CN101599883A - A kind of safe transmission network system framework based on overlay network - Google Patents

A kind of safe transmission network system framework based on overlay network Download PDF

Info

Publication number
CN101599883A
CN101599883A CNA200810040111XA CN200810040111A CN101599883A CN 101599883 A CN101599883 A CN 101599883A CN A200810040111X A CNA200810040111X A CN A200810040111XA CN 200810040111 A CN200810040111 A CN 200810040111A CN 101599883 A CN101599883 A CN 101599883A
Authority
CN
China
Prior art keywords
user
network
overlay network
service node
terminal use
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA200810040111XA
Other languages
Chinese (zh)
Inventor
黄海
袁佳宁
宋晓东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHANGHAI NJN NETWORK TECHNOLOGY Co Ltd
Original Assignee
SHANGHAI NJN NETWORK TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHANGHAI NJN NETWORK TECHNOLOGY Co Ltd filed Critical SHANGHAI NJN NETWORK TECHNOLOGY Co Ltd
Priority to CNA200810040111XA priority Critical patent/CN101599883A/en
Publication of CN101599883A publication Critical patent/CN101599883A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The present invention proposes a kind of transmission network architectural framework of the safety based on overlay network (Overlay Network), it is made of control centre and one group of service node, these nodes are distributed on the Internet, and couple together, thereby on present networks, form a virtual transmission overlay network by service link.The terminal use is during at the specific application server of needs visits or with the other-end telex network, at first the mode with VPN inserts in the overlay network by these nodes, be that the user selects access path by overlay network then, under the prerequisite that guarantees user information safety, obtain best visit effect.Its maximum characteristics have been to improve the performance of traditional VPN, make each overlay network node to provide VPN access service for the user as vpn server, avoided causing the situation of whole VPN service paralysis to occur owing to the fault of single vpn server, simultaneously can be dynamically for the terminal use optimize the visit specific application servers reach with the other-end user between the path of communicating by letter, guaranteed the fail safe of quality of services for users and network.

Description

A kind of safe transmission network system framework based on overlay network
Invention field
The present invention relates to Internet technical field, made up a kind of transmission network architectural framework of the safety based on overlay network.
Background of invention
The background technology that the present invention relates to comprises:
1. overlay network (Overlay Network) technology
Internet is that (Autonomous AS) forms by a lot of autonomous territories.Autonomous territory be meant on the traditional sense have identical routing policy, be in one under management organization's control router and the set of network.In such framework, concrete routing iinformation only is kept in AS and the network under it.(InternetService Provider ISP) controls and each AS is generally by certain Internet Service Provider.Use Border Gateway Protocol (Border Gateway Protocol, BGP-4) dynamic exchange routing iinformation between ISP and the AS.But because of routing iinformation is filtered and highly converges by BGP-4 is serious, so the height autgmentability of network is that reliability with end-to-end communication is reduced to cost.Current Internet framework is only supported the Connection Service of " (Best Effort) does one's best " type, usually will pass through a plurality of autonomous territories from a user to another user's data transmission service.And under the situation of " doing one's best ", many network applications such as end-to-end QoS, IP multicast etc. are owing to the support energetically that can't obtain the Internet Service Provider is difficult to dispose and expansion.
In order to address these problems, the researcher has proposed the notion (also claiming nerve of a covering, overlay network) of overlay network (Overlay Network), overlay network is one and is positioned on one or more already present network independently virtual network, promptly by unicast mechanisms between the node main frame is being linked to each other in twos on the basis of bottom-layer network, forming virtual a, network independently, just looks like the new network of one deck that superposeed on original network.Can think that Internet is exactly a kind of overlay network,, increase the Internet protocol head for all bags because Internet is based upon on all kinds of local area network (LAN)s (as Ethernet), in order to connecting the main frame in each local area network (LAN), the new network of the one deck that forms.
The advantage of overlay network is conspicuous.The first, the deployment of overlay network needn't change existing network layer, and its attribute can change, and has very strong flexibility.Utilize the virtual property of overlay network (Overlay Network) on existing network, can realize the function that lower floor's network is difficult to realize, as service quality (QoS), safety assurance, better routing algorithm etc.The second, overlay network is easy to dispose and expansion, and it does not need the support of router, has unique applied framework simultaneously.
The overlay network of setting up in this way is the network of a sealing, and the Local Area Network in the similar real network, all nodes all are the one's shares of expenses for a joint undertaking in this network.In this network, can realize a lot of application,, carry out the new test of using in various the Internets for numerous research workers as simulating the Internet as a test bed.Because this network is not almost done any change to existing Internet protocol, therefore can simulate real network comparatively truly, the researcher can test new internet, applications or new procotol therein.Similar at present at the experimental network PlanetLab of global deployment.
Such way has certain help to the new technology of the Internet of development, but in the network of such sealing, each node can't be linked up with the external world, therefore can't allow domestic consumer enjoy the very big improvement of the network condition that overlay network brings.
2. virtual private network technology (VPN, Virtual Private Network)
Along with deepening continuously of China's informatization, diverse network is used and have been obtained popularizing, and how the protecting network information security becomes the key problem of people's growing interest.Present domestic use network information security product and solution more widely is applicable to mostly and strides on enterprise network and the wide area network, shielded base unit is an enterprise network, the guiding theory that realizes is to the application unified plan from system, network, utilize fire compartment wall, intrusion detection and anti-virus product, the safety problem of resolution system and network level; Concentrated safety service platform carries out the encrypted transmission of authentication, mandate and data, solves the problem of application.
VPN (Virtual Private Network) is widely used with its high safety guarantee, good characteristics such as service quality (QoS), manageability, expandability and flexibility.VPN utilizes the Internet or the infrastructure of other the Internet to create the tunnel for the user, utilizes technology such as encryption, authentication to guarantee the fail safe of VPN network, thereby safety and the function guarantee the same with dedicated network can be provided.
VPN software based on the user can connect two main frames, or connects main frame to subnet, or a plurality of subnet adopts the pattern of Single-Server multi-client, and promptly a plurality of VPN clients are connected to same vpn server end, are star structures.This pattern is beneficial to manages concentratedly the VPN network, but intercoms mutually if desired between a plurality of clients, just must transmit by vpn server, must reduce the communication speed between the VPN client like this; Vpn server also must become the performance bottleneck and the Single Point of Faliure of whole network simultaneously.The performance of vpn server and the network bandwidth must restrict the communication speed of a plurality of VPN networks, and when vpn server broke down or need upgrading to work, whole VPN network is paralysis fully just, can't work.
Summary of the invention
The objective of the invention is on present basis, the Internet, to set up and be easy to control, the transmission network architectural framework of the safety of being convenient to expand, realize the quick deployment of new business by on the Internet bearer layer, making up overlay network (Overlay Network), use VPN technologies provide overlay network for domestic consumer access service simultaneously.This framework is between the terminal use or has made up many optimization paths that arrive destinations between terminal use and the application server, make domestic consumer can high-quality mode visit the purpose application server with safety, the very big improvement of the network performance that the enjoyment overlay network brings by overlay network.
The network system framework that the present invention makes up has comprised overlay network control centre module, and user control centre module is distributed in partial node module and the terminal use and the application server of various places.Overlay network control centre is responsible for and will be distributed in the node organization of various places, makes up overlay network, and responsible overlay network is safeguarded and condition monitoring.User control centre is bearing terminal use's insertion authority, and the monitoring and the work of some ASSOCIATE STATISTICS of user's connection status are responsible in authentication and the work of chargeing simultaneously.The partial node of various places constitutes an overlay network under the tissue of overlay network control centre, be used to dispose various application service, inserts the access server of overlay network simultaneously as the terminal use.The terminal use is as VPN Client, and the mode by VPN is connected to the overlay network node, thereby inserts in the overlay network, then the path access purpose application server of overlay network optimization or purpose terminal use.
The mode of Web page or leaf is adopted in the operation of overlay network control centre, make things convenient for the system manager in network more arbitrarily, by the Internet control centre is managed operation.This framework can be dispersed in load each node, and the scale of system is improved.The tissue of the overlay network in the framework and maintenance are all finished automatically by overlay network control centre, have alleviated network manager's burden, and can adjust dynamically according to the variation of network condition.Make and dispose overlay network in this way, can in minutes just can finish without the participation of various places webmaster, rather than as the time with several days could make up an overlay network in the past.
The same with traditional Internet, overlapping network also is subjected to various malicious attacks easily, so safety problem also is the problem of the required concern of overlay network.In the framework that the present invention makes up, all nodes that add overlay network all must satisfy certain safety requirements.This node comprising all addings all must possess the X.509 digital certificate that control centre issues, the used computer of keeper also must possess X.509 certificate, the communication information between this computer and the control centre all adopts SSL to encrypt, and the data between nodes transmission is all passed through IPsec and encrypted.During to each node transmit status querying command, all UDP message is all passed through the S/MIME signature in control centre.Also preserve this access control table (ACL, AccessControl Lists) on each node, be used for filtering fallacious connection.Such maltilevel security measure has fully guaranteed the fail safe of the business network architectural framework that the present invention makes up.
Nodes all in the overlay network can be accepted the connection request of client as VPN Server.Owing to set up secure tunnel between the node of overlay network, so overlay network also can be regarded as a kind of complete distributed VPN network.Such structure has realized load balance between the node, has improved the VPN network throughput.Simultaneously certain node need to safeguard, upgrade or break down can't work in, can proper communication between other node, thus solved Single Point of Faliure based on user's tradition VPN Server, improved the robustness and the reliability of whole VPN network.
Path optimization's strategy of the framework that the present invention makes up is to remove to obtain the network performance parameter that the user is concerned about by initiatively sending detection packet, the system that makes can find in the overlay network and to satisfy the optimal path that homometric(al) not requires between any 2, simultaneously can quick detection inefficacy path and reselect an alternative route.This dynamic path optimization strategy makes this network system framework can support various self-defining network applications, and according to spending the corresponding route metric of coupling.For example, the stock application system wishes to find in numerous paths one to have the path of short delay.
The node of this structure system can be positioned at the optional position of Internet, and each node is all surveyed the quality in the Internet path between it and other nodes, sets up the path quality table that comprises parameters such as packet loss, time delay and throughput by testing result.The user is during from the inserting more arbitrarily of overlay network, and this node can select suitable path to carry out the transmission of data from the good path quality table of previous foundation according to the different application that inserts the user.In video conference application, access node can be selected the path of low packet loss ratio, low delay shake and high-throughput, and user's data stream just can be transmitted according to selected path then, gives CLIENT PROGRAM data delivery by last node.
Various aspects of the present invention is in conjunction with following diagram and describe in detail easier to understand.
Description of drawings
Fig. 1 is a network architecture schematic diagram proposed by the invention.
Fig. 2 is for making up the signaling process of overlay network.
Fig. 3 is the applying step of the network architecture of the present invention.
Fig. 4 is the application example of the network architecture proposed by the invention.
Describe in detail
Fig. 1 is the schematic diagram of the network architecture proposed by the invention.This framework comprises with lower module: overlay network control centre 11, user control centre 12 is distributed in the node 13 of various places, terminal use 14 and application server 15.Overlay network control centre 11 is in charge of the deployment and the configuration of overlay network, coordinate of the utilization of whole framework to resource, it links to each other with the node that is distributed in various places by network, is responsible for choosing the overlay network that different nodes makes up the network topology of user's appointment according to user's requirement.Six four nodes that are among the different AS among the figure in the Internet basic network 16, overlay network node 13 is elected at superimposed network control system center 11 as, these nodes are after receiving the control command of control centre, topological structure and other nodes according to user's appointment are created the clean culture tunnel, thereby set up the overlay network of specified structure, a virtual overlay network with ring topology among the figure is an example.These nodes have adopted the organizational form that distributes fully, and the data tunnel by clean culture links to each other each other, forms the overlay network of a distribution.It has hidden the actual physical structure of underlying basis network 16, and can dynamically adjust according to network link status.These nodes are served as obstructed role in overlay network, what have serves as server, are responsible for initiating transfer of data or accepting the data that other nodes send, and the node that has is then served as the role of the router in the similar physical network, is responsible for forwarding of data.In the ring topology in the drawings, all nodes had both been taken on the role of server, the role who has also taken on router, because arbitrarily a bit both can initiate transfer of data in this topological structure, also can receive the data that other nodes transmit, also will transmit data simultaneously from a node to another node.
Before making up overlay network, the user at first will determine the topological structure of the overlay network that will make up, and good topological structure should be able to provide network transmission efficiency, and good robustness and fault-tolerance is provided.Network system framework of the present invention provides various topological structures available, comprise bus type structure, hub-and-spoke configuration, loop configuration and netted (Mesh) structure, the user can also make up these topological structures according to different needs, makes up the topological structure of suitable current application.These kinds different topological structures is often at different special services and optimized choice is served suitable topological structure to other service not necessarily efficiently for a kind of.This is because network topology has great influence to the route service performance of overlay network, may be the poorest under another topological structure at the routing algorithm that behaves oneself best under a kind of network topology.
User control centre 12 among the figure is responsible for terminal use 13 management, comprising the related management functions such as registration, authentication, mandate and service billing to terminal use 13.Simultaneously, this control centre also will write down the terminal use's of access relevant information, these information comprise user's user name, the IP address of user's reality, the IP address of the overlay network that the user obtained, the employed procotol of user, the time that the user lands, the time that the user withdraws from, the network traffics of user during netting etc.
Fig. 2 has showed the workflow of structure overlay network of the present invention.At first overlay network control centre can determine the topology of network according to user's requirement, and determines need be used to make up the node of overlay network.Node is distributed in each corner of the Internet, and the performance between the node exists difference, comprise the operational capability of server and the network condition of present position etc., so each node can not adapt to used demands of applications.Determine after the quantity of node,
Can 1) control centre be to selected node transmit status querying command, comprising the information of the service of the required carrying of node, satisfy the demand to determine this node.
2) node receives after the status inquiry command, checks the situation of server self, if can satisfy demands of applications, then beams back condition responsive to control centre and replys.
If the response of server through not receiving node yet after time of setting limit thinks then that this node can't satisfy the demands or not in working order.
3) receive after the state information of node feedback, available node is selected according to user's requirement by control centre, sends select command to selected node.
4) node receives after the select command, adjusts oneself state, satisfies the overlay network of using and prepares for making up, ready after, beam back the ready information of selecting to control centre.
5) control centre receives after the ready information of node, sends the control command that makes up overlay network to node.
6) node is received after the control command, according to the information such as network topology in the order, and makes up the clean culture tunnel between other nodes, thereby finishes the structure work of the overlay network that satisfies user's application demand.
What Fig. 3 showed is the applying step of the network architecture of the present invention.Terminal use 14 wants access application server 15, if when adopting route visit effect that operator provided undesirable, user place company can adopt the network architecture provided by the present invention that access path is optimized, to obtain optimum visit effect.ISP also can build the overlay network of certain scale in advance by adopting the network architecture of the present invention, provides application server access optimization service for the user then.
The concrete applying step of the network architecture of the present invention is:
1) terminal use 14 selects the service node 13 of access nearby, proposes the access request to service node, and terminal use's digital certificate is provided simultaneously;
2) service node 13 is verified customer digital certificate after receiving terminal use 14 access application, if checking does not insert request by refusing user's then, if by then further requiring the user that authentication informations such as user name password are provided;
3) terminal use 14 provides authentication information to user control centre 12;
4) 12 pairs of user authentication informations of user control centre authenticate, if authentication is not passed through, then refusing user's request is passed through if authenticate, and the corresponding optimization routing information of the terminal use who then extracts from customer data base and apply for inserting returns the terminal use;
5) user receives after the optimization routing information that returns, and according to optimizing the path access application server, obtains desirable visit effect.
What Fig. 4 showed is an application example of the network architecture of the present invention.When terminal use 41 needs visit to be positioned at the in-company application server 43 of far-end, if insert in traditional VPN mode, when the VPN access server breaks down can't operate as normal the time, the user can't insert this application server.And when adopting constructed overlay network framework 42 access application server 43 of the present invention, any one node of overlay network can be as the VPN access server, thereby has guaranteed that the user at any time can both insert the application server of required visit.And compared with the single link to application server that traditional VPN provided, the user has many selections that arrive far-end application server 43 after inserting overlay network framework 42 of the present invention.Show among the figure be one by A, B, C, the overlay network of the loop configuration that four nodes of D constitute, the application server 43 that the user need visit links to each other with the C node, user's some access arbitrarily from these four nodes can be visited this application server.These four nodes can regularly send detection packet to adjacent node during operation, can regularly send detection packet as the A node to B node and D node, to detect the network condition between 2, comprise delay, packet loss and throughput etc. between 2, these testing results can be saved in the route status data storehouse of overlay network control centre 11.When the user inserts and need be when the C node picks out access application server from the A node, the A node can be inquired about the network condition from the A node to the C node from route status data storehouse, overlay network framework 42 provides two paths to select, i.e. A-〉D-〉C and A-〉B-〉C.When the user had relatively high expectations to access delay, the A node can be visited route status data storehouse, calculates the delay of this two paths respectively, used for the user thereby select to postpone a lower paths.One in two paths network congestion occurred or network occurred interrupting, and the automatic selection of A node meeting the path of situation do not occur and uses for the user.And break down when the A node, in the time of can't providing access service for the user, the user can also from all the other can operate as normal B, C, optional one is inserted in three nodes of D.By such mechanism, the overlay network framework 42 that the present invention makes up can guarantee the quality of the unimpeded and visit of terminal use's 41 application server 43 visits effectively.

Claims (10)

1. the safe transmission network system framework based on overlay network by make up a virtual overlay network framework on present networks, provides the end-to-end transmission service of optimization for the user.Comprise overlay network control centre in this framework, user control centre, service node, terminal use and application server.The mode of terminal use by VPN inserts the overlay network from service node, then by the overlay network access application server or with the other-end telex network.
2. the network architecture according to claim 1, overlay network control centre is responsible for the structure and the management of overlay network, it is by communicating by letter with the service node that is distributed in various places, to the service node transmitting control commands, these service nodes are organized into an overlay network, by regularly to each service node transmit status querying command, obtain the state information of each service node simultaneously, thereby realize monitoring overlapping network performance.
3. the network architecture according to claim 1, user control centre is responsible for user's registration, authentication, mandate, and work such as service billing, and the relevant information of recording user, and these information comprise user's user name, the IP address of user's reality, the IP address of the overlay network that the user obtained, the employed procotol of user, the time that the user lands, the time that the user withdraws from, the network traffics of user during netting, the employed application of user, the user's data flow direction etc.
4. the network architecture according to claim 1, service node are computer, server or the routers that is arranged in the optional position, the Internet.
5. the network architecture according to claim 4, install and moved the software that is used to make up overlay network on the service node, this software receives the order that sends from the overlay network administrative section of control centre by particular port, and carries out corresponding operation according to the requirement of order.
6. the network architecture according to claim 4, VPNServer software also has been installed on the service node, make service node possess the function of VPN Server, be responsible for the user is carried out the digital certificate checking, simultaneously as the bridge of linking up between terminal use and the user control centre.
7. the network architecture according to claim 4, service node can be after the user be by authentication, information according to the prior registration of user, the relevant information that arrives the optimal path of communicating by letter between application server that the user need visit or the other-end user is sent to the terminal use, between the terminal use, the transfer of data between terminal use and the application server will be undertaken by the path of appointment then.
8. the network architecture according to claim 1, the terminal use is meant the user who is attached in some way to the Internet, comprises user who utilizes computer internet and the user who utilizes handheld terminal to surf the Net.
9. the network architecture according to claim 1, application server is meant the server that the user need visit, and comprises Web server, game server, intra-company's server etc.
10. the network architecture according to claim 1, this framework for the user provides the concrete steps of service is:
Step 1, according to user's requirement, the keeper makes up safe transmission network system framework as claimed in claim 1 by overlay network control centre;
Step 2, the terminal use is connected to service node in the mode of VPN Client, and submits customer digital certificate to service node;
Step 3, service node receive terminal use's connection request, checking user's certificate, if the user certificate authentication failed, then the connection request of refusing user's if user certificate is proved to be successful, then points out the user to import username and password;
Step 4, service node send to user control centre with information after receiving the authentication information of user's input, the checking user's of user control centre authentication information, and authentification failure is then beamed back authentication failure message to the service node of submitting authentication information to; If authentication success, then from database, extract the required access application server of this user or with the optimization routing information that the other-end user communicates, be sent to the service node of submitting authentication information to, be sent to the terminal use by service node.
Step 5, the user obtains optimum visit effect according to optimizing the back access application server or communicating with the other-end user.
CNA200810040111XA 2008-07-02 2008-07-02 A kind of safe transmission network system framework based on overlay network Pending CN101599883A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA200810040111XA CN101599883A (en) 2008-07-02 2008-07-02 A kind of safe transmission network system framework based on overlay network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA200810040111XA CN101599883A (en) 2008-07-02 2008-07-02 A kind of safe transmission network system framework based on overlay network

Publications (1)

Publication Number Publication Date
CN101599883A true CN101599883A (en) 2009-12-09

Family

ID=41421144

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA200810040111XA Pending CN101599883A (en) 2008-07-02 2008-07-02 A kind of safe transmission network system framework based on overlay network

Country Status (1)

Country Link
CN (1) CN101599883A (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101902385A (en) * 2010-07-05 2010-12-01 深圳市阿尔斯电信技术有限公司 Method for realizing authentic transmission of signaling in internet and internet communication structure
CN101909057A (en) * 2010-07-27 2010-12-08 深圳市阿尔斯电信技术有限公司 Signaling system based on internet
CN101977191A (en) * 2010-10-19 2011-02-16 深圳市阿尔斯电信技术有限公司 ISSN basic signaling-based authentication signaling system on Internet
CN102594606A (en) * 2012-03-13 2012-07-18 中国科学院声学研究所 Evolved intelligent node overlapping network system based on multi-agent
CN101778423B (en) * 2010-01-19 2012-10-24 南京邮电大学 Mobile agent-based method for guaranteeing quality of service of wireless multimedia sensor network
CN104301912A (en) * 2014-09-28 2015-01-21 北京盈进科技有限公司 Method and device for detecting on-off of path
CN104579891A (en) * 2013-10-18 2015-04-29 宇宙互联有限公司 Network system capable of improving connection performance
CN105471693A (en) * 2014-08-18 2016-04-06 华为技术有限公司 Packet sending method and network node
CN106375732A (en) * 2016-10-31 2017-02-01 江苏开放大学 Multifunctional cloud classroom system
CN106713337A (en) * 2017-01-03 2017-05-24 北京并行科技股份有限公司 Method and system for accessing supercomputing center, and dispatch server
WO2019129236A1 (en) * 2017-12-29 2019-07-04 中兴通讯股份有限公司 Tunnel-based data transmission method and device
CN110290093A (en) * 2018-03-19 2019-09-27 杭州达乎科技有限公司 The SD-WAN network architecture and network-building method, message forwarding method
US20200322418A1 (en) * 2012-02-09 2020-10-08 Connectify, Inc. Secure remote computer network

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101778423B (en) * 2010-01-19 2012-10-24 南京邮电大学 Mobile agent-based method for guaranteeing quality of service of wireless multimedia sensor network
CN101902385A (en) * 2010-07-05 2010-12-01 深圳市阿尔斯电信技术有限公司 Method for realizing authentic transmission of signaling in internet and internet communication structure
CN101902385B (en) * 2010-07-05 2012-10-31 深圳市阿尔斯电信技术有限公司 Method for realizing authentic transmission of signaling in internet and internet communication structure
CN101909057A (en) * 2010-07-27 2010-12-08 深圳市阿尔斯电信技术有限公司 Signaling system based on internet
CN101909057B (en) * 2010-07-27 2014-06-18 深圳市阿尔斯电信技术有限公司 Signaling system based on internet
CN101977191A (en) * 2010-10-19 2011-02-16 深圳市阿尔斯电信技术有限公司 ISSN basic signaling-based authentication signaling system on Internet
US11647069B2 (en) * 2012-02-09 2023-05-09 Connectify, Inc. Secure remote computer network
US20200322418A1 (en) * 2012-02-09 2020-10-08 Connectify, Inc. Secure remote computer network
CN102594606A (en) * 2012-03-13 2012-07-18 中国科学院声学研究所 Evolved intelligent node overlapping network system based on multi-agent
CN104579891A (en) * 2013-10-18 2015-04-29 宇宙互联有限公司 Network system capable of improving connection performance
CN105471693A (en) * 2014-08-18 2016-04-06 华为技术有限公司 Packet sending method and network node
CN109861897B (en) * 2014-08-18 2023-09-01 华为技术有限公司 Method, device and system for obtaining corresponding relation
CN105471693B (en) * 2014-08-18 2019-02-05 华为技术有限公司 A kind of file transmitting method and network node
CN109861897A (en) * 2014-08-18 2019-06-07 华为技术有限公司 A kind of method, apparatus and system obtaining forwarding-table item
CN104301912B (en) * 2014-09-28 2018-04-13 北京盈进科技有限公司 A kind of detection method and device of path break-make
CN104301912A (en) * 2014-09-28 2015-01-21 北京盈进科技有限公司 Method and device for detecting on-off of path
CN106375732A (en) * 2016-10-31 2017-02-01 江苏开放大学 Multifunctional cloud classroom system
CN106713337B (en) * 2017-01-03 2020-04-21 北京并行科技股份有限公司 Method and system for accessing super computing center and scheduling server
CN106713337A (en) * 2017-01-03 2017-05-24 北京并行科技股份有限公司 Method and system for accessing supercomputing center, and dispatch server
WO2019129236A1 (en) * 2017-12-29 2019-07-04 中兴通讯股份有限公司 Tunnel-based data transmission method and device
CN110290093A (en) * 2018-03-19 2019-09-27 杭州达乎科技有限公司 The SD-WAN network architecture and network-building method, message forwarding method

Similar Documents

Publication Publication Date Title
CN101599883A (en) A kind of safe transmission network system framework based on overlay network
CN108551464B (en) Connection establishment and data transmission method, device and system of hybrid cloud
US7461157B2 (en) Distributed server functionality for emulated LAN
RU2530338C2 (en) Prepared connection based on state of communication lines of providers (plsb) with routed redundancy
US8520670B1 (en) Automated operation and security system for virtual private networks
US8411564B2 (en) Architectural framework of communication network and a method of establishing QOS connection
US20040093492A1 (en) Virtual private network management with certificates
EP2361470A1 (en) A method for operating multi-domain provider ethernet networks
US20100275017A1 (en) Peer-to-Peer Forwarding for Packet-Switched Traffic
US11824897B2 (en) Dynamic security scaling
CN106027491B (en) Separated links formula communication processing method and system based on isolation IP address
Liao et al. A dynamic VPN architecture for private cloud computing
Nagarajan Generic requirements for provider provisioned virtual private networks (PPVPN)
Alam et al. Design and implementation of a secured enterprise network using dynamic multipoint VPN with HSRP protocol
Quoitin et al. Interdomain traffic engineering with redistribution communities
CN108353027A (en) A kind of software defined network system for detecting port failure
US11290354B2 (en) Dynamic service provisioning system and method
Cisco Internetworking Design Basics
CN111917646A (en) SD-WAN-based multi-data center interconnection optimization implementation method and system
Makeri Design and Implementation of optimized features in a local area network for improvedenterprisenetwork
Carthern et al. Intermediate LAN Switching
Rey et al. Towards a Fault-Tolerant and Scalable Network Infrastructure Design for an Educational Institution in Marinduque Island, Philippines
Moser Performance Analysis of an SD-WAN Infrastructure Implemented Using Cisco System Technologies
US9197693B1 (en) System and method for load distribution using a mail box proxy of a virtual private network
Wytrębowicz et al. SDN controller mechanisms for flexible and customized networking

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Open date: 20091209