KR20120069148A - Method for detecting request error packet and discriminating host in public network, and system thereof - Google Patents
Method for detecting request error packet and discriminating host in public network, and system thereof Download PDFInfo
- Publication number
- KR20120069148A KR20120069148A KR1020100130566A KR20100130566A KR20120069148A KR 20120069148 A KR20120069148 A KR 20120069148A KR 1020100130566 A KR1020100130566 A KR 1020100130566A KR 20100130566 A KR20100130566 A KR 20100130566A KR 20120069148 A KR20120069148 A KR 20120069148A
- Authority
- KR
- South Korea
- Prior art keywords
- request packet
- failure
- request
- host
- interworking
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/0631—Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
- H04L43/0823—Errors, e.g. transmission errors
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/16—Threshold monitoring
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L49/00—Packet switching elements
- H04L49/55—Prevention, detection or correction of errors
- H04L49/555—Error detection
Abstract
According to the present invention, when a system that provides data to a user such as an open application platform and a customer terminal information (UAPS) and services a system that performs a specific function by interworking in an external public network, the requested packet reaches the server normally. The present invention relates to a method and a system for detecting a failure of a request packet and identifying a host in an open service, which can identify information about whether a request has been made, and to detect a real host that has actually called.
An open service failure detection system according to the present invention comprises: an interworking host for transmitting a request packet including a request packet unique ID, a request packet timeout value, a MAC address, and an interworking method according to a service request from a service request terminal; For the request packet received from the companion host, the request packet unique ID and the request packet timeout value are logged and stored in a request packet database, and the MAC address and the linkage scheme are stored in a link host database, and the link A platform server for transmitting the method to the request packet analyzer; A request packet analysis device for detecting a failure by analyzing the request packet according to an interworking method received from the platform server, and identifying a coordinated host for the request packet detected as a failure; A request packet database for storing the request packet unique ID and the request packet Timeout value; A request packet failure database for storing a request packet count, a failure time information, a duration, a failed MAC address, for the request packet detected as the failure; And an interlocking host database for storing information about the interlocking host, including the MAC address and the interlocking scheme.
Description
The present invention relates to a method and system for detecting a transmission failure of a request packet and identifying a host in an open service, and more specifically, provides data to a user such as an open application platform and a customer terminal information (UAPS). When interworking with a system that performs a specific function in an external public network, check the information on whether the requested packet has reached the server normally, and identify the real host that has actually called. It can be detected.
Recently, various services such as cloud computing services have been provided through a platform for providing an open interworking service between legacy systems.
7 is a diagram illustrating a configuration of a communication system of an existing open service interworking method. In the case of the existing open service interworking method as shown in FIG. 7, the service interworking system to provide an interface is requested to the
With the diversification of open services and the increase of new interworking services, the stability of the
By the way, the request packet received from the
The present invention for solving the above problems, when providing a data to the user, such as an open application (Open API) platform and customer terminal information (UAPS) and the system performing a specific function in conjunction with the service in the external public network, request In the open service, it is possible to detect the failure of the request packet and identify the host by checking the information on whether the received packet has reached the server normally, and identifying the real host that has actually called. Its purpose is to provide a method and a system thereof.
According to an aspect of the present invention for achieving the above object, according to the service request from the service request terminal for transmitting a request packet including the request packet unique ID, request packet Timeout value, MAC address, interworking method to the platform server Interworking host; For the request packet received from the companion host, the request packet unique ID and the request packet timeout value are logged and stored in a request packet database, and the MAC address and the linkage scheme are stored in a link host database, and the link A platform server for transmitting the method to the request packet analyzer; A request packet analysis device for detecting a failure by analyzing the request packet according to an interworking method received from the platform server, and identifying a coordinated host for the request packet detected as a failure; A request packet database for storing the request packet unique ID and the request packet Timeout value; A request packet failure database for storing a request packet count, a failure time information, a duration, a failed MAC address, for the request packet detected as the failure; And an interlocking host database for storing information on the interlocking host, including the MAC address and the interlocking scheme.
On the other hand, according to another aspect of the present invention for achieving the above object, in accordance with the service request of the service request terminal, the interlocking host to provide an interlocking service by interworking with the platform server through a communication network, from the service request terminal to the service request; A requesting packet including a request packet unique ID, a request packet timeout value, a MAC address, and an interworking method is transmitted to the platform server.
On the other hand, according to another aspect of the present invention for achieving the above object, a control unit for detecting a failure by analyzing the request packet according to the interworking method received from the platform server; And a host identification manager for identifying a coordinated host through a MAC address included in the request packet detected as a failure by the controller.
In addition, when the interworking method is a sequential processing method, the controller may detect a failure if a difference value between a current request packet unique ID value and a previous request packet unique ID value is not a reference value.
In this case, the reception time of the request packet, and a timer for counting the request delay time from receiving the previous request packet to receiving the next request packet to inform the control unit, wherein the control unit of each request packet Request average delay time is calculated by aggregating the request delay time by a certain unit, and when the interworking method is a sequential processing interworking method, the time is counted through the timer so that the request average delay time elapses from the reception time of the previous request packet. If the current request packet is not received, it can be detected as a failure.
In addition, the control unit may collect the reception time of each request packet to check the number of requests for each time zone, and may detect a failure when the number of requests for each time zone is outside the threshold by using the number of requests for each time zone as a threshold.
In addition, when the interworking method is a parallel processing method, the controller checks the expiration status of the request packet, sorts the request packets in the expiration status into a list according to the request packet unique ID value, and then, If the difference between each request packet's unique ID values is not the reference value, it can be detected as a failure.
And, the request packet detected as a failure may further include a request packet failure database for storing the number of request failure count, failure time information, duration, failure MAC address.
On the other hand, according to another aspect of the present invention for achieving the above object, (a) receiving a sequential processing interworking method from the platform server; b) calculating a difference value between a current request packet unique ID value and a previous request packet unique ID value included in the request packet when the interworking method is a sequential processing interworking method; (c) detecting the failure if the difference is not a reference value; And (d) provides a real-time request packet failure detection method according to the sequential processing interlocking method of the request packet analysis device comprising the step of storing information about the request packet detected as the failure.
The request packet is generated according to a sequentially incremented sequence, and the request packet unique ID value is a sequence number.
In addition, when the request packet is not received in step (b), step (c) is performed by counting a time through a timer so that the current request packet is received so that the average request delay time elapses from the reception time of the previous request packet. If not, it can be detected as a failure.
The step (d) may store a request failure count, a failure time information, a duration, and a failed MAC address for the request packet detected as the failure.
On the other hand, according to another aspect of the present invention for achieving the above object, (a) receiving a parallel processing interworking method from the platform server; (b) searching for an analysis target list by checking an expiration state for a request packet when the interworking method is a parallel processing interworking method; (c) sorting the request object list based on a request packet unique ID value; (d) sequentially calculating difference values of respective request packet unique ID values of the sorted analysis target list; (e) detecting as a failure if the difference is not a reference value; And (f) there is provided a failure detection method after the request packet processing according to the parallel processing interlocking scheme of the request packet analysis apparatus comprising the step of storing information about the request packet detected as the failure.
The request packet is generated according to a sequentially incremented sequence, and the request packet unique ID value is a sequence number.
In addition, in the step (b), the expiration state of the request packet may be checked based on the current reception time, the request time, and the timeout value of the request packet.
In addition, the step (f) may store the request failure count, failure time information, duration, and failure MAC address for the request packet detected as the failure.
The methods according to the present invention can be recorded as a program on a computer readable medium such as a CD or a USB memory device.
On the other hand, according to another aspect of the present invention for achieving the above object, the request packet database that stores the request packet unique ID and the request packet Timeout value, and the interworking host that stores the MAC address and interworking method of the coordinated host CLAIMS What is claimed is: 1. A method of identifying a failed host in detecting a request packet failure of a request packet analyzing apparatus having a database, the method comprising: detecting a failure of a request packet according to the interworking method; (b) if the request packet is detected as a failure, storing the request packet including a MAC address; And (c) identifying a failed host by associating host information where the MAC address included in the request packet and the MAC address stored in the interworking host database match. A host identification method is provided.
According to the present invention, even if the request packet requested by the platform service interworking host provided by the open network does not reach the server, monitoring and detection is possible.
In addition, a request failure can be detected in real time when a service request is made. That is, in the case of the sequential processing method, it is possible to detect the failure between the previous request time, request failure count, etc. when the service interworking request.
In addition, it is possible to identify the actual host of the host that failed the service request.
In addition, through the present invention can obtain the statistical information on the request failure, it is possible to calculate the actual service request attempt count and can obtain a correction value when a failure of the statistical system provided separately.
And if the normal request packet can not be received, it is possible to immediately identify the host where the problem occurred.
1 is a configuration diagram schematically showing the overall configuration of an open service failure detection system according to an embodiment of the present invention.
2 is a block diagram schematically showing a functional block of a request packet analysis apparatus according to an embodiment of the present invention.
3 is a view for explaining a real-time request packet failure detection method of the sequential processing interworking method according to an embodiment of the present invention.
4 is a diagram illustrating a failure detection method after processing a request packet in a parallel processing interworking method according to an embodiment of the present invention.
5 is a view for explaining a method of identifying a failed host when detecting a request packet failure used in the present invention.
6 is a flowchart illustrating an open service failure detection method according to an exemplary embodiment of the present invention.
7 is a diagram illustrating a configuration of a communication system of an existing open service interworking method.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS Reference will now be made in detail to the preferred embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like reference numerals refer to the like elements throughout. Hereinafter, exemplary embodiments of the present invention will be described in detail with reference to the accompanying drawings.
1 is a configuration diagram schematically showing the overall configuration of an open service failure detection system according to an embodiment of the present invention.
Referring to FIG. 1, the open service
The
The interworking hosts 120 to 124 may request a packet according to a service request from the
The
The
In addition, when receiving the service request information from the interlocking host (120 ~ 124), the
In addition, the
The
The
The request
The request
The
2 is a block diagram schematically showing a functional block of a request packet analysis apparatus according to an embodiment of the present invention.
Referring to FIG. 2, the request
The
The
In addition, the
In addition, the
Request packet failure detection based on the sequential interworking method detects a failure based on the current request packet, and in the case of parallel processing interworking method, a failure is detected from the expired request packet list.
However, if the current request packet is not continuously received, the presence or absence of request failure in the section from the past point of time to the present time cannot be checked, so the
When the
3 is a flowchart illustrating an open service failure detection method according to an exemplary embodiment of the present invention.
In the embodiment of FIG. 3, the
Referring to FIG. 3, when the
Accordingly, the
Here, the request packet is generated according to a sequentially incremented sequence, and the request packet unique ID value is a sequence number. Accordingly, since the request packet unique ID value, that is, sequence numbers are sequentially checked and the error value is 1 for each sequence number, 1 is an error reference value.
Subsequently, the
Subsequently, the request
Therefore, the
However, the request
Subsequently, the request
In addition, the
On the other hand, the request
Subsequently, the request
On the other hand, the request
In addition, the request
4 is a view for explaining a real-time request packet failure detection method of the request packet analysis apparatus in the sequential processing interworking method of FIG. 3 according to an embodiment of the present invention.
Referring to FIG. 4, as shown in FIG. 4, the
Accordingly, when the
At this time, the
Subsequently, the
Subsequently, the
Subsequently, the
Accordingly, the
At this time, the request
Therefore, the request
In addition, the
In addition, in the request
Subsequently, the
Here, according to an embodiment of the present invention, the real-time request packet failure detection method according to the sequential processing interworking method of the request packet analyzing apparatus may be recorded as a program in a computer-readable medium, for example, a CD or a USB memory device.
5 is a view for explaining a failure detection method after the request packet processing of the request packet analysis apparatus in the parallel processing interworking method of FIG. 3 according to an embodiment of the present invention.
In the parallel processing interworking method according to the present invention, there is no guarantee that the request IDs of the requested packets arrive sequentially according to the sequentially incremented sequence. As shown in the example of FIG. 5, the request packet ID of the
Referring to FIG. 5, the
Accordingly, when the request packet unique ID value is BP001_20101011_1 and the first request packet including the timeout value is safely received, the
At this time, the
Subsequently, the
Subsequently, the
Subsequently, the
Accordingly, the
On the other hand, the request
Subsequently, the request
That is, as shown in Figure 5, if the sorted in the order of the first request packet, the fourth request packet, the second request packet to the
Subsequently, the request
That is, the request
Subsequently, the request
Here, according to an embodiment of the present invention, the failure detection method after the request packet processing of the request packet analyzer can be recorded as a program in a computer-readable medium, for example, a CD or a USB memory device.
6 is a view for explaining a failure host identification method when detecting a request packet failure of the request packet analysis apparatus according to the present invention.
In the request packet failure detection according to the present invention, the identification method of the failed host transmits the request packet including the MAC address in the service request step. The existing identification method through IP may not be unique when transmitting Real IP information under the L4 switch / LVS load balancing structure because there is a possibility of overlap in the nature of the private IP address system. In addition, VIPs (virtual IPs) do not exactly identify the failed host.
Referring to FIG. 6, in the
First, the
Accordingly, the
Subsequently, the
Subsequently, the
Therefore, the
Here, according to an embodiment of the present invention, when detecting a request packet failure of the request packet analyzer, the method of identifying a failed host may be recorded as a program in a computer-readable medium, for example, a CD or a USB memory device.
As described above, according to the present invention, when a system that provides data to a user, such as an open API platform and a customer terminal information (UAPS) and performs a specific function in interworking services in an external public network, the requested packet The method of detecting a failure of a request packet and identifying a host in an open service, which can confirm information on whether the server has reached the server normally, and can identify a real host that has actually called, and detect a transmission failure of a request packet. The system can be realized.
It will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the present invention as defined by the following claims and their equivalents. Only. The scope of the present invention is defined by the appended claims rather than the detailed description and all changes or modifications derived from the meaning and scope of the claims and their equivalents are to be construed as being included within the scope of the present invention do.
The present invention can be applied to an open service that is designed to interwork with an API.
100: open service failure detection system 110: service request terminal
120 ~ 124: Interworking host 130: Open network
140: platform server 142: interworking host DB
144: request packet DB 150: request packet analysis device
152: request packet failure DB 160: legacy system
210: control unit 220: timer
230: Host Identification Manager
Claims (18)
For the request packet received from the companion host, the request packet unique ID and the request packet timeout value are logged and stored in a request packet database, and the MAC address and the linkage scheme are stored in a link host database, and the link A platform server for transmitting the method to the request packet analyzer;
A request packet analysis device for detecting a failure by analyzing the request packet according to an interworking method received from the platform server, and identifying a coordinated host for the request packet detected as a failure;
A request packet database for storing the request packet unique ID and the request packet Timeout value;
A request packet failure database for storing a request packet count, a failure time information, a duration, a failed MAC address, for the request packet detected as the failure; And
An interlocking host database for storing information about the interlocking host, including the MAC address and the interlocking scheme;
Open service failure detection system comprising a.
And a request packet including a request packet unique ID, a request packet timeout value, a MAC address, and an interworking method for the service request from the service request terminal to the platform server.
A host identification manager identifying a companion host through a MAC address included in a request packet detected as a failure by the controller;
Request packet analysis device comprising a.
The control unit, if the interworking method is a sequential processing method, request packet analysis apparatus, characterized in that detecting the failure if the difference between the current request packet unique ID value and the previous request packet unique ID value is not the reference value.
And a timer for counting a request delay time required to receive the next request packet from the reception time of the request packet and receiving the previous request packet, and informing the controller.
The control unit calculates the average average delay time by collecting the request delay time of each request packet by a predetermined unit, and if the interworking method is a sequential processing interworking method by counting the time through the timer from the reception time of the previous request packet Request packet analysis apparatus, characterized in that detected as a failure if the current request packet is not received so that the average delay time.
The control unit collects the reception time of each request packet, checks the number of requests per time zone, and uses the request number per time zone as a threshold to detect a failure when the number of requests in each time zone is out of the threshold. .
When the interworking method is a parallel processing method, the controller checks the expiration state of the request packet, sorts the request packets in the expiration state into a list according to the request packet unique ID value, and then requests each of the sorted lists. Request packet analysis apparatus, characterized in that the detection of the failure if the difference between the packet unique ID value is not the reference value.
A request packet failure database for storing a request failure count number, failure time information, duration, and a failed MAC address for the request packet detected as the failure;
Request packet analysis apparatus, characterized in that it further comprises.
(b) calculating a difference value between a current request packet unique ID value and a previous request packet unique ID value when the interworking method is a sequential processing interworking method;
(c) detecting the failure if the difference is not a reference value; And
(d) storing information on the request packet detected as the failure;
Real-time request packet failure detection method according to the sequential processing interlocking method of the request packet analysis device comprising a.
The request packet is generated according to a sequence sequentially incremented (Sequence), the request packet unique ID value is a real-time request packet failure detection method according to the sequential processing interlocking method of the request packet analysis device, characterized in that the sequence number. .
If the request packet is not received in the step (b), the step (c) is to count the time through the timer, if the current request packet is not received so that the request average delay time elapses from the reception time of the previous request packet Real-time request packet failure detection method according to the sequential processing interlocking method of the request packet analysis device, characterized in that detecting the failure.
In the step (d), the request packet analysis apparatus stores the request failure count, the failure time information, the duration, and the failure MAC address for the request packet detected as the failure. Request packet failure detection method.
(b) searching for an analysis target list by checking an expiration state for a request packet when the interworking method is a parallel processing interworking method;
(c) sorting the request object list based on a request packet unique ID value;
(d) sequentially calculating difference values of respective request packet unique ID values of the sorted analysis target list;
(e) detecting as a failure if the difference is not a reference value; And
(f) storing information on the request packet detected as the failure;
Failure detection method after the request packet processing according to the parallel processing interlocking method of the request packet analysis device comprising a.
The request packet is generated according to a sequentially incremented sequence (Sequence), the request packet unique ID value is a failure detection method after processing the request packet according to the parallel processing scheme of the request packet analysis apparatus, characterized in that the sequence number .
In the step (b), the request packet according to the parallel processing interworking method of the request packet analysis apparatus, characterized in that for checking the expiration state for the request packet on the basis of the current time, the request time and the timeout value of the request packet. How to detect faults after treatment.
In the step (f), the request packet analysis apparatus according to the parallel processing interworking method of the request packet analysis device, characterized in that for storing the request failure count number, failure time information, duration, MAC address of the failure for the request packet detected as the failure Fault detection after packet processing.
(a) detecting a failure of a request packet according to the interworking method;
(b) if the request packet is detected as a failure, storing the request packet including a MAC address; And
(c) identifying a failed host by associating host information where the MAC address included in the request packet matches the MAC address stored in the interworking host database;
Failure host identification method when detecting a request packet failure of the request packet analysis device comprising a.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020100130566A KR20120069148A (en) | 2010-12-20 | 2010-12-20 | Method for detecting request error packet and discriminating host in public network, and system thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020100130566A KR20120069148A (en) | 2010-12-20 | 2010-12-20 | Method for detecting request error packet and discriminating host in public network, and system thereof |
Publications (1)
Publication Number | Publication Date |
---|---|
KR20120069148A true KR20120069148A (en) | 2012-06-28 |
Family
ID=46687460
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020100130566A KR20120069148A (en) | 2010-12-20 | 2010-12-20 | Method for detecting request error packet and discriminating host in public network, and system thereof |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR20120069148A (en) |
-
2010
- 2010-12-20 KR KR1020100130566A patent/KR20120069148A/en not_active Application Discontinuation
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101009607B (en) | Systems and methods for detecting and preventing flooding attacks in a network environment | |
US9444701B2 (en) | Identifying remote machine operating system | |
CN110730195B (en) | Data processing method and device and computer readable storage medium | |
CN110073639A (en) | Packet loss tolerant transmission control protocol congestion control | |
US9253669B2 (en) | Network analysis method, information processing device, and computer-readable recording medium | |
CN103036696A (en) | Achievement method and system and corresponding device of online business | |
CN104348808B (en) | The method and apparatus of Dialog processing | |
CN103634166A (en) | Equipment survival detection method and equipment survival detection device | |
CN111526109B (en) | Method and device for automatically detecting running state of web threat recognition defense system | |
JP4985435B2 (en) | Monitoring and analyzing apparatus, method, and program | |
CN110569178B (en) | Interface early warning method and system based on big data platform | |
CN108076070B (en) | FASP (fast open shortest Path protocol) blocking method, device and analysis system | |
CN111787039A (en) | System and method for monitoring pathological parameters | |
KR20120069148A (en) | Method for detecting request error packet and discriminating host in public network, and system thereof | |
CN111200522A (en) | Port detection method, device, equipment and storage medium | |
CN112769653B (en) | Network detection and switching method, system and medium based on network port binding | |
EP1662704A2 (en) | Monitoring system, apparatus to be monitored, monitoring apparatus and monitoring method | |
CN111010441B (en) | Block chain cross-chain method and system and electronic equipment | |
JP2000041039A (en) | Device and method for monitoring network | |
KR101263218B1 (en) | Method and apparatus for aggregating one packet of one session | |
CN104363248B (en) | Radio data transmission method and user terminal | |
KR101479948B1 (en) | Method for managing traffic between M2M platform and M2M device | |
US10880414B2 (en) | Packet analysis method and information processing apparatus | |
US20210258203A1 (en) | Missing alert handling system and missing alert handling method | |
CN116248545A (en) | Fault analysis method and device for network transmission link |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A201 | Request for examination | ||
E902 | Notification of reason for refusal | ||
E601 | Decision to refuse application |