CN102299923B - Session-Receiver register method in Internet performance measurement system - Google Patents
Session-Receiver register method in Internet performance measurement system Download PDFInfo
- Publication number
- CN102299923B CN102299923B CN201110238461.9A CN201110238461A CN102299923B CN 102299923 B CN102299923 B CN 102299923B CN 201110238461 A CN201110238461 A CN 201110238461A CN 102299923 B CN102299923 B CN 102299923B
- Authority
- CN
- China
- Prior art keywords
- probe
- message
- registration
- keepalive
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
本发明公开了一种互联网性能测量系统中的探针注册方法。本发明的目的是在TWAMP协议系统之上,在控制服务器与探针(Session-Sender和Session-Receiver)之间建立一种探针注册方法,以保证探针的真实性,即探针应该是系统使用者所认可的“真实”的探针,而不是虚假或假冒的测量节点,并通过Keepalive信息来维护探针的状态,从而保证整个测量系统的安全。
The invention discloses a probe registration method in an Internet performance measurement system. The purpose of the present invention is to set up a probe registration method between the control server and probes (Session-Sender and Session-Receiver) on the TWAMP protocol system to ensure the authenticity of the probes, that is, the probes should be The "real" probes recognized by system users, rather than false or counterfeit measurement nodes, maintain the status of the probes through Keepalive information, thereby ensuring the security of the entire measurement system.
Description
技术领域technical field
本发明涉及互联网技术领域,特别涉及一种互联网性能测量系统中的探针注册方法。The invention relates to the technical field of the Internet, in particular to a probe registration method in an Internet performance measurement system.
背景技术Background technique
互联网是目前信息网络重要基础设施之一,然而互联网的端到端性能问题一直是网络管理者的一大难题。The Internet is one of the important infrastructures of the current information network. However, the end-to-end performance of the Internet has always been a major problem for network managers.
随着Internet技术和网络业务的飞速发展,用户对网络资源的需求空前增长,网络也变得越来越复杂。不断增加的网络用户和应用,导致网络负担沉重,网络设备超负荷运转,从而引起网络性能下降。这就需要对网络的性能指标进行提取与分析,对网络性能进行改善和提高。因此网络性能测量便应运而生。发现网络瓶颈,优化网络配置,并进一步发现网络中可能存在的潜在危险,更加有效地进行网络性能管理,提供网络服务质量的验证和控制,对服务提供商的服务质量指标进行量化、比较和验证,是网络性能测量的主要目的。With the rapid development of Internet technology and network services, users' demand for network resources has increased unprecedentedly, and networks have become more and more complex. The ever-increasing network users and applications lead to heavy network load and overloading of network equipment, resulting in network performance degradation. This requires extraction and analysis of network performance indicators to improve and improve network performance. Therefore, network performance measurement emerges as the times require. Discover network bottlenecks, optimize network configuration, and further discover potential dangers that may exist in the network, manage network performance more effectively, provide verification and control of network service quality, and quantify, compare and verify service quality indicators of service providers , is the main purpose of network performance measurement.
互联网是一种分组化的网络,以TCP/IP技术为基础,在网络层上对数据报文进行逐跳的寻址与转发。由于每一跳的网络节点只负责本节点的数据转发,节点之间彼此相互独立,而当前的网络管理系统都是以单个节点为管理对象,因此网络管理者很难获得网络性能的全貌。在这种背景下,需要网络测量系统以互联网用户的身份将网络作为黑盒来对网络性能进行主动测量。The Internet is a packetized network, based on TCP/IP technology, addressing and forwarding data packets hop by hop at the network layer. Since the network node of each hop is only responsible for the data forwarding of the node, the nodes are independent of each other, and the current network management system only takes a single node as the management object, so it is difficult for the network manager to obtain the overall picture of the network performance. In this context, network measurement systems are required to actively measure network performance by using the network as a black box in the identity of Internet users.
在国际上进行网络主动测量研究的项目很多,如IEPM、NIMI、NLANRAMP、Surveyor等,其中IETF所开发的TWAMP(Two Way ActiveMeasurement Protocol)协议(RFC5357)是其中比较有影响的方法之一。There are many research projects on network active measurement in the world, such as IEPM, NIMI, NLANRAMP, Surveyor, etc. Among them, the TWAMP (Two Way Active Measurement Protocol) protocol (RFC5357) developed by IETF is one of the more influential methods.
TWAMP协议基于端到端的测量方式,即测量实体都是主机,网络设备不参与测量。TWAMP包括了两个相互独立的协议:The TWAMP protocol is based on the end-to-end measurement method, that is, the measurement entities are all hosts, and network devices do not participate in the measurement. TWAMP consists of two mutually independent protocols:
●TWAMP-Control:用于建立测量会话,协商会话的参数(如包长、起始时间、中止时间、发包的分布参数等),开始、终止测量会话,以及获取测量结果(采用TCP协议);TWAMP-Control: used to establish a measurement session, negotiate session parameters (such as packet length, start time, termination time, packet distribution parameters, etc.), start and terminate a measurement session, and obtain measurement results (TCP protocol);
●TWAMP-Test:规定了测量报文的格式等,用于在测量节点间进行测量报文的交互(采用UDP协议)。●TWAMP-Test: specifies the format of the measurement message, etc., and is used for the exchange of measurement messages between the measurement nodes (using the UDP protocol).
为了提高其开放性,TWAMP采用了控制协议与测量协议分离的思想,也就是说实际的TWAMP系统的控制协议不一定采用TWAMP-Control,但底层的测量协议要采用TWAMP-Test,这样可以既保证了测量过程的互通性,又使得采用不同控制协议的测量节点都可以参与到测量中来,体现了测量的开放性。In order to improve its openness, TWAMP adopts the idea of separating the control protocol from the measurement protocol. That is to say, the control protocol of the actual TWAMP system does not necessarily use TWAMP-Control, but the underlying measurement protocol must use TWAMP-Test, which can ensure both It not only ensures the interoperability of the measurement process, but also enables the measurement nodes using different control protocols to participate in the measurement, reflecting the openness of the measurement.
TWAMP协议包括五个功能实体:The TWAMP protocol includes five functional entities:
●Session-Sender:TWAMP-Test会话中发送测量报文的测量节点;●Session-Sender: the measurement node that sends the measurement message in the TWAMP-Test session;
●Session-Receiver:TWAMP-Test会话中接收测量报文的测量节点;●Session-Receiver: the measurement node that receives the measurement message in the TWAMP-Test session;
●Server:一个服务器,管理着一个或多个TWAMP-Test会话,可以在每个测量节点上为每个TWAMP-Test会话进行配置,可以返回每个TWAMP-Test会话的测量结果;●Server: a server that manages one or more TWAMP-Test sessions, can be configured for each TWAMP-Test session on each measurement node, and can return the measurement results of each TWAMP-Test session;
●Control-Client:一个主机,用于发起建立TWAMP-Test会话的请求,以及控制会话的开始和终止;●Control-Client: a host, used to initiate a request to establish a TWAMP-Test session, and control the start and termination of the session;
●Fetch-Client:一个主机,用于发起获取TWAMP-Test会话测量结果的请求;● Fetch-Client: a host, used to initiate a request to obtain the measurement results of the TWAMP-Test session;
五个功能实体间的关系如图1所示:The relationship between the five functional entities is shown in Figure 1:
TWAMP协议首先假定参加测量的节点(Session-Sender和Session-Receiver)在不同控制者的控制之下,Session-Sender由Control-Client控制,Session-Receiver由Server控制,因此Session-Sender与Control-Client之间,以及Session-Receiver与Server之间可以是控制者自己定义的控制协议,但Control-Client与Server之间,以及Fetch-Client与Server之间可以使用公开的TWAMP-Control协议,这样就使得在不同控制者的主机之间进行网络性能测量,并通过一个开放接口获取数据成为可能。目前一些研究机构,如Aveiro大学,已经对TWAMP协议系统进行了实现,在他们的系统中,图中未定协议也采用了TWAMP-Control协议。The TWAMP protocol first assumes that the nodes participating in the measurement (Session-Sender and Session-Receiver) are under the control of different controllers. Session-Sender is controlled by Control-Client, and Session-Receiver is controlled by Server. Therefore, Session-Sender and Control-Client Between, and between Session-Receiver and Server can be the control protocol defined by the controller itself, but between Control-Client and Server, and between Fetch-Client and Server can use the public TWAMP-Control protocol, so that It is possible to perform network performance measurements between hosts of different controllers and obtain data through an open interface. At present, some research institutions, such as Aveiro University, have implemented the TWAMP protocol system. In their system, the undecided protocol in the figure also adopts the TWAMP-Control protocol.
TWAMP协议由于基于端到端的测量方式,采用普通UDP报文,因此测量过程不易被感知和监测,能够反映用户的真实业务情况;同时在设计时就考虑了安全问题,协议内容包括了Client与Server间以及Sender与Receiver间的认证与加密机制;另外TWAMP还支持小包测量,不加密时最小报文达到42字节,加密时为60字节。但TWAMP协议也存在一些缺点,首先测量结果反映的是只是网络边缘主机间的性能,不利于网络的Troubleshooting;其次,协议本身具有很大的开放性,一方面使协议的适应性增强,另一方面也引入了安全问题,如中间人攻击等。因此,综上所述,TWAMP协议是一个比较适合由用户进行的网络性能测量协议。Because the TWAMP protocol is based on the end-to-end measurement method and uses ordinary UDP packets, the measurement process is not easy to be perceived and monitored, and can reflect the real business situation of the user; at the same time, security issues are considered in the design, and the protocol content includes Client and Server The authentication and encryption mechanism between Sender and Receiver; in addition, TWAMP also supports small packet measurement, the minimum packet reaches 42 bytes when it is not encrypted, and 60 bytes when it is encrypted. But the TWAMP protocol also has some shortcomings. First, the measurement results only reflect the performance between hosts at the edge of the network, which is not conducive to network Troubleshooting. Second, the protocol itself is very open. It also introduces security issues, such as man-in-the-middle attacks. Therefore, in summary, the TWAMP protocol is a network performance measurement protocol that is more suitable for users.
TWAMP本身只是一个探针与探针、探针与服务器之间对于测量类型、测量控制参数的通信协议,如果将TWAMP协议用于实际的测量系统,必然要考虑整个系统的安全问题,最重要的是要保证探针的真实性,即探针应该是系统使用者所认可的“真实”的探针,而不是虚假或假冒的测量节点。TWAMP itself is just a communication protocol for measurement types and measurement control parameters between probes and probes, and between probes and servers. If the TWAMP protocol is used in an actual measurement system, the security of the entire system must be considered. The most important It is to ensure the authenticity of the probe, that is, the probe should be a "real" probe recognized by the system user, rather than a false or counterfeit measurement node.
目前,通过网络搜索发现,仍没有相关机构或个人提出类似思路在支持TWAMP协议的互联网性能测量系统中实现探针与控制服务器之间的注册机制。At present, through network search, it is found that no relevant organization or individual has proposed a similar idea to realize the registration mechanism between the probe and the control server in the Internet performance measurement system supporting the TWAMP protocol.
发明内容Contents of the invention
本发明的目的是在TWAMP协议系统之上,在控制服务器与探针(Session-Sender和Session-Receiver)建立一种探针注册方法,使得整套系统能够满足现网使用中对安全、可靠性的要求。The purpose of the present invention is to establish a probe registration method on the control server and probes (Session-Sender and Session-Receiver) on the TWAMP protocol system, so that the entire system can meet the requirements for safety and reliability in the use of the existing network. Require.
为了满足上述目的,本发明采用以下技术方案:In order to meet the above object, the present invention adopts the following technical solutions:
一种互联网性能测量系统中的探针注册方法,应用于包括服务器和至少一个探针的系统中,所述探针注册方法具体包括:A probe registration method in an Internet performance measurement system, applied to a system including a server and at least one probe, the probe registration method specifically includes:
步骤1,在服务器数据库中创建探针信息,并将注册信息写入探针端本地文件;Step 1, create probe information in the server database, and write the registration information to the local file on the probe side;
步骤2,向服务器发送注册连接请求;Step 2, send a registration connection request to the server;
步骤3,接收来自所述探针发送的注册连接请求,获取连接标识符;Step 3, receiving a registration connection request sent from the probe, and obtaining a connection identifier;
步骤4,根据所述连接标识符开启所述探针的注册线程,并在指定TCP端口接收所述探针发送的注册报文;Step 4, start the registration thread of the probe according to the connection identifier, and receive the registration message sent by the probe at the specified TCP port;
步骤5,提取所述探针发送的注册报文中的探针名称和密码;Step 5, extracting the probe name and password in the registration message sent by the probe;
步骤6,判断探针名称和密码与服务器数据库中信息是否匹配,若是,则进入步骤7;若否,则进入步骤8;Step 6, judging whether the probe name and password match the information in the server database, if so, proceed to step 7; if not, proceed to step 8;
步骤7,将所述报文的探针的基本信息保存到数据库;Step 7, saving the basic information of the probe of the message to the database;
步骤8,向所述探针发送注册回复报文,若注册成功,则回复“成功注册报文”,若注册不成功,则回复“注册不成功报文”;Step 8: Send a registration reply message to the probe, if the registration is successful, reply with a "successful registration message", and if the registration is unsuccessful, reply with a "registration unsuccessful message";
步骤9,接收并读取服务器发送的注册回复报文;Step 9, receiving and reading the registration reply message sent by the server;
步骤10,关闭连接。Step 10, close the connection.
进一步地,所述步骤2中的探针发送注册连接请求,具体为:Further, the probe in step 2 sends a registration connection request, specifically:
步骤210,创建注册所使用的TCP端口;Step 210, creating a TCP port used for registration;
步骤220,通过该TCP端口向服务器端发送连接请求;Step 220, send a connection request to the server through the TCP port;
步骤230,连接请求接受后,根据注册信息文件生成注册报文,向服务器发送注册请求。Step 230, after the connection request is accepted, a registration message is generated according to the registration information file, and a registration request is sent to the server.
进一步地,所述步骤10后还包括:Further, after the step 10, it also includes:
步骤11,根据步骤9中读到的注册回复报文,取出其中的Accept字段,此字段代表注册是否成功。根据Accept值返回本次注册结果。Step 11, according to the registration reply message read in step 9, take out the Accept field in it, and this field represents whether the registration is successful. Return the registration result according to the Accept value.
进一步地,所述步骤10具体为:Further, the step 10 is specifically:
步骤10,调用公共模块关闭连接。Step 10, calling the public module to close the connection.
进一步地,将所述注册报文各字段含义设定为:报文长度,报文类型,探针能力,探针名称,密码、探针IP地址以及探针网关IP地址。Further, the meaning of each field of the registration message is set as: message length, message type, probe capability, probe name, password, probe IP address and probe gateway IP address.
进一步地,在探针成功注册之后还包括:Further, after the probe is successfully registered, it also includes:
步骤310,启动Keepalive处理线程之后,清空服务器内存表;Step 310, after starting the Keepalive processing thread, empty the server memory table;
步骤320,接收探针发送的Keepalive数据;Step 320, receiving Keepalive data sent by the probe;
步骤330,读取接收到的所述探针发送的Keepalive数据中的探针名称信息,并判断是否与内存表中的探针名称相一致,若一致,则回到步骤320,继续等待接收数据;若不一致,将探针名称存储至内存表中,并回到步骤320,继续等待接收数据。Step 330, read the probe name information in the received keepalive data sent by the probe, and judge whether it is consistent with the probe name in the memory table, if it is consistent, return to step 320, and continue to wait for receiving data ; If inconsistent, store the probe name in the memory table, and return to step 320, and continue to wait for receiving data.
进一步地,所述步骤320中的探针发送Keepalive数据,具体为:Further, the probe in step 320 sends Keepalive data, specifically:
步骤3201,读取keepalive相关信息,具体地,从内存中读取出服务器的IP地址、keepalive定时时间间隔的信息;Step 3201, read keepalive related information, specifically, read the IP address of the server and the information of the keepalive timing interval from the memory;
步骤3202,设定timer时间为配置时间间隔,通过固定时间调用Keepalive发送代码,达到报到在线状态的目的,当定时时间到时便会自动开启线程处理转至步骤3203处处理;Step 3202, setting the timer time as the configuration time interval, calling Keepalive to send the code at a fixed time to achieve the purpose of reporting to the online status, when the timing time is up, the thread processing will be automatically started and the process will be transferred to step 3203;
步骤3203,创建Keepalive报告的UDP端口;Step 3203, create a UDP port for Keepalive report;
步骤3204,封装Keepalive数据包,根据已定义的Keepalive报文,填入相应信息;Step 3204, encapsulating the Keepalive packet, and filling in the corresponding information according to the defined Keepalive message;
步骤3205,发送Keepalive数据包,通过调用发送函数将数据包通过UDP端口发送给服务器;Step 3205, send the Keepalive data packet, and send the data packet to the server through the UDP port by calling the sending function;
步骤3206,关闭Keepalive UDP端口。Step 3206, close the Keepalive UDP port.
进一步地,将所述Keepalive数据包报文各字段的含义设定为:Further, the meaning of each field of the Keepalive packet message is set as:
报文长度,报文类型,探针名称。Packet length, packet type, probe name.
本发明提供的一种互联网性能测量系统中的探针注册方法,使服务器能够与探针进行相互认证,并实现服务器对探针权限的鉴定和分配。在本发明中,需要在探针与服务器上增加注册流程的处理机制,在探针启动时,根据配置信息向服务器注册,由服务器对注册信息进行鉴权,确定探针的合法性,在通过注册之后,探针仍将定期向服务器发送Keepalive信息,以维护状态。The invention provides a probe registration method in the Internet performance measurement system, which enables the server and the probe to perform mutual authentication, and realizes the identification and distribution of the authority of the probe by the server. In the present invention, it is necessary to add a processing mechanism for the registration process on the probe and the server. When the probe starts, it registers with the server according to the configuration information, and the server authenticates the registration information to determine the legitimacy of the probe. After registration, the probe will still periodically send keepalive information to the server to maintain the state.
附图说明Description of drawings
图1为现有技术中的TWAMP协议功能实体的关系的示意图;FIG. 1 is a schematic diagram of the relationship between TWAMP protocol functional entities in the prior art;
图2为本发明的服务器端注册流程示意图;Fig. 2 is a schematic diagram of the server-side registration process of the present invention;
图3为本发明的注册回复报文格式示意图;Fig. 3 is a schematic diagram of the registration reply message format of the present invention;
图4为本发明的服务器Keepalive处理流程示意图;Fig. 4 is the server Keepalive processing flow schematic diagram of the present invention;
图5为本发明的探针端注册流程示意图;Fig. 5 is a schematic diagram of the registration process of the probe end of the present invention;
图6为本发明的探针注册请求报文格式示意图;Fig. 6 is a schematic diagram of the format of the probe registration request message of the present invention;
图7为本发明的Keepalive报文格式示意图;Fig. 7 is a schematic diagram of the Keepalive message format of the present invention;
图8为本发明的探针端Keepalive线程的处理流程示意图。FIG. 8 is a schematic diagram of the processing flow of the Keepalive thread at the probe end of the present invention.
具体实施方式Detailed ways
为了使本发明的目的、技术方案及优点更加清楚,下面结合附图及实施例,对本发明进行进一步详细说明。此处所描述的具体实施例仅用以解释本发明,但并不用于限定本发明。本发明中的注册方法包括服务器和探针两方面的处理流程。In order to make the purpose, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. The specific embodiments described here are only used to explain the present invention, but not to limit the present invention. The registration method in the present invention includes the processing flow of both the server and the probe.
如图2所示,服务器端处理流程包括以下步骤:As shown in Figure 2, the server-side processing flow includes the following steps:
步骤1,在服务器数据库中创建探针信息,其内容包括:探针名称,注册密码,探针IP地址,探针下一跳网关地址,探针能力说明。Step 1. Create probe information in the server database, which includes: probe name, registration password, probe IP address, probe next-hop gateway address, and probe capability description.
步骤2,服务器启动,接受探针注册连接请求,获得连接标识符FD。Step 2, the server starts, accepts the probe registration connection request, and obtains the connection identifier FD.
步骤3,开启探针注册线程,在指定TCP Socket端口等待探针注册报文。Step 3, start the probe registration thread, and wait for the probe registration message at the designated TCP Socket port.
步骤4,如有探针发送注册请求,则接收注册数据。Step 4, if a probe sends a registration request, the registration data is received.
步骤5,对注册报文中的探针名称和密码进行提取。Step 5, extracting the probe name and password in the registration message.
步骤6,将探针名称与密码与数据库中信息进行比对。若匹配,则进入步骤7;若不匹配,则进入步骤8。Step 6, compare the probe name and password with the information in the database. If they match, go to step 7; if not, go to step 8.
步骤7,将报文探针的IP地址,探针能力等探针基本信息保存到数据库相应位置。Step 7, saving the basic information of the probe such as the IP address of the message probe and the probe capability to the corresponding position of the database.
步骤8,向探针发送注册回复报文,若注册成功,则回复“成功注册报文”,若注册不成功,则回复“注册不成功报文”。Step 8: Send a registration reply message to the probe. If the registration is successful, reply with a "successful registration message", and if the registration is unsuccessful, reply with a "registration unsuccessful message".
步骤9,关闭连接。Step 9, close the connection.
如图2所示,注册请求回复报文格式如下:As shown in Figure 2, the format of the registration request reply message is as follows:
●报文长度:4字节。●Message length: 4 bytes.
●报文类型:2字节。3代表探针注册回复。●Message type: 2 bytes. 3 stands for probe registration reply.
·注册回复:2字节。0代表注册成功,1代表该探针不存在,2代表探针名称与密码不符,3代表IP地址或探针能力描述错误,4代表该探针已注册。• Registration Reply: 2 bytes. 0 means that the registration is successful, 1 means that the probe does not exist, 2 means that the probe name does not match the password, 3 means that the IP address or probe capability description is wrong, and 4 means that the probe has been registered.
探针注册成功后,将定期向服务器发送Keepalive报文(UDP),服务器需要创建UDP Socket接收这些Keepalive报文。如图4所示,服务器对于Keepalive报文的处理流程如下:After the probe is successfully registered, it will periodically send Keepalive messages (UDP) to the server, and the server needs to create a UDP Socket to receive these Keepalive messages. As shown in Figure 4, the server processes the Keepalive message as follows:
步骤310,启动Keepalive处理线程之后,清空服务器内存表1(内存表1存储着探针的状态信息)。Step 310, after starting the Keepalive processing thread, clear the server memory table 1 (memory table 1 stores the state information of the probe).
步骤320,接收Keepalive数据。Step 320, receiving keepalive data.
步骤330,读取接收到的Keepalive数据中的探针名称信息,并与内存表1中的探针名称匹配。若匹配,则回到步骤320,继续等待接收数据;若不匹配,将探针名称存储至内存表1,并回到步骤320,继续等待接收数据。Step 330, read the probe name information in the received Keepalive data, and match it with the probe name in memory table 1. If it matches, go back to step 320 and continue to wait for receiving data; if not, store the probe name in memory table 1, and go back to step 320 and continue to wait for receiving data.
在探针端,首先需要由管理人员将注册信息写入探针端本地文件,在探针启动后,自动启动注册流程。如图5所示,处理流程包括以下步骤:On the probe side, the administrator first needs to write the registration information into the local file on the probe side. After the probe is started, the registration process will start automatically. As shown in Figure 5, the processing flow includes the following steps:
步骤10,创建注册所使用的TCP Socket。Step 10, create the TCP Socket used for registration.
步骤20,通过该TCP Socket向服务器端发送连接请求。Step 20, send a connection request to the server through the TCP Socket.
步骤30,连接请求接受后,根据注册信息文件生成注册报文,向服务器端发送注册请求。Step 30, after the connection request is accepted, a registration message is generated according to the registration information file, and the registration request is sent to the server.
步骤40,接收并读取服务器端返回的注册回复报文。Step 40, receiving and reading the registration reply message returned by the server.
步骤50,调用公共模块关闭连接。Step 50, calling the public module to close the connection.
步骤60,根据步骤40中读到的注册回复报文,取出其中的Accept字段,此字段代表注册是否成功。根据Accept值返回本次注册结果。Step 60, according to the registration reply message read in step 40, take out the Accept field in it, and this field represents whether the registration is successful. Return the registration result according to the Accept value.
如图6所示,探针注册请求报文如下:As shown in Figure 6, the probe registration request message is as follows:
●报文长度:4字节。●Message length: 4 bytes.
●报文类型:2字节,1代表探针注册命令,2代表定时在线命令。●Message type: 2 bytes, 1 represents the probe registration command, 2 represents the timing online command.
●探针能力:4字节,32bit。●Probe capability: 4 bytes, 32bit.
●探针名称:32字节,用户为探针所配置的名称。●Probe name: 32 bytes, the name configured by the user for the probe.
●密码:32字节,用户为探针所配置的注册密码。●Password: 32 bytes, the registration password configured by the user for the probe.
●探针IP地址:256字节,探针的IP地址。● Probe IP address: 256 bytes, the IP address of the probe.
●探针网关IP地址:256字节,探针的网关地址。● Probe gateway IP address: 256 bytes, the gateway address of the probe.
在探针成功注册之后,将启动Keepalive线程,定期维护服务器上的探针状态。如图8所示,探针端Keepalive线程的处理流程如下:After the probe is successfully registered, a keepalive thread will be started to periodically maintain the probe status on the server. As shown in Figure 8, the processing flow of the Keepalive thread on the probe side is as follows:
步骤10,读keepalive相关信息,需要从内存中读取出控制服务器的IP地址、keepalive定时时间间隔等信息。Step 10, read keepalive related information, you need to read information such as the IP address of the control server, keepalive timing interval, etc. from the memory.
步骤20,设定timer时间为配置时间间隔,通过固定时间调用Keepalive发送代码,达到报到在线状态的目的。当定时时间到时便会自动开启线程处理转至步骤21处处理。Step 20, set the timer time as the configuration time interval, and call Keepalive to send the code at a fixed time to achieve the purpose of reporting the online status. When the timing time is up, the thread processing will be automatically opened and the process will be forwarded to step 21.
步骤21,创建Keepalive报告的UDP Socket。Step 21, create a UDP Socket for Keepalive report.
步骤22,封装Keepalive数据包,根据已定义的Keepalive报文,填入相应信息。Step 22, encapsulating the Keepalive data packet, and filling in corresponding information according to the defined Keepalive message.
步骤23,发送Keepalive数据包,通过调用发送函数将数据报通过UDP端口发送给控制服务器。Step 23, send the Keepalive data packet, and send the datagram to the control server through the UDP port by calling the sending function.
步骤24,关闭Keepalive UDP Socket。Step 24, close the Keepalive UDP Socket.
探针端发送keepalive数据包使用UDP端口。如图7所示,Keepalive报文各字段含义如下:The probe side sends keepalive packets using the UDP port. As shown in Figure 7, the meanings of the fields in the Keepalive packet are as follows:
●报文长度:4字节。●Message length: 4 bytes.
●报文类型:2字节,2代表定时在线命令,1代表探针注册命令。●Message type: 2 bytes, 2 means timing online command, 1 means probe registration command.
●探针名称:32字节,用户为探针所配置的名称。●Probe name: 32 bytes, the name configured by the user for the probe.
虽然,本发明已通过以上实施例及其附图而清楚说明,然而在不背离本发明精神及其实质的情况下,所属技术领域的技术人员当可根据本发明作出各种相应的变化和修正,但这些相应的变化和修正都应属于本发明的权利要求的保护范围。Although the present invention has been clearly illustrated by the above embodiments and accompanying drawings, those skilled in the art can make various corresponding changes and modifications according to the present invention without departing from the spirit and essence of the present invention , but these corresponding changes and amendments should all belong to the protection scope of the claims of the present invention.
Claims (7)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201110238461.9A CN102299923B (en) | 2011-08-18 | 2011-08-18 | Session-Receiver register method in Internet performance measurement system |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201110238461.9A CN102299923B (en) | 2011-08-18 | 2011-08-18 | Session-Receiver register method in Internet performance measurement system |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN102299923A CN102299923A (en) | 2011-12-28 |
| CN102299923B true CN102299923B (en) | 2015-06-17 |
Family
ID=45360098
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201110238461.9A Active CN102299923B (en) | 2011-08-18 | 2011-08-18 | Session-Receiver register method in Internet performance measurement system |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN102299923B (en) |
Families Citing this family (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN107294802A (en) * | 2017-05-22 | 2017-10-24 | 国网安徽省电力公司信息通信分公司 | A kind of end-to-end Performance Test System |
| CN110191475B (en) * | 2018-02-23 | 2021-04-27 | 大唐移动通信设备有限公司 | Data processing method and device for base station |
| CN111385822B (en) * | 2018-12-29 | 2021-11-09 | 华为技术有限公司 | Configuration method and controller |
| CN111756575B (en) * | 2020-06-19 | 2023-08-11 | 北京星辰天合科技股份有限公司 | Performance analysis method and device of storage server and electronic equipment |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2005109754A1 (en) * | 2004-04-30 | 2005-11-17 | Synematics, Inc. | System and method for real-time monitoring and analysis for network traffic and content |
| CN1980159A (en) * | 2005-12-08 | 2007-06-13 | 信息产业部电信传输研究所 | Internet protocol network end-to-end performance monitoring system and method |
| CN101662393A (en) * | 2009-07-24 | 2010-03-03 | 中国科学院计算技术研究所 | Inter-domain prefix hijack detection and location method |
Family Cites Families (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7868780B2 (en) * | 2005-09-20 | 2011-01-11 | Jds Uniphase Corporation | System and method for test probe management |
-
2011
- 2011-08-18 CN CN201110238461.9A patent/CN102299923B/en active Active
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2005109754A1 (en) * | 2004-04-30 | 2005-11-17 | Synematics, Inc. | System and method for real-time monitoring and analysis for network traffic and content |
| CN1980159A (en) * | 2005-12-08 | 2007-06-13 | 信息产业部电信传输研究所 | Internet protocol network end-to-end performance monitoring system and method |
| CN101662393A (en) * | 2009-07-24 | 2010-03-03 | 中国科学院计算技术研究所 | Inter-domain prefix hijack detection and location method |
Also Published As
| Publication number | Publication date |
|---|---|
| CN102299923A (en) | 2011-12-28 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN111131310B (en) | Access control method, device, system, computer device and storage medium | |
| US10498618B2 (en) | Attributing network address translation device processed traffic to individual hosts | |
| US9883010B2 (en) | Method, apparatus, device and system for generating DHCP snooping binding table | |
| CN101110847B (en) | Method, device and system for obtaining medium access control address | |
| CN101212374A (en) | Method and system for realizing remote access to campus network resources | |
| CN102307119B (en) | Method for discovering probe failure in Internet performance measurement system | |
| US20060224717A1 (en) | Management system for warranting consistency between inter-client communication logs | |
| US20110191223A1 (en) | Internet Control Management and Accounting in a Utility Computing Environment | |
| US20130290561A1 (en) | Method and device for providing user information to cgn device | |
| CN106209522B (en) | Token networking construction method based on token protocol | |
| CN102387083B (en) | Network access control method and system | |
| CN102299923B (en) | Session-Receiver register method in Internet performance measurement system | |
| CN108848145A (en) | Pass through the method, system and distal end network management of WEB proxy access equipment near-end network management | |
| CN110012322A (en) | A kind of method and system that view networking service is initiated | |
| CN101499903B (en) | Method, apparatus, system, customer node, peer node and convergent point for preventing node forged identity | |
| WO2019237683A1 (en) | Protocol packet, and method for managing virtual client terminal device | |
| CN115643297A (en) | Link establishment method and device, nonvolatile storage medium and computer equipment | |
| CN104660728B (en) | NAT penetrating methods based on intelligent home control system | |
| CN112887339B (en) | Distributed grouping management method of terminal equipment | |
| CN106302846B (en) | A kind of communication connection method for building up and device, system | |
| CN102164079B (en) | Trusted video application method based on network measurement | |
| CN112333088A (en) | A Compatible Instant Messaging Transmission Method | |
| CN102917071B (en) | A kind of tunnel connection request distribution method and device | |
| CN117411762B (en) | Distributed message transmission method, device, equipment and medium | |
| CN106936798A (en) | A kind of service authentication method and device |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| C14 | Grant of patent or utility model | ||
| GR01 | Patent grant | ||
| TR01 | Transfer of patent right |
Effective date of registration: 20220106 Address after: 100191 No. 40, Haidian District, Beijing, Xueyuan Road Patentee after: CHINA ACADEMY OF INFORMATION AND COMMUNICATIONS Address before: 100191 6th Floor, Block B, Telecommunications Research Institute, No. 52 Huayuan North Road, Haidian District, Beijing Patentee before: The Research Institute of Telecommunications Transmission MIIT |
|
| TR01 | Transfer of patent right |