Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for releasing transfer control protocol resources

A technology of transmission control protocol and release device, which is applied in the field of communication, and can solve problems such as unproposed solutions, failure to send the user's HTTP message, and full server resources.

Inactive Publication Date: 2012-07-11
ZTE CORP
View PDF4 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The cause of this abnormal connection may be malicious attacks by users, or network failures that prevent users’ HTTP packets from being sent to BNG
[0014] After the TCP full connection is established, that is, after the BNG and the UE establish a TCP connection, under normal circumstances, after the BNG redirects the user's HTTP request, the user will end the TCP connection through the TCP FIN, and the BNG will release the TCP resource, but it does not The protection of TCP resources when the HTTP connection is abnormal after the TCP connection has been established will have the following situations: (1) The user device may not send an HTTP request after the TCP connection is established and will not actively terminate the TCP connection. At this time, the BNG will still maintain TCP connection, until the TCP connection times out, obviously, at this time will also occupy the limited number of TCP connections of BNG, and then affect the normal TCP-based WEB authentication business
(2) When BNG uses WEB services, the user visits any web page after obtaining the address. After BNG and the user's TCP three-way handshake succeed, the user does not send an HTTP message, which causes the resources requested by the server before the three-way handshake cannot be released in time, and a large number of users simultaneously During WEB authentication, the server resources will be fully occupied, which will affect the WEB authentication of normal users.
[0015] For the above-mentioned problems in related technologies, no effective solution has been proposed yet

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for releasing transfer control protocol resources
  • Method and device for releasing transfer control protocol resources
  • Method and device for releasing transfer control protocol resources

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0059] Based on the above method and device for releasing TCP resources, this embodiment provides a method for protecting TCP resources when HTTP is abnormal in a WEB authentication scenario.

[0060] Before describing the specific steps of this embodiment, the principle of this embodiment will be described first. In this embodiment, after the WEB authentication user and the BNG three-way handshake to establish a TCP connection, after the HTTP keep-alive time set by the BNG expires, the BNG detects whether the WEB authentication user's TCP connection is active through the TCP keep-alive. If the BNG judges that the TCP connection of the user is not active, BNG releases the TCP resources occupied by the user. For details, please refer to Figure 5 .

[0061] Figure 5 Among them, IPSTACK is the module on the BNG that handles sending and receiving packets. Here, its small TCP module interacts with the UE to perform a three-way TCP handshake. After the three-way handshake succe...

Embodiment 2

[0091] In this embodiment, the WEB authenticated user is a malicious attacking user. After the three-way handshake establishes the TCP connection, the user maliciously releases the TCP connection without notifying the BNG.

[0092] Figure 7 It is a schematic flowchart of a method for releasing TCP resources according to Embodiment 2 of the present invention. Such as Figure 7 As shown, the method includes:

[0093] Step S702, the user successfully obtains the address and goes online, that is, the WEB authenticated user accesses the BNG and obtains the address from the BNG;

[0094] Step S704, the user and the BNG TCP three-way handshake are successful, and the keep-alive mechanism is started, that is, the WEB authenticated user visits any webpage, and BNG and the user normally establish a TCP connection through the three-way handshake and start the keep-alive mechanism;

[0095] Step S706, when the keep-alive time is up, the user's HTTP+GET message is not received, that is...

Embodiment 3

[0099] In this embodiment, after the WEB authentication user shakes hands three times to establish a TCP connection, the HTTP GET message transmission process is abnormally discarded, the user's TCP connection is still maintained, and the BNG sets the HTTP keep-alive time.

[0100] Figure 8 It is a schematic flowchart of a method for releasing TCP resources according to Embodiment 3 of the present invention. Such as Figure 8 As shown, the method includes:

[0101] Step S802, the user successfully obtains the address and goes online, that is, the WEB authenticated user accesses the BNG and obtains the address from the BNG;

[0102] Step S804, the user and the BNG TCP three-way handshake are successful, and the keep-alive mechanism is activated, that is, the WEB authenticated user visits any web page, and the BNG and the user normally establish a TCP connection through the three-way handshake and start the keep-alive mechanism;

[0103] Step S806, when the keep-alive time e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and a device for releasing transfer control protocol (TCP) resources. The method comprises the steps as follows: after three times of handshake connection between a band net gate (BNG) and user equipment (UE), the BNG sends a detection message to the UE; the BNG acquires the receiving status of the response message from the UE, wherein the response message is the response message of the detection message; and the BNG releases the TCP resources occupied by the UE according to the acquired receiving status. By adopting the technical scheme provided by the invention, the technical problem that the WEB identification of a normal user is affected because a technical scheme for affectively releasing the TCP resources is unavailable in a relative technique is solved, so that limited TCP resources is effectively utilized, and the normal user can normally carry out WEB identification.

Description

technical field [0001] The present invention relates to the communication field, in particular to a method and device for releasing a Transmission Control Protocol (Transfer Control Protocol, TCP for short) resource. Background technique [0002] WEB authentication is widely used in current wireless local area network (Wireless Local Area Network, WLAN for short) broadband access. Such as figure 1 As shown, the main working process of WEB authentication is as follows: [0003] Users accessing the Internet through the WLAN access the Broadband Network Gateway (Band Net Gate, BNG) through the Access Node (AN for short), and first obtain an IPv4 address from the BNG. At this time, the user has not been authenticated and has no access to the Internet. [0004] When a user needs to use Internet services, the user accesses any Internet web page through the Hypertext Transfer Protocol (HTTP for short), and BNG intercepts the user's HTTP connection and redirects the page accessed ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W76/06
Inventor 王姝懿袁博陈勇
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products