Unlock instant, AI-driven research and patent intelligence for your innovation.

Method of penetrating internal network to remotely connect large-scale virtual machines

A technology of remote connection and virtual machine, applied in the field of remote control tool software penetrating the intranet

Active Publication Date: 2014-10-29
ZHEJIANG UNIV
View PDF6 Cites 36 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] This method has great limitations. First of all, the useful ports are limited, and the virtual machine resources in the platform can be continuously expanded. It is very likely that there is no Enough ports to map virtual machines; secondly, using a number (port) to mark a virtual machine is not friendly and difficult to remember

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of penetrating internal network to remotely connect large-scale virtual machines
  • Method of penetrating internal network to remotely connect large-scale virtual machines
  • Method of penetrating internal network to remotely connect large-scale virtual machines

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0038] 1. Process pool model

[0039] The agent software of the present invention adopts the process pool model, creates multiple sub-processes in advance, and handles specific agent work, while the main process maintains the size of the process pool. The size of the process pool is maintained with two thresholds MinSpareServers and MaxSpareServers in the configuration file. The statistics of the number of idle processes use file lock synchronization. When a child process enters the task processing flow, the number of idle processes is reduced by one, and when the child process exits the task processing flow, the number of idle processes is increased by one. When the number of idle processes is less than MinSpareServers, the main process creates a new worker process and waits for the arrival of tasks. When the number of idle processes is greater than MaxSpareServers, the current child process exits. In this way, the maintenance of the process pool size is realized.

[0040] ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method which is based on a proxy method so as to enable a remote control tool (vnc4server) to penetrate an internal network and thus any virtual machine in a local-area-network large-scale machine cluster can be connected. The method sends directly a request to a proxy server through constructing a url which complies with a rule; and the proxy server obtains an IP and a port number of an internal-network virtual machine, which needs to be connected, through analysis of the url of the request and forwards the request to the virtual machine and forwards a response of the virtual machine to a client. In the method of penetrating the internal network to remotely connect the large-scale virtual machine, modification of any configuration of a vnc4server server side is not needed and only one proxy server needs to be deployed for access through the url of a specified rule so that a virtual machine (Linux and Windows) in the internal network can be connected remotely through a browser.

Description

technical field [0001] The invention relates to the field of computer networks, in particular to a method for remote control tool software to penetrate an intranet. Background technique [0002] The present invention relates to a remote control protocol, and the current mainstream includes ssh protocol, vnc protocol and the like. [0003] SSH is the abbreviation of Secure Shell. It is a security protocol based on the application layer and the transport layer. It is a protocol designed to provide security for remote login sessions and other network services. Using the SSH protocol can effectively prevent information leakage in the remote management process. SSH clients are available for a variety of platforms, and almost all Unix platforms—including HP-UX, Linux, AIX, Solaris, Digital UNIX, Irix, and others—can run SSH. [0004] VNC (Virtual Network Computing) is a screen sharing and remote operation software using the RFB protocol. This software can transmit keyboard and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/12G06F9/455
Inventor 姜晓红黄鹏严海明吴朝晖杨红星
Owner ZHEJIANG UNIV