Abstract:
A polymorphic network control system and a polymorphic network control system method supporting terminal mobile access. A network architecture is redesigned based on the idea of separation of an identifier from a locator. In this network mode, the three-layer protocol is no longer a traditional IP message, but a message carrying a locator and an identifier. The polymorphic SDN network controller is responsible for forwarding the data packet to a destination corresponding to a destination locator. When the network location of a mobile device is changed, the transmission connection established based on the identifier will suspend communication due to the disconnection of the physical link. When the mobile device is re-accessed and a new forwarding path is established, the transmission connection can recover communication.
Abstract:
Provided are a data processing system and method based on dynamic redundancy heterogeneous encoding, and a device. The method comprises: respectively performing error correction encoding on information to be processed and a processing rule, so as to form encoded information to be processed and an encoded processing rule; processing, by using the encoded processing rule, the encoded information to be processed, so as to obtain response data; and then performing error correction decoding on N pieces of response data, so as to obtain processing result information of the information to be processed.
Abstract:
A polymorphic network control system and a polymorphic network control system method supporting terminal mobile access. A network architecture is redesigned based on the idea of separation of an identifier from a locator. In this network mode, the three-layer protocol is no longer a traditional IP message, but a message carrying a locator and an identifier. The polymorphic SDN network controller is responsible for forwarding the data packet to a destination corresponding to a destination locator. When the network location of a mobile device is changed, the transmission connection established based on the identifier will suspend communication due to the disconnection of the physical link. When the mobile device is re-accessed and a new forwarding path is established, the transmission connection can recover communication.
Abstract:
A method of aggregation of a source address bunch. The method includes constituting a source address block, associating the source address block to form a source address bunch, and allocating, split, merging, and aggregating the source address bunch.
Abstract:
A method and a device for establishing an information communication network system structure, as well as a server and a router. The method includes the steps of after establishing an initial service route, utilizing the server to periodically acquire current network resource configuration information and flow rate state information transmitted by each router node, and generating network resource view and network flow rate view; utilizing the server to acquire current real transmission performance of the initial service route according to the network resource view and the network flow rate view; including current real transmission performance and current business transmission requirement, and generating a reconstruction order when current real transmission performance does not match current business transmission requirement.
Abstract:
A method of aggregation of a source address bunch. The method includes constituting a source address block, associating the source address block to form a source address bunch, and allocating, split, merging, and aggregating the source address bunch.
Abstract:
A method and a device for establishing an information communication network system structure, as well as a server and a router. The method includes the steps of after establishing an initial service route, utilizing the server to periodically acquire current network resource configuration information and flow rate state information transmitted by each router node, and generating network resource view and network flow rate view; utilizing the server to acquire current real transmission performance of the initial service route according to the network resource view and the network flow rate view; including current real transmission performance and current business transmission requirement, and generating a reconstruction order when current real transmission performance does not match current business transmission requirement.
Abstract:
The present application provides an instruction encoding-based data processing method and apparatus, and a device. N-path error correction encoding is performed on an instruction in information to be processed to obtain N encoded instructions, the encoded instructions and encoded meta channel programs obtained by the error correction encoding are used to perform redundant processing on data to be processed to obtain N pieces of response data, and then error correction decoding is performed on the N pieces of response data to obtain processing result information of the information to be processed. Because the N encoded instructions are heterogeneous and the encoded meta channel programs used in the N-path processing are heterogeneous, the randomness of the processing process can be improved, generalized disturbance in the data processing process can be corrected in combination with the error correction encoding and decoding methods, and thus the security of data processing is improved.
Abstract:
A method for automatically sensing attack behaviors, the method including: distributing a service request from a network switch to a response module, where the response module includes a main controller configured for data interaction processing and an auxiliary controller configured for interactive data processing; generating, by the main controller and the auxiliary controller in the response module, respective response data according to the service request, respectively; and comparing the respective response data of the main controller with the respective response data of the auxiliary controller; if a result of comparison is inconsistent, indicating the network switch is abnormal, an administrator is informed, and the response data generated by the auxiliary controller is fed back to the network switch; and, if the result of comparison is consistent, the response data generated by the main controller is fed back to the network switch.
Abstract:
A method for automatically sensing attack behaviors, the method including: distributing a service request from a network switch to a response module, where the response module includes a main controller configured for data interaction processing and an auxiliary controller configured for interactive data processing; generating, by the main controller and the auxiliary controller in the response module, respective response data according to the service request, respectively; and comparing the respective response data of the main controller with the respective response data of the auxiliary controller; if a result of comparison is inconsistent, indicating the network switch is abnormal, an administrator is informed, and the response data generated by the auxiliary controller is fed back to the network switch; and, if the result of comparison is consistent, the response data generated by the main controller is fed back to the network switch.