[go: up one dir, main page]

CN118353844A - Method and system for monitoring OTA usage based on soft route - Google Patents

Method and system for monitoring OTA usage based on soft route Download PDF

Info

Publication number
CN118353844A
CN118353844A CN202410641072.8A CN202410641072A CN118353844A CN 118353844 A CN118353844 A CN 118353844A CN 202410641072 A CN202410641072 A CN 202410641072A CN 118353844 A CN118353844 A CN 118353844A
Authority
CN
China
Prior art keywords
flow
module
soft
rule
vehicle
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202410641072.8A
Other languages
Chinese (zh)
Inventor
薛超
李卫兵
邓永新
孙智彬
曹家祥
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Youka Network Technology Co ltd
Original Assignee
Shanghai Youka Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Youka Network Technology Co ltd filed Critical Shanghai Youka Network Technology Co ltd
Priority to CN202410641072.8A priority Critical patent/CN118353844A/en
Publication of CN118353844A publication Critical patent/CN118353844A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/20Traffic policing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0631Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0813Configuration setting characterised by the conditions triggering a change of settings
    • H04L41/082Configuration setting characterised by the conditions triggering a change of settings the condition being updates or upgrades of network functionality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention provides a method and a system for monitoring OTA consumption based on soft route, which uses a soft route module to establish network connection between a vehicle machine end and an application server end of an operator; monitoring and acquiring flow data of a target network card interface on a soft routing module; performing aggregation statistical analysis on the flow data to obtain a flow analysis result and storing the flow analysis result; when the stored flow analysis result is monitored to trigger a preset flow control rule, a corresponding flow control command is generated, and the flow control command is sent to the soft routing module; the soft routing module executes the flow control command to control the flow of the vehicle machine side and the flow of the application server side. Under the scene of the soft route operation system, the statistics of the OTA call ticket flow is realized, the OTA consumption is monitored and controlled, and the realization cost is low.

Description

Method and system for monitoring OTA usage based on soft route
Technical Field
The invention relates to the technical field of Internet of vehicles, in particular to a method and a system for monitoring OTA usage based on soft routing.
Background
The traditional way that the internet of vehicles opens up a traffic link with an operator can adopt a VPN (virtual private network), a physical router is generally used for building special line equipment, and a soft routing system such as VyOS is used for some parts, but the functions of the soft routing operation system are imperfect and limited by the bottom support of hardware equipment, so that related functions such as traffic individual calculation statistics, monitoring, alarming, control and the like are lacked.
Disclosure of Invention
Based on the problems, the invention provides a method and a system for monitoring OTA usage based on soft routing, which only solve the technical problem that traffic monitoring is limited on a vehicle-mounted terminal using a soft routing system in the prior art.
A method for monitoring OTA usage based on soft route includes:
a1, using a soft routing module to enable a vehicle machine end to establish network connection with an application server end of an operator;
A2, monitoring and acquiring flow data of a target network card interface on the soft routing module;
step A3, carrying out aggregation statistical analysis on the flow data to obtain a flow analysis result and storing the flow analysis result;
Step A4, when the stored flow analysis result is monitored to trigger a preset flow control rule, a corresponding flow control command is generated, and the flow control command is sent to the soft routing module;
And step A5, the soft routing module executes the flow control command to control the flow of the vehicle machine side and the flow of the application server side.
Further, step A2 includes:
step A21, collecting flow data of a target network card interface on a soft routing module in a mirror image mode;
step A22, generating a flow file for the flow data and storing the flow file;
In step A3, monitoring and downloading the stored newly-added flow file, and carrying out aggregation statistical analysis on the flow data in the downloaded newly-added flow file to obtain a flow analysis result.
Further, step A3 further includes:
And step A6, carrying out abnormal flow analysis on the stored flow analysis result according to a preset alarm rule, and generating an abnormal flow alarm when abnormal flow exists.
Further, in step A4, the preset flow control rule includes: the method comprises the steps of a single vehicle side black-and-white list rule, a single vehicle side firewall rule, a single application black-and-white list rule, a single application blocking rule, a combined vehicle side blocking rule and a combined application blocking rule.
Further, in step A6, when the traffic analysis result has one of the following situations, it is considered that there is abnormal traffic:
the single-hour consumption of all the vehicle terminals exceeds a first alarm threshold;
the single-hour consumption of the single vehicle-mounted terminal exceeds a second alarm threshold;
The network connection number exceeds a third alarm threshold;
the bandwidth load of the single vehicle terminal link exceeds a fourth alarm threshold;
and the total bandwidth load of all the vehicle-mounted links exceeds a fifth alarm threshold.
A system for performing OTA usage monitoring based on soft routing, which is used for performing the method for performing OTA usage monitoring based on soft routing, comprising:
The soft routing module is used for realizing that the soft routing module enables the vehicle machine end to establish network connection with an application server end of an operator;
The flow acquisition module is connected with the soft routing module and is used for monitoring and acquiring flow data of a target network card interface on the soft routing module;
The flow analysis module is connected with the flow acquisition module and is used for carrying out aggregation statistical analysis on the flow data to obtain a flow analysis result;
The result storage module is connected with the flow analysis module and used for storing flow analysis results;
the flow control module is respectively connected with the result storage module and the soft routing module, and is used for generating corresponding flow control commands when the stored flow analysis results are monitored to trigger the preset flow control rules, and sending the flow control commands to the soft routing module;
The soft routing module is also used for executing the flow control command to control the flow of the vehicle machine side and the flow of the application server side.
Further, the flow obtaining module includes:
The flow mirror image unit is used for collecting flow data of a target network card interface on the soft route module in a mirror image mode;
The file generation unit is connected with the flow mirror image unit and is used for generating flow files for flow data;
the file storage unit is connected with the file generation unit and is used for storing the flow file;
The flow analysis module is used for: and monitoring and downloading the newly added flow file in the file storage unit, and performing aggregation statistical analysis on the flow data in the downloaded flow file to obtain a flow analysis result.
Further, the method further comprises the following steps:
The alarm monitoring module is connected with the result storage module and is used for carrying out abnormal flow analysis on the stored flow analysis result according to a preset alarm rule, and generating an abnormal flow alarm when abnormal flow exists.
Further, the preset flow control rule includes: the method comprises the steps of a single vehicle side black-and-white list rule, a single vehicle side firewall rule, a single application black-and-white list rule, a single application blocking rule, a combined vehicle side blocking rule and a combined application blocking rule.
Further, the alarm monitoring module monitors that abnormal flow exists when one of the following situations exists in the flow analysis result:
the single-hour consumption of all the vehicle terminals exceeds a first alarm threshold;
the single-hour consumption of the single vehicle-mounted terminal exceeds a second alarm threshold;
The network connection number exceeds a third alarm threshold;
the bandwidth load of the single vehicle terminal link exceeds a fourth alarm threshold;
and the total bandwidth load of all the vehicle-mounted links exceeds a fifth alarm threshold.
The beneficial technical effects of the invention are as follows: under the scene of the soft route operation system, the statistics of OTA call ticket flow is realized, the OTA consumption is monitored and controlled, different rule settings can be carried out according to the service scene, the OTA high-flow scene can be supported, and the realization cost is low.
Drawings
FIGS. 1-2 are flow charts of steps of a method for OTA usage monitoring based on soft routing according to the present invention;
fig. 3 is a schematic block diagram of a system for OTA usage monitoring based on soft routing according to the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
It should be noted that, without conflict, the embodiments of the present invention and features of the embodiments may be combined with each other.
The invention is further described below with reference to the drawings and specific examples, which are not intended to be limiting.
Referring to fig. 1, the present invention provides a method for monitoring OTA usage based on soft routing, including:
a1, using a soft routing module to enable a vehicle machine end to establish network connection with an application server end of an operator;
A2, monitoring and acquiring flow data of a target network card interface on the soft routing module;
step A3, carrying out aggregation statistical analysis on the flow data to obtain a flow analysis result and storing the flow analysis result;
Step A4, when the stored flow analysis result is monitored to trigger a preset flow control rule, a corresponding flow control command is generated, and the flow control command is sent to the soft routing module;
And step A5, the soft routing module executes the flow control command to control the flow of the vehicle machine side and the flow of the application server side.
In step A1, the soft routing module is a soft routing server, and the soft routing system is used VyOS.
In step A1, IPSec connection is established between the soft routing module and the application server side of the operator, and a link between the vehicle machine side and the public network is opened. IPSec, an internet security protocol (Internet Protocol Security, IPSec), protects the network transport protocol cluster (a collection of some interrelated protocols) of the IP protocol by encrypting and authenticating packets of the IP protocol. The soft routing module may employ BGP dual-wire approach, BGP, border gateway protocol (Border Gateway Protocol), a routing protocol of an autonomous system running on TCP. BGP is the only protocol used to handle networks like the internet and is the only protocol that can handle multipath connections between unrelated routing domains.
In step A2, the target network card interface is, for example, a network card on an ethernet interface that communicates with other devices in the computer network, such as an eth0 network card, so that the traffic can be acquired.
Under the scene of the soft route operation system, the statistics of OTA call ticket flow is realized, the OTA consumption is monitored and controlled, different rule settings can be carried out according to the service scene, the OTA high-flow scene can be supported, and the realization cost is low.
Referring to fig. 2, further, step A2 includes:
step A21, collecting flow data of a target network card interface on a soft routing module in a mirror image mode;
step A22, generating a flow file for the flow data and storing the flow file;
In step A3, monitoring and downloading the stored newly-added flow file, and carrying out aggregation statistical analysis on the flow data in the downloaded newly-added flow file to obtain a flow analysis result.
In step a21, a flow-accounting netflow is established in the soft routing module, and the traffic of the target network card interface of the soft routing module is forwarded by a netflow mode to the server where nfdump is located. Netflow is a network traffic monitoring tool, and Flow Accounting is a core concept of Netflow mechanism, which is responsible for performing tasks of tracking, counting and classifying data flows, and generating traffic records. nfdump is an open source toolset responsible for receiving and storing NetFlow data.
In step a22, the server at nfdump establishes Nfdump, captures the flow data collected by netflow through Nfdump and parses the flow data to generate a flow file at timing, and stores the flow file, for example, uploads the flow file to the object store OSS. OSS, object storage service (Object Storage Service), is a mass, safe, low-cost, highly reliable cloud storage service suitable for storing any type of file.
In step A3, the directory of the object storage service (Object Storage Service) is monitored, and when a new file is added, the file is downloaded, and aggregate statistical analysis is performed on the streaming data. And storing the flow analysis result into a database. The aggregate statistical analysis can analyze the traffic total, the hour consumption, the day consumption and the month consumption of each application level of the bicycle machine side dimension and the channel dimension. Because the IP of the vehicle-to-vehicle network card is fixed in the same APN, the network card IP and the vehicle-to-vehicle terminal ID can be associated one to one in a single-card and single-vehicle scene, and the OTA consumption of the vehicle dimension can be screened out through the destination IP (namely the vehicle-to-vehicle terminal network card IP) of OTA application.
Further, step A3 further includes:
And step A6, carrying out abnormal flow analysis on the stored flow analysis result according to a preset alarm rule, and generating an abnormal flow alarm when abnormal flow exists.
Further, in step A4, the preset flow control rule includes: the method comprises the steps of a single vehicle side black-and-white list rule, a single vehicle side firewall rule, a single application black-and-white list rule, a single application blocking rule, a combined vehicle side blocking rule and a combined application blocking rule.
And the single vehicle side black-and-white list rule is that the application service on the white list is accessed aiming at the single vehicle side, and the application service on the black list is not allowed to be accessed.
And a black-and-white list rule is applied singly, namely, the application service is allowed to be accessed by the vehicle-mounted terminal on the white list, and the vehicle-mounted terminal on the black list is not allowed to be accessed.
The firewall rules of the bicycle machine side can carry out operations such as shutting down, adjusting the speed, adjusting the bandwidth, sealing and the like on the bicycle machine side according to different service scenes. Different business scenarios perform different operations. The speed of the link of one or more application services accessed by the vehicle side can be limited, for example, for a certain application service, the speed is reduced if the usage of the vehicle side reaches a certain value. And limiting the total speed of links of all application services accessed by the vehicle terminal, namely reducing the bandwidth. If the vehicle terminal encounters abnormal conditions such as faults, large-flow use, illegal operation or network attack, the vehicle terminal can be subjected to blocking operation, and the vehicle terminal is forbidden to access any application service after blocking. For shutdown, for example, if the traffic of a vehicle terminal for a certain application service reaches an upper limit, the vehicle terminal is shut down, and the vehicle terminal is stopped to access the application service.
And if one application service is illegal, illegal or otherwise blocked, the soft routing module performs blocking operation on the application service to prohibit the application service from being used by all the networked vehicle terminals.
The combination vehicle machine end sealing and disabling rule is that a set of combination vehicle machine end sealing and disabling rule is set, so that sealing and disabling operations can be carried out on a plurality of vehicle machine ends at one time.
The combination application blocking rule, namely, a set of combination application blocking rule is set, so that blocking operation can be carried out on a plurality of application services at one time.
Further, in step A6, when the traffic analysis result has one of the following situations, it is considered that there is abnormal traffic:
the single-hour consumption of all the vehicle terminals exceeds a first alarm threshold;
the single-hour consumption of the single vehicle-mounted terminal exceeds a second alarm threshold;
The network connection number exceeds a third alarm threshold;
the bandwidth load of the single vehicle terminal link exceeds a fourth alarm threshold;
and the total bandwidth load of all the vehicle-mounted links exceeds a fifth alarm threshold.
And setting a threshold value for a scene with abnormal data flow, triggering a rule alarm after the threshold value is reached, and informing an operation and maintenance after-sales person of the abnormal flow alarm in a multi-channel mode such as mail, weChat, IM webhook, enterprise WeChat, short message, telephone and the like for troubleshooting and processing.
Preferably, the first alarm threshold is, for example, 3T.
Preferably, the second alarm threshold is, for example, 1T.
Preferably, the third alarm threshold is, for example, 3W (3 ten thousand).
Referring to fig. 3, the present invention further provides a system for performing OTA usage monitoring based on a soft route, which is configured to perform a method for performing OTA usage monitoring based on a soft route as described above, including:
The soft routing module (1) is used for realizing that the soft routing module enables the vehicle machine end to establish network connection with an application server end of an operator;
The flow acquisition module (2) is connected with the soft routing module (1) and is used for monitoring and acquiring flow data of a target network card interface on the soft routing module;
the flow analysis module (3) is connected with the flow acquisition module (2) and is used for carrying out aggregation statistical analysis on the flow data to obtain a flow analysis result;
the result storage module (4) is connected with the flow analysis module (3) and is used for storing flow analysis results;
The flow control module (5) is respectively connected with the result storage module (4) and the soft routing module (1) and is used for generating corresponding flow control commands when monitoring that the stored flow analysis results trigger a preset flow control rule and sending the flow control commands to the soft routing module;
The soft routing module (1) is also used for executing the flow control command to control the flow of the vehicle machine side and the flow of the application server side.
The soft routing module is a soft routing server and uses VyOS soft routing system.
And the soft routing module is connected with an application server side of an operator side by IPSec, so that a link between the vehicle machine side and the public network is opened. IPSec, an internet security protocol (Internet Protocol Security, IPSec), protects the network transport protocol cluster (a collection of some interrelated protocols) of the IP protocol by encrypting and authenticating packets of the IP protocol. The soft routing module may employ BGP dual-wire approach, BGP, border gateway protocol (Border Gateway Protocol), a routing protocol of an autonomous system running on TCP. BGP is the only protocol used to handle networks like the internet and is the only protocol that can handle multipath connections between unrelated routing domains.
The target network card interface is, for example, a network card on an ethernet interface that communicates with other devices in the computer network, such as an eth0 network card, so that traffic may be acquired.
Under the scene of the soft route operation system, the statistics of OTA call ticket flow is realized, the OTA consumption is monitored and controlled, different rule settings can be carried out according to the service scene, the OTA high-flow scene can be supported, and the realization cost is low.
Further, the flow obtaining module (2) includes:
the flow mirror unit (21) is used for collecting flow data of a target network card interface on the soft routing module in a mirror mode;
a file generation unit (22) connected to the flow mirror unit (21) for generating a flow file for the flow data;
a file storage unit (23) connected to the file generation unit (22) for storing the flow rate file;
the flow analysis module (3) is used for: and monitoring and downloading the newly added flow file in the file storage unit, and performing aggregation statistical analysis on the flow data in the downloaded flow file to obtain a flow analysis result.
The flow mirror unit (21) is netflow, a flow-accounting netflow is established in the soft routing module, and the flow of the target network card interface of the soft routing module is forwarded in a netflow mode and forwarded to a server where nfdump is located.
The file generating unit (22) establishes Nfdump for nfdump server and nfdump server, captures flow data collected by netflow through Nfdump, analyzes and generates flow file at fixed time, and stores the flow file, for example, uploads the flow file to object storage OSS. OSS, object storage service (Object Storage Service), is a mass, safe, low-cost, highly reliable cloud storage service suitable for storing any type of file.
The flow analysis module (3) monitors the catalogue of the object storage service (Object Storage Service), downloads the file when the file is newly added, and performs aggregation statistical analysis on the flow data. And storing the flow analysis result into a database (namely a result storage module). The aggregate statistical analysis can analyze the traffic total, the hour consumption, the day consumption and the month consumption of each application level of the bicycle machine side dimension and the channel dimension. Because the IP of the vehicle-to-vehicle network card is fixed in the same APN, the network card IP and the vehicle-to-vehicle terminal ID can be associated one to one in a single-card and single-vehicle scene, and the OTA consumption of the vehicle dimension can be screened out through the destination IP (namely the vehicle-to-vehicle terminal network card IP) of OTA application.
Further, the method further comprises the following steps:
The alarm monitoring module (6) is connected with the result storage module (5) and is used for carrying out abnormal flow analysis on the stored flow analysis result according to a preset alarm rule, and generating an abnormal flow alarm when abnormal flow exists.
Further, the preset flow control rule includes: the method comprises the steps of a single vehicle side black-and-white list rule, a single vehicle side firewall rule, a single application black-and-white list rule, a single application blocking rule, a combined vehicle side blocking rule and a combined application blocking rule.
And the single vehicle side black-and-white list rule is that the application service on the white list is accessed aiming at the single vehicle side, and the application service on the black list is not allowed to be accessed.
And a black-and-white list rule is applied singly, namely, the application service is allowed to be accessed by the vehicle-mounted terminal on the white list, and the vehicle-mounted terminal on the black list is not allowed to be accessed.
The firewall rules of the bicycle machine side can carry out operations such as shutting down, adjusting the speed, adjusting the bandwidth, sealing and the like on the bicycle machine side according to different service scenes. Different business scenarios perform different operations. The speed of the link of one or more application services accessed by the vehicle side can be limited, for example, for a certain application service, the speed is reduced if the usage of the vehicle side reaches a certain value. And limiting the total speed of links of all application services accessed by the vehicle terminal, namely reducing the bandwidth. If the vehicle terminal encounters abnormal conditions such as faults, large-flow use, illegal operation or network attack, the vehicle terminal can be subjected to blocking operation, and the vehicle terminal is forbidden to access any application service after blocking. For shutdown, for example, if the traffic of a vehicle terminal for a certain application service reaches an upper limit, the vehicle terminal is shut down, and the vehicle terminal is stopped to access the application service.
And if one application service is illegal, illegal or otherwise blocked, the soft routing module performs blocking operation on the application service to prohibit the application service from being used by all the networked vehicle terminals.
The combination vehicle machine end sealing and disabling rule is that a set of combination vehicle machine end sealing and disabling rule is set, so that sealing and disabling operations can be carried out on a plurality of vehicle machine ends at one time.
The combination application blocking rule, namely, a set of combination application blocking rule is set, so that blocking operation can be carried out on a plurality of application services at one time.
Further, the alarm monitoring module (6) monitors that abnormal flow is considered to exist when one of the following situations exists in the flow analysis result:
the single-hour consumption of all the vehicle terminals exceeds a first alarm threshold;
the single-hour consumption of the single vehicle-mounted terminal exceeds a second alarm threshold;
The network connection number exceeds a third alarm threshold;
the bandwidth load of the single vehicle terminal link exceeds a fourth alarm threshold;
and the total bandwidth load of all the vehicle-mounted links exceeds a fifth alarm threshold.
And setting a threshold value for a scene with abnormal data flow, triggering a rule alarm after the threshold value is reached, and informing an operation and maintenance after-sales person of the abnormal flow alarm in a multi-channel mode such as mail, weChat, IM webhook, enterprise WeChat, short message, telephone and the like for troubleshooting and processing.
Preferably, the first alarm threshold is, for example, 3T.
Preferably, the second alarm threshold is, for example, 1T.
Preferably, the third alarm threshold is, for example, 3W (3 ten thousand).
The foregoing is merely illustrative of the preferred embodiments of the present invention and is not intended to limit the embodiments and scope of the present invention, and it should be appreciated by those skilled in the art that equivalent substitutions and obvious variations may be made using the description and illustrations of the present invention, and are intended to be included in the scope of the present invention.

Claims (10)

1. A method for OTA usage monitoring based on soft routing, comprising:
a1, using a soft routing module to enable a vehicle machine end to establish network connection with an application server end of an operator;
a2, monitoring and acquiring flow data of a target network card interface on the soft routing module;
Step A3, carrying out aggregation statistical analysis on the flow data to obtain a flow analysis result and storing the flow analysis result;
Step A4, when the stored flow analysis result is monitored to trigger a preset flow control rule, a corresponding flow control command is generated, and the flow control command is sent to the soft routing module;
and step A5, the soft routing module executes the flow control command to control the flow of the vehicle machine side and the flow of the application server side.
2. The method for OTA usage monitoring based on soft routing of claim 1 wherein said step A2 comprises:
step A21, collecting the flow data of the target network card interface on the soft route module in a mirror image mode;
Step A22, generating a flow file for the flow data and storing the flow file;
In the step A3, monitoring and downloading the stored newly added flow file, and performing aggregate statistical analysis on the flow data in the downloaded newly added flow file to obtain the flow analysis result.
3. The method for OTA usage monitoring based on soft routing of claim 1 wherein said step A3 further comprises:
And step A6, carrying out abnormal flow analysis on the stored flow analysis result according to a preset alarm rule, and generating an abnormal flow alarm when abnormal flow exists.
4. The method for OTA usage monitoring based on soft routing of claim 1 wherein in said step A4, said preset flow control rules comprise: the method comprises the steps of a single vehicle side black-and-white list rule, a single vehicle side firewall rule, a single application black-and-white list rule, a single application blocking rule, a combined vehicle side blocking rule and a combined application blocking rule.
5. A method for OTA usage monitoring based on soft routing as defined in claim 3, wherein in said step A6, abnormal traffic is considered to exist when said traffic analysis results in one of the following situations:
the single-hour consumption of all the vehicle terminals exceeds a first alarm threshold;
the single-hour consumption of the single vehicle-mounted terminal exceeds a second alarm threshold;
The network connection number exceeds a third alarm threshold;
the bandwidth load of the single vehicle terminal link exceeds a fourth alarm threshold;
and the total bandwidth load of all the vehicle-mounted links exceeds a fifth alarm threshold.
6. A system for OTA usage monitoring based on soft routing, for performing a method for OTA usage monitoring based on soft routing as claimed in any one of claims 1-5, comprising:
The soft routing module is used for realizing that the soft routing module enables the vehicle machine end to establish network connection with an application server end of an operator;
the flow acquisition module is connected with the soft routing module and is used for monitoring and acquiring flow data of a target network card interface on the soft routing module;
the flow analysis module is connected with the flow acquisition module and is used for carrying out aggregation statistical analysis on the flow data to obtain a flow analysis result;
The result storage module is connected with the flow analysis module and used for storing the flow analysis result;
The flow control module is respectively connected with the result storage module and the soft routing module and is used for generating corresponding flow control commands when the stored flow analysis results are monitored to trigger a preset flow control rule and sending the flow control commands to the soft routing module;
the soft routing module is also used for executing the flow control command to control the flow of the vehicle machine side and the flow of the application server side.
7. The system for OTA usage monitoring based on soft routing of claim 6 wherein the traffic acquisition module comprises:
the flow mirror image unit is used for collecting flow data of the target network card interface on the soft route module in a mirror image mode;
the file generation unit is connected with the flow mirror image unit and is used for generating a flow file for the flow data;
The file storage unit is connected with the file generation unit and is used for storing the flow file;
the flow analysis module is used for: and monitoring and downloading the newly added flow file in the file storage unit, and performing aggregation statistical analysis on the flow data in the downloaded flow file to obtain the flow analysis result.
8. The system for OTA usage monitoring based on soft routing of claim 6 further comprising:
And the alarm monitoring module is connected with the result storage module and is used for carrying out abnormal flow analysis on the stored flow analysis result according to a preset alarm rule, and generating an abnormal flow alarm when abnormal flow exists.
9. The system for OTA usage monitoring based on soft routing of claim 6 wherein the preset flow control rules include: the method comprises the steps of a single vehicle side black-and-white list rule, a single vehicle side firewall rule, a single application black-and-white list rule, a single application blocking rule, a combined vehicle side blocking rule and a combined application blocking rule.
10. The system for OTA usage monitoring based on soft routing of claim 8 wherein the alert monitor module monitors that abnormal traffic is considered to exist when one of the following scenarios exists for the traffic analysis result:
the single-hour consumption of all the vehicle terminals exceeds a first alarm threshold;
the single-hour consumption of the single vehicle-mounted terminal exceeds a second alarm threshold;
The network connection number exceeds a third alarm threshold;
the bandwidth load of the single vehicle terminal link exceeds a fourth alarm threshold;
and the total bandwidth load of all the vehicle-mounted links exceeds a fifth alarm threshold.
CN202410641072.8A 2024-05-22 2024-05-22 Method and system for monitoring OTA usage based on soft route Pending CN118353844A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410641072.8A CN118353844A (en) 2024-05-22 2024-05-22 Method and system for monitoring OTA usage based on soft route

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410641072.8A CN118353844A (en) 2024-05-22 2024-05-22 Method and system for monitoring OTA usage based on soft route

Publications (1)

Publication Number Publication Date
CN118353844A true CN118353844A (en) 2024-07-16

Family

ID=91822926

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410641072.8A Pending CN118353844A (en) 2024-05-22 2024-05-22 Method and system for monitoring OTA usage based on soft route

Country Status (1)

Country Link
CN (1) CN118353844A (en)

Similar Documents

Publication Publication Date Title
JP4759389B2 (en) Packet communication device
CN108040057B (en) Working method of SDN system suitable for guaranteeing network security and network communication quality
US8989002B2 (en) System and method for controlling threshold testing within a network
US20210194894A1 (en) Packet metadata capture in a software-defined network
CA2353348C (en) Network management of a performance enhancing proxy architecture
EP3151470B1 (en) Analytics for a distributed network
US12250151B2 (en) Method and system for triggering augmented data collection on a network based on traffic patterns
CN111092840B (en) Method, system and storage medium for generating processing strategy
CN111314179B (en) Network quality detection method, device, equipment and storage medium
US8826296B2 (en) Method of supervising a plurality of units in a communications network
CN118353844A (en) Method and system for monitoring OTA usage based on soft route
CN116319468B (en) Network telemetry method, device, switch, network, electronic equipment and medium
CN112422434A (en) IPFIX message processing method, application thereof and ASIC chip
WO2022231553A1 (en) Network management system which accelerates the tcp traffic at the level of transport layer

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination