Method for unvarnished transmission of timestamp

A timestamp and current time technology, applied in the field of network applications, can solve problems such as complex system design and system transmission performance degradation, and achieve the effects of improving performance, simplifying design and implementation

Active Publication Date: 2014-03-26
ARRAY NETWORKS BEIJING
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When the layer-4 proxy server communicates with the client and the background server, the time stamps of both ends need to be processed separately. The processing at both ends is carried out independently. In all related steps, the layer-4 proxy server needs to process the time stamp when forwarding the message. Timestamp option, which makes the transmission performance of the system decrease, the system design is complicated, and the user requires improvement

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for unvarnished transmission of timestamp
  • Method for unvarnished transmission of timestamp
  • Method for unvarnished transmission of timestamp

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] In the following description, many technical details are proposed in order to enable readers to better understand the application. However, those skilled in the art can understand that without these technical details and various changes and modifications based on the following implementation modes, the technical solution claimed in each claim of the present application can be realized.

[0020] In order to make the purpose, technical solution and advantages of the present invention clearer, the implementation steps and working principles of the present invention will be further described in detail below with reference to the accompanying drawings.

[0021] Such as figure 1 As shown, based on the network system formed by connecting the client 101 to the background server 104 through the Internet 102 and the four-layer proxy server 103, and the system runs under the SYN Cookie / SYN Cache mechanism, a method for transparently transmitting time stamps in the present inventio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for achieving unvarnished transmission of a timestamp on the basis of a network system which is formed by a client connected with a background server through the Internet and a four-layer proxy server under the condition that the system runs under an SYN Cookie/SYN Cache mechanism. The method mainly comprises the process as follows: the client sets a TCP timestamp option to be zero in transmission control protocol (TCP) connection handshake with the background server through the internet and the four-layer proxy server. Compared with the prior art, by adopting the method disclosed by the invention, the performance of the four-layer proxy server is improved, and design and achievement of supporting the timestamp option by the four-layer proxy server are simplified.

Description

technical field [0001] The invention relates to the field of network applications, in particular to a method for transparently transmitting time stamps. Background technique [0002] SYN (the handshake signal used when TCP / IP establishes a connection) Flood (flooding) is one of the most popular methods of DoS (denial of service attack) and DdoS (distributed denial of service attack), which is a method that uses the TCP protocol to The flaw is an attack method that sends a large number of forged TCP connection requests, thereby exhausting the resources of the attacked party (full CPU or insufficient memory). The SYN Cookie / SYN Cache (two commonly used mechanisms for defending against SYN Flood attacks) mechanism can effectively defend against SYN Flood attacks and is relatively common in practical applications. [0003] Under the SYN Cookie / SYN Cache mechanism, after the four-layer proxy server receives the SYN message from the client, it will not immediately initiate a requ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06
Inventor 罗照宇兰晓伟
Owner ARRAY NETWORKS BEIJING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products