[go: up one dir, main page]

CN117834589A - Elastic IP proxy method based on KCP protocol - Google Patents

Elastic IP proxy method based on KCP protocol Download PDF

Info

Publication number
CN117834589A
CN117834589A CN202311845641.2A CN202311845641A CN117834589A CN 117834589 A CN117834589 A CN 117834589A CN 202311845641 A CN202311845641 A CN 202311845641A CN 117834589 A CN117834589 A CN 117834589A
Authority
CN
China
Prior art keywords
network
delay
kcp
flow
kcp protocol
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311845641.2A
Other languages
Chinese (zh)
Inventor
徐隆基
刘延清
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Yixu Network Technology Co ltd
Original Assignee
Shanghai Yixu Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Yixu Network Technology Co ltd filed Critical Shanghai Yixu Network Technology Co ltd
Priority to CN202311845641.2A priority Critical patent/CN117834589A/en
Publication of CN117834589A publication Critical patent/CN117834589A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/50Address allocation
    • H04L61/5007Internet protocol [IP] addresses
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/59Network arrangements, protocols or services for addressing or naming using proxies for addressing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/03Protocol definition or specification 

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses an elastic IP proxy method based on KCP protocol, which relates to the technical field of elastic IP proxy, and comprises the steps of analyzing network environment and preliminarily setting KCP protocol parameters; performing delay evaluation on the preliminarily set KCP protocol parameters, and then optimizing the KCP protocol parameters; dynamically distributing IP addresses according to real-time network loads by using the optimized parameters; network performance is continuously monitored and IP proxy methods are dynamically adjusted. The invention optimizes KCP protocol parameters by using delay evaluation and dynamically allocates IP addresses by using a load balancing algorithm based on resources, and combines network performance monitoring and a dynamic adjustment IP proxy method to ensure that high-efficiency stable low-delay transmission can be provided under various network environments, thereby having important significance for improving the instantaneity and reliability of extremely sensitive network delay application scenes.

Description

Elastic IP proxy method based on KCP protocol
Technical Field
The invention relates to the technical field of elastic IP proxy, in particular to an elastic IP proxy method based on KCP protocol.
Background
In the current network communication field, especially for applications with high real-time requirements, low latency and high network performance are critical requirements. Although the conventional IP proxy method based on the TCP protocol can provide stable data transmission, there is a limitation in processing high-speed data transmission and maintaining low network delay, the TCP protocol often generates higher delay in the data transmission process due to its inherent retransmission mechanism and congestion control strategy, and in addition, the conventional IP proxy method often lacks sufficient flexibility and adaptability when facing dynamically changing network environments, cannot effectively cope with fluctuation of network load, and causes network performance to be reduced, so it is important to develop a novel network communication method capable of adapting to rapidly changing network environments and maintaining low-delay transmission.
Disclosure of Invention
The present invention has been made in view of the above-mentioned problems occurring in the conventional elastic IP proxy method based on the TCP protocol.
Accordingly, the problem to be solved by the present invention is that the conventional IP proxy method has limitations in handling high-speed data transmission and maintaining low network latency.
In order to solve the technical problems, the invention provides the following technical scheme: an elastic IP proxy method based on KCP protocol includes analyzing network environment and setting KCP protocol parameters preliminarily; performing delay evaluation on the preliminarily set KCP protocol parameters, and then optimizing the KCP protocol parameters; dynamically distributing IP addresses according to real-time network loads by using the optimized parameters; network performance is continuously monitored and IP proxy methods are dynamically adjusted.
As a preferable scheme of the KCP protocol-based elastic IP proxy method of the present invention, the preferred scheme is as follows: analyzing the network environment and preliminarily setting KCP protocol parameters comprises collecting flow data of bandwidths, peak and valley periods of each network segment in the network environment, carrying out bandwidth test, delay test, packet loss rate detection and flow analysis on delay and packet loss rates of different time points and network segments, evaluating the overall performance of the network by using the obtained data, and preliminarily setting the sizes of a sending window and a receiving window and the size of a congestion window, the time of a transmission interval and the time of overtime transmission in the KCP protocol according to the network bandwidth and the delay data.
As a preferable scheme of the KCP protocol-based elastic IP proxy method of the present invention, the preferred scheme is as follows: the delay evaluation of the preliminarily set KCP protocol parameters comprises the following steps of:
wherein RTT represents round trip time, W represents transmission window size, S represents data packet size, calculated by monitoring network flow by network analysis tool, B represents network bandwidth, measured by network bandwidth testing tool,
substituting the preliminarily set KCP protocol parameter value into a formula, obtaining a delay evaluation result through calculation, repeatedly testing the delay evaluation result by using a ping command and a Traceroute command, and optimizing the KCP protocol parameter by using the delay evaluation result if the test result is not greatly different from the actual one.
As a preferable scheme of the KCP protocol-based elastic IP proxy method of the present invention, the preferred scheme is as follows: the optimizing KCP protocol parameters comprises the steps of adjusting the sizes of a sending window and a receiving window and the transmission quantity of data packets in a network according to the delay evaluation result, and adjusting the size of a congestion window, the time of a transmission interval and the time of overtime transmission.
As a preferable scheme of the KCP protocol-based elastic IP proxy method of the present invention, the preferred scheme is as follows: the step of using the optimized parameter setting and dynamically distributing the IP address according to the real-time network load comprises the steps of using the optimized KCP parameter to carry out data transmission in the network, using a resource-based load balancing algorithm to dynamically distribute the IP address according to the real-time network load, and distributing the request according to the CPU load, the utilization rate of the memory and the network bandwidth of the server and the time required by the server to respond.
As a preferable scheme of the KCP protocol-based elastic IP proxy method of the present invention, the preferred scheme is as follows: the continuous monitoring of the network performance comprises the steps of continuously monitoring the performance index of the network by using Wireshark, wherein the performance index comprises delay, bandwidth utilization rate and packet loss, and the agent efficiency of each IP address is periodically evaluated, and the agent efficiency comprises the capacity of processing traffic, response speed and stability.
As a preferable scheme of the KCP protocol-based elastic IP proxy method of the present invention, the preferred scheme is as follows: the dynamic adjustment IP proxy method comprises the steps of dynamically adjusting the IP proxy method according to the result of Wirshark monitoring,
if the monitoring result is that long-time high round trip delay occurs, determining a reason for the occurrence of the high delay, checking source and destination addresses of data packets with the high delay and paths of the data packets in a network, if the data packets with the high delay are caused by a server with a long distance, caching content to a close-range server by using a content distribution network, if the data packets with the high delay are caused by an unstable link, dynamically selecting an optimal path among a plurality of links by using a multi-path routing technology, dynamically adjusting an IP proxy, and redirecting the flow to a path or server with a lower delay;
if the monitoring result is that network bandwidth overload occurs, i.e. the network data transmission quantity is close to or exceeds the maximum bearing capacity of the network bandwidth, bandwidth is increased according to actual conditions, high-flow application is optimized or limited, and a flow control strategy is used for controlling flow;
if the monitoring result is that continuous data packets are lost, each part of the network is checked, a high-traffic area or period is identified, if network congestion occurs, a large number of non-critical traffic is limited, the influence on critical services is reduced, routing protocols and settings are adjusted, the path through which the data flow passes is optimized, if no network congestion occurs, the performance and monitoring conditions of routers and switches are checked, routing tables and firewall rules are checked, if configuration errors occur, wrong routing entries or firewall rules are modified, if no configuration errors occur, network performance is continuously monitored, periodic audit and checking of routing tables and firewall configuration are performed, if the checking shows that the packet loss is caused by a specific node, hardware performance related to the node is checked, if the hardware performance is insufficient, the node is updated or replaced, if the hardware performance is not insufficient, the physical connection of the node is continuously checked, the problem of physical damage or poor connection is identified and repaired, and the traffic is temporarily redirected to bypass the problem node;
if the monitoring result is that uneven flow distribution occurs, namely the flow distribution in the network is uneven, nodes or paths bear disproportionately high flow, and other nodes or paths have lower flow, the network routing strategy is reconfigured, the flow distribution is rebalanced, all the nodes and paths are ensured to bear even flow, the flow is dispersed among the nodes by using a load equalizer, and network resources are adjusted according to the flow distribution;
if the monitoring result is that an abnormal traffic mode occurs, namely frequent port scanning or the protocol is not used in accordance with the expected protocol, the IP proxy rule is adjusted, the abnormal traffic is isolated or limited, the safety measure is enhanced, and strict access control is implemented.
A computer device, comprising: a memory and a processor; the memory stores a computer program characterized in that: the processor, when executing the computer program, implements the steps of a flexible IP proxy method based on KCP protocol.
A computer-readable storage medium having stored thereon a computer program, characterized by: the computer program when executed by a processor implements the steps of a flexible IP proxy method based on KCP protocol.
The invention has the beneficial effects that: the invention optimizes KCP protocol parameters by using delay evaluation and dynamically allocates IP addresses by using a load balancing algorithm based on resources, and combines network performance monitoring and a dynamic adjustment IP proxy method to ensure that high-efficiency stable low-delay transmission can be provided under various network environments, thereby having important significance for improving the instantaneity and reliability of extremely sensitive network delay application scenes.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required for the description of the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a flow diagram of a flexible IP proxy method based on KCP protocol.
Detailed Description
In order that the above-recited objects, features and advantages of the present invention will become more readily apparent, a more particular description of the invention will be rendered by reference to specific embodiments thereof which are illustrated in the appended drawings.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention, but the present invention may be practiced in other ways other than those described herein, and persons skilled in the art will readily appreciate that the present invention is not limited to the specific embodiments disclosed below.
Further, reference herein to "one embodiment" or "an embodiment" means that a particular feature, structure, or characteristic can be included in at least one implementation of the invention. The appearances of the phrase "in one embodiment" in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments.
Example 1
Referring to fig. 1, a first embodiment of the present invention provides a flexible IP proxy method based on KCP protocol, which includes the following steps:
s1, analyzing a network environment and preliminarily setting KCP protocol parameters;
specifically, analyzing the network environment and preliminarily setting KCP protocol parameters includes collecting bandwidth, peak and valley period flow data of each network segment in the network environment, performing bandwidth test, delay test, packet loss rate detection and flow analysis on delay and packet loss rate of different time points and network segments, evaluating overall performance of the network by using the obtained data, and preliminarily setting the sizes of a sending window and a receiving window and the size of a congestion window, transmission interval time and timeout transmission time in the KCP protocol according to the network bandwidth and the delay data.
The traditional network protocol parameter setting often adopts a 'one-time cut' method, lacks optimization aiming at a specific network environment, but the invention can obviously improve the efficiency of data transmission, reduce delay and reduce packet loss rate by deeply analyzing the network environment and adjusting KCP protocol parameters accordingly, thereby improving the reliability and instantaneity of overall network communication, and particularly can more effectively cope with network fluctuation when the network performance of different network segments and different time periods changes.
S2, performing delay evaluation on the preliminarily set KCP protocol parameters, and then optimizing the KCP protocol parameters;
specifically, the delay evaluation of the preliminarily set KCP protocol parameter includes the following expression:
wherein RTT represents round trip time, W represents transmission window size, S represents data packet size, calculated by monitoring network flow by network analysis tool, B represents network bandwidth, measured by network bandwidth testing tool,
substituting the preliminarily set KCP protocol parameter value into a formula, obtaining a delay evaluation result through calculation, repeatedly testing the delay evaluation result by using a ping command and a Traceroute command, and optimizing the KCP protocol parameter by using the delay evaluation result if the test result is not greatly different from the actual one.
Compared with the prior art, the accurate and dynamic parameter adjustment method can remarkably improve data transmission efficiency, ensures evaluation accuracy and instantaneity by combining the actual test results of ping and Traceroute commands, and can realize lower delay and higher transmission speed of the optimized KCP protocol under a high-speed network environment, thereby improving overall network performance.
Further, optimizing the KCP protocol parameters includes adjusting the size of the sending window and the receiving window and the transmission amount of the data packet in the network, and adjusting the size of the congestion window and the time of the transmission interval and the time of the timeout transmission according to the result of the delay evaluation.
By adjusting the size of the sending window and the receiving window and the transmission quantity of the data packets in the network, the management of the data flow is optimized, more data packets are allowed to be transmitted in the network at the same time, the waiting time and the network idle time are reduced, the overall efficiency of data transmission is improved, low-delay transmission is realized, the adjustment of the size of the congestion window and the transmission interval time is realized, the KCP protocol can be more flexibly adapted to the change when the network is congested, the method is helpful for avoiding excessive data packet retransmission, unnecessary network congestion is reduced, and the stability of network transmission is improved.
S3, dynamically distributing IP addresses according to the real-time network load by using the optimized parameters;
specifically, using the optimized parameter setting and dynamically allocating the IP address according to the real-time network load includes using the optimized KCP parameter to perform data transmission in the network, using a resource-based load balancing algorithm to dynamically allocate the IP address according to the real-time network load, and allocating the request according to the CPU load, the memory usage rate and the network bandwidth utilization rate of the server and the time required for the server to respond.
The KCP protocol improves the stability of single connection and the efficiency load balancing algorithm, optimizes the resource allocation and the utilization rate of a network system, and the combination of the two can enable the network system to better adapt to different flow conditions and use scenes.
S4, continuously monitoring network performance and dynamically adjusting an IP proxy method;
specifically, the continuous monitoring of network performance includes using the Wireshark to continuously monitor performance indexes of the network, including delay, bandwidth usage, packet loss, and periodically evaluating proxy efficiency of each IP address, including capability of processing traffic, response speed, and stability.
The network performance index is continuously monitored by using the Wireshark to provide real-time and accurate network state, so that the network can be ensured to always operate in an optimal state, and strategies can be timely adjusted to adapt to network changes, thereby improving the overall network transmission efficiency, and the proxy efficiency of each IP address is periodically evaluated, including the capacity of processing traffic, response speed and stability, so that potential performance bottlenecks or unstable factors can be recognized and solved.
Further, the method for dynamically adjusting the IP proxy comprises dynamically adjusting the IP proxy according to the result of Wirshark monitoring,
if the monitoring result is that long-time high round trip delay occurs, determining a reason for the occurrence of the high delay, checking source and destination addresses of data packets with the high delay and paths of the data packets in a network, if the data packets with the high delay are caused by a server with a long distance, caching content to a close-range server by using a content distribution network, if the data packets with the high delay are caused by an unstable link, dynamically selecting an optimal path among a plurality of links by using a multi-path routing technology, dynamically adjusting an IP proxy, and redirecting the flow to a path or server with a lower delay;
if the monitoring result is that network bandwidth overload occurs, i.e. the network data transmission quantity is close to or exceeds the maximum bearing capacity of the network bandwidth, bandwidth is increased according to actual conditions, high-flow application is optimized or limited, and a flow control strategy is used for controlling flow;
if the monitoring result is that continuous data packets are lost, each part of the network is checked, a high-traffic area or period is identified, if network congestion occurs, a large number of non-critical traffic is limited, the influence on critical services is reduced, routing protocols and settings are adjusted, the path through which the data flow passes is optimized, if no network congestion occurs, the performance and monitoring conditions of routers and switches are checked, routing tables and firewall rules are checked, if configuration errors occur, wrong routing entries or firewall rules are modified, if no configuration errors occur, network performance is continuously monitored, periodic audit and checking of routing tables and firewall configuration are performed, if the checking shows that the packet loss is caused by a specific node, hardware performance related to the node is checked, if the hardware performance is insufficient, the node is updated or replaced, if the hardware performance is not insufficient, the physical connection of the node is continuously checked, the problem of physical damage or poor connection is identified and repaired, and the traffic is temporarily redirected to bypass the problem node;
if the monitoring result is that uneven flow distribution occurs, namely the flow distribution in the network is uneven, nodes or paths bear disproportionately high flow, and other nodes or paths have lower flow, the network routing strategy is reconfigured, the flow distribution is rebalanced, all the nodes and paths are ensured to bear even flow, the flow is dispersed among the nodes by using a load equalizer, and network resources are adjusted according to the flow distribution;
if the monitoring result is that an abnormal traffic mode occurs, namely frequent port scanning or the protocol is not used in accordance with the expected protocol, the IP proxy rule is adjusted, the abnormal traffic is isolated or limited, the safety measure is enhanced, and strict access control is implemented.
Based on the monitoring result of the Wireshark, the method identifies the cause of the specific problem and adopts a targeted solving measure, so that the network problem can be effectively solved, the multipath routing technology and the dynamic flow redirection can be rapidly switched to a better path or server when the network has a problem, the robustness and the fault recovery capability of the network are improved, the whole scheme can flexibly cope with various network environments and conditions when the network is subjected to continuous change and unpredictable fight, and the continuity and the stability of network service are ensured.
Example 2
For the second embodiment of the present invention, this embodiment is different from the previous embodiment,
the functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer-readable storage medium. Based on this understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution, in the form of a software product stored in a storage medium, comprising several instructions for causing a computer device (which may be a personal computer, a server, a network device, etc.) to perform all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
Logic and/or steps represented in the flowcharts or otherwise described herein, e.g., a ordered listing of executable instructions for implementing logical functions, can be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or device, such as a computer-based system, processor-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device and execute the instructions. For the purposes of this description, a "computer-readable medium" can be any means that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device.
More specific examples (a non-exhaustive list) of the computer-readable medium would include the following: an electrical connection (electronic device) having one or more wires, a portable computer diskette (magnetic device), a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber device, and a portable compact disc read-only memory (CDROM). In addition, the computer readable medium may even be paper or other suitable medium on which the program is printed, as the program may be electronically captured, via, for instance, optical scanning of the paper or other medium, then compiled, interpreted or otherwise processed in a suitable manner, if necessary, and then stored in a computer memory.
It is to be understood that portions of the present invention may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in a memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, may be implemented using any one or combination of the following techniques, as is known in the art: discrete logic circuits having logic gates for implementing logic functions on data signals, application specific integrated circuits having suitable combinational logic gates, programmable Gate Arrays (PGAs), field Programmable Gate Arrays (FPGAs), and the like.
Example 3
For the third example of the present invention, which is different from the first two examples, the comparison results are shown in table 1, as demonstrated by comparing the present invention method with the prior art in order to verify the beneficial effects of the present invention method.
Table 1: the method of the invention is compared with the prior art to demonstrate the table
In summary, the invention significantly reduces the average round trip delay and the data packet loss rate by optimizing the KCP parameters and effective network load management, and the dynamic IP proxy and real-time monitoring improve the overall stability of the network, thus improving the network bandwidth utilization and network congestion processing, and adapting to high-flow changes more quickly.
It should be noted that the above embodiments are only for illustrating the technical solution of the present invention and not for limiting the same, and although the present invention has been described in detail with reference to the preferred embodiments, it should be understood by those skilled in the art that the technical solution of the present invention may be modified or substituted without departing from the spirit and scope of the technical solution of the present invention, which is intended to be covered in the scope of the claims of the present invention.

Claims (9)

1. A flexible IP proxy method based on KCP protocol is characterized in that: analyzing a network environment and preliminarily setting KCP protocol parameters;
performing delay evaluation on the preliminarily set KCP protocol parameters, and then optimizing the KCP protocol parameters;
dynamically distributing IP addresses according to real-time network loads by using the optimized parameters;
network performance is continuously monitored and IP proxy methods are dynamically adjusted.
2. The KCP protocol-based flexible IP proxy method of claim 1, wherein: analyzing the network environment and preliminarily setting KCP protocol parameters comprises collecting flow data of bandwidths, peak and valley periods of each network segment in the network environment, carrying out bandwidth test, delay test, packet loss rate detection and flow analysis on delay and packet loss rates of different time points and network segments, evaluating the overall performance of the network by using the obtained data, and preliminarily setting the sizes of a sending window and a receiving window and the size of a congestion window, the time of a transmission interval and the time of overtime transmission in the KCP protocol according to the network bandwidth and the delay data.
3. The KCP protocol-based flexible IP proxy method of claim 2, wherein: the delay evaluation of the preliminarily set KCP protocol parameters comprises the following steps of:
wherein RTT represents round trip time, W represents transmission window size, S represents data packet size, calculated by monitoring network flow by network analysis tool, B represents network bandwidth, measured by network bandwidth testing tool,
substituting the preliminarily set KCP protocol parameter value into a formula, obtaining a delay evaluation result through calculation, repeatedly testing the delay evaluation result by using a ping command and a Traceroute command, and optimizing the KCP protocol parameter by using the delay evaluation result if the test result is not greatly different from the actual one.
4. The KCP protocol-based flexible IP proxy method of claim 3, wherein: the optimizing KCP protocol parameters comprises the steps of adjusting the sizes of a sending window and a receiving window and the transmission quantity of data packets in a network according to the delay evaluation result, and adjusting the size of a congestion window, the time of a transmission interval and the time of overtime transmission.
5. The KCP protocol-based flexible IP proxy method of claim 4, wherein: the step of using the optimized parameter setting and dynamically distributing the IP address according to the real-time network load comprises the steps of using the optimized KCP parameter to carry out data transmission in the network, using a resource-based load balancing algorithm to dynamically distribute the IP address according to the real-time network load, and distributing the request according to the CPU load, the utilization rate of the memory and the network bandwidth of the server and the time required by the server to respond.
6. The KCP protocol-based flexible IP proxy method of claim 5, wherein: the continuous monitoring of the network performance comprises the steps of continuously monitoring the performance index of the network by using Wireshark, wherein the performance index comprises delay, bandwidth utilization rate and packet loss, and the agent efficiency of each IP address is periodically evaluated, and the agent efficiency comprises the capacity of processing traffic, response speed and stability.
7. The KCP protocol-based flexible IP proxy method of claim 6, wherein: the dynamic adjustment IP proxy method comprises the steps of dynamically adjusting the IP proxy method according to the result of Wirshark monitoring,
if the monitoring result is that long-time high round trip delay occurs, determining a reason for the occurrence of the high delay, checking source and destination addresses of data packets with the high delay and paths of the data packets in a network, if the data packets with the high delay are caused by a server with a long distance, caching content to a close-range server by using a content distribution network, if the data packets with the high delay are caused by an unstable link, dynamically selecting an optimal path among a plurality of links by using a multi-path routing technology, dynamically adjusting an IP proxy, and redirecting the flow to a path or server with a lower delay;
if the monitoring result is that network bandwidth overload occurs, i.e. the network data transmission quantity is close to or exceeds the maximum bearing capacity of the network bandwidth, bandwidth is increased according to actual conditions, high-flow application is optimized or limited, and a flow control strategy is used for controlling flow;
if the monitoring result is that continuous data packets are lost, each part of the network is checked, a high-traffic area or period is identified, if network congestion occurs, a large number of non-critical traffic is limited, the influence on critical services is reduced, routing protocols and settings are adjusted, the path through which the data flow passes is optimized, if no network congestion occurs, the performance and monitoring conditions of routers and switches are checked, routing tables and firewall rules are checked, if configuration errors occur, wrong routing entries or firewall rules are modified, if no configuration errors occur, network performance is continuously monitored, periodic audit and checking of routing tables and firewall configuration are performed, if the checking shows that the packet loss is caused by a specific node, hardware performance related to the node is checked, if the hardware performance is insufficient, the node is updated or replaced, if the hardware performance is not insufficient, the physical connection of the node is continuously checked, the problem of physical damage or poor connection is identified and repaired, and the traffic is temporarily redirected to bypass the problem node;
if the monitoring result is that uneven flow distribution occurs, namely the flow distribution in the network is uneven, nodes or paths bear disproportionately high flow, and other nodes or paths have lower flow, the network routing strategy is reconfigured, the flow distribution is rebalanced, all the nodes and paths are ensured to bear even flow, the flow is dispersed among the nodes by using a load equalizer, and network resources are adjusted according to the flow distribution;
if the monitoring result is that an abnormal traffic mode occurs, namely frequent port scanning or the protocol is not used in accordance with the expected protocol, the IP proxy rule is adjusted, the abnormal traffic is isolated or limited, the safety measure is enhanced, and strict access control is implemented.
8. A computer device, comprising: a memory and a processor; the memory stores a computer program characterized in that: the processor, when executing the computer program, implements the steps of the method of any one of claims 1 to 7.
9. A computer-readable storage medium having stored thereon a computer program, characterized by: the computer program implementing the steps of the method of any of claims 1 to 7 when executed by a processor.
CN202311845641.2A 2023-12-28 2023-12-28 Elastic IP proxy method based on KCP protocol Pending CN117834589A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311845641.2A CN117834589A (en) 2023-12-28 2023-12-28 Elastic IP proxy method based on KCP protocol

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311845641.2A CN117834589A (en) 2023-12-28 2023-12-28 Elastic IP proxy method based on KCP protocol

Publications (1)

Publication Number Publication Date
CN117834589A true CN117834589A (en) 2024-04-05

Family

ID=90509105

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311845641.2A Pending CN117834589A (en) 2023-12-28 2023-12-28 Elastic IP proxy method based on KCP protocol

Country Status (1)

Country Link
CN (1) CN117834589A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN119025257A (en) * 2024-07-16 2024-11-26 广州三七极耀网络科技有限公司 A method, device, equipment and medium for issuing application requests

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN119025257A (en) * 2024-07-16 2024-11-26 广州三七极耀网络科技有限公司 A method, device, equipment and medium for issuing application requests

Similar Documents

Publication Publication Date Title
US10498612B2 (en) Multi-stage selective mirroring
Sun et al. Identifying performance bottlenecks in CDNs through TCP-level monitoring
Moshref et al. Trumpet: Timely and precise triggers in data centers
US7475130B2 (en) System and method for problem resolution in communications networks
CA2626718C (en) Adaptive band width control
US11190532B2 (en) Dynamic configuration of settings in response to DDoS attack
US9722926B2 (en) Method and system of large flow control in communication networks
Gao et al. A state feedback control approach to stabilizing queues for ECN-enabled TCP connections
WO2005098461A2 (en) Estimator for end-to-end throughput of wireless networks
WO2012130264A1 (en) User traffic accountability under congestion in flow-based multi-layer switches
US20050018608A1 (en) Progressive and distributed regulation of selected network traffic destined for a network node
US20140211623A1 (en) Balancing Load Distributions of Loopback Ports
AU2019250142A1 (en) Circuit-aware load balancing with dynamic quality of service
GB2379127A (en) Method and device for monitoring the performance of a network
Gao et al. Avoiding oscillations due to intelligent route control systems.
CN117834589A (en) Elastic IP proxy method based on KCP protocol
US8630204B1 (en) System and method for a TCP mapper
EP1946502A4 (en) METHOD OF CONCEALING COTNROME
Tsugawa et al. Background TCP data transfer with inline network measurement
Nacshon et al. Floware: Balanced flow monitoring in software defined networks
CN117135047A (en) Implementation method, device and storage medium of software BYPASS
Adesanmi et al. Controlling TCP Incast congestion in data centre networks
Maw Traffic engineering in Software-Defined Networking SDN
JP2009284433A (en) System and method for detecting and controlling p2p terminal
Chicco et al. Simulation study of new TCP variants

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination