Universal traffic control method and system

A technology of flow control and flow control strategy, applied in the direction of transmission system, digital transmission system, electrical components, etc., can solve problems such as single control strategy, infeasibility, unreasonable utilization of network resources, etc., to avoid waste, improve flexibility, Good implementation flexibility and applicable effects

Inactive Publication Date: 2009-10-21
BEIJING VENUS INFORMATION TECH
View PDF0 Cites 31 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the current network management products adopt a very single strategy for network application traffic control, such as using a single connection limit, allocating fixed bandwidth to each user, or using protocol analysis and feature matching to control specific applications in the network environment. Take hard blocking etc.
Although this single management strategy is simple to implement, it also faces many problems
First of all, single blocking is not conducive to the development of the network, and with the development of encryption and other technologies, single blocking technology becomes more and more unfeasible
In addition, a single connection number or bandwidth limitation will sometimes affect the normal use of the network, resulting in unreasonable utilization of network resources.
These shortcomings are mainly due to the fact that the control strategy is too single and cannot distinguish between normal use and abnormal use traffic.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Universal traffic control method and system
  • Universal traffic control method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0021] This embodiment is a method for dynamic flow control in a general network application process and the basic mode of the system, and its basic structure is as follows figure 1 shown. Including network application feature library, network application identifier, policy rule library, information extractor and traffic control policy implementation device, the system workflow is as follows: figure 2 Shown:

[0022] A general flow control method, comprising the following steps:

[0023] Network application identification steps;

[0024] Relevant information extraction steps;

[0025] Flow control policy implementation steps.

[0026] in:

[0027] ① Network application identification steps. Network application identification uses protocol analysis technology for hierarchical analysis based on the actual captured data messages, and identifies which network application the current data message belongs to according to the pre-set message characteristics of various network ...

Embodiment 2

[0031] This embodiment is a preferred solution of the network application identification step in Embodiment 1:

[0032] Use the layered data packet protocol analysis method to identify the network application of the current message according to the actual captured data message and the different characteristics of various network applications set in advance.

[0033] 1) The basic idea of ​​this embodiment is: take the actually captured network message as a sample, analyze the data message according to the protocol format used in various network application processes, and rely on the data message transmitted during the communication process of the network application Among them, there are message characteristics or behavior characteristics to identify the type of network application. For example: "%13BitTorrent%20Protocol" can identify that the BitTorrent protocol or some client software using the BitTorrent protocol is being used, and it can be used as a static identification f...

Embodiment 3

[0041] This embodiment is a preferred solution for the relevant information extraction step in Embodiment 1:

[0042] Check the identification result provided by the network application identification step according to the preset network application control rules in the policy rule base, and extract relevant information from the data packets filtered according to the control rules for policy implementation.

[0043]The basic idea of ​​this embodiment is: use the identified network application message provided by the network application identification step as a sample, and use the actual detection stored in the policy rule base as a pattern to first perform matching to determine whether the application in the current network environment is a policy Applications within the allowed range, and applications that are not allowed or must be restricted by the policy can be regarded as abnormal network applications. The policy rule settings here can be flexibly set according to differe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a universal automatic control method of network application traffic and a system thereof. The system comprises a network application feature base, a network application identifier, a policy rule base, an information extractor and a traffic control policy implementation device. Operation of the system comprises the following steps: a network application identification step, a related information extraction step and a traffic control policy implementation step. The system solves a problem that a traditional product is short of flexibility for network application traffic control, realizes real-time implementation of corresponding traffic control policy according to different rules in an actual network environment, can establish and implement proper traffic management policies according to actual requirements of user network condition, and has the characteristics of high speed, high accuracy and the like.

Description

technical field [0001] The invention relates to a method and a system for flow control in a network application process, which can be used in network management products and audit products, and belongs to the field of network technology. Background technique [0002] The network management system is widely used as an important means of network security protection. It is usually configured on the gateway to achieve optimal network efficiency through the configuration of the overall network internal architecture and applications. It realizes the monitoring and policy adjustment of the current network operation status, enables the smooth and normal operation of network services, avoids the abuse and waste of network resources, and ensures the normal operation of the network system. It is an effective method for enterprises to realize IT management and control. With the development of the network, more and more new applications appear in the current network environment, and thes...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/56H04L29/06H04L47/20
Inventor 孙海波杨海青胡斌骆拥政李博
Owner BEIJING VENUS INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products