Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network terminal device self-protection method and system, and network terminal device

A network terminal and equipment technology, applied in the field of network communication, can solve problems such as downtime and suspended animation

Active Publication Date: 2014-03-12
SHENZHEN GONGJIN ELECTRONICS CO LTD
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Based on this, it is necessary to provide a self-protection method for network terminal equipment in view of the problem that traditional network terminal equipment is prone to downtime and suspended animation when the load is too large

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network terminal device self-protection method and system, and network terminal device
  • Network terminal device self-protection method and system, and network terminal device
  • Network terminal device self-protection method and system, and network terminal device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to make the objects, features and advantages of the present invention more comprehensible, specific implementations of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0025] In the Linux kernel, it is divided according to the objects used by resources, mainly including (1) interrupts, generally soft interrupts; (2) processes (or threads). As a network terminal device, resources need to serve the network first. When the throughput is sufficient, almost all resources are occupied by soft interrupts for receiving packets (NET_RX_SOFTIRQ) and soft interrupts for sending packets (NET_TX_SOFTIRQ). It uses the TASKLET_SOFTIRQ soft interrupt method). Note that the sending of packets mentioned in the specification and claims of the present invention generally refers to forwarding of data packets by network terminal equipment.

[0026] figure 1 It is a flowchart of a self-protection method for network terminal eq...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a network terminal device self-protection method. The method comprises: receiving a data packet; incising an inspection point at the porch of a protocol stack; inspecting whether the current CPU utilization rate of a network terminal device exceeds a CPU threshold; inspecting whether the current available memory of the network terminal device is smaller than a memory threshold; and if the CPU utilization rate exceeds the CPU threshold, or the residual available memory is smaller than the memory threshold, dropping the data packet which is not forwarded yet. The invention also relates to a network terminal device self-protection system and a network terminal device comprising the system. According to the invention, the inspection point is incised at the porch of the protocol stack, the current CPU utilization rate and the current available memory size of the network terminal device are inspected, and the currently received data packet is dropped in case of insufficiency of key resources so that seemingly-dead phenomena caused by bulk-flow network processing are prevented, and downtime phenomena caused by insufficient memory of much emergent network processing are prevented.

Description

technical field [0001] The present invention relates to the technical field of network communication, in particular to a self-protection method for network terminal equipment, a self-protection system for network terminal equipment, and a network terminal equipment including the system. Background technique [0002] Network terminal equipment generally includes bridge terminal equipment and terminal routing equipment. The popularity of the network has greatly affected people's lives today, which requires network terminal equipment to provide more secure and stable services. With the implementation of multi-network integration and the provision of more services with high demand for network bandwidth to users, operators in various places also have higher and higher performance requirements for network terminal equipment. [0003] The above-mentioned development trend will force the network terminal equipment to add a large number of security attacks and high-performance test ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L12/26
Inventor 周明明王金桂
Owner SHENZHEN GONGJIN ELECTRONICS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products