Data acquisition method based on metadata

A data collection and metadata technology applied in the information field to achieve the effect of saving deployment space

Active Publication Date: 2017-12-22
南京云利来软件科技有限公司
View PDF7 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But the original solution requires multiple iTAP devices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data acquisition method based on metadata
  • Data acquisition method based on metadata
  • Data acquisition method based on metadata

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0044] 1.1 IEEE 802.1ad tag

[0045] IEEE 802.1ad and IEEE 802.1q are extensions of the network layer 2 protocol. The invention puts a second-layer label on the flow of different collection points to distinguish the flow of different ports. This action is done in the network card driver layer. For network cards that support IEEE802.1.ad, the required VLAN ID of IEEE 802.1ad is embedded in the Layer 2 protocol analysis, and the labeling algorithm is as follows:

[0046] 1) If the input is an Ethernet II message, add 802.1q TAG on the basis of the original message, TPID is: 0x8100, VID is the number of the physical port: starting from 2, 2, 3, 4 and so on.

[0047] 2) If it is an 802.1Q message, add the 802.1ad TAG on the basis of the original message, the TPID is: 0x88a8, and the VID is the number of the physical port: starting from 2.

[0048] 3) If the input is already an 802.1ad message, then it should

[0049] a. Configure the network card to accept such double-labeled ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data acquisition method based on metadata. The multi-point acquisition of network traffic is performed by adopting a set of equipment instead of a distributed acquisition system, and thus the end-to-end network performance is tracked and compared; the ability to distinguish the traffic from different ports is added to TCP/IP protocol analysis, and thus a high-performance intelligent analysis acquisitor is used to replace multiple sets of low-speed acquisition equipment. The method comprises the following steps: firstly, making different two-layer labels for the traffic of each physical port, and then adopting the labels to distinguish the traffic from the different ports in layer-by-layer analysis; and storing analysis results to a big data analysis platform in the form of metadata, and adopting a big data analysis technology to solve the problem that the same flow also can be compared and identified after being modified in data transmission. According to a single-point acquisition and big data analysis method based on the metadata, the problem that the same TCP/UDP logic flow is divided into a plurality of physical TCP flows and is difficult to track and compare in network performance analysis can be solved.

Description

technical field [0001] The invention belongs to the field of information technology, and relates to a method for multi-point collection and single-point analysis of data based on metadata on the network. Background technique [0002] From the client sending a network request to being received by the database server, the message on the network has to go through a lot of hardships to reach the destination from the origin. Take the message that has reached the data center through the Internet as an example. In the data center, it has to pass through edge switches, firewalls, intrusion detection, core switches, routers, load balancing, web application firewalls, web servers, application servers, database security detection, and finally Reach the database server. If there is a problem in any link, the transmission performance of the network will be affected, or even the network will be blocked. How to realize end-to-end network performance monitoring and discover problems in an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/26H04L12/801H04L12/833H04L29/06H04L29/08H04L47/31
CPCH04L43/0888H04L43/18H04L47/15H04L47/31H04L69/06H04L69/161H04L69/22H04L69/322
Inventor 唐锡南
Owner 南京云利来软件科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products