Session aging method and device for multi-channel protocol

A multi-channel and protocol technology, which is applied in the field of session aging of multi-channel protocols, and can solve the problems of service interruption of both parties in communication and discarding of messages from sessions.

Active Publication Date: 2017-06-13
HANGZHOU DPTECH TECH
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in practical applications, the aging time of the master session entry for the control connection and the slave session entry for the data connection in the network security device are often different. When the secondary session entry established by the negotiated session characteristics ages out, the network security device may discard the secondary session packets, thus causing service interruption between the two communicating parties.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Session aging method and device for multi-channel protocol
  • Session aging method and device for multi-channel protocol
  • Session aging method and device for multi-channel protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with this application. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present application as recited in the appended claims.

[0020] The terminology used in this application is for the purpose of describing particular embodiments only, and is not intended to limit the application. As used in this application and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the term...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The application provides a session aging method and device for a multi-channel protocol. The method is applied to the network security equipment, and comprises the following steps: traversing a local session list, and storing the session table item with aging timeout to the preset aging linked list; reading the session table item from the preset aging linked list, and judging whether the read session table item is the main session table item; if the read session table item is the main session table item, judging whether the session table item is associated with a slave session table item; and deleting the session table item with aging timeout when the session table item is not associated with the slave session table item. By adopting the method provided by the application, the business interruption caused by different aging time of the main session table item and the slave session table item can be prevented.

Description

technical field [0001] The present application relates to the field of computer communication, in particular to a session aging method and device of a multi-channel protocol. Background technique [0002] In network communication, for multi-channel protocols, such as FTP (File Transfer Protocol, Text Transfer Protocol), RTSP (Real Time Streaming Protocol, Real-time Streaming Protocol) and SIP (Session Initiation Protocol, Session Initiation Protocol) and other protocols, when transmitting data Generally, two types of connections can be established, one is a control connection and the other is a data connection. The control connection is mainly used for the transmission of control information, such as negotiating port information for establishing a data connection, etc.; the data connection is mainly used for data transmission. During data transmission, the control connection remains connected. [0003] However, in practical applications, the aging time of the master sessio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L65/1086H04L67/14H04L67/5682
Inventor 袁野
Owner HANGZHOU DPTECH TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products