CN110336716A - A kind of efficient destination host end hop router detection method - Google Patents
A kind of efficient destination host end hop router detection method Download PDFInfo
- Publication number
- CN110336716A CN110336716A CN201910639186.8A CN201910639186A CN110336716A CN 110336716 A CN110336716 A CN 110336716A CN 201910639186 A CN201910639186 A CN 201910639186A CN 110336716 A CN110336716 A CN 110336716A
- Authority
- CN
- China
- Prior art keywords
- ttl
- icmp
- life span
- time
- hop router
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/12—Discovery or management of network topologies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/02—Capturing of monitoring data
- H04L43/028—Capturing of monitoring data by filtering
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/10—Active monitoring, e.g. heartbeat, ping or trace-route
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/50—Testing arrangements
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Cardiology (AREA)
- General Health & Medical Sciences (AREA)
- Environmental & Geological Engineering (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
A kind of efficient destination host end hop router detection method, is related to the method for network topology probe.In order to realize that the last hop router information of target can be obtained by only sending a small amount of detection packet for specified detection target.UDP large port detection packet is sent to target;If receiving the unreachable message in the port ICMP, TTL information is extracted from the message, current sensing point is calculated to the network distance of destination host, turns on the step of opening ICMP life span time-out monitor, otherwise execute step-by-step method and obtain network distance;If step-by-step method obtains network distance success, the step of opening ICMP life span time-out monitor is turned on, otherwise turns end and jumps the step of route exploration terminates;Open the detection packet for subtracting 1 to destination host transmission life span TTL after ICMP life span time-out monitor for network distance.A small amount of detection packet is only sent relative to tools such as traceroute can obtain the last hop router information of target, averagely reduce 60% relative to traceroute in quantity giving out a contract for a project.
Description
Technical field
The present invention relates to the methods of network topology probe.
Background technique
Network topology measurement is the foundation stone of Research on network structure, be research optimization Network resource allocation, Network Protocol Design,
The basis in the directions such as network attack detection and prevention, network geographical positioning.Mature network topology measurement technology mostly base at present
In Ping and Traceroute, wherein Ping carries out survival detecting host, and Traceroute obtains detection source to the complete of target
Routed path, and then construct network topology structure.
The seldom correlative study and method to the detection of destination host end hop router at present.Jump routing in the end of destination host
Device refers to and detects the router being connected directly on target logic, referred to as end hop router.Traceroute passes through setting detection
Packet TTL is incremented by find router node all in detection source to destination host network path since 1, and then can be visited
Survey source is to the hop router node last of destination host, the i.e. last hop router information of destination host.
Existing literature CN103905276A discloses a kind of quick network topology probe method, includes the following steps: to walk
Rapid one: sending single detection packet from each destination node of the source node into destination node sequence R, collect TTL information;Step 2:
According to the TTL information of collection, reference mode is selected, knapsack pair is leaned against to reference mode and remaining node transmission, calculates shared road
Diameter additivity characteristic quantity;Step 3: destination node sequence R is ranked up according to overlapping trees additivity characteristic quantity, obtains sequence position
Set vector;Step 4: cut-point is found;Step 5: optimal two partial node is found in cut-point;Step 6: it obtains meeting DFS
The sequence of the destination node of sequence.The prior art efficiently solves detection packet quantity mistake during discovering network topology
It is more, the problem of inefficiency.The prior art does not refer to the related art method of destination host end hop router detection.
The prior art, which is not given by, designs and Implements network distance prediction, default TTL interval division technology, to reduce
Obtain the enlightenment of the quantity of giving out a contract for a project of last hop router.In fact, last hop router is found for quick detection targeted subnet structure,
Reducing network topology measurement load, destination host geo-location etc. has very big application value.
Summary of the invention
The technical problem to be solved by the present invention is
The present invention provides a kind of efficient last hop router detection methods, and specified detection target is only sent out with realizing
The last hop router information for sending a small amount of detection packet that can obtain target.
The technical solution adopted by the present invention to solve the above technical problem is:
A kind of efficient destination host end hop router detection method, the realization process of the method are as follows:
Step 1: opening the unreachable monitor in the port ICMP;
Step 2: sending UDP large port detection packet to target;
Step 3: if receiving the unreachable message in the port ICMP, TTL information is extracted from the message, current sensing point is calculated and arrives
The network distance of destination host, goes to step 6, no to then follow the steps 4;
Step 4: executing step-by-step method and obtain network distance;
Step 5: if step-by-step method obtains network distance success, going to step 6, otherwise go to step 10;
Step 6: opening ICMP life span time-out monitor;
Step 7: sending life span TTL to destination host is the detection packet that network distance subtracts 1;
Step 8: if receiving the ICMP life span timeout packet that last hop router returns, going to step 9, otherwise go to step
10;
Step 9: parsing the ICMP life span timeout packet that last hop router returns, last hop router is obtained from message
IP;
Step 10: route exploration is jumped at end to be terminated.
Further, the process that step-by-step method obtains network distance is executed are as follows:
(1), it initializes minimum ttl value echo_reply_flag when receiving ICMP echo reply message, receive ICMP
The maximum ttl value time_exceeded_flag of life span time-out is -1, ping packet is sent, if receiving the response report of target
Text, goes to step (2), otherwise illustrates that destination host is not survived, goes to step (8);
(2), REPLY_TTL is extracted from the message that destination host is replied, the first of destination host is judged according to REPLY_TTL
Beginning life span T_INIT_TTL determines the life span send_ttl of detection packet setting;
(3), it sends TTL and is the detection packet of send_ttl, if receiving the ICMP echo reply report of destination host reply
Text then illustrates that source is less than or equal to send_ttl to the network distance of target, goes to step (4);If receiving ICMP life span
Timeout packet illustrates that the life span send_ttl of detection packet setting at this time is also not enough to reach target, goes to step (5);Such as
Fruit does not receive any message, goes to step (6);
(4), it is the detection packet that send_ttl subtracts 1 that next sender sends life span every time, is received until for the first time
ICMP life span timeout packet, setting time_exceeded_flag are the life span of corresponding detection packet setting at this time
Send_ttl value goes to step (7);
(5), it is the detection packet that send_ttl adds 1 that next sender sends life span every time, is received until for the first time
The ICMP echo reply message that destination host returns, setting echo_reply_flag are corresponding detection packet setting at this time
Life span send_ttl value, goes to step (7);
(6) if, in time-out time to receive any message, it is believed that the ttl value of detection packet setting is less than network distance D,
It is not enough to reach target, only intermediate router is not responded, and detection packet life span send_ttl is added 1, goes to step
(3);
(7) if, meet echo_reply_flag=time_exceeded_flag+1, the network of sender to target
Distance D is equal to echo_reply_flag, obtains network distance success;If discontented echo_reply_flag=time_
Exceeded_flag+1 obtains network distance failure;
(8), terminate network distance to obtain.
Further, in step 6, the process of ICMP life span time-out monitor is opened are as follows:
(1) ICMP life span timeout packet filtering characters string is set;
(2) monitor function is called, ICMP life span timeout packet is monitored;
(3) program is slept 1 second, guarantees that listening thread starts completely;
(4) success of ICMP life span time-out monitor is opened.
Further, in step 9, the process of last hop router IP is obtained are as follows:
(1) the ICMP life span timeout packet head returned is extracted, Format Object is converted into;
(2) source IP is directly read from object;
(3) end hop router IP success is obtained.
The beneficial effects of the present invention are:
The present invention provides a kind of efficient last hop router detection methods, for specified detection target, this method phase
The tools such as traceroute are only sent with a small amount of detection packet, the last hop router information of target can be obtained, in number of giving out a contract for a project
60% is averagely reduced relative to traceroute in amount, and the router that quantity of giving out a contract for a project is passed through independent of detection source to target
Number, this point traceroute can not accomplish.
The present invention is effectively reduced acquisition end and jumps by designing and Implementing network distance prediction, default TTL interval division technology
The quantity of giving out a contract for a project of router, relative to the method that Traceroute obtains last hop router, package efficiency has the promotion of matter, effectively
Measurement load is reduced, network environment is improved, has certain meaning to the work of efficient network topology measurement.Last hop router hair
Referring now to quick detection targeted subnet structure, reducing network topology measurement load, destination host geo-location etc. has very
Big application value.
Detailed description of the invention
Fig. 1 is the unreachable message structure figure in the port ICMP,
Fig. 2 is to be based on the last hop router timing diagram of the unreachable acquisition in the port ICMP,
Fig. 3 jumps the route acquisition amount of giving out a contract for a project comparison diagram for traceroute and based on the unreachable end in the port ICMP,
Fig. 4 is the default TTL distribution map of network host,
Fig. 5 is that step-by-step method obtains network distance flow chart,
Fig. 6 is last hop router amount to obtain comparison diagram,
Fig. 7 is to obtain the last hop router averagely amount of giving out a contract for a project comparison diagram,
Fig. 8 is step-by-step method network distance prediction actual deviation column figure,
Fig. 9 is that last hop router obtains system flow chart,
Figure 10 is to obtain the last hop router averagely amount of giving out a contract for a project comparison diagram.
Specific embodiment
In conjunction with attached drawing 1 to Figure 10, to a kind of reality of efficient destination host end hop router detection method of the present invention
Now illustrated as follows:
Illustrate the pedestal method for obtaining the last hop router of destination host first, if having learned that detection source to target master
The router hops passed through among machine are Hop, and detection source sends the message that life span is Hop, and message reaches last hop router
Afterwards, TTL is just kept to 0 in message, therefore when last hop router abandons this message while returning to the ICMP that source IP is itself and survive
Between time exceeded message, the IP information of available last hop router accordingly.If it is the report that Hop adds 1 that detection source, which sends life span,
Text, this message can just reach destination host, therefore we define the network distance that Hop adds 1 for source to target.Under specifically
The last hop router of the unreachable network distance in the port bright combination ICMP obtains, the last hop router of step-by-step method acquisition network distance obtains
Two schemes are taken, the method for realizing last hop router detection of the present invention is finally provided:
1. obtaining scheme based on the unreachable network distance estimation in the port ICMP and last hop router
1.1 principle
ICMP agreement is message control protocol in internet, is found by investigation, and ICMP agreement middle port is unreachable
The payload data part of message (ICMP header packet information type=3, code=3) includes the original message that detection source is sent to target
Data.After detection source receives the ICMP port unreachable message of target transmission, it can be extracted from the loading section of message original
Message information, at this moment the data in the ttl field in original message information are that initial TTL subtracts in the original message of detection source transmission
Go it is intermediate by router number after, remaining ttl value, we are defined as left_ttl, and when original message is sent is initial
Ttl we be defined as init_ttl.Therefore Hop=init_ttl-left_ttl sends the detection packet that TTL is Hop and triggers just
Last hop router returns to ICMP life span time exceeded message.As shown in FIG. 1, FIG. 1 is the message knots of ICMP port unreachable message
Structure.
1.2 specific designs
By to destination host send UDP large port detection packet, can obtain source to target network distance, to target master
It is the UDP message that network distance subtracts 1 that machine, which sends TTL, and the last hop router of destination host can just be made to return to ICMP life span
Timeout packet can be obtained last hop router information from this message.
Therefore, it is necessary to two monitors (Listener) to monitor the unreachable message in the port ICMP and ICMP life span respectively
Timeout packet.As shown in Fig. 2, detailed process are as follows:
Step 1: firstly, UDP Sender, which constructs UDP large port detection packet, is sent to destination host, if destination host
Designated port does not open, return the unreachable message in the port ICMP, the data portion of this message be filled be sent to target UDP it is big
Port detection packet;
Step 2: after the local unreachable Listener in the port ICMP captures the message of destination host return, from message
Data portion extract UDP large port detection packet in remaining TTL:left_ttl, source is calculated to target according to left_ttl
The router hops Hop passed through;
Step 3: sending the new detection packet that TTL is Hop to destination host, and the end that this detection packet reaches destination host is jumped
Ttl value is just kept to zero when router, triggers last hop router and returns to life span timeout packet;
Step 4: local ICMP life span time-out Listener can capture the message that last hop router returns, from message
The last hop router information of middle extraction.
The comparison of 1.3 experimental results
Theoretically, the method can find the last hop router of destination host it is only necessary to send two detection packets, and pass
The detection packet that the method for system traceroute is sent is that intermediate router number of passing through adds 1.Therefore, the method is relative to tradition side
Method, which sends detection packet, reduces several times, efficiently stablizes, there is the promotion of matter.
The destination hosts of 100,000 survivals are chosen in experiment, using above scheme and traceroute simultaneously to destination host into
The hop router discovery of row end, statistics respectively successfully find the number of last hop router, and record the respective amount of giving out a contract for a project.
If Fig. 3 shows in the case where equally successfully obtaining 9417 last hop routers, traditional side traceroute
The comparison diagram of method and the method amount of giving out a contract for a project.As can be seen from the figure tradition traceroute has sent 176451 data packets, and
The method has sent 18834 data packets, for conventional method, reduces 9 times.One end of the every acquisition of traceroute
Hop router averagely needs to send 18.7 data packets, illustrate source to destination host averaging network distance for 18.7, i.e. source to mesh
Mark host averagely have passed through 17.7 jump routers, meet true network environment.And the method is averagely to send two packets, with
Theoretical value is consistent.Therefore the method for obtaining last hop router compared to traceroute, the amount of giving out a contract for a project of the method are approximately
/ 9th of traceroute have the promotion of matter in quantitative aspects of giving out a contract for a project.
2. step-by-step method obtains network distance
2.1 theoretical basis
The available source Traceroute whole route-maps into destination path, and we it is only necessary to obtain target
Therefore the last hop router information of host need to only determine source to the network distance of target, sending TTL is the spy that network distance subtracts 1
It surveys packet and arrives destination host, when reaching the last hop router of destination host due to the detection packet, ttl value is just kept to 0, triggers end and jumps
Router returns to ICMP life span timeout packet, i.e. extractable last hop router information in message.
Our target is to obtain network distance, and therefore all-router in non-source to destination host path detects packet
It only needs to meet:
(1) when sending the detection packet that life span is ttl, the returned packet of ICMP life span time-out is received;
(2) when transmission life span is that ttl adds 1 detection packet, the message returned from destination host is received.
Illustrate that ttl adds 1 to be precisely network distance of the source to target.
Although source can not be directly acquired to the network distance of target, the source of target can be obtained by way of Ping
Network distance, in this, as the reference value of the network distance in source to target, and then the network distance of approaching to reality step by step.It is logical
Ping is crossed, we can obtain the remaining ttl value reply_ttl in ICMP echo reply message, and combining target host is default
TTL, can obtain destination host to source network distance, in this, as source to the reference distance of target network distance.Statistics is mutual
The default TTL distribution situation of 3,900,000 survival hosts in networking, as shown in Figure 4.It is default that destination host is recorded according to peak Distribution
TTL distributed area, reply_ttl value subtract section upper limit value where its, can obtain target to source network distance.Use formula
It indicates are as follows:
Target is to the source network distance=default section the TTL upper limit-reply_ttl+1 (1-1)
Source is to the grid of reference distance=target of target to source network apart from (1-2)
2.2 conceptual design
Our network distances of clear source to destination host are inconsistent from theoretical basis, and destination host is to the network in source
Distance is easy to obtain, we first assume that they are not much different, and uses destination host to the network distance in source as reference distance, i.e.,
Initial ttl value is wrapped in detection.The ttl value that detection packet is further adjusted according to the type for returning to packet, is incremented by as unit of 1 visits every time
The send_ttl of packet setting is surveyed, therefore this method is called step-by-step method.
Step-by-step method flow chart is as shown in figure 5, detailed process is as follows:
1. initializing echo_reply_flag, time_exceeded_flag is -1, ping packet is sent, if receiving mesh
Target response message, goes to step 2, otherwise illustrates that destination host is not survived, goes to step 8;
2. extracting REPLY_TTL from the message that destination host is replied, the initial of destination host is judged according to REPLY_TTL
Life span T_INIT_TTL determines the life span send_ttl of detection packet setting;
3. sending TTL is the detection packet of send_ttl, if receiving the ICMP echo reply message of destination host reply,
Then illustrate that source is less than or equal to send_ttl to the network distance of target, goes to step 4;If receiving ICMP life span time-out report
Text illustrates that the life span send_ttl of detection packet setting at this time is also not enough to reach target, goes to step 5;If do not received
Any message, goes to step 6;
4. next it is the detection packet that send_ttl subtracts 1 that sender sends life span every time, received until for the first time
ICMP life span timeout packet, setting time_exceeded_flag are the life span of corresponding detection packet setting at this time
Send_ttl value.Go to step 7;
5. next it is the detection packet that send_ttl adds 1 that sender sends life span every time, until receiving mesh for the first time
The ICMP echo reply message that host returns is marked, setting echo_reply_flag is the life of corresponding detection packet setting at this time
Deposit time send_ttl value.Go to step 7;
6. if be to receive any message in time-out time, it is believed that the ttl value of detection packet setting is less than network distance D, no
It is enough to reach target, only intermediate router is not responded.Detection packet life span send_ttl is added 1, goes to step 3;
If 7. meet echo_reply_flag=time_exceeded_flag+1, the network of sender to target away from
It is equal to echo_reply_flag from D, obtains network distance success;If being unsatisfactory for echo_reply_flag=time_
Exceeded_flag+1 obtains network distance failure.
8. terminating network distance to obtain.
The comparison of 2.3 experimental results
(1) last hop router acquisition rate comparison
100,000 target ip are chosen in experiment, respectively using tradition traceroute and step-by-step method carry out network distance estimation with
Last hop router discovery, has counted the amount of giving out a contract for a project, has as a result been illustrated in fig. 6 shown below.It can be seen from the figure that traceroute method and step
It is not much different into method end hop router amount to obtain, illustrates that routing is jumped at the end for the acquisition destination host that the method can be reliable and stable
Device.
(2) averagely the amount of giving out a contract for a project compares
After carrying out last hop router to 10w destination host and obtaining experiment, the situation of giving out a contract for a project for counting two methods is as follows:
Traditional traceroute method amount of giving out a contract for a project is 757188, and the step-by-step method amount of giving out a contract for a project is 239356.Because routing is jumped at the end of every kind of method
Device obtains quantity difference, and the amount of giving out a contract for a project that is averaged that we calculate every kind of method is compared, as a result as shown in the figure.It can be with from Fig. 7
It is 15 that the amount of giving out a contract for a project that is averaged for finding out step-by-step method, which is 4.83, the traceroute averagely amount of giving out a contract for a project,.Averagely its calculation method of the amount of giving out a contract for a project is
Formula (3).Therefore, step-by-step method reduces 60% or more relative to the traceroute method amount of giving out a contract for a project.
Wherein, min_gap is the smallest difference, and min_gap is maximum difference, Send_packetiIt is corresponding for difference
The amount of giving out a contract for a project, ip_ratioiFor the percentage accounting for the ip that difference is i, the two multiplication summation as averagely amount of giving out a contract for a project Avg_
packets。
(3) grid of reference distance is distributed with real network distance difference
We carry out network distance estimation to 2,500,000 destination host application step-by-step methods, and carry out with real network distance
Comparison counts real network distance and grid of reference distance difference accounting situation, as shown in column diagram in Fig. 8.Abscissa in figure
For real network distance and grid of reference distance difference, ordinate is the corresponding target accounting situation of this difference.From figure I
Find out, the proportion that deviation is 0 and 1 is maximum, is successively decreased centered on deviation 1 toward both sides.On the one hand illustrate our default TTL
Interval division is reasonable, while also illustrating in network 50% or more mainframe network network distance difference very little.Step-by-step method is come
Say, it is practical determine with deviation that is predicting the amount of giving out a contract for a project number, therefore the relational graph of deviation and the amount of giving out a contract for a project is also added to by we
In figure.In conjunction with deviation accounting and the amount of giving out a contract for a project, it has been found that the maximum deviation of accounting is minimum, that is, the amount of giving out a contract for a project is also minimum, accounting and hair
Packet amount is inversely.
3. last hop router detection system
The design of 3.1 systems and execution process
In conjunction with both the above scheme, final design simultaneously realizes last hop router detection system.The system carries out end and jumps routing
The detailed step of device detection are as follows:
Step 1: opening the unreachable monitor in the port ICMP;
Step 2: sending UDP large port detection packet to target;
Step 3: if receiving the unreachable message in the port ICMP, TTL information is extracted from the message, calculates the network for arriving target
Distance, goes to step 5, no to then follow the steps 4;
Step 4: executing step-by-step method and obtain network distance;(detailed process is shown in 2.2)
Step 5: if step-by-step method obtains network distance success, going to step 6, otherwise go to step 10;
Step 6: opening ICMP life span time-out monitor;
Step 7: sending life span TTL to target is the detection packet that network distance subtracts 1;
Step 8: if receiving the ICMP life span timeout packet that last hop router returns, going to step 9, otherwise go to step
10;
Step 9: parsing the ICMP life span timeout packet that last hop router returns, last hop router is obtained from message
IP;
Step 10: route exploration is jumped at end to be terminated.
Program execution flow is as shown in Figure 9.
3.2 system testing
The last hop router of route exploration system progress is jumped using end to 70w destination host and obtains experiment, is obtained altogether last
Hop router number 503631.The situation of giving out a contract for a project for counting two methods is as follows: obtaining identical last hop router number situation
Under, traditional traceroute method amount of giving out a contract for a project is 8398015, and the amount of giving out a contract for a project of this system is 3496868.We calculate every kind of method
The amount of giving out a contract for a project that is averaged be compared, the results are shown in Figure 10.As can be seen from Figure 10 the amount of giving out a contract for a project that is averaged of step-by-step method is 6.9
A, the traceroute method averagely amount of giving out a contract for a project is 16.6.Compared to traceroute, which reduces 57%.
And compared to the scheme of the port ICMP inaccessible scheme and step-by-step method, the amount of giving out a contract for a project of this system is above both schemes, point
The target of analysis discovery only 20% responds UDP large port message, therefore the target of residue 80% uses the port ICMP not
The detection packet that reachable scheme is sent is with regard to nonsensical, therefore the amount of giving out a contract for a project that is averaged of system is all higher than two schemes, but also remote low
In the traceroute amount of giving out a contract for a project, while two schemes being merged to the detection rate that can be improved last hop router.
Claims (4)
1. a kind of efficient destination host end hop router detection method, which is characterized in that the realization process of the method are as follows:
Step 1: opening the unreachable monitor in the port ICMP;
Step 2: sending UDP large port detection packet to target;
Step 3: if receiving the unreachable message in the port ICMP, TTL information is extracted from the message, calculates current sensing point to target
The network distance of host, goes to step 6, no to then follow the steps 4;
Step 4: executing step-by-step method and obtain network distance;
Step 5: if step-by-step method obtains network distance success, going to step 6, otherwise go to step 10;
Step 6: opening ICMP life span time-out monitor;
Step 7: sending life span TTL to destination host is the detection packet that network distance subtracts 1;
Step 8: if receiving the ICMP life span timeout packet that last hop router returns, going to step 9, otherwise go to step 10;
Step 9: parsing the ICMP life span timeout packet that last hop router returns, last hop router IP is obtained from message;
Step 10: route exploration is jumped at end to be terminated.
2. a kind of efficient destination host end hop router detection method according to claim 1, which is characterized in that step
In 4, the process that step-by-step method obtains network distance is executed are as follows:
(1), it initializes minimum ttl value echo_reply_flag when receiving ICMP echo reply message, receive ICMP existence
The maximum ttl value time_exceeded_flag of time time-out is -1, sends ping packet, if receiving the response message of target,
(2) are gone to step, otherwise illustrate that destination host is not survived, go to step (8);
(2), REPLY_TTL is extracted from the message that destination host is replied, the initial life of destination host is judged according to REPLY_TTL
Time T_INIT_TTL is deposited, determines the life span send_ttl of detection packet setting;
(3), it sends TTL and is the detection packet of send_ttl, if receiving the ICMP echo reply message of destination host reply,
Illustrate that source is less than or equal to send_ttl to the network distance of target, goes to step (4);If receiving ICMP life span time-out report
Text illustrates that the life span send_ttl of detection packet setting at this time is also not enough to reach target, goes to step (5);If do not received
To any message, step (6) are gone to;
(4), it is the detection packet that send_ttl subtracts 1 that next sender sends life span every time, until receiving ICMP for the first time
Life span timeout packet, setting time_exceeded_flag are the life span send_ of corresponding detection packet setting at this time
Ttl value goes to step (7);
(5), it is the detection packet that send_ttl adds 1 that next sender sends life span every time, until receiving target for the first time
The ICMP echo reply message that host returns, setting echo_reply_flag are the existence of corresponding detection packet setting at this time
Time send_ttl value, goes to step (7);
(6) if, in time-out time to receive any message, it is believed that the ttl value of detection packet setting is less than network distance D, insufficient
To reach target, only intermediate router is not responded, and detection packet life span send_ttl is added 1, goes to step (3);
(7) if, meet echo_reply_flag=time_exceeded_flag+1, the network distance D of sender to target
Equal to echo_reply_flag, network distance success is obtained;If discontented echo_reply_flag=time_exceeded_
Flag+1 obtains network distance failure;
(8), terminate network distance to obtain.
3. a kind of efficient destination host end hop router detection method according to claim 1, which is characterized in that in step
In rapid 6, the process of ICMP life span time-out monitor is opened are as follows:
(1) ICMP life span timeout packet filtering characters string is set;
(2) monitor function is called, ICMP life span timeout packet is monitored;
(3) program is slept 1 second, guarantees that listening thread starts completely;
(4) success of ICMP life span time-out monitor is opened.
4. a kind of efficient destination host end hop router detection method according to claim 1, which is characterized in that in step
In rapid 9, the process of last hop router IP is obtained are as follows:
(1) the ICMP life span timeout packet head returned is extracted, Format Object is converted into;
(2) source IP is directly read from object;
(3) end hop router IP success is obtained.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910639186.8A CN110336716B (en) | 2019-07-15 | 2019-07-15 | High-efficiency target host end-hop router detection method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910639186.8A CN110336716B (en) | 2019-07-15 | 2019-07-15 | High-efficiency target host end-hop router detection method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110336716A true CN110336716A (en) | 2019-10-15 |
CN110336716B CN110336716B (en) | 2022-05-06 |
Family
ID=68145092
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910639186.8A Active CN110336716B (en) | 2019-07-15 | 2019-07-15 | High-efficiency target host end-hop router detection method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110336716B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110768905A (en) * | 2019-10-25 | 2020-02-07 | 新华三信息安全技术有限公司 | Route tracking method and equipment |
CN112187584A (en) * | 2020-09-30 | 2021-01-05 | 腾讯科技(深圳)有限公司 | Path fault detection method, system, server and storage medium |
CN112737843A (en) * | 2020-12-29 | 2021-04-30 | 广东小天才科技有限公司 | Method and system for checking availability of network data service |
CN113381912A (en) * | 2021-06-11 | 2021-09-10 | 哈尔滨工业大学 | Self-adaptive high-concurrency topology measurement system |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060098586A1 (en) * | 2001-03-09 | 2006-05-11 | Farrell Craig A | Method and apparatus for application route discovery |
CN102625332A (en) * | 2011-11-01 | 2012-08-01 | 北京小米科技有限责任公司 | Method for detecting network routing |
CN103905276A (en) * | 2014-03-27 | 2014-07-02 | 国家电网公司 | Fast network topology detecting method |
CN106301909A (en) * | 2016-08-11 | 2017-01-04 | 杭州华三通信技术有限公司 | A kind of port detection method and device |
US20180278514A1 (en) * | 2017-03-27 | 2018-09-27 | Juniper Networks, Inc. | Traceroute for multi-path routing |
CN109617728A (en) * | 2018-12-14 | 2019-04-12 | 中国电子科技网络信息安全有限公司 | A kind of distributed IP grade network topology probe method based on multi-protocols |
-
2019
- 2019-07-15 CN CN201910639186.8A patent/CN110336716B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060098586A1 (en) * | 2001-03-09 | 2006-05-11 | Farrell Craig A | Method and apparatus for application route discovery |
CN102625332A (en) * | 2011-11-01 | 2012-08-01 | 北京小米科技有限责任公司 | Method for detecting network routing |
CN103905276A (en) * | 2014-03-27 | 2014-07-02 | 国家电网公司 | Fast network topology detecting method |
CN106301909A (en) * | 2016-08-11 | 2017-01-04 | 杭州华三通信技术有限公司 | A kind of port detection method and device |
US20180278514A1 (en) * | 2017-03-27 | 2018-09-27 | Juniper Networks, Inc. | Traceroute for multi-path routing |
CN109617728A (en) * | 2018-12-14 | 2019-04-12 | 中国电子科技网络信息安全有限公司 | A kind of distributed IP grade network topology probe method based on multi-protocols |
Non-Patent Citations (1)
Title |
---|
王谷等: "多报文组合的骨干网络拓扑发现", 《计算机工程与科学》 * |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110768905A (en) * | 2019-10-25 | 2020-02-07 | 新华三信息安全技术有限公司 | Route tracking method and equipment |
CN112187584A (en) * | 2020-09-30 | 2021-01-05 | 腾讯科技(深圳)有限公司 | Path fault detection method, system, server and storage medium |
CN112187584B (en) * | 2020-09-30 | 2023-07-21 | 腾讯科技(深圳)有限公司 | Path fault detection method, system, server and storage medium |
CN112737843A (en) * | 2020-12-29 | 2021-04-30 | 广东小天才科技有限公司 | Method and system for checking availability of network data service |
CN112737843B (en) * | 2020-12-29 | 2023-04-18 | 广东小天才科技有限公司 | Method and system for checking availability of network data service |
CN113381912A (en) * | 2021-06-11 | 2021-09-10 | 哈尔滨工业大学 | Self-adaptive high-concurrency topology measurement system |
CN113381912B (en) * | 2021-06-11 | 2022-06-10 | 哈尔滨工业大学 | Self-adaptive high-concurrency topology measurement system |
Also Published As
Publication number | Publication date |
---|---|
CN110336716B (en) | 2022-05-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110336716A (en) | A kind of efficient destination host end hop router detection method | |
US9306819B2 (en) | Controller driven OAM for split architecture network | |
US20120063323A1 (en) | Distributed network management | |
CN108781171A (en) | System and method for using data plane signal notice packet to capture in IPV6 environment | |
Atary et al. | Efficient round-trip time monitoring in OpenFlow networks | |
US7821966B2 (en) | Method and apparatus for network topology discovery using closure approach | |
US20120030352A1 (en) | Method and system for management of sampled traffic data | |
US7472314B2 (en) | System and method for monitoring link delays and faults in an IP network | |
Waddington et al. | Topology discovery for public IPv6 networks | |
CN112583657A (en) | Distributed routing level network topology detection method based on embedded equipment | |
CN110266828A (en) | A kind of method, apparatus and network system for establishing end to end network connection | |
EP3293917B1 (en) | Path probing using an edge completion ratio | |
CN101599897A (en) | A kind of peer-to-peer network flow control methods that detects based on application layer | |
Shibuya et al. | Efficient performance diagnosis in openflow networks based on active measurements | |
CN115665006B (en) | Follow-up flow detection method and device | |
Pi et al. | Latency imbalance among Internet load-balanced paths: A cloud-centric view | |
Cheng et al. | Realnet: A topology generator based on real Internet topology | |
CN102315962B (en) | Method for detecting MTU (Maximum Transmission Unit) of Ethernet and maintenance end point | |
CN108848202A (en) | electronic device, data transmission method and related product | |
Garcia-Jimenez et al. | Pamplona-traceroute: topology discovery and alias resolution to build router level internet maps | |
Brosh et al. | Spatial-temporal analysis of passive TCP measurements | |
Zhang et al. | High fidelity off-path round-trip time measurement via TCP/IP side channels with duplicate SYNs | |
Baumgart et al. | Realistic underlays for overlay simulation | |
Raspall | Building Nemo, a system to monitor IP routing and traffic paths in real time | |
Li et al. | Improving the efficiency of network topology discovery |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |