Method and device for realizing docker network penetration through two-layer protocol stack in cloud computing environment

A technology of network protocol stack and cloud computing environment, which is applied in the field of realizing docker network penetration of two-layer protocol stack, which can solve the problems of memory time consumption and reduce CPU usage

Active Publication Date: 2021-03-19
XIAMEN JIWEI TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Nowadays, docker is used more and more in the cloud computing environment. Users often create a cloud host first and then install the docker service. Go out of the protocol stack, and then go to the protocol stack of the physical machine, which will cause a huge CPU (central processing unit), memory, and time consumption. At present, there is no good technical solution to deal with such problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for realizing docker network penetration through two-layer protocol stack in cloud computing environment
  • Method and device for realizing docker network penetration through two-layer protocol stack in cloud computing environment
  • Method and device for realizing docker network penetration through two-layer protocol stack in cloud computing environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The specific embodiments of the present invention will be further described below in conjunction with the accompanying drawings. The following examples are only used to illustrate the technical solution of the present invention more clearly, but not to limit the protection scope of the present invention.

[0035] figure 1 It shows a schematic flow diagram of a method for implementing a docker network to penetrate a two-layer protocol stack in a cloud computing environment provided by an embodiment of the present invention, as shown in figure 1 As shown, the method for realizing docker network penetration through the two-layer protocol stack under the cloud computing environment of this embodiment includes:

[0036]S1. The docker network protocol stack stores tcp (transmission control protocol) / ip (interconnection protocol between networks) / eth (ethernet) related packet data and corresponding packet header information to the pre-created transparent transmission protocol...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and apparatus for enabling a docker network to penetrate through a two-layer protocol stack in a cloud computing environment. The method comprises the following steps:storing, by a docker network protocol stack, tcp / ip / eth related packet data and corresponding packet header information in a protocol stack cache for transparent transmission pre-created by a physical node, constructing a new data packet according to an address and a size corresponding to the cache, placing the new data packet in a related protocol stack packet processing function to transmit thesame to a cloud host protocol stack, so that the cloud host protocol stack judges whether the received data packet is placed in the protocol stack cache for transparent transmission, and if so, directly sending the received data packet to a physical node protocol stack; and upon receiving the data packet, extracting, by the physical node protocol stack, the address, the size and the correspondingpacket header information in the data packet, extracting the data stored in the protocol stack cache for transparent transmission according to the extracted address and the size, transmitting the data to a function corresponding to tcp, ip and eth layers to perform packet encapsulation processing, and sending the data to a physical network card for transmission. The number of data packets of thenetwork protocol stacks in the docker and a cloud host can be reduced, and the cpu usage rate and the data packet forwarding speed are reduced.

Description

technical field [0001] Embodiments of the present invention relate to the technical field of computer networks, and in particular to a method and device for realizing docker network penetration through two-layer protocol stacks in a cloud computing environment. Background technique [0002] Docker is an open source application container engine that allows developers to package their applications and dependencies into a portable container, and then publish it to any popular Linux machine. It can also be virtualized. The container is completely sandboxed mechanism, there will be no interface between each other. Docker envisions that the delivery operating environment is like shipping, the OS (operating system) is like a freighter, and each software based on the OS is like a container. Users can freely assemble the operating environment through standardized means, and the content of the container can be customized by the user. , can also be made by professionals. In this way,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L69/12H04L69/161H04L2212/00
Inventor 张瑞海靳春孟张建伟刘建邵洪润
Owner XIAMEN JIWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products