WO2018094654A1 - 一种vpn传输隧道调度方法、装置以及vpn客户端服务器 - Google Patents

一种vpn传输隧道调度方法、装置以及vpn客户端服务器 Download PDF

Info

Publication number
WO2018094654A1
WO2018094654A1 PCT/CN2016/107123 CN2016107123W WO2018094654A1 WO 2018094654 A1 WO2018094654 A1 WO 2018094654A1 CN 2016107123 W CN2016107123 W CN 2016107123W WO 2018094654 A1 WO2018094654 A1 WO 2018094654A1
Authority
WO
WIPO (PCT)
Prior art keywords
vpn
tunnel
target address
transmission
data
Prior art date
Application number
PCT/CN2016/107123
Other languages
English (en)
French (fr)
Inventor
王华涛
Original Assignee
深圳前海达闼云端智能科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳前海达闼云端智能科技有限公司 filed Critical 深圳前海达闼云端智能科技有限公司
Priority to PCT/CN2016/107123 priority Critical patent/WO2018094654A1/zh
Priority to CN201680006899.5A priority patent/CN107624233B/zh
Publication of WO2018094654A1 publication Critical patent/WO2018094654A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks

Definitions

  • the present invention relates to the field of communications, and in particular, to a VPN transmission tunnel scheduling method, device, and VPN client server.
  • Virtual private network (English name: Virtual Private Network, English abbreviation: VPN) is a private network commonly used between large enterprises or groups and groups.
  • VPN Virtual Private Network
  • a public network architecture such as the Internet can be used to establish a private data transmission channel between nodes in different locations, thereby providing users with a highly secure end-to-end network communication service while consuming less resources.
  • the encrypted data packet can be transmitted through the tunnel of the Transmission Control Protocol (English: Transmission Control Protocol, English abbreviation: TCP), or through the user datagram protocol (English name: User Datagram) Protocol, English abbreviation: UDP) Tunnel for transmission.
  • TCP Transmission Control Protocol
  • UDP User Datagram Protocol
  • a pre-specified type of VPN tunnel is usually used for data transmission. Since the types of data transmitted through the VPN tunnel are often many, the above two types of VPN tunnels have their own advantages in use, but they also have certain defects, so a pre-specified type of VPN tunnel may occur. Do not The phenomenon that the data transmitted through the VPN tunnel is suitable, that is, the VPN tunnel used may affect the transmission efficiency or transmission quality of the data transmitted by the VPN tunnel, thereby impairing the user experience.
  • the embodiment of the present invention provides a VPN transmission tunnel scheduling method, a device, and a VPN client server, which are mainly used to solve the problem that the VPN tunnel used in the prior art may affect the transmission efficiency or transmission quality of the data transmitted by the VPN tunnel. problem.
  • an embodiment of the present invention provides a virtual private network VPN transmission tunnel scheduling method, including: collecting an access log of each tunnel access target address between a VPN client and a VPN server at a route, and detecting Data; analyze the access log and the probe data, and select the corresponding tunnel transmission access destination data according to the analysis result.
  • an embodiment of the present invention provides a virtual private network VPN transmission tunnel scheduling apparatus, including: an acquisition module, configured to collect, at a route, each tunnel access target between a VPN client and a VPN server. The access log of the address and the probe data; the analysis module is configured to analyze the access log and the probe data, and select a corresponding tunnel transmission access target address data according to the analysis result.
  • an embodiment of the present invention provides a virtual private network VPN transmission tunnel scheduling apparatus, where a VPN transmission tunnel scheduling apparatus includes: a communication interface, a memory, and a processor, where the memory is used to store computer execution code, and the computer executes code for The control processor performs the VPN transmission tunnel scheduling method provided by the embodiment of the first aspect above.
  • an embodiment of the present invention provides a computer storage medium for storing computer software instructions for a virtual private network VPN transmission tunnel scheduling apparatus, including virtual implementation provided by the embodiment of the first aspect described above.
  • the program code designed by the network VPN transmission tunnel scheduling method designed by the network VPN transmission tunnel scheduling method.
  • an embodiment of the present invention provides a computer program directly loadable into an internal memory of a computer and containing software code, and the computer program is calculated After the machine is loaded and executed, the virtual private network VPN transmission tunnel scheduling method provided by the embodiment of the first aspect is implemented.
  • an embodiment of the present invention provides a virtual private network VPN client server, which includes the virtual private network VPN transmission tunnel scheduling apparatus provided by the foregoing third embodiment.
  • Embodiments of the present invention provide a virtual private network VPN transmission tunnel scheduling method, apparatus, and VPN client server, which collect access logs and probe data of a target address through each tunnel between a VPN client and a VPN server. Since the obtained access log and the probe data can be used to evaluate whether the tunnel between the VPN server and the target address affects the data transmission of the access target address when the target address is accessed, the access log obtained according to the above can be used as well The detection data is analyzed, and the corresponding tunnel transmission access target address data is selected according to the analysis result, so that the VPN tunnel used for data transmission does not affect the transmission efficiency or transmission quality of the transmitted data, thereby improving data transmission. Efficiency, improved data transmission quality, and improved user experience.
  • FIG. 1 is a schematic structural diagram of a VPN system according to an embodiment of the present invention
  • FIG. 2 is a schematic structural diagram of a VPN system according to another embodiment of the present invention.
  • FIG. 3 is a schematic flowchart of a method for scheduling a virtual private network VPN transmission tunnel according to an embodiment of the present invention
  • FIG. 4 is a schematic flowchart of a virtual private network VPN transmission tunnel scheduling method according to another embodiment of the present invention.
  • FIG. 5 is a schematic structural diagram of a virtual private network VPN transmission tunnel scheduling apparatus according to an embodiment of the present invention.
  • FIG. 6 is a schematic diagram of a virtual private network VPN transmission tunnel according to another embodiment of the present invention. Schematic structural diagram of a track scheduling device
  • FIG. 7 is a schematic structural diagram of a virtual private network VPN transmission tunnel scheduling apparatus according to another embodiment of the present invention.
  • a component can be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread in execution, a program, and/or a computer.
  • an application running on a computing device and the computing device can be a component.
  • One or more components can reside within a process and/or thread of execution, and a component can be located in a computer and/or distributed between two or more computers. Moreover, these components can execute from various computer readable media having various data structures thereon.
  • These components may be passed, for example, by having one or more data packets (eg, data from one component that interacts with the local system, another component of the distributed system, and/or signaled through, such as the Internet)
  • the network interacts with other systems to communicate in a local and/or remote process.
  • the application will present various aspects, embodiments, or features in a system that can include multiple devices, components, modules, and the like. It is to be understood and appreciated that the various systems may include additional devices, components, modules, etc. and/or may not include all of the devices, components, modules, etc. discussed in connection with the figures. In addition, a combination of these schemes can also be used.
  • the word "exemplary” is used to mean an example, an illustration, or a description. Any embodiment or design described as “example” in this application should not be construed as preferred or advantageous over other embodiments or designs. Specifically, the term using the example is intended Present concepts in a concrete way.
  • information, signal, message, and channel may sometimes be mixed. It should be noted that the meaning to be expressed is consistent when the difference is not emphasized. “of”, “corresponding (relevant)” and “corresponding” can sometimes be mixed. It should be noted that the meaning to be expressed is consistent when the distinction is not emphasized.
  • the network architecture and the service scenario described in the embodiments of the present invention are used to more clearly illustrate the technical solutions of the embodiments of the present invention, and do not constitute a limitation of the technical solutions provided by the embodiments of the present invention.
  • the technical solutions provided by the embodiments of the present invention are equally applicable to similar technical problems.
  • the words “first”, “second” and the like are used to distinguish the same or similar items whose functions and functions are substantially the same, in the field.
  • the skilled person will understand that the words “first” and “second” are not intended to limit the number and order of execution.
  • a private network that is, a VPN
  • a VPN can be established on the public network.
  • an embodiment of the present invention provides a VPN system, including: a user terminal 101, a target access device 102, a first VPN server 103, and a second VPN server 104, a first VPN server 103, and a second A VPN tunnel is established between the VPN servers 104.
  • the target access device 102 can be a web server that provides a web service.
  • Web services are generally served by clusters, and servers in the cluster provide image services, dynamic applications, and multimedia services.
  • the user can mark the resources obtained from the website by using the Uniform Resource Locator (English name: URL).
  • URL can be divided into a dynamic URL and a static URL.
  • a static URL is generally a fixed website and does not contain any parameters or code.
  • a static URL can be a URL suffixed with .htm, .html, .shtml, or .xml.
  • the proportion of dynamic files or large files in the network resources of the websites visited by users is gradually increasing.
  • news media websites mainly rely on picture services and video services, and dynamic elements of social networking sites such as Weibo.
  • the files are generally smaller, the video sites are generally based on media files, and the video files are stored in the media server through the fragmentation technology.
  • the average size of the video files of Youtube is 10MBytes.
  • Table 1 shows the statistics of the different types of resources on the website in the network at the end of 2013 and the end of 2014.
  • the type of the existing VPN tunnel can usually include a TCP type VPN tunnel and a UDP type VPN tunnel
  • the TCP protocol is a reliable transmission protocol
  • the data transmitted through the TCP type VPN tunnel can ensure reliable data transmission. Sex, but its transmission rate tends to be low; while the UDP protocol has fewer control options, the delay of data transmission through UDP type VPN tunnel is often small, and the efficiency of data transmission is high, but when the network quality is poor, pass
  • a UDP type VPN tunnel performs data transmission, a serious packet loss occurs. phenomenon.
  • Both types of VPN tunnels have their own advantages in use, but they also have certain defects. Therefore, VPN service providers usually do not choose the type of VPN tunnel for the customer, but the user chooses it. For example, the user configures the type of the VPN tunnel in advance, and when there is a demand for using the VPN tunnel, the data transmission is performed using a preset VPN tunnel.
  • an embodiment of the present invention provides a virtual private network VPN transmission tunnel scheduling method, where the method is applied to a VPN system as shown in FIG. 2, the VPN system includes: a user equipment 201, and a VPN client 202.
  • the VPN server 203 and the target network device 204 wherein the VPN client 202 and the VPN server 203 respectively establish a datagram protocol UDP tunnel and a transmission control protocol TCP tunnel.
  • TCP tunnel can also be understood as being based on the TCP protocol.
  • Encapsulating encrypted packets and transmitting them, UDP tunneling can also be understood as encapsulating encrypted packets and transmitting them according to the UDP protocol.
  • the user equipment 201 can access the network resources on the target network device 204 through any tunnel established between the VPN client 202 and the VPN server 203 by connecting to the VPN client 202, wherein the target network device 204 can be a web server.
  • the virtual private network VPN transmission tunnel scheduling method includes:
  • the access log of the target address through the tunnel between the VPN client and the VPN server may include dynamic and static characteristics of the URL of the target address each time in the preset time period, and each access in the preset time period.
  • the probe data of the tunnel access destination address between the VPN client and the VPN server may include the packet loss rate of the tunnel between the VPN client and the VPN server, and the VPN client. Propagation delay between the endpoint and the VPN server and the propagation delay between the VPN client and the destination address.
  • the target address may be an address of a target network device accessed through a tunnel established between the VPN client and the VPN server, and the target address may be an IP address, or may be otherwise indicated by the VPN client and the VPN server.
  • the address of the network device accessed by the tunnel established between the two is not specifically limited.
  • the tunnel between the VPN client and the VPN server includes a User Datagram Protocol UDP tunnel and a Transmission Control Protocol TCP tunnel.
  • the access log collected at the route may be an access log within a threshold range from the current time.
  • the access log may be collected within 4 hours from the current time; the probe collected at the route
  • the data may be the detection data within a second time threshold range from the current time.
  • the detection data within 15 minutes from the current time may be collected, wherein the first time threshold and the second time threshold correspond to each other, so as to facilitate the collection.
  • the access log and the probe data correspond to each other in time. According to the collected access log and the probe data, it is possible to determine whether the tunnel between the VPN server and the target address will be accessed when the target address is accessed within a certain time range.
  • the data transfer of the destination address has an impact.
  • the target address can be understood as a set of addresses of the plurality of target network devices.
  • the relationship between the propagation delay between the VPN server and the destination address and the propagation delay between the VPN client and the VPN server can also be understood as the physical distance between the VPN server and the network device corresponding to the target address.
  • the propagation delay can be estimated by measuring the ping delay value based on the control message protocol (English full name; Internet Control Message Protocol, ICMP). .
  • the dynamic and static characteristics of the URL of the target address each time in the preset time period can be understood as being visited on the network device each time the network device corresponding to the target address is accessed within the preset time period.
  • the ULR corresponding to the network resource is a dynamic ULR or a static ULR.
  • the dynamic resource of the network resource obtained by accessing the target address may be determined according to the dynamic and static characteristics of the URL of the target address each time in the preset time period. The proportional relationship of resources.
  • the size of the response data for each access to the target address in the preset time period can be understood as the size of the response data of the network device responding to the access behavior each time the network device corresponding to the target address is accessed within the preset time period.
  • the size of the response data of the network device responding to the access behavior may be obtained each time the network device corresponding to the target address is accessed within a preset time period, and further, may be acquired within a preset time period.
  • the total number F 1 of response data of the network device responding to the access behavior when accessing the network device corresponding to the target address, and comparing the F 1 response data with the response data threshold (the response data threshold may be pre-acquired), And acquiring the quantity F 2 of the response data larger than the response data threshold, and acquiring the size proportional reference value F of the response data of the access target address in the preset time period according to F F 2 /F 1 .
  • a tunnel suitable for data transmission between the VPN client and the VPN server may be selected.
  • the tunnel between the VPN client and the VPN server includes a UDP tunnel and a TCP tunnel
  • the tunnel for data transmission specifically, if the packet loss rate of the UDP tunnel and the TCP tunnel are both lower than a certain threshold, for example, a tunnel with a fast transmission speed can be used for data transmission, for example, a UDP tunnel is used for data transmission.
  • the proportional relationship between the propagation delay between the VPN server and the target address and the propagation delay between the VPN client and the VPN server may be determined, and the propagation between the VPN server and the target address is performed.
  • the delay between the VPN client and the VPN server is large, there may be more NEs between the VPN server and the destination address. Therefore, the VPN client and the VPN server should be used. More reliable tunnels for data transmission, in order to reduce unreliable factors in the entire transmission path.
  • the dynamic and static characteristics of the URL of the accessed target address can be determined to be visited.
  • the ratio of the dynamic URL in the URL of the requested network resource and the distribution of the response data size of the access When the proportion of the dynamic URL in the URL of the accessed network resource is high, it can be understood that the network device corresponding to the target address may be a service server, and when accessing the service server, a reliable transmission method should be used to ensure the service is guaranteed. At this time, the transmission speed is not the primary consideration. Therefore, a relatively reliable tunnel between the VPN client and the VPN server should be used for data transmission.
  • the proportion of the response data whose size exceeds a certain threshold in the response data is determined in the total response data, and when the ratio is too high, if the ratio is too high,
  • the tunnel performs data transmission, for example, using a TCP tunnel for data transmission.
  • the amount of retransmitted data is large, thereby increasing the possibility of secondary congestion in the tunnel, and therefore should also Use UDP tunnel for data transmission.
  • the access log and the probe data may be analyzed to determine a corresponding tunnel.
  • routing information may also be generated according to the analysis result, where the routing information is used to schedule data of a corresponding tunnel transmission access target address, thereby using the tunnel used. The transmission efficiency or transmission quality of data transmitted to the target address is not affected, and the user experience is improved.
  • Embodiments of the present invention provide a virtual private network VPN transmission tunnel scheduling method, which collects access logs and probe data of each tunnel access target address between a VPN client and a VPN server, due to the obtained access log and The probe data can be used to evaluate whether the tunnel between the VPN server and the target address affects the data transmission of the access target address when accessing the target address, and therefore can be analyzed according to the access log and the probe data obtained above, and according to the analysis. As a result, the data of the corresponding tunnel transmission access target address is selected, so that the VPN tunnel used for data transmission does not affect the transmission efficiency or transmission quality of the transmitted data, thereby improving data transmission efficiency and improving data transmission quality. At the same time, the user experience is improved.
  • an embodiment of the present invention provides a virtual private network VPN transmission tunnel scheduling method, including:
  • the dynamic and static characteristics of the URL of the target address each time the preset time period is accessed, and the size of the response data of each time the target address is accessed within the preset time period.
  • step 301 in the above embodiment, and details are not described herein again.
  • step 404 is performed.
  • the average packet loss rate of the VPN may be an average packet loss rate between the VPN client and the VPN server.
  • the tunnel between the VPN client and the VPN server is established between the VPN client and the VPN server.
  • the average VPN packet loss rate can be the average value of vpnpl_avg of the network during the three detection periods for the packet loss rate between the VPN client and the VPN server.
  • vpnpl_avg When vpnpl_avg is greater than or equal to the packet loss rate evaluation threshold, the packet loss rate between the VPN client and the VPN server is high, and the transmission quality is poor. If the VPN client and the VPN server are reliable.
  • the tunnel performs data transmission, for example, using a TCP tunnel for data transmission.
  • the data itself is TCP data, it is easy to increase the probability of datagram retransmission, thereby causing secondary congestion in the tunnel, and since the UDP tunnel itself is disconnected, There is no retransmission of datagrams, so there is no tunnel congestion.
  • the VPN average packet loss rate has a large packet loss rate evaluation threshold, it can be considered that data is directly transmitted through a tunnel with a fast transmission rate between the VPN client and the VPN server, such as a UDP tunnel.
  • the average packet loss rate of the VPN is less than or equal to the packet loss rate evaluation threshold. It can be understood that the average packet loss rate of the VPN is smaller than the packet loss rate evaluation threshold, the average packet loss rate of the VPN is equal to the packet loss rate evaluation threshold, and the average packet loss rate of the VPN. The rate is less than or equal to the packet loss rate evaluation threshold.
  • the UDP tunnel transmission access data of the target address may be scheduled by default before analyzing the access log and the probe data, that is, the UDP tunnel is used for data transmission by default.
  • the propagation delay between the VPN client and the VPN server, and the propagation delay between the VPN client and the target address, and each time the target is accessed within a preset time period are used to obtain a tunnel evaluation value.
  • the tunnel evaluation value is obtained according to the packet loss rate of the UDP tunnel and the TCP tunnel, the propagation delay characteristic of the VPN, and the dynamic and static characteristics of the target address, and the tunnel evaluation value Result may be obtained according to the following formula.
  • r_durl is the ratio of the number of dynamic URLs that access the target address in the preset time period to the number of static URLs that access the target address in the preset time period
  • A is the weight value of r_durl
  • r_udploss is the UDP tunnel.
  • the packet loss rate B is the weight value of r_udploss
  • r_fping is the ratio of the propagation delay of the VPN server to the propagation delay of the destination address
  • the propagation delay of the VPN server is the propagation delay between the VPN client and the VPN server.
  • the destination address propagation delay is the propagation delay between the VPN client and the target address
  • C is the weight value of r_fping
  • r_lfile is the number of response data of the URL that accesses the target address within the preset time period exceeds the maximum file threshold and The ratio of the number of URLs accessing the target address in the preset time period
  • D is the weight value of r_lfile
  • r_tcploss is the packet loss rate of the TCP tunnel
  • E is the weight value of r_tcploss.
  • the TCP tunnel is suitable for data transmission between the VPN client and the VPN server when there are many dynamic URLs of the target address and the packet loss rate of the TCP tunnel is low. Since the parameters in the numerator in the above formula are used to evaluate the proportional relationship of the dynamic URL of the accessed target address and the packet loss rate of the TCP tunnel, the metrics can be used to evaluate the VPN client and the VPN server after the weight parameter adjustment.
  • the TCP tunnel access destination address is affected, and the parameter in the denominator is used to evaluate the target address of the tunnel access between the VPN client and the VPN server. All parameters affecting data transmission are denominator after weight parameter adjustment. Can be used to evaluate the impact of the tunnel access target address between the VPN client and the VPN server.
  • the tunnel evaluation value Result is smaller than the tunnel evaluation threshold, it can be considered that the TCP tunnel access target address between the VPN client and the VPN server is less affected.
  • the TCP tunnel is used to transmit data, the TCP tunnel and the transmitted data are transmitted. The corresponding data.
  • r-fping can be obtained according to the following formula:
  • the vpn-ping_avg can be the average value of the ping delay between the VPN client and the VPN server in the preset detection period, and the dest-ping_avg is the ping delay between the VPN client and the destination address.
  • the average value of the detection period, the ping delay between the VPN client and the destination address can also be understood as the ping delay between the VPN client and the VPN server and the ping delay between the VPN server and the destination address. The sum of the values.
  • R_udploss can be the average of the preset detection period for the packet loss rate of the UDP tunnel between the VPN client and the VPN server.
  • R_tcploss can be the average of the preset detection period for the packet loss rate of the TCP tunnel between the VPN client and the VPN server.
  • R_durl can be obtained according to the following formula:
  • R-durl d-url_count/s-url_count
  • d-url_count is the number of dynamic URLs that access the target address in the preset access period
  • s-url_count is the number of static URLs that access the target address in the preset access period
  • R_lfile can be obtained according to the following formula:
  • the file_count is the number of corresponding data that accesses the target address in the preset access period is greater than the preset response file threshold, and the file_count is the total number of corresponding data that accesses the target address in the preset access period.
  • the preset access period may be 4 hours
  • the preset response file threshold may be 5M Byte.
  • the sum of the weight value A of r_durl and the weight value B of r_udploss may be 1, and the sum of the weight value C of r_fping and the weight value D of r_lfile may be 1 .
  • the weight value A of r_durl may be 0.8
  • the weight value B of r_udploss may be 0.2
  • the weight value C of r_fping may be 0.6
  • the weight value D of r_lfile may be 0.2
  • r_tcploss The weight value E can be 0.2.
  • the tunnel evaluation threshold can be 0.7. When the tunnel evaluation value Result is greater than 0.7, it can be considered that the tunnel, which is the target address, that is, the tunnel evaluation value Result satisfies the condition for using the TCP tunnel.
  • Embodiments of the present invention provide a virtual private network VPN transmission tunnel scheduling method, which acquires a UDP tunnel between a VPN client and a VPN server and a TCP tunnel between a VPN client and a VPN server to access a target address.
  • the access log and the probe data can be used to evaluate whether the tunnel between the VPN server and the target address affects the data transmission of the access target address because the obtained access log and the probe data can be used to evaluate the access target address.
  • the obtained access log and the probe data are analyzed, and the corresponding tunnel transmission access destination address data is selected according to the analysis result, so that the VPN tunnel used for data transmission does not affect the transmission efficiency or transmission quality of the transmitted data. Thereby improving data transmission efficiency, improving data transmission quality, and improving user experience.
  • each network element such as a virtual private network VPN transmission tunnel scheduling device, etc.
  • each network element includes hardware structures and/or software modules corresponding to each function.
  • the present invention can be implemented in a combination of hardware or hardware and computer software in combination with the elements and algorithm steps of the various examples described in the embodiments disclosed herein. Whether a function is implemented in hardware or computer software to drive hardware depends on the specific application and design constraints of the solution. A person skilled in the art can use different methods for implementing the described functions for each particular application, but such implementation should not be considered to be beyond the scope of the present invention.
  • the embodiment of the present invention may divide a function module into a server or the like according to the foregoing method example.
  • each function module may be divided according to each function, or two or more functions may be integrated into one processing module.
  • the above integrated modules can be implemented in the form of hardware or in the form of software functional modules. It should be noted that the division of the module in the embodiment of the present invention is schematic, and is only a logical function division, and the actual implementation may have another division manner.
  • FIG. 5 is a schematic diagram showing a possible structure of the virtual private network VPN transmission tunnel scheduling apparatus 500 involved in the foregoing embodiment, including:
  • the collecting module 501 is configured to collect an access log and probe data of each tunnel access target address between the VPN client and the VPN server at the route.
  • the access log of the target address through the tunnel between the VPN client and the VPN server may include dynamic and static characteristics of the URL of the target address each time in the preset time period, and each access in the preset time period.
  • the probe data of the tunnel access destination address between the VPN client and the VPN server may include the packet loss rate of the tunnel between the VPN client and the VPN server, and the propagation delay between the VPN client and the VPN server. And the propagation delay between the VPN client and the destination address.
  • the target address may be an address of a target network device accessed through a tunnel established between the VPN client and the VPN server, and the target address may be an IP address, or may be otherwise indicated by the VPN client and the VPN server.
  • the address of the network device accessed by the tunnel established between the two is not specifically limited.
  • the tunnel between the VPN client and the VPN server includes a User Datagram Protocol UDP tunnel and a Transmission Control Protocol TCP tunnel.
  • the access log collected at the route may be an access log within a threshold range from the current time.
  • the access log may be collected within 4 hours from the current time; the probe collected at the route
  • the data may be the detection data within a second time threshold range from the current time.
  • the detection data within 15 minutes from the current time may be collected, wherein the first time threshold and the second time threshold correspond to each other, so as to facilitate the collection.
  • the access log and the probe data correspond to each other in time. According to the collected access log and the probe data, it is possible to determine whether the tunnel between the VPN server and the target address will be accessed when the target address is accessed within a certain time range. The data transfer of the destination address has an impact.
  • the target address can be understood as a set of addresses of the plurality of target network devices.
  • the relationship between the propagation delay between the VPN server and the destination address and the propagation delay between the VPN client and the VPN server can also be understood as the physical distance between the VPN server and the network device corresponding to the target address.
  • the dynamic and static characteristics of the URL of the target address for each access to the target address in the preset time period can be understood as the ULR corresponding to the network resource accessed by the network device each time the network device corresponding to the target address is accessed within the preset time period.
  • the dynamic ULR is still a static ULR.
  • the dynamic relationship between the dynamic resources of the network resource acquired by the access target address and the static resource may be determined according to the dynamic and static characteristics of the URL of each access target address in the preset time period;
  • the size of the response data of each access target address in the preset time period can be understood as the response data of the response behavior of the network device for each access to the network device corresponding to the target address within the preset time period.
  • the analysis module 502 is configured to analyze the access log and the probe data, and select a corresponding tunnel transmission access target address data according to the analysis result.
  • a tunnel suitable for data transmission between the VPN client and the VPN server may be determined.
  • the tunnel between the VPN client and the VPN server includes UDP
  • a tunnel and a TCP tunnel are used
  • the rate is low, for example, below a certain threshold, a tunnel with a fast transmission speed can be used for data transmission, for example, using a UDP tunnel for data transmission.
  • the proportional relationship between the propagation delay between the VPN server and the target address and the propagation delay between the VPN client and the VPN server may be determined, and the propagation between the VPN server and the target address is performed.
  • the delay between the VPN client and the VPN server is large, there may be more network elements between the VPN server and the destination address. Therefore, the tunnel between the VPN client and the VPN server should be used. A more reliable tunnel for data transmission, in order to reduce unreliable factors in the entire transmission path.
  • the proportion of the dynamic URL in the URL of the accessed network resource and the distribution of the response data size of the access may be determined.
  • the network device corresponding to the target address may be a service server, and when accessing the service server, a reliable transmission method should be used to ensure the service is guaranteed. At this time, the transmission speed is not the primary consideration. Therefore, the UDP tunnel and the more reliable tunnel in the TCP tunnel should be used for data transmission.
  • the proportion of the response data whose size exceeds a certain threshold in the response data is determined in the total response data, and when the ratio is too high, if the ratio is too high,
  • the tunnel performs data transmission, for example, using a TCP tunnel for data transmission.
  • the amount of retransmitted data is large, thereby increasing the possibility of secondary congestion in the tunnel, and therefore should also Use UDP tunnel for data transmission.
  • the access log and the probe data may be analyzed to determine a corresponding tunnel.
  • routing information may also be generated according to the analysis result, where the routing information is used to schedule data of a corresponding tunnel transmission access target address, thereby using the tunnel used. The transmission efficiency or transmission quality of data transmitted to the target address is not affected, and the user experience is improved.
  • Embodiments of the present invention provide a virtual private network VPN transmission tunnel scheduling apparatus, which collects access logs and probe data of each tunnel access target address between a VPN client and a VPN server, due to the obtained access log and The probe data can be used to evaluate whether the tunnel between the VPN server and the target address affects the data transmission of the access target address when accessing the target address, and therefore can be analyzed according to the access log and the probe data obtained above, and according to the analysis. As a result, the data of the corresponding tunnel transmission access target address is selected, so that the VPN tunnel used for data transmission does not affect the transmission efficiency or transmission quality of the transmitted data, thereby improving data transmission efficiency and improving data transmission quality. At the same time, the user experience is improved.
  • the tunnel evaluation value is obtained according to the packet loss rate of the UDP tunnel and the TCP tunnel, the propagation delay characteristic of the VPN, and the dynamic and static characteristics of the target address, and the tunnel evaluation value Result may be obtained according to the following formula.
  • r_durl is the ratio of the number of dynamic URLs that access the target address in the preset time period to the number of static URLs that access the target address in the preset time period
  • A is the weight value of r_durl
  • r_udploss is the UDP tunnel.
  • the packet loss rate B is the weight value of r_udploss
  • r_fping is the ratio of the propagation delay of the VPN server to the propagation delay of the destination address
  • the propagation delay of the VPN server is the propagation delay between the VPN client and the VPN server.
  • the destination address propagation delay is the propagation delay between the VPN client and the target address
  • C is the weight value of r_fping
  • r_lfile is the number of response data of the URL that accesses the target address within the preset time period exceeds the maximum file threshold and The ratio of the number of URLs accessing the target address in the preset time period
  • D is the weight value of r_lfile
  • r_tcploss is the packet loss rate of the TCP tunnel
  • E is the weight value of r_tcploss.
  • the TCP tunnel is suitable for data transmission between the VPN client and the VPN server when there are many dynamic URLs of the target address and the packet loss rate of the TCP tunnel is low. Since the parameters in the numerator in the above formula are used to evaluate the proportional relationship of the dynamic URL of the accessed target address and the packet loss rate of the TCP tunnel, the metrics can be used to evaluate the VPN client and the VPN server after the weight parameter adjustment.
  • the TCP tunnel access destination address is affected, and the parameter in the denominator is used to evaluate the tunnel access between the VPN client and the VPN server. At the target address, all the parameters affecting the data transmission, after the weight parameter adjustment, the denominator can be used to evaluate the impact of the tunnel access target address between the VPN client and the VPN server.
  • the tunnel evaluation value Result is smaller than the tunnel evaluation threshold, it can be considered that the TCP tunnel access target address between the VPN client and the VPN server is less affected.
  • the TCP tunnel is used to transmit data, the TCP tunnel and the transmitted data are transmitted. The corresponding data.
  • r-fping can be obtained according to the following formula:
  • the vpn-ping_avg can be the average value of the ping delay between the VPN client and the VPN server in the preset detection period, and the dest-ping_avg is the ping delay between the VPN client and the destination address.
  • the average value of the detection period, the ping delay between the VPN client and the destination address can also be understood as the ping delay between the VPN client and the VPN server and the ping delay between the VPN server and the destination address. The sum of the values.
  • R_udploss can be the average of the preset detection period for the packet loss rate of the UDP tunnel between the VPN client and the VPN server.
  • R_tcploss can be the average of the preset detection period for the packet loss rate of the TCP tunnel between the VPN client and the VPN server.
  • R_durl can be obtained according to the following formula:
  • R-durl d-url_count/s-url_count
  • d-url_count is the number of dynamic URLs that access the target address in the preset access period
  • s-url_count is the number of static URLs that access the target address in the preset access period
  • R_lfile can be obtained according to the following formula:
  • the file_count is the number of corresponding data that accesses the target address in the preset access period is greater than the preset response file threshold, and the file_count is the total number of corresponding data that accesses the target address in the preset access period.
  • the preset access period may be 4 hours
  • the preset response file threshold may be 5M Byte.
  • the sum of the weight value A of r_durl and the weight value B of r_udploss may be 1, and the sum of the weight value C of r_fping and the weight value D of r_lfile may be 1 .
  • the weight value A of r_durl may be 0.8
  • the weight value B of r_udploss may be 0.2
  • the weight value C of r_fping may be 0.6
  • the weight value D of r_lfile may be 0.2
  • the weight value E of r_tcploss may be 0.2.
  • the tunnel evaluation threshold can be 0.7. When the tunnel evaluation value Result is greater than 0.7, it can be considered that the tunnel, which is the target address, that is, the tunnel evaluation value Result satisfies the condition for using the TCP tunnel.
  • the TCP tunnel When the tunnel evaluation value Result satisfies the condition for using the TCP tunnel, the TCP tunnel is selected to access the data of the target address; otherwise, the UDP tunnel is selected to access the data of the target address.
  • the collection module 501 is further configured to:
  • the average packet loss rate of the VPN is the average packet loss rate of the network between the VPN client and the VPN server.
  • the analysis module 502 is specifically configured to:
  • the access log and the probe data are analyzed.
  • the average packet loss rate of the VPN may be an average packet loss rate between the VPN client and the VPN server.
  • the tunnel between the VPN client and the VPN server is established between the VPN client and the VPN server.
  • the average VPN packet loss rate can be the average value of vpnpl_avg of the network during the three detection periods for the packet loss rate between the VPN client and the VPN server.
  • vpnpl_avg When vpnpl_avg is greater than or equal to the packet loss rate evaluation threshold, the packet loss rate between the VPN client and the VPN server is high, and the transmission quality is poor. If the VPN client and the VPN server are reliable.
  • the tunnel performs data transmission, for example, using a TCP tunnel for data transmission.
  • the data itself is TCP data, it is easy to increase the probability of datagram retransmission, thereby causing secondary congestion in the tunnel, and since the UDP tunnel itself is disconnected, There is no retransmission of datagrams, so there is no tunnel congestion.
  • the VPN average packet loss rate has a large packet loss rate evaluation threshold, it can be considered that data is directly transmitted through a tunnel with a fast transmission rate between the VPN client and the VPN server, such as a UDP tunnel.
  • the average packet loss rate of the VPN is less than or equal to the packet loss rate evaluation threshold.
  • the solution is that the average packet loss rate of the VPN is smaller than the packet loss rate evaluation threshold, the average packet loss rate of the VPN is equal to the packet loss rate evaluation threshold, and the average packet loss rate of the VPN is less than or equal to the packet loss rate evaluation threshold.
  • the UDP tunnel transmission access data of the target address may be scheduled by default before analyzing the access log and the probe data, that is, the UDP tunnel is used for data transmission by default.
  • FIG. 6 shows a possible structural diagram of the virtual private network VPN transmission tunnel scheduling apparatus involved in the above embodiment.
  • the virtual private network VPN transmission tunnel scheduling apparatus 601 includes a processing module 602 and a communication module 603.
  • the processing module 602 is configured to perform control management on the actions of the base station.
  • the processing module 602 is configured to control the communication module 603 to support the VPN transmission tunnel scheduling apparatus to perform the process 301 in FIG. 3 and the processes 401-402 in FIG. 4 and/or
  • the processing module 602 is configured to support the VPN transport tunneling device to perform the process 302 of FIG. 3 and the processes 403-405 of FIG. 4 and/or other processes for the techniques described herein.
  • the communication module 603 is configured to support communication between the base station and other network entities.
  • the VPN transmission tunnel scheduling apparatus 601 may further include a storage module 604 for storing program codes and data of the VPN transmission tunnel scheduling apparatus 601.
  • the processing module 602 can be a processor or a controller, for example, a central processing unit (CPU), a general-purpose processor, a digital signal processor (DSP), and an application-specific integrated circuit (Application-Specific). Integrated Circuit (ASIC), Field Programmable Gate Array (FPGA) or other programmable logic device, transistor logic device, hardware component, or any combination thereof. It is possible to implement or carry out the various illustrative logical blocks, modules and circuits described in connection with the present disclosure.
  • the processor may also be a combination of computing functions, for example, including one or more microprocessor combinations, a combination of a DSP and a microprocessor, and the like.
  • the communication module 603 can be a transceiver, a transceiver circuit, a communication interface, or the like.
  • the storage module 604 can be a memory.
  • the VPN transmission tunnel scheduling apparatus may be the virtual private network VPN transmission tunnel scheduling apparatus shown in FIG. .
  • the virtual private network VPN transmission tunnel scheduling apparatus 701 includes a processor 702, a communication interface 703, a memory 704, and a bus 705. Among them, the communication interface 703.
  • the processor 702 and the memory 704 are connected to each other through a bus 705.
  • the bus 705 can be a Peripheral Component Interconnect (PCI) bus or an Extended Industry Standard Architecture (EISA) bus.
  • PCI Peripheral Component Interconnect
  • EISA Extended Industry Standard Architecture
  • the bus can be divided into an address bus, a data bus, a control bus, and the like. For ease of representation, only one thick line is shown in Figure 7, but it does not mean that there is only one bus or one type of bus.
  • the steps of a method or algorithm described in connection with the present disclosure may be implemented in a hardware, or may be implemented by a processor executing software instructions.
  • the embodiment of the present invention further provides a storage medium, which may include a memory 704, configured to store computer software instructions used by the virtual private network VPN transmission tunnel scheduling device, including performing the virtual private network VPN transmission provided in the foregoing embodiment.
  • the program code designed by the tunnel scheduling method may be composed of corresponding software modules, and the software modules may be stored in a random access memory (RAM), a flash memory, a read only memory (ROM), and an erasable programmable only.
  • An exemplary storage medium is coupled to the processor to enable the processor to read information from, and write information to, the storage medium.
  • the storage medium can also be an integral part of the processor.
  • the processor and the storage medium can be located in an ASIC. Additionally, the ASIC can be located in a core network interface device.
  • the processor and the storage medium may also exist as discrete components in the core network interface device.
  • the embodiment of the present invention further provides a computer program, which can be directly loaded into the memory 704 and contains software code. After the computer program is loaded and executed by the computer, the virtual private network VPN transmission provided by the foregoing embodiment can be implemented. Tunnel scheduling method.
  • the embodiment of the present invention further provides a virtual private network VPN client server, where the VPN client server includes the virtual private network VPN transmission tunnel scheduling device 701 provided by the foregoing embodiment.
  • Computer readable medium includes a computer Storage media and communication media, including communication media including any medium that facilitates transfer of a computer program from one location to another.
  • a storage medium may be any available media that can be accessed by a general purpose or special purpose computer.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

本发明的实施例提供一种VPN传输隧道调度方法、装置以及VPN客户端服务器,涉及通信领域,能够解决现有技术中使用的VPN隧道可能会影响该VPN隧道所传输数据的传输效率或传输质量的问题,包括:在路由处采集通过VPN客户端与VPN服务端之间的每个隧道访问目标地址的访问日志以及探测数据;分析访问日志以及探测数据,并根据分析结果生成路由信息,以便根据路由信息选择相应的隧道传输访问目标地址的数据。本发明用于调度VPN传输隧道。

Description

一种VPN传输隧道调度方法、装置以及VPN客户端服务器 技术领域
本发明涉及通信领域,尤其涉及一种VPN传输隧道调度方法、装置以及VPN客户端服务器
背景技术
近年来随着英特网(英文全称:Internet)的迅速发展,网络已经无所不在地影响着社会生产的各个方面。随之而来的,针对重要信息资源和网络基础设施的入侵行为和企图入侵行为的数量也持续不断的增加,从而对网络通讯安全造成了极大的威胁。虚拟专用网络(英文全称:Virtual Private Network,英文简称:VPN),是一种常用于大型企业或团体与团体间的私人网络。通过建立VPN可以利用公用的网络架构如英特网在处于不同位置的节点间建立私有数据传输通道,从而在消耗较少资源的前提下为用户提供安全性较高的端到端的网络通讯服务。
现有的VPN在传输数据时,可以将经过加密的数据包通过传输控制协议(英文全称:Transmission Control Protocol,英文简称:TCP)隧道进行传输,也可以通过用户数据报协议(英文全称:User Datagram Protocol,英文简称:UDP)隧道进行传输。其中由于TCP协议为可靠的传输协议,因此通过TCP隧道进行数据传输可以保证所传输数据的可靠性,但由于TCP协议为面向连接,当通过TCP隧道进行数据传输时若出现丢包则需要重传数据,从而导致其传输效率往往较低;而UDP协议中控制选项较少,通过UDP隧道进行数据传输的延迟往往较小、数据传输的效率较高,但由于UDP协议并不对数据传输的可靠性进行保证,当网络环境较差时,通过UDP隧道进行数据传输时会出现较严重的丢包现象。
在实际应用中,当需要通过VPN隧道传输数据时,通常使用预先指定类型的VPN隧道进行数据传输。由于通过VPN隧道所传输数据的种类往往较多,而以上两种类型的VPN隧道在使用过程中均具有各自的优势,但同时也均存在一定的缺陷,因此可能出现预先指定类型的VPN隧道并不 适合通过该VPN隧道所传输的数据的现象,即所使用的VPN隧道可能会影响该VPN隧道所传输数据的传输效率或传输质量,从而损害了用户体验。
发明内容
本发明的实施例提供了一种VPN传输隧道调度方法、装置以及VPN客户端服务器,主要用以解决现有技术中使用的VPN隧道可能会影响该VPN隧道所传输数据的传输效率或传输质量的问题。
为达到上述目的,本申请采用如下技术方案:
第一方面,本发明的实施例提供了一种虚拟专用网络VPN传输隧道调度方法,包括:在路由处采集通过VPN客户端与VPN服务端之间的每个隧道访问目标地址的访问日志以及探测数据;分析访问日志以及探测数据,并根据分析结果选择相应的隧道传输访问目标地址的数据。
第二方面,本发明的实施例提供了一种虚拟专用网络VPN传输隧道调度装置,包括:采集模块,被配置为在路由处采集通过VPN客户端与VPN服务端之间的每个隧道访问目标地址的访问日志以及探测数据;分析模块,被配置为分析访问日志以及探测数据,并根据分析结果选择相应的隧道传输访问目标地址的数据。
第三方面,本发明的实施例提供了一种虚拟专用网络VPN传输隧道调度装置,VPN传输隧道调度装置包括:通信接口、存储器和处理器,存储器用于存储计算机执行代码,计算机执行代码用于控制处理器执行上述第一方面的实施例所提供的VPN传输隧道调度方法。
第四方面,本发明的实施例提供了一种计算机存储介质,用于储存为虚拟专用网络VPN传输隧道调度装置所用的计算机软件指令,其包含执行上述第一方面的实施例所提供的虚拟专用网络VPN传输隧道调度方法所设计的程序代码。
第五方面,本发明的实施例提供了一种计算机程序,可直接加载到计算机的内部存储器中,并含有软件代码,计算机程序经由计算 机载入并执行后能够实现上述第一方面的实施例所提供的虚拟专用网络VPN传输隧道调度方法。
第六方面,本发明的实施例提供了一种虚拟专用网络VPN客户端服务器,其特征在于,包括上述第三方面的实施例所提供的虚拟专用网络VPN传输隧道调度装置。
本发明的实施例提供了一种虚拟专用网络VPN传输隧道调度方法、装置以及VPN客户端服务器,通过采集通过VPN客户端与VPN服务端之间的每个隧道访问目标地址的访问日志以及探测数据,由于所获取的访问日志以及探测数据能够用于评价访问目标地址时VPN服务端与目标地址之间的隧道是否会对访问目标地址的数据传输造成影响,因此可以根据上述所获取的访问日志以及探测数据进行分析,并根据分析结果选择相应的隧道传输访问目标地址的数据,使进行数据传输时所使用的VPN隧道不会对所传输数据的传输效率或传输质量造成影响,从而提高了数据传输效率、改善了数据传输质量,同时改善了用户体验。
附图说明
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1为本发明的实施例所提供的一种VPN系统的示意性结构图;
图2为本发明的另一实施例所提供的一种VPN系统的示意性结构图;
图3为本发明的实施例所提供的一种虚拟专用网络VPN传输隧道调度方法的示意性流程图;
图4为本发明的另一实施例所提供的一种虚拟专用网络VPN传输隧道调度方法的示意性流程图;
图5为本发明的实施例所提供的一种虚拟专用网络VPN传输隧道调度装置的示意性结构图;
图6为本发明的另一实施例所提供的一种虚拟专用网络VPN传输隧 道调度装置的示意性结构图;
图7为本发明的另一实施例所提供的一种虚拟专用网络VPN传输隧道调度装置的示意性结构图。
具体实施方式
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。
如本申请所使用的,术语“单元”、“组件”、“模块”、“系统”等等旨在指代计算机相关实体,该计算机相关实体可以是硬件、固件、硬件和软件的结合、软件或者运行中的软件。例如,组件可以是,但不限于是:在处理器上运行的处理、处理器、对象、可执行文件、执行中的线程、程序和/或计算机。作为示例,在计算设备上运行的应用和该计算设备都可以是组件。一个或多个组件可以存在于执行中的过程和/或线程中,并且组件可以位于一个计算机中以及/或者分布在两个或更多个计算机之间。此外,这些组件能够从在其上具有各种数据结构的各种计算机可读介质中执行。这些组件可以通过诸如根据具有一个或多个数据分组(例如,来自一个组件的数据,该组件与本地系统、分布式系统中的另一个组件进行交互和/或以信号的方式通过诸如互联网之类的网络与其它系统进行交互)的信号,以本地和/或远程过程的方式进行通信。
本申请将围绕可包括多个设备、组件、模块等的系统来呈现各个方面、实施例或特征。应当理解和明白的是,各个系统可以包括另外的设备、组件、模块等,并且/或者可以并不包括结合附图讨论的所有设备、组件、模块等。此外,还可以使用这些方案的组合。
另外,在本发明实施例中,“示例的”一词用于表示作例子、例证或说明。本申请中被描述为“示例”的任何实施例或设计方案不应被解释为比其它实施例或设计方案更优选或更具优势。确切而言,使用示例的一词旨在 以具体方式呈现概念。
本发明实施例中,信息(information),信号(signal),消息(message),信道(channel)有时可以混用,应当指出的是,在不强调其区别时,其所要表达的含义是一致的。“的(of)”,“相应的(corresponding,relevant)”和“对应的(corresponding)”有时可以混用,应当指出的是,在不强调其区别时,其所要表达的含义是一致的。
本发明实施例描述的网络架构以及业务场景是为了更加清楚的说明本发明实施例的技术方案,并不构成对于本发明实施例提供的技术方案的限定,本领域普通技术人员可知,随着网络架构的演变和新业务场景的出现,本发明实施例提供的技术方案对于类似的技术问题,同样适用。
为了便于清楚描述本发明实施例的技术方案,在本发明的实施例中,采用了“第一”、“第二”等字样对功能和作用基本相同的相同项或相似项进行区分,本领域技术人员可以理解“第一”、“第二”等字样并不是在对数量和执行次序进行限定。
通常情况下,为了进行加密通讯,可以在公用网络上建立专用网络,即VPN。如附图1所示,本发明的实施例提供了一种VPN系统,包括:用户终端101,目标访问设备102、第一VPN服务器103以及第二VPN服务器104,第一VPN服务器103以及第二VPN服务器104间建立有VPN隧道,当用户终端101与目标访问设备102相距较远时,可以通过第一VPN服务器103以及第二VPN服务器104间的VPN隧道进行数据传输,以保证数据安全。其中,目标访问设备102可以为提供Web服务的Web服务器。
在大型商业网站中,Web服务一般由集群提供服务,集群中的服务器分别提供图片服务,动态应用,多媒体服务等。其中用户可以通过统一资源定位符(英文全称:Uniform Resource Locator,英文简称:URL)标示从网站获取到的资源,URL可以分为动态URL和静态URL,其中动态URL一般由程序动态生成,也可以称为动态页面,动态链接,例如在URL中出现“?、=、&”这样的参数符号并以“.aspx、.asp、.jsp、.php、.perl、.cgi”为后缀的URL为动态URL;静态URL一般包括媒体文件,HTML文件等内容 文件,也可以称为静态页面,静态URL一般为固定的网站,不包含任何参数或代码,示例性的,静态URL可以为以.htm、.html、.shtml、.xml为后缀的URL。通过分析用户所访问网站的URL,基本可以确定该网站的特点。
随着网络技术的发展,用户所访问站点的网络资源中动态文件或大文件的比例逐渐增大,示例性的,新闻媒体网站以图片服务和视频服务为主,微博等社交网站的动态元素多,文件普遍较小,视频网站一般以媒体文件为主,且通过分片技术,将视频文件存放在媒体服务器,根据统计,Youtube的视频文件平均大小为10MBytes。
表1为网络中网站上的不同类型的资源的大小在2013年底与2014年底的统计数据。
表1
资源类型 2013年底 2014年底 增幅
HTML 57kb 59kb 4%
CSS 46kb 57kb 24%
JavaScript 276kb 295kb 7%
Images 1030kb 1243kb 21%
Flash 87kb 76kb -13%
Other 205kb 223kb 9%
Total 1701kb 1953kb 15%
如表1所示,网站上的不同类型的资源中,HTML的大小随着时间的推移而增大,同时CSS、JavaScript等动态资源也随着时间的推移而增大。
由于现有的VPN隧道的类型通常可以包括TCP类型的VPN隧道以及UDP类型的VPN隧道,其中由于TCP协议为可靠的传输协议,通过TCP类型的VPN隧道进行数据传输时可以保证所传输数据的可靠性,但其传输速率往往较低;而UDP协议中控制选项较少,通过UDP类型的VPN隧道进行数据传输的延迟往往较小、数据传输的效率较高,但当网络质量较差时,通过UDP类型的VPN隧道进行数据传输时会出现较严重的丢包 现象。以上两种类型的VPN隧道在使用过程中均具有各自的优势,但同时也均存在一定的缺陷,因此通常VPN服务商并不会主动为客户选择VPN隧道的类型,而是由用户自行进行选择,例如用户事先对VPN隧道的类型进行配置,当存在使用VPN隧道的需求时,使用预先设定的VPN隧道进行数据传输。
因此当根据用户预设的VPN隧道例如UDP类型的VPN隧道进行数据传输时,可能会出现当用户访问动态资源或大文件比例较高的网站时,因UDP类型的VPN隧道的传输可靠性较差从而导致业务失败的现象,即所使用的VPN隧道与VPN隧道所传输的数据并不对应导致业务失败,从而降低了数据传输的效率,并损害了用户体验。
针对上述问题,本发明的实施例提供了一种虚拟专用网络VPN传输隧道调度方法,其中该方法应用于如附图2所示的VPN系统,该VPN系统包括:用户设备201、VPN客户端202、VPN服务端203以及目标网络设备204,其中,VPN客户端202与VPN服务端203间分别建立有数据报协议UDP隧道与传输控制协议TCP隧道需要说明的是TCP隧道也可以理解为根据TCP协议封装经过加密的数据包并传输,UDP隧道也可以理解为根据UDP协议封装经过加密的数据包并传输。用户设备201通过连接VPN客户端202,可以通过VPN客户端202与VPN服务端203间建立的任一隧道访问目标网络设备204上的网络资源,其中目标网络设备204可以为Web服务器。
如附图3所示,本发明的实施例提供的虚拟专用网络VPN传输隧道调度方法包括:
301、在路由处采集通过VPN客户端与VPN服务端之间的每个隧道访问目标地址的访问日志以及探测数据。
具体的,通过VPN客户端与VPN服务端之间的隧道访问目标地址的访问日志,可以包括预设时间段内每次访问目标地址的URL的动静态特性、在预设时间段内每次访问目标地址的响应数据的大小。通过VPN客户端与VPN服务端之间的隧道访问目标地址的探测数据,可以包括VPN客户端与VPN服务端之间的隧道的丢包率、VPN客户 端与VPN服务端之间的传播时延以及VPN客户端与目标地址之间的传播时延。
具体的,目标地址可以为通过VPN客户端与VPN服务端之间建立的隧道所访问的目标网络设备的地址,目标地址可以为IP地址,也可以为其他能够标示通过VPN客户端以及VPN服务端之间建立的隧道所访问的网络设备的地址,本发明不作具体限定。
优选的,VPN客户端与VPN服务端之间的隧道包括用户数据报协议UDP隧道以及传输控制协议TCP隧道。
需要说明的是,在路由处采集的访问日志可以为距离当前时间第一时间阈值范围内的访问日志,示例性的,可以采集距离当前时刻4个小时内的访问日志;在路由处采集的探测数据可以为距离当前时间第二时间阈值范围内的探测数据,示例性的,可以采集距离当前时刻15分钟内的探测数据,其中第一时间阈值与第二时间阈值相互对应,以便于使所采集的访问日志与探测数据在时间上相互对应,根据所采集的访问日志与探测数据在进行分析时,能够确定一定时间范围内访问目标地址时VPN服务端与目标地址之间的隧道是否会对访问目标地址的数据传输造成影响。当访问多个目标网络设备时,目标地址可以理解为该多个目标网络设备的地址的集合。
VPN服务端与目标地址之间的传播时延以及VPN客户端与VPN服务端之间的传播时延的比例关系,也可以理解为VPN服务端与目标地址对应的网络设备之间的物理距离与VPN客户端与VPN服务端之间的物理距离的比例关系。示例性的,由于可以通过测定ping时延值估算传播时延,因此当测定VPN客户端与VPN服务端之间的ping时延值为P1、测定VPN服务端与目标地址对应的网络设备之间的ping时延值为P2,则可以通过P=P1/(P1+P2)计算传播时延参数P。需要说明的是,当通过测定ping时延值估算传播时延时,可以为通过测定基于控制报文协议(英文全称;Internet Control Message Protocol,英文简称:ICMP)的ping时延值估算传播时延。
在预设时间段内每次访问目标地址的URL的动静态特性,可以理解为在预设时间段内每次访问目标地址对应的网络设备时在该网络设备上访 问的网络资源对应的ULR为动态ULR还是为静态ULR,更进一步的,根据预设时间段内每次访问目标地址的URL的动静态特性可以确定访问目标地址所获取的网络资源动态资源与静态资源的比例关系。
在预设时间段内每次访问目标地址的响应数据的大小,可以理解为在预设时间段内每次访问目标地址对应的网络设备时,该网络设备针对访问行为进行响应的响应数据的大小,示例性的,可以获取在预设时间段内每次访问目标地址对应的网络设备时该网络设备针对访问行为进行响应的响应数据的大小,更进一步的,还可以获取在预设时间段内访问目标地址对应的网络设备时该网络设备针对访问行为进行响应的响应数据的总数量F1,并将该F1个响应数据与响应数据阈值进行对比(该响应数据阈值可以为预先获取),并获取大于该响应数据阈值的响应数据的数量F2,并根据F=F2/F1获取在该预设时间段内访问目标地址的响应数据的大小比例参考值F。
302、分析访问日志以及探测数据,并根据分析结果选择相应的隧道传输访问目标地址的数据。
具体的,根据访问日志以及探测数据可以选择在VPN客户端与VPN服务端之间适于进行数据传输的隧道。
进一步的,当VPN客户端与VPN服务端之间的隧道包括UDP隧道以及TCP隧道时,可以根据UDP隧道和TCP隧道的丢包率,可以确定在VPN客户端与VPN服务端之间适于进行数据传输的隧道,具体的,若UDP隧道与TCP隧道的丢包率均较低例如低于一定阈值时,可以使用传输速度较快的隧道进行数据传输,例如使用UDP隧道进行数据传输。
进一步的,根据传播时延参数可以确定VPN服务端与目标地址之间的传播时延与VPN客户端与VPN服务端间的传播时延的比例关系,当VPN服务端与目标地址之间的传播时延相对于VPN客户端与VPN服务端间的传播时延较大时,VPN服务端与目标地址之间可能存在较多的网元,因此应当使用VPN客户端与VPN服务端之间的中较为可靠的隧道进行数据传输,以便于减少整个传输路径中的不可靠因素。
进一步的,根据所访问目标地址的URL的动静态特性可以确定所访 问的网络资源的URL中动态URL的比例以及访问的响应数据大小的分布。当通过访问的网络资源的URL中动态URL的比例较高时,可以理解为目标地址对应的网络设备可能为业务服务器,当访问该业务服务器时,应该使用可靠的传输方式以便于确保业务得到保障,此时传输速度并不是首要考虑的因此,因此应当使用VPN客户端与VPN服务端之间的较为可靠的隧道进行数据传输。而根据访问目标地址对应的网络设备针对访问的响应数据大小的分布,可以确定响应数据中大小超出一定阈值的响应数据在总的响应数据中所占比例,当该比例过高时,若通过可靠的隧道进行数据传输,例如使用TCP隧道进行数据传输,当由于传输出错导致数据报重新发送时,该重新发送的数据量较多,从而加大隧道发生二次拥塞现象的可能性,因此也应当使用UDP隧道进行数据传输。
根据上述内容,由于根据访问日志以及探测数据能够评价当访问目标地址时,可以确定VPN服务端与目标地址之间的隧道的其中一个与其他隧道相比是否适于传输访问目标地址的数据,因此可以根据访问日志以及探测数据进行分析以确定相应的隧道,示例性的,还可以根据分析结果生成路由信息,该路由信息用于调度相应的隧道传输访问目标地址的数据,从而使所使用的隧道不会对传输访问该目标地址的数据的传输效率或传输质量造成影响,改善了用户体验。
本发明的实施例提供了一种虚拟专用网络VPN传输隧道调度方法,采集通过VPN客户端与VPN服务端之间的每个隧道访问目标地址的访问日志以及探测数据,由于所获取的访问日志以及探测数据能够用于评价访问目标地址时VPN服务端与目标地址之间的隧道是否会对访问目标地址的数据传输造成影响,因此可以根据上述所获取的访问日志以及探测数据进行分析,并根据分析结果选择相应的隧道传输访问目标地址的数据,使进行数据传输时所使用的VPN隧道不会对所传输数据的传输效率或传输质量造成影响,从而提高了数据传输效率、改善了数据传输质量,同时改善了用户体验。
具体的,如附图4所示,本发明的实施例提供了一种虚拟专用网络VPN传输隧道调度方法,包括:
401、获取VPN客户端与VPN服务端之间的UDP隧道以及TCP隧道各自的丢包率、VPN客户端与VPN服务端之间的传播时延、VPN客户端与目标地址之间的传播时延、在预设时间段内每次访问目标地址的URL的动静态特性、在预设时间段内每次访问目标地址的响应数据的大小。
参照上述实施例中步骤301,在此不再赘述。
402、获取VPN平均丢包率。
403、判断VPN平均丢包率是否小于或等于丢包率评价阈值。
当确定VPN平均丢包率小于或等于丢包率评价阈值时,执行步骤404。
具体的,VPN平均丢包率可以为VPN客户端与VPN服务端之间的网络的平均丢包率,其中,VPN客户端与VPN服务端之间隧道建立在VPN客户端与VPN服务端之间的网络上,VPN平均丢包率可以为VPN客户端与VPN服务端之间的网络的丢包率的在三个探测周期的平均值vpnpl_avg。
当vpnpl_avg大于或等于丢包率评价阈值时,说明VPN客户端与VPN服务端之间的隧道的丢包率均较高,传输质量较差,若通过VPN客户端与VPN服务端之间的可靠的隧道进行数据传输,例如使用TCP隧道进行数据传输,当数据本身为TCP数据时,容易提升数据报重新发送的几率,从而造成隧道发生二次拥塞现象,而由于UDP隧道本身为无连接的,不会出现数据报重新发送的现象,因此不会造成隧道堵塞。
因此当VPN平均丢包率大丢包率评价阈值时,可以认为直接通过VPN客户端与VPN服务端之间的传输速率较快的隧道例如UDP隧道进行数据传输。
需要说明的是,VPN平均丢包率小于或等于丢包率评价阈值,可以理解为VPN平均丢包率小于丢包率评价阈值、VPN平均丢包率等于丢包率评价阈值以及VPN平均丢包率小于或等于丢包率评价阈值。
需要说明的是,可以在分析访问日志以及探测数据前默认调度UDP隧道传输访问所述目标地址的数据,即缺省使用UDP隧道进行数据传输。
404、根据UDP隧道以及TCP隧道的丢包率、VPN客户端与VPN服务端之间的传播时延、VPN客户端与目标地址之间的传播时延、在预设时间段内每次访问目标地址的URL的动静态特性、在预设时间段内每次访问目标地址的响应数据的大小求取隧道评价值。
405、比较隧道评价值和隧道评价阈值。
406、根据比较结果判断TCP隧道是否应作为传输访问目标地址的数据的隧道。
具体的,根据UDP隧道和TCP隧道的丢包率、VPN的传播时延特性以及目标地址的动静态特性求取隧道评价值,可以为根据下式求取隧道评价值Result。
Figure PCTCN2016107123-appb-000001
其中r_durl为在预设时间段内访问目标地址的URL为动态URL的数目与在预设时间段内访问目标地址的URL为静态URL的数目的比值、A为r_durl的权重值、r_udploss为UDP隧道的丢包率、B为r_udploss的权重值、r_fping为VPN服务端传播时延与目标地址传播时延的比值,VPN服务端传播时延为VPN客户端与VPN服务端之间的传播时延,目标地址传播时延为VPN客户端与目标地址之间的传播时延、C为r_fping的权重值、r_lfile为在预设时间段内访问目标地址的URL的响应数据超过大文件阈值的数目与在预设时间段内访问目标地址的URL的数目的比值、D为r_lfile的权重值、r_tcploss为TCP隧道的丢包率、E为r_tcploss的权重值。
由于当所访问的目标地址的动态URL较多且TCP隧道的丢包率较低时,TCP隧道适用于在VPN客户端与VPN服务端间进行数据传输。由于在上式中分子中的参数分别用于评价所访问的目标地址的动态URL的比例关系以及TCP隧道的丢包率,经过权重参数调整后分子可以用于评价通过VPN客户端与VPN服务端间的TCP隧道访问目标地址受到的影响,而分母中的参数为用于评价通过VPN客户端与VPN服务端间的隧道访问的目标地址时,影响数据传输的所有参数,经过权重参数调整后分母可以用于评价通过VPN客户端与VPN服务端间的隧道访问目标地址受到的影响。 因此当求取隧道评价值Result小于隧道评价阈值时,可以认为通过VPN客户端与VPN服务端间的TCP隧道访问目标地址受到的影响较小,当使用TCP隧道传输数据时,TCP隧道与所传输的数据对应。
示例性的,r-fping可以根据下式求取:
r-fping=vpn-ping_avg/dest-ping_avg
其中,vpn-ping_avg可以为VPN客户端与VPN服务端之间的ping时延值在预设探测周期的平均值,dest-ping_avg为VPN客户端与目标地址之间的ping时延值在三个探测周期的平均值,VPN客户端与目标地址之间的ping时延值也可以理解为VPN客户端与VPN服务端之间的ping时延值以及VPN服务端与目标地址之间的ping时延值之和。
r_udploss可以为VPN客户端与VPN服务端之间的UDP隧道的丢包率在预设探测周期的平均值。
r_tcploss可以为VPN客户端与VPN服务端之间的TCP隧道的丢包率在预设探测周期的平均值。
r_durl可以根据下式求取:
r-durl=d-url_count/s-url_count
其中,d-url_count为在预设访问周期内访问目标地址的动态URL的数目,s-url_count为在预设访问周期内访问目标地址的静态URL的数目。
r_lfile可以根据下式求取:
r-lfile=lfile_count/file_count
其中,file_count为在预设访问周期内访问目标地址的相应数据大于预设响应文件阈值的数目,file_count为在预设访问周期内访问目标地址的相应数据的总数目。
示例性的,预设访问周期可以为4个小时,预设响应文件阈值可以为5M Byte。
示例性的,r_durl的权重值A与r_udploss的权重值B之和可以为1,r_fping的权重值C与r_lfile的权重值D一级r_tcploss的权重值E之和可以为1。
示例性的,r_durl的权重值A可以为0.8,r_udploss的权重值B可以为0.2,r_fping的权重值C可以为0.6,r_lfile的权重值D可以为0.2,r_tcploss的 权重值E可以为0.2。隧道评价阈值可以为0.7。当隧道评价值Result大于0.7时,可以认为TCP隧道应作为目标地址的隧道即隧道评价值Result满足使用所述TCP隧道的条件。
当隧道评价值Result满足使用所述TCP隧道的条件时,选择TCP隧道传输访问目标地址的数据;否则,选择UDP隧道传输访问目标地址的数据。本发明的实施例提供了一种虚拟专用网络VPN传输隧道调度方法,通过采集通过VPN客户端与VPN服务端之间的UDP隧道以及VPN客户端与VPN服务端之间的TCP隧道访问目标地址的访问日志以及探测数据,由于所获取的访问日志以及探测数据能够用于评价访问目标地址时VPN服务端与目标地址之间的隧道是否会对访问目标地址的数据传输造成影响,因此可以根据上述所获取的访问日志以及探测数据进行分析,并根据分析结果选择相应的隧道传输访问目标地址的数据,使进行数据传输时所使用的VPN隧道不会对所传输数据的传输效率或传输质量造成影响,从而提高了数据传输效率、改善了数据传输质量,同时改善了用户体验。
上述主要从各个网元之间交互的角度对本发明实施例提供的方案进行了介绍。可以理解的是,各个网元,例如虚拟专用网络VPN传输隧道调度装置等为了实现上述功能,其包含了执行各个功能相应的硬件结构和/或软件模块。本领域技术人员应该很容易意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,本发明能够以硬件或硬件和计算机软件的结合形式来实现。某个功能究竟以硬件还是计算机软件驱动硬件的方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本发明的范围。
本发明实施例可以根据上述方法示例对服务器等进行功能模块的划分,例如,可以对应各个功能划分各个功能模块,也可以将两个或两个以上的功能集成在一个处理模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。需要说明的是,本发明实施例中对模块的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。
在采用对应各个功能划分各个功能模块的情况下,附图5示出了上述实施例中所涉及的虚拟专用网络VPN传输隧道调度装置500的一种可能的结构示意图,包括:
采集模块501,被配置为在路由处采集通过VPN客户端与VPN服务端之间的每个隧道访问目标地址的访问日志以及探测数据。
具体的,通过VPN客户端与VPN服务端之间的隧道访问目标地址的访问日志,可以包括预设时间段内每次访问目标地址的URL的动静态特性、在预设时间段内每次访问目标地址的响应数据的大小。通过VPN客户端与VPN服务端之间的隧道访问目标地址的探测数据,可以包括VPN客户端与VPN服务端之间的隧道的丢包率、VPN客户端与VPN服务端之间的传播时延以及VPN客户端与目标地址之间的传播时延。
具体的,目标地址可以为通过VPN客户端与VPN服务端之间建立的隧道所访问的目标网络设备的地址,目标地址可以为IP地址,也可以为其他能够标示通过VPN客户端以及VPN服务端之间建立的隧道所访问的网络设备的地址,本发明不作具体限定。
优选的,VPN客户端与VPN服务端之间的隧道包括用户数据报协议UDP隧道以及传输控制协议TCP隧道。需要说明的是,在路由处采集的访问日志可以为距离当前时间第一时间阈值范围内的访问日志,示例性的,可以采集距离当前时刻4个小时内的访问日志;在路由处采集的探测数据可以为距离当前时间第二时间阈值范围内的探测数据,示例性的,可以采集距离当前时刻15分钟内的探测数据,其中第一时间阈值与第二时间阈值相互对应,以便于使所采集的访问日志与探测数据在时间上相互对应,根据所采集的访问日志与探测数据在进行分析时,能够确定一定时间范围内访问目标地址时VPN服务端与目标地址之间的隧道是否会对访问目标地址的数据传输造成影响。
当访问多个目标网络设备时,目标地址可以理解为该多个目标网络设备的地址的集合。
VPN服务端与目标地址之间的传播时延以及VPN客户端与VPN服务端之间的传播时延的比例关系,也可以理解为VPN服务端与目标地址对应的网络设备之间的物理距离与VPN客户端与VPN服务端之间的物理距离的比例关系。示例性的,由于可以通过测定ping时延值估算传播时延,因此当测定VPN客户端与VPN服务端之间的ping时延值为P1、测定VPN服务端与目标地址对应的网络设备之间的ping时延值为P2,则可以通过P=P1/(P1+P2)计算传播时延参数P。需要说明的是,当通过测定ping时延值估算传播时延时,可以为通过测定基于控制报文协议(英文全称;Internet Control Message Protocol,英文简称:ICMP)的ping时延值估算传播时延。
在预设时间段内每次访问目标地址的URL的动静态特性,可以理解为在预设时间段内每次访问目标地址对应的网络设备时在该网络设备上访问的网络资源对应的ULR为动态ULR还是为静态ULR,更进一步的,根据预设时间段内每次访问目标地址的URL的动静态特性可以确定访问目标地址所获取的网络资源动态资源与静态资源的比例关系;
在预设时间段内每次访问目标地址的响应数据的大小,可以理解为在预设时间段内每次访问目标地址对应的网络设备时,该网络设备针对的访问行为进行响应的响应数据的大小,示例性的,可以获取在预设时间段内每次访问目标地址对应的网络设备时该网络设备针对访问行为进行响应的响应数据的大小,更进一步的,还可以获取在预设时间段内访问目标地址对应的网络设备时该网络设备针对访问行为进行响应的响应数据的总数量F1,并将该F1个响应数据与响应数据阈值进行对比(该响应数据阈值可以为预先获取),并获取大于该响应数据阈值的响应数据的数量F2,并根据F=F2/F1获取在该预设时间段内访问目标地址的响应数据的大小比例参考值F。
分析模块502,被配置为分析访问日志以及探测数据,并根据分析结果选择相应的隧道传输访问目标地址的数据。
具体的,根据访问日志以及探测数据可以确定在VPN客户端与VPN服务端之间适于进行数据传输的隧道。
进一步的,当VPN客户端与VPN服务端之间的隧道包括UDP 隧道以及TCP隧道时,可以根据UDP隧道和TCP隧道的丢包率,可以确定在VPN客户端与VPN服务端之间适于进行数据传输的隧道,具体的,若UDP隧道与TCP隧道的丢包率均较低例如低于一定阈值时,可以使用传输速度较快的隧道进行数据传输,例如使用UDP隧道进行数据传输。
进一步的,根据传播时延参数可以确定VPN服务端与目标地址之间的传播时延与VPN客户端与VPN服务端间的传播时延的比例关系,当VPN服务端与目标地址之间的传播时延相对于VPN客户端与VPN服务端间的传播时延较大时,VPN服务端与目标地址之间可能存在较多的网元,因此应当使用VPN客户端与VPN服务端之间的隧道中较为可靠的隧道进行数据传输,以便于减少整个传输路径中的不可靠因素。
进一步的,根据所访问目标地址的URL的动静态特性可以确定所访问的网络资源的URL中动态URL的比例以及访问的响应数据大小的分布。当通过访问的网络资源的URL中动态URL的比例较高时,可以理解为目标地址对应的网络设备可能为业务服务器,当访问该业务服务器时,应该使用可靠的传输方式以便于确保业务得到保障,此时传输速度并不是首要考虑的因此,因此应当使用UDP隧道和TCP隧道中较为可靠的隧道进行数据传输。而根据访问目标地址对应的网络设备针对访问的响应数据大小的分布,可以确定响应数据中大小超出一定阈值的响应数据在总的响应数据中所占比例,当该比例过高时,若通过可靠的隧道进行数据传输,例如使用TCP隧道进行数据传输,当由于传输出错导致数据报重新发送时,该重新发送的数据量较多,从而加大隧道发生二次拥塞现象的可能性,因此也应当使用UDP隧道进行数据传输。
根据上述内容,由于根据访问日志以及探测数据能够评价当访问目标地址时,可以确定VPN服务端与目标地址之间的隧道的其中一个与其他隧道相比是否适于传输访问目标地址的数据,因此可以根据访问日志以及探测数据进行分析以确定相应的隧道,示例性的,还可以根据分析结果生成路由信息,该路由信息用于调度相应的隧道传输访问目标地址的数据,从而使所使用的隧道不会对传输访问该目标地址的数据的传输效率或传输质量造成影响,改善了用户体验。
本发明的实施例提供了一种虚拟专用网络VPN传输隧道调度装置,采集通过VPN客户端与VPN服务端之间的每个隧道访问目标地址的访问日志以及探测数据,由于所获取的访问日志以及探测数据能够用于评价访问目标地址时VPN服务端与目标地址之间的隧道是否会对访问目标地址的数据传输造成影响,因此可以根据上述所获取的访问日志以及探测数据进行分析,并根据分析结果选择相应的隧道传输访问目标地址的数据,使进行数据传输时所使用的VPN隧道不会对所传输数据的传输效率或传输质量造成影响,从而提高了数据传输效率、改善了数据传输质量,同时改善了用户体验。
具体的,根据UDP隧道和TCP隧道的丢包率、VPN的传播时延特性以及目标地址的动静态特性求取隧道评价值,可以为根据下式求取隧道评价值Result。
Figure PCTCN2016107123-appb-000002
其中r_durl为在预设时间段内访问目标地址的URL为动态URL的数目与在预设时间段内访问目标地址的URL为静态URL的数目的比值、A为r_durl的权重值、r_udploss为UDP隧道的丢包率、B为r_udploss的权重值、r_fping为VPN服务端传播时延与目标地址传播时延的比值,VPN服务端传播时延为VPN客户端与VPN服务端之间的传播时延,目标地址传播时延为VPN客户端与目标地址之间的传播时延、C为r_fping的权重值、r_lfile为在预设时间段内访问目标地址的URL的响应数据超过大文件阈值的数目与在预设时间段内访问目标地址的URL的数目的比值、D为r_lfile的权重值、r_tcploss为TCP隧道的丢包率、E为r_tcploss的权重值。
由于当所访问的目标地址的动态URL较多且TCP隧道的丢包率较低时,TCP隧道适用于在VPN客户端与VPN服务端间进行数据传输。由于在上式中分子中的参数分别用于评价所访问的目标地址的动态URL的比例关系以及TCP隧道的丢包率,经过权重参数调整后分子可以用于评价通过VPN客户端与VPN服务端间的TCP隧道访问目标地址受到的影响,而分母中的参数为用于评价通过VPN客户端与VPN服务端间的隧道访问的 目标地址时,影响数据传输的所有参数,经过权重参数调整后分母可以用于评价通过VPN客户端与VPN服务端间的隧道访问目标地址受到的影响。因此当求取隧道评价值Result小于隧道评价阈值时,可以认为通过VPN客户端与VPN服务端间的TCP隧道访问目标地址受到的影响较小,当使用TCP隧道传输数据时,TCP隧道与所传输的数据对应。
示例性的,r-fping可以根据下式求取:
r-fping=vpn-ping_avg/dest-ping_avg
其中,vpn-ping_avg可以为VPN客户端与VPN服务端之间的ping时延值在预设探测周期的平均值,dest-ping_avg为VPN客户端与目标地址之间的ping时延值在三个探测周期的平均值,VPN客户端与目标地址之间的ping时延值也可以理解为VPN客户端与VPN服务端之间的ping时延值以及VPN服务端与目标地址之间的ping时延值之和。
r_udploss可以为VPN客户端与VPN服务端之间的UDP隧道的丢包率在预设探测周期的平均值。
r_tcploss可以为VPN客户端与VPN服务端之间的TCP隧道的丢包率在预设探测周期的平均值。
r_durl可以根据下式求取:
r-durl=d-url_count/s-url_count
其中,d-url_count为在预设访问周期内访问目标地址的动态URL的数目,s-url_count为在预设访问周期内访问目标地址的静态URL的数目。
r_lfile可以根据下式求取:
r-lfile=lfile_count/file_count
其中,file_count为在预设访问周期内访问目标地址的相应数据大于预设响应文件阈值的数目,file_count为在预设访问周期内访问目标地址的相应数据的总数目。
示例性的,预设访问周期可以为4个小时,预设响应文件阈值可以为5M Byte。
示例性的,r_durl的权重值A与r_udploss的权重值B之和可以为1,r_fping的权重值C与r_lfile的权重值D一级r_tcploss的权重值E之和可以为1。
示例性的,r_durl的权重值A可以为0.8,r_udploss的权重值B可以为0.2,r_fping的权重值C可以为0.6,r_lfile的权重值D可以为0.2,r_tcploss的权重值E可以为0.2。隧道评价阈值可以为0.7。当隧道评价值Result大于0.7时,可以认为TCP隧道应作为目标地址的隧道即隧道评价值Result满足使用所述TCP隧道的条件。
当隧道评价值Result满足使用所述TCP隧道的条件时,选择TCP隧道传输访问目标地址的数据;否则,选择UDP隧道传输访问目标地址的数据。
具体的,采集模块501还被配置为:
在分析访问日志以及探测数据前,获取VPN平均丢包率,VPN平均丢包率为VPN客户端与VPN服务端之间的网络的平均丢包率;
分析模块502具体被配置为:
当VPN平均丢包率小于或等于丢包率评价阈值时,分析访问日志以及探测数据。
具体的,VPN平均丢包率可以为VPN客户端与VPN服务端之间的网络的平均丢包率,其中,VPN客户端与VPN服务端之间隧道建立在VPN客户端与VPN服务端之间的网络上,VPN平均丢包率可以为VPN客户端与VPN服务端之间的网络的丢包率的在三个探测周期的平均值vpnpl_avg。
当vpnpl_avg大于或等于丢包率评价阈值时,说明VPN客户端与VPN服务端之间的隧道的丢包率均较高,传输质量较差,若通过VPN客户端与VPN服务端之间的可靠的隧道进行数据传输,例如使用TCP隧道进行数据传输,当数据本身为TCP数据时,容易提升数据报重新发送的几率,从而造成隧道发生二次拥塞现象,而由于UDP隧道本身为无连接的,不会出现数据报重新发送的现象,因此不会造成隧道堵塞。
因此当VPN平均丢包率大丢包率评价阈值时,可以认为直接通过VPN客户端与VPN服务端之间的传输速率较快的隧道例如UDP隧道进行数据传输。
需要说明的是,VPN平均丢包率小于或等于丢包率评价阈值,可以理 解为VPN平均丢包率小于丢包率评价阈值、VPN平均丢包率等于丢包率评价阈值以及VPN平均丢包率小于或等于丢包率评价阈值。
需要说明的是,可以在分析访问日志以及探测数据前默认调度UDP隧道传输访问所述目标地址的数据,即缺省使用UDP隧道进行数据传输。
在采用集成的单元的情况下,附图6示出了上述实施例中所涉及的虚拟专用网络VPN传输隧道调度装置的一种可能的结构示意图。虚拟专用网络VPN传输隧道调度装置601包括:处理模块602和通信模块603。处理模块602用于对基站的动作进行控制管理,例如,处理模块602用于控制通信模块603支持VPN传输隧道调度装置执行图3中的过程301以及图4中的过程401-402和/或用于本文所描述的技术的其它过程,处理模块602用于支持VPN传输隧道调度装置执行图3中的过程302以及图4中的过程403-405和/或用于本文所描述的技术的其它过程。通信模块603用于支持基站与其他网络实体的通信,VPN传输隧道调度装置601还可以包括存储模块604,用于存储VPN传输隧道调度装置601的程序代码和数据。
其中,处理模块602可以是处理器或控制器,例如可以是中央处理器(Central Processing Unit,CPU),通用处理器,数字信号处理器(Digital Signal Processor,DSP),专用集成电路(Application-Specific Integrated Circuit,ASIC),现场可编程门阵列(Field Programmable Gate Array,FPGA)或者其他可编程逻辑器件、晶体管逻辑器件、硬件部件或者其任意组合。其可以实现或执行结合本发明公开内容所描述的各种示例性的逻辑方框,模块和电路。所述处理器也可以是实现计算功能的组合,例如包含一个或多个微处理器组合,DSP和微处理器的组合等等。通信模块603可以是收发器、收发电路或通信接口等。存储模块604可以是存储器。
当处理模块602为处理器,通信模块603为通信接口,存储模块604为存储器时,本发明实施例所涉及的VPN传输隧道调度装置可以为附图7所示的虚拟专用网络VPN传输隧道调度装置。
参阅附图7所示,该虚拟专用网络VPN传输隧道调度装置701包括:处理器702、通信接口703、存储器704以及总线705。其中,通信接口 703、处理器702以及存储器704通过总线705相互连接;总线705可以是外设部件互连标准(Peripheral Component Interconnect,PCI)总线或扩展工业标准结构(Extended Industry Standard Architecture,EISA)总线等。所述总线可以分为地址总线、数据总线、控制总线等。为便于表示,附图7中仅用一条粗线表示,但并不表示仅有一根总线或一种类型的总线。
结合本发明公开内容所描述的方法或者算法的步骤可以硬件的方式来实现,也可以是由处理器执行软件指令的方式来实现。本发明实施例还提供一种存储介质,该存储介质可以包括存储器704,用于储存虚拟专用网络VPN传输隧道调度装置所用的计算机软件指令,其包含执行上述实施例中提供的虚拟专用网络VPN传输隧道调度方法所设计的程序代码。具体的,软件指令可以由相应的软件模块组成,软件模块可以被存放于随机存取存储器(Random Access Memory,RAM)、闪存、只读存储器(Read Only Memory,ROM)、可擦除可编程只读存储器(Erasable Programmable ROM,EPROM)、电可擦可编程只读存储器(Electrically EPROM,EEPROM)、寄存器、硬盘、移动硬盘、只读光盘(CD-ROM)或者本领域熟知的任何其它形式的存储介质中。一种示例性的存储介质耦合至处理器,从而使处理器能够从该存储介质读取信息,且可向该存储介质写入信息。当然,存储介质也可以是处理器的组成部分。处理器和存储介质可以位于ASIC中。另外,该ASIC可以位于核心网接口设备中。当然,处理器和存储介质也可以作为分立组件存在于核心网接口设备中。
本发明实施例还提供一种计算机程序,该计算机程序可直接加载到存储器704中,并含有软件代码,该计算机程序经由计算机载入并执行后能够实现上述实施例所提供的虚拟专用网络VPN传输隧道调度方法。
本发明实施例还提供一种虚拟专用网络VPN客户端服务器,该VPN客户端服务器包括上述实施例提供的虚拟专用网络VPN传输隧道调度装置701。
本领域技术人员应该可以意识到,在上述一个或多个示例中,本发明所描述的功能可以用硬件、软件、固件或它们的任意组合来实现。当使用软件实现时,可以将这些功能存储在计算机可读介质中或者作为计算机可读介质上的一个或多个指令或代码进行传输。计算机可读介质包括计算机 存储介质和通信介质,其中通信介质包括便于从一个地方向另一个地方传送计算机程序的任何介质。存储介质可以是通用或专用计算机能够存取的任何可用介质。
以上所述的具体实施方式,对本发明的目的、技术方案和有益效果进行了进一步详细说明,所应理解的是,以上所述仅为本发明的具体实施方式而已,并不用于限定本发明的保护范围,凡在本发明的技术方案的基础之上,所做的任何修改、等同替换、改进等,均应包括在本发明的保护范围之内。

Claims (16)

  1. 一种虚拟专用网络VPN传输隧道调度方法,其特征在于,包括:在路由处采集通过VPN客户端与VPN服务端之间的每个隧道访问目标地址的访问日志以及探测数据;
    分析所述访问日志以及所述探测数据,并根据分析结果选择相应的隧道传输访问所述目标地址的数据。
  2. 根据权利要求1所述的VPN传输隧道调度方法,其特征在于,所述VPN客户端与所述VPN服务端之间的隧道包括用户数据报协议UDP隧道以及传输控制协议TCP隧道。
  3. 根据权利要求2所述的VPN传输隧道调度方法,其特征在于,所述探测数据包括以下一项或多项:所述VPN客户端与所述VPN服务端之间的隧道的丢包率、所述VPN客户端与所述VPN服务端之间的传播时延以及所述VPN客户端与所述目标地址之间的传播时延;
    所述访问日志包括以下一项或多项:在预设时间段内每次访问所述目标地址的URL的动静态特性以及在预设时间段内每次访问所述目标地址的响应数据的大小。
  4. 根据权利要3所述的VPN传输隧道调度方法,其特征在于,所述根据分析结果选择相应的传输隧道,包括:
    根据
    Figure PCTCN2016107123-appb-100001
    求取隧道评价值Result,其中r_durl为在预设时间段内访问所述目标地址的URL为动态URL的数目与在预设时间段内访问所述目标地址的URL为静态URL的数目的比值、A为所述r_durl的权重值、r_udploss为所述UDP隧道的丢包率、B为所述r_udploss的权重值、r_fping为所述VPN服务端传播时延与目标地址传播时延的比值,所述VPN服务端传播时延为所述VPN客户端与所述VPN服务端之间的传播时延,所述目标地址传播时延为所述VPN客户端与所述目标地址之间的传播时延、 C为所述r_fping的权重值、r_lfile为在预设时间段内访问所述目标地址的URL的响应数据超过大文件阈值的数目与在预设时间段内访问所述目标地址的URL的数目的比值、D为所述r_lfile的权重值、r_tcploss为所述TCP隧道的丢包率、E为所述r_tcploss的权重值;
    当所述隧道评价值Result满足使用所述TCP隧道的条件时,选择所述TCP隧道传输访问所述目标地址的数据;否则,选择所述UDP隧道传输访问所述目标地址的数据。
  5. 根据权利要4所述的VPN传输隧道调度方法,其特征在于,在所述分析所述访问日志以及所述探测数据前,所述方法还包括:
    调度所述UDP隧道传输访问所述目标地址的数据。
  6. 根据权利要求1-5中任一项所述的VPN传输隧道调度方法,其特征在于,在所述分析所述访问日志以及所述探测数据前,所述方法还包括:
    获取VPN平均丢包率,所述VPN平均丢包率为所述VPN客户端与所述VPN服务端之间的网络的平均丢包率;
    所述分析所述访问日志以及所述探测数据,包括:
    当所述VPN平均丢包率小于或等于丢包率评价阈值时,分析所述访问日志以及所述探测数据。
  7. 一种虚拟专用网络VPN传输隧道调度装置,其特征在于,包括:
    采集模块,被配置为在路由处采集通过VPN客户端与VPN服务端之间的每个隧道访问目标地址的访问日志以及探测数据;
    分析模块,被配置为分析所述访问日志以及所述探测数据,并根据分析结果选择相应的隧道传输访问所述目标地址的数据。
  8. 根据权利要求7所述的VPN传输隧道调度装置,其特征在于,所述VPN客户端与所述VPN服务端之间的隧道包括用户数据报协议UDP隧道以及传输控制协议TCP隧道。
  9. 根据权利要求8所述的VPN传输隧道调度装置,其特征在 于,所述探测数据包括以下一项或多项:所述VPN客户端与所述VPN服务端之间的隧道的丢包率、所述VPN客户端与所述VPN服务端之间的传播时延以及所述VPN客户端与所述目标地址之间的传播时延;
    所述访问日志包括以下一项或多项:在预设时间段内每次访问所述目标地址的URL的动静态特性以及在预设时间段内每次访问所述目标地址的响应数据的大小。
  10. 根据权利要9所述的VPN传输隧道调度装置,其特征在于,所述分析模块具体被配置为:
    根据
    Figure PCTCN2016107123-appb-100002
    求取隧道评价值Result,其中r_durl为在预设时间段内访问所述目标地址的URL为动态URL的数目与在预设时间段内访问所述目标地址的URL为静态URL的数目的比值、A为所述r_durl的权重值、r_udploss为所述UDP隧道的丢包率、B为所述r_udploss的权重值、r_fping为所述VPN服务端传播时延与目标地址传播时延的比值,所述VPN服务端传播时延为所述VPN客户端与所述VPN服务端之间的传播时延,所述目标地址传播时延为所述VPN客户端与所述目标地址之间的传播时延、C为所述r_fping的权重值、r_lfile为在预设时间段内访问所述目标地址的URL的响应数据超过大文件阈值的数目与在预设时间段内访问所述目标地址的URL的数目的比值、D为所述r_lfile的权重值、r_tcploss为所述TCP隧道的丢包率、E为所述r_tcploss的权重值,当所述隧道评价值Result满足使用所述TCP隧道的条件时,选择所述TCP隧道传输访问所述目标地址的数据;否则,选择所述UDP隧道传输访问所述目标地址的数据。
  11. 根据权利要10所述的VPN传输隧道调度装置,其特征在于,所述分析模块还被配置为:
    在所述分析所述访问日志以及所述探测数据前,调度所述UDP隧道传输访问所述目标地址的数据。
  12. 根据权利要求7-11中任一项所述的VPN传输隧道调度装置,其特征在于,所述采集模块还被配置为:
    在所述分析所述访问日志以及所述探测数据前,获取VPN平均丢包率,所述VPN平均丢包率为所述VPN客户端与所述VPN服务端之间的网络的平均丢包率;
    所述分析模块具体被配置为:
    当所述VPN平均丢包率小于或等于丢包率评价阈值时,分析所述访问日志以及所述探测数据。
  13. 一种虚拟专用网络VPN传输隧道调度装置,其特征在于,所述VPN传输隧道调度装置包括:通信接口、存储器和处理器,所述存储器用于存储计算机执行代码,所述计算机执行代码用于控制所述处理器执行权利要求1-6中任一项所述的虚拟专用网络VPN传输隧道调度方法。
  14. 一种计算机存储介质,其特征在于,用于储存为虚拟专用网络VPN传输隧道调度装置所用的计算机软件指令,其包含执行权利要1-6中任一项所述的虚拟专用网络VPN传输隧道调度方法所设计的程序代码。
  15. 一种计算机程序,其特征在于,可直接加载到计算机的内部存储器中,并含有软件代码,所述计算机程序经由计算机载入并执行后能够实现权利要求1-6中任一项所述的虚拟专用网络VPN传输隧道调度方法。
  16. 一种虚拟专用网络VPN客户端服务器,其特征在于,包括权利要求13所述的虚拟专用网络VPN传输隧道调度装置。
PCT/CN2016/107123 2016-11-24 2016-11-24 一种vpn传输隧道调度方法、装置以及vpn客户端服务器 WO2018094654A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2016/107123 WO2018094654A1 (zh) 2016-11-24 2016-11-24 一种vpn传输隧道调度方法、装置以及vpn客户端服务器
CN201680006899.5A CN107624233B (zh) 2016-11-24 2016-11-24 一种vpn传输隧道调度方法、装置以及vpn客户端服务器

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2016/107123 WO2018094654A1 (zh) 2016-11-24 2016-11-24 一种vpn传输隧道调度方法、装置以及vpn客户端服务器

Publications (1)

Publication Number Publication Date
WO2018094654A1 true WO2018094654A1 (zh) 2018-05-31

Family

ID=61087291

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/107123 WO2018094654A1 (zh) 2016-11-24 2016-11-24 一种vpn传输隧道调度方法、装置以及vpn客户端服务器

Country Status (2)

Country Link
CN (1) CN107624233B (zh)
WO (1) WO2018094654A1 (zh)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113297148A (zh) * 2021-06-18 2021-08-24 杭州安恒信息安全技术有限公司 业务日志数据的采集方法、装置、设备及可读存储介质
CN114900396A (zh) * 2022-05-18 2022-08-12 上海戎磐网络科技有限公司 网络安全管理方法、装置以及存储介质
CN115134768A (zh) * 2022-06-09 2022-09-30 国网信息通信产业集团有限公司 一种基于应用层信令的无线通信优化方法及系统
CN116938639A (zh) * 2023-09-13 2023-10-24 中移(苏州)软件技术有限公司 虚拟专用网络接入方法、设备及存储介质

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112583685A (zh) * 2019-09-27 2021-03-30 厦门网宿有限公司 一种Ipsec VPN的数据传输方法及装置
CN110838967B (zh) * 2019-11-22 2021-12-24 达闼机器人有限公司 虚拟专用网络的连接方法、服务器、客户端和存储介质
CN111711534B (zh) * 2020-05-27 2023-05-05 新浪技术(中国)有限公司 网络服务质量分析方法、装置、系统、设备和存储介质
CN112039727B (zh) * 2020-08-26 2022-04-01 北京字节跳动网络技术有限公司 数据传输方法、装置、电子设备及存储介质
CN112260926B (zh) * 2020-10-16 2022-06-03 上海叠念信息科技有限公司 虚拟专用网络的数据传输系统、方法、装置、设备及存储介质
CN113765765B (zh) * 2021-08-11 2023-04-07 西安四叶草信息技术有限公司 数据传输系统
CN114285791B (zh) * 2021-12-17 2023-07-07 上海绚显科技有限公司 数据传输方法、装置、计算机设备及存储介质
CN114448670B (zh) * 2021-12-27 2023-06-23 天翼云科技有限公司 一种数据传输方法、装置及电子设备

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103067243A (zh) * 2012-12-21 2013-04-24 华为技术有限公司 通信方法及相关设备
CN104426732A (zh) * 2013-08-19 2015-03-18 华耀(中国)科技有限公司 一种高速传输隧道的实现方法及系统
US20150229490A1 (en) * 2014-02-12 2015-08-13 Hob Gmbh & Co. Kg Communication system for transmittingunder a tunnel protocol between at least two data computers via a wide area network and a method for running such a communication system
US20160099917A1 (en) * 2014-10-06 2016-04-07 Cryptzone North America, Inc. Multi-tunneling virtual network adapter

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2919778A1 (fr) * 2007-07-30 2009-02-06 Canon Kk Procede de transmission de paquets de donnees dans un tunnel, produit programme d'ordinateur, moyen de stockage et tete de tunnel correspondants
US8228830B2 (en) * 2008-01-04 2012-07-24 International Business Machines Corporation Using a transmission control protocol (TCP) channel to save power for virtual private networks (VPNs) that use user datagram protocol (UDP)
FR2926939A1 (fr) * 2008-01-30 2009-07-31 Canon Kk Procede de transmission de donnees avec anticipation des acquittements, dispositif d'entree, produit programme d'ordinateur et moyen de stockage correspondants
US8638717B2 (en) * 2010-08-20 2014-01-28 Time Warner Cable Enterprises Llc System and method for maintaining a communication session

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103067243A (zh) * 2012-12-21 2013-04-24 华为技术有限公司 通信方法及相关设备
CN104426732A (zh) * 2013-08-19 2015-03-18 华耀(中国)科技有限公司 一种高速传输隧道的实现方法及系统
US20150229490A1 (en) * 2014-02-12 2015-08-13 Hob Gmbh & Co. Kg Communication system for transmittingunder a tunnel protocol between at least two data computers via a wide area network and a method for running such a communication system
US20160099917A1 (en) * 2014-10-06 2016-04-07 Cryptzone North America, Inc. Multi-tunneling virtual network adapter

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113297148A (zh) * 2021-06-18 2021-08-24 杭州安恒信息安全技术有限公司 业务日志数据的采集方法、装置、设备及可读存储介质
CN113297148B (zh) * 2021-06-18 2023-06-06 杭州安恒信息安全技术有限公司 业务日志数据的采集方法、装置、设备及可读存储介质
CN114900396A (zh) * 2022-05-18 2022-08-12 上海戎磐网络科技有限公司 网络安全管理方法、装置以及存储介质
CN115134768A (zh) * 2022-06-09 2022-09-30 国网信息通信产业集团有限公司 一种基于应用层信令的无线通信优化方法及系统
CN116938639A (zh) * 2023-09-13 2023-10-24 中移(苏州)软件技术有限公司 虚拟专用网络接入方法、设备及存储介质
CN116938639B (zh) * 2023-09-13 2023-12-01 中移(苏州)软件技术有限公司 虚拟专用网络接入方法、设备及存储介质

Also Published As

Publication number Publication date
CN107624233A (zh) 2018-01-23
CN107624233B (zh) 2020-05-15

Similar Documents

Publication Publication Date Title
WO2018094654A1 (zh) 一种vpn传输隧道调度方法、装置以及vpn客户端服务器
US10148542B2 (en) Monitoring domain allocation performance
CA2973991C (en) Determining link conditions of a client lan/wan from measurement point to client devices and application servers of interest
EP3389220B1 (en) Network status evaluation
US20090245114A1 (en) Methods for collecting and analyzing network performance data
US20110078291A1 (en) Distributed performance monitoring in soft real-time distributed systems
TWI661717B (zh) 構成從至少一伺服器接收多媒體內容的客戶端終端機下載行為之適應方法及其終端機
EP3295612B1 (en) Uplink performance management
US9503506B2 (en) Transit-mode-based webpage accessing method, system, and crawler route server
US20200213186A1 (en) Detecting sources of computer network failures
US20150063132A1 (en) Bandwidth estimation mechanism for a communication network
WO2017162117A1 (zh) 一种集群精确限速方法和装置
US8572245B1 (en) Using the TCP window size for identifying packets and debugging
KR20150131327A (ko) 애플리케이션-제공 전송 메타데이터에 기초한 네트워크 전송 조절
Sundberg et al. Efficient continuous latency monitoring with eBPF
CN107992416B (zh) 一种网页时延的确定方法及装置
WO2017011981A1 (zh) 一种流表项的定时处理方法及装置
US10225177B2 (en) Network proxy detection
CN113411228A (zh) 一种网络状况的确定方法及服务器
Flach et al. Diagnosing slow web page access at the client side
US9882751B2 (en) Communication system, communication controller, communication control method, and medium
Völker et al. The Search of the Path MTU with QUIC
Caviglione et al. Characterizing SPDY over high latency satellite channels
WO2017041569A1 (zh) 业务数据传输方法及装置
Schulte et al. On detecting TCP path saturation in LTE networks

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16922251

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: 1205A 08.10.2019

122 Ep: pct application non-entry in european phase

Ref document number: 16922251

Country of ref document: EP

Kind code of ref document: A1