WO2013060298A1 - 一种在IPsec机制下的网络测试方法,装置及*** - Google Patents

一种在IPsec机制下的网络测试方法,装置及*** Download PDF

Info

Publication number
WO2013060298A1
WO2013060298A1 PCT/CN2012/083652 CN2012083652W WO2013060298A1 WO 2013060298 A1 WO2013060298 A1 WO 2013060298A1 CN 2012083652 W CN2012083652 W CN 2012083652W WO 2013060298 A1 WO2013060298 A1 WO 2013060298A1
Authority
WO
WIPO (PCT)
Prior art keywords
ipsec
data packet
test information
session request
information
Prior art date
Application number
PCT/CN2012/083652
Other languages
English (en)
French (fr)
Inventor
毕晓宇
谢雷
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to RU2014121393/08A priority Critical patent/RU2580454C2/ru
Publication of WO2013060298A1 publication Critical patent/WO2013060298A1/zh
Priority to US14/259,973 priority patent/US20140237327A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0823Errors, e.g. transmission errors
    • H04L43/0829Packet loss
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0823Errors, e.g. transmission errors
    • H04L43/0847Transmission error
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/50Testing arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/164Implementing security features at a particular protocol layer at the network layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/037Protecting confidentiality, e.g. by encryption of the control plane, e.g. signalling traffic

Definitions

  • TECHNICAL FIELD The present invention relates to the field of wireless communications, and in particular, to a network testing method, apparatus, and system under an IPsec mechanism.
  • IPPM IP Performance Metrics, IP Performance Metrics, IP Performance Indicators
  • IPPM IP Performance Metrics, IP Performance Metrics, IP Performance Indicators
  • the 3GPP The 3rd Generation Partnership Project
  • IPsec IP security
  • MME Mobility Management Entity
  • eNB enhanced NodeB
  • LTE Long Term Evolution
  • IPsec IP security
  • a security gateway is deployed at the entry point of the core network. Therefore, the secure tunnel IPsec between the eNB and the MME can also be terminated at the security gateway. Therefore, if a secure detection method is considered on the IP layer, the security-encrypted dimensional measurement needs to be processed. Because IPsec protection is used, the interactive data flow between the base station and the security gateway must be performed in the form of an encrypted message. Transfer, making it specific to the business Measurement of data streams is difficult.
  • the method of using the IPsec secure tunnel to protect the transport data stream is a method of detecting using some OAM (Operation Administration and Maintenance) packets, since this packet contains only services.
  • OAM Operaation Administration and Maintenance
  • the number, size, and other information of the data stream cannot define whether the data packet is out of order, so it is likely that measurement errors caused by the IPsec receiver receiving the out-of-order OAM packet.
  • Embodiments of the present invention provide a network test method, apparatus, and system under the IPsec mechanism, which solves the error caused by network test when the service data packet is received out of order under the IPsec mechanism in the prior art.
  • a network test method under the IPsec mechanism includes:
  • the session request information includes the number of IPsec data packets and the sending time interval information
  • the IPsec data packet carrying the test information is received; and according to the received test information and the number of the IPsec data packets and the sending time interval information in the session request message, the received The IPsec packet performs error detection.
  • Another network test method under the IPsec mechanism includes:
  • the session request information includes a number of data packets and a transmission time interval information
  • an embodiment of the present invention provides a receiving terminal, including:
  • a first receiving unit configured to receive a session request message, where the session request information includes an IPsec data packet quantity and a sending time interval information;
  • a second receiving unit configured to receive the IPsec data packet carrying the test information
  • a detecting unit where the detecting unit is connected to the first receiving unit and the second receiving unit, according to the second receiving
  • an embodiment of the present invention further provides a sending terminal, including:
  • a first sending unit configured to send a session request message
  • a second sending unit configured to send an IPsec packet carrying test information
  • an embodiment of the present invention provides a network test system under the IPsec mechanism, including:
  • a sending terminal configured to send a session request message, and send an IPsec data packet carrying the test information
  • a receiving terminal configured to receive the session request message, and receive the IPsec data packet carrying the test information
  • the receiving terminal is further configured to perform error detection on the received IPsec data packet according to the received test information and the number of data packets in the session request message and the sending time interval information.
  • the embodiment of the invention provides a network test method under the IPsec mechanism, which firstly sends a session request message to an IPsec data packet to be tested, confirms the number of IPsec data packet transmissions, and sends an interval, and then sends the information to the IPsec data packet.
  • the IPsec data packet is added with information such as a sequence number, a timestamp, and an error estimate, and the IPsec data packet is detected, and the OAM data packet that only carries the data packet size and quantity is received under the IPsec mechanism, and cannot be determined. Measurement error problems caused by out of order packets.
  • FIG. 4 is a format diagram of a session request message provided in an embodiment of the present invention.
  • FIG. 5 is a format diagram of a session request message according to an embodiment of the present invention
  • FIG. 6 is a format diagram of a data packet header according to an embodiment of the present invention
  • FIG. 7 is a data provided in an embodiment of the present invention
  • FIG. 8 is a schematic structural diagram of a receiving terminal according to an embodiment of the present invention
  • FIG. 9 is a schematic structural diagram of a transmitting terminal according to an embodiment of the present invention
  • the network test method under the IPsec (IP security) mechanism provided by the embodiment of the present invention relates to the receiving terminal side, as shown in FIG. 1, and includes the following steps:
  • the session request message includes the number of IPsec data packets and the transmission time interval information.
  • S102 After the session is established by the sending terminal, receive the IPsec data packet carrying the test information. Specifically, after establishing a session with the sending terminal, the sending terminal starts to prepare to send a data packet, where the data packet carries test information, and the receiving terminal acquires test information from the data packet, and performs error detection on the received data packet.
  • S103 Perform error detection on the received IPsec data packet according to the received test information and the number of the IPsec data packets and the sending time interval information in the session request message.
  • the IPsec data packet carries test information, where the test information includes a sequence number, a timestamp, and an error estimate of the data packet, and the receiving end obtains the test in the IPsec data packet.
  • the received IPsec data is sorted, and then the number of IPsec data packets sent in the previous session request message is used, and the test station Whether the sent IPsec data packet is out of order, and the IPsec receiving terminal may further send the time according to the sending time marked by the timestamp of the data packet in the test information and the IPsec data packet sent in the session request message.
  • the interval and the start time detect the delay and detect the packet loss rate according to the number of received IPsec packets and the number of IPsec packets negotiated in the session request message.
  • the embodiment of the invention provides a network test method under the IPsec mechanism. After receiving the session request message of the sending terminal, the receiving terminal first determines the number of IPsec data packets to be sent and the sending interval, and then sends the information through the acquisition.
  • the information such as the serial number and time stamp and error estimation carried in the IPsec data packet detects the received IPsec data packet, and solves the problem of directly transmitting only the information exchange of the data packet transmitted without sending the session request message. There are packet size and number of OAM packets and it is impossible to determine the measurement error caused by packet out-of-order.
  • the embodiment of the invention further provides a network test method under the IPsec mechanism, which relates to the sending terminal side, and includes the following steps:
  • the session request message includes the number of IPsec data packets and the transmission time interval information.
  • the IPsec data packet carrying the test information is sent, so that the receiving terminal receives the test information and the number of the IPsec data packets in the session request message, and the sending time interval.
  • Information error detection of the received IPsec data packet.
  • the sending terminal sends an IPsec data packet, and adds test information to the data packet, where the test information includes the transmitted IPsec data packet sequence number, timestamp, and error estimation, etc., And causing the receiving terminal to perform error detection on the received IPsec data packet according to the test information received by the 'J and the number of data packets in the session request message, and the sending time interval information.
  • the embodiment of the invention provides a network test method under the IPsec mechanism.
  • the IPsec data packet sending terminal first sends a session request message to the receiving terminal, and first determines the number of IPsec data packets to be sent and the sending interval.
  • the IPsec packet carrying the serial number, the timestamp, and the error estimate is sent to enable the receiving terminal to detect the IPsec packet, and the direct transmission is performed when the information of the data packet transmitted without the session request message is transmitted. It only carries OAM packets with packet size and number, and cannot determine the measurement error caused by packet out-of-order.
  • a network test method under the IPsec IP security (IP security) mechanism provided by another embodiment of the present invention, as shown in FIG. 3, includes the following steps:
  • the sending terminal sends a session request message.
  • the session request message includes the number of IPsec data packets and the transmission time interval information.
  • the user data packet protocol UDP User Datagram Protocol
  • the IPsec packet transmission start time and the like may also be included.
  • the session request message may be sent, and the method further includes: S3011: Adding a session request message of the service flow information to be tested.
  • S3011 Adding a session request message of the service flow information to be tested.
  • the information about the service flow to be tested is directly added, and the information about the service flow to be tested may be the source address, the destination address, the source port number, and the destination port number of the IPsec data packet of the service flow to be tested.
  • the DSCP value can also be one or more identification groups that can identify the service data flow information.
  • the source address, the destination address, the source port number, the destination port number, and the DSCP value of the IPsec data packet of the service flow to be tested are added, and the format of the session request message sent is as shown in FIG. 4, where 41 is an extension.
  • the added content of the service flow mainly includes: Traffic Sender Port/ Traffic Receiver Port indicates the source/destination port number of the specific traffic flow packet to be tested; Traffic Sender Address/ Traffic Receiver Address indicates the transmission/reception of the specific service flow data packet to be tested. End address.
  • the DSCP Differentiated Services Code Point
  • the DSCP can be defined by 1 or 2 bytes.
  • the location of the added content may be, but not limited to, as shown in FIG. 4, or after the Sender Port/Receiver Port sends/receives the UDP port number of the test packet (Sender Port/ Receiver Port).
  • Option 2 adding a session request message identifying the bit and the source port number, the destination port number, and the like of the IPsec packet to be tested, or a session request message adding an identification bit and one or more identification groups capable of identifying the IPsec packet service,
  • the receiving terminal performs error detection on the received IPsec data packet according to the source port number and the destination port number in the session request message.
  • the session request message for sending the identification bit and the source port number and the destination port number of the IPsec data packet to be tested is taken as an example, and the format of the session request message sent is as shown in FIG. 5, where 51 is an added service.
  • the content of the added service flow mainly includes: Enable indicates the above identification bit, and is used to indicate that the content of the session request is an identification bit for negotiating and detecting the performance of the specific service flow to be tested; Traffic Sender Port/ Traffic Receiver Port indicates the specific service to be tested.
  • the source/destination port number of the stream packet; Traffic Sender Address/Traffic Receiver Address indicates the address of the sending/receiving end of the specific traffic stream packet to be tested.
  • S302 The receiving terminal receives the session request message.
  • the receiving terminal acquires information including the number of IPsec data packets, the sending time interval, and the like from the receiving session request message.
  • the method further includes:
  • S3021 Detecting whether there is an identification bit in the session request message.
  • the receiving terminal performs error detection according to the source port number and the destination port number of the IPsec packet service in the session request message, and may also identify the IPsec data.
  • One or more identifiers for the package business are known in the art.
  • the IPsec data packet carrying the test information is sent, so that the receiving terminal, according to the received test information, the number of data packets in the session request message, and the sending time interval information, The received IPsec data The package performs error detection.
  • the IPsec data packet carrying the test information may be sent in two cases.
  • the sending terminal sends an IPsec data packet in which the test information of the IPsec data packet and the test information length are placed in the IPsec data packet header.
  • the test information includes at least an IPsec packet sequence number and a timestamp and error estimation information.
  • the header may be a protocol extension header of a WESP (Wrapped Encapsulating Security Payload), and the specific format is as shown in FIG. 6, where 61 is an added header content part.
  • the added header content part mainly includes: Type indicates whether the test information is in the encryption mode; Length indicates the length of the test information; Date indicates the specific content of the test information.
  • the header may also be a newly defined extension header of IP4 and IP6, and the specific format is as shown in FIG. 7.
  • the sender sends the test information of the IPsec packet to the IPsec packet payload, and places the length of the test information in the IPsec packet in the IPsec packet header, where the test information includes the IPsec packet. Serial number and time stamp and error estimate information.
  • the sending terminal may selectively place the test information in the first or last digits of the payload, and describe the specific length of the test information or the data packet in the IPsec data packet in the header, so as to obtain the IPsec data packet after decrypting the IPsec data packet. IPsec packets and their test information.
  • the header may be a protocol extension header of the WESP or an extension header of the newly defined IP4 and IP6.
  • the specific extended header format is the same as in the unencrypted authentication mode. However, when the test information is in the encrypted authentication mode, the Date portion will be blanked, and the description of the figure will not be repeated here.
  • the method before sending the IPsec data packet carrying the test information, the method further includes:
  • S3031 set the test start bit.
  • One of the RSVD bits can be selected as the test enable bit, and if the X bit is 1, the DATA contains standard measurement information, and the calculated value of the integrity protection is added after the DATA data.
  • S304. The receiving terminal receives the IPsec data packet carrying the test information.
  • the method further includes:
  • test start bit Detect a test start bit in a packet header to determine whether error detection is enabled.
  • the IPsec data packet is not subjected to error detection:
  • the test start bit is identified as being activated, the test information acquisition is continued, and error detection is performed according to the test information and the information in the session request message.
  • S305 Decrypt the received IPsec data packet, and obtain test information carried in the IPsec data packet carrying the test information.
  • the receiving terminal After receiving the IPsec data packet, the receiving terminal decrypts the IPsec data packet, and then obtains test information from the data packet, and performs error detection on the received data packet. There are two cases in which the test information can be obtained:
  • the test information is directly located in the header of the data packet, and the header may be a protocol extension header of WESP or a newly defined extension header of IP4 and IP6.
  • the receiving end decrypts the received IPsec packet, it can obtain the test information directly from the data header.
  • the test information includes at least an IPsec packet sequence number and time stamp and error estimation information.
  • the test information is placed in the IPsec packet payload, and the length of the test information is placed in the IPsec packet header.
  • the header may be a protocol extension header of WESP or a newly defined extension header of IP4 and IP6.
  • S306. Perform error detection on the received IPsec data packet according to the received test information and the number of the IPsec data packets and the sending time interval information in the session request message.
  • the receiving end after receiving the test information of the IPsec data packet, the receiving end performs the out-of-order detection of the data packet according to the sequence number and the timestamp of the data packet in the test information, and further, the receiving terminal may further perform the test information according to the test information.
  • the timestamp of the data packet and the IPsec data packet transmission time interval negotiated in the session request message detect the delay and according to the number of received IPsec data packets and the number of negotiated transmissions in the session request message The packet rate is tested.
  • the format of the session request message may be In accordance with the format of the session request message specified by the IPPM protocol.
  • the unencrypted authentication format and the encrypted authentication format of the test information of the data packet may also be consistent with the test information format specified by the IPPM protocol.
  • the embodiment of the present invention provides another network test method under the IPsec mechanism, which firstly sends a session request message to an IPsec data packet to be tested, confirms the number of IPsec data packets sent, the interval of sending, and the like, and then passes the information to Sending the IPsec data packet to add information such as a sequence number, a timestamp, and an error estimate, and detecting the IPsec data packet, and solving the problem that the OAM data packet carrying only the size and number of the data packet is received under the IPsec mechanism cannot be Determine the measurement error caused by the out of order of the data packet. It solves the measurement error caused by packet out-of-order under the IPsec mechanism.
  • the problem of measurement error caused by receiving out-of-order packets in IPsec is solved by negotiating the transmission parameters for the session request of the data packet to be detected and adding the serial number and time stamp and error estimation information to the data packet. Further, in this embodiment, the information of the specific data service to be detected is added to the session request message, and the data flow of different granularities can be further detected. .
  • the embodiment of the present invention further provides an apparatus for network testing under the IPsec mechanism, which is exemplified below.
  • an embodiment of the present invention provides a receiving terminal 800, which includes:
  • the first receiving unit 801 is configured to receive a session request message
  • the second receiving unit 802 is configured to receive an IPsec data packet carrying the test information
  • the detecting unit 803 is configured to receive, according to the second receiving unit, the The test information and the number of data packets in the session request message received by the first unit, and the transmission time interval information, perform error detection on the received IPsec data packet.
  • the second receiving unit 802 is further configured to decrypt the IPsec data packet, and obtain test information carried in the IPsec data packet carrying the test information, where the test information includes the IPsec data packet sequence. Number and time stamp and error estimation information.
  • the detecting unit 803 is further configured to perform IPsec data packets according to the sequence number and timestamp of the data packet in the received test information and the number of the IPsec data packets in the session request message. Out of order detection; and / or And detecting a delay according to the timestamp of the IPsec data packet in the test information and the IPsec data packet transmission time interval in the session request message, and according to the received number and the number of the IPsec data packets.
  • the number of IPsec packets in the session request message detects the packet loss rate.
  • an embodiment of the present invention provides a transmitting terminal 900, which includes:
  • the first transmitting unit 901 and the second transmitting unit 902. The first sending unit 901 is configured to send a session request message, and the second sending unit 902 is configured to send an IPsec data packet carrying the test information.
  • the first sending unit 901 is further configured to send the session request message that carries the IPsec packet identification bit, the source port number, and the destination port number.
  • the first sending unit 901 may also add the identification bit and one or more identifier groups capable of identifying the IPsec packet service, so that the receiving terminal receives the received according to the source port number and the destination port number in the session request message. IPsec packets are used for error detection.
  • the second sending unit 902 is further configured to send the IPsec data packet carrying the test information and the test information length value in the IPsec data packet header, where The test information includes the IPsec packet sequence number and time stamp and error estimation information.
  • the foregoing second sending unit 902 is further configured to send the test information by placing the test information in the IPsec data packet payload, and placing the length value of the test information in the IPsec data packet header.
  • IPsec data packet wherein the test information includes the IPsec data packet sequence number and timestamp and error estimation information.
  • the first sending unit 901 in the sending terminal 900 is further configured to send a source port number, a destination port number or an identification bit carrying the identification bit and the IPsec data packet, and a service capable of identifying the IPsec data packet.
  • the session request message of the one or more identifier groups so that the receiving end performs error detection on the received IPsec data packet according to the IPsec data packet source port number and the destination port number in the session request message.
  • the sending terminal and the receiving terminal may be a router or a base station.
  • the embodiment of the present invention provides another network testing apparatus under the IPsec mechanism, which first confirms IPsec by sending a session request message to an IPsec data packet that needs to be tested.
  • the number of data packets sent, the interval of transmission, and the like, and the IPsec data packet is detected by adding information such as a sequence number, a timestamp, and an error estimate to the IPsec data packet, and the received IPsec mechanism is received. Only OAM packets with packet size and number are carried, and the measurement error caused by packet out-of-order can not be determined. Further, in this embodiment, the information of the specific data service to be detected is added to the session request message, and the data flow of different granularity is further detected.
  • the embodiment of the present invention provides another network test device under the IPsec mechanism, which performs negotiation of a transmission parameter by using a session request for a data packet to be detected, and adds a sequence number, a timestamp, and an error estimate to the data packet.
  • the problem of the measurement error caused by the IPsec receiving the out-of-order data packet is solved.
  • the information of the specific data service to be detected is added to the session request message sent by the sending terminal, and further Detect data streams of different granularities.
  • the embodiment of the present invention further provides a network detection system for the IPsec mechanism.
  • the embodiment includes: a transmitting terminal 1001, and a receiving terminal 1002.
  • the sending terminal 1001 is configured to send a session request message, and send an IPsec data packet carrying the test information.
  • the receiving terminal 1002 is configured to receive the session request message, and receive the IPsec data packet carrying the test information, and receive the terminal.
  • the 502 is further configured to perform error detection on the received IPsec data packet according to the received test information and the number of data packets in the session request message and the sending time interval information.
  • the receiving terminal After the receiving terminal receives the session request message sent by the sending terminal, the receiving terminal establishes a session with the sending terminal, and the session request message includes the specific content of the session negotiation. After the session is established, the receiving terminal receives the sending terminal. According to the time negotiated in the session request, the path sends an IPsec data packet, and after receiving the IPsec data packet carrying the test information, the receiving terminal processes the IPsec data packet to obtain test information, according to the received test information and the session. The number of data packets in the request message, the sending time interval information, and the error detection of the received IPsec data packet.
  • the embodiment of the present invention provides a network testing system under the IPsec mechanism, by using IPsec data to be tested.
  • the packet first sends a session request message, confirms the number of IPsec packets sent, the interval of transmission, and the like, and then adds the serial number, timestamp, and error estimate to the IPsec packet to send the IPsec packet. Detected, solved the problem of receiving only under the IPsec mechanism With a packet size and number of OAM packets cannot determine the measurement error caused by packet out-of-order.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Environmental & Geological Engineering (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Maintenance And Management Of Digital Transmission (AREA)

Abstract

本发明实施例提供一种在IPsec机制下的网络测试方法,装置及***,涉及无线通信领域,用以解决在IPsec机制下业务数据包接收乱序而导致网络测试产生的误差。其中,一种IPsec机制下的网络测试方法,包括:接收会话请求消息;所述会话请求信息中包括IPsec数据包的数量、发送时间间隔信息;在发送端建立会话后,接收携带测试信息的IPsec数据包;根据接收到的所述测试信息及会话请求消息中的数据包的数量、发送时间间隔信息,对接收的所述IPsec数据包进行误差检测。本发明实施例用于无线通信。

Description

一种在 IPsec机制下的网络测试方法, 装置及***
本申请要求于 2011 年 10 月 28 日提交中国专利局、 申请号为 201110334722.7、 发明名称为"一种在 IPsec机制下的网络测试方法, 装置 及***"的中国专利申请的优先权, 其全部内容通过引用结合在本申请中。 技术领域 本发明涉及无线通信领域,尤其涉及一种在 IPsec机制下的网络 测试方法, 装置及***。
背景技术 运营商在完成网络的规划部署后,往往会比较看重后续网络维护 以及故障定位的方法, 具体如链路故障定位、 丟包率、 时延、 误差等 参数指标。 对于 IP层上釆用的测试方法, IETF ( Internet Engineering Task Force , 英特网工程任务组) 标准专门定义了 IPPM ( IP Performance Metrics , IP性能度量值, IP性能指标)的工作组。 IPPM 是 IETF定义的一组协议规范, 一方面定义了性能指标的具体项目以 及这些性能项目的定义, 另一方面定义了测量这些指标的方法。
3GPP ( The 3rd Generation Partnership Project, 第 3代合作计划 ) 标准定义了在 LTE ( Long Term Evolution,长期演进 ) 网络中的 MME ( Mobility Management Entity ) 与 eNB ( enhanced NodeB , 增强节点 B )之间的链路使用 IPsec ( IP security, IP安全) 安全隧道来保护传 输数据流的安全,它提供了数据的完整性、机密性、重放等安全保护。 一般为了保证运营商核心网的安全,在网络会在核心网的入口点部署 安全网关。 因此, eNB与 MME之间的安全隧道 IPsec也可以终结在 安全网关。 所以, 如果在 IP层上考虑安全的检测方法, 需要处理安 全加密后的维测, 因为釆用了 IPsec的保护后, 基站与安全网关之间 的交互数据流都要通过加密报文的形式进行传送,使得针对特定业务 数据流的测量比较困难。
对于使用 IPsec 安全隧道来保护传输数据流的维测方法是釆用了 某些 OAM ( Operation Administration and Maintenance , 操作管理维护 ) 包而进行的检测的方法, 由于这种 ΟΑΜ 数据包中仅包含了业务数据 流的数量、 大小等信息, 无法界定该 ΟΑΜ数据包是否是乱序的, 因 此很可能会出现由于 IPsec接收端接收到乱序的 OAM数据包而导致的 测量误差。
发明内容 本发明的实施例提供在 IPsec机制下的网络测试方法, 装置及系 统, 解决现有的技术中 IPsec机制下业务数据包接收乱序而导致网络 测试产生的误差。
为达到上述目的, 本发明的实施例釆用如下技术方案:
一方面, 一种 IPsec机制下的网络测试方法, 包括:
接收会话请求消息; 所述会话请求信息中包括 IPsec数据包的数 量和发送时间间隔信息;
在发送端建立会话后, 接收携带测试信息的所述 IPsec数据包; 根据接收到的所述测试信息及所述会话请求消息中的所述 IPsec 数据包的数量和发送时间间隔信息, 对接收的所述 IPsec数据包进行 误差检测。
一方面, 另一种 IPsec机制下的网络测试方法, 包括:
发送会话请求消息; 所述会话请求信息中包括数据包的数量、发 送时间间隔信息;
在与接收端建立会话后, 发送携带测试信息的 IPsec数据包, 以 使得接收端根据接收到的所述携带测试信息的 IPsec数据包中的测试 信息及所述会话请求消息中的所述 IPsec数据包的数量、 发送时间间 隔信息, 对接收的所述 IPsec数据包进行误差检测。
一方面, 本发明实施例提供一种接收终端, 包括:
第一接收单元, 用于接收会话请求消息; 所述会话请求信息中包 括 IPsec数据包的数量和发送时间间隔信息;
第二接收单元, 用于接收携带测试信息的所述 IPsec数据包; 检测单元,所述检测单元与所述第一接收单元和所述第二接收单 元相连接,用于根据所述第二接收单元接收到的所述测试信息及所述 第一单元接收到的所述会话请求消息中的所述 IPsec数据包的数量、 发送时间间隔信息, 对接收的所述 IPsec数据包进行误差检测。
另一方面, 本发明实施例还提供一种发送终端, 包括:
第一发送单元, 用于发送会话请求消息;
第二发送单元, 用于发送携带测试信息的 IPsec数据包
再一方面, 本发明实施例提供一种在 IPsec机制下的网络测试系 统, 包括:
发送终端,用于发送会话请求消息,并发送携带测试信息的 IPsec 数据包;
接收终端, 用于接收所述会话请求消息, 并接收所述携带测试信 息的 IPsec数据包;
所述接收终端还用于根据接收到的所述测试信息及会话请求消 息中的数据包的数量、 发送时间间隔信息, 对接收的所述 IPsec数据 包进行误差检测。
本发明实施例提供了一种在 IPsec机制下的网络测试方法, 通过对需要 要测试的 IPsec数据包先进行会话请求消息发送, 确认 IPsec数据包的发 送数量, 发送间隔等信息, 再通过向发送所述 IPsec数据包中添加序列 号和时间戳和误差估计等信息, 对所述 IPsec数据包进行检测, 解决了 在 IPsec机制下接收到只携带有数据包大小和数量的 OAM数据包而无 法判定数据包乱序所导致的测量误差问题。 附图说明 为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对 实施例或现有技术描述中所需要使用的附图作简单地介绍, 显而易见地, 下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员 来讲, 在不付出创造性劳动的前提下, 还可以根据这些附图获得其他的附 图。
图 1为本发明实施例中提供的方法流程图;
图 2为本发明实施例中提供的另一种方法流程图;
图 3为本发明实施例中提供的另一种方法流程图;
图 4为本发明实施例中提供的会话请求消息的格式图;
图 5为本发明实施例中提供的会话请求消息的另一种格式图; 图 6为本发明实施例中提供的数据包报头的一种格式图; 图 7为本发明实施例中提供的数据包报头的另一种格式图; 图 8为本发明实施例中提供的一种接收终端结构示意图; 图 9为本发明实施例中提供的一种发送终端结构示意图; 图 10为本发明实施例中提供的一种网络检测***结构示意图。
具体实施方式 下面将结合本发明实施例中的附图,对本发明实施例中的技术方 案进行清楚、 完整地描述, 显然, 所描述的实施例仅仅是本发明一部 分实施例, 而不是全部的实施例。 基于本发明中的实施例, 本领域普 通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例, 都属于本发明保护的范围。
本发明实施例提供的在 IPsec ( IP security, IP安全)机制下的网 络测试方法, 涉及接收终端一侧, 如图 1所示, 包括以下步骤:
5101、 接收会话请求消息。
在本发明实施例中该会话请求消息包括 IPsec数据包的数量、 发 送时间间隔信息。
5102、 在发送终端建立会话后, 接收携带测试信息的所述 IPsec 数据包。 具体的, 在与发送终端建立会话后, 发送终端将开始准备发送数 据包, 该数据包中携带有测试信息, 接收终端则从数据包中获取测试 信息, 对接收的数据包进行误差检测。
S103、 根据接收到的所述测试信息及所述会话请求消息中的所 述 IPsec数据包的数量和发送时间间隔信息, 对接收的所述 IPsec数 据包进行误差检测。
具体的,在本发明实施例中所述 IPsec数据包中携带有测试信息, 所述测试信息有该数据包的序列号和时间戳和误差估计等,当接收端 获取到 IPsec数据包中的测试信息后, 根据所述测试信息中的数据包 的序列号及时间戳所标注的发送时间 ,对接收到 IPsec数据进行排序 , 再通过前期会话请求消息中所发送的 IPsec数据包的数量, 测试所发 送的 IPsec数据包是否乱序, 此外, IPsec接收终端还可以根据所述 测试信息中的所述数据包的时间戳所标注的发送时间及会话请求消 息中所协商的所述 IPsec数据包发送时间间隔以及首发时间对延时进 行检测和根据所接收到的 IPsec 数据包的数量及会话请求消息中 IPsec数据包所协商发送数量对丟包率进行检测。
本发明实施例提供了一种在 IPsec机制下的网络测试方法, 通过 接收终端接收发送终端的会话请求消息, 首先确定了要发送的 IPsec 数据包的数量和发送间隔等信息, 再通过获取所发送的 IPsec数据包 中携带的序列号和时间戳和误差估计等信息, 对接受到 IPsec数据包 进行检测,解决了在没有发送会话请求消息进行发送的数据包的信息 交流的情况下, 直接发送只携带有数据包大小和数量的 OAM数据包 而无法判定数据包乱序等所导致的测量误差问题。
本发明实施例还提供了一种 IPsec机制下的网络测试方法, 涉及 发送终端一侧, 包括以下步骤:
5201、 发送会话请求消息。
所述会话请求消息包括 IPsec数据包的数量、发送时间间隔信息。
5202、 在与接收终端建立会话后, 发送携带测试信息的 IPsec数 据包,以使得接收终端根据接收到的所述测试信息及所述会话请求消 息中的所述 IPsec数据包的数量、 发送时间间隔信息, 对接收的所述 IPsec数据包进行误差检测。 具体的,在与接收终端建立会话后,发送终端发送 IPsec数据包, 并添加测试信息于该数据包中, 该测试信息包括所发送的 IPsec数据 包序列号和时间戳和误差估计等信息,以使得接收终端根据接收 'J的 所述测试信息及会话请求消息中的数据包的数量、 发送时间间隔信 息, 对接收的所述 IPsec数据包进行误差检测。
本发明实施例提供了一种在 IPsec机制下的网络测试方法, 通过 在 IPsec数据包发送终端向接受终端先发送会话请求消息, 首先确定 了要发送的 IPsec数据包的数量和发送间隔等信息, 再通过发送携带 序列号和时间戳和误差估计等信息 IPsec数据包,使接收终端对 IPsec 数据包进行检测,解决了在没有发送会话请求消息进行发送的数据包 的信息交流的情况下, 直接发送只携带有数据包大小和数量的 OAM 数据包而无法判定数据包乱序等所导致的测量误差问题。
本发明的另一种实施例提供的在 IPsec IP安全 (IP security, IP 安全) 机制下的网络测试方法, 如图 3所示, 包括以下步骤:
S301、 发送终端发送会话请求消息。
在本发明实施例中该会话请求消息包括 IPsec数据包的数量、 发 送时间间隔信息。优选的, 还可以包括发送及接收数据包的用户数据 包协议 UDP ( User Datagram Protocol , 用户数据包协议)端口, IPsec 数据包发送开始时间等信息。
优选的, 在本发明实施例中可以发送会话请求消息, 还包括: S3011、添加待测业务流信息的会话请求消息。具体方案有两种: 方案一, 直接增设待测业务流信息, 所述增设待测业务流信息可 以是待测业务流的 IPsec数据包的源地址、 目的地址、 源端口号、 目 的端口号, DSCP值, 也可以是其他能够标识业务数据流信息的一个 或多个标识组。
具体的,以增设待测业务流的 IPsec数据包的源地址、 目的地址、 源端口号、 目的端口号, DSCP值为例, 发送的会话请求消息格式如 图 4所示, 其中, 41 是增设的业务流内容部分。 增设的业务流内容 部分主要包括: Traffic Sender Port/ Traffic Receiver Port表示具体待 测业务流数据包的源 /目端口号; Traffic Sender Address/ Traffic Receiver Address表示具体待测业务流数据包的发送 /接收端地址。 需要说明的是由于测试釆用专用的 861端口,一般在端对端的场 景下,测试包的发送端和接收终端往往与所需要测量业务数据包发送 端与接收端地址相同。因此,地址信息可以省去。 DSCP( Differentiated Services Code Point, 差分 Λ良务代码点 ) 值可以通过 1个或 2个字节 定义。 此外, 增加内容所在的位置可以但不限如图 4所示, 也可以在 Sender Port/ Receiver Port发送 /接收测试数据包的 UDP端口号发送端 口 ( Sender Port/ Receiver Port ) 后。
方案二, 增设识别位和待测 IPsec数据包的源端口号、 目的端口 号等信息的会话请求消息或增设识别位和能够标识 IPsec数据包业务 的一个或多个标识组的会话请求消息,以使得接收终端根据会话请求 消息中的源端口号、 目的端口号对接收到的 IPsec数据包进行误差检 测。
具体的, 以发送增设识别位和待测 IPsec数据包的源端口号、 目 的端口号等信息的会话请求消息为例,发送的会话请求消息格式如图 5所示, 其中, 51是增设的业务流内容部分。 增设的业务流内容部分 主要包括: Enable表示上述识别位, 用于说明会话请求的内容是对具 体待测业务流的性能进行协商检测的识别位; Traffic Sender Port/ Traffic Receiver Port 表示具体待测业务流数据包的源 /目端口号; Traffic Sender Address/ Traffic Receiver Address表示具体待测业务流 数据包的发送 /接收端地址。
5302、 接收终端接收所述会话请求消息。
具体的, 接收终端从接收会话请求消息中, 获取包括 IPsec数据 包的数量、 发送时间间隔等信息。
优选的, 接收会话请求消息后, 还包括:
S3021、检测会话请求消息中是否存在识别位, 当存在识别位时, 接收终端根据会话请求消息中所述 IPsec数据包业务的源端口号、 目 的端口号进行误差检测, 也可以是能够标识 IPsec数据包业务的一个 或多个标识。
5303、 在与接收终端建立会话后, 发送携带测试信息的 IPsec数 据包,以使得接收终端根据接收到的所述测试信息及所述会话请求消 息中的数据包的数量、 发送时间间隔信息, 对接收的所述 IPsec数据 包进行误差检测。
具体的, 发送携带测试信息的 IPsec数据包可以有两种情况: 第一种情况, 发送终端发送将 IPsec数据包的测试信息及所述测 试信息长度放置于 IPsec数据包报头中的 IPsec数据包; 其中, 所述 测试信息至少包括 IPsec数据包序列号和时间戳和误差估计信息。
可选的,所述才艮头可以为 WESP ( Wrapped Encapsulating Security Payload, 有包装的封装安全有效载荷) 的协议扩展头, 具体的格式 如图 6所示, 其中, 61是增设的报头内容部分。 增设的报头内容部 分主要包括: Type表示测试信息是否为加密模式; Length表示测试 信息的长度; Date表示测试信息的具体内容。
可选的, 所述 头也可以是新定义的 IP4和 IP6的扩展头, 具体 的格式如图 7所示, 设置 Option Type=n中 n的值, 表示测试信息的 否为加密模式; Payload length表示测试信息的长度; Date表示检测 信息的具体内容, 当测试信息为加密认证模式时, 置空 Date部分。
第二种情况,发送端发送将 IPsec数据包的测试信息放置于 IPsec 数据包载荷中,将测试信息的长度放置于 IPsec数据包报头中的 IPsec 数据包, 其中, 所述测试信息包括 IPsec数据包序列号和时间戳和误 差估计信息。
具体的,发送终端可以选择性的将测试信息放置在载荷的前几位 或后几位, 通过报头中说明 IPsec数据包中测试信息或数据包的具体 长度,从而在对 IPsec数据包解密后得到 IPsec数据包及其测试信息。
可选的, 所述报头可以为 WESP 的协议扩展头也可以是新定义 的 IP4和 IP6的扩展头。
具体的扩展头格式与未加密认证模式时一样, 只是, 当测试信息 为加密认证模式时, 将置空 Date部分, 此处将不再附图说明。
优选的, 本发明实施例中在发送携带测试信息的 IPsec数据包前 还包括:
S3031、 设置测试启动位。 可以选择 RSVD其中的一位作为测试 启动位, 同时如果 X位为 1 , 则 DATA中包含标准的测量信息, 并 且在 DATA数据的后面要添加完整性保护的计算值。 此外也可以通 过 IP头中空闲位, 如 TOS/DSCP的空闲位作为测试启动的标识。 S304、 接收终端接收携带测试信息的所述 IPsec数据包。
优选的, 在接收携带测试信息的 IPsec数据包后, 还包括:
S3041、 检测数据包报头中的测试启动位, 确定是否启动了误差 检测。 当测试启动位标识为未启动时, 则该 IPsec数据包不进行误差 检测: 当测试启动位标识为启动时, 则继续进行测试信息的获取根据 测试信息及会话请求消息中的信息进行误差检测。
S305、 对接收到的所述 IPsec数据包进行解密, 获取携带测试信 息的所述 IPsec数据包中所携带的的测试信息
接收终端接收到 IPsec数据包后, 对 IPsec数据包进行解密, 然 后, 从该数据包中获取测试信息, 对接收的数据包进行误差检测。 所 述测试信息的获取可以有两种情况:
第一种情况, 测试信息直接位于数据包的报头中, 所述报头可以 为 WESP的协议扩展头也可以是新定义的 IP4和 IP6的扩展头。 当接 收端解密接收到 IPsec数据包时后, 可以直接从数据报头中获取测试 信息。 测试信息至少包括 IPsec数据包序列号和时间戳和误差估计信 息。
第二种情况, 测试信息放置于 IPsec数据包载荷中, 测试信息的 长度放置于 IPsec数据包报头中, 所述报头可以为 WESP的协议扩展 头也可以是新定义的 IP4和 IP6的扩展头。当接收端解密接收到 IPsec 数据包时后,根据报头中的测试信息或数据包具体长度 ,获取在 IPsec 数据包载荷中位于前几位或后几位中的测试信息。
S306、 根据接收到的所述测试信息及所述会话请求消息中的所 述 IPsec数据包的数量和发送时间间隔信息, 对接收的所述 IPsec数 据包进行误差检测。
具体的, 当接收端获取到 IPsec数据包的测试信息后, 根据所述 测试信息中的数据包的序列号及时间戳进行数据包的乱序检测, 此 外,接收终端还可以根据所述测试信息中的所述数据包的时间戳及会 话请求消息中所协商的 IPsec数据包发送时间间隔对延时进行检测和 根据所接收到的 IPsec数据包的数量及会话请求消息中所协商发送数 量对丟包率进行检测。
需要说明的是在本发明实施例中,所述的会话请求消息的格式可 以与 IPPM协议所规定的会话请求消息格式一致。 所述数据包的测试 信息的未加密认证格式及加密认证格式也可以与 IPPM协议所规定的 测试信息格式一致。
本发明实施例提供了另一种在 IPsec机制下的网络测试方法, 通 过对需要要测试的 IPsec数据包先进行会话请求消息发送,确认 IPsec 数据包的发送数量, 发送间隔等信息, 再通过向发送所述 IPsec数据 包中添加序列号和时间戳和误差估计等信息, 对所述 IPsec数据包进 行检测, 解决了在 IPsec机制下接收到只携带有数据包大小和数量的 OAM数据包而无法判定数据包乱序所导致的测量误差问题。 解决了 在 IPsec机制下数据包乱序导致的测量误差问题。 通过对需要要检测 的数据包进行会话请求进行发送参数的协商和在数据包中添加序列 号和时间戳和误差估计等信息, 解决了在 IPsec接收到乱序的数据包 而导致的测量误差问题, 进一步的, 本实施例还在会话请求消息中, 添加了需要检测的具体数据业务的信息,进一步的实现了可以对不同 粒度的数据流进行检测。 。
本发明实施例还提供了用于在 IPsec机制下的网络测试的装置, 以下做举例说明。
如图 8所示, 本发明的一个实施例提供了一种接收终端 800 , 包 括:
第一接收单元 801 , 第二接收单元 802 , 检测单元 803。 其中, 第一接收单元 801 , 用于接收会话请求消息; 第二接收单元 802 , 用 于接收携带测试信息的 IPsec数据包; 检测单元 803 , 用于根据所述 第二接收单元接收到的所述测试信息及所述第一单元接收到的会话 请求消息中的数据包的数量、发送时间间隔信息,对接收的所述 IPsec 数据包进行误差检测。
可选的, 第二接收单元 802元还用于对所述 IPsec数据包进行解 密, 获取携带测试信息的所述 IPsec数据包中所携带的测试信息, 所 述测试信息包括所述 IPsec数据包序列号和时间戳和误差估计信息。
可选的,检测单元 803还用于根据接收到的所述测试信息中的所 述数据包的序列号和时间戳及所述会话请求消息中的所述 IPsec数据 包的数量进行 IPsec数据包的乱序检测; 和 /或 根据所述测试信息中的所述 IPsec数据包的时间戳及所述会话请 求消息中所述 IPsec数据包发送时间间隔对延时进行检测和根据所接 收到的所述 IPsec数据包的数量及所述会话请求消息中所述 IPsec数 据包数量对丟包率进行检测。
如图 9所示, 本发明的一个实施例提供了一种发送终端 900 , 包 括:
第一发送单元 901 ,第二发送单元 902。其中,第一发送单元 901 , 用于发送会话请求消息; 第二发送单元 902 , 用于发送携带测试信息 的 IPsec数据包。
可选的, 第一发送单元 901还可以用于发送携带有所述 IPsec数 据包识别位及源端口号、 目的端口号的所述会话请求消息。
可选的, 第一发送单元 901也可以添加识别位和能够标识 IPsec 数据包业务的一个或多个标识组,以使得接收终端根据会话请求消息 中的源端口号、 目的端口号对接收到的 IPsec数据包进行误差检测。
可选的,第二发送单元 902还可以用于发送将所述测试信息及所 述测试信息长度值放置于所述 IPsec数据包报头中的所述携带测试信 息的 IPsec数据包; 其中, 所述测试信息包括所述 IPsec数据包序列 号和时间戳和误差估计信息。
另外,上述第二发送单元 902还用于发送将所述测试信息放置于 所述 IPsec数据包载荷中,将所述测试信息的长度值放置于所述 IPsec 数据包报头中的所述携带测试信息的 IPsec数据包; 其中, 所述测试 信息包括所述 IPsec数据包序列号和时间戳和误差估计信息。
优选的,该发送终端 900中的第一发送单元 901还可以用于发送 携带有识别位和所述 IPsec数据包的源端口号、 目的端口号或识别位 和能够标识所述 IPsec数据包业务的一个或多个标识组的所述会话请 求消息, 以使得接收端根据所述会话请求消息中的所述 IPsec数据包 源端口号、 目的端口号对接收到的 IPsec数据包进行误差检测。
在本发明实施例中,所述的发送终端和接收终端,可以是路由器, 也可以是基站。
本发明实施例提供了另一种在 IPsec机制下的网络测试装置, 通 过对需要要测试的 IPsec数据包先进行会话请求消息发送,确认 IPsec 数据包的发送数量, 发送间隔等信息, 再通过向发送所述 IPsec数据 包中添加序列号和时间戳和误差估计等信息, 对所述 IPsec数据包进 行检测, 解决了在 IPsec机制下接收到只携带有数据包大小和数量的 OAM数据包而无法判定数据包乱序所导致的测量误差问题。 进一步 的, 本实施例还在会话请求消息中, 添加了需要检测的具体数据业务 的信息, 进一步实现了对不同粒度的数据流进行检测。
本发明实施例提供了另一种在 IPsec机制下的网络测试设备, 通 过对需要要检测的数据包进行会话请求进行发送参数的协商和在数 据包中添加序列号和时间戳和误差估计等信息, 解决了在 IPsec接收 到乱序的数据包而导致的测量误差问题, 进一步的, 本实施例还在发 送终端发送的会话请求消息中,添加了需要检测的具体数据业务的信 息, 进一步的可以对不同粒度的数据流进行检测。
本发明实施例还提供了用于在 IPsec机制下的网络检测***, 如 图 10所示, 包括: 发送终端 1001 , 接收终端 1002。 其中, 发送终端 1001 ,用于发送会话请求消息,并发送携带测试信息的 IPsec数据包; 接收终端 1002 , 用于接收所述会话请求消息, 并接收所述携带测试 信息的 IPsec数据包, 接收终端 502还用于根据接收到的所述测试信 息及会话请求消息中的数据包的数量、发送时间间隔信息, 对接收的 所述 IPsec数据包进行误差检测。
在 IPsec机制下, 接收终端接收到发送终端发送的会话请求消 息后, 接收终端与发送终端建立会话, 在会话请求消息中, 包含有会 话协商的具体内容, 建立会话后,接收终端接收到发送终端根据会话 请求中所协商的时间, 路径发送 IPsec数据包, 接收终端在接收到携 带测试信息的 IPsec数据包后, 对该 IPsec数据包进行处理, 获取测 试信息, 根据接收到的该测试信息及会话请求消息中的数据包的数 量、 发送时间间隔信息, 对接收的所述 IPsec数据包进行误差检测 本发明实施例提供了一种在 IPsec机制下的网络测试***, 通过 对需要要测试的 IPsec数据包先进行会话请求消息发送, 确认 IPsec 数据包的发送数量, 发送间隔等信息, 再通过向发送所述 IPsec数据 包中添加序列号和时间戳和误差估计等信息, 对所述 IPsec数据包进 行检测, 解决了在 IPsec机制下接收到只携带有数据包大小和数量的 OAM数据包而无法判定数据包乱序所导致的测量误差问题。
以上所述, 仅为本发明的具体实施方式, 但本发明的保护范围并 不局限于此, 任何熟悉本技术领域的技术人员在本发明揭露的技术范 围内, 可轻易想到变化或替换, 都应涵盖在本发明的保护范围之内。 因此, 本发明的保护范围应以所述权利要求的保护范围为准。

Claims

权利要求
1、 一种在 IPsec机制下的网络测试方法, 其特征在于, 包括: 接收会话请求消息; 所述会话请求信息中包括 IPsec数据包的数 量和发送时间间隔信息;
在发送端建立会话后, 接收携带测试信息的所述 IPsec数据包; 根据接收到的所述测试信息及所述会话请求消息中的所述 IPsec 数据包的数量和发送时间间隔信息, 对接收的所述 IPsec数据包进行 误差检测。
2、 根据权利要求 1所述方法, 其特征在于, 接收携带测试信息 的所述 IPsec数据包后, 还包括:
对所述 IPsec数据包进行解密, 获取所述 IPsec数据包中所携带 的测试信息, 所述测试信息包括所述 IPsec数据包序列号和时间戳和 误差估计信息。
3、 根据权利要求 1或 2所述方法, 其特征在于, 所述根据接收 到的所述测试信息及所述会话请求消息中的所述 IPsec 数据包的数 量、 发送时间间隔信息, 对接收的数据包进行误差检测包括:
根据接收到的所述测试信息中的所述数据包的序列号和时间戳 及所述会话请求消息中的所述 IPsec数据包的数量进行 IPsec数据包 的乱序检测; 和 /或
根据所述测试信息中的所述 IPsec数据包的时间戳及所述会话请 求消息中所述 IPsec数据包发送时间间隔对延时进行检测和根据所接 收到的所述 IPsec数据包的数量及所述会话请求消息中所述 IPsec数 据包数量对丟包率进行检测。
4、 一种在 IPsec机制下的网络测试方法, 其特征在于, 包括: 发送会话请求消息; 所述会话请求信息中包括 IPsec数据包的数 量、 发送时间间隔信息;
在与接收端建立会话后, 发送携带测试信息的 IPsec数据包, 以 使得接收端根据接收到的所述携带测试信息的 IPsec数据包中的测试 信息及所述会话请求消息中的所述 IPsec数据包的数量、 发送时间间 隔信息, 对接收的所述 IPsec数据包进行误差检测。
5、 根据权利要求 4所述方法, 其特征在于, 所述会话请求消息 还携带有所述 IPsec数据包识别位及源端口号、 目的端口号。
6、 根据权利要求 4所述方法, 其特征在于, 所述发送携带测试 信息的 IPsec数据包包括:
发送将所述测试信息及所述测试信息长度值放置于所述 IPsec数 据包报头中的所述携带测试信息的 IPsec数据包; 其中, 所述测试信 息包括所述 IPsec数据包序列号和时间戳和误差估计信息。
7、 根据权利要求 4所述方法, 其特征在于, 发送携带测试信息 的 IPsec数据包包括:
发送将所述测试信息放置于所述 IPsec数据包载荷中, 将所述测 试信息的长度值放置于所述 IPsec数据包报头中的所述携带测试信息 的 IPsec数据包; 其中, 所述测试信息包括所述 IPsec数据包序列号 和时间戳和误差估计信息。
8、 根据权利要求 5所述方法, 其特征在于, 所述会话请求消息 还携带有 识别位和所述 IPsec数据包的源端口号、 目的端口号或识 别位和能够标识所述 IPsec数据包业务的一个或多个标识组, 以使得 接收端根据所述会话请求消息中的所述 IPsec数据包源端口号、 目的 端口号对接收到的 IPsec数据包进行误差检测。
9、 一种接收终端, 其特征在于, 包括:
第一接收单元, 用于接收会话请求消息; 所述会话请求信息中包 括 IPsec数据包的数量和发送时间间隔信息;
第二接收单元, 用于接收携带测试信息的所述 IPsec数据包; 检测单元,所述检测单元与所述第一接收单元和所述第二接收单 元相连接,用于根据所述第二接收单元接收到的所述测试信息及所述 第一单元接收到的所述会话请求消息中的所述 IPsec数据包的数量、 发送时间间隔信息, 对接收的所述 IPsec数据包进行误差检测。
10、 根据权利要求 9所述的接收终端, 其特征在于, 所述第二接 收单元还用于对所述 IPsec数据包进行解密, 获取携带测试信息的所 述 IPsec数据包中所携带的测试信息, 所述测试信息包括所述 IPsec 数据包序列号和时间戳和误差估计信息。
11、 根据权利要求 9所述的接收终端, 其特征在于, 所述检测单 元具体的用于根据接收到的所述测试信息中的所述数据包的序列号 和时间戳及所述会话请求消息中的所述 IPsec 数据包的数量进行 IPsec数据包的乱序检测; 和 /或
根据所述测试信息中的所述 IPsec数据包的时间戳及所述会话请 求消息中所述 IPsec数据包发送时间间隔对延时进行检测和根据所接 收到的所述 IPsec数据包的数量及所述会话请求消息中所述 IPsec数 据包数量对丟包率进行检测。
12、 一种发送终端, 其特征在于, 包括:
第一发送单元, 用于发送会话请求消息; 所述会话请求信息中包 括 IPsec数据包的数量、 发送时间间隔信息;
第二发送单元, 用于在与接收端建立会话后, 发送携带测试信息 的 IPsec 数据包, 以使得接收端根据接收到的所述携带测试信息的 IPsec数据包中的测试信息及所述会话请求消息中的所述 IPsec数据 包的数量、 发送时间间隔信息, 对接收的所述 IPsec数据包进行误差 检测。
13、 根据权利要求 11所述的发送终端, 其特征在于, 所述第一 发送单元还用于发送携带有所述 IPsec数据包识别位及源端口号、 目 的端口号的所述会话请求消息。
14、 根据权利要求 11所述的发送终端, 其特征在于, 所述第二 发送单元具体用于发送将所述测试信息及所述测试信息长度值放置 于所述 IPsec数据包报头中的所述携带测试信息的 IPsec数据包; 其 中, 所述测试信息包括所述 IPsec数据包序列号和时间戳和误差估计 信息。
15、 根据权利要求 11所述的发送终端, 其特征在于, 所述第二 发送单元具体用于发送将所述测试信息放置于所述 IPsec数据包载荷 中, 将所述测试信息的长度值放置于所述 IPsec数据包报头中的所述 携带测试信息的 IPsec数据包; 其中, 所述测试信息包括所述 IPsec 数据包序列号和时间戳和误差估计信息。
16、 根据权利要求 11所述的发送终端, 其特征在于, 所述第一 发送单元还用于发送携带有识别位和所述 IPsec数据包的源端口号、 目的端口号或识别位和能够标识所述 IPsec数据包业务的一个或多个 标识组的所述会话请求消息,以使得接收端根据所述会话请求消息中 的所述 IPsec数据包源端口号、 目的端口号对接收到的 IPsec数据包 进行误差检测。
17、 一种在 IPsec机制下的网络测试***, 其特征在于, 包括: 发送终端,用于发送会话请求消息,并发送携带测试信息的 IPsec 数据包;
接收终端, 用于接收所述会话请求消息, 并接收所述携带测试信 息的 IPsec数据包;
所述接收终端还用于根据接收到的所述 'J试信息及会话请求:' % , 中的数据包的数量、发送时间间隔信息,对接收的所述 IPsec数据包进 行误差检测。
PCT/CN2012/083652 2011-10-28 2012-10-29 一种在IPsec机制下的网络测试方法,装置及*** WO2013060298A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
RU2014121393/08A RU2580454C2 (ru) 2011-10-28 2012-10-29 Способ, устройство и система для тестирования сети при работе механизма ipsec
US14/259,973 US20140237327A1 (en) 2011-10-28 2014-04-23 Method, apparatus and system for testing network under ipsec mechanism

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201110334722.7 2011-10-28
CN2011103347227A CN103095511A (zh) 2011-10-28 2011-10-28 一种在IPsec机制下的网络测试方法,装置及***

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US14/259,973 Continuation US20140237327A1 (en) 2011-10-28 2014-04-23 Method, apparatus and system for testing network under ipsec mechanism

Publications (1)

Publication Number Publication Date
WO2013060298A1 true WO2013060298A1 (zh) 2013-05-02

Family

ID=48167131

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2012/083652 WO2013060298A1 (zh) 2011-10-28 2012-10-29 一种在IPsec机制下的网络测试方法,装置及***

Country Status (4)

Country Link
US (1) US20140237327A1 (zh)
CN (1) CN103095511A (zh)
RU (1) RU2580454C2 (zh)
WO (1) WO2013060298A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105376754A (zh) * 2015-11-30 2016-03-02 上海斐讯数据通信技术有限公司 一种路由器可连接无线用户数目的测试方法

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8418241B2 (en) * 2006-11-14 2013-04-09 Broadcom Corporation Method and system for traffic engineering in secured networks
CN105701002B (zh) * 2014-11-26 2019-02-12 阿里巴巴集团控股有限公司 一种基于测试的执行路径的记录方法和装置
CN105721236B (zh) * 2014-12-04 2019-05-17 北京视联动力国际信息技术有限公司 一种以太网错包测试的方法及其装置
US9525514B2 (en) * 2015-01-26 2016-12-20 Mitsubishi Electric Research Laboratories, Inc. System and method for decoding block of data received over communication channel
EP3412003B1 (en) * 2016-02-05 2022-09-07 Telefonaktiebolaget LM Ericsson (PUBL) Method and apparatus for control plane to configure monitoring of differentiated service code point (dscp) and explicit congestion notification (ecn)
EP3535895A1 (en) * 2016-12-19 2019-09-11 Huawei Technologies Co., Ltd. Network node and client device for measuring channel state information
CN112637007A (zh) * 2020-12-14 2021-04-09 盛科网络(苏州)有限公司 基于ip dscp实现网络时延测量和丢包检测的方法及装置
CN112839355B (zh) * 2021-01-13 2022-06-14 深圳震有科技股份有限公司 一种5g网络的网络中ipsec测试***和方法

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101114982A (zh) * 2006-07-24 2008-01-30 互联天下科技发展(深圳)有限公司 一种基于IP网络的音视频QoS算法
CN101286896A (zh) * 2008-06-05 2008-10-15 上海交通大学 基于流的IPSec VPN协议深度检测方法
CN101296227A (zh) * 2008-06-19 2008-10-29 上海交通大学 基于报文偏移量匹配的IPSec VPN协议深度检测方法
CN102055649A (zh) * 2009-10-29 2011-05-11 成都市华为赛门铁克科技有限公司 多核***的报文处理方法、装置及***

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6606744B1 (en) * 1999-11-22 2003-08-12 Accenture, Llp Providing collaborative installation management in a network-based supply chain environment
US7043022B1 (en) * 1999-11-22 2006-05-09 Motorola, Inc. Packet order determining method and apparatus
US7130807B1 (en) * 1999-11-22 2006-10-31 Accenture Llp Technology sharing during demand and supply planning in a network-based supply chain environment
US6668282B1 (en) * 2000-08-02 2003-12-23 International Business Machines Corporation System and method to monitor and determine if an active IPSec tunnel has become disabled
US7610360B1 (en) * 2002-05-30 2009-10-27 Nortel Networks Limited Transient tolerant verification of communications paths between devices
US7921285B2 (en) * 2002-12-27 2011-04-05 Verizon Corporate Services Group Inc. Means of mitigating denial of service attacks on IP fragmentation in high performance IPsec gateways
DE60311574T2 (de) * 2003-08-14 2007-11-15 Matsushita Electric Industrial Co., Ltd., Kadoma Zeitüberwachung von Packetwiedersendungen während eines sanften Weiterreichens
US7685434B2 (en) * 2004-03-02 2010-03-23 Advanced Micro Devices, Inc. Two parallel engines for high speed transmit IPsec processing
US20050268331A1 (en) * 2004-05-25 2005-12-01 Franck Le Extension to the firewall configuration protocols and features
US20070165638A1 (en) * 2006-01-13 2007-07-19 Cisco Technology, Inc. System and method for routing data over an internet protocol security network
KR100839941B1 (ko) * 2007-01-08 2008-06-20 성균관대학교산학협력단 IPSec 설정정보와 세션정보를 이용한 비정상IPSec 트래픽 제어 시스템 및 그 제어 방법
US8838819B2 (en) * 2009-04-17 2014-09-16 Empirix Inc. Method for embedding meta-commands in normal network packets
US8661146B2 (en) * 2011-10-13 2014-02-25 Cisco Technology, Inc. Systems and methods for IP reachability in a communications network

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101114982A (zh) * 2006-07-24 2008-01-30 互联天下科技发展(深圳)有限公司 一种基于IP网络的音视频QoS算法
CN101286896A (zh) * 2008-06-05 2008-10-15 上海交通大学 基于流的IPSec VPN协议深度检测方法
CN101296227A (zh) * 2008-06-19 2008-10-29 上海交通大学 基于报文偏移量匹配的IPSec VPN协议深度检测方法
CN102055649A (zh) * 2009-10-29 2011-05-11 成都市华为赛门铁克科技有限公司 多核***的报文处理方法、装置及***

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105376754A (zh) * 2015-11-30 2016-03-02 上海斐讯数据通信技术有限公司 一种路由器可连接无线用户数目的测试方法
CN105376754B (zh) * 2015-11-30 2019-10-11 上海斐讯数据通信技术有限公司 一种路由器可连接无线用户数目的测试方法

Also Published As

Publication number Publication date
US20140237327A1 (en) 2014-08-21
RU2580454C2 (ru) 2016-04-10
CN103095511A (zh) 2013-05-08
RU2014121393A (ru) 2015-12-10

Similar Documents

Publication Publication Date Title
WO2013060298A1 (zh) 一种在IPsec机制下的网络测试方法,装置及***
US11671868B2 (en) Methods and apparatus for optimizing tunneled traffic
US10355944B2 (en) Minimally invasive monitoring of path quality
US10021594B2 (en) Methods and apparatus for optimizing tunneled traffic
JP4823359B2 (ja) マルチホップメッシュネットワークを介する管理トラフィックの送信
US9357410B2 (en) Wireless network flow monitoring
US7853691B2 (en) Method and system for securing a network utilizing IPsec and MACsec protocols
CN102300210B (zh) Lte非接入层密文解密方法及其信令监测装置
WO2017000750A1 (zh) 测量终端上运行的业务的质量的方法、设备及***
CN107682370B (zh) 创建用于嵌入的第二层数据包协议标头的方法和***
JP2019512987A (ja) 通信におけるダイナミックエクスペリエンスマネージメント
JP2011504675A (ja) サービス・データ・ユニット破棄タイマ
WO2010091610A1 (zh) 链路检测方法、装置和通信***
JP2010536273A (ja) パケットデータ収束プロトコルヘッダにおけるキー識別子
WO2012146189A1 (zh) 消息处理方法、设备及***
WO2022001324A1 (zh) 通信方法、装置及***
CN104184646A (zh) Vpn网络数据交互方法和***及其网络数据交互设备
CN107154917B (zh) 数据传输方法及服务器
WO2011137819A1 (zh) 时间消息处理方法、装置及***
CN103297348A (zh) 防止esp/ah报文分片的方法
EP3340545B1 (en) Methods and apparatus for optimizing tunneled traffic
US20090073971A1 (en) Per-packet quality of service support for encrypted ipsec tunnels
TWI708486B (zh) 無線裝置的無線通訊方法
Hohendorf et al. Secure end-to-end transport over sctp
WO2011109992A1 (zh) 一种信息获取方法、装置及***

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 12843968

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2014121393

Country of ref document: RU

Kind code of ref document: A

122 Ep: pct application non-entry in european phase

Ref document number: 12843968

Country of ref document: EP

Kind code of ref document: A1