Proxy method, assistant proxy method and equipment

A technology of equipment and network equipment, which is applied in the computer field, can solve problems such as high cost, insufficient network card equipment performance and cache, and is not suitable for large-scale applications, so as to achieve the effect of guaranteeing the legality of the protocol, saving time and CPU consumption

Active Publication Date: 2017-01-04
ALIBABA GRP HLDG LTD
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the checksum offloading technology has many disadvantages: first, it needs a dedicated high-performance network card device, which is still very expensive and not suitable for large-scale applications;

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Proxy method, assistant proxy method and equipment
  • Proxy method, assistant proxy method and equipment
  • Proxy method, assistant proxy method and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0084] The application will be described in further detail below in conjunction with the accompanying drawings.

[0085] In a typical configuration of the present application, the terminal, the device serving the network and the trusted party all include one or more processors (CPUs), input / output interfaces, network interfaces and memory.

[0086] Memory may include non-permanent storage in computer-readable media, in the form of random access memory (RAM) and / or nonvolatile memory, such as read-only memory (ROM) or flash RAM. Memory is an example of computer readable media.

[0087]Computer-readable media, including both permanent and non-permanent, removable and non-removable media, can be implemented by any method or technology for storage of information. Information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random acce...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a proxy method, an assistant proxy method and equipment. According to the proxy method, the assistant proxy method and the equipment, a subchecksum1 is added after data bytes to form a subchecksum2, a subchecksum3 is obtained through calculation based on the subchecksum2, since a data partial checksum carried in data participates in data check calculation as a part of the data to obtain a final checksum, the subchecksum3 directly includes the subchecksum1, subsequent second network equipment can extract the subchecksum1 from a message quickly after receiving the message, and then the second network equipment judges whether the received message is correct or not quickly based on the subchecksum1, or generates a new subchecksum3 based on the subchecksum2 and adds the new subchecksum3 into the message. Therefore, a large number of amount and CPU consumption for calculating the checksums of the data bytes can be saved.

Description

technical field [0001] The present application relates to the computer field, and in particular to a method and device for upgrading a distributed cache cluster. Background technique [0002] When performing TCP or UDP protocol proxy, the forwarding operation of the TCPIP protocol stack will be performed on the proxy server. During the forwarding operation of the TCPIP protocol stack, data checksum calculation is required. The existing common TCP or UDP checksum Both and are calculated from the two parts of the data and the data header. Wherein, the data includes the original data and the length of the original data; the data header part includes the source IP field, the destination IP field, and the protocol number field of TCP or UDP. Such as figure 1 As shown, the checksum calculation process is as follows: [0003] Step S1: Calculate the original data checksum (subchecksum1) from the original data (Data Bytes) in the data; [0004] Step S2: adding the source IP field...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08H04L1/16
CPCH04L1/16H04L69/161H04L67/56
Inventor 邹勇
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products