Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Low-infringement high-efficiency multi-target IP blocking monitoring and scheduling method and system

A scheduling method and multi-target technology, applied in the field of efficient multi-target IP blocking monitoring and scheduling, can solve the problems of unfavorable monitoring of multiple targets, untimely blocking detection, long measurement cycle, etc., to reduce the difficulty of programming and implement monitoring strategies Simplicity and simplicity of measurement results

Active Publication Date: 2019-07-26
上海锵戈科技有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Significant disadvantages of this scheme: (1) manual operation, low efficiency, not conducive to monitoring multiple targets
(2) The result data is difficult to effectively use, and cannot be directly stored, displayed, and statistically analyzed
[0009] This scheme has the following disadvantages: (1) The monitoring function is not targeted
(2) Each round of measurement takes more time
(3) Take up a lot of resources
(4) There is a lot of network intrusion traffic
(5) - The storage of measurement results takes up a lot of resources
Because the terminal performance obtained by each measurement needs to be stored, if the measurement results need to be transmitted, the transmission traffic and complexity will also be increased
(6) The detection of blocking is not timely
In order to reduce the intrusion on the network, the measurement interval is generally increased (for example, set to x minutes). In the case of high immediacy requirements (x seconds) for blocking alarms, this method cannot meet the requirements
(7) Inaccurate judgment of continuous blocking or discrete blocking
Because the measurement period is long, the separation value for distinguishing two consecutive alarms is greater than the measurement interval, which is not conducive to accurate division

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Low-infringement high-efficiency multi-target IP blocking monitoring and scheduling method and system
  • Low-infringement high-efficiency multi-target IP blocking monitoring and scheduling method and system
  • Low-infringement high-efficiency multi-target IP blocking monitoring and scheduling method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050]In order to enable those skilled in the art to better understand the solution of the present application, the technical solution in the embodiment of the application will be clearly and completely described below in conjunction with the accompanying drawings in the embodiment of the application. Obviously, the described embodiment is only It is an embodiment of a part of the application, but not all of the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the protection scope of this application.

[0051] It should be noted that the terms "comprising" and "having" in the specification and claims of the present application and the above-mentioned drawings, as well as any variations thereof, are intended to cover non-exclusive inclusion, for example, including a series of steps or units A process, method, system, product or device is not necessarily li...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a low-infringement high-efficiency multi-target IP blocking monitoring and scheduling method, which comprises the following steps: establishing two threads which run independently, one thread being a packet sending thread and being used for sending a detection packet and counting a measurement result of each round; the other thread being a packet receiving thread which is only responsible for receiving the response packet and modifying the state of the corresponding equipment in the equipment information array according to the received response packet; packet sending inthe packet sending thread being in a sequential packet sending mode, performing periodic measurement according to measurement intervals; and each round of measurement starting to sequentially send packets to each target device according to a fixed strategy, after packet sending is finished, a packet receiving thread waiting for response timeout of the last packet and uniformly processing the measurement result of the round, if a device state is overturned, reporting the current state of the corresponding device, and otherwise, reporting all device states only when the reporting interval is finished. The method has the obvious advantages of more monitoring targets, less measurement time consumption, less resource occupation, less network infringement, fast blocking discovery and the like.

Description

technical field [0001] The invention belongs to the technical field of network operation and maintenance, and in particular relates to a low-intrusion, high-efficiency multi-target IP blocking monitoring and dispatching method and system. Background technique [0002] In the on-duty maintenance of IP networks, it is usually necessary to quickly discover which devices in the network are blocked (IP unreachable), but it is not possible to generate obvious network burdens for the purpose of monitoring. At present, it is mainly through the method of monitoring the performance of the terminal to discover the blocking situation of the device, that is, when the average forward delay of the performance of the IP terminal of a certain device is -1 or the packet loss rate is 100%, it is considered to be blocked. [0003] There are several ways to find blocking: [0004] Solution 1: Use the ping tool to manually test and find the blockage: This solution manually runs the ping program ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/26G06F9/50
CPCH04L43/04H04L43/08H04L43/06G06F9/5027
Inventor 李兵王晓宁
Owner 上海锵戈科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products