WO2007010593A1 - Émulateur de session au protocole tcp - Google Patents

Émulateur de session au protocole tcp Download PDF

Info

Publication number
WO2007010593A1
WO2007010593A1 PCT/JP2005/013164 JP2005013164W WO2007010593A1 WO 2007010593 A1 WO2007010593 A1 WO 2007010593A1 JP 2005013164 W JP2005013164 W JP 2005013164W WO 2007010593 A1 WO2007010593 A1 WO 2007010593A1
Authority
WO
WIPO (PCT)
Prior art keywords
session
tcp
protocol
packet
header
Prior art date
Application number
PCT/JP2005/013164
Other languages
English (en)
Japanese (ja)
Inventor
Hiroaki Yamamoto
Wataru Nakamura
Original Assignee
Fujitsu Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujitsu Limited filed Critical Fujitsu Limited
Priority to PCT/JP2005/013164 priority Critical patent/WO2007010593A1/fr
Priority to JP2007525461A priority patent/JPWO2007010593A1/ja
Publication of WO2007010593A1 publication Critical patent/WO2007010593A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/16Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/16Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
    • H04L69/163In-band adaptation of TCP data exchange; In-band control procedures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management

Definitions

  • the present invention relates to a device for verifying the performance of TCP communication in a communication network system using TCP (Transmission Control Protocol) as a communication protocol, and more particularly, to a device (communication device) connected to an IP (Internet Protocol) network. Or a TCP session emulation device for emulating events that occur in the application software.
  • TCP Transmission Control Protocol
  • IP Internet Protocol
  • Patent Document 1 discloses a technique for analyzing the state of a communication sequence by emulating the behavior and internal procedures of a TCP protocol and investigating the cause of a decrease in throughput. Is disclosed. With these technologies, actual communication is monitored and the state transition that causes the problem operation is investigated by analyzing the state transition of the TCP protocol.
  • the configuration shown in FIG. 10 shows an example of the configuration of a conventional test apparatus.
  • the header extraction / protocol identification unit 20 extracts the header of the received packet, identifies the protocol, and is selected.
  • the packet is written to the receive packet buffer 22 by the received packet read Z write (RZW) control unit 21 and the header content is included in the data of the transmit packet buffer 24 specified by the transmit packet read Z write (RZW) control unit 23.
  • RZW received packet read Z write
  • the TCP protocol state transition is not generated in a pseudo manner.
  • the problem of the present invention is that it is possible to arbitrarily generate an abnormal sequence state or a high load state on the TCP protocol, which is difficult to intentionally occur in an actual network, depending on the setting. It is to provide technology to do.
  • the TCP session emulation apparatus of the present invention uses at least one of an IP (Internet Protocol) address and a port number obtained from the header of a received packet as a search key.
  • a session search table for searching for an identifier that identifies a session of the TCP (Transmission Control Protocol) protocol; and a session status code that is subtracted based on the identifier obtained as a search result of the session search table.
  • a session state management memory for obtaining the session state management memory, and a sequencer for determining a pseudo session operation of the TCP protocol used by one of a plurality of application protocols according to the obtained session status code.
  • the sequencer is provided for each application protocol including HTTP (Hyper Text Transfer Protocol), FTP (File Transfer Protocol), and SMTP (Simple Mail Transfer Protocol). It is.
  • the session status code includes a port number through which the TCP protocol session is communicating, a TCP status code indicating a transition state of the TCP protocol, and an upper status code indicating a transition state of the application protocol. It is configured.
  • the TCP session emulation apparatus further includes a state setting register that holds a preset setting value for intentionally generating an abnormal processing operation of the TCP protocol session; The operation of the sequencer is determined according to both values of the session status code.
  • the TCP session emulation device uses the TCP protocol sequence number as the header information from the header of the received packet, together with the IP address and the port number.
  • Extracting means for obtaining a confirmation response number and code bit; generating header information of a transmission packet based on the header information obtained by the extracting means and a header content instruction from the sequencer; And an additional means for transmitting.
  • the TCP session emulation device stores the reception time of the received packet as time stamp information in the session state management memory for each corresponding session; a register for setting a delay time of the response packet A response delay is realized by transmitting the response packet after the set delay time.
  • the present invention it is possible to intentionally generate an abnormal sequence, a large amount of traffic, a response delay, and the like by enabling the session operation of the TCP protocol to be executed in a pseudo manner. This is useful for verification of equipment) and application software. This will greatly contribute to improving the quality of IP network-related systems.
  • FIG. 1 is a block diagram showing a configuration of a communication network system to which a TCP session emulation apparatus according to an embodiment of the present invention is applied.
  • FIG. 2 is a block diagram showing a configuration of a TCP session emulation apparatus according to an embodiment of the present invention.
  • FIG. 3 is a diagram for explaining an operation procedure of the TCP session emulation apparatus according to the embodiment of the present invention.
  • FIG. 4 is a diagram showing a configuration example of a transmission packet buffer.
  • FIG. 5 is a diagram showing a configuration example of a session search table.
  • the Yon-Emulation device TSE is applied to the communication network system SYS shown in Fig. 1 (A) and (B).
  • the communication network system SY S includes at least one network (IP (Internet Protocol) network) NW.
  • This network NW constitutes a computer network such as UNIX (registered trademark) and a wide-area packet switching network.
  • Sano SV and client CL are usually connected to network NW as communication devices each having an IP address.
  • Sano SV and client CL send and receive data (TCP communication) through a communication line (sometimes referred to as a communication path or connection) via network NW.
  • TCP as a communication protocol is a protocol in the fourth layer (transport layer) above the IP (network layer) in the third layer of the OSI (Open Systems Interconnection) reference model.
  • the characteristic of TCP is reliable data transmission (transfer), that is, control of normal transmission of data while maintaining the reliability of the communication channel from the start to the end of communication, and error detection and It is to perform recovery. For this reason, TCP provides a connection 'orientated virtual channel to provide full-duplex' bi-directional stream services to higher-layer users.
  • the TCP session emulation device TSE can be implemented in the pseudo client CL or the pseudo server SV.
  • the pseudo client CL is a pseudo-generation of a state in which a large number of client CLs are accessing the Sano SV
  • the pseudo Sano SV is a pseudo-simulation with many actual client CLs. Communication.
  • the header extraction 'protocol identification unit 1 extracts the header and identifies the protocol from the packet received by the network NW force (S10, Sl in Fig. 3). Header extraction 'Protocol identification unit 1 extracts the IP address and port number of the target TCP bucket (strictly speaking, TCPZIP packet), and inputs it as a search key in the session search table 2 for searching for TCP sessions. (S1 2 and S13 in Fig. 3).
  • the session search table 2 is composed of a content addressable memory (CAM) including a search engine.
  • the search result of the session search table 2 is used to specify the entry number of the session state management memory 3 as a session identifier (address) indicating each TCP session number (S14 in FIG. 3). .
  • a connection is established!
  • a code (session status code) indicating the state (state) of each TCP session, and an address (packet storage location) in the received packet buffer 4 ( (Reception buffer address) and time stamp indicating packet reception time, etc., are registered for each entry number (session number) (S15, S16 in Fig. 3).
  • the session status code output from the session state management memory 3 is used as a transition condition to the next state of the response bucket generation sequencer 6 (S17 in FIG. 3).
  • the response packet generation sequencer 6 is a hardware sequencer that realizes the state transition of the TCP session.
  • the session status code and the value of the state setting register 7 that is set by the main control unit (CPU) are set.
  • the three-way handshake operation on the TCP session is realized for normal operation or abnormal operation (S18 in Fig. 3).
  • the response packet generation sequencer 6 writes a session status code indicating the state after transition to the session state management memory 3 (S19 in FIG. 3).
  • the content of the transmission header and the content of the transmission data corresponding to the response operation are controlled by the packet header generation unit 8 and the transmission packet read Z write (RZW) control. Passed to part 12.
  • the packet header generation unit 8 generates a transmission packet header based on the instruction content (transmission header content) from the response packet generation sequencer 6 and outputs it to the response packet generation unit 9. Transmit packet R
  • the ZW control unit 12 outputs the transmission packet read address to the transmission packet buffer 5 based on the instruction content from the response packet generation sequencer 6 (contents of transmission data).
  • the response packet generator 9 adds the transmission packet header from the packet header generator 8 to the transmission packet data from the transmission packet buffer 5, generates a response packet, and returns it to the other party through the network NW connection. (S21 in Figure 3).
  • Whether or not the delay time set in the delay setting register 13 has elapsed is determined based on a comparison between the time stamp information read from the session state management memory 3 and the timer value of the time stamp generation unit 10.
  • the transmission packet RZW control unit 12 determines that the transmission packet data is read from the transmission packet buffer 5 and transmitted from the response packet generation unit 9 after the set delay time has elapsed (S20 and S21 in FIG. 3).
  • session search table 2 If there is no matching entry in session search table 2, the IP address and port number of the received packet are registered in session search table 2, and the corresponding session status code is set to the initial value in session state management memory 3. (S14, S22, S23 in FIG. 3).
  • the header identification 'protocol identification unit 1 further extracts a TCP header sequence number (sequence number) and an acknowledgment number as the header information of the packet to be transmitted, and sends it to the packet header generation unit 8 It is done. These sequence number and confirmation response number are used in response packet generation in the response packet generation unit 9.
  • the received packet read Z write (R ZW) control unit 11 reads out the packet data stored in the received packet buffer 4 from the CPU, and the transmission packet buffer 5 Packet data can be set by the CPU, and higher-level protocol processing can be processed by the CPU.
  • the response packet generation sequencer 6 requires protocol processing by the CPU, the response packet generation sequencer 6 sends an interrupt notification to the CPU. Note that when sending a packet (not a response packet but a packet for generating traffic) to the network NW first from the TCP session emulation device TSE, the CPU power is also sent to the transmission packet RZW control unit 12. The packet is transmitted by notifying the control.
  • the contents of the transmission packet buffer 5 are as shown in Fig. 4 for each protocol of the application (for example, HTTP (Hyper Text Packet data corresponding to Transfer Protocol (FTP), File Transfer Protocol 1 (FTP), Simple Mail Transfer Protocol (SMTP), etc. is written in advance by the CPU. Therefore, the response packet generation sequencer 6 that has received the session status code from the session state management memory 3 passes the transmission data content indication indicating the address where the corresponding protocol is stored to the transmission packet RZW control unit 12, Address power stored in the transmission packet buffer 5 for the relevant protocol Transmission packet data is read.
  • HTTP Hyper Text Packet data corresponding to Transfer Protocol
  • FTP File Transfer Protocol 1
  • SMTP Simple Mail Transfer Protocol
  • FIG. 5 shows a configuration example of the session search table 2.
  • the session search table 2 stores a source address and a destination address (both are IP addresses), a protocol code, a source port number, and a destination port number.
  • Each entry in this table 2 corresponds to an individual session (session number) of TCP, and the header information extracted from the received packet, that is, source address, destination address, protocol code, source port number,
  • the TCP session is identified by searching this table 2 based on at least one of the destination port number and the destination port number.
  • FIG. 6 shows a configuration example of the session state management memory 3.
  • Each entry in the session state management memory 3 corresponds to each entry in the session search table 2.
  • the session state management memory 3 stores a session status code indicating the session state, a reception buffer address indicating the storage position of the received packet, and a time stamp indicating the time when the packet is received.
  • the session status code consists of the port number with which the TCP session is communicating, the TCP status code indicating the TCP transition status, and the upper status code indicating the transition status of the upper protocol (application protocol)! Speak.
  • the force performed by either hardware or software.
  • the state transition of the next state is detected by an interrupt notified from the response packet generation sequencer 6. Occurs.
  • FIG. 7 shows an operation procedure example of the response packet generation sequencer 6.
  • This operation procedure (S71 to S78) enables the TCP protocol state transition to be realized.
  • it is set to ABLISHED, upper protocol communication is performed.
  • For the state transition of the upper protocol pass the upper status code indicating the current status to the upper protocol processing sequencer (protocol sequencer) (Fig. 8) in the response packet generation sequencer 6 configured by hardware or software. Is done.
  • the TCP protocol state transition is changed to a state different from the normal state according to the setting contents of the state setting register 7. It should be noted that the TCP protocol state transitions shown in this operation procedure can be generated in hardware, so that a large amount of traffic generation states can be generated.
  • FIG. 8 shows a configuration example of the response packet generation sequencer 6.
  • the response packet generation sequencer 6 is ESTABL ISHED in the TCP protocol state transition shown in FIG. 6 Hierarchical configuration is adopted so that the internal high-level protocol processing sequencer operates.
  • the sequence operation is completed when the TCP protocol state transition force CLOSE state is entered by sending and receiving FINs.
  • an abnormal condition if an ACK response packet to a TCP protocol SYN packet reception is not returned normally, the abnormal condition occurrence is set in the status setting register 7 to generate a response packet.
  • the TCP sequencer inside the sequencer 6 is in the SYN-RCVD state, and normally sends a send instruction to the send packet RZW control unit 12 and the packet header generation unit 8 to return an ACK packet to the sender of the SYN packet. Without this operation, the ACK packet is not transmitted and the operation stays in SYN-RCVD.
  • an abnormality of the confirmation response number in the packet header is generated, an abnormal state occurrence is set in the status setting register 7, and the response packet generation sequencer 6 is used to indicate the content of the transmission packet header.
  • An abnormality generation instruction signal is transmitted, and the packet header generation unit 8 generates a packet header storing an acknowledgment number that is different from the normal one, and a packet having this abnormality header is transmitted to the communication destination. Will be.
  • FIG. 9 shows the state transition of the TCP protocol specified in RFC793. Accordingly, the operation of the response packet generation sequencer 6 is determined.
  • TCP protocol a connection identified by the source port number and destination port number in the TCP header and the IP address in the IP header is established. This connection is established in three TCP segments: a 3-way handshake, namely SYN (synchronization), ACK (acknowledgement), and SYN + ACK (acknowledgement).
  • SYN synchronization
  • ACK acknowledgenowledgement
  • SYN + ACK acknowledgenowledgement
  • the TCP header includes fields such as a source port number, a destination port number, a sequence number, an acknowledgment number, a code bit (control bit), a window size, a checksum, and an emergency pointer.
  • the 6-bit code bit field of the TCP header has 6 flag bits: URG, ACK, PSH, RST, SYN, and FIN.
  • the meaning of each code bit is as follows.
  • PSH The receiver (receiver) must pass the data to the application as soon as possible.
  • DT segment Regardless of whether the URG bit or RST bit is on or off, there is user data and only the ACK bit is valid.
  • FIN segment FIN bit is on (ACK bit is often on!).
  • RST bit is on (ACK bit is often on!).
  • Events (events) for the TCP protocol include transmission events (transmitted TCP segments) and reception events (received TCP segments). Typical examples and their meanings are as follows.
  • DTZ ACKrecv Received DT segment or ACK segment.
  • SYN—SENT A state in which connection is being established by sending a SYN segment.
  • SYN — RCVD A state in which a SYN segment is received and connection establishment is in progress.
  • ESTABLISHED A state where data can be transferred in both directions.
  • TIME Connection information retention status when connection release is completed.
  • CLOSE Wi-Fi
  • the session search table 2 is searched and the session state is determined.
  • the initial state and the operating state of the response packet generation sequencer 6 are determined by the storage information in the management memory 3 and the setting value in the state setting register 7.
  • the time when the packet is received is stored in the session state management memory 3 as a time stamp and used to determine the packet transmission timing.
  • the processing in the above-described embodiment is provided as a computer-executable program, and can be provided via a recording medium such as a CD-ROM or a flexible disk, and further via a communication line.
  • each process in the above-described embodiment may be performed by selecting and combining any or all of the processes.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

L’invention concerne un émulateur de session au protocole TCP qui comprend une table de recherche de session destinée à chercher un identificateur pour spécifier une session au protocole TCP en utilisant au moins le IP (Protocole Internet) acquis de l’en-tête du paquet reçu ou du numéro de port à titre de clé de recherche, une mémoire de gestion de l’état de session permettant d’acquérir le code de l’état de session fourni selon l’identificateur acquis par la recherche, et un séquenceur destiné à déterminer une opération de pseudo-session au protocole TCP utilisé par un des protocoles d’application au code de l’état de session acquis de la mémoire de gestion de l’état de session.
PCT/JP2005/013164 2005-07-15 2005-07-15 Émulateur de session au protocole tcp WO2007010593A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/JP2005/013164 WO2007010593A1 (fr) 2005-07-15 2005-07-15 Émulateur de session au protocole tcp
JP2007525461A JPWO2007010593A1 (ja) 2005-07-15 2005-07-15 Tcpセッションエミュレーション装置

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/JP2005/013164 WO2007010593A1 (fr) 2005-07-15 2005-07-15 Émulateur de session au protocole tcp

Publications (1)

Publication Number Publication Date
WO2007010593A1 true WO2007010593A1 (fr) 2007-01-25

Family

ID=37668482

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2005/013164 WO2007010593A1 (fr) 2005-07-15 2005-07-15 Émulateur de session au protocole tcp

Country Status (2)

Country Link
JP (1) JPWO2007010593A1 (fr)
WO (1) WO2007010593A1 (fr)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2010020654A (ja) * 2008-07-14 2010-01-28 Mitsubishi Electric Corp 通信再現装置
JP2010157875A (ja) * 2008-12-26 2010-07-15 Fujitsu Ltd 通信端末、ネットワークインタフェースカード及びその方法
JP2011048713A (ja) * 2009-08-28 2011-03-10 Casio Computer Co Ltd 売上データ処理装置、ネットワークシステム及びプログラム
JP2011097423A (ja) * 2009-10-30 2011-05-12 Nippon Telegr & Teleph Corp <Ntt> エラー発生装置および方法

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH05260055A (ja) * 1992-03-16 1993-10-08 Nippondenso Co Ltd 擬似異常信号発生装置
JP2000508848A (ja) * 1996-03-22 2000-07-11 エリクソン インコーポレイテッド Unix開放型システム間相互接続層のテスト
JP2002007232A (ja) * 2000-06-21 2002-01-11 Cybird Co Ltd Wwwサーバーの性能試験方法およびサーバー試験装置
JP2003316666A (ja) * 2002-04-19 2003-11-07 Sony Computer Entertainment Inc スタックのセッション数検証方法、コンピュータに実行させるためのスタックのセッション数検証プログラム、コンピュータに実行させるためのスタックのセッション数検証プログラムを記録したコンピュータ読み取り可能な記録媒体、スタックのセッション数検証システム
JP2004104450A (ja) * 2002-09-09 2004-04-02 Ipsquare Inc 情報処理装置及び情報処理方法
JP2004180185A (ja) * 2002-11-29 2004-06-24 Hitachi Ltd コンピュータシステムのネットワーク評価方法および通信データ発生装置
JP2005513914A (ja) * 2001-12-10 2005-05-12 アパレント・ネットワークス・インコーポレイテッド データ通信ネットワーク上へのテスト・パケット配置方法およびその装置

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH05260055A (ja) * 1992-03-16 1993-10-08 Nippondenso Co Ltd 擬似異常信号発生装置
JP2000508848A (ja) * 1996-03-22 2000-07-11 エリクソン インコーポレイテッド Unix開放型システム間相互接続層のテスト
JP2002007232A (ja) * 2000-06-21 2002-01-11 Cybird Co Ltd Wwwサーバーの性能試験方法およびサーバー試験装置
JP2005513914A (ja) * 2001-12-10 2005-05-12 アパレント・ネットワークス・インコーポレイテッド データ通信ネットワーク上へのテスト・パケット配置方法およびその装置
JP2003316666A (ja) * 2002-04-19 2003-11-07 Sony Computer Entertainment Inc スタックのセッション数検証方法、コンピュータに実行させるためのスタックのセッション数検証プログラム、コンピュータに実行させるためのスタックのセッション数検証プログラムを記録したコンピュータ読み取り可能な記録媒体、スタックのセッション数検証システム
JP2004104450A (ja) * 2002-09-09 2004-04-02 Ipsquare Inc 情報処理装置及び情報処理方法
JP2004180185A (ja) * 2002-11-29 2004-06-24 Hitachi Ltd コンピュータシステムのネットワーク評価方法および通信データ発生装置

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2010020654A (ja) * 2008-07-14 2010-01-28 Mitsubishi Electric Corp 通信再現装置
JP2010157875A (ja) * 2008-12-26 2010-07-15 Fujitsu Ltd 通信端末、ネットワークインタフェースカード及びその方法
JP2011048713A (ja) * 2009-08-28 2011-03-10 Casio Computer Co Ltd 売上データ処理装置、ネットワークシステム及びプログラム
JP2011097423A (ja) * 2009-10-30 2011-05-12 Nippon Telegr & Teleph Corp <Ntt> エラー発生装置および方法

Also Published As

Publication number Publication date
JPWO2007010593A1 (ja) 2009-01-29

Similar Documents

Publication Publication Date Title
US8649395B2 (en) Protocol stack using shared memory
JP5270901B2 (ja) ネットワーク試験装置及び方法
Billington et al. A Coloured Petri net approach to protocol verification
US7523198B2 (en) Integrated testing approach for publish/subscribe network systems
US7856020B2 (en) TCP receiver acceleration
US6981180B1 (en) Method and apparatus for testing request-response service using live connection traffic
US20230046221A1 (en) Computational accelerator for storage operations
EP1437877A2 (fr) Méthode et dispositif pour l&#39;implémentation sur hardware de la vérification indépendante des couches de réseau
US20080002578A1 (en) Network with a constrained usage model supporting remote direct memory access
US20070291759A1 (en) Apparatus and method of splitting a data stream over multiple transport control protocol/internet protocol (tcp/ip) connections
US7573829B2 (en) Method and apparatus for low overhead network protocol performance assessment
US20090037587A1 (en) Communication system, communication apparatus, communication method, and program
US9218266B2 (en) Systems and methods for replication of test results in a network environment
JP2007538444A (ja) ファイアウォール・システム
US7313635B1 (en) Method and apparatus for simulating a load on an application server in a network
JP5157586B2 (ja) エミュレータ装置
WO2007010593A1 (fr) Émulateur de session au protocole tcp
JP3569149B2 (ja) 通信制御装置
Griffin Testing protocol implementation robustness
CN106385409B (zh) 一种tcp报文的处理方法及装置
Kato et al. Intelligent protocol analyzer with TCP behavior emulation for interoperability testing of TCP/IP protocols
Ridge et al. TCP, UDP, and Sockets: Volume 3: The Service-level Specification
Billington et al. Parameterised coloured Petri net channel models
EP3890278B1 (fr) Prévention de fuite de données
Mesotten MPAIOQUIC: On the design and implementation of MultiPath in QUIC

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 2007525461

Country of ref document: JP

NENP Non-entry into the national phase

Ref country code: DE

WWW Wipo information: withdrawn in national office

Country of ref document: DE

122 Ep: pct application non-entry in european phase

Ref document number: 05766385

Country of ref document: EP

Kind code of ref document: A1