Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Network Analysis Method and System

A technology of network analysis and network data analysis, applied in the field of network analysis methods and systems, can solve the problems of analysis equipment performance loss, increase server pressure, increase cost, etc., and achieve the effect of avoiding equipment performance loss and increasing pressure

Active Publication Date: 2016-07-06
SANGFOR TECH INC
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Generally, network analysis equipment is deployed between WLAN (WirelessMetropolitanAreaNetworks, wireless local area network) AC (AccessController, access controller) and AP (AccessPoint, access point), and the real radius (RemoteAuthenticationDialInUserService, remote user dial-up authentication system), portal (entrance) authentication request process is initiated by BRAS (BroadbandRemoteAccessServer, broadband access server), and exchanges with radius and portal server; therefore, no authentication data passes through the analysis equipment, while the authentication data initiated by BRAS It is also impossible to correlate to specific analysis equipment one by one.
In this environment, some network analysis solutions do not associate IP (Internet Protocol, Internet Protocol) with users, but directly analyze according to IP; this kind of solution cannot analyze the real network quality when user-level network quality analysis is required. user name, it is impossible to match the IP with the real user, and it is difficult to conduct effective analysis and accurately locate the real user
Some solutions are to directly query or synchronize the online user data of the radius server, and then associate the IP with the real user; this kind of solution has poor real-time performance and additionally increases the pressure on the server
Some solutions directly mirror all the authentication data to the analysis device, and then perform analysis and correlation on the local machine; this solution requires additional additional mirroring devices, which increases costs, and the analysis of multiple analysis devices is the same. The aggregated authentication data causes performance loss of the analysis equipment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network Analysis Method and System
  • Network Analysis Method and System
  • Network Analysis Method and System

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The technical solutions of the present invention will be further described below in conjunction with the accompanying drawings and specific embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0041] refer to figure 1 , figure 1 It is a schematic structural diagram of an embodiment of the network analysis system of the present invention; figure 1 The network analysis system of the present invention shown includes: a network data analysis device 01 .

[0042] The network data analysis device 01 is used to strip the tunnel data of the terminal data packet to obtain the user IP address of the terminal; identify whether the IP address has been associated with a real user name; if so, analyze the network data according to the real user name and store the analysis results.

[0043] Specifically, the network data analysis device 01 receives the terminal data p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network analytical method which includes the following steps: a network analytical device detaches tunnel data of a terminal database, an internet protocol (IP) address of the terminal is obtained, and whether the IP address is related to a real user name or not is identified. If the IP address is related to the real user name, network data is analyzed according to the real user name and an analyzed result is saved. The invention also discloses a network analytical system. Due to the fact that the network analytical device detaches the tunnel data of the terminal database, the IP address of the terminal is obtained. When the network analytical system identifies that the IP address is related to the real user name, and the network data is analyzed according to the real user name and the analyzed result is saved. The network analytical method and the network analytical system have the advantages of accurately positioning the real user name to analyze the network data, equipment property loss caused by analyzing signaling data repeatedly is avoided, and at the same time pressure of a server is not added.

Description

technical field [0001] The invention relates to the technical field of computer networks, in particular to a network analysis method and system. Background technique [0002] Generally, network analysis equipment is deployed between WLAN (WirelessMetropolitanAreaNetworks, wireless local area network) AC (AccessController, access controller) and AP (AccessPoint, access point), and the real radius (RemoteAuthenticationDialInUserService, remote user dial-up authentication system), portal (entrance) authentication request process is initiated by BRAS (BroadbandRemoteAccessServer, broadband access server), and exchanges with radius and portal server; therefore, no authentication data passes through the analysis equipment, while the authentication data initiated by BRAS It is also impossible to correlate to specific analysis equipment one by one. In this environment, some network analysis solutions do not associate IP (Internet Protocol, Internet Protocol) with users, but directl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W24/02
Inventor 张兴彦罗印泉周勇
Owner SANGFOR TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products