Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A low intrusion efficient multi-target IP blocking monitoring scheduling method and system

A scheduling method and multi-target technology, applied in the field of efficient multi-target IP blocking monitoring and scheduling, can solve the problems of long measurement period, large separation value, and long measurement time, and achieve simple measurement results, small network traffic, and less memory resource effect

Active Publication Date: 2022-06-28
上海锵戈科技有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Significant disadvantages of this scheme: (1) manual operation, low efficiency, not conducive to monitoring multiple targets
(2) The result data is difficult to effectively use, and cannot be directly stored, displayed, and statistically analyzed
[0009] This scheme has the following disadvantages: (1) The monitoring function is not targeted
(2) Each round of measurement takes more time
(3) Take up a lot of resources
(4) There is a lot of network intrusion traffic
(5) - The storage of measurement results takes up a lot of resources
Because the terminal performance obtained by each measurement needs to be stored, if the measurement results need to be transmitted, the transmission traffic and complexity will also be increased
(6) The detection of blocking is not timely
In order to reduce the intrusion on the network, the measurement interval is generally increased (for example, set to x minutes). In the case of high immediacy requirements (x seconds) for blocking alarms, this method cannot meet the requirements
(7) Inaccurate judgment of continuous blocking or discrete blocking
Because the measurement period is long, the separation value for distinguishing two consecutive alarms is greater than the measurement interval, which is not conducive to accurate division

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A low intrusion efficient multi-target IP blocking monitoring scheduling method and system
  • A low intrusion efficient multi-target IP blocking monitoring scheduling method and system
  • A low intrusion efficient multi-target IP blocking monitoring scheduling method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050]In order to make those skilled in the art better understand the solutions of the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application. Obviously, the described embodiments are only The embodiments are part of the present application, but not all of the embodiments. Based on the embodiments in the present application, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present application.

[0051] It should be noted that the terms "comprising" and "having" in the description and claims of the present application and the above-mentioned drawings, as well as any variations thereof, are intended to cover non-exclusive inclusion, for example, including a series of steps or units The processes, methods, systems, products...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a low-intrusion, high-efficiency, multi-target IP blocking monitoring and dispatching method. Two independently running threads are established, one is a packet sending thread, which is responsible for sending detection packets and counting the results of each round of measurement; the other is a receiving thread The packet thread is only responsible for receiving response packets, and modifies the status of the corresponding devices in the device information array according to the received response packets; the packet sending in the packet sending thread is a sequential packet sending mode, and periodic measurement is performed according to the measurement interval, and each round of measurement starts according to a fixed strategy in order Send a packet to each target device. After the packet is sent, the packet receiving thread waits for the response of the last packet to time out, and processes the measurement results of this round uniformly. If the state of any device has been reversed, report the current state of the corresponding device, otherwise it will only end at the end of the reporting interval. All device status is reported on time. The present invention has the obvious advantages of many monitoring targets, less time-consuming measurement, less resource occupation, less network intrusion, and fast blocking discovery.

Description

technical field [0001] The invention belongs to the technical field of network operation and maintenance, and in particular relates to a low-intrusion and high-efficiency multi-target IP blocking monitoring and scheduling method and system. Background technique [0002] In the on-duty maintenance work of the IP network, it is usually necessary to quickly find out which devices in the network are blocked (IP unreachable), but it cannot generate obvious network burden for the purpose of monitoring. At present, device blocking is mainly detected by monitoring the performance of the terminal. That is, when the average performance delay of the IP terminal of a device is -1 or the packet loss rate is 100%, it is regarded as blocking. [0003] There are several ways to find blocking: [0004] Option 1: Manual testing with ping tool to find blocking: In this solution, the target is tested by manually running the ping program that comes with the operating system, for example: [00...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L43/04H04L43/08H04L43/06G06F9/50
CPCH04L43/04H04L43/08H04L43/06G06F9/5027
Inventor 李兵王晓宁
Owner 上海锵戈科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products