WO2013117154A1 - 穿越监控网络中隔离设备的方法和设备 - Google Patents
穿越监控网络中隔离设备的方法和设备 Download PDFInfo
- Publication number
- WO2013117154A1 WO2013117154A1 PCT/CN2013/071395 CN2013071395W WO2013117154A1 WO 2013117154 A1 WO2013117154 A1 WO 2013117154A1 CN 2013071395 W CN2013071395 W CN 2013071395W WO 2013117154 A1 WO2013117154 A1 WO 2013117154A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- monitoring
- tunnel
- address
- packet
- end device
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/029—Firewall traversal, e.g. tunnelling or, creating pinholes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
- H04L67/025—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/18—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
Definitions
- the present invention relates to the field of video surveillance, and in particular, to a method and a node for traversing and assisting to traverse a network isolation device in an IP monitoring system.
- BACKGROUND OF THE INVENTION Video surveillance based on IP networks has gradually developed into a mainstream solution for the security industry, and has been successfully applied to large projects such as security projects, highways, public security networks, and parks.
- the standardization and openness of IP also makes it easy to integrate individual network islands and make network scale expansion easier.
- devices such as NAT, firewall, and security isolation gatekeepers are widely used in large networks.
- the source IP address or destination IP address of the IP packet changes after the IP packet passes through the NAT device.
- the internal signaling address and destination IP address are also included in a service signaling.
- the external address is not uniform, which often causes troubles in the video surveillance business process.
- the device on the NAT external network first initiates a TCP/UDP connection to the internal network, it must first configure the address/port mapping of the internal server for those devices on the internal network on the NAT device, which obviously wastes a lot of public information. The network address is often not allowed.
- the control server can determine that the two devices in the interaction are in the intranet of the NAT, the device on the intranet can be notified to initiate the connection to the external device. But this requires that each session connection implements two or more than two processes, for one that contains multiple session behaviors. This combination of business processes can become very complicated. Moreover, some standard services do not allow the parties to the interaction to reverse the role of the C/S.
- firewall In the presence of a firewall, the firewall needs to open a considerable number of UDP/TCP ports so that terminals outside the firewall, such as video surveillance clients, can actively access servers within the firewall, such as video management servers (VMs). This brings security risks to the enterprise intranet.
- VMs video management servers
- the present invention provides a method for traversing a network isolation device in an IP monitoring system and a monitoring node corresponding to the method.
- the monitoring node is located on the inner network of the network isolation device, and the monitoring system includes a plurality of monitoring nodes and a tunnel server, where the plurality of monitoring nodes include a monitoring front-end device, a monitoring back-end device, and at least one monitoring server;
- the at least one monitoring server is a video management server VM, and the monitoring node includes a tunnel processing unit, a signaling processing unit, and a network interface unit; wherein the tunnel processing unit, where:
- a network interface unit configured to send and receive messages on an IP network
- a signaling processing unit configured to process monitoring signaling data
- a tunnel processing unit configured to use a first IP address of the monitoring node to initiate a tunnel connection request to the tunnel server to establish a tunnel connection with the tunnel server; and obtain a second IP address allocated by the tunnel server from the tunnel server after the tunnel connection is established;
- the tunnel processing unit further decapsulates the tunnel packet received by the network interface unit from the tunnel server to obtain an inner layer IP packet whose content is monitoring signaling data, and submits the monitoring signaling data to the signaling processing unit.
- the inner IP packet is the outer monitoring section of the network isolation device.
- the destination address of the tunnel packet is the first IP address, and the source address of the tunnel packet is the IP address of the tunnel server itself.
- the destination address of the inner layer IP packet is the number. a second IP address, where the source IP address is an IP address of the outer monitoring node;
- the tunnel processing unit is further configured to encapsulate the monitoring signaling data generated by the monitoring node signaling processing unit into the inner layer IP packet, and then encapsulate the inner layer IP packet into the tunnel packet and send the network signaling to the network interface.
- the unit is sent by the network interface unit to the tunnel server, and the tunnel server forwards the inner layer IP packet to the monitoring node of the network outside the network isolation device, where the source address of the inner layer IP packet is the second IP address, and the inner layer
- the destination address of the packet is the IP address of the external network monitoring node.
- the source address of the tunnel packet is the IP address of the monitoring node itself.
- the destination address of the tunnel packet is the IP address of the tunnel server itself.
- FIG. 1 is a schematic diagram of a network of Embodiment 1;
- FIG. 2 is a schematic diagram of a network in Embodiment 2;
- FIG. 3 is a schematic diagram of a network of Embodiment 3;
- FIG. 4 is a schematic diagram of a network of Embodiment 4.
- Embodiment 4a is another network diagram of Embodiment 4.
- 5 is a basic hardware architecture of a monitoring node or an L2TP relay device of the present invention.
- FIG. 6 is a logical structural diagram of a monitoring node or an L2TP relay device of the present invention.
- FIG. 7 is a network diagram of an IP monitoring system that traverses an isolation device through an L2TP tunnel
- FIG. 8 is a network diagram of another IP monitoring system that traverses an isolation device through an L2TP tunnel
- FIG. 9 is a flowchart of a process for saving bandwidth of a wide area network in an embodiment of the present invention.
- the first monitoring node on the network inside the network isolation device acts as the LAC and uses its first IP address to initiate the tunnel server (such as the LNS server, also known as the L2TP relay).
- a tunnel connection request to establish an L2TP tunnel connection with the tunnel server is described by taking the L2TP implementation as an example.
- IETF Internet Engineering Task Force
- the first monitoring node acquires the second IP address allocated by the L2TP trunk from the L2TP relay.
- the first monitoring node receives the tunnel packet from the L2TP relay and decapsulates the tunnel packet to obtain an inner layer IP packet whose content is the monitoring signaling data.
- the inner layer IP packet is sent by the network monitoring node outside the network isolation device.
- the source address of the tunnel packet is the IP address of the L2TP relay itself.
- the source address of the tunnel packet is the IP address of the L2TP relay.
- the destination address of the inner layer IP packet is the second IP address, and the source address is the IP address of the outer network monitoring node; the first monitoring node obtains monitoring signaling data from the inner layer IP packet and performs corresponding signaling.
- the first monitoring node encapsulates the generated monitoring signaling data into the inner layer IP packet, and then encapsulates the inner layer IP packet into the tunnel packet and sends the packet to the L2TP relay, and the inner layer IP is used by the L2TP relay.
- the packet is forwarded to the monitoring node of the network outside the network isolation device, where the source IP address of the inner layer packet is the second IP address, and the destination address of the inner layer packet is the IP address of the outer network monitoring node.
- the source address is the IP address of the first monitoring node itself, and the destination address of the tunnel packet is the IP address of the L2TP relay itself.
- the first monitoring node may also receive the tunnel packet from the L2TP relay and decapsulate the tunnel packet to obtain an inner layer IP packet whose content is the monitoring service data.
- the inner layer IP packet is the network monitoring node outside the network isolation device.
- the monitoring service data packet is sent, the destination address of the tunnel packet is the first IP address, and the source address of the tunnel packet is the IP address of the L2TP relay itself; the inner layer IP packet
- the destination address of the text is the second IP address, and the source address is the IP address of the outer network monitoring node; or
- the first monitoring node also encapsulates the generated monitoring service data into the inner layer IP packet, and then encapsulates the inner layer IP packet into the tunnel packet and sends the packet to the L2TP relay, and the L2TP relays the inner layer IP packet.
- the monitoring node forwarded to the network outside the network isolation device, where the source IP address of the inner layer packet is the second IP address, and the destination address of the inner layer packet is the IP address of the outer network monitoring node, and the source of the tunnel packet The address is the IP address of the first monitoring node.
- the destination address of the tunnel packet is the IP address of the L2TP trunk itself.
- the first monitoring node is a VM
- the VM receives the monitoring signaling data encapsulated in the tunnel packet sent by the L2TP tunnel through the L2TP tunnel, and the monitoring signaling data is sent by the EC or the VC.
- the L2TP trunk acts as the LNS receiving network isolation device and the L2TP tunnel connection request is sent by the first monitoring node of the LAC as its first IP address.
- the first monitoring node is assigned a second IP address; the tunneling packet is received from the first monitoring node, and the tunnel packet is decapsulated to obtain an inner layer IP packet, the inner layer IP packet. It is the monitoring signaling data or service data sent by the first monitoring node to the monitoring node outside the network isolation device.
- the source address of the tunnel packet is the first IP address of the first monitoring node, and the destination address is the IP address of the L2TP relay itself.
- the destination address of the inner IP packet is the IP address of the monitoring node on the outside of the network isolation device, and the source address is the second IP address.
- the packet is forwarded to the outside of the network isolation device according to the destination address of the inner IP packet.
- Monitoring node monitoring signaling data sent by the monitoring node outside the network isolation device or monitoring service data I
- the P packet is encapsulated and sent to the first monitoring node, where the destination address of the IP packet is the second IP address, the source IP address is the IP address of the outer network monitoring node, and the destination IP address of the encapsulated tunnel packet.
- the address is the first IP address
- the source address of the tunnel packet is the IP address of the L2TP relay itself.
- the second IP address belongs to the IP address planned in the network outside the network isolation device allocated by the L2TP trunk. Or the second IP address belongs to an independently planned IP address of the L2TP relay itself, in the L2TP
- An L2TP tunnel connection is established between the outer monitoring node and the outer monitoring node.
- the IP packet sent by the outer monitoring node is an inner layer IP packet encapsulated in the tunnel, and the L2TP relay decapsulates the tunnel packet sent by the outer monitoring node.
- Layer IP packet the source IP address of the inner layer packet is the IP address allocated by the outer monitoring node through the L2TP relay, and the destination address is the second IP address assigned by the first monitoring node, and the network is isolated from the outer network of the device.
- the monitoring node includes a VM and an MS.
- the L2TP relay is an MS outside the network isolation device.
- Monitoring front-end devices such as IPC (IP Camera) or EC (Encoder), followed by EC as an example.
- Monitor back-end devices such as VC (Video Cl ient, monitoring client).
- the VM is a video management server
- the DM is a data management server
- the MS is a media exchange server
- the IPSAN is an IP storage server.
- the tunnel server uses an LNS as an example. In the present invention, it is also referred to as an L2TP relay because it also needs to perform packet forwarding. jobs.
- the IP monitoring system includes multiple monitoring nodes.
- the monitoring node ECU is isolated from the other network by the network isolation device.
- the network isolation device can be a NAT, a firewall or a gatekeeper.
- the network where the monitoring node ECU is located in the monitoring system is a network inside the network isolation device, called network A, which is isolated or protected by the network isolation device.
- the network outside the network isolation device is called network B. Due to the existence of the network isolation device, Network A can access Network B at any time, and Network B cannot access Network A without the special configuration of the isolation device.
- the IP monitoring system further includes an L2TP relay device 14.
- the IP address obtained by the monitoring node EC11 from network A ( 10. 10. 10. 0/24 ) is 10. 10. 10. 10.
- the IP address of the L2TP relay device 14 is 12. 12. 10. 10. This address belongs to the public network address from the perspective of network A, that is, network A can directly access; if the address cannot be directly accessed, it can be in this Configure the corresponding public network address of the static mapping on the isolation device of the network egress.
- the monitoring node EC11 acts as the LAC, using its own IP address 10. 10. 10. 10 as the LNS
- the L2TP relay 14 initiates a tunnel connection request to establish an L2TP tunnel connection with the L2TP relay.
- L2TP After receiving the tunnel connection request, the tunnel connection is established with the monitoring node EC11, and the address in the address pool is allocated to the EC11.
- the address in the L2TP trunk 14 address pool belongs to the IP address planned by Network B, but it is different from the IP address of the device already existing on Network B.
- the IP address in the address pool of the L2TP trunk 14 belongs to 12. 12. 11. 0/24, and the IP address assigned to the EC11 is 12. 12. 11. 10.
- the ECU obtains the IP address assigned by the L2TP trunk 14 12. 12. 11. 10, the IP address can be used when communicating with the monitoring node in network B.
- the registration message is tunnel encapsulated.
- the IP address of VM13 is 12. 12. 12. 10, which belongs to the network 12. 12. 12. 0/24.
- the EC11 encapsulates the monitoring signaling data, that is, the content of the registration packet into the inner layer IP packet, and then encapsulates the inner layer IP packet into the tunnel packet and sends the packet to the L2TP relay 14, wherein the inner layer IP packet
- the source address is 12. 12. 11. 10, and the destination address is the IP address of VM13 12. 12. 12.
- the source address of the tunnel message is the IP address of EC11 itself 10. 10. 10. 10, destination address The IP address of the L2TP trunk 14 is 12. 12. 10. 10.
- the L2TP relay 14 After receiving the tunnel packet sent by the monitoring node EC11, the L2TP relay 14 decapsulates the tunnel packet to obtain an inner layer IP packet. The L2TP relay 14 routes the inner layer IP packet according to its destination IP address according to its saved routing information.
- the routing information of the L2TP trunk in this example is shown in Table 1:
- the L2TP relay 14 sends the message from the Interface2 interface according to the destination IP address 12. 12. 12.10.
- the registration message of the monitoring node EC11 in the network A is finally routed to the VM13 in the network B.
- the VM 13 processes the registration message:
- the related information of the EC11 is locally saved.
- the VM 13 instructs the EC11 to send the monitoring video stream, and the monitoring signaling data is encapsulated into an IP packet that is routed to the L2TP relay 14,
- the L2TP relay 14 tunnels the IP packet sent by the VM 13 to the EC11.
- the destination address of the IP packet is the IP address assigned by the EC11. 12. 12. 11.
- the source address is the IP address of the VM13. 12. 12. 10.
- the destination IP address of the encapsulated tunnel packet is the IP address of the EC11 itself 10.
- the tunnel source IP address is the IP address of the L2TP relay 14 12. 12. 10. 10 .
- the ECU receives the tunnel packet from the L2TP relay and decapsulates the tunnel packet to obtain the inner layer IP packet.
- the EC11 obtains monitoring signaling data from the inner IP packet and performs corresponding signaling processing.
- the ECU sends the monitoring service data to the corresponding monitoring node according to the indication of the monitoring signaling.
- the EC11 sends monitoring service data through the tunnel according to its own routing table or directly sends the monitoring service data without passing through the tunnel.
- the ECU When the ECU sends the monitoring service data through the tunnel, the EC11 encapsulates the corresponding monitoring service data into the inner IP packet, and then encapsulates the inner IP packet into the tunnel packet and sends it to the L2TP relay 14, where
- the source IP address of the inner IP packet is the IP address assigned by the ECU. 12. 12. 11. 10,
- the destination address is the monitoring node receiving the monitoring service data, such as the IP address of the VC or MS.
- the monitoring node can be in any network. Including, but not limited to, network A or network B, for example, VC12 in the A network and VC15 in the network B in FIG. 1; the source address of the tunnel message is the IP address of the EC11 itself 10. 10. 10. 10. 10
- the destination address is the IP address of the L2TP relay 14.
- the L2TP relay 14 receives the tunnel packet from the EC11 and decapsulates the tunnel packet to obtain an inner layer IP packet.
- the L2TP relay 14 sends the packet according to the destination IP address
- VC12 on network A requests video traffic on EC11
- VC12 registers on VM13.
- the registration process is the same as EC11.
- the VC12 first establishes an L2TP tunnel with the L2TP relay 14.
- the on-demand monitoring signaling is first sent to the VM 13 through the L2TP tunnel between the VC12 and the L2TP relay 14, and the monitoring service data sent by the subsequent EC11 passes through the tunnel between the EC11 and the L2TP relay 14.
- VC15 in network B requests video traffic on EC11
- VC15 registers on VM13.
- the on-demand monitoring signaling is directly sent to the VM13.
- the monitoring service data sent by the subsequent EC11 may directly reach the VC15 without passing through the tunnel between the EC11 and the L2TP relay 14, or may reach the L2TP relay 14 through the tunnel between the EC11 and the L2TP relay 14, and then the L2TP relay 14 Sent to VC15.
- the MS can act as an L2TP relay 14 if the network B in the IP monitoring system has an MS forwarding device.
- the VM 13 instructs the ECU to transmit the video service data to the MS acting as the L2TP relay 14, and then the MS forwards the video service data according to the address of the on-demand VC.
- FIG. 2 differs from FIG. 1 in that the monitoring node VM23 in the network B itself also acts as
- the LAC initiates a tunnel connection request to the L2TP relay 24 as the LNS to establish an L2TP tunnel connection with the L2TP relay 24, and the network B also includes an MS26.
- the MS 26 also acts as the LAC to initiate a tunnel connection request and L2TP to the L2TP relay 24 as the LNS.
- the relay 24 establishes an L2TP tunnel connection.
- the monitoring node EC21 in the network A acts as the LAC to initiate a tunnel connection request to the L2TP relay 24 as the LNS and establishes an L2TP tunnel connection with the L2TP relay 24.
- the IP address assigned by the L2TP trunk 24 to the monitoring nodes EC21, VM23, and MS26 can be an IP address in an independent address pool.
- the IP address in the address pool can be separately planned with an IP address segment, and does not need to occupy the IP of the network B plan.
- Address such as 14. 14. 14. 0/24, 15. 15. 10. 0/24 and so on.
- the communication process of the monitoring node in Figure 2 is described by taking 14. 14. 14. 0/24 as an example.
- the EC 21 functions as the LAC, and initiates a tunnel connection request to the L2TP relay 24 as the LNS with its own IP address 10. 10. 10. 10 to establish an L2TP tunnel connection with the L2TP relay 24.
- the L2TP relay 24 After receiving the tunnel connection request, the L2TP relay 24 establishes a tunnel connection with the monitoring node EC21, and allocates the address 14. 14. 14. 10 in the address pool to the EC21.
- the VM 23 initiates a tunnel connection request to the L2TP relay 24 with its own IP address 12.12.12 to establish an L2TP tunnel connection with the L2TP relay 24. After receiving the tunnel connection request, the L2TP relay 24 establishes a tunnel connection with the monitoring node VM23, and assigns the address 14. 14. 14.
- the MS 26 initiates a tunnel to the L2TP relay 24.
- the connection request is obtained, and the assigned IP address is obtained. 14. 14. 14. 14
- the registration message is tunnel encapsulated.
- the EC21 encapsulates the monitoring signaling data, that is, the content of the registration packet into the inner IP packet, and then encapsulates the inner IP packet into the tunnel packet and sends it to the L2TP relay.
- 24 L2TP relay 24 from the monitoring node EC21 After receiving the tunnel packet, the tunnel packet is decapsulated to obtain an inner layer IP packet.
- the L2TP relay 24 routes the inner layer IP packet according to its destination IP address according to its saved routing information.
- the routing information of the L2TP trunk in this example is shown in Table 2:
- the L2TP trunk 24 is based on the destination IP address. 14. 14. 14. 12
- the packet is encapsulated and sent from the L2TP-VT1:2 interface.
- the L2TP trunk 24 has the source address of 14. 14. 14. 10
- the inner IP packet whose destination address is 14. 14. 14. 12 is tunnel encapsulated.
- the source IP address of the tunnel packet is the IP address of the L2TP relay 24 itself. Address 12. 12. 10.
- the destination IP address of the tunnel message is VM23's own IP address 12. 12. 12. 10.
- the encapsulated tunnel packet reaches the VM23 through the tunnel between the L2TP relay 24 and the VM23.
- the VM23 decapsulates the packet to obtain the inner IP packet, and saves the EC registration information locally.
- the VM23 instructs the EC21 to send the monitoring video data of the monitoring video stream into an IP packet and encapsulates it into a tunnel message and sends it to the L2TP via a tunnel between the VM23 and the L2TP relay 24.
- the source IP address of the inner layer IP packet of the monitoring signaling data is 14. 14. 14. 12, and the destination IP address is 14. 14. 14. 10 ; the source IP address of the tunnel packet is VM23 itself. IP address 12. 12. 12. 10, the destination IP address of the tunnel packet is 12. 12. 10. 10.
- the L2TP relay 24 decapsulates the inner layer IP packet, and encapsulates the inner layer packet according to the inner layer destination IP address 14. 14. 14. 14.
- the tunnel between the EC21 and the EC21 is sent to the EC21.
- the source IP address of the tunnel is the IP address of the L2TP trunk 24 itself 12. 12. 10.
- the destination IP address is the IP address of the EC21 itself 10. 10. 10. 10 ⁇ EC21 Receive
- the tunnel packet is decapsulated and the inner packet IP packet is obtained.
- the EC21 obtains monitoring signaling data from the inner layer IP packet and performs corresponding signaling processing.
- the monitoring signaling data instructs the EC 21 to transmit monitoring service data to the MS 26.
- the VM 23 instructs the MS 26 to receive the monitoring service data transmitted by the EC 21, and further transmits the monitoring service data to the VC.
- the EC21 sends the monitoring service data to the L2TP relay 24 through the tunnel between the self and the L2TP relay 24.
- the monitoring service data is encapsulated by the tunnel.
- the source address of the inner IP packet is the IP address assigned by the EC21. 14.
- the destination address is the address of the MS26 that receives the monitoring service data. 14. 14. 14.
- the source address of the encapsulated tunnel message is the IP address of the EC21 itself 10. 10. 10. 10, the destination address is IP address of the L2TP relay 24.
- the L2TP relay 24 receives the tunnel packet from the EC21 and decapsulates the tunnel packet to obtain the inner layer IP packet, and tunnels the packet according to the inner layer destination IP address, from between the L2TP relay 24 and the MS26.
- the tunnel is sent to the MS26.
- the tunnel encapsulation method is the same as the previous one and will not be described again.
- the MS26 decapsulates the packet to obtain the monitoring service data packet.
- the MS26 sends the monitoring service data to the corresponding VC according to the indication of VM23 and its own routing table, such as VC25.
- the VM 23 instructs the EC 21 to transmit the video service data to the MS 26, and the MS 26 forwards the video service data according to the address of the on-demand VC.
- VC22 in network A requests video traffic on EC21
- VC22 first registers on VM23. The registration process is the same as the EC21 registration process.
- An L2TP tunnel is established between the VC 22 and the MS 26 acting as an L2TP relay.
- the on-demand monitoring signaling is first sent to the VM23 through the L2TP tunnel between the VC22 and the MS26 and the L2TP tunnel between the MS26 and the VM23.
- the encapsulation mode of the tunnel packet and the registration of the EC21 to the VM23 are performed.
- the registration message is encapsulated in the same way.
- the monitoring service data sent by the subsequent EC21 reaches the MS26 through the tunnel between EC21 and MS26. After that, it will be sent to VC22 through the tunnel between VC22 and MS26.
- the IP monitoring system includes a monitoring node VM31, which is isolated from another network by the network isolation device.
- the network where VM31 is located is the network inside the network isolation device, which is called network A, and the network outside the network isolation device is called network B. Due to the existence of the network isolation device, Network B cannot access Network A without special configuration.
- the IP surveillance system also includes an L2TP relay device 33.
- the IP address of the monitoring node VM31 is 10. 10. 10.
- the IP address of the L2TP relay device 33 is 12. 12. 10. 10.
- the monitoring node VM31 needs to communicate with another monitoring node in network B, such as EC36, VC37 o
- the monitoring node VM31 initiates a tunnel connection request to the L2TP relay 33 to establish an L2TP tunnel connection.
- the L2TP trunk 33 After receiving the tunnel connection request, the L2TP trunk 33 establishes a tunnel connection with the monitoring node VM31 and allocates the address in the address pool to the VM 31.
- the address in the L2TP trunk 33 address pool belongs to the IP address planned by network B.
- the IP address assigned to the VM31 by the L2TP trunk 33 is 12. 12. 11. 10.
- the IP address will be known by EC36, VC37 in network B to enable them to register with VM31.
- the EC36 sends a registration message.
- the destination IP address of the packet is the IP address assigned by VM31. 12. 11. 11. 10, the packet will be routed to the L2TP relay 33, and the L2TP relay 33 tunnels the registration packet.
- Encapsulation that is, the registration packet is encapsulated into the inner IP packet, and then the inner IP packet is encapsulated into the tunnel packet and sent to the VM31, where the destination address of the inner packet is the IP address of the VM31 12.12 11.
- the source address is the address of the EC36 itself, such as 12. 12. 12. 16;
- the source address of the tunnel message is the IP address of the L2TP trunk 33 itself 12. 12. 10.
- the tunnel destination address is VM31's own IP address 10. 10. 10. 10.
- the VM31 decapsulates the tunnel packet to obtain an inner layer IP packet.
- the VM 31 saves the information about the EC36 obtained after decapsulation locally.
- the process of registering VC37 with VM31 is the same as the process of registering with EC36.
- the registration message with the destination address of 10. 10. 10. 10 is directly sent to the VM31. Booklet.
- the monitoring node MS32 in network A establishes an L2TP tunnel connection with the L2TP trunk 33 as the VM31, and obtains the IP address assigned by the L2TP trunk 33.
- the EC34 and VC35 in Network A do not need to establish an L2TP tunnel separately from the L2TP trunk 33. If MS32 does not exist in network A, EC34 and VC35 establish an L2 tunnel with L2TP trunk 32.
- the VC37 on-demand monitoring signaling packet is sent to the VM 31 as the EC36 registration message.
- the indication of the VM31 The EC34 sends the monitoring signaling packet of the monitoring video stream to the EC34 with the IP address of the EC34 10. 10. 10. 8 The IP address is directly sent to the EC34 in the network A.
- the monitoring signaling message instructs the EC to send monitoring service data to the MS32.
- the EC34 sends the monitoring service data to the MS32 according to the indication of the monitoring signaling.
- the VM 31 instructs the MS 32 to send the monitoring service data to the VC 37.
- the MS32 sends monitoring service data through the tunnel according to its own routing table or directly sends the monitoring service data without passing through the tunnel.
- the method for sending the monitoring service data through the tunnel (the MS32 has established the L2TP tunnel with the L2TP trunk 33) is the same as that of the first embodiment, and is not described here. If there is no MS32 in the network A, the EC34 sends the monitoring service data through the tunnel according to its own routing table or directly sends the monitoring service data without passing through the tunnel.
- the VC35 When the VC35 broadcasts video traffic of the EC36, the VC35 sends the video-on-demand message to the destination IP address of the VM31 with its own IP address 10. 10. 10. 6 as the source IP address.
- the VM 31 After receiving the on-demand message, the VM 31 sends a monitoring signaling message indicating that the EC 36 sends the monitoring video stream to the EC 36.
- the monitoring signaling data can be sent through the tunnel or not through the tunnel, which is mainly determined by the routing table of the VM.
- the monitoring signaling message instructs the EC 36 to send monitoring service data to the MS32.
- the EC36 After receiving the monitoring signaling message, the EC36 routes the corresponding monitoring video data to the L2TP relay 33.
- the L2TP relay 33 tunnels the monitoring service data packet according to the destination IP address.
- the encapsulated tunnel message is sent to the MS32 through a tunnel between the L2TP relay 33 and the MS32.
- the MS32 decapsulates the tunnel packet to obtain an inner layer packet.
- MS32 sends the message to VC35 according to the instructions of VM31. o If L2TP trunk 33 is used by a router or other network device alone, This association is relatively high, so it can be
- the monitoring node VM48 in the network B initiates a tunnel connection request to the L2TP trunk 43 to establish an L2TP tunnel connection with the L2TP trunk 43.
- the network B also includes an MS49, and the MS49 also The L2TP trunk 43 initiates a tunnel connection request to establish an L2TP tunnel connection with the L2TP trunk 43.
- the monitoring node VM41 in network A also initiates a tunnel connection request to the L2TP trunk 43 and establishes an L2TP tunnel connection with the L2TP trunk 43.
- the IP address assigned by the L2TP trunk 43 to the monitoring nodes VM41, VM48, and MS49 may be an IP address in an independent address pool, that is, an IP address in the address pool may be separately planned for an IP address segment, and is not required. Occupies the IP address of the network B plan, such as 14. 14. 14. 0/24, 15. 15. 10. 0/24 and so on.
- Figure 4 is a secondary domain with two administrative domains.
- VM41, MS42, EC44, and VC45 form a monitoring domain X
- VM48, MS49, EC46, and VC47 form another monitoring domain Y.
- the monitoring management domain X is a subordinate domain
- the superordinate domain is a superordinate domain.
- the EC44, the VC45, and the MS42 are sent to the VM41.
- the registration message does not need to go through the tunnel.
- the IP address of the VM41 is directly transmitted with the IP address 10.10.10, and the VM41 saves the registration information.
- the EC46, the VC47, and the MS49 are sent to the VM48.
- the registration message does not need to go through the tunnel, and the IP address of the VM48 is directly transmitted with the IP address 12.1.2.10, and the VM48 stores the registration information.
- the VM 41 registers with the VM 48, and the VM 41 initiates a tunnel connection request to the L2TP relay 43 with its own IP address 10. 10. 10. 10 to establish an L2TP tunnel connection with the L2TP relay 43.
- the L2TP trunk 43 After receiving the tunnel connection request, the L2TP trunk 43 establishes a tunnel connection with the monitoring node VM41, and allocates the address 14. 14. 14. 10/24 in the address pool to the VM 41.
- the VM 48 initiates a tunnel connection request to the L2TP relay 43 with its own IP address 12.12.10 to establish an L2TP tunnel connection with the L2TP relay 43.
- the L2TP trunk 43 After receiving the tunnel connection request, the L2TP trunk 43 establishes a tunnel connection with the monitoring node VM48, and allocates the address 14. 14. 14. 12/24 in the address pool to the VM 48. Similarly, the MS 42 initiates a tunnel connection request to the L2TP trunk 43 to obtain the assigned IP address. 14. 14. 14. 14 o The MS 39 initiates a tunnel connection request to the L2TP relay 43 to obtain the assigned IP address 14. 14. 14 . 15.
- VC45 When VC in network A requests video traffic in network B, such as VC45 on-demand EC46 monitoring video data, VC45 directly sends an on-demand request to VM41 in network A, and the request is encapsulated into an inner layer IP packet, and then The inner IP packet is encapsulated into a tunnel packet and sent to the L2TP relay 24, where the source IP address of the inner IP packet is 14. 14. 14. 10, and the IP address assigned to the VM48 is 14 14. 14. 12 ;
- the source address of the tunnel message is the IP address of the VM41 itself 10. 10. 10. 10, the destination address is the IP address of the L2TP relay 43 12. 12. 10. 10 L2TP relay 43 receiving After the tunnel packet is received, the tunnel packet is decapsulated to obtain an inner layer IP packet.
- the L2TP relay 44 routes the inner layer IP packet according to its destination IP address according to its saved routing information.
- the routing information of the L2TP trunk 43 in this example is shown in Table 3:
- the L2TP relay 24 determines that the registration message needs to be tunnel encapsulated according to the destination IP address 14. 14. 14. 12 and is sent from the L2TP-VT1:2 interface.
- the L2TP trunk 43 has the source address of 14. 14. 14. 10
- the inner IP packet whose destination address is 14. 14. 14. 12 is tunnel encapsulated.
- the source IP address of the tunnel packet is the IP address of the L2TP trunk 43 itself. Address 12. 12. 10.
- the destination IP address of the tunnel message is VM23's own IP address 12. 12. 12. 10.
- the encapsulated tunnel packet reaches the VM48 through the tunnel between the L2TP relay 43 and the VM48.
- the VM48 decapsulates the packet to obtain the inner IP packet.
- the VM48 notifies the EC46 to send the monitoring video service data to the MS49 MS49, and then tunnels the packet to the L2TP relay 43 through the tunnel between the MS49 and the L2TP relay 43.
- the L2TP relay 43 decapsulates the tunnel packet. Judging that it needs to be sent through the tunnel again, and then monitoring the The service data is encapsulated by the tunnel and sent to the MS42 through the tunnel between the L2TP trunk 43 and the MS42, and the MS42 is forwarded to the VC45.
- the process of monitoring service data forwarding through two tunnels is similar to the process of the foregoing monitoring signaling or monitoring data being forwarded through two tunnels.
- the processing flow of the VC47 on-demand EC44 is similar to the processing flow of the VC45 on-demand EC46, and will not be described here. If the L2TP trunk 43 is used by a router or other network device alone, the cost will be relatively high. Therefore, in the fourth embodiment, MS49 acts as an L2TP trunk, which is a better implementation method, as shown in Fig. 4a.
- the video surveillance service processing process refers to the previous article.
- the foregoing four embodiments all use video live on-demand as an example to illustrate an IP surveillance system with network isolation devices, and how the monitoring nodes on both sides of the network isolation device communicate.
- Monitoring service data storage that is, the IP monitoring system includes a DM and a storage device.
- the monitoring nodes on both sides of the network isolation device can perform the required communication by referring to the video live on-demand process.
- FIG. 5 is a general basic hardware architecture of the above various nodes or devices, and each device slightly differs in service hardware.
- L2TP relay may not need business hardware.
- MS may have business hardware.
- VM may not have business hardware.
- Figure 6 is a general logical block diagram of each of the above nodes or devices, which is typically implemented by means of a computer program.
- the logical structure of each device may be slightly different. For example, if the device where the L2TP trunk is located does not involve service processing, there may be no service and signaling processing unit.
- the VM belongs to the management server, which usually does not include a business processing unit.
- the general logical structure shown in Figure 6 includes: a tunnel processing unit, a signaling processing unit, a service processing unit, and a network interface unit.
- the tunnel processing unit includes a connection processing subunit and a message processing subunit.
- the signaling processing unit and the service processing unit are respectively configured to process signaling data and service data.
- the network interface unit is responsible for sending and receiving messages.
- the connection processing subunit is mainly used to handle the maintenance of establishing L2TP tunnel connections and tunnel connections.
- the main user of the packet processing sub-unit encapsulates and decapsulates the packet.
- a monitoring node traversing a network isolation device in an IP monitoring system of the present invention includes a tunnel processing unit, a signaling processing unit, and a network interface unit; wherein the tunnel The unit includes a connection processing subunit and a message processing subunit: a network interface unit, for
- the relay establishes an L2TP tunnel connection. After the L2TP tunnel connection is established, the L2TP relay obtains the second IP address from the L2TP relay.
- the packet processing subunit is configured to perform the tunnel packet received by the network interface unit from the L2TP relay.
- the inner layer IP packet whose content is the monitoring signaling data, and submitting the monitoring signaling data to the signaling processing unit; wherein the inner layer IP packet is a packet sent by the monitoring node outside the network isolation device,
- the destination address of the tunnel packet is the first IP address
- the source address of the tunnel packet is the IP address of the L2TP relay itself.
- the destination IP address of the inner IP packet is the second IP address
- the source IP address is the outer address.
- the message processing subunit is further configured to encapsulate the monitoring signaling data generated by the monitoring node signaling processing unit into the inner layer IP packet And then the inner layer IP packet is encapsulated into a tunnel message and sent to the network interface unit, and sent by the network interface unit to the L2TP relay, and the L2TP relay forwards the inner layer IP packet to the monitoring node of the network outside the network isolation device.
- the source address of the inner layer IP packet is the second IP address
- the destination address of the inner layer packet is the IP address of the outer network monitoring node.
- the source address of the tunnel packet is the IP address of the first monitoring node itself.
- the destination address of the tunnel packet is the IP address of the L2TP relay itself.
- the monitoring node further includes a service processing unit for processing monitoring service data.
- the packet processing sub-unit is further configured to decapsulate the tunnel packet received by the network interface unit from the L2TP relay to obtain an inner layer IP packet whose content is the monitoring service data, and submit the monitoring service data to the service processing unit.
- the inner IP packet is a packet sent by the monitoring node of the network isolation device.
- the destination address of the tunnel packet is the first IP address, and the source address of the tunnel packet is the IP address of the L2TP relay itself.
- the destination IP address of the inner layer IP packet is the second IP address, and the source IP address is the IP address of the outer monitoring node; or the packet processing subunit is further configured to encapsulate the monitoring service data generated by the monitoring node service processing unit.
- the inner IP packet is encapsulated into a tunnel packet and sent to the network interface unit, and sent by the network interface unit.
- the L2TP relay sends the inner IP packet to the monitoring node on the network outside the network isolation device.
- the source IP address of the inner IP packet is the second IP address
- the destination address of the inner packet is The outer network monitors the IP address of the node.
- the source address of the tunnel packet is the IP address of the first monitoring node.
- the destination address of the tunnel packet is the IP address of the L2TP relay itself.
- the invention also provides an L2TP relay device for assisting a monitoring node to traverse a network isolation device in an IP monitoring system, the relay device comprising: a network interface unit, configured to send and receive messages through an IP network; and a connection processing subunit, configured to receive network isolation
- the L2TP tunnel connection request sent by the first monitoring node of the LAC as the first IP address of the device; after the tunnel connection with the first monitoring node, the second IP address is assigned to the first monitoring node; the message processing subunit And receiving the tunnel packet from the first monitoring node, and decapsulating the tunnel packet to obtain an inner layer IP packet, and forwarding the packet to the monitoring node outside the network isolation device according to the destination address of the inner layer IP packet.
- the inner IP packet is the monitoring signaling data or the monitoring data sent by the first monitoring node to the monitoring node outside the network isolation device.
- the source address of the tunnel packet is the first IP address of the first monitoring node, and the destination address is The IP address of the L2TP relay itself.
- the destination address of the inner IP packet is the monitoring section of the network isolation device.
- the IP address, the source address is the second IP address; the packet processing sub-unit further encapsulates the IP packet sent by the monitoring node outside the network isolation device for monitoring signaling data or service data.
- the source address of the tunnel packet is the IP address of the L2TP trunk itself.
- the monitoring system includes isolation devices, EC, VC, VM, DM, MS, and L2TP relay.
- the EC and the VC in the branch network are located inside the own network egress isolation device, that is, the side that is isolated or protected, also referred to as the intranet side.
- the monitoring server is naturally located outside the isolation device, which is also called the external network side, with respect to the above-mentioned isolation device. Please refer to FIG. 6 and FIG. 8.
- the intranet tunnel IP address assigned by the intranet monitoring node is the external network IP address.
- the IP address of the VC in the intranet is 10. 10. 10. 10. It acts as the LAC to initiate a dial-up connection to the L2TP server of the external network.
- the L2TP tunnel is started to obtain the inner IP address of the tunnel.
- the IP address of the LNS and the intranet connection interface on the external network is 12. 12. 10. 10.
- This address is a public network address from the perspective of the intranet, that is, the intranet can be directly accessed; The address cannot be directly accessed. You can configure the corresponding public network address of the static mapping on the isolated device on the egress of the network. In tunnel mode, it is the tunnel outer IP address.
- the IP address of the interface that the LNS connects to other devices on the external network is 12. 12. 12. 9. It should be noted that the public network address and the private network address are relative, depending on the network planning, for example, the public network IP address on the Internet can also be planned to be reused as a private network address.
- the tunnel mode can effectively solve the problem of the isolation device, it may cause the problem of excessive bandwidth consumption of the WAN. If the two monitoring nodes can directly perform the non-tunnel mode communication, if the tunnel mode bypasses the WAN, it is obviously a pair. Waste of WAN bandwidth. Please refer to FIG. 6 and FIG. 9. The following describes how the implementation of the WAN bandwidth saving is implemented. In the following description, the service processing related to the signaling of the control plane is performed by the signaling processing unit of each monitoring node, and the packet that the signaling processing unit interacts with the external is called a signaling message.
- the data processing (such as monitoring video stream) processing is performed by the service processing unit, and the service processing unit interacts with the external packet, which is called a data packet; the tunnel packet processing and reception is processed by the tunnel processing unit and then through the network.
- the interface unit sends it to the IP network. If the communication process does not need to go through the tunnel processing unit (ie, the non-tunnel mode), the service processing unit or the signaling processing unit may find that the current message needs to be submitted to the network interface unit according to the internal routing table.
- the distinction between the two concepts of the signaling packet or the data packet is mainly based on the content carried by the packet.
- the former mainly carries the signaling service
- the latter mainly carries the data service. Please refer to FIG. 6 and FIG. 9.
- the processing flow of this embodiment includes the following steps.
- Step 201 The VC and the EC register in the tunnel through the tunnel, and the registration packet can carry the inner layer IP address, the own IP address, and the device identifier of the tunnel in the registration message (signaling). a payload of a message) to notify the VM;
- Step 202 After receiving the registration message from the tunnel, the VM records the inner layer IP address, the own IP address, and the device identifier of the VC and the EC locally;
- the EC and the VC need to initiate registration with the VM through signaling packets after going online.
- Registered messages can be sent to the VM through the tunnel.
- the registration message carries the internal IP address of the tunnel in addition to the IP address of the monitoring node itself, and may carry its own identifier (such as a MAC address or a CPU serial number) in some implementation manners.
- the VM saves the IP address and identifier carried in the registration node registration message and uses it in subsequent service processes.
- Step 203 The VC sends a request for monitoring the video stream of the on-demand EC to the VM.
- Step 204 The VM responds to the on-demand request of the VC by using the signaling message, and notifies the EC to send the monitoring video stream to the VC through the signaling message, and the VM carries the inner layer of the tunnel in the signaling message sent to the EC and the VC. IP address, the peer monitoring node's own IP address, and a unique authentication identifier;
- Step 205 After receiving the signaling message of the VM, the EC or the VC obtains the tunnel inner layer IP address of the peer monitoring node, the peer monitoring node's own IP address, and the unique authentication identifier from the signaling packet and protects Step 206: The EC sends a probe packet to the VC in the non-tunnel mode, where the probe packet carries the unique authentication identifier.
- Step 207 The VC sends a probe packet to the EC in the non-tunnel mode, where the probe packet carries the unique authentication identifier.
- Step 208 The EC or the VC receives the probe packet sent by the peer monitoring node, and checks whether the unique authentication identifier carried in the probe packet is the same as the unique authentication identifier saved by itself, and if yes, sends the probe packet to the peer monitoring node. Probe the response packet, otherwise discard the probe packet.
- Step 209 If the EC receives the probe response message sent by the VC in the non-tunnel mode within a predetermined time, notify the service processing unit to send the video stream to the VC in the non-tunnel mode; if the EC does not receive the message within the predetermined time If the probe response packet sent by the VC receives the probe packet sent by the VC, The video stream is sent in the non-tunnel mode on the TCP or UDP connection carrying the VC probe packet. If the EC does not receive the probe response packet sent by the VC or the probe packet sent by the VC within the predetermined time, The notification service processing unit sends the video stream through the tunnel mode.
- EC and VC are peer monitoring nodes.
- the VM allocates a unique authentication identifier for the upcoming live service.
- the authentication identifier may be randomly generated by the VM according to a predetermined algorithm, or may be generated by the VM according to the identifiers of two monitoring nodes that are conducting live services, such as simply two
- the MAC addresses of the monitoring nodes are concatenated to form a 96-bit identifier.
- the participant of the live service EC or the signaling processing unit of the VC saves the unique authentication identifier locally.
- the unique authentication identifier is used by the monitoring node to confirm whether the monitoring node that sends the probe packet is the peer monitoring node of the live service after receiving the probe packet.
- both the EC and the VC establish a tunnel connection with the tunnel server, so communication through the tunnel mode is certainly no problem.
- EC and VC may also be able to communicate in a non-tunnel mode. If non-tunnel mode communication is possible, the non-tunnel mode should be used first, which avoids the problem that tunnel mode may consume WAN bandwidth. Therefore, before sending the video stream to the VC, the EC can send a probe packet to the VC through the non-tunnel mode to confirm whether the two parties can communicate in the non-tunnel mode. Whether EC and VC can communicate in non-tunnel mode depends on the NAT relationship between the two parties. Please refer to Table 4. Table 4 shows the four NAT relationships and the premise of the two parties communicating in non-tunnel mode.
- the EC or VC When the EC or VC sends a probe packet, it does not know the NAT relationship with the peer monitoring node, and cannot determine the NAT relationship between the two parties. However, for the live service, its natural feature is The EC sends a VC reception, and the VC does not send a video stream to the EC. Therefore, in a basic implementation, only the NAT relationships described in scenarios 1 and 2 are considered. For case 1, both parties are in the same NAT device, so the VC can certainly receive the probe packet sent by the EC.
- the intranet device initiates communication first, if the VC is outside the NAT 1
- the probe packet sent by the EC can be received by the VC. Therefore, in scenarios 1 and 2, the VC only needs to confirm whether the unique authentication identifier carried in the packet is consistent with the locally stored unique authentication identifier, and if so, the probe response message is sent to the EC. In cases 1 and 2, the EC is obviously able to receive the probe response message.
- the EC can start a timer when sending a probe packet.
- the acknowledgment can communicate with the VC in the non-tunnel mode. In this case, the service processing unit can be notified.
- the non-tunnel mode sends a video stream to the VC. If the probe response packet sent by the VC is not received before the timer expires, this indicates that the EC directly transmits the video stream through the non-tunnel mode and cannot be received by the VC.
- the signaling processing unit of the EC can notify the service processing unit to pass the tunnel mode.
- the VC sends a video stream.
- the fact that the EC does not receive the probe response message after receiving the probe message does not mean that the two parties have no chance to communicate in the non-tunnel mode.
- the EC sends a probe packet and is discarded by the NAT device 1 so that it cannot reach the VC (because it does not conform to the NAT working principle, the internal first is initiated).
- the VC and the EC can send the probe to the other party through the non-tunnel mode.
- the EC cannot receive the probe response packet of the VC within the predetermined time (the timer timeout period)
- it will receive the probe packet sent by the VC, and the EC can notify the service processing unit to borrow the VC.
- Send a video stream by sending a TCP or UDP connection where the probe packet is located. Borrowing the TCP or UDP connection to send the video stream is a clever use of the working principle of NAT.
- the working principle of NAT is that the internal node needs to initiate communication first, and then form an address translation flow table on the NAT device.
- the exemplary format of the flow table is Refer to Table 5.
- the IP addresses of the EC and the VC are IP1 and IP2 respectively.
- the VC sends a probe packet to the EC
- an entry as shown in Table 2 is formed on the NAT device. From the perspective of the EC, it is a NAT device that establishes a UDP session.
- the destination address and destination port can only be filled in by IP address and port 3001 to be forwarded by the NAT device to the VC. If the destination port or destination address is filled in when the EC sends a packet, the packet will be discarded by the NAT device.
- the EC can only send a video stream to the VC by borrowing the TCP or UDP connection where the VC sends the probe message.
- the probe response message may not be sent (corresponding to case 3).
- both the EC and the VC send a probe packet to the peer, and neither party can receive it.
- the EC-initiated timer obviously times out. At this time, the EC can notify the service processing unit to send the video stream through the tunnel mode.
- the present embodiment solves the NAT relationship problem in different scenarios in two ways.
- EC1's own IP address is 192. 168. 1.
- VC1's own IP address is 192. 168. 1.
- VC2's own IP address is also 192. 168. 1. 3.
- VC1 and EC1 belong to the case 4 described in Table 1, and the two parties are certainly unable to communicate in the non-tunnel mode.
- EC1 When EC1 sends a probe packet to VC1, the intermediate network device forwards the packet according to the destination address of the packet (192.168.1.3), and the packet is actually forwarded to VC2. Assume that VC2 is in the video stream of EC1, it will respond to the probe response message. After receiving the probe response message, EC1 will consider itself and VC1 to communicate in tunnel mode, and then send the video stream through non-tunnel mode. VC2 can correctly receive the video stream, but VC1 does not actually receive the video stream sent by EC1. The foregoing unique authentication identifier can effectively avoid such a situation, because the message sent by EC1 is carried in the message.
- the unique authentication identifier, VC2 receives the authentication identifier and is inconsistent with the authentication identifier saved by itself. Because VC2 also requests the EC1 request, the VC2 receives the authentication identifier sent by the VM and VC1 receives it. Different, therefore, VC2 does not send a probe response message to EC1, then EC1 will naturally send the video stream through tunnel mode after the timer expires.
- the above describes a method for realizing wide area network bandwidth saving in a live service process between a monitoring node EC and a VC in a monitoring network.
- a voice intercom service between the EC and the VC.
- the processing process is basically similar. The only difference is: Since the voice service sends data packets in both directions, the VC and the EC are peers. Therefore, it is more flexible in transmitting the probe packet and responding to the probe response packet, and any party can initiate the voice intercom first.
- the VC can also enable the timer.
- the EC does not receive the probe response packet within the predetermined time but receives the EC probe packet, it can also borrow the TCP or UDP connection of the EC probe packet through the non-tunnel.
- the mode sends a voice stream to the EC.
- the monitoring network in addition to the video stream and the voice stream that can be sent between the EC and the VC, in the multi-domain monitoring network, there is also a demand for interactive video stream and voice stream between the MSs of the two domains.
- the VC1 on-demand EC1 video stream may need to be forwarded to the MS2 of the domain through MS1 in the domain of EC1, and finally forwarded to VC1 through MS2.
- the video stream or the voice stream can be forwarded between the two MSs.
- the difference is: The two MSs learn the IP address of the other party and the inner layer IP of the tunnel through the interaction of the two domain VMs at the signaling level. Address and device ID.
- the DMs Data Management Servers
- the services carried are different. The former is the playback service, and the latter is Live business or voice intercom business.
- the two monitoring nodes when the two monitoring nodes do not know whether the two parties can communicate in the non-tunnel mode, they can determine whether the non-tunnel mode can pass through the method described in this embodiment before performing data packet interaction. Communicate.
- This embodiment can further realize bandwidth saving (such as WAN bandwidth saving) on the basis of solving the problem caused by the isolation mode in the tunnel mode, and avoid the processing pressure of the area where the tunnel service segment is located (for example, monitoring the upper domain).
- the present invention also provides another embodiment to solve the problem of wide area network bandwidth consumption. Please refer to the map 6, the following describes how the implementation of the WAN bandwidth savings.
- Step 301 The VC and the EC are registered on the VM through the L2TP tunnel.
- the VC and the EC are registered with the inner IP address of the tunnel allocated by the LNS, and then the source IP address of the local device is carried into the payload of the registration packet.
- the VM In order to notify the VM;
- the source IP address of the EC client in the internal network is 10. 1. 1. 2 (optional), and the IP address of the L2TP tunnel inner layer is 192. 168. 1. 2 ; VC is the client in the intranet.
- the source IP address is 10. 1. 1. 3 (optional), and the IP address of the L2TP tunnel is 192. 168. 1. 3.
- Step 302 After receiving the registration message from the tunnel, the VM records the address information carried by the device in the registration message.
- Step 303 The VC broadcasts the monitored video stream of the EC through the tunnel: At this time, the VC still sends an on-demand request to the VM according to the foregoing tunnel mode;
- Step 304 The VM notifies the EC to send a monitoring video stream.
- Step 305 After the service transmission channel is established through the tunnel between the EC and the VC, the VM actively sends a non-tunnel mode attempt instruction to the EC and the VC device, and the instruction is carried in the keep-alive message of the monitoring terminal node and the VM. In the message.
- the establishment of the service transmission channel in the tunnel mode can ensure the smoothness of the service.
- the EC and the VC can establish a service transmission channel according to the tunnel mode, which helps to ensure the experience of the VC end user.
- Step 306 The EC first initiates a non-tunnel mode communication to the other party after receiving the non-tunnel mode attempt command of the VM.
- the present invention refers to the VC and EC that are in the non-tunnel mode attempt instruction as T-VC and T-EC, respectively.
- the T-EC and the T-VC can send packets through the private protocol for non-tunnel mode communication; for example, the T-EC starts to try to use the internal IP address of the T-VC to send a specific packet to the T-VC for the destination address; It can also be initiated by the VC side first.
- Step 307 If the VC receives the message sent by the EC, the VC reports the received result to the VM; the VC can report by using the SIP message.
- the VM After receiving the report sent by the VC (which can be carried by the SIP message), the VM determines whether the T-EC and the T-VC can perform the non-tunnel mode according to the report of the VC, if the EC and the VC are notified to switch from the tunnel mode to the non-tunnel mode ( It is usually called intranet communication mode or private network communication mode, which mainly switches the destination IP address of the service flow to the VC's intranet IP address. Otherwise, it returns without processing, and T-EC and T-VC continue to maintain the tunnel mode.
- the VM can determine whether the two parties can perform the non-tunnel mode according to the actual situation, and the two bases can be combined or implemented separately.
- the inner layer IP address of the VC that sends the report must be the same as ⁇ -vc.
- the VM checks whether the VC inner layer IP address of the transmission report is the same as the T-VC stored by itself, and if so, determines that it is non-tunnel mode, otherwise it determines that the non-tunnel mode is not possible.
- the report sent by the VM to the VC can only indicate that the communication message sent by the EC through the intranet is received by the VC of the same address.
- the T-EC is communicating with the T-VC with the address of 10. 1. 1. 3 through the tunnel. If the T-VC is indeed on the same intranet as the EC, the T-VC will receive the non-tunnel of such an EC. The mode message is then reported to the VM.
- T-VC and EC are in different intranets, and there is exactly one VC2 address in the intranet where T-EC is located. 10. 1. 1. 3, VC2 will also receive EC information, which will also be sent to VM. Reporting, if the VM does not judge at this time, it may cause an error. The VM checks whether the inner layer IP address of the VC that sends the report is the same as the tunnel inner IP address of the T-VC that is saved by itself. If yes, the report is indeed sent by the T-VC. Otherwise, the VC that sends the report is other. The VC in the network is just the same as the intranet IP addresses of both parties.
- the most commonly used mechanism uses Ping and other inspection techniques.
- the present invention considers that an IP address may be duplicated in different intranets, and the VM is introduced to judge the error caused by the repetition of the IP address. This is also The reason why the present invention is not simply to use a more common technique such as Ping to check whether the EC and VC can perform the non-tunnel mode is the root cause.
- the inner tunnel IP address of the EC in the VC report is the same as the T-EC.
- the VM can also check whether the EC in the VC report is a T-EC that is communicating with the T-VC, and if so, it is determined to be in a non-tunnel mode, otherwise it is determined that the non-tunnel mode cannot be performed.
- T-EC1/T-VC1 and T-EC2/T-VC2 in the same time period, and the instruction of non-tunnel mode attempt is currently being executed.
- VM can also check the address of the EC in the report of T-VC1.
- T-VC1 is not If a non-tunnel mode message is received from T-EC1, T-VC1 and T-EC1 are in the same intranet, and the non-tunnel mode cannot be performed. T-EC1/T-VC1 continues to maintain the tunnel mode. Similarly, if the tunnel inner IP address of the EC carried in the report is the same as the tunnel inner IP address of the T-EC2, the VM notifies T-EC 1 and T_VC 1 to switch to the non-tunnel mode.
- Step 309 After receiving the instruction that the VM switches to the non-tunnel mode, the EC switches from the tunnel mode to the intranet IP communication mode, and modifies the destination IP address of the service flow (that is, the monitoring video stream) to modify the internal network IP address of the VC. Send it out.
- the destination IP address of the service flow that is, the monitoring video stream
- the signaling processing unit also controls the service processing unit to switch the flow of the service flow from the tunnel processing unit, so that the service flow is no longer processed by the tunnel. Switching traffic from the tunnel to the intranet can greatly save the valuable bandwidth of the WAN, and make rational use of existing non-tunnel mode resources, especially for large-scale monitoring networks.
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/377,814 US9215215B2 (en) | 2012-02-10 | 2013-02-05 | Method and device for passing through isolation device in surveillance network |
Applications Claiming Priority (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210030308.1 | 2012-02-10 | ||
CN201210030678.5A CN102571524B (zh) | 2012-02-10 | 2012-02-10 | Ip监控系统中穿越、协助穿越网络隔离设备的方法和节点 |
CN201210030678.5 | 2012-02-10 | ||
CN201210030308.1A CN102546350B (zh) | 2012-02-10 | 2012-02-10 | 一种ip监控系统中节约广域网带宽的方法及装置 |
CN201210180552.6 | 2012-05-30 | ||
CN201210180552.6A CN102710644B (zh) | 2012-05-30 | 2012-05-30 | 一种ip监控系统中节约带宽的方法及装置 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2013117154A1 true WO2013117154A1 (zh) | 2013-08-15 |
Family
ID=48946911
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2013/071395 WO2013117154A1 (zh) | 2012-02-10 | 2013-02-05 | 穿越监控网络中隔离设备的方法和设备 |
Country Status (2)
Country | Link |
---|---|
US (1) | US9215215B2 (zh) |
WO (1) | WO2013117154A1 (zh) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111343070B (zh) * | 2020-03-03 | 2021-07-09 | 深圳市吉祥腾达科技有限公司 | sdwan网络通信控制方法 |
CN112039920B (zh) * | 2020-09-14 | 2022-02-22 | 迈普通信技术股份有限公司 | 通信方法、装置、电子设备及存储介质 |
CN116599773B (zh) * | 2023-07-14 | 2023-09-19 | 杭州海康威视数字技术股份有限公司 | 自适应设备安全风险评估方法、装置、设备及系统 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101159657A (zh) * | 2007-10-16 | 2008-04-09 | 华为技术有限公司 | 一种实现私网穿越的方法、设备及服务器 |
CN101170687A (zh) * | 2007-11-28 | 2008-04-30 | 武汉烽火网络有限责任公司 | 基于视频监控的前端录像点播穿越nat的方法 |
CN101465844A (zh) * | 2007-12-18 | 2009-06-24 | 华为技术有限公司 | 一种防火墙穿越方法、系统和设备 |
CN102546350A (zh) * | 2012-02-10 | 2012-07-04 | 浙江宇视科技有限公司 | 一种ip监控系统中节约广域网带宽的方法及装置 |
CN102571524A (zh) * | 2012-02-10 | 2012-07-11 | 浙江宇视科技有限公司 | Ip监控系统中穿越、协助穿越网络隔离设备的方法和节点 |
CN102710644A (zh) * | 2012-05-30 | 2012-10-03 | 浙江宇视科技有限公司 | 一种ip监控系统中节约带宽的方法及装置 |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7089303B2 (en) * | 2000-05-31 | 2006-08-08 | Invicta Networks, Inc. | Systems and methods for distributed network protection |
DE10329877A1 (de) | 2003-07-02 | 2005-01-27 | Siemens Ag | Verfahren zum Betrieb eines Sprach-Endgerätes an einer abgesetzten Nebenstellenanlage, Kommunikationsanordnung und Sprach-Endgerät |
CN102111311A (zh) | 2011-03-18 | 2011-06-29 | 杭州华三通信技术有限公司 | 通过二层隧道协议访问监控私网的方法及服务器 |
-
2013
- 2013-02-05 US US14/377,814 patent/US9215215B2/en active Active
- 2013-02-05 WO PCT/CN2013/071395 patent/WO2013117154A1/zh active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101159657A (zh) * | 2007-10-16 | 2008-04-09 | 华为技术有限公司 | 一种实现私网穿越的方法、设备及服务器 |
CN101170687A (zh) * | 2007-11-28 | 2008-04-30 | 武汉烽火网络有限责任公司 | 基于视频监控的前端录像点播穿越nat的方法 |
CN101465844A (zh) * | 2007-12-18 | 2009-06-24 | 华为技术有限公司 | 一种防火墙穿越方法、系统和设备 |
CN102546350A (zh) * | 2012-02-10 | 2012-07-04 | 浙江宇视科技有限公司 | 一种ip监控系统中节约广域网带宽的方法及装置 |
CN102571524A (zh) * | 2012-02-10 | 2012-07-11 | 浙江宇视科技有限公司 | Ip监控系统中穿越、协助穿越网络隔离设备的方法和节点 |
CN102710644A (zh) * | 2012-05-30 | 2012-10-03 | 浙江宇视科技有限公司 | 一种ip监控系统中节约带宽的方法及装置 |
Also Published As
Publication number | Publication date |
---|---|
US9215215B2 (en) | 2015-12-15 |
US20150222597A1 (en) | 2015-08-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10148456B2 (en) | Connecting multiple customer sites over a wide area network using an overlay network | |
US7366894B1 (en) | Method and apparatus for dynamically securing voice and other delay-sensitive network traffic | |
US8861345B2 (en) | Border gateway protocol extension for the host joining/leaving a virtual private network | |
US7561586B2 (en) | Method and apparatus for providing network VPN services on demand | |
US9629037B2 (en) | Handover of a mobile device in an information centric network | |
CN102546657B (zh) | Ip监控系统中穿越、协助穿越网络隔离设备的方法和节点 | |
US20130185440A1 (en) | Ice Based Nat Traversal | |
WO2010127610A1 (zh) | 一种虚拟专用网节点信息的处理方法、设备及系统 | |
WO2013182059A1 (zh) | 多协议标签交换流量工程隧道建立方法及设备 | |
WO2007036160A1 (fr) | Appareil, systeme et procede assurant la communication entre un client et un serveur | |
WO2007079643A1 (fr) | Procédé et système de reproduction utilisant un contrôleur de session en périphérie | |
WO2007109963A1 (fr) | Passerelle de réseau privé virtuel et système de réseau ipv6 et système de réalisation de réseau privé virtuel mobile dans un réseau hybride et procédé correspondant | |
WO2006089481A1 (fr) | Méthode de contrôle de communication de pénétration directe dont deux parties sont dans différents nat et dispositif correspondant | |
US20080159313A1 (en) | Interworking policy and charging control and network address translator | |
WO2007112691A1 (fr) | Système, procédé et dispositif réseau permettant à un client de réseau privé virtuel (vpn) d'accéder à un réseau public | |
CN102571524A (zh) | Ip监控系统中穿越、协助穿越网络隔离设备的方法和节点 | |
WO2011038637A1 (zh) | 端到端呼叫的实现方法、端到端呼叫终端及系统 | |
WO2015096302A1 (zh) | 基于sip媒体能力重协商的nat穿越方法、代理服务器和系统 | |
WO2015123988A1 (zh) | 拥塞控制方法、装置及设备 | |
US11973851B2 (en) | Supporting multiple border gateway protocol (BGP) sessions using multiple QUIC streams | |
WO2011147341A1 (zh) | 一种分配mpls标签的方法和网络装置 | |
WO2013117154A1 (zh) | 穿越监控网络中隔离设备的方法和设备 | |
WO2008028383A1 (fr) | Procédé d'identification de protocole de couche 3 dans une interconnexion à supports hétérogènes dans un réseau privé virtuel de protocole l2 et appareil et système correspondants | |
WO2016066027A1 (zh) | 一种媒体传输方法和设备 | |
WO2008084306A2 (en) | Interworking of policy and charging control and network address translator |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 13746025 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 14377814 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 13746025 Country of ref document: EP Kind code of ref document: A1 |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC OF 050315 |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 13746025 Country of ref document: EP Kind code of ref document: A1 |