Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data link protection method and device

A data link, normal data technology, applied in the field of data communication, can solve problems such as interruption, reduce system stability and anti-attack ability, and achieve the effect of avoiding interruption, improving stability and anti-attack ability

Active Publication Date: 2007-08-29
XINHUASAN INFORMATION TECH CO LTD
View PDF0 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The disadvantage of this method is: when an application process that processes data flow is abnormal, the data processing on the data link that should be processed by the application process will be interrupted accordingly, thus seriously reducing the stability and attack resistance of the system ability
[0007] Similarly, the disadvantage of this method is: when a core running an application program is abnormal, the data processing on the TCP link exclusive to the core will be interrupted, thereby seriously reducing the stability and attack resistance of the system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data link protection method and device
  • Data link protection method and device
  • Data link protection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0066] Fig. 2 is the flowchart that realizes data link protection in the multi-core system that runs Linux operating system in SMP mode provided by the embodiment of the present invention, as shown in Fig. 2, its specific steps are as follows:

[0067] Step 201: The multi-core system is started, and the first started application process for processing TCP data streams allocates a shared memory area for backing up TCP link information to each application process in the system for processing TCP data streams, and assigns a shared memory area for each application process The adjacent application processes are respectively set, and the allocation principles of the shared memory area and the setting principles of the adjacent application processes are sent to each application process.

[0068] The application process that processes the TCP data stream that starts first usually applies for a piece of continuous shared memory after it is started, and then distributes the shared memory...

Embodiment 2

[0098] Fig. 3 is the flow chart that realizes data link protection under the multi-core system that runs the single-thread application program without operating system on each core that the embodiment of the present invention provides, in this embodiment, because each core runs a single Thread application, therefore, each single-thread application can be uniquely identified by the identification of its core, as shown in Figure 3, the specific steps are as follows:

[0099] Step 301: The multi-core system is started, and the core that starts first allocates the shared memory area required for backing up the TCP connection information for each core running a single-threaded application program, and sets adjacent cores for each core, and the shared memory area will be shared The memory allocation policy and adjacent core setting policy are sent to each core.

[0100] After the first started core is started, it usually applies for a piece of continuous shared memory, and then dist...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The method includes steps: setting up adjacent tasks for each task in advance, and allocating shared memory area for each task; each task backs up own data link information to own shared memory area; when monitoring abnormal adjacent task, the task obtains information of normal data link from shared memory area of adjacent task, and based on the information of data link to take over data link of the adjacent task. The invention also discloses data link protection equipment, which includes module of monitoring abnormity, data link taking over module, and data link backup module. The invention reduces, even prevents phenomena of data link interruption from occurring, and raises stability, anti attack capability of system.

Description

technical field [0001] The invention relates to the technical field of data communication, in particular to a data link protection method and device. Background technique [0002] The emergence of multi-core processors is a great improvement on the processing performance of previous single-core processors. It can complete several times or even dozens of times the processing capacity of single-core processors through the parallel work of multiple independent core processors. In a multi-core processor, multiple cores work in parallel, and there are relatively many critical resources between the cores. Many application solutions run different operating systems or simple applications on multiple cores, that is: no operating system Single thread to take advantage of multi-core parallel work. [0003] There are mainly two types of multi-core processor data plane implementation schemes: [0004] One is to run the Linux operating system in a symmetric multiprocessor (SMP) mode on ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/02H04L12/56G06F9/46H04L12/24
Inventor 侯玉柱
Owner XINHUASAN INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products