CN110336716A - A kind of efficient destination host end hop router detection method - Google Patents

A kind of efficient destination host end hop router detection method Download PDF

Info

Publication number
CN110336716A
CN110336716A CN201910639186.8A CN201910639186A CN110336716A CN 110336716 A CN110336716 A CN 110336716A CN 201910639186 A CN201910639186 A CN 201910639186A CN 110336716 A CN110336716 A CN 110336716A
Authority
CN
China
Prior art keywords
ttl
icmp
life span
time
hop router
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910639186.8A
Other languages
Chinese (zh)
Other versions
CN110336716B (en
Inventor
张宇
刘洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Harbin Institute of Technology
Original Assignee
Harbin Institute of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Harbin Institute of Technology filed Critical Harbin Institute of Technology
Priority to CN201910639186.8A priority Critical patent/CN110336716B/en
Publication of CN110336716A publication Critical patent/CN110336716A/en
Application granted granted Critical
Publication of CN110336716B publication Critical patent/CN110336716B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/12Discovery or management of network topologies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/02Capturing of monitoring data
    • H04L43/028Capturing of monitoring data by filtering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/10Active monitoring, e.g. heartbeat, ping or trace-route
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/50Testing arrangements

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Cardiology (AREA)
  • General Health & Medical Sciences (AREA)
  • Environmental & Geological Engineering (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

A kind of efficient destination host end hop router detection method, is related to the method for network topology probe.In order to realize that the last hop router information of target can be obtained by only sending a small amount of detection packet for specified detection target.UDP large port detection packet is sent to target;If receiving the unreachable message in the port ICMP, TTL information is extracted from the message, current sensing point is calculated to the network distance of destination host, turns on the step of opening ICMP life span time-out monitor, otherwise execute step-by-step method and obtain network distance;If step-by-step method obtains network distance success, the step of opening ICMP life span time-out monitor is turned on, otherwise turns end and jumps the step of route exploration terminates;Open the detection packet for subtracting 1 to destination host transmission life span TTL after ICMP life span time-out monitor for network distance.A small amount of detection packet is only sent relative to tools such as traceroute can obtain the last hop router information of target, averagely reduce 60% relative to traceroute in quantity giving out a contract for a project.

Description

A kind of efficient destination host end hop router detection method
Technical field
The present invention relates to the methods of network topology probe.
Background technique
Network topology measurement is the foundation stone of Research on network structure, be research optimization Network resource allocation, Network Protocol Design, The basis in the directions such as network attack detection and prevention, network geographical positioning.Mature network topology measurement technology mostly base at present In Ping and Traceroute, wherein Ping carries out survival detecting host, and Traceroute obtains detection source to the complete of target Routed path, and then construct network topology structure.
The seldom correlative study and method to the detection of destination host end hop router at present.Jump routing in the end of destination host Device refers to and detects the router being connected directly on target logic, referred to as end hop router.Traceroute passes through setting detection Packet TTL is incremented by find router node all in detection source to destination host network path since 1, and then can be visited Survey source is to the hop router node last of destination host, the i.e. last hop router information of destination host.
Existing literature CN103905276A discloses a kind of quick network topology probe method, includes the following steps: to walk Rapid one: sending single detection packet from each destination node of the source node into destination node sequence R, collect TTL information;Step 2: According to the TTL information of collection, reference mode is selected, knapsack pair is leaned against to reference mode and remaining node transmission, calculates shared road Diameter additivity characteristic quantity;Step 3: destination node sequence R is ranked up according to overlapping trees additivity characteristic quantity, obtains sequence position Set vector;Step 4: cut-point is found;Step 5: optimal two partial node is found in cut-point;Step 6: it obtains meeting DFS The sequence of the destination node of sequence.The prior art efficiently solves detection packet quantity mistake during discovering network topology It is more, the problem of inefficiency.The prior art does not refer to the related art method of destination host end hop router detection.
The prior art, which is not given by, designs and Implements network distance prediction, default TTL interval division technology, to reduce Obtain the enlightenment of the quantity of giving out a contract for a project of last hop router.In fact, last hop router is found for quick detection targeted subnet structure, Reducing network topology measurement load, destination host geo-location etc. has very big application value.
Summary of the invention
The technical problem to be solved by the present invention is
The present invention provides a kind of efficient last hop router detection methods, and specified detection target is only sent out with realizing The last hop router information for sending a small amount of detection packet that can obtain target.
The technical solution adopted by the present invention to solve the above technical problem is:
A kind of efficient destination host end hop router detection method, the realization process of the method are as follows:
Step 1: opening the unreachable monitor in the port ICMP;
Step 2: sending UDP large port detection packet to target;
Step 3: if receiving the unreachable message in the port ICMP, TTL information is extracted from the message, current sensing point is calculated and arrives The network distance of destination host, goes to step 6, no to then follow the steps 4;
Step 4: executing step-by-step method and obtain network distance;
Step 5: if step-by-step method obtains network distance success, going to step 6, otherwise go to step 10;
Step 6: opening ICMP life span time-out monitor;
Step 7: sending life span TTL to destination host is the detection packet that network distance subtracts 1;
Step 8: if receiving the ICMP life span timeout packet that last hop router returns, going to step 9, otherwise go to step 10;
Step 9: parsing the ICMP life span timeout packet that last hop router returns, last hop router is obtained from message IP;
Step 10: route exploration is jumped at end to be terminated.
Further, the process that step-by-step method obtains network distance is executed are as follows:
(1), it initializes minimum ttl value echo_reply_flag when receiving ICMP echo reply message, receive ICMP The maximum ttl value time_exceeded_flag of life span time-out is -1, ping packet is sent, if receiving the response report of target Text, goes to step (2), otherwise illustrates that destination host is not survived, goes to step (8);
(2), REPLY_TTL is extracted from the message that destination host is replied, the first of destination host is judged according to REPLY_TTL Beginning life span T_INIT_TTL determines the life span send_ttl of detection packet setting;
(3), it sends TTL and is the detection packet of send_ttl, if receiving the ICMP echo reply report of destination host reply Text then illustrates that source is less than or equal to send_ttl to the network distance of target, goes to step (4);If receiving ICMP life span Timeout packet illustrates that the life span send_ttl of detection packet setting at this time is also not enough to reach target, goes to step (5);Such as Fruit does not receive any message, goes to step (6);
(4), it is the detection packet that send_ttl subtracts 1 that next sender sends life span every time, is received until for the first time ICMP life span timeout packet, setting time_exceeded_flag are the life span of corresponding detection packet setting at this time Send_ttl value goes to step (7);
(5), it is the detection packet that send_ttl adds 1 that next sender sends life span every time, is received until for the first time The ICMP echo reply message that destination host returns, setting echo_reply_flag are corresponding detection packet setting at this time Life span send_ttl value, goes to step (7);
(6) if, in time-out time to receive any message, it is believed that the ttl value of detection packet setting is less than network distance D, It is not enough to reach target, only intermediate router is not responded, and detection packet life span send_ttl is added 1, goes to step (3);
(7) if, meet echo_reply_flag=time_exceeded_flag+1, the network of sender to target Distance D is equal to echo_reply_flag, obtains network distance success;If discontented echo_reply_flag=time_ Exceeded_flag+1 obtains network distance failure;
(8), terminate network distance to obtain.
Further, in step 6, the process of ICMP life span time-out monitor is opened are as follows:
(1) ICMP life span timeout packet filtering characters string is set;
(2) monitor function is called, ICMP life span timeout packet is monitored;
(3) program is slept 1 second, guarantees that listening thread starts completely;
(4) success of ICMP life span time-out monitor is opened.
Further, in step 9, the process of last hop router IP is obtained are as follows:
(1) the ICMP life span timeout packet head returned is extracted, Format Object is converted into;
(2) source IP is directly read from object;
(3) end hop router IP success is obtained.
The beneficial effects of the present invention are:
The present invention provides a kind of efficient last hop router detection methods, for specified detection target, this method phase The tools such as traceroute are only sent with a small amount of detection packet, the last hop router information of target can be obtained, in number of giving out a contract for a project 60% is averagely reduced relative to traceroute in amount, and the router that quantity of giving out a contract for a project is passed through independent of detection source to target Number, this point traceroute can not accomplish.
The present invention is effectively reduced acquisition end and jumps by designing and Implementing network distance prediction, default TTL interval division technology The quantity of giving out a contract for a project of router, relative to the method that Traceroute obtains last hop router, package efficiency has the promotion of matter, effectively Measurement load is reduced, network environment is improved, has certain meaning to the work of efficient network topology measurement.Last hop router hair Referring now to quick detection targeted subnet structure, reducing network topology measurement load, destination host geo-location etc. has very Big application value.
Detailed description of the invention
Fig. 1 is the unreachable message structure figure in the port ICMP,
Fig. 2 is to be based on the last hop router timing diagram of the unreachable acquisition in the port ICMP,
Fig. 3 jumps the route acquisition amount of giving out a contract for a project comparison diagram for traceroute and based on the unreachable end in the port ICMP,
Fig. 4 is the default TTL distribution map of network host,
Fig. 5 is that step-by-step method obtains network distance flow chart,
Fig. 6 is last hop router amount to obtain comparison diagram,
Fig. 7 is to obtain the last hop router averagely amount of giving out a contract for a project comparison diagram,
Fig. 8 is step-by-step method network distance prediction actual deviation column figure,
Fig. 9 is that last hop router obtains system flow chart,
Figure 10 is to obtain the last hop router averagely amount of giving out a contract for a project comparison diagram.
Specific embodiment
In conjunction with attached drawing 1 to Figure 10, to a kind of reality of efficient destination host end hop router detection method of the present invention Now illustrated as follows:
Illustrate the pedestal method for obtaining the last hop router of destination host first, if having learned that detection source to target master The router hops passed through among machine are Hop, and detection source sends the message that life span is Hop, and message reaches last hop router Afterwards, TTL is just kept to 0 in message, therefore when last hop router abandons this message while returning to the ICMP that source IP is itself and survive Between time exceeded message, the IP information of available last hop router accordingly.If it is the report that Hop adds 1 that detection source, which sends life span, Text, this message can just reach destination host, therefore we define the network distance that Hop adds 1 for source to target.Under specifically The last hop router of the unreachable network distance in the port bright combination ICMP obtains, the last hop router of step-by-step method acquisition network distance obtains Two schemes are taken, the method for realizing last hop router detection of the present invention is finally provided:
1. obtaining scheme based on the unreachable network distance estimation in the port ICMP and last hop router
1.1 principle
ICMP agreement is message control protocol in internet, is found by investigation, and ICMP agreement middle port is unreachable The payload data part of message (ICMP header packet information type=3, code=3) includes the original message that detection source is sent to target Data.After detection source receives the ICMP port unreachable message of target transmission, it can be extracted from the loading section of message original Message information, at this moment the data in the ttl field in original message information are that initial TTL subtracts in the original message of detection source transmission Go it is intermediate by router number after, remaining ttl value, we are defined as left_ttl, and when original message is sent is initial Ttl we be defined as init_ttl.Therefore Hop=init_ttl-left_ttl sends the detection packet that TTL is Hop and triggers just Last hop router returns to ICMP life span time exceeded message.As shown in FIG. 1, FIG. 1 is the message knots of ICMP port unreachable message Structure.
1.2 specific designs
By to destination host send UDP large port detection packet, can obtain source to target network distance, to target master It is the UDP message that network distance subtracts 1 that machine, which sends TTL, and the last hop router of destination host can just be made to return to ICMP life span Timeout packet can be obtained last hop router information from this message.
Therefore, it is necessary to two monitors (Listener) to monitor the unreachable message in the port ICMP and ICMP life span respectively Timeout packet.As shown in Fig. 2, detailed process are as follows:
Step 1: firstly, UDP Sender, which constructs UDP large port detection packet, is sent to destination host, if destination host Designated port does not open, return the unreachable message in the port ICMP, the data portion of this message be filled be sent to target UDP it is big Port detection packet;
Step 2: after the local unreachable Listener in the port ICMP captures the message of destination host return, from message Data portion extract UDP large port detection packet in remaining TTL:left_ttl, source is calculated to target according to left_ttl The router hops Hop passed through;
Step 3: sending the new detection packet that TTL is Hop to destination host, and the end that this detection packet reaches destination host is jumped Ttl value is just kept to zero when router, triggers last hop router and returns to life span timeout packet;
Step 4: local ICMP life span time-out Listener can capture the message that last hop router returns, from message The last hop router information of middle extraction.
The comparison of 1.3 experimental results
Theoretically, the method can find the last hop router of destination host it is only necessary to send two detection packets, and pass The detection packet that the method for system traceroute is sent is that intermediate router number of passing through adds 1.Therefore, the method is relative to tradition side Method, which sends detection packet, reduces several times, efficiently stablizes, there is the promotion of matter.
The destination hosts of 100,000 survivals are chosen in experiment, using above scheme and traceroute simultaneously to destination host into The hop router discovery of row end, statistics respectively successfully find the number of last hop router, and record the respective amount of giving out a contract for a project.
If Fig. 3 shows in the case where equally successfully obtaining 9417 last hop routers, traditional side traceroute The comparison diagram of method and the method amount of giving out a contract for a project.As can be seen from the figure tradition traceroute has sent 176451 data packets, and The method has sent 18834 data packets, for conventional method, reduces 9 times.One end of the every acquisition of traceroute Hop router averagely needs to send 18.7 data packets, illustrate source to destination host averaging network distance for 18.7, i.e. source to mesh Mark host averagely have passed through 17.7 jump routers, meet true network environment.And the method is averagely to send two packets, with Theoretical value is consistent.Therefore the method for obtaining last hop router compared to traceroute, the amount of giving out a contract for a project of the method are approximately / 9th of traceroute have the promotion of matter in quantitative aspects of giving out a contract for a project.
2. step-by-step method obtains network distance
2.1 theoretical basis
The available source Traceroute whole route-maps into destination path, and we it is only necessary to obtain target Therefore the last hop router information of host need to only determine source to the network distance of target, sending TTL is the spy that network distance subtracts 1 It surveys packet and arrives destination host, when reaching the last hop router of destination host due to the detection packet, ttl value is just kept to 0, triggers end and jumps Router returns to ICMP life span timeout packet, i.e. extractable last hop router information in message.
Our target is to obtain network distance, and therefore all-router in non-source to destination host path detects packet It only needs to meet:
(1) when sending the detection packet that life span is ttl, the returned packet of ICMP life span time-out is received;
(2) when transmission life span is that ttl adds 1 detection packet, the message returned from destination host is received.
Illustrate that ttl adds 1 to be precisely network distance of the source to target.
Although source can not be directly acquired to the network distance of target, the source of target can be obtained by way of Ping Network distance, in this, as the reference value of the network distance in source to target, and then the network distance of approaching to reality step by step.It is logical Ping is crossed, we can obtain the remaining ttl value reply_ttl in ICMP echo reply message, and combining target host is default TTL, can obtain destination host to source network distance, in this, as source to the reference distance of target network distance.Statistics is mutual The default TTL distribution situation of 3,900,000 survival hosts in networking, as shown in Figure 4.It is default that destination host is recorded according to peak Distribution TTL distributed area, reply_ttl value subtract section upper limit value where its, can obtain target to source network distance.Use formula It indicates are as follows:
Target is to the source network distance=default section the TTL upper limit-reply_ttl+1 (1-1)
Source is to the grid of reference distance=target of target to source network apart from (1-2)
2.2 conceptual design
Our network distances of clear source to destination host are inconsistent from theoretical basis, and destination host is to the network in source Distance is easy to obtain, we first assume that they are not much different, and uses destination host to the network distance in source as reference distance, i.e., Initial ttl value is wrapped in detection.The ttl value that detection packet is further adjusted according to the type for returning to packet, is incremented by as unit of 1 visits every time The send_ttl of packet setting is surveyed, therefore this method is called step-by-step method.
Step-by-step method flow chart is as shown in figure 5, detailed process is as follows:
1. initializing echo_reply_flag, time_exceeded_flag is -1, ping packet is sent, if receiving mesh Target response message, goes to step 2, otherwise illustrates that destination host is not survived, goes to step 8;
2. extracting REPLY_TTL from the message that destination host is replied, the initial of destination host is judged according to REPLY_TTL Life span T_INIT_TTL determines the life span send_ttl of detection packet setting;
3. sending TTL is the detection packet of send_ttl, if receiving the ICMP echo reply message of destination host reply, Then illustrate that source is less than or equal to send_ttl to the network distance of target, goes to step 4;If receiving ICMP life span time-out report Text illustrates that the life span send_ttl of detection packet setting at this time is also not enough to reach target, goes to step 5;If do not received Any message, goes to step 6;
4. next it is the detection packet that send_ttl subtracts 1 that sender sends life span every time, received until for the first time ICMP life span timeout packet, setting time_exceeded_flag are the life span of corresponding detection packet setting at this time Send_ttl value.Go to step 7;
5. next it is the detection packet that send_ttl adds 1 that sender sends life span every time, until receiving mesh for the first time The ICMP echo reply message that host returns is marked, setting echo_reply_flag is the life of corresponding detection packet setting at this time Deposit time send_ttl value.Go to step 7;
6. if be to receive any message in time-out time, it is believed that the ttl value of detection packet setting is less than network distance D, no It is enough to reach target, only intermediate router is not responded.Detection packet life span send_ttl is added 1, goes to step 3;
If 7. meet echo_reply_flag=time_exceeded_flag+1, the network of sender to target away from It is equal to echo_reply_flag from D, obtains network distance success;If being unsatisfactory for echo_reply_flag=time_ Exceeded_flag+1 obtains network distance failure.
8. terminating network distance to obtain.
The comparison of 2.3 experimental results
(1) last hop router acquisition rate comparison
100,000 target ip are chosen in experiment, respectively using tradition traceroute and step-by-step method carry out network distance estimation with Last hop router discovery, has counted the amount of giving out a contract for a project, has as a result been illustrated in fig. 6 shown below.It can be seen from the figure that traceroute method and step It is not much different into method end hop router amount to obtain, illustrates that routing is jumped at the end for the acquisition destination host that the method can be reliable and stable Device.
(2) averagely the amount of giving out a contract for a project compares
After carrying out last hop router to 10w destination host and obtaining experiment, the situation of giving out a contract for a project for counting two methods is as follows: Traditional traceroute method amount of giving out a contract for a project is 757188, and the step-by-step method amount of giving out a contract for a project is 239356.Because routing is jumped at the end of every kind of method Device obtains quantity difference, and the amount of giving out a contract for a project that is averaged that we calculate every kind of method is compared, as a result as shown in the figure.It can be with from Fig. 7 It is 15 that the amount of giving out a contract for a project that is averaged for finding out step-by-step method, which is 4.83, the traceroute averagely amount of giving out a contract for a project,.Averagely its calculation method of the amount of giving out a contract for a project is Formula (3).Therefore, step-by-step method reduces 60% or more relative to the traceroute method amount of giving out a contract for a project.
Wherein, min_gap is the smallest difference, and min_gap is maximum difference, Send_packetiIt is corresponding for difference The amount of giving out a contract for a project, ip_ratioiFor the percentage accounting for the ip that difference is i, the two multiplication summation as averagely amount of giving out a contract for a project Avg_ packets。
(3) grid of reference distance is distributed with real network distance difference
We carry out network distance estimation to 2,500,000 destination host application step-by-step methods, and carry out with real network distance Comparison counts real network distance and grid of reference distance difference accounting situation, as shown in column diagram in Fig. 8.Abscissa in figure For real network distance and grid of reference distance difference, ordinate is the corresponding target accounting situation of this difference.From figure I Find out, the proportion that deviation is 0 and 1 is maximum, is successively decreased centered on deviation 1 toward both sides.On the one hand illustrate our default TTL Interval division is reasonable, while also illustrating in network 50% or more mainframe network network distance difference very little.Step-by-step method is come Say, it is practical determine with deviation that is predicting the amount of giving out a contract for a project number, therefore the relational graph of deviation and the amount of giving out a contract for a project is also added to by we In figure.In conjunction with deviation accounting and the amount of giving out a contract for a project, it has been found that the maximum deviation of accounting is minimum, that is, the amount of giving out a contract for a project is also minimum, accounting and hair Packet amount is inversely.
3. last hop router detection system
The design of 3.1 systems and execution process
In conjunction with both the above scheme, final design simultaneously realizes last hop router detection system.The system carries out end and jumps routing The detailed step of device detection are as follows:
Step 1: opening the unreachable monitor in the port ICMP;
Step 2: sending UDP large port detection packet to target;
Step 3: if receiving the unreachable message in the port ICMP, TTL information is extracted from the message, calculates the network for arriving target Distance, goes to step 5, no to then follow the steps 4;
Step 4: executing step-by-step method and obtain network distance;(detailed process is shown in 2.2)
Step 5: if step-by-step method obtains network distance success, going to step 6, otherwise go to step 10;
Step 6: opening ICMP life span time-out monitor;
Step 7: sending life span TTL to target is the detection packet that network distance subtracts 1;
Step 8: if receiving the ICMP life span timeout packet that last hop router returns, going to step 9, otherwise go to step 10;
Step 9: parsing the ICMP life span timeout packet that last hop router returns, last hop router is obtained from message IP;
Step 10: route exploration is jumped at end to be terminated.
Program execution flow is as shown in Figure 9.
3.2 system testing
The last hop router of route exploration system progress is jumped using end to 70w destination host and obtains experiment, is obtained altogether last Hop router number 503631.The situation of giving out a contract for a project for counting two methods is as follows: obtaining identical last hop router number situation Under, traditional traceroute method amount of giving out a contract for a project is 8398015, and the amount of giving out a contract for a project of this system is 3496868.We calculate every kind of method The amount of giving out a contract for a project that is averaged be compared, the results are shown in Figure 10.As can be seen from Figure 10 the amount of giving out a contract for a project that is averaged of step-by-step method is 6.9 A, the traceroute method averagely amount of giving out a contract for a project is 16.6.Compared to traceroute, which reduces 57%. And compared to the scheme of the port ICMP inaccessible scheme and step-by-step method, the amount of giving out a contract for a project of this system is above both schemes, point The target of analysis discovery only 20% responds UDP large port message, therefore the target of residue 80% uses the port ICMP not The detection packet that reachable scheme is sent is with regard to nonsensical, therefore the amount of giving out a contract for a project that is averaged of system is all higher than two schemes, but also remote low In the traceroute amount of giving out a contract for a project, while two schemes being merged to the detection rate that can be improved last hop router.

Claims (4)

1. a kind of efficient destination host end hop router detection method, which is characterized in that the realization process of the method are as follows:
Step 1: opening the unreachable monitor in the port ICMP;
Step 2: sending UDP large port detection packet to target;
Step 3: if receiving the unreachable message in the port ICMP, TTL information is extracted from the message, calculates current sensing point to target The network distance of host, goes to step 6, no to then follow the steps 4;
Step 4: executing step-by-step method and obtain network distance;
Step 5: if step-by-step method obtains network distance success, going to step 6, otherwise go to step 10;
Step 6: opening ICMP life span time-out monitor;
Step 7: sending life span TTL to destination host is the detection packet that network distance subtracts 1;
Step 8: if receiving the ICMP life span timeout packet that last hop router returns, going to step 9, otherwise go to step 10;
Step 9: parsing the ICMP life span timeout packet that last hop router returns, last hop router IP is obtained from message;
Step 10: route exploration is jumped at end to be terminated.
2. a kind of efficient destination host end hop router detection method according to claim 1, which is characterized in that step In 4, the process that step-by-step method obtains network distance is executed are as follows:
(1), it initializes minimum ttl value echo_reply_flag when receiving ICMP echo reply message, receive ICMP existence The maximum ttl value time_exceeded_flag of time time-out is -1, sends ping packet, if receiving the response message of target, (2) are gone to step, otherwise illustrate that destination host is not survived, go to step (8);
(2), REPLY_TTL is extracted from the message that destination host is replied, the initial life of destination host is judged according to REPLY_TTL Time T_INIT_TTL is deposited, determines the life span send_ttl of detection packet setting;
(3), it sends TTL and is the detection packet of send_ttl, if receiving the ICMP echo reply message of destination host reply, Illustrate that source is less than or equal to send_ttl to the network distance of target, goes to step (4);If receiving ICMP life span time-out report Text illustrates that the life span send_ttl of detection packet setting at this time is also not enough to reach target, goes to step (5);If do not received To any message, step (6) are gone to;
(4), it is the detection packet that send_ttl subtracts 1 that next sender sends life span every time, until receiving ICMP for the first time Life span timeout packet, setting time_exceeded_flag are the life span send_ of corresponding detection packet setting at this time Ttl value goes to step (7);
(5), it is the detection packet that send_ttl adds 1 that next sender sends life span every time, until receiving target for the first time The ICMP echo reply message that host returns, setting echo_reply_flag are the existence of corresponding detection packet setting at this time Time send_ttl value, goes to step (7);
(6) if, in time-out time to receive any message, it is believed that the ttl value of detection packet setting is less than network distance D, insufficient To reach target, only intermediate router is not responded, and detection packet life span send_ttl is added 1, goes to step (3);
(7) if, meet echo_reply_flag=time_exceeded_flag+1, the network distance D of sender to target Equal to echo_reply_flag, network distance success is obtained;If discontented echo_reply_flag=time_exceeded_ Flag+1 obtains network distance failure;
(8), terminate network distance to obtain.
3. a kind of efficient destination host end hop router detection method according to claim 1, which is characterized in that in step In rapid 6, the process of ICMP life span time-out monitor is opened are as follows:
(1) ICMP life span timeout packet filtering characters string is set;
(2) monitor function is called, ICMP life span timeout packet is monitored;
(3) program is slept 1 second, guarantees that listening thread starts completely;
(4) success of ICMP life span time-out monitor is opened.
4. a kind of efficient destination host end hop router detection method according to claim 1, which is characterized in that in step In rapid 9, the process of last hop router IP is obtained are as follows:
(1) the ICMP life span timeout packet head returned is extracted, Format Object is converted into;
(2) source IP is directly read from object;
(3) end hop router IP success is obtained.
CN201910639186.8A 2019-07-15 2019-07-15 High-efficiency target host end-hop router detection method Active CN110336716B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910639186.8A CN110336716B (en) 2019-07-15 2019-07-15 High-efficiency target host end-hop router detection method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910639186.8A CN110336716B (en) 2019-07-15 2019-07-15 High-efficiency target host end-hop router detection method

Publications (2)

Publication Number Publication Date
CN110336716A true CN110336716A (en) 2019-10-15
CN110336716B CN110336716B (en) 2022-05-06

Family

ID=68145092

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910639186.8A Active CN110336716B (en) 2019-07-15 2019-07-15 High-efficiency target host end-hop router detection method

Country Status (1)

Country Link
CN (1) CN110336716B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110768905A (en) * 2019-10-25 2020-02-07 新华三信息安全技术有限公司 Route tracking method and equipment
CN112187584A (en) * 2020-09-30 2021-01-05 腾讯科技(深圳)有限公司 Path fault detection method, system, server and storage medium
CN112737843A (en) * 2020-12-29 2021-04-30 广东小天才科技有限公司 Method and system for checking availability of network data service
CN113381912A (en) * 2021-06-11 2021-09-10 哈尔滨工业大学 Self-adaptive high-concurrency topology measurement system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060098586A1 (en) * 2001-03-09 2006-05-11 Farrell Craig A Method and apparatus for application route discovery
CN102625332A (en) * 2011-11-01 2012-08-01 北京小米科技有限责任公司 Method for detecting network routing
CN103905276A (en) * 2014-03-27 2014-07-02 国家电网公司 Fast network topology detecting method
CN106301909A (en) * 2016-08-11 2017-01-04 杭州华三通信技术有限公司 A kind of port detection method and device
US20180278514A1 (en) * 2017-03-27 2018-09-27 Juniper Networks, Inc. Traceroute for multi-path routing
CN109617728A (en) * 2018-12-14 2019-04-12 中国电子科技网络信息安全有限公司 A kind of distributed IP grade network topology probe method based on multi-protocols

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060098586A1 (en) * 2001-03-09 2006-05-11 Farrell Craig A Method and apparatus for application route discovery
CN102625332A (en) * 2011-11-01 2012-08-01 北京小米科技有限责任公司 Method for detecting network routing
CN103905276A (en) * 2014-03-27 2014-07-02 国家电网公司 Fast network topology detecting method
CN106301909A (en) * 2016-08-11 2017-01-04 杭州华三通信技术有限公司 A kind of port detection method and device
US20180278514A1 (en) * 2017-03-27 2018-09-27 Juniper Networks, Inc. Traceroute for multi-path routing
CN109617728A (en) * 2018-12-14 2019-04-12 中国电子科技网络信息安全有限公司 A kind of distributed IP grade network topology probe method based on multi-protocols

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王谷等: "多报文组合的骨干网络拓扑发现", 《计算机工程与科学》 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110768905A (en) * 2019-10-25 2020-02-07 新华三信息安全技术有限公司 Route tracking method and equipment
CN112187584A (en) * 2020-09-30 2021-01-05 腾讯科技(深圳)有限公司 Path fault detection method, system, server and storage medium
CN112187584B (en) * 2020-09-30 2023-07-21 腾讯科技(深圳)有限公司 Path fault detection method, system, server and storage medium
CN112737843A (en) * 2020-12-29 2021-04-30 广东小天才科技有限公司 Method and system for checking availability of network data service
CN112737843B (en) * 2020-12-29 2023-04-18 广东小天才科技有限公司 Method and system for checking availability of network data service
CN113381912A (en) * 2021-06-11 2021-09-10 哈尔滨工业大学 Self-adaptive high-concurrency topology measurement system
CN113381912B (en) * 2021-06-11 2022-06-10 哈尔滨工业大学 Self-adaptive high-concurrency topology measurement system

Also Published As

Publication number Publication date
CN110336716B (en) 2022-05-06

Similar Documents

Publication Publication Date Title
CN110336716A (en) A kind of efficient destination host end hop router detection method
US9306819B2 (en) Controller driven OAM for split architecture network
US20120063323A1 (en) Distributed network management
CN108781171A (en) System and method for using data plane signal notice packet to capture in IPV6 environment
Atary et al. Efficient round-trip time monitoring in OpenFlow networks
US7821966B2 (en) Method and apparatus for network topology discovery using closure approach
US20120030352A1 (en) Method and system for management of sampled traffic data
US7472314B2 (en) System and method for monitoring link delays and faults in an IP network
Waddington et al. Topology discovery for public IPv6 networks
CN112583657A (en) Distributed routing level network topology detection method based on embedded equipment
CN110266828A (en) A kind of method, apparatus and network system for establishing end to end network connection
EP3293917B1 (en) Path probing using an edge completion ratio
CN101599897A (en) A kind of peer-to-peer network flow control methods that detects based on application layer
Shibuya et al. Efficient performance diagnosis in openflow networks based on active measurements
CN115665006B (en) Follow-up flow detection method and device
Pi et al. Latency imbalance among Internet load-balanced paths: A cloud-centric view
Cheng et al. Realnet: A topology generator based on real Internet topology
CN102315962B (en) Method for detecting MTU (Maximum Transmission Unit) of Ethernet and maintenance end point
CN108848202A (en) electronic device, data transmission method and related product
Garcia-Jimenez et al. Pamplona-traceroute: topology discovery and alias resolution to build router level internet maps
Brosh et al. Spatial-temporal analysis of passive TCP measurements
Zhang et al. High fidelity off-path round-trip time measurement via TCP/IP side channels with duplicate SYNs
Baumgart et al. Realistic underlays for overlay simulation
Raspall Building Nemo, a system to monitor IP routing and traffic paths in real time
Li et al. Improving the efficiency of network topology discovery

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant