Service chain implementation method and device based on vhost-user

An implementation method and service chain technology, which is applied in the field of vhost-user-based service chain implementation, can solve the problem of occupying too many system resources

Pending Publication Date: 2022-03-01
BEIJING TOPSEC NETWORK SECURITY TECH +2
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the embodiments of the present application is to provide a vhost-user-based service chain implementation method and device. Each node of the service chain uses shared memory, which greatly reduces the amount of memory data copying, improv

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Service chain implementation method and device based on vhost-user
  • Service chain implementation method and device based on vhost-user
  • Service chain implementation method and device based on vhost-user

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] The technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application.

[0052] It should be noted that like numerals and letters denote similar items in the following figures, therefore, once an item is defined in one figure, it does not require further definition and explanation in subsequent figures. Meanwhile, in the description of the present application, the terms "first", "second" and the like are only used to distinguish descriptions, and cannot be understood as indicating or implying relative importance.

[0053] Please see figure 1 , figure 1It is a flow chart of a vhost-user-based service chain implementation method provided by the embodiment of the present application. This method is a vhost-user-based service chain implementation method in a virtualized environment. On the premise of ensuring that the functional application program of the service chain nod...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a vhost-user-based service chain implementation method and device, and relates to the technical field. The method comprises the following steps: storing network traffic data into a vring circular queue of a shared memory; the virtual machines of all the nodes of the service chain sequentially obtain the network flow data from the vring circular queue according to the arrangement sequence and process the network flow data; and the processed network flow data is re-stored in the vring round-robin queue, and each node of the service chain uses a shared memory, so that the copy amount of the memory data is greatly reduced, the system efficiency is improved, and the problem that the network flow data needs to be copied for multiple times among service chain nodes of a virtualization scene in the existing method is solved. And too many system resources are occupied.

Description

technical field [0001] The present application relates to the technical field of cloud computing, in particular, to a vhost-user-based service chain implementation method and device. Background technique [0002] During network transmission, data packets need to pass through various types of nodes. For some network nodes with special functions, network traffic will pass through these nodes sequentially according to the functional requirements of the nodes. Such as a firewall, inflow from the specified port, and leave from the specified port. The one-way traffic links formed by these nodes are called service chains. In the physical network environment, each node is a hardware device, and the service chain is formed in the process of physical networking. [0003] In the existing method, the number of times traffic data needs to be copied between each node in the service chain is consistent with the number of nodes, and the longer the link, the more copies will be made, resul...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L47/62G06F9/54G06F9/455
CPCH04L47/6225G06F9/544G06F9/45558G06F9/546G06F2009/45595G06F2009/45583G06F2209/548
Inventor 张朝潞
Owner BEIJING TOPSEC NETWORK SECURITY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products