WO2011150704A1 - 媒体网关代理的方法及装置 - Google Patents

媒体网关代理的方法及装置 Download PDF

Info

Publication number
WO2011150704A1
WO2011150704A1 PCT/CN2011/071505 CN2011071505W WO2011150704A1 WO 2011150704 A1 WO2011150704 A1 WO 2011150704A1 CN 2011071505 W CN2011071505 W CN 2011071505W WO 2011150704 A1 WO2011150704 A1 WO 2011150704A1
Authority
WO
WIPO (PCT)
Prior art keywords
remote
request information
socket connection
address
proxy
Prior art date
Application number
PCT/CN2011/071505
Other languages
English (en)
French (fr)
Inventor
朱磊
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2011150704A1 publication Critical patent/WO2011150704A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/45Network directories; Name-to-address mapping
    • H04L61/4505Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols
    • H04L61/4511Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols using domain name system [DNS]

Definitions

  • the present invention relates to the field of communication networks, and in particular, to a method and apparatus for a media gateway agent in a Next Generation Network (NGN).
  • NTN Next Generation Network
  • the foreground usually uses a commercial real-time operating system to communicate with the external network to meet the real-time and accuracy of the service, thereby implementing various complex business functions;
  • the core is to meet the ease of use and security of data configuration and data maintenance.
  • the background is generally based on the Windows operating system or Unix/Linux operating system.
  • the background In order to ensure the stability and security of the background system, in the networking of NGN, the background is usually only through IP (Internet Protocol, network-interconnected protocol) network and foreground communication, and the two are organized into a small private LAN. To avoid the impact of the external network, but it also brings inconvenience to the operation and maintenance work, such as automatic uploading of backup system data, automatic upgrade of the operating system, and virus database upgrade of anti-virus software, etc. Auto-complete work, but because of the private nature of the IP network, the background and external network communication are isolated. It can only be manually saved by the maintenance personnel through the removable portable storage device to copy the backed up data to the outside world, or by manual operation to update the system patch and virus database upgrade, which is time-consuming and laborious. In addition, due to the use of a similar U disk or the like Mobile portable storage devices also pose risks to the stability and security of the back-end systems. Summary of the invention
  • the main object of the present invention is to provide a method and device for media gateway proxy, which automatically completes a series of tasks that need to be manually performed by an operator to improve system efficiency, security, and stability.
  • a method for proxying a media gateway according to the present invention includes:
  • the foreground receives the proxy request information sent by the background through the first socket connection path with the background;
  • the DNS server resolves and obtains the remote IP address
  • a second socket connection path with the remote IP address is established, and the proxy request information is forwarded to the remote IP network through the second socket connection path.
  • the method further includes:
  • the response information of the remote IP network is forwarded to the background through the first socket connection path.
  • the method before the foreground receives the proxy request information sent by the background through the first socket connection path in the background, the method further includes:
  • the method before the step of forwarding the response information of the remote IP network to the background through the first socket connection path, the method further includes:
  • the method further includes:
  • the remote IP in the proxy request information is established.
  • the second socket connection path corresponding to the address, and the proxy request information is forwarded to the remote IP network through the second socket connection path.
  • the method before the determining whether the remote address in the proxy request information needs to be analyzed by the DNS according to the message protocol type in the proxy request information, the method further includes:
  • the message protocol type in the proxy request information is Hypertext Transfer Protocol HTTP or File Transfer Protocol FTP Request Information.
  • the present invention also provides an apparatus for a media gateway proxy, including:
  • a receiving and sending module configured to receive proxy request information sent by the background through a first socket connection path with the background; and configured to forward the proxy request information to the remote IP network by using the second socket connection path;
  • a domain name resolution proxy module configured to parse through a DNS server and obtain a remote IP address when determining that a DNS resolution is required according to the remote address in the proxy request information
  • the socket connection maintenance module is configured to establish a second socket connection path corresponding to the remote IP address.
  • the receiving and sending module is further configured to forward the response information of the remote IP network to the background through the first socket connection path.
  • the socket is connected to the maintenance module and is also used to establish a first socket connection path with the background.
  • the socket connection maintenance module is further configured to determine whether the source IP address of the proxy request information is legal. When the source IP address is legal, the socket maintenance table is established, and the receiving and sending module is notified to pass the first socket in the background.
  • the connection path receives the proxy request information sent by the background; when the source IP address is invalid, the proxy request information is not received, and the first socket connection path is closed.
  • the socket connection maintenance module is further configured to determine whether the response of the remote IP network is timed out. If the response times out, the response timeout is processed; otherwise, the receiving and transmitting module notifies the response information of the remote IP network to be connected through the first socket. The path is forwarded to the background.
  • the device further comprises:
  • the parsing and judging module is configured to judge whether the remote address in the proxy request information needs to perform domain name DNS parsing according to the type of the message protocol in the proxy request information.
  • the socket connection maintenance module is further configured to: when a DNS resolution of the remote address in the proxy request information is not required, establish a second socket connection path corresponding to the remote IP address in the proxy request information;
  • the receiving and sending module is further configured to forward the proxy request information to the remote IP network through the second socket connection path.
  • the parsing and judging module is further configured to determine whether the type of the message protocol in the proxy request information is legal. If it is legal, determine whether the remote address in the proxy request information needs to be parsed by the DNS; if not, discard the proxy request information. , and close the first socket connection path.
  • the foreground receives the proxy request information sent by the background through the first socket connection path with the background; when the remote address according to the proxy request information determines that the domain name DNS resolution needs to be performed,
  • the DNS server parses and obtains the remote IP address; establishes a second socket connection path with the remote IP address, and forwards the proxy request information to the remote IP network through the second socket connection path, by the agent at the foreground
  • An IP path can be established between the background and the remote IP network to send data information to each other. Therefore, the background operation and maintenance system can automatically upload the backed up system data, perform operating system patches, or upgrade the virus database.
  • the manual work done by the operator improves the efficiency, safety and stability of the background operation and maintenance system; it eliminates the need for manual intervention and reduces the workload of maintenance personnel.
  • FIG. 1 is an exemplary diagram of a front and back system of an existing media gateway
  • FIG. 2 is a schematic flowchart of a first embodiment of a method for implementing a media gateway proxy according to the present invention
  • FIG. 3 is a schematic flowchart of a second embodiment of a method for implementing a media gateway proxy according to the present invention
  • the basic idea of the present invention is: the foreground receives the proxy request information sent by the background through the first socket connection path with the background; when the remote address according to the proxy request information determines that the domain name DNS resolution needs to be performed, the DNS server parses, and Obtain a remote IP address; establish a second socket connection path with the remote IP address, and proxy through the second socket connection path The request information is forwarded to the remote IP network.
  • the solution of the embodiment of the present invention mainly establishes an IP connection path between the background and the remote IP network through the foreground proxy, so that the background information can be mutually transmitted between the background network and the external network, and the remote IP network automatically uploads the backup for the background.
  • System data, patch upgrades for operating systems, and virus database upgrades for antivirus software are examples of system data, patch upgrades for operating systems, and virus database upgrades for antivirus software.
  • the operating environment of the method embodiment includes a media gateway front and back system, which mainly includes: a foreground real-time commercial operating system (foreground), which is used to complete The main business function and the agent function introduced in the embodiment of the present invention; the background operation and maintenance system (background), for performing functions such as data configuration and backup of the system.
  • the two communicate via an IP network to form a private local area network.
  • the backend can only communicate with the foreground, pass data, and deliver various messages.
  • the front desk has the ability to communicate with the outside world, making the proxy function available.
  • Embodiment 1 is a schematic flowchart of Embodiment 1 of a method for implementing a media gateway proxy according to the present invention. As shown in FIG. 2, the method includes the following steps:
  • Step 101 The foreground receives the proxy request information sent by the background through the first socket connection path with the background;
  • the first socket connection path is established between the foreground and the background.
  • the foreground Receive proxy request information from the background such as HTTP (HyperText Transfer Protocol) or FTP (File Transfer Protocol).
  • HTTP HyperText Transfer Protocol
  • FTP File Transfer Protocol
  • the foreground may determine the legality of the source IP address of the received proxy request information. If the proxy request source IP address is legal, the socket maintenance table is established, otherwise the proxy request information is not received, and the first socket is closed.
  • Word connection path; the "socket” is also commonly referred to as SOCKET and is used to describe the IP address and port.
  • a handle to a communication chain where an application typically makes a request to the network via a "socket" or responds to a network request;
  • the client Before the client initiates a call connection request, the client must know where the service party is, so it is necessary to know the IP address or machine name of the machine where the service party is located.
  • the client and the service party can pre-agreed a PORT (port number), that is, The client can call the servant through the IP address of the servant's machine or the unique determination of the machine name and port number.
  • the servant Before the client calls, the servant must be in the listening state to listen to whether the client requests to establish a connection.
  • the service party may establish or reject the connection according to the situation; the message sent by the client may be text or a binary information stream; when the message sent by the client arrives at the port of the service party, an event is automatically triggered ( Event ), the servant takes over the event and receives a message from the client.
  • Event an event is automatically triggered
  • Step 102 Determine, according to the type of the message protocol in the proxy request information, whether the remote address in the proxy request information needs to be analyzed by the DNS;
  • the current station when the current station receives the proxy request information sent by the background, it first determines the message protocol type of the proxy request information, and determines whether the remote address needs to perform the domain name system according to the message protocol type in the proxy request information (DNS, Domain Name System) ) analysis
  • the message protocol type in the proxy request information is legal, that is, whether it is an expected permitted message protocol type, and the proxy request information is HTTP or FTP or other message type.
  • the HTTP type it is judged whether there is a colon after the HTTP and whether there are two backslashes afterwards, if there is
  • the type of the message protocol is the type of the message protocol that is expected to be allowed. Then, the protocol is resolved according to the HTTP protocol. If the remote address is in the domain name format, the remote address needs to be resolved by DNS. If the remote address is in the IP format, DNS is not required. Analysis.
  • Step 103 When DNS resolution needs to be performed on the remote address in the proxy request information, parse through the DNS server, and obtain a remote IP address.
  • the remote IP address is included in the remote address.
  • the remote server can resolve the remote IP address from the remote address through the resolution of the DNS server.
  • the address is in IP format, DNS resolution is not required, and the remote IP address can be obtained directly from the remote address.
  • Step 104 Establish a second socket connection path corresponding to the remote IP address, and forward the proxy request information to the remote IP network through the second socket connection path.
  • the current station After obtaining the remote IP address in the proxy request information, the current station establishes a second socket connection path corresponding to the remote IP address, and forwards the proxy request information to the remote end through the second socket connection path.
  • the IP network at the same time, the foreground waits for the response information of the remote IP network.
  • the remote IP network returns the response information, the foreground forwards the response information returned by the remote IP network to the background through the first socket connection path, thereby
  • An IP path is established between the background and the remote IP network, which can implement mutual data transmission between the background and the remote IP network, and complete predetermined functions, such as automatic uploading of backup data, automatic download of virus database or operating system patches, and the like;
  • a global detection switch of the media gateway system may be set in the foreground to indicate whether the background proxy function is enabled. If the detection switch is enabled, the foreground processing proxy request from the background is processed, and the proxy port number of the foreground is configurable (can be set Default); If the detection switch is off, this request is not processed.
  • the proxy server address and port number of various protocols that is, the background maintenance IP address of the foreground real-time commercial operating system and the user configurable proxy service port number, and set the timing service, for example, Timely upload backup data or scheduled download Operating system patches or virus libraries, etc.
  • a socket connection is established on the configured proxy port to listen for the connection from the proxy port; after the background timing service arrives, the corresponding operation is automatically performed, for example, an HTTP or FTP request is performed. Wait.
  • the background operation and maintenance system can automatically upload the backed up system data, perform the operating system patch or the virus database upgrade, and the like, which needs to be manually completed by the operator, and improves the background operation and maintenance system.
  • FIG. 3 is a schematic flowchart of a second embodiment of a method for implementing a media gateway proxy according to the present invention. As shown in FIG. 3, based on the first embodiment, after the step 104, the method further includes the following steps:
  • Step 105 Determine whether the response of the remote IP network times out. If the response times out, go to step 106; otherwise, go to step 107.
  • Step 106 according to the response timeout processing.
  • the corresponding timeout processing may be performed, for example, closing the corresponding socket connection path or resending the proxy request information to the remote IP network.
  • Step 107 Forward the response information of the remote IP network to the background through the first socket connection path.
  • the method further includes the following steps:
  • Step 90 Establish a first socket connection path between the background and the background.
  • Step 100 Determine whether the source IP address of the proxy request information is legal. When the source IP address is legal, go to step 1002; otherwise, go to step 1001.
  • Step 1002 a socket maintenance table is established, and step 101 is performed.
  • the socket maintenance table when determining that the source IP address is legal, the socket maintenance table is established, and the structure of the socket maintenance table includes the number of received and sent information and the number of bytes, etc., for observing and counting each socket. Data transmission and reception in the word connection path, so that the relevant information can be obtained from the socket maintenance table in the subsequent steps, and information maintenance and query can be performed.
  • Step 1001 The proxy request information is not received, and the first socket connection path is closed.
  • the method further includes the following steps:
  • Step 1020 Determine whether the message protocol type in the proxy request information is legal. If it is legal, go to step 102; otherwise, go to step 1003.
  • Step 1003 Discard the proxy request information, and close the first socket connection path.
  • the proxy request information by analyzing the message header of the proxy request information, it is determined whether the message protocol type in the proxy request information is legal, that is, whether it is an expected permitted message protocol type, and the proxy request information is HTTP or FTP or other message type. If the proxy request information does not match the expected type, the proxy request information is discarded and the first socket connection path is closed.
  • step 102 the method further includes the following steps:
  • Step 1021 When DNS resolution of the remote address in the proxy request information is not required, establishing a second socket connection path corresponding to the remote IP address in the proxy request information, and connecting the path through the second socket The request information is forwarded to the remote IP network, and step 105 is performed.
  • the foreground directly establishes a remote end with the remote IP network and the proxy request information.
  • the second socket connection path corresponding to the IP address, and forwards the request information to the remote IP network through the second socket connection path, waiting for the response information of the remote IP network; receiving the response returned by the remote IP network Information, passing the response message through the first socket
  • the connection path is forwarded to the background, thereby establishing an IP path between the background and the remote IP network, which can realize mutual data transmission between the background and the remote IP network, and complete predetermined functions, such as automatic uploading of backup data and viruses. Library or operating system patches are automatically downloaded and so on.
  • the apparatus includes: a receiving and sending module 401, a domain name resolution proxy module 403, and a socket connection maintenance module 404;
  • the receiving and sending module 401 is configured to receive proxy request information sent by the background by using a first socket connection path with the background;
  • the domain name resolution proxy module 403 is configured to parse through the DNS server and obtain the remote IP address when determining that the DNS resolution needs to be performed according to the remote address in the proxy request information.
  • the socket connection maintenance module 404 is connected to the background, the remote IP network, and the receiving and transmitting module 401, respectively, for establishing a second socket connection path corresponding to the remote IP address.
  • the receiving and transmitting module 401 is further configured to forward the request information to the remote IP network through the second socket connection path.
  • the parsing and determining module 402 is further configured to determine whether the type of the message protocol in the proxy request information is legal. If it is legal, determine whether the remote address in the proxy request information needs to be parsed by the DNS; otherwise, discard the proxy request information, and close The first set of connection connections.
  • the receiving and sending module 401 is further configured to forward the response information of the remote IP network to the background through the first socket connection path.
  • the socket connection maintenance module 404 is further configured to determine whether the response of the remote IP network is timed out. If the response times out, the response timeout is processed; otherwise, the receiving and transmitting module notifies the response information of the remote IP network through the first socket connection path. Forward to the background.
  • the socket connection maintenance module 404 is further configured to establish a first socket connection path with the background; and is further configured to determine whether the source IP address of the proxy request information is legal. When the source IP address is legal, the socket is established. Maintain the table, and notify the receiving and sending module to pass the first socket with the background The connection path receives the proxy request information sent in the background; otherwise, the proxy request information is not received, and the first socket connection path is closed.
  • the device further includes: an analysis and determination module 402, configured to determine, according to the type of the message protocol in the proxy request information, whether the remote address in the proxy request information needs to perform domain name DNS resolution;
  • the socket connection maintenance module 404 is further configured to establish a second socket corresponding to the remote IP address in the proxy request information when the remote address in the proxy request information is not required to be parsed by the DNS. Word connection path.
  • the receiving and sending module 401 is further configured to forward the request information to the remote IP network through the second socket connection path.
  • the device in this embodiment is disposed in the real-time commercial operating system in the foreground.
  • the background timing needs to be automatically uploaded, such as backup data automatic uploading, virus database or operating system patch downloading
  • the front-end socket connection maintenance module 404 and The first socket connection path is established in the background.
  • the receiving and sending module 401 receives the proxy request information from the background, such as an HTTP request or an FTP request, and receives the proxy in the receiving and sending module 401.
  • the socket connection maintenance module 404 needs to confirm that the source IP of the proxy request information is legal.
  • the socket connection maintenance module 404 confirms that the source IP address of the proxy request information is legal, the socket maintenance table is established. .
  • the parsing judging module 402 determines whether the message protocol type in the proxy request information is legal, and specifically includes: analyzing a message header of the proxy request information, and distinguishing HTTP or FTP or other message type request, etc. If the proxy request information is legal, for example, conforms to the expected type of information, it is determined whether the remote address in the message needs to be DNS resolved, and the parsing determination module 402 confirms that the proxy request information is correct. When a legitimate message is required and DNS resolution is required, the domain name resolution proxy module 403 connects to the DNS server to obtain a remote IP address.
  • the socket connection maintenance module 404 establishes a second socket connection path corresponding to the IP address.
  • the receiving and sending module 401 forwards the proxy request information to the remote IP network, and simultaneously receives the response information returned by the remote IP network, and returns the response information of the remote IP network. Forwarded to the background through the first socket connection path.
  • an IP path is established between the background and the remote IP network to complete the proxy function of the internal and external network communication.
  • predetermined functions such as automatic uploading of backup data, automatic download of virus database or operating system patches, are completed.
  • the existing NGN network, the background and foreground of the media gateway are in a private local area network, for the stability and security of the system, it does not directly communicate with the external remote network. Therefore, it is only necessary to rely on the maintenance personnel to manually copy the backed up data to the external remote network through the portable portable storage device, or to update the system patch and virus database upgrade by manual operation, which is not only time-consuming and laborious, but also stable to the background system. Security poses certain risks.
  • a first socket connection path is established through a foreground and a background
  • a second socket connection path is established between the foreground and the remote IP network
  • an IP path is established between the background and the remote IP network due to the proxy function of the foreground.
  • Data information can be sent to each other, so that the background operation and maintenance system can automatically upload the backed up system data, perform operating system patches or virus database upgrades, etc., which need to be manually completed by the operator, and improve the background operation and maintenance system. Efficiency, safety and stability; no manual intervention, reducing the workload of maintenance personnel.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Description

媒体网关代理的方法及装置 技术领域
本发明涉及通信网络领域, 尤其涉及下一代网络(NGN ) 中一种媒体 网关代理的方法及装置。 背景技术
随着通讯技术的发展, 特别是固网 NGN ( Next Generation Network, 下 一代网络或者 New Generation Network, 新一代网络)的出现、移动 3G (第 三代移动通讯***)的发展, 以及固网与移动 3G的融合, 使得通讯***复 杂而又繁多, 在给人们的通讯生活带来便利的同时, 也给相应的操作维护 人员带来了很多新的挑战。 如何快速方便的配置数据以及维护数据, 保证 ***的稳定性和可靠性, 如何使前后台***不受外部网络的冲击, 保证系 统的安全性, 诸如此类问题, 均有待于提出新的思考和解决方案。
目前, 在 NGN媒体网关的前后台***中, 前台通常釆用商用实时操作 ***和外界网络进行通讯, 以满足业务的实时性和准确性, 从而实现各种 复杂的业务功能; 后台则是操作维护的核心, 其目的是满足数据配置以及 数据维护的易用性和安全性,后台一般釆用 Windows操作***或 Unix/Linux 操作***。
为了保证后台***的稳定性以及安全性, 在 NGN的组网中, 后台常常 只是通过 IP ( Internet Protocol , 网络之间互连的协议)网络和前台通讯, 两 者组织成一个小型的私有局域网, 以避免外部网络对其造成的冲击, 但因 此也给操作维护工作带来不便, 比如自动上传备份的***数据、 自动进行 操作***的补丁升级以及防病毒软件的病毒库升级等, 这些可以通过网络 自动完成的工作,却因为 IP网络的私有性,使得后台和外界网络通讯隔离, 其只能由维护人员手工通过可移动便携存储设备拷贝备份好的数据到外 界, 或通过手工操作来更新***的补丁和病毒库升级, 费时费力, 另外, 由于使用了类似 U盘之类的可移动便携存储设备, 也给后台***的稳定性 以及安全性带来风险。 发明内容
有鉴于此, 本发明的主要目的在于提供一种媒体网关代理的方法及装 置, 自动完成一系列原本需要操作人员手工完成的工作, 以提高***效率、 安全性以及稳定性。
为达到上述目的, 本发明的技术方案是这样实现的:
本发明提出的一种媒体网关代理的方法, 包括:
前台通过与后台的第一套接字连接通路接收后台发送的代理请求信 息;
当根据代理请求信息中远端地址确定需要进行域名 DNS解析时, 通过 DNS服务器解析, 并获取远端 IP地址;
建立与远端 IP地址的第二套接字连接通路, 并通过第二套接字连接通 路将代理请求信息转发给远端 IP网络。
上述方法中, 所述建立与远端 IP地址相应的第二套接字连接通路, 并 通过第二套接字连接通路将代理请求信息转发给远端 IP网络之后, 该方法 还包括:
将远端 IP网络的响应信息通过第一套接字连接通路转发给后台。
上述方法中, 所述前台通过与后台的第一套接字连接通路接收后台发 送的代理请求信息之前, 该方法还包括:
建立与后台之间的第一套接字连接通路; 判断代理请求信息来源 IP地 址是否合法, 来源 IP地址合法时, 建立套接字维护表, 通过与后台的第一 套接字连接通路接收后台发送的代理请求信息; 来源 IP地址不合法时, 不 接收该代理请求信息, 并关闭第一套接字连接通路。
上述方法中, 所述将远端 IP网络的响应信息通过第一套接字连接通路 转发给后台的步骤之前, 该方法还包括:
判断远端 IP网络响应是否超时, 若响应超时, 按响应超时处理; 否则 将远端 IP网络的响应信息通过第一套接字连接通路转发给后台。
上述方法中, 所述前台通过与后台的第一套接字连接通路接收后台发 送的代理请求信息之后, 该方法还包括:
根据代理请求信息中的消息协议类型判断代理请求信息中远端地址是 否需要进行 DNS解析, 当不需要对代理请求信息中的远端地址进行 DNS 解析时,建立与代理请求信息中的远端 IP地址相应的第二套接字连接通路, 并通过第二套接字连接通路将代理请求信息转发给远端 IP网络。
上述方法中, 所述根据代理请求信息中的消息协议类型判断代理请求 信息中的远端地址是否需要进行 DNS解析之前, 该方法还包括:
判断代理请求信息中的消息协议类型是否合法, 如果合法, 判断代理 请求信息中的远端地址是否需要进行 DNS解析;否则丟弃该代理请求信息, 并关闭第一套接字连接通路。
上述方法中,
所述代理请求信息中的消息协议类型为超文本传输协议 HTTP或文件 传输协议 FTP请求信息。
本发明还提供一种媒体网关代理的装置, 包括:
接收发送模块, 用于通过与后台的第一套接字连接通路接收后台发送 的代理请求信息; 以及用于通过第二套接字连接通路将代理请求信息转发 给远端 IP网络;
域名解析代理模块, 用于当根据代理请求信息中远端地址确定需要进 行 DNS解析时, 通过 DNS服务器解析, 并获取远端 IP地址; 套接字连接维护模块, 用于建立与远端 IP地址相应的第二套接字连接 通路。
上述装置中, 所述接收发送模块, 还用于将远端 IP网络的响应信息通 过第一套接字连接通路转发给后台。
上述装置中,
所述套接字连接维护模块, 还用于建立与后台之间的第一套接字连接 通路。
上述装置中,
所述套接字连接维护模块, 还用于判断代理请求信息来源 IP地址是否 合法, 当来源 IP地址合法时, 建立套接字维护表, 并通知接收发送模块通 过与后台的第一套接字连接通路接收后台发送的代理请求信息; 来源 IP地 址不合法时, 不接收该代理请求信息, 并关闭第一套接字连接通路。
上述装置中,
所述套接字连接维护模块, 还用于判断远端 IP网络响应是否超时, 若 响应超时, 按响应超时处理; 否则通知接收发送模块将远端 IP网络的响应 信息通过第一套接字连接通路转发给后台。
上述装置中, 该装置还包括:
解析判断模块, 用于根据代理请求信息中的消息协议类型判断代理请 求信息中远端地址是否需要进行域名 DNS解析。
上述装置中,
所述套接字连接维护模块, 还用于当不需要对代理请求信息中的远端 地址进行 DNS解析时,建立与代理请求信息中的远端 IP地址相应的第二套 接字连接通路;
所述接收发送模块, 还用于通过第二套接字连接通路将代理请求信息 转发给远端 IP网络。 上述装置中,
所述解析判断模块, 还用于判断代理请求信息中的消息协议类型是否 合法,合法时,则判断代理请求信息中的远端地址是否需要进行 DNS解析; 不合法时, 丟弃该代理请求信息, 并关闭第一套接字连接通路。
本发明提供的媒体网关代理的方法及装置, 前台通过与后台的第一套 接字连接通路接收后台发送的代理请求信息; 当根据代理请求信息中远 端地址确定需要进行域名 DNS解析时, 通过 DNS服务器解析, 并获取 远端 IP地址; 建立与远端 IP地址的第二套接字连接通路, 并通过第二 套接字连接通路将代理请求信息转发给远端 IP网络, 由前台的代理使后 台与远端 IP网络之间建立一条 IP通路可以互发数据信息,从而, 实现后台 操作维护***可以方便的自动上传备份的***数据、 进行操作***补丁或 者病毒库的升级等一系列原本需要操作人员手工完成的工作, 提高了后台 操作维护***的效率、 安全性以及稳定性; 无需人工干预, 减少了维护人 员的工作量。 附图说明
图 1是现有媒体网关前后台***的示例图;
图 2是本发明实现媒体网关代理的方法的实施例一的流程示意图; 图 3是本发明实现媒体网关代理的方法的实施例二的流程示意图; 图 4是本发明实现媒体网关代理的装置的结构示意图。 具体实施方式
本发明的基本思想是:前台通过与后台的第一套接字连接通路接收后 台发送的代理请求信息; 当根据代理请求信息中远端地址确定需要进行 域名 DNS解析时, 通过 DNS服务器解析, 并获取远端 IP地址; 建立与 远端 IP地址的第二套接字连接通路,并通过第二套接字连接通路将代理 请求信息转发给远端 IP网络。
本发明实施例的解决方案主要是通过前台代理, 为后台与远端 IP网络 建立 IP连接通路, 以便后台与外端网络之间可以互发数据信息, 由远端 IP 网络自动为后台上传备份的***数据、 进行操作***的补丁升级以及防病 毒软件的病毒库升级等。
图 1是现有媒体网关前后台***的示例图, 如图 1所示, 本方法实施 例的运行环境包括媒体网关前后台***, 其主要包括: 前台实时商用操作 ***(前台 ), 用于完成主要的业务功能以及本发明实施例所介绍的代理功 能; 后台操作维护***(后台), 用于完成诸如***的数据配置及备份等功 能。 两者通过 IP网络进行通讯, 组成一个私有的局域网络。 在这个私有 IP 网络中, 后台仅可以和前台通讯、 传递数据和传递各种消息。 前台则具备 和外界网络通讯的能力, 使得代理功能可用。
实施例一
图 2是本发明实现媒体网关代理的方法的实施例一的流程示意图, 如 图 2所示, 该方法包括以下步骤:
步骤 101 ,前台通过与后台的第一套接字连接通路接收后台发送的代理 请求信息;
具体的, 当后台定时需要进行诸如备份数据自动上传、 病毒库或操作 ***补丁自动下载功能时, 前台与后台建立第一套接字连接通路, 当第一 套接字连接通路建立成功后, 前台接收来自后台的例如 HTTP ( HyperText Transfer Protocol, 超文本传输协议 )或 FTP ( File Transfer Protocol, 文件传 输协议) 的代理请求信息。 这里, 前台可以对接收的代理请求信息的来源 IP地址进行合法性判断, 如果代理请求信息来源 IP地址合法, 则建立套接 字维护表, 否则不接收该代理请求信息, 并关闭第一套接字连接通路; 所述 "套接字" 通常也称作 SOCKET , 用于描述 IP地址和端口, 是 一个通信链的句柄, 应用程序通常通过 "套接字" 向网络发出请求或者应 答网络请求;
当两个应用程序之间需要釆用套接字进行通信时, 首先需要在两个应 用程序之间 (可位于同一台机器, 也可位于不同的机器)建立套接字连接, 发起呼叫连接请求的一方为客户方, 接受呼叫连接请求的一方成为服务方; 客户方和服务方是相对的, 一个应用程序既可以是客户方, 也可以是服务 方;
在客户方发起呼叫连接请求之前, 客户方必须知道服务方在哪里, 所 以需要知道服务方所在机器的 IP地址或机器名称, 客户方和服务方可以预 先约定一个 PORT (端口号), 也就是说, 客户方可以通过服务方所在机器 的 IP地址或机器名称和端口号唯一的确定方式来呼叫服务方; 在客户方呼 叫之前, 服务方必须处于侦听状态, 侦听是否有客户要求建立连接, 一旦 接到连接请求, 服务方可以根据情况建立或拒绝连接; 客户方发送的消息 可以是文本, 也可以是二进制信息流; 当客户方发送的消息到达服务方的 端口时, 自动触发一个事件(event ), 服务方接管该事件, 接收来自客户方 的消息。
步骤 102,根据代理请求信息中的消息协议类型判断代理请求信息中的 远端地址是否需要进行 DNS解析;
具体的, 当前台接收到后台发送的代理请求信息时, 首先判断该代理 请求信息的消息协议类型, 根据代理请求信息中的消息协议类型判断远端 地址是否需要进行域名***(DNS, Domain Name System )解析;
本实施例中, 通过分析代理请求信息的消息头, 判断代理请求信息中 的消息协议类型是否合法, 即是否是预期允许的消息协议类型, 区分该代 理请求信息是 HTTP或 FTP或其它消息类型, 例如, 这里是 HTTP类型, 则判断 HTTP后面是否有冒号以及后面是否有两反斜杠, 如果有则说明该 消息协议类型是预期允许的消息协议类型, 然后, 根据 HTTP协议进行解 析, 如果远端地址是域名形式, 则说明远端地址需要进行 DNS解析, 如果 远端地址是 IP形式, 则不需要进行 DNS解析。
步骤 103 , 当需要对代理请求信息中的远端地址进行 DNS解析时, 通 过 DNS服务器解析, 并获取远端 IP地址;
具体的, 本实施例中, 远端地址内包含有远端 IP地址, 当远端地址为 域名形式时, 通过 DNS服务器的解析, 可以从远端地址中解析出远端 IP 地址, 当远端地址是 IP形式时, 则不需进行 DNS解析, 可直接从远端地址 中获取远端 IP地址。
步骤 104, 建立与远端 IP地址相应的第二套接字连接通路, 并通过第 二套接字连接通路将代理请求信息转发给远端 IP网络。
具体的, 当前台获得代理请求信息中的远端 IP地址后, 建立与远端 IP 地址相应的第二套接字连接通路, 并通过第二套接字连接通路将代理请求 信息转发给远端 IP网络, 同时, 前台等待远端 IP网络的响应信息, 当远端 IP网络返回响应信息时, 前台将远端 IP网络返回的响应信息通过第一套接 字连接通路转发给后台,由此,在后台与远端 IP网络之间建立一条 IP通路 , 可以实现后台与远端 IP网络之间互发数据信息, 完成预定的功能, 例如备 份数据自动上传、 病毒库或者操作***补丁自动下载等;
本实施例中, 可以在前台设置一个媒体网关***全局的检测开关, 标 示是否开启后台代理功能, 如果检测开关开启, 则前台处理来自后台的代 理请求, 且前台的代理端口号可配置(可以设置默认值); 如果检测开关关 闭, 则不处理这种请求。
这里, 在后台操作维护***中, 需要配置各种协议的代理服务器地址 以及端口号, 即前台实时商用操作***的后台维护 IP地址和用户可配置的 代理服务端口号, 并设置好定时服务, 比如定时上传备份数据或定时下载 操作***补丁或病毒库等。
在媒体网关前台实时商用操作***中, 配置打开后台代理功能、 后台 维护 IP地址和代理服务端口号, 以及配置对远端 IP网络的 IP地址、 下一 跳地址和远端 IP网络的 DNS服务器地址;
当前后台台代理功能开关开启后, 在配置的代理端口上建立一个套接 字连接, 侦听来自对代理端口的连接; 后台定时服务到时后, 自动进行相 应的操作, 例如进行 HTTP或 FTP请求等。
本发明实施例通过前台代理, 实现后台操作维护***可以方便的自动 上传备份的***数据、 进行操作***补丁或病毒库的升级等一系列原本需 要操作人员手工完成的工作, 提高了后台操作维护***的效率、 安全性以 及稳定性; 无需人工干预, 大大减少维护人员的工作量。
实施例二
图 3是本发明实现媒体网关代理的方法的实施例二的流程示意图; 如 图 3所示, 在实施例一的基础上, 其中, 在步骤 104之后, 该方法还包括 以下步骤:
步骤 105 ,判断远端 IP网络响应是否超时,若响应超时,执行步骤 106; 否则, 执行步骤 107。
步骤 106, 按响应超时处理。
具体的, 如果远端 IP网络在规定的超时范围内没有响应, 则可以进行 相应的超时处理, 例如, 关闭相应的套接字连接通路或向远端 IP网络重新 发送代理请求信息。
步骤 107, 将远端 IP网络的响应信息通过第一套接字连接通路转发给 后台。
在步骤 101之前, 该方法还包括以下步骤:
步骤 90、 建立与后台之间的第一套接字连接通路。 步骤 100, 判断代理请求信息来源 IP地址是否合法, 当来源 IP地址合 法时, 执行步骤 1002; 否则, 执行步骤 1001。
步骤 1002, 建立套接字维护表, 并执行步骤 101。
本实施例中, 当判断来源 IP地址合法时, 建立套接字维护表, 套接字 维护表的结构包括接收和发送的信息的个数和字节数等, 用于观察、 统计 各套接字连接通路中的数据收发情况, 以便后续步骤中从套接字维护表中 获取有关信息, 可以进行信息的维护、 查询等。
步骤 1001 , 不接收该代理请求信息, 并关闭第一套接字连接通路。 在步骤 102之前, 该方法还包括以下步骤:
步骤 1020, 判断代理请求信息中的消息协议类型是否合法, 如果合法, 执行步骤 102; 否则, 执行步骤 1003。
步骤 1003 , 丟弃该代理请求信息, 并关闭第一套接字连接通路。
本实施例中, 通过分析代理请求信息的消息头, 判断代理请求信息中 的消息协议类型是否合法, 即是否是预期允许的消息协议类型, 区分该代 理请求信息是 HTTP或 FTP或其它消息类型, 如果该代理请求信息不符合 预期类型, 则丟弃该代理请求信息, 并关闭第一套接字连接通路。
本实施例中, 在步骤 102之后, 该方法还包括以下步骤:
步骤 1021 , 当不需要对代理请求信息中的远端地址进行 DNS解析时, 建立与代理请求信息中的远端 IP地址相应的第二套接字连接通路, 并通过 第二套接字连接通路将请求信息转发给远端 IP网络, 并执行步骤 105。
具体的, 当经过判断不需要对代理请求信息中的远端地址进行 DNS解 析时, 即代理请求信息中含有远端 IP地址时, 前台直接与远端 IP网络建立 与代理请求信息中的远端 IP地址相应的第二套接字连接通路, 并通过第二 套接字连接通路将请求信息转发给远端 IP网络,等待远端 IP网络的响应信 息; 当收到远端 IP网络返回的响应信息时, 将该响应信息通过第一套接字 连接通路转发给后台, 由此, 在后台与远端 IP网络之间建立一条 IP通路 , 可以实现后台与远端 IP网络之间互发数据信息, 完成预定的功能, 例如备 份数据自动上传、 病毒库或操作***补丁自动下载等。
图 4是本发明实现媒体网关代理的装置的结构示意图, 如图 4所示, 该装置包括: 接收发送模块 401、 域名解析代理模块 403、 套接字连接维护 模块 404; 其中,
接收发送模块 401 ,用于通过与后台的第一套接字连接通路接收后台发 送的代理请求信息;
域名解析代理模块 403 ,用于当根据代理请求信息中远端地址确定需要 进行 DNS解析时, 通过 DNS服务器解析, 并获取远端 IP地址;
套接字连接维护模块 404, 分别与后台、 远端 IP网络以及接收发送模 块 401连接, 用于建立与远端 IP地址相应的第二套接字连接通路。
本实施例中,接收发送模块 401 ,还用于通过第二套接字连接通路将请 求信息转发给远端 IP网络。
解析判断模块 402 ,还用于判断代理请求信息中的消息协议类型是否合 法,如果合法,则判断代理请求信息中的远端地址是否需要进行 DNS解析; 否则, 丟弃该代理请求信息, 并关闭第一套接字连接通路。
进一步的, 本实施例中, 接收发送模块 401 , 还用于将远端 IP网络的 响应信息通过第一套接字连接通路转发给后台。
套接字连接维护模块 404, 还用于判断远端 IP网络响应是否超时, 若 响应超时, 按响应超时处理; 否则通知接收发送模块将远端 IP网络的响应 信息通过第一套接字连接通路转发给后台。
套接字连接维护模块 404,还用于建立与后台之间的第一套接字连接通 路; 以及还用于判断代理请求信息来源 IP地址是否合法, 当来源 IP地址合 法时, 建立套接字维护表, 并通知接收发送模块通过与后台的第一套接字 连接通路接收后台发送的代理请求信息; 否则不接收该代理请求信息, 并 关闭第一套接字连接通路。
该装置还包括: 解析判断模块 402, 用于根据代理请求信息中的消息协 议类型判断代理请求信息中远端地址是否需要进行域名 DNS解析;
更进一步的, 套接字连接维护模块 404, 还用于当不需要对代理请求信 息中的远端地址进行 DNS 进行解析时, 建立与代理请求信息中的远端 IP 地址相应的第二套接字连接通路。
接收发送模块 401 ,还用于通过第二套接字连接通路将请求信息转发给 远端 IP网络。
需要说明的是, 本实施例装置设置在前台实时商用操作***内, 当后 台定时需要进行诸如备份数据自动上传、 病毒库或者操作***补丁自动下 载功能时, 由前台套接字连接维护模块 404与后台建立第一套接字连接通 路, 当第一套接字连接通路建立成功后, 由接收发送模块 401 接收来自后 台的比如 HTTP请求或者 FTP请求的代理请求信息, 在接收发送模块 401 接收该代理请求信息之前, 还需由套接字连接维护模块 404确认该代理请 求信息的来源 IP合法, 当套接字连接维护模块 404确认该代理请求信息的 来源 IP地址合法后, 建立套接字维护表。
之后, 接收发送模块 401将此代理请求信息发送给解析判断模块 402, 解析判断模块 402判断该代理请求信息中的消息协议类型是否合法, 具体 包括: 分析该代理请求信息的消息头, 区分其是 HTTP或者 FTP或者其它 消息类型请求等, 如果该代理请求信息合法比如符合预期类型的信息, 则 判断消息中的远端地址是否需要进行 DNS解析, 当解析判断模块 402确认 该代理请求信息是一条正确合法的消息且需要进行 DNS解析时, 则由域名 解析代理模块 403通过与 DNS服务器连接, 获取远端 IP地址。之后, 由套 接字连接维护模块 404建立与该 IP地址相对应的第二套接字连接通路。 当第二套接字连接通路建立成功后, 由接收发送模块 401 将上述代理 请求信息转发给远端 IP网络, 同时接收远端 IP网络返回的响应信息, 并将 远端 IP网络返回的响应信息通过第一套接字连接通路转发给后台。 由此, 建立起一条后台与远端 IP网络的 IP通路, 完成内外网络通讯的代理功能。 从而实现后台与远端 IP网络之间互发数据信息, 完成预定的功能, 比如备 份数据自动上传、 病毒库或者操作***补丁自动下载等。
由于现有的 NGN网络中,媒体网关的后台与前台在一个私有的局域网 中, 为了***的稳定和安全性, 不直接和外界远端网络通讯。 所以只能依 靠维护人员手工按时通过可移动便携存储设备拷贝备份好的数据至外界远 端网络, 或通过手工操作来更新***的补丁和病毒库升级等, 不仅费时费 力, 也给后台***的稳定安全性带来一定的风险。
本发明实施例通过前台与后台建立第一套接字连接通路, 前台与远端 IP网络建立第二套接字连接通路, 由于前台的代理功能使后台与远端 IP网 络之间建立一条 IP通路可以互发数据信息, 从而, 实现后台操作维护*** 可以方便的自动上传备份的***数据、 进行操作***补丁或病毒库的升级 等一系列原本需要操作人员手工完成的工作, 提高了后台操作维护***的 效率、 安全性以及稳定性; 无需人工干预, 减少了维护人员的工作量。
以上所述仅为本发明的优选实施例, 并非因此限制本发明的专利范围, 凡是利用本发明说明书及附图内容所作的等效结构或流程变换, 或直接或 间接运用在其他相关的技术领域, 均同理包括在本发明的专利保护范围内。

Claims

权利要求书
1、 一种媒体网关代理的方法, 其特征在于, 该方法包括:
前台通过与后台的第一套接字连接通路接收后台发送的代理请求信 息;
当根据代理请求信息中远端地址确定需要进行域名 DNS解析时, 通过 DNS服务器解析, 并获取远端 IP地址;
建立与远端 IP地址的第二套接字连接通路, 并通过第二套接字连接通 路将代理请求信息转发给远端 IP网络。
2、 根据权利要求 1所述的媒体网关代理的方法, 其特征在于, 所述建 立与远端 IP地址相应的第二套接字连接通路, 并通过第二套接字连接通路 将代理请求信息转发给远端 IP网络之后, 该方法还包括:
将远端 IP网络的响应信息通过第一套接字连接通路转发给后台。
3、 根据权利要求 1或 2所述的媒体网关代理的方法, 其特征在于, 所 述前台通过与后台的第一套接字连接通路接收后台发送的代理请求信息之 前, 该方法还包括:
建立与后台之间的第一套接字连接通路; 判断代理请求信息来源 IP地 址是否合法, 来源 IP地址合法时, 建立套接字维护表, 通过与后台的第一 套接字连接通路接收后台发送的代理请求信息; 来源 IP地址不合法时, 不 接收该代理请求信息, 并关闭第一套接字连接通路。
4、 根据权利要求 3所述的媒体网关代理的方法, 其特征在于, 所述将 远端 IP网络的响应信息通过第一套接字连接通路转发给后台的步骤之前, 该方法还包括:
判断远端 IP网络响应是否超时, 若响应超时, 按响应超时处理; 否则 将远端 IP网络的响应信息通过第一套接字连接通路转发给后台。
5、 根据权利要求 4所述的媒体网关代理的方法, 其特征在于, 所述前 台通过与后台的第一套接字连接通路接收后台发送的代理请求信息之后, 该方法还包括:
根据代理请求信息中的消息协议类型判断代理请求信息中远端地址是 否需要进行 DNS解析, 当不需要对代理请求信息中的远端地址进行 DNS 解析时,建立与代理请求信息中的远端 IP地址相应的第二套接字连接通路, 并通过第二套接字连接通路将代理请求信息转发给远端 IP网络。
6、 根据权利要求 5所述的媒体网关代理的方法, 其特征在于, 所述根 据代理请求信息中的消息协议类型判断代理请求信息中的远端地址是否需 要进行 DNS解析之前, 该方法还包括:
判断代理请求信息中的消息协议类型是否合法, 如果合法, 判断代理 请求信息中的远端地址是否需要进行 DNS解析;否则丟弃该代理请求信息, 并关闭第一套接字连接通路。
7、 根据权利要求 6所述的媒体网关代理的方法, 其特征在于, 所述代理请求信息中的消息协议类型为超文本传输协议 HTTP或文件 传输协议 FTP请求信息。
8、 一种媒体网关代理的装置, 其特征在于, 该装置包括:
接收发送模块, 用于通过与后台的第一套接字连接通路接收后台发送 的代理请求信息; 以及用于通过第二套接字连接通路将代理请求信息转发 给远端 IP网络;
域名解析代理模块, 用于当根据代理请求信息中远端地址确定需要进 行 DNS解析时, 通过 DNS服务器解析, 并获取远端 IP地址;
套接字连接维护模块, 用于建立与远端 IP地址相应的第二套接字连接 通路。
9、 根据权利要求 8所述的媒体网关代理的装置, 其特征在于, 所述接 收发送模块, 还用于将远端 IP网络的响应信息通过第一套接字连接通路转 发给后台。
10、 根据权利要求 8或 9所述的媒体网关代理的装置, 其特征在于, 所述套接字连接维护模块, 还用于建立与后台之间的第一套接字连接 通路。
11、 根据权利要求 10所述的媒体网关代理的装置, 其特征在于, 所述套接字连接维护模块, 还用于判断代理请求信息来源 IP地址是否 合法, 来源 IP地址合法时, 建立套接字维护表, 并通知接收发送模块通过 与后台的第一套接字连接通路接收后台发送的代理请求信息; 来源 IP地址 不合法时, 不接收该代理请求信息, 并关闭第一套接字连接通路。
12、 根据权利要求 11所述的媒体网关代理的装置, 其特征在于, 所述套接字连接维护模块, 还用于判断远端 IP网络响应是否超时, 若 响应超时, 按响应超时处理; 否则通知接收发送模块将远端 IP网络的响应 信息通过第一套接字连接通路转发给后台。
13、 根据权利要求 8所述的媒体网关代理的装置, 其特征在于, 该装 置还包括:
解析判断模块, 用于根据代理请求信息中的消息协议类型判断代理请 求信息中远端地址是否需要进行域名 DNS解析。
14、 根据权利要求 13所述的媒体网关代理的装置, 其特征在于, 所述套接字连接维护模块, 还用于当不需要对代理请求信息中的远端 地址进行 DNS解析时,建立与代理请求信息中的远端 IP地址相应的第二套 接字连接通路;
所述接收发送模块, 还用于通过第二套接字连接通路将代理请求信息 转发给远端 IP网络。
15、 根据权利要求 14所述的媒体网关代理的装置, 其特征在于, 所述解析判断模块, 还用于判断代理请求信息中的消息协议类型是否 合法, 合法时, 判断代理请求信息中的远端地址是否需要进行 DNS解析; 不合法时, 丟弃该代理请求信息, 并关闭第一套接字连接通路。
PCT/CN2011/071505 2010-06-03 2011-03-04 媒体网关代理的方法及装置 WO2011150704A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201010191357.4 2010-06-03
CN201010191357A CN101867609A (zh) 2010-06-03 2010-06-03 媒体网关代理的方法及装置

Publications (1)

Publication Number Publication Date
WO2011150704A1 true WO2011150704A1 (zh) 2011-12-08

Family

ID=42959171

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2011/071505 WO2011150704A1 (zh) 2010-06-03 2011-03-04 媒体网关代理的方法及装置

Country Status (2)

Country Link
CN (1) CN101867609A (zh)
WO (1) WO2011150704A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110465094A (zh) * 2019-08-19 2019-11-19 福建天晴在线互动科技有限公司 一种基于ip端口特征的游戏外挂检测方法

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101867609A (zh) * 2010-06-03 2010-10-20 中兴通讯股份有限公司 媒体网关代理的方法及装置
CN102790807B (zh) * 2011-05-16 2016-05-25 北京奇虎科技有限公司 域名解析代理方法和***、域名解析代理服务器
US9094433B2 (en) * 2012-06-27 2015-07-28 Qualcomm Incorporated Systems and methods for bearer independent protocol gateway optimization
CN106487945B (zh) * 2016-09-09 2019-05-17 中国互联网络信息中心 一种dns转发查询方法
CN107566420B (zh) * 2017-10-27 2020-04-14 深信服科技股份有限公司 一种被恶意代码感染的主机的定位方法及设备

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050132065A1 (en) * 2001-01-24 2005-06-16 Qiaofeng Zhou Using virtual network address information during communications
CN1972188A (zh) * 2006-10-13 2007-05-30 清华大学 基于真实地址的可信p2p电子邮件传输方法
CN101150545A (zh) * 2007-10-18 2008-03-26 中兴通讯股份有限公司 一种媒体网关多模块数据配置下的数据分发方法
CN101867609A (zh) * 2010-06-03 2010-10-20 中兴通讯股份有限公司 媒体网关代理的方法及装置

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100502301C (zh) * 2004-12-31 2009-06-17 中兴通讯股份有限公司 一种网管***中节点控制方法
CN101150830B (zh) * 2007-10-17 2010-06-02 中兴通讯股份有限公司 软件包升级方法及装置
CN101179376A (zh) * 2007-12-05 2008-05-14 龙刚 实现局域网信息安全的方法及基于方法的安全网卡及网络
CN101262478A (zh) * 2008-04-10 2008-09-10 杭州华三通信技术有限公司 穿越网络地址转换nat的方法和设备

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050132065A1 (en) * 2001-01-24 2005-06-16 Qiaofeng Zhou Using virtual network address information during communications
CN1972188A (zh) * 2006-10-13 2007-05-30 清华大学 基于真实地址的可信p2p电子邮件传输方法
CN101150545A (zh) * 2007-10-18 2008-03-26 中兴通讯股份有限公司 一种媒体网关多模块数据配置下的数据分发方法
CN101867609A (zh) * 2010-06-03 2010-10-20 中兴通讯股份有限公司 媒体网关代理的方法及装置

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
YAO XIAOFENG ET AL.: "Apply of Socket Technology on Embedded Gateway and Development of Java", INDUSTRIAL CONTROL COMPUTER, vol. 19, no. 2, February 2006 (2006-02-01), pages 21 - 22 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110465094A (zh) * 2019-08-19 2019-11-19 福建天晴在线互动科技有限公司 一种基于ip端口特征的游戏外挂检测方法

Also Published As

Publication number Publication date
CN101867609A (zh) 2010-10-20

Similar Documents

Publication Publication Date Title
EP3259898B1 (en) Message bus service directory
US9054952B2 (en) Automated passive discovery of applications
TWI608717B (zh) 資料管理行動性政策
CN110999257B (zh) 用于服务器通知的递送的传送方法选择
WO2011150704A1 (zh) 媒体网关代理的方法及装置
EP3332561A1 (en) Internet of things end-to-end service layer quality of service management
WO2014166210A1 (zh) 客户端、服务器、远程用户拨号认证能力协商方法及***
CN112165447A (zh) 基于waf设备的网络安全监测方法、***和电子装置
KR101893965B1 (ko) 근접장 발견 방법, 사용자 장비, 및 저장 매체
CN110771117B (zh) 一种采用面向id的网络的会话层通信
WO2012175024A1 (zh) 实现无线数据传输与短信收发并行的方法、***及设备
WO2013063775A1 (zh) 一种远程服务器对无线终端进行管理的方法、装置和***
WO2012119504A1 (zh) 远程流量采集的方法、装置和***
WO2022041827A1 (zh) 移动网络侦测信息的传输方法和装置、存储介质
WO2014019487A1 (zh) 数据业务体验评估方法、装置及网络设备
US9380084B2 (en) Method, apparatus and system for implementing login of IP telephone number
CN114401304A (zh) 一种基于ip的去中心化端到端连接通信***
Schoenwaelder et al. Definition of managed objects for ipv6 over low-power wireless personal area networks (6lowpans)
WO2015135124A1 (zh) 一种信息传送方法及装置
TWI608749B (zh) 用來控制一客戶端裝置存取一網路裝置之方法以及控制裝置
CN107071081B (zh) 一种查找终端接入ap位置的方法及***
JP6123237B2 (ja) PPPoE接続機能を有する中継装置
WO2015077991A1 (zh) 消息传输方法、装置和网关设备
WO2016150071A1 (zh) 一种通信方法、无线基站、用户终端及通信***
Zhou Internet Engineering Task Force (IETF) J. Schoenwaelder Request for Comments: 7388 A. Sehgal Category: Standards Track Jacobs University

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11789083

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 11789083

Country of ref document: EP

Kind code of ref document: A1