure if the difference between the packet unique ID value is not the reference value.
The method of claim 3, wherein
A request packet failure database for storing a request failure count number, failure time information, duration, and a failed MAC address for the request packet detected as the failure;
Request packet analysis apparatus, characterized in that it further comprises.
(a) receiving a sequential interworking scheme from a platform server;
(b) calculating a difference value between a current request packet unique ID value and a previous request packet unique ID value when the interworking method is a sequential processing interworking method;
(c) detecting the failure if the difference is not a reference value; And
(d) storing information on the request packet detected as the failure;
Real-time request packet failure detection method according to the sequential processing interlocking method of the request packet analysis device comprising a.
The method of claim 9,
The request packet is generated according to a sequence sequentially incremented (Sequence), the request packet unique ID value is a real-time request packet failure detection method according to the sequential processing interlocking method of the request packet analysis device, characterized in that the sequence number. .
The method of claim 9,
If the request packet is not received in the step (b), the step (c) is to count the time through the timer, if the current request packet is not received so that the request average delay time elapses from the reception time of the previous request packet Real-time request packet failure detection method according to the sequential processing interlocking method of the request packet analysis device, characterized in that detecting the failure.
The method of claim 9,
In the step (d), the request packet analysis apparatus stores the request failure count, the failure time information, the duration, and the failure MAC address for the request packet detected as the failure. Request packet failure detection method.
(a) receiving a parallel processing interworking method from a platform server;
(b) searching for an analysis target list by checking an expiration state for a request packet when the interworking method is a parallel processing interworking method;
(c) sorting the request object list based on a request packet unique ID value;
(d) sequentially calculating difference values of respective request packet unique ID values of the sorted analysis target list;
(e) detecting as a failure if the difference is not a reference value; And
(f) storing information on the request packet detected as the failure;
Failure detection method after the request packet processing according to the parallel processing interlocking method of the request packet analysis device comprising a.
The method of claim 13,
The request packet is generated according to a sequentially incremented sequence (Sequence), the request packet unique ID value is a failure detection method after processing the request packet according to the parallel processing scheme of the request packet analysis apparatus, characterized in that the sequence number .
The method of claim 13,
In the step (b), the request packet according to the parallel processing interworking method of the request packet analysis apparatus, characterized in that for checking the expiration state for the request packet on the basis of the current time, the request time and the timeout value of the request packet. How to detect faults after treatment.
The method of claim 13,
In the step (f), the request packet analysis apparatus according to the parallel processing interworking method of the request packet analysis device, characterized in that for storing the request failure count number, failure time information, duration, MAC address of the failure for the request packet detected as the failure Fault detection after packet processing.
A computer readable medium having recorded thereon a method according to any one of claims 9 to 16.
A method for identifying a failed host when a request packet failure is detected by a request packet analysis device having a request packet database storing a request packet unique ID and a request packet timeout value and an interlocking host database storing the MAC address and interworking method of the interlocking host. As
(a) detecting a failure of a request packet according to the interworking method;
(b) if the request packet is detected as a failure, storing the request packet including a MAC address; And
(c) identifying a failed host by associating host information where the MAC address included in the request packet matches the MAC address stored in the interworking host database;
Failure host identification method when detecting a request packet failure of the request packet analysis device comprising a.
KR1020100130566A 2010-12-20 2010-12-20 Method for detecting request error packet and discriminating host in public network, and system thereof KR20120069148A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1020100130566A KR20120069148A (en) 2010-12-20 2010-12-20 Method for detecting request error packet and discriminating host in public network, and system thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020100130566A KR20120069148A (en) 2010-12-20 2010-12-20 Method for detecting request error packet and discriminating host in public network, and system thereof

Publications (1)

Publication Number Publication Date
KR20120069148A true KR20120069148A (en) 2012-06-28

Family

ID=46687460

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020100130566A KR20120069148A (en) 2010-12-20 2010-12-20 Method for detecting request error packet and discriminating host in public network, and system thereof

Country Status (1)

Country Link
KR (1) KR20120069148A (en)

Similar Documents

Publication Publication Date Title
CN101009607B (en) Systems and methods for detecting and preventing flooding attacks in a network environment
US9444701B2 (en) Identifying remote machine operating system
CN110730195B (en) Data processing method and device and computer readable storage medium
CN110073639A (en) Packet loss tolerant transmission control protocol congestion control
US9253669B2 (en) Network analysis method, information processing device, and computer-readable recording medium
CN103036696A (en) Achievement method and system and corresponding device of online business
CN104348808B (en) The method and apparatus of Dialog processing
CN103634166A (en) Equipment survival detection method and equipment survival detection device
CN111526109B (en) Method and device for automatically detecting running state of web threat recognition defense system
JP4985435B2 (en) Monitoring and analyzing apparatus, method, and program
CN110569178B (en) Interface early warning method and system based on big data platform
CN108076070B (en) FASP (fast open shortest Path protocol) blocking method, device and analysis system
CN111787039A (en) System and method for monitoring pathological parameters
KR20120069148A (en) Method for detecting request error packet and discriminating host in public network, and system thereof
CN111200522A (en) Port detection method, device, equipment and storage medium
CN112769653B (en) Network detection and switching method, system and medium based on network port binding
EP1662704A2 (en) Monitoring system, apparatus to be monitored, monitoring apparatus and monitoring method
CN111010441B (en) Block chain cross-chain method and system and electronic equipment
JP2000041039A (en) Device and method for monitoring network
KR101263218B1 (en) Method and apparatus for aggregating one packet of one session
CN104363248B (en) Radio data transmission method and user terminal
KR101479948B1 (en) Method for managing traffic between M2M platform and M2M device
US10880414B2 (en) Packet analysis method and information processing apparatus
US20210258203A1 (en) Missing alert handling system and missing alert handling method
CN116248545A (en) Fault analysis method and device for network transmission link

Legal Events

Date Code Title Description
A201 Request for examination
E902 Notification of reason for refusal
E601 Decision to refuse application