CN118353844A - Method and system for monitoring OTA usage based on soft route - Google Patents
Method and system for monitoring OTA usage based on soft route Download PDFInfo
- Publication number
- CN118353844A CN118353844A CN202410641072.8A CN202410641072A CN118353844A CN 118353844 A CN118353844 A CN 118353844A CN 202410641072 A CN202410641072 A CN 202410641072A CN 118353844 A CN118353844 A CN 118353844A
- Authority
- CN
- China
- Prior art keywords
- flow
- module
- soft
- rule
- vehicle
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000012544 monitoring process Methods 0.000 title claims abstract description 46
- 238000000034 method Methods 0.000 title claims abstract description 24
- 238000005206 flow analysis Methods 0.000 claims abstract description 53
- 238000007619 statistical method Methods 0.000 claims abstract description 17
- 230000002776 aggregation Effects 0.000 claims abstract description 13
- 238000004220 aggregation Methods 0.000 claims abstract description 13
- 230000002159 abnormal effect Effects 0.000 claims description 30
- 230000000903 blocking effect Effects 0.000 claims description 30
- 238000004458 analytical method Methods 0.000 claims description 4
- 238000007789 sealing Methods 0.000 description 8
- 238000013459 approach Methods 0.000 description 2
- 238000012423 maintenance Methods 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 238000013024 troubleshooting Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/10—Flow control; Congestion control
- H04L47/20—Traffic policing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/0631—Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
- H04L41/0813—Configuration setting characterised by the conditions triggering a change of settings
- H04L41/082—Configuration setting characterised by the conditions triggering a change of settings the condition being updates or upgrades of network functionality
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention provides a method and a system for monitoring OTA consumption based on soft route, which uses a soft route module to establish network connection between a vehicle machine end and an application server end of an operator; monitoring and acquiring flow data of a target network card interface on a soft routing module; performing aggregation statistical analysis on the flow data to obtain a flow analysis result and storing the flow analysis result; when the stored flow analysis result is monitored to trigger a preset flow control rule, a corresponding flow control command is generated, and the flow control command is sent to the soft routing module; the soft routing module executes the flow control command to control the flow of the vehicle machine side and the flow of the application server side. Under the scene of the soft route operation system, the statistics of the OTA call ticket flow is realized, the OTA consumption is monitored and controlled, and the realization cost is low.
Description
Technical Field
The invention relates to the technical field of Internet of vehicles, in particular to a method and a system for monitoring OTA usage based on soft routing.
Background
The traditional way that the internet of vehicles opens up a traffic link with an operator can adopt a VPN (virtual private network), a physical router is generally used for building special line equipment, and a soft routing system such as VyOS is used for some parts, but the functions of the soft routing operation system are imperfect and limited by the bottom support of hardware equipment, so that related functions such as traffic individual calculation statistics, monitoring, alarming, control and the like are lacked.
Disclosure of Invention
Based on the problems, the invention provides a method and a system for monitoring OTA usage based on soft routing, which only solve the technical problem that traffic monitoring is limited on a vehicle-mounted terminal using a soft routing system in the prior art.
A method for monitoring OTA usage based on soft route includes:
a1, using a soft routing module to enable a vehicle machine end to establish network connection with an application server end of an operator;
A2, monitoring and acquiring flow data of a target network card interface on the soft routing module;
step A3, carrying out aggregation statistical analysis on the flow data to obtain a flow analysis result and storing the flow analysis result;
Step A4, when the stored flow analysis result is monitored to trigger a preset flow control rule, a corresponding flow control command is generated, and the flow control command is sent to the soft routing module;
And step A5, the soft routing module executes the flow control command to control the flow of the vehicle machine side and the flow of the application server side.
Further, step A2 includes:
step A21, collecting flow data of a target network card interface on a soft routing module in a mirror image mode;
step A22, generating a flow file for the flow data and storing the flow file;
In step A3, monitoring and downloading the stored newly-added flow file, and carrying out aggregation statistical analysis on the flow data in the downloaded newly-added flow file to obtain a flow analysis result.
Further, step A3 further includes:
And step A6, carrying out abnormal flow analysis on the stored flow analysis result according to a preset alarm rule, and generating an abnormal flow alarm when abnormal flow exists.
Further, in step A4, the preset flow control rule includes: the method comprises the steps of a single vehicle side black-and-white list rule, a single vehicle side firewall rule, a single application black-and-white list rule, a single application blocking rule, a combined vehicle side blocking rule and a combined application blocking rule.
Further, in step A6, when the traffic analysis result has one of the following situations, it is considered that there is abnormal traffic:
the single-hour consumption of all the vehicle terminals exceeds a first alarm threshold;
the single-hour consumption of the single vehicle-mounted terminal exceeds a second alarm threshold;
The network connection number exceeds a third alarm threshold;
the bandwidth load of the single vehicle terminal link exceeds a fourth alarm threshold;
and the total bandwidth load of all the vehicle-mounted links exceeds a fifth alarm threshold.
A system for performing OTA usage monitoring based on soft routing, which is used for performing the method for performing OTA usage monitoring based on soft routing, comprising:
The soft routing module is used for realizing that the soft routing module enables the vehicle machine end to establish network connection with an application server end of an operator;
The flow acquisition module is connected with the soft routing module and is used for monitoring and acquiring flow data of a target network card interface on the soft routing module;
The flow analysis module is connected with the flow acquisition module and is used for carrying out aggregation statistical analysis on the flow data to obtain a flow analysis result;
The result storage module is connected with the flow analysis module and used for storing flow analysis results;
the flow control module is respectively connected with the result storage module and the soft routing module, and is used for generating corresponding flow control commands when the stored flow analysis results are monitored to trigger the preset flow control rules, and sending the flow control commands to the soft routing module;
The soft routing module is also used for executing the flow control command to control the flow of the vehicle machine side and the flow of the application server side.
Further, the flow obtaining module includes:
The flow mirror image unit is used for collecting flow data of a target network card interface on the soft route module in a mirror image mode;
The file generation unit is connected with the flow mirror image unit and is used for generating flow files for flow data;
the file storage unit is connected with the file generation unit and is used for storing the flow file;
The flow analysis module is used for: and monitoring and downloading the newly added flow file in the file storage unit, and performing aggregation statistical analysis on the flow data in the downloaded flow file to obtain a flow analysis result.
Further, the method further comprises the following steps:
The alarm monitoring module is connected with the result storage module and is used for carrying out abnormal flow analysis on the stored flow analysis result according to a preset alarm rule, and generating an abnormal flow alarm when abnormal flow exists.
Further, the preset flow control rule includes: the method comprises the steps of a single vehicle side black-and-white list rule, a single vehicle side firewall rule, a single application black-and-white list rule, a single application blocking rule, a combined vehicle side blocking rule and a combined application blocking rule.
Further, the alarm monitoring module monitors that abnormal flow exists when one of the following situations exists in the flow analysis result:
the single-hour consumption of all the vehicle terminals exceeds a first alarm threshold;
the single-hour consumption of the single vehicle-mounted terminal exceeds a second alarm threshold;
The network connection number exceeds a third alarm threshold;
the bandwidth load of the single vehicle terminal link exceeds a fourth alarm threshold;
and the total bandwidth load of all the vehicle-mounted links exceeds a fifth alarm threshold.
The beneficial technical effects of the invention are as follows: under the scene of the soft route operation system, the statistics of OTA call ticket flow is realized, the OTA consumption is monitored and controlled, different rule settings can be carried out according to the service scene, the OTA high-flow scene can be supported, and the realization cost is low.
Drawings
FIGS. 1-2 are flow charts of steps of a method for OTA usage monitoring based on soft routing according to the present invention;
fig. 3 is a schematic block diagram of a system for OTA usage monitoring based on soft routing according to the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
It should be noted that, without conflict, the embodiments of the present invention and features of the embodiments may be combined with each other.
The invention is further described below with reference to the drawings and specific examples, which are not intended to be limiting.
Referring to fig. 1, the present invention provides a method for monitoring OTA usage based on soft routing, including:
a1, using a soft routing module to enable a vehicle machine end to establish network connection with an application server end of an operator;
A2, monitoring and acquiring flow data of a target network card interface on the soft routing module;
step A3, carrying out aggregation statistical analysis on the flow data to obtain a flow analysis result and storing the flow analysis result;
Step A4, when the stored flow analysis result is monitored to trigger a preset flow control rule, a corresponding flow control command is generated, and the flow control command is sent to the soft routing module;
And step A5, the soft routing module executes the flow control command to control the flow of the vehicle machine side and the flow of the application server side.
In step A1, the soft routing module is a soft routing server, and the soft routing system is used VyOS.
In step A1, IPSec connection is established between the soft routing module and the application server side of the operator, and a link between the vehicle machine side and the public network is opened. IPSec, an internet security protocol (Internet Protocol Security, IPSec), protects the network transport protocol cluster (a collection of some interrelated protocols) of the IP protocol by encrypting and authenticating packets of the IP protocol. The soft routing module may employ BGP dual-wire approach, BGP, border gateway protocol (Border Gateway Protocol), a routing protocol of an autonomous system running on TCP. BGP is the only protocol used to handle networks like the internet and is the only protocol that can handle multipath connections between unrelated routing domains.
In step A2, the target network card interface is, for example, a network card on an ethernet interface that communicates with other devices in the computer network, such as an eth0 network card, so that the traffic can be acquired.
Under the scene of the soft route operation system, the statistics of OTA call ticket flow is realized, the OTA consumption is monitored and controlled, different rule settings can be carried out according to the service scene, the OTA high-flow scene can be supported, and the realization cost is low.
Referring to fig. 2, further, step A2 includes:
step A21, collecting flow data of a target network card interface on a soft routing module in a mirror image mode;
step A22, generating a flow file for the flow data and storing the flow file;
In step A3, monitoring and downloading the stored newly-added flow file, and carrying out aggregation statistical analysis on the flow data in the downloaded newly-added flow file to obtain a flow analysis result.
In step a21, a flow-accounting netflow is established in the soft routing module, and the traffic of the target network card interface of the soft routing module is forwarded by a netflow mode to the server where nfdump is located. Netflow is a network traffic monitoring tool, and Flow Accounting is a core concept of Netflow mechanism, which is responsible for performing tasks of tracking, counting and classifying data flows, and generating traffic records. nfdump is an open source toolset responsible for receiving and storing NetFlow data.
In step a22, the server at nfdump establishes Nfdump, captures the flow data collected by netflow through Nfdump and parses the flow data to generate a flow file at timing, and stores the flow file, for example, uploads the flow file to the object store OSS. OSS, object storage service (Object Storage Service), is a mass, safe, low-cost, highly reliable cloud storage service suitable for storing any type of file.
In step A3, the directory of the object storage service (Object Storage Service) is monitored, and when a new file is added, the file is downloaded, and aggregate statistical analysis is performed on the streaming data. And storing the flow analysis result into a database. The aggregate statistical analysis can analyze the traffic total, the hour consumption, the day consumption and the month consumption of each application level of the bicycle machine side dimension and the channel dimension. Because the IP of the vehicle-to-vehicle network card is fixed in the same APN, the network card IP and the vehicle-to-vehicle terminal ID can be associated one to one in a single-card and single-vehicle scene, and the OTA consumption of the vehicle dimension can be screened out through the destination IP (namely the vehicle-to-vehicle terminal network card IP) of OTA application.
Further, step A3 further includes:
And step A6, carrying out abnormal flow analysis on the stored flow analysis result according to a preset alarm rule, and generating an abnormal flow alarm when abnormal flow exists.
Further, in step A4, the preset flow control rule includes: the method comprises the steps of a single vehicle side black-and-white list rule, a single vehicle side firewall rule, a single application black-and-white list rule, a single application blocking rule, a combined vehicle side blocking rule and a combined application blocking rule.
And the single vehicle side black-and-white list rule is that the application service on the white list is accessed aiming at the single vehicle side, and the application service on the black list is not allowed to be accessed.
And a black-and-white list rule is applied singly, namely, the application service is allowed to be accessed by the vehicle-mounted terminal on the white list, and the vehicle-mounted terminal on the black list is not allowed to be accessed.
The firewall rules of the bicycle machine side can carry out operations such as shutting down, adjusting the speed, adjusting the bandwidth, sealing and the like on the bicycle machine side according to different service scenes. Different business scenarios perform different operations. The speed of the link of one or more application services accessed by the vehicle side can be limited, for example, for a certain application service, the speed is reduced if the usage of the vehicle side reaches a certain value. And limiting the total speed of links of all application services accessed by the vehicle terminal, namely reducing the bandwidth. If the vehicle terminal encounters abnormal conditions such as faults, large-flow use, illegal operation or network attack, the vehicle terminal can be subjected to blocking operation, and the vehicle terminal is forbidden to access any application service after blocking. For shutdown, for example, if the traffic of a vehicle terminal for a certain application service reaches an upper limit, the vehicle terminal is shut down, and the vehicle terminal is stopped to access the application service.
And if one application service is illegal, illegal or otherwise blocked, the soft routing module performs blocking operation on the application service to prohibit the application service from being used by all the networked vehicle terminals.
The combination vehicle machine end sealing and disabling rule is that a set of combination vehicle machine end sealing and disabling rule is set, so that sealing and disabling operations can be carried out on a plurality of vehicle machine ends at one time.
The combination application blocking rule, namely, a set of combination application blocking rule is set, so that blocking operation can be carried out on a plurality of application services at one time.
Further, in step A6, when the traffic analysis result has one of the following situations, it is considered that there is abnormal traffic:
the single-hour consumption of all the vehicle terminals exceeds a first alarm threshold;
the single-hour consumption of the single vehicle-mounted terminal exceeds a second alarm threshold;
The network connection number exceeds a third alarm threshold;
the bandwidth load of the single vehicle terminal link exceeds a fourth alarm threshold;
and the total bandwidth load of all the vehicle-mounted links exceeds a fifth alarm threshold.
And setting a threshold value for a scene with abnormal data flow, triggering a rule alarm after the threshold value is reached, and informing an operation and maintenance after-sales person of the abnormal flow alarm in a multi-channel mode such as mail, weChat, IM webhook, enterprise WeChat, short message, telephone and the like for troubleshooting and processing.
Preferably, the first alarm threshold is, for example, 3T.
Preferably, the second alarm threshold is, for example, 1T.
Preferably, the third alarm threshold is, for example, 3W (3 ten thousand).
Referring to fig. 3, the present invention further provides a system for performing OTA usage monitoring based on a soft route, which is configured to perform a method for performing OTA usage monitoring based on a soft route as described above, including:
The soft routing module (1) is used for realizing that the soft routing module enables the vehicle machine end to establish network connection with an application server end of an operator;
The flow acquisition module (2) is connected with the soft routing module (1) and is used for monitoring and acquiring flow data of a target network card interface on the soft routing module;
the flow analysis module (3) is connected with the flow acquisition module (2) and is used for carrying out aggregation statistical analysis on the flow data to obtain a flow analysis result;
the result storage module (4) is connected with the flow analysis module (3) and is used for storing flow analysis results;
The flow control module (5) is respectively connected with the result storage module (4) and the soft routing module (1) and is used for generating corresponding flow control commands when monitoring that the stored flow analysis results trigger a preset flow control rule and sending the flow control commands to the soft routing module;
The soft routing module (1) is also used for executing the flow control command to control the flow of the vehicle machine side and the flow of the application server side.
The soft routing module is a soft routing server and uses VyOS soft routing system.
And the soft routing module is connected with an application server side of an operator side by IPSec, so that a link between the vehicle machine side and the public network is opened. IPSec, an internet security protocol (Internet Protocol Security, IPSec), protects the network transport protocol cluster (a collection of some interrelated protocols) of the IP protocol by encrypting and authenticating packets of the IP protocol. The soft routing module may employ BGP dual-wire approach, BGP, border gateway protocol (Border Gateway Protocol), a routing protocol of an autonomous system running on TCP. BGP is the only protocol used to handle networks like the internet and is the only protocol that can handle multipath connections between unrelated routing domains.
The target network card interface is, for example, a network card on an ethernet interface that communicates with other devices in the computer network, such as an eth0 network card, so that traffic may be acquired.
Under the scene of the soft route operation system, the statistics of OTA call ticket flow is realized, the OTA consumption is monitored and controlled, different rule settings can be carried out according to the service scene, the OTA high-flow scene can be supported, and the realization cost is low.
Further, the flow obtaining module (2) includes:
the flow mirror unit (21) is used for collecting flow data of a target network card interface on the soft routing module in a mirror mode;
a file generation unit (22) connected to the flow mirror unit (21) for generating a flow file for the flow data;
a file storage unit (23) connected to the file generation unit (22) for storing the flow rate file;
the flow analysis module (3) is used for: and monitoring and downloading the newly added flow file in the file storage unit, and performing aggregation statistical analysis on the flow data in the downloaded flow file to obtain a flow analysis result.
The flow mirror unit (21) is netflow, a flow-accounting netflow is established in the soft routing module, and the flow of the target network card interface of the soft routing module is forwarded in a netflow mode and forwarded to a server where nfdump is located.
The file generating unit (22) establishes Nfdump for nfdump server and nfdump server, captures flow data collected by netflow through Nfdump, analyzes and generates flow file at fixed time, and stores the flow file, for example, uploads the flow file to object storage OSS. OSS, object storage service (Object Storage Service), is a mass, safe, low-cost, highly reliable cloud storage service suitable for storing any type of file.
The flow analysis module (3) monitors the catalogue of the object storage service (Object Storage Service), downloads the file when the file is newly added, and performs aggregation statistical analysis on the flow data. And storing the flow analysis result into a database (namely a result storage module). The aggregate statistical analysis can analyze the traffic total, the hour consumption, the day consumption and the month consumption of each application level of the bicycle machine side dimension and the channel dimension. Because the IP of the vehicle-to-vehicle network card is fixed in the same APN, the network card IP and the vehicle-to-vehicle terminal ID can be associated one to one in a single-card and single-vehicle scene, and the OTA consumption of the vehicle dimension can be screened out through the destination IP (namely the vehicle-to-vehicle terminal network card IP) of OTA application.
Further, the method further comprises the following steps:
The alarm monitoring module (6) is connected with the result storage module (5) and is used for carrying out abnormal flow analysis on the stored flow analysis result according to a preset alarm rule, and generating an abnormal flow alarm when abnormal flow exists.
Further, the preset flow control rule includes: the method comprises the steps of a single vehicle side black-and-white list rule, a single vehicle side firewall rule, a single application black-and-white list rule, a single application blocking rule, a combined vehicle side blocking rule and a combined application blocking rule.
And the single vehicle side black-and-white list rule is that the application service on the white list is accessed aiming at the single vehicle side, and the application service on the black list is not allowed to be accessed.
And a black-and-white list rule is applied singly, namely, the application service is allowed to be accessed by the vehicle-mounted terminal on the white list, and the vehicle-mounted terminal on the black list is not allowed to be accessed.
The firewall rules of the bicycle machine side can carry out operations such as shutting down, adjusting the speed, adjusting the bandwidth, sealing and the like on the bicycle machine side according to different service scenes. Different business scenarios perform different operations. The speed of the link of one or more application services accessed by the vehicle side can be limited, for example, for a certain application service, the speed is reduced if the usage of the vehicle side reaches a certain value. And limiting the total speed of links of all application services accessed by the vehicle terminal, namely reducing the bandwidth. If the vehicle terminal encounters abnormal conditions such as faults, large-flow use, illegal operation or network attack, the vehicle terminal can be subjected to blocking operation, and the vehicle terminal is forbidden to access any application service after blocking. For shutdown, for example, if the traffic of a vehicle terminal for a certain application service reaches an upper limit, the vehicle terminal is shut down, and the vehicle terminal is stopped to access the application service.
And if one application service is illegal, illegal or otherwise blocked, the soft routing module performs blocking operation on the application service to prohibit the application service from being used by all the networked vehicle terminals.
The combination vehicle machine end sealing and disabling rule is that a set of combination vehicle machine end sealing and disabling rule is set, so that sealing and disabling operations can be carried out on a plurality of vehicle machine ends at one time.
The combination application blocking rule, namely, a set of combination application blocking rule is set, so that blocking operation can be carried out on a plurality of application services at one time.
Further, the alarm monitoring module (6) monitors that abnormal flow is considered to exist when one of the following situations exists in the flow analysis result:
the single-hour consumption of all the vehicle terminals exceeds a first alarm threshold;
the single-hour consumption of the single vehicle-mounted terminal exceeds a second alarm threshold;
The network connection number exceeds a third alarm threshold;
the bandwidth load of the single vehicle terminal link exceeds a fourth alarm threshold;
and the total bandwidth load of all the vehicle-mounted links exceeds a fifth alarm threshold.
And setting a threshold value for a scene with abnormal data flow, triggering a rule alarm after the threshold value is reached, and informing an operation and maintenance after-sales person of the abnormal flow alarm in a multi-channel mode such as mail, weChat, IM webhook, enterprise WeChat, short message, telephone and the like for troubleshooting and processing.
Preferably, the first alarm threshold is, for example, 3T.
Preferably, the second alarm threshold is, for example, 1T.
Preferably, the third alarm threshold is, for example, 3W (3 ten thousand).
The foregoing is merely illustrative of the preferred embodiments of the present invention and is not intended to limit the embodiments and scope of the present invention, and it should be appreciated by those skilled in the art that equivalent substitutions and obvious variations may be made using the description and illustrations of the present invention, and are intended to be included in the scope of the present invention.
Claims (10)
1. A method for OTA usage monitoring based on soft routing, comprising:
a1, using a soft routing module to enable a vehicle machine end to establish network connection with an application server end of an operator;
a2, monitoring and acquiring flow data of a target network card interface on the soft routing module;
Step A3, carrying out aggregation statistical analysis on the flow data to obtain a flow analysis result and storing the flow analysis result;
Step A4, when the stored flow analysis result is monitored to trigger a preset flow control rule, a corresponding flow control command is generated, and the flow control command is sent to the soft routing module;
and step A5, the soft routing module executes the flow control command to control the flow of the vehicle machine side and the flow of the application server side.
2. The method for OTA usage monitoring based on soft routing of claim 1 wherein said step A2 comprises:
step A21, collecting the flow data of the target network card interface on the soft route module in a mirror image mode;
Step A22, generating a flow file for the flow data and storing the flow file;
In the step A3, monitoring and downloading the stored newly added flow file, and performing aggregate statistical analysis on the flow data in the downloaded newly added flow file to obtain the flow analysis result.
3. The method for OTA usage monitoring based on soft routing of claim 1 wherein said step A3 further comprises:
And step A6, carrying out abnormal flow analysis on the stored flow analysis result according to a preset alarm rule, and generating an abnormal flow alarm when abnormal flow exists.
4. The method for OTA usage monitoring based on soft routing of claim 1 wherein in said step A4, said preset flow control rules comprise: the method comprises the steps of a single vehicle side black-and-white list rule, a single vehicle side firewall rule, a single application black-and-white list rule, a single application blocking rule, a combined vehicle side blocking rule and a combined application blocking rule.
5. A method for OTA usage monitoring based on soft routing as defined in claim 3, wherein in said step A6, abnormal traffic is considered to exist when said traffic analysis results in one of the following situations:
the single-hour consumption of all the vehicle terminals exceeds a first alarm threshold;
the single-hour consumption of the single vehicle-mounted terminal exceeds a second alarm threshold;
The network connection number exceeds a third alarm threshold;
the bandwidth load of the single vehicle terminal link exceeds a fourth alarm threshold;
and the total bandwidth load of all the vehicle-mounted links exceeds a fifth alarm threshold.
6. A system for OTA usage monitoring based on soft routing, for performing a method for OTA usage monitoring based on soft routing as claimed in any one of claims 1-5, comprising:
The soft routing module is used for realizing that the soft routing module enables the vehicle machine end to establish network connection with an application server end of an operator;
the flow acquisition module is connected with the soft routing module and is used for monitoring and acquiring flow data of a target network card interface on the soft routing module;
the flow analysis module is connected with the flow acquisition module and is used for carrying out aggregation statistical analysis on the flow data to obtain a flow analysis result;
The result storage module is connected with the flow analysis module and used for storing the flow analysis result;
The flow control module is respectively connected with the result storage module and the soft routing module and is used for generating corresponding flow control commands when the stored flow analysis results are monitored to trigger a preset flow control rule and sending the flow control commands to the soft routing module;
the soft routing module is also used for executing the flow control command to control the flow of the vehicle machine side and the flow of the application server side.
7. The system for OTA usage monitoring based on soft routing of claim 6 wherein the traffic acquisition module comprises:
the flow mirror image unit is used for collecting flow data of the target network card interface on the soft route module in a mirror image mode;
the file generation unit is connected with the flow mirror image unit and is used for generating a flow file for the flow data;
The file storage unit is connected with the file generation unit and is used for storing the flow file;
the flow analysis module is used for: and monitoring and downloading the newly added flow file in the file storage unit, and performing aggregation statistical analysis on the flow data in the downloaded flow file to obtain the flow analysis result.
8. The system for OTA usage monitoring based on soft routing of claim 6 further comprising:
And the alarm monitoring module is connected with the result storage module and is used for carrying out abnormal flow analysis on the stored flow analysis result according to a preset alarm rule, and generating an abnormal flow alarm when abnormal flow exists.
9. The system for OTA usage monitoring based on soft routing of claim 6 wherein the preset flow control rules include: the method comprises the steps of a single vehicle side black-and-white list rule, a single vehicle side firewall rule, a single application black-and-white list rule, a single application blocking rule, a combined vehicle side blocking rule and a combined application blocking rule.
10. The system for OTA usage monitoring based on soft routing of claim 8 wherein the alert monitor module monitors that abnormal traffic is considered to exist when one of the following scenarios exists for the traffic analysis result:
the single-hour consumption of all the vehicle terminals exceeds a first alarm threshold;
the single-hour consumption of the single vehicle-mounted terminal exceeds a second alarm threshold;
The network connection number exceeds a third alarm threshold;
the bandwidth load of the single vehicle terminal link exceeds a fourth alarm threshold;
and the total bandwidth load of all the vehicle-mounted links exceeds a fifth alarm threshold.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202410641072.8A CN118353844A (en) | 2024-05-22 | 2024-05-22 | Method and system for monitoring OTA usage based on soft route |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202410641072.8A CN118353844A (en) | 2024-05-22 | 2024-05-22 | Method and system for monitoring OTA usage based on soft route |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN118353844A true CN118353844A (en) | 2024-07-16 |
Family
ID=91822926
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202410641072.8A Pending CN118353844A (en) | 2024-05-22 | 2024-05-22 | Method and system for monitoring OTA usage based on soft route |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN118353844A (en) |
-
2024
- 2024-05-22 CN CN202410641072.8A patent/CN118353844A/en active Pending
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP4759389B2 (en) | Packet communication device | |
| CN108040057B (en) | Working method of SDN system suitable for guaranteeing network security and network communication quality | |
| US8989002B2 (en) | System and method for controlling threshold testing within a network | |
| US20210194894A1 (en) | Packet metadata capture in a software-defined network | |
| CA2353348C (en) | Network management of a performance enhancing proxy architecture | |
| EP3151470B1 (en) | Analytics for a distributed network | |
| US12250151B2 (en) | Method and system for triggering augmented data collection on a network based on traffic patterns | |
| CN111092840B (en) | Method, system and storage medium for generating processing strategy | |
| CN111314179B (en) | Network quality detection method, device, equipment and storage medium | |
| US8826296B2 (en) | Method of supervising a plurality of units in a communications network | |
| CN118353844A (en) | Method and system for monitoring OTA usage based on soft route | |
| CN116319468B (en) | Network telemetry method, device, switch, network, electronic equipment and medium | |
| CN112422434A (en) | IPFIX message processing method, application thereof and ASIC chip | |
| WO2022231553A1 (en) | Network management system which accelerates the tcp traffic at the level of transport layer |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination |