[go: up one dir, main page]

HK1247001B - System and method for a global virtual network - Google Patents

System and method for a global virtual network Download PDF

Info

Publication number
HK1247001B
HK1247001B HK18106121.9A HK18106121A HK1247001B HK 1247001 B HK1247001 B HK 1247001B HK 18106121 A HK18106121 A HK 18106121A HK 1247001 B HK1247001 B HK 1247001B
Authority
HK
Hong Kong
Prior art keywords
srv
gvn
server
internet
information
Prior art date
Application number
HK18106121.9A
Other languages
Chinese (zh)
Other versions
HK1247001A1 (en
Inventor
J‧E‧鲁本斯坦
J‧A‧D‧克努森
T‧A‧B‧J‧圣马丁
C‧E‧奥尔
F‧布鲁萨尔
Original Assignee
安博科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from PCT/US2015/064242 external-priority patent/WO2016094291A1/en
Priority claimed from PCT/IB2016/000110 external-priority patent/WO2016110785A1/en
Application filed by 安博科技有限公司 filed Critical 安博科技有限公司
Priority claimed from PCT/US2016/015278 external-priority patent/WO2016123293A1/en
Publication of HK1247001A1 publication Critical patent/HK1247001A1/en
Publication of HK1247001B publication Critical patent/HK1247001B/en

Links

Description

用于全局虚拟网络的系统和方法Systems and methods for global virtual networks

本申请主张2015年1月28日提交的第62/108,987号美国临时专利申请、2015年4月7日提交的第62/144,293号美国临时专利申请、2015年4月22日提交的第62/151,174号美国临时专利申请、2015年6月11日提交的第62/174,394号美国临时专利申请、2015年12月7日提交的第PCT/US2015/064242号国际专利申请、2015年12月11日提交的第62/266,060号美国临时专利申请以及2016年1月5日提交的第PCT/US2016/012178号国际专利申请的优先权,这些申请均以引用方式并入本文中。2014年12月8日提交的第62/089,113号美国临时专利申请和2015年1月6日提交的第62/100,406号美国临时专利申请以引用方式并入本文中。This application claims priority to U.S. Provisional Patent Application No. 62/108,987, filed January 28, 2015, U.S. Provisional Patent Application No. 62/144,293, filed April 7, 2015, U.S. Provisional Patent Application No. 62/151,174, filed April 22, 2015, U.S. Provisional Patent Application No. 62/174,394, filed June 11, 2015, International Patent Application No. PCT/US2015/064242, filed December 7, 2015, U.S. Provisional Patent Application No. 62/266,060, filed December 11, 2015, and International Patent Application No. PCT/US2016/012178, filed January 5, 2016, all of which are incorporated herein by reference. U.S. Provisional Patent Application No. 62/089,113, filed December 8, 2014, and U.S. Provisional Patent Application No. 62/100,406, filed January 6, 2015, are incorporated herein by reference.

技术领域Technical Field

本公开总体上涉及网络,更具体地,涉及全局虚拟网络(GVN)的配置和操作。The present disclosure relates generally to networks and, more particularly, to the configuration and operation of a global virtual network (GVN).

背景技术Background Art

尽管“最后一英里连接性”近年来已经极大地改善,但由于距离、协议限制、对等操作、干扰相关问题以及其他问题和威胁,仍然存在远距离连接性及吞吐量的问题。GVN在客户端标准互联网连接的顶部为客户端提供安全网络优化服务。While "last mile connectivity" has improved dramatically in recent years, long-distance connectivity and throughput issues still exist due to distance, protocol limitations, peering, interference-related issues, and other problems and threats. GVN provides secure network optimization services to clients on top of their standard Internet connections.

本申请对GVN组成部分进行了概述并且对可用作GVN元素的相关技术进行了描述。GVN元素可独立地或在GVN生态系统中操作,诸如出于其自身目的采用GVN架构,或可被部署以增强GVN的性能和效率。This application provides an overview of GVN components and describes related technologies that can be used as GVN elements. GVN elements can operate independently or in a GVN ecosystem, such as using the GVN architecture for their own purposes, or can be deployed to enhance the performance and efficiency of the GVN.

此概述还描述了其他技术可如何得益于GVN,它们可作为使用GVN的一些或全部组件的独立部署,或可被快速部署为在现有GVN之上的独立机制,从而利用它的益处。This overview also describes how other technologies can benefit from GVN, either as standalone deployments that use some or all of GVN's components, or can be quickly deployed as standalone mechanisms on top of an existing GVN to leverage its benefits.

人类能够察觉到200毫秒或更高的延迟,因为这通常是人类对事件的平均反应时间。若延迟时间过高,诸如瘦客户端到基于云的服务器、客户关系管理(CRM)、企业资源规划(ERP)和其他系统等在线系统将运行不佳并且甚至可能由于超时而停止运行。高延迟时间加上高分组丢失可能导致连接不可用。即使数据通过,在特定时刻,过于缓慢会导致用户体验(UX)不佳并且在这些情况下,用户最终可能拒绝接受这些状况,它们实际上会将送达不佳的服务视作无用。Humans can perceive latency of 200 milliseconds or higher, as this is typically the average human reaction time to an event. If latency is too high, online systems such as thin clients connecting to cloud-based servers, customer relationship management (CRM), enterprise resource planning (ERP), and other systems will perform poorly and may even cease to function due to timeouts. High latency combined with high packet loss can render the connection unusable. Even if data gets through, at certain times, excessive slowness can result in a poor user experience (UX), and in these cases, users may ultimately refuse to accept the situation, effectively viewing the poorly delivered service as useless.

为了解决一部分这些问题,已经开发了各种技术。一种技术是WAN优化,通常涉及局域网(LAN)边缘处的硬件(HW)设备,该设备建立通向另一LAN边缘处的另一WAN优化HW设备的隧道,从而在两个硬件设备之间形成广域网(WAN)。此技术假设两个设备经由稳定连接彼此连接。WAN优化器力求压缩并保护数据流,这通常会引起速度增益。采用WAN优化的商业驱动器用以节省发送的数据容量,进而降低数据传输成本。该技术的缺点是它通常是点对点的并且当两个设备之间的连接不良时可能费力,因为对通过两者之间的互联网的流量路径的控制极少甚至没有。为了解决此问题,WAN优化器的用户通常选择在MPLS或DDN线路或其他专用电路上运行它们的WAN,导致额外费用并且经常也必然会伴有刚性、固定的点对点连接。To address some of these issues, various technologies have been developed. One technology is WAN optimization, which typically involves a hardware (HW) device at the edge of a local area network (LAN) that establishes a tunnel to another WAN optimization HW device at the edge of another LAN, thereby forming a wide area network (WAN) between the two hardware devices. This technology assumes that the two devices are connected to each other via a stable connection. WAN optimizers strive to compress and protect data streams, which generally results in speed gains. The business drive to adopt WAN optimization is to save data capacity sent, thereby reducing data transmission costs. The disadvantage of this technology is that it is typically point-to-point and can be difficult when the connection between the two devices is poor, because there is little or no control over the traffic path through the Internet between the two. To address this issue, users of WAN optimizers often choose to run their WANs on MPLS or DDN lines or other dedicated circuits, incurring additional costs and often entailing rigid, fixed point-to-point connections.

在撰写本专利时的市场中,一些供应商关注于销售硬件,而不关注他们的硬件设备之间的互联网上的连接服务。另外一些供应商是服务提供者,他们可能提供可由客户安装到客户自己设备上以连接至服务提供者的云服务器的简单端点设备或软件,作为连到供应商打包提供的服务的链路,但这些供应商的主要焦点是服务提供。In the market at the time of writing this patent, some vendors focus on selling hardware, without focusing on providing connectivity services over the Internet between their hardware devices. Other vendors are service providers, and they may provide simple endpoint devices or software that customers can install on their own devices to connect to the service provider's cloud servers as a link to the provider's packaged services, but the primary focus of these vendors is service provision.

直接链路例如MPLS、DDN、专用电路或其他类型的固定点对点连接可提供连接质量和服务质量(QoS)保障。这些链路是昂贵的并且由于需要从每一个连接侧的POP进行物理布线,通常需要花费很长时间来安装。当经由此直接连接的WAN从一个LAN内连接至另一LAN的资源时,点对点拓扑工作良好。然而,当通向一般互联网的网关(GW)位于LAN一端的LAN处,例如位于公司总部时,则来自子公司国家的远程LAN的流量可通过GW被路由至互联网。随着流量通过互联网返回到子公司所在的同一国家/地区的服务器,将出现减慢。流量随后必须从LAN通过WAN流到GW所在的LAN,然后通过互联网返回初始国家的服务器,随后通过互联网返回到该GW,并且随后沿着专用线路返回到LAN内的客户端设备。实际上,本应当只需一小部分的全局延迟时间来访问此附近站点,这样会导致访问该附近站点的全局传输时间加倍或者是三倍(或者更严重)。为克服此问题,配置适当改变并且附加了设备的另一互联网线路的替代连接性可在此系统的每一端将本地流量提供至互联网。Direct links such as MPLS, DDN, dedicated circuits, or other types of fixed point-to-point connections provide guaranteed quality of connection and quality of service (QoS). These links are expensive and typically take a long time to install due to the need for physical cabling from each point of presence (POP) on each side of the connection. A point-to-point topology works well when connecting from one LAN to resources in another LAN via this directly connected WAN. However, when a gateway (GW) to the general internet is located at one end of the LAN, such as at corporate headquarters, traffic from a remote LAN in a subsidiary country can be routed to the internet via the GW. Traffic slows down as it returns over the internet to a server in the same country as the subsidiary. Traffic must then flow from the LAN across the WAN to the LAN where the GW is located, then across the internet back to the server in the original country, then back across the internet to the GW, and finally back along the dedicated line to the client device within the LAN. This effectively doubles or even triples (or even worse) the global transit time to access this nearby site, which should only require a fraction of the global latency. To overcome this problem, alternative connectivity via another internet line with appropriate configuration changes and additional equipment can provide local traffic to the internet at each end of the system.

建立从一个LAN至另一LAN的WAN链路的另一选项涉及在两个路由器、防火墙或等效边缘设备之间构建隧道,诸如IPSec或其他协议隧道。它们通常是加密的并且可提供压缩和其他逻辑来尝试改良连接性。对两点间的路由的控制极少甚至没有,因为它们依赖于互联网上的各种中间参与者的政策,这些中间参与者通过它们的网络传输自己的流量,并且与其他运营商和/或网络运营商为对等关系。防火墙和路由器、交换机以及来自若干设备供应商的其他设备通常具有内置到固件中的隧道选项。Another option for establishing a WAN link from one LAN to another involves building a tunnel, such as an IPSec or other protocol tunnel, between two routers, firewalls, or equivalent edge devices. These are typically encrypted and can provide compression and other logic to improve connectivity. There is little or no control over the routing between the two points, as they rely on the policies of various intermediary participants on the Internet, who route their own traffic through their networks and have peer relationships with other carriers and/or network operators. Firewalls and routers, switches, and other devices from several equipment vendors often have tunneling options built into their firmware.

基于软件(SW)的虚拟专用网络(VPN)经由在客户端设备与VPN服务器之间的隧道提供隐私性。这些具有加密优点并且在一些情形下还提供压缩优点。但同样地,对在VPN客户端与VPN服务器之间以及在VPN服务器与主机服务器、主机客户端或目的地的其他设备之间的流量如何流动的控制极少甚至没有。这些通常是点对点连接,需要每个使用VPN的设备安装客户端软件并且需要一定的技术能力来维护每个设备的连接。若VPN服务器出口点经由优质通信路径紧靠目的地主机服务器或主机客户端,则性能将为良好的。如果不紧靠,则将显著制约性能并且引起可用性方面的不满。VPN用户经常需要不得不从一个VPN服务器断开连接并重新连接到另一VPN服务器以相对于另一个区域的内容而言,优质地或本地接入来自一个区域的内容。Software-based virtual private networks (VPNs) provide privacy via a tunnel between the client device and the VPN server. These offer encryption advantages and, in some cases, compression advantages. However, there is also little or no control over how traffic flows between the VPN client and the VPN server, and between the VPN server and the host server, host client, or other devices at the destination. These are typically point-to-point connections, requiring each device using the VPN to install client software and requiring a certain level of technical expertise to maintain each device's connection. If the VPN server exit point is in close proximity to the destination host server or host client via a high-quality communication path, performance will be good. If it is not, performance will be significantly limited and usability will be unsatisfactory. VPN users often need to disconnect from one VPN server and reconnect to another to access content from one region in a high-quality or local manner, relative to content from another region.

全局虚拟网络(GVN)是在互联网之上的一种类型的计算机网络,它采用由先进隧道彼此安全链接的分布在世界各地的设备网提供全局安全网络优化服务;经由应用程序接口(API)、数据库(DB)复制、和其他方法协作并通信。始终经由由自动化系统驱动的高级智能路由(ASR)所管理的最佳通信路径进行GVN中的流量路由,所述自动化系统将构建器、管理器、测试器、算法分析和其他方法相结合,以适应随时间变化的条件和学习,以便配置和重新配置系统。The Global Virtual Network (GVN) is a type of computer network built on top of the Internet. It provides global, secure network optimization services using a globally distributed network of devices securely linked by advanced tunnels. These devices collaborate and communicate via application programming interfaces (APIs), database replication, and other methods. Traffic within the GVN is always routed along the optimal communication path managed by Advanced Smart Routing (ASR), driven by an automated system that combines builders, managers, testers, algorithmic analysis, and other methods to adapt to changing conditions and learn over time in order to configure and reconfigure the system.

GVN在一个或多个常规互联网连接之上提供服务,以提供安全、可靠、快速、稳定、精确和集中的并行连接性。这些益处通过数据流的压缩实现,该数据传输通过在EPD与紧靠EPD的接入点服务器(SRV_AP)之间的多个包装、伪装和加密隧道的连接。对EPD与SRV_AP之间的连接质量进行持续监测。GVN provides services on top of one or more regular Internet connections to provide secure, reliable, fast, stable, accurate, and centralized parallel connectivity. These benefits are achieved by compressing the data stream, which is transmitted through multiple wrapped, disguised, and encrypted tunnels between the EPD and the access point server (SRV_AP) in close proximity to the EPD. The connection quality between the EPD and the SRV_AP is continuously monitored.

GVN是已安装软件(SW)的硬件(HW)端点设备(EPD)、数据库(DB)以及GVN系统的其他自动化模块,例如中立应用程序接口机制(NAPIM)、反向通道管理器、隧道管理器,以及将EPD连接到诸如GVN内的接入点服务器(SRV_AP)和中央服务器(SRV_CNTRL)等分布式基础设施设备的更多特征的组合。A GVN is a combination of a hardware (HW) endpoint device (EPD) with installed software (SW), a database (DB), and other automation modules of the GVN system such as the Neutral Application Programming Interface Mechanism (NAPIM), a reverse channel manager, a tunnel manager, and more features that connect the EPD to distributed infrastructure devices such as the Access Point Server (SRV_AP) and the Central Server (SRV_CNTRL) within the GVN.

算法持续分析当前网络状态,同时考虑到后续趋势加上长期历史性能,以确定要采取的最佳流量路由并且将流量推送到的最佳SRV_AP或SRV_AP系列。配置、通信路径和其他改变是自动并且在传输过程中(on the fly)进行的,所需的用户交互或干预极小或者为零。Algorithms continuously analyze the current network state, taking into account subsequent trends plus long-term historical performance, to determine the best traffic route to take and the best SRV_AP or SRV_AP series to push traffic to. Configuration, communication paths, and other changes are made automatically and on the fly, requiring minimal or no user interaction or intervention.

EPD和SRV_AP中的高级智能路由确保了流量通过尽可能简单的GVN的“第三层”,经由最理想的路径从起点流动到目的地的。连接至GVN的客户端设备将该第三层视作正常的互联网路径,但与经由常规互联网流动到相同目的地的流量相比,它的跳跃数量较少、安全性更高并且在大多数情况下,延迟时间较短。逻辑和自动化在GVN的“第二层”操作,在所述第二层中,GVN的软件自动监测并控制虚拟接口(VIF)的下层路由和构造、多个隧道以及通信路径的结合。GVN的第三层和第二层存在于GVN的可操作的“第一层”之上,该第一层与底层互联网设备交互。Advanced intelligent routing in EPD and SRV_AP ensures that traffic flows from its origin to its destination via the most optimal path through the simplest possible GVN "Layer 3." Client devices connected to the GVN view this Layer 3 as a normal Internet path, but with fewer hops, greater security, and, in most cases, lower latency than traffic flowing to the same destination via the regular Internet. Logic and automation operate at the GVN's "Layer 2," where the GVN's software automatically monitors and controls the underlying routing and construction of virtual interfaces (VIFs), multiple tunnels, and the bonding of communication paths. The GVN's Layers 3 and 2 exist above the GVN's operational "Layer 1," which interacts with the underlying Internet devices.

发明内容Summary of the Invention

本发明公开了用于经由虚拟全局网络来连接设备的系统和方法。所述网络系统可包括与第一端点设备通信的第一设备。所述网络系统可包括与第二端点设备通信的第二设备。所述第一设备和所述第二设备可与通信路径连接。所述通信路径可包括将每个端点设备连接至一个或多个中间接入点服务器和一个或多个控制服务器的一个或多个中间隧道。The present invention discloses a system and method for connecting devices via a virtual global network. The network system may include a first device communicating with a first endpoint device. The network system may include a second device communicating with a second endpoint device. The first device and the second device may be connected to a communication path. The communication path may include one or more intermediate tunnels connecting each endpoint device to one or more intermediate access point servers and one or more control servers.

根据本实施例的其他方面,所述第一端点设备和中间接入点服务器中的至少一个被配置用于执行域名系统(DNS)查询以定位所述第二设备。According to other aspects of this embodiment, at least one of the first endpoint device and the intermediate access point server is configured to perform a Domain Name System (DNS) query to locate the second device.

根据本实施例的其他方面,所述第一端点设备和中间接入点服务器中的至少一个被配置用于从高速缓冲存储器执行域名系统(DNS)查询以定位所述第二设备。According to other aspects of this embodiment, at least one of the first endpoint device and the intermediate access point server is configured to perform a Domain Name System (DNS) query from a cache memory to locate the second device.

根据本实施例的其他方面,所述中间接入点服务器中的至少一个被配置用于缓存内容。According to other aspects of this embodiment, at least one of the intermediate access point servers is configured to cache content.

根据本实施例的其他方面,所述端点设备和中间接入点服务器中的至少一个被配置用于基于全局虚拟网络执行智能路由。According to other aspects of this embodiment, at least one of the endpoint device and the intermediate access point server is configured to perform intelligent routing based on the global virtual network.

根据本实施例的其他方面,所述智能路由基于最佳带宽、最低延迟时间、最少跳跃和无分组丢失中的至少一个。According to other aspects of this embodiment, the intelligent routing is based on at least one of best bandwidth, lowest delay time, least hops, and no packet loss.

根据本实施例的其他方面,所述智能路由基于实时统计和历史统计中的至少一个。According to other aspects of this embodiment, the intelligent routing is based on at least one of real-time statistics and historical statistics.

根据本实施例的其他方面,所述端点设备和中间接入点服务器中的至少一个被配置用于执行防火墙服务。According to other aspects of this embodiment, at least one of the endpoint device and the intermediate access point server is configured to perform firewall services.

根据本实施例的其他方面,所述防火墙服务在所述第一设备与所述中间接入点服务器之间。According to other aspects of this embodiment, the firewall service is between the first device and the intermediate access point server.

根据本实施例的其他方面,所述防火墙服务在所述第一设备与中间接入点服务器和所述第二端点服务器之间。According to other aspects of this embodiment, the firewall service is between the first device and an intermediate access point server and the second endpoint server.

附图说明BRIEF DESCRIPTION OF THE DRAWINGS

为了便于更全面理解本发明,现在参考附图,在附图中,类似的元件采用类似的数字或参考符号进行标记。这些附图不应被解释为限制本发明,而旨在仅仅用于示例性目的。In order to facilitate a more complete understanding of the present invention, reference is now made to the accompanying drawings, in which similar elements are marked with similar numerals or reference symbols. These drawings should not be interpreted as limiting the present invention, but are intended to be used for illustrative purposes only.

图1示出了由全局虚拟网络(“GVN”)使用并实现的技术的方框图。FIG1 illustrates a block diagram of techniques used and implemented by a global virtual network ("GVN").

图2示出了互联网的高级别方框图。Figure 2 shows a high-level block diagram of the Internet.

图3是示出经由域名系统(DNS)的统一资源定位符(URL)至数字互联网协议(IP)的解析的方框图。3 is a block diagram illustrating the resolution of a Uniform Resource Locator (URL) to a numeric Internet Protocol (IP) via the Domain Name System (DNS).

图4是示出将数据从主机客户端设备(C##)传输到另一主机客户端或主机服务器设备(S##)所采用的上游和下游路径的简图。4 is a simplified diagram illustrating the upstream and downstream paths taken by data from a host client device (C##) to another host client or host server device (S##).

图5是示出将数据从主机客户端设备(C##)传输到另一主机客户端或主机服务器设备(S##)所采用的路径中的边界交换的简图。5 is a simplified diagram illustrating boundary switches in the path taken by data from a host client device (C##) to another host client or host server device (S##).

图6示出了互联网上存在的一些示例威胁和问题。FIG6 illustrates some example threats and issues that exist on the Internet.

图7示出了内容传递网络(CDN)解析和区域特定内容的传递。FIG. 7 illustrates content delivery network (CDN) resolution and delivery of region-specific content.

图8示出了代理服务器的操作。FIG8 illustrates the operation of the proxy server.

图9示出了在两个网关设备之间建立的点对点隧道。FIG9 shows a point-to-point tunnel established between two gateway devices.

图10示出了在设备范围、全系统范围、通信范围和设备协作之间的安全特征的关系。FIG10 shows the relationship of security features between device scope, system-wide scope, communication scope, and device cooperation.

图11示出了全局虚拟网络的设备之间的信息流。FIG11 shows the information flow between devices in a global virtual network.

图12描述了用于支持GVN中的一些设备的自动化的堆栈。Figure 12 depicts the stack used to support automation of some devices in the GVN.

图13示出了包括互联网或暗色光纤上的主干段的GVN拓扑。FIG13 shows a GVN topology including a backbone segment on the Internet or dark fiber.

图14示出了在由GVN实现的云中的分布式防火墙(FW)。FIG14 shows a distributed firewall (FW) in a cloud implemented by a GVN.

图15示出了由全局虚拟网络驱动的云中的多周界防火墙(MPFW)。Figure 15 shows a multi-perimeter firewall (MPFW) in the cloud driven by a global virtual network.

图16示出了作为全局虚拟网络(GVN)的一部分共同工作的三种类型的网络设备的软件架构的逻辑视图。FIG16 shows a logical view of the software architecture of three types of network devices working together as part of a global virtual network (GVN).

图17示出了使用具有主干段和八角形路由的轴辐式(hub and spoke)拓扑的GVN。FIG. 17 illustrates a GVN using a hub and spoke topology with backbone segments and octagonal routing.

图18示出了在北美、欧洲和亚洲的一些GVN全局节点与其对应服务区之间的主干连接。FIG18 shows the backbone connections between some GVN global nodes and their corresponding service areas in North America, Europe, and Asia.

图19示出了在GVN内的各个设备之间的连接性。FIG19 illustrates the connectivity between various devices within the GVN.

图20示出了GVN模块和设备的交互方式。Figure 20 shows how the GVN modules and devices interact.

图21示出了关于GVN模块和设备之间的交互方式的额外细节。FIG21 shows additional details about how the GVN modules and devices interact.

图22示出了GVN模块和设备在互联网上与其他设备的交互方式。Figure 22 shows how the GVN modules and devices interact with other devices on the Internet.

图23示出端点设备(EPD)与接入点服务器(SRV_AP)之间的多个隧道连接性。FIG23 illustrates multiple tunnel connectivity between an endpoint device (EPD) and an access point server (SRV_AP).

图24是当今互联网的工作原理的简化示例图,其中考虑到跳跃计数或生存时间(TTL)以及由于对等关系和相关路由政策采取的路径。Figure 24 is a simplified example diagram of how the Internet works today, taking into account hop counts or time to live (TTL) and the paths taken due to peering relationships and associated routing policies.

图25示出了用以增强性能的基础设施的策略定位。Figure 25 shows the strategic positioning of infrastructure to enhance performance.

图26示出了GVN结合诸如网络弹射(Network Slingshot)等技术的方式。Figure 26 shows how GVN incorporates technologies such as Network Slingshot.

图27示出了在各种GVN设备的数据库中的表如何彼此相关。FIG27 shows how the tables in the databases of the various GVN devices relate to each other.

图28示出了在各个模块、机制、技术和GVN其他组件之间的协作成果。Figure 28 shows the collaborative efforts among various modules, mechanisms, technologies and other components of GVN.

图29示出了GVN的高级智能路由(ASR)特征。Figure 29 shows the Advanced Smart Routing (ASR) feature of GVN.

图30示出了在客户端(C)与服务器(S)之间建立一系列加密隧道。Figure 30 shows a series of encrypted tunnels established between a client (C) and a server (S).

图31示出了对等体对中的两个对等体所需的信息流。Figure 31 shows the information flow required for both peers in a peer pair.

图32至图35示出了相对于GVN隧道的中立性和安全性的GVN的第三层。32 to 35 illustrate the third layer of the GVN with respect to the neutrality and security of the GVN tunnel.

图36示出了将多个网络结构共同编织成网络毯式框架(Tapestry)。FIG36 shows weaving multiple network structures together into a network tapestry framework.

图37示出了GVN中用于自动设备协作的通信路径。FIG37 shows the communication paths for automatic device collaboration in GVN.

图38示出了动态隧道建立的问题和挑战。Figure 38 illustrates the issues and challenges of dynamic tunnel establishment.

图39示出了经由两个或更多个EPD将两个LAN桥接为广域网(WAN)。FIG. 39 illustrates bridging two LANs into a wide area network (WAN) via two or more EPDs.

图40示出了在GVN上运行的多周界防火墙机制(MPFWM)。Figure 40 shows a Multi-Perimeter Firewall Mechanism (MPFWM) running on a GVN.

图41示出了建立在互联网顶部之上(OTT)的GVN堆栈。Figure 41 shows a GVN stack built on top of the Internet (OTT).

图42将互联网协议IP堆栈、OSI模型和GVN网络堆栈进行比较。Figure 42 compares the Internet Protocol IP stack, the OSI model, and the GVN network stack.

图43示出了国家之间经由众多可能路由的全局互联网流。Figure 43 shows the global Internet flows between countries via numerous possible routes.

图44将互联网协议IP堆栈、OSI模型和GVN网络堆栈进行比较。Figure 44 compares the Internet Protocol IP stack, the OSI model, and the GVN network stack.

图45示出了两个LAN之间经由GVN的隧道。Figure 45 shows a tunnel between two LANs via a GVN.

图46示出了GNV层1、层2和层3操作。Figure 46 shows GNV layer 1, layer 2 and layer 3 operations.

图47示出了高级智能路由(ASR)特征以及端点设备(EPD)内的GVN的地理目的地机制的元素。Figure 47 shows the Advanced Smart Routing (ASR) feature and elements of the geographic destination mechanism of the GVN within the endpoint device (EPD).

图48示出经由GVN采取的多个并行型流量路径的示例。FIG. 48 shows an example of multiple parallel traffic paths taken via a GVN.

图49描述了从一个设备到第二个设备的自动高级智能路由(ASR)。Figure 49 depicts automatic Advanced Smart Routing (ASR) from one device to a second device.

图50示出了低于周界的BB/主干层与高于周界的IP/互联网层之间的安全周界。Figure 50 shows the security perimeter between the BB/backbone layer below the perimeter and the IP/Internet layer above the perimeter.

图51是全局虚拟网络(GVN)内的高级智能路由(ASR)的流程图。Figure 51 is a flow chart of Advanced Smart Routing (ASR) within a Global Virtual Network (GVN).

图52是通过GVN从起点到目的地可用的各种路由的流程图。Figure 52 is a flow diagram of the various routes available from an origin to a destination through the GVN.

图53是控制从起点设备到端点设备的流量路由选择的算法的流程图。53 is a flow chart of an algorithm that controls the routing of traffic from an origin device to an endpoint device.

图54示出了GVN中的自动设备协作和信息交换所需的模块。Figure 54 shows the modules required for automatic device collaboration and information exchange in GVN.

图55示出了经由GVN的中立API机制(NAPIM)的EPD、SRV_CNTRL和SRV_AP之间的通信。FIG55 shows the communication between EPD, SRV_CNTRL and SRV_AP via the Neutral API Mechanism (NAPIM) of GVN.

图56示出了经由NAPIM的GVN设备之间可用的各种类型的通信。FIG56 illustrates various types of communications available between GVN devices via NAPIM.

图57描述了全局虚拟网络(GVN)内的不同类型设备之间的API调用组。Figure 57 depicts the API call groups between different types of devices within a global virtual network (GVN).

图58描述了从客户端设备发起,通过发送到服务器设备并返回客户端的API调用所采取的步骤。Figure 58 describes the steps taken by an API call initiated from a client device, sent to a server device, and returned to the client.

图59是示出EPD与SRV_AP之间用于获得地理目的地功能性的交互的流程图。Figure 59 is a flow chart showing the interaction between the EPD and SRV_AP to obtain geographic destination functionality.

图60描述了地理目的地内的设备协作。Figure 60 depicts device collaboration within a geographic destination.

图61示出了全局分布的平行文件系统(PFS)在GVN内的操作方式。Figure 61 shows how a globally distributed parallel file system (PFS) operates within a GVN.

具体实施方式DETAILED DESCRIPTION

概述Overview

出由全局虚拟网络(“GVN”)使用和实现的技术的方框图,所述全局虚拟网络包括GVN核心元件G0、GVN模块G100和由全局虚拟网络GVN实现的技术G200。GVN核心包括机制概览G1以及它的构成部分,即拓扑G2层、构造G3层、逻辑G4层和控制G5层。GVN核心G0还包括相对于GVN元件G6以及与这些GVN元件之间的关系。FIG2 is a block diagram illustrating the technologies used and implemented by a global virtual network ("GVN"), including the GVN core component G0, GVN modules G100, and the technologies G200 implemented by the global virtual network GVN. The GVN core includes a mechanism overview G1 and its components, namely the topology G2 layer, the fabric G3 layer, the logic G4 layer, and the control G5 layer. The GVN core G0 also includes information about and relationships between GVN elements G6.

GVN可包括插件和/或独立GVN模块G100,所述模块包括但不限于:PCT/US16/12178中所述的中立API机制(“NAPIM”)模块G102;PCT/US15/64242中所述的地理目的地(“Geo-D”)模块G104;美国临时专利申请US62/151,174中所述的高级智能路由(“ASR”)模块G106、连接模块G108和其他模块G110。The GVN may include plug-ins and/or independent GVN modules G100, including but not limited to: the Neutral API Mechanism ("NAPIM") module G102 described in PCT/US16/12178; the Geographic Destination ("Geo-D") module G104 described in PCT/US15/64242; the Advanced Intelligent Routing ("ASR") module G106, the Connection Module G108 and other modules G110 described in U.S. Provisional Patent Application US62/151,174.

GVN还提供可实现其他技术的平台,所述技术包括但不限于:网络毯式框架(Network Tapestry)G202;MPFWM G204;网络弹射(Network Slingshot)G206;网络信标G208、信号粒度(Granularity of a tick)G210和其他技术G212。这些在美国临时专利申请第62/174,394号、美国临时专利申请第62/266,060号中描述。GVN also provides a platform for implementing other technologies, including but not limited to: Network Tapestry G202; MPFWM G204; Network Slingshot G206; Network Beacons G208; Granularity of a Tick G210; and Other Technologies G212. These are described in U.S. Provisional Patent Application Nos. 62/174,394 and 62/266,060.

GVN模块(G100)和由GVN实现的技术(G200)可作为GVN的构成部分在现有GVN之上操作,或可为独立的并且采用GVN的所有或一些分离部分来支持其自身的独立操作。The GVN module (G100) and the technology implemented by the GVN (G200) may operate on top of an existing GVN as an integral part of the GVN, or may be independent and employ all or some separate parts of the GVN to support its own independent operation.

图2示出了互联网的高级别方框图。一般用户对互联网如何运作的理解非常粗略。主机源2100是起点并且表示客户端设备,所述客户端设备可以是计算机、移动电话、平板设备、膝上型计算机或其他此类客户端。此客户端经由互联网2200连接至主机服务器2300以发送或检索内容,或连接至另一主机客户端2303以发送或接收信息。Figure 2 shows a high-level block diagram of the Internet. The average user has a very rough understanding of how the Internet works. A host source 2100 is the starting point and represents a client device, which can be a computer, mobile phone, tablet, laptop, or other such client. This client connects to a host server 2300 via the Internet 2200 to send or retrieve content, or to another host client 2303 to send or receive information.

技术知识较低的用户可能会认为流量是沿着路径2P002到达主机服务器的,甚至不了解他们的数据将会通过互联网中转。或者,他们可能认为流量经由路径2P006直接流至另一客户端设备。Users with less technical knowledge might assume that traffic follows path 2P002 to the host server, not even realizing that their data will transit through the Internet. Alternatively, they might assume that traffic flows directly to another client device via path 2P006.

对互联网如何运作的了解更多的用户会理解,流量经由路径2P004流至互联网2200,并且随后经由路径2P102流至主机服务器目标2300或经由路径2P104流至主机(客户端)目标2302。Users with more knowledge of how the Internet works will understand that traffic flows to the Internet 2200 via path 2P004 and then flows to the host server target 2300 via path 2P102 or to the host (client) target 2302 via path 2P104.

了解更多技术知识的用户将进一步理解,当发送电子邮件时,此电子邮件将离开其客户端设备2100,经由路径2P004传输至互联网2200并且随后经由路径2P202传输至电子邮件服务器2202。随后电子邮件的接收者将经由其主机客户端2302,沿着到达互联网的路径2P104,然后沿着到达邮件服务器2202的路径2P204请求取回该电子邮件。A more technically savvy user will further understand that when an email is sent, it leaves their client device 2100, travels via path 2P004 to the Internet 2200, and then travels via path 2P202 to the email server 2202. The recipient of the email will then request retrieval of the email via their host client 2302, along path 2P104 to the Internet, and then along path 2P204 to the mail server 2202.

一般人对互联网的了解程度大约就是这样。This is roughly how much the average person knows about the Internet.

图3是示出经由域名系统(DNS)的统一资源定位符(URL)至数字互联网协议(IP)的解析的方框图。3 is a block diagram illustrating the resolution of a Uniform Resource Locator (URL) to a numeric Internet Protocol (IP) via the Domain Name System (DNS).

作为文件或数据流或数据块的从主机客户端(C)3100到主机服务器(S)3300的内容请求3000或推送从主机客户端(C)3100流至主机服务器(S)3300。响应或内容传递3002作为文件或数据流或数据块从主机S返回到主机C。与主机服务器(S)成客户端-服务器(CS)关系的主机客户端设备3100请求访问来自远程主机服务器(S)的内容或经由统一资源定位符(URL)或其他网络可达地址将数据发送到远程主机服务器(S)。Content is requested 3000 from a host client (C) 3100 to a host server (S) 3300 as a file or data stream or data chunks or is pushed from the host client (C) 3100 to the host server (S) 3300. A response or content delivery 3002 is returned from the host S to the host C as a file or data stream or data chunks. A host client device 3100 in a client-server (CS) relationship with a host server (S) requests access to content from a remote host server (S) or sends data to a remote host server (S) via a uniform resource locator (URL) or other network-reachable address.

从主机客户端(C)3100至互联网3206的初始连接示出为3P02,即从主机客户端(C)至可直接面对的存在点(POP)3102的连接。在其他情形中,主机客户端(C)可位于局域网(LAN)中,所述局域网随后经由存在点(POP)连接至互联网并且可被称为最后一英里连接。存在点(POP)3102表示服务供应商(ISP)经由它们的网络和互连提供的从端点到互联网的连接。这可以是但不限于电缆、光纤、DSL、以太网、卫星、拨号和其他连接。若URL是域名而非数字地址,则将此URL发送至域名系统(DNS)服务器3104,在该服务器中,出于路由目的将域名转换为IPv4或IPv6或其他地址。The initial connection from the host client (C) 3100 to the Internet 3206 is shown as 3P02, that is, the connection from the host client (C) to the point of presence (POP) 3102 that can be directly faced. In other cases, the host client (C) may be located in a local area network (LAN), which is then connected to the Internet via a point of presence (POP) and can be called the last mile connection. The point of presence (POP) 3102 represents the connection from the endpoint to the Internet provided by the service provider (ISP) via their network and interconnection. This can be, but is not limited to, cable, fiber, DSL, Ethernet, satellite, dial-up and other connections. If the URL is a domain name rather than a numeric address, then this URL is sent to a domain name system (DNS) server 3104, where the domain name is converted to an IPv4 or IPv6 or other address for routing purposes.

从主机客户端(C)3100至主机服务器(S)3300的流量通过互联网3206路由,这表示POP(3102和3302)之间的传输,其中包括对等、回程或网络边界的其他传输。Traffic from host client (C) 3100 to host server (S) 3300 is routed over the Internet 3206, which represents transmission between POPs (3102 and 3302), including peering, backhaul, or other transmission at network boundaries.

POP 3102与域名系统3104之间用以从统一资源定位符(URL)查找数字地址以获得IPv4地址或目标服务器(S)的其他数字地址的连接3P04可直接访问从POP或经由互联网3206访问。从ISP的POP 3102至互联网3206的连接3P06可为单宿主或多宿主连接。相似地,从互联网3206至远程ISP的连接3P08也可为单宿主或多宿主连接。此连接一般是连接到ISP或互联网数据中心(IDC)的面向互联网的POP 3302。从远程ISP的POP 3302至主机服务器(S)的连接3P10可为直接的或经由多个跳跃。The connection 3P04 between the POP 3102 and the Domain Name System 3104, which is used to look up a numeric address from a Uniform Resource Locator (URL) to obtain an IPv4 address or other numeric address of a target server (S), can be accessed directly from the POP or via the Internet 3206. The connection 3P06 from the ISP's POP 3102 to the Internet 3206 can be a single-hosted or multi-hosted connection. Similarly, the connection 3P08 from the Internet 3206 to the remote ISP can also be a single-hosted or multi-hosted connection. This connection is typically to the Internet-facing POP 3302 of the ISP or Internet Data Center (IDC). The connection 3P10 from the remote ISP's POP 3302 to the host server (S) can be direct or via multiple hops.

经由域名系统进行的从URL或主机名至数字地址的查找是目前互联网上的标准,并且系统假设DNS服务器是一体的并且DNS服务器结果是当前结果并且可信任。Lookups from URLs or hostnames to numeric addresses via the Domain Name System are currently standard on the Internet, and the system assumes that the DNS servers are integrated and that DNS server results are current and trustworthy.

图4是示出将数据从主机客户端设备(C##)传输到另一主机客户端或主机服务器设备(S##)所采用的上游和下游路径的简图。诸如C01或S08等设备标签中所用的数字是用于定位各个设备的标识目的,并且数字本身不意指或暗示一个设备比另一个设备更大或具有更大功率。Figure 4 is a simplified diagram illustrating the upstream and downstream paths taken by data from a host client device (C##) to another host client or host server device (S##). The numbers used in device labels, such as C01 or S08, are for identification purposes to locate the individual devices, and the numbers themselves do not imply or suggest that one device is larger or has more power than another.

图4示出主机客户端设备(C##)、主机服务器设备(S##)、交换机(SW##)、路由器(R##)、区域路由器(RR##)、边缘路由器(ER##)、核心路由器(CR##)。通信路径或管道(P##)是指两个设备之间的连接并且线路厚度用以表示管道的大小或带宽容量。线路越薄,每秒兆位(Mbp)越低。线路越厚,每秒Mbp或千兆位(Gbp)的量越高。P##的距离并非按比例绘制并且当提及设备间的P##时不考虑跳跃计数或生存时间(TTL)和延迟时间或往返时延(RTT)。Figure 4 shows a host client device (C##), a host server device (S##), a switch (SW##), a router (R##), a regional router (RR##), an edge router (ER##), and a core router (CR##). A communication path or pipe (P##) refers to the connection between two devices, and the thickness of the line is used to represent the size of the pipe or its bandwidth capacity. The thinner the line, the lower the megabits per second (Mbps). The thicker the line, the higher the Mbps or gigabits per second (Gbp). P## distances are not drawn to scale, and hop counts or time to live (TTL) and latency or round-trip time (RTT) are not considered when referring to P## between devices.

简化局域网(LAN)在交换机(SW)SW01的下游。它由连到客户端设备C01和C04的电线连接P01和P04组成。无线连接用无线集线器WLAN01与无线客户端设备C02和C03之间的虚线P02和P03表示。A simplified local area network (LAN) is downstream of switch (SW) SW01. It consists of wired connections P01 and P04 to client devices C01 and C04. Wireless connections are represented by dashed lines P02 and P03 between wireless hub WLAN01 and wireless client devices C02 and C03.

LAN与其互联网服务供应商(ISP)的存在点(POP)R01之间的连接P05还可被称为“最后一英里”。此POP R01是将其他辐条P06、P07、P08和P09连接至诸如SW02、SW03、SW04和SW05等其他客户端的对应交换机的中心。还存在通向区域路由器(RR)RR02的上游路径P16。The connection P05 between the LAN and its internet service provider's (ISP) point of presence (POP) R01 can also be called the "last mile." This POP R01 is the hub that connects the other spokes P06, P07, P08, and P09 to corresponding switches at other clients, such as SW02, SW03, SW04, and SW05. There is also an upstream path P16 to the regional router (RR) RR02.

这种轴辐式(hub and spoke)拓扑被图示成用于POP R02、R03和R04,它们与相应交换机(例如,SW06、SW07、SW08、SW09、SW10、SW11、SW12、SW13、SW14、SW15、SW16、SW17、SW18、SW19、SW20)的轮辐连接(例如,P10、P11、P12、P13、P14、P15、P51、P52、P53、P54、P55、P56、P57、P58、P86)以及它们与至其区域路由器(例如,RR02、RR03、RR04、RR05)的连接(例如,P17、P18、P46、P28)。This hub and spoke topology is illustrated for POPs R02, R03, and R04, their spoke connections (e.g., P10, P11, P12, P13, P14, P15, P51, P52, P53, P54, P55, P56, P57, P58, P86) to their respective switches (e.g., SW06, SW07, SW08, SW09, SW10, SW11, SW12, SW13, SW14, SW15, SW16, SW17, SW18, SW19, SW20), and their connections (e.g., P17, P18, P46, P28) to their regional routers (e.g., RR02, RR03, RR04, RR05).

从区域路由器RR02至边缘路由器ER02的进一步上游连接P19描述了通向ISP网络的边缘路由器的连接。边缘路由器ER02具有通向核心路由器CR03的链路P20。这可被认为是互联网的主干。CR01与CR02之间的链路P32可描述非常大型的主干,所述主干被称为回程网络或当连接多个国家网络时可被称为国际回程网络。A further upstream connection P19 from regional router RR02 to edge router ER02 describes the connection to an edge router of the ISP network. Edge router ER02 has a link P20 to core router CR03. This can be considered the backbone of the Internet. Link P32 between CR01 and CR02 can describe a very large backbone, known as a backhaul network or, when connecting multiple national networks, an international backhaul network.

POP R01和R02均被连接至区域路由器RR02并且这可表明但不限于这两个POP位于相同ISP的网络内。POPs R01 and R02 are both connected to regional router RR02 and this may indicate, but is not limited to, that these two POPs are within the same ISP's network.

对于路由器R01网络内的设备与路由器R04网络内的设备之间的连接性,流量将采用许多可能路径中的一个路径,诸如P16->P19->P20->P30->P31->P24->P27->P28。这可能描述两个或更多个不同ISP的网络之间的连接性对等,并且它们的中间潜在地存在其他运营商对等点,具体取决于流量传输通过的基础设施的拥有者。通过主干的流量将由潜在最高容量管道传输。路由器R01与路由器R04之间的流量还可经由路径P16->P41->P44->P23->P27->P28传输。尽管该路径可能看起来更短,但是由于管道大小、中间设备、中间ISP的对等关系和政策,该第二路径在控制边缘路由器ER03以在两个其他ISP之间进行流量传输方面的效率可能最低。它们之间还可能存在隘口点。For connectivity between devices within Router R01's network and devices within Router R04's network, traffic will take one of many possible paths, such as P16->P19->P20->P30->P31->P24->P27->P28. This may describe connectivity peering between two or more different ISPs' networks, with potential for other carrier peering points in between, depending on the owner of the infrastructure through which the traffic is transmitted. Traffic passing through the backbone will be carried by the pipe with the highest potential capacity. Traffic between Router R01 and Router R04 can also be carried via the path P16->P41->P44->P23->P27->P28. While this path may appear shorter, due to pipe size, intermediate devices, peering relationships, and policies of the intermediate ISPs, this second path may be the least efficient for controlling edge router ER03 to route traffic between the two other ISPs. There may also be bottlenecks between them.

图示的另一特征是连接至交换机SW13的主机服务器S08至S12的连接性。这可在互联网数据中心(IDC)中或在LAN中。交换机SW13同时经由P53连接至路由器R03并且经由P46连接至区域路由器RR04。连接P46可描述用于增强连接性的租用线路或直接数字连接。Another feature shown is the connectivity of host servers S08 to S12 connected to switch SW13. This could be in an Internet data center (IDC) or in a local area network (LAN). Switch SW13 is also connected to router R03 via P53 and to regional router RR04 via P46. Connection P46 could represent a leased line or direct digital connection for enhanced connectivity.

此图中示出的另一特征是P32位于路径可达到的最上游处,并且独立主机设备位于路径可达到的最下游处。核心处理器CR04、CR06和CR07的下游是连接至区域路由器RR##的边缘路由器ER##,所述区域路由器向下连接至位于POP中的路由器R##。Another feature shown in this figure is that P32 is located at the most upstream path reachable, and the independent host device is located at the most downstream path reachable. Downstream of the core processors CR04, CR06, and CR07 is the edge router ER## connected to the regional router RR##, which is connected down to the router R## located in the POP.

可能存在本文中未作描述的其他可能性并且事实上,每个路由器R##具有通向交换机SW##的多个辐条并且设备之间存在大量更多管道P##。序列中还可能存在更多层等效区域路由器RR##或边缘路由器ER##设备或其他设备。There may be other possibilities not described herein and in fact, each router R## has multiple spokes leading to switches SW## and there are many more pipes P## between devices. There may also be more layers of equivalent regional routers RR## or edge routers ER## devices or other devices in the sequence.

图5是示出将数据从主机客户端设备(C##)传输到另一主机客户端或主机服务器设备(S##)所采用的路径中的边界交换的简图。这可与图4非常相似,但有一个例外。在核心路由器CR01与核心路由器CR02之间的主干上,在它们之间的对等路径上的特定点处存在一系列边界交换机400,这些交换机中的每个交换机相对于主干作为一个整体的容量有限,并且这些交换机之间可能存在拥塞事件。FIG5 is a simplified diagram illustrating edge switches in the path taken by data from a host client device (C##) to another host client or host server device (S##). This is very similar to FIG4, with one exception. On the backbone between core routers CR01 and CR02, a series of edge switches 400 exist at specific points on the peering path between them. Each of these switches has a limited capacity relative to the backbone as a whole, and congestion events may occur between these switches.

图6示出了互联网上存在的一些示例威胁和问题。图中已经简化了网络数据路径,以对连接性进行概述,并且重点说明来自端点设备(EPD)的威胁和来自中间设备的其他威胁。Figure 6 shows some example threats and issues that exist on the Internet. The network data path has been simplified in the figure to provide an overview of connectivity and to highlight threats from endpoint devices (EPDs) and other threats from intermediate devices.

来自主机客户端设备C002的从主机服务器设备207检索内容请求应采用路径P109->P105->P103->P102->P101并且经由互联网101传输至CP01->CP02->P205->P207。合法的互联网数据中心(IDC)可能存在负载平衡器,所述平衡器将流量发送至健康的主机服务器207(经由P207)或被感染的主机服务器206(经由P206)。被感染的主机服务器可能将恶意软件或病毒或其他不良内容发送回客户端设备C002。A request from a host client device C002 to retrieve content from a host server device 207 should take the path P109->P105->P103->P102->P101 and be transmitted via the Internet 101 to CP01->CP02->P205->P207. A legitimate Internet data center (IDC) may have a load balancer that sends traffic to a healthy host server 207 (via P207) or an infected host server 206 (via P206). An infected host server may send malware, viruses, or other objectionable content back to the client device C002.

另一威胁是将合法流量重定向至被骗主机服务器114。流量应采用上文所述的C02与207之间的路径,然而被骗服务器可吸走合法流量。流量将仍采用诸如P109->P105->P103->P102->P101等路径并且通过互联网101,但流量不会经由CP01传输到合法服务器,而是经由P113至P114传输至被骗服务器114。Another threat is redirecting legitimate traffic to the spoofed host server 114. Traffic should follow the path between C02 and 207 described above, but the spoofed server can siphon legitimate traffic away. Traffic will still follow a path such as P109->P105->P103->P102->P101 and pass through Internet 101, but rather than traveling to the legitimate server via CP01, it will instead travel to the spoofed server 114 via P113 and P114.

被骗服务器可被设计用于通过对互联网用户看起来像真实服务器而对保密信息或凭证或其他数据进行钓鱼攻击。一般用户无法区分合法服务器与被骗服务器。第三方还可能使用被骗服务器通过发送回无效流量或已更改内容来阻止将合法流量传输到客户端。Spoofed servers can be designed to conduct phishing attacks for confidential information, credentials, or other data by appearing to internet users like legitimate servers. Regular users cannot distinguish legitimate servers from spoofed servers. A third party can also use spoofed servers to block legitimate traffic from reaching clients by sending back invalid traffic or altered content.

公共域名系统(DNS)服务器可用在互联网上以由客户端设备查询,进而将统一资源定位符(URL)例如域名www.thisdomain.com转换为数字IP地址例如IPv4或IPv6地址,以便来自主机客户端设备的流量可找到通向主机服务器设备的路径。Public Domain Name System (DNS) servers are available on the Internet to be queried by client devices to convert Uniform Resource Locators (URLs), such as the domain name www.thisdomain.com, into numeric IP addresses, such as IPv4 or IPv6 addresses, so that traffic from a host client device can find its way to a host server device.

若诸如212或116等DNS服务器中毒112或被骗114,则转换的数字IP地址可能成为被送到非法的或被破坏的目的地设备的不正确引导流量。DNS可在互联网上被破坏的另一方式是设备不传递结果或传递不正确结果而不当操作。将变化从主DNS注册服务器传播到DNS服务器还需要清楚有效的连接性,否则索引结果可能变得丧失时效或错误。将通过安全DNS(DNSSEC)服务器110及其经由P19的连接性来说明如何保护DNS查找及使DNS查找安全的示例。这依赖于客户端设备连接至DNS服务器110并且它们的“握手”不被中断的能力。If a DNS server such as 212 or 116 is poisoned 112 or spoofed 114, the converted numeric IP address may be the source of incorrectly directed traffic to an illegitimate or compromised destination device. Another way DNS can be compromised on the Internet is if a device does not deliver results or delivers incorrect results and operates improperly. Propagating changes from the primary DNS registration server to the DNS servers also requires clear and valid connectivity, otherwise the index results may become outdated or erroneous. An example of how to protect and secure DNS lookups will be illustrated using a secure DNS (DNSSEC) server 110 and its connectivity via P19. This relies on the ability of client devices to connect to the DNS server 110 and have their "handshake" not be interrupted.

即便当主机客户端和主机服务器设备均正确操作时,由于互联网未加密,仍存在非常真实的风险,即插入通向诸如邮件服务器203等主机服务器的通信路径中的中间点的嗅探器或拦截设备204可能截取并捕获数据。尽管送往邮件服务器203的流量应从互联网201经由P202到POP 202到P203路径流到邮件服务器203,嗅探器或拦截设备204将经由P204使得流量通过该204并且送往P222。非常难以检测此类干扰,除非能够确切地将通信路径中的跳跃的IP地址识别成属于恶意设备,而不是作为互联网基础设施的一部分的另一路由器。Even when both the host client and host server devices are operating correctly, because the Internet is unencrypted, there is a very real risk that a sniffer or interception device 204 inserted at an intermediate point in the communication path to a host server, such as mail server 203, could intercept and capture data. Although traffic destined for mail server 203 should flow from Internet 201 to POP 202 to P203 to mail server 203, the sniffer or interception device 204 will cause the traffic to pass through P204 and to P222 via P204. Detecting such interference is very difficult unless the IP address of a hop in the communication path can be positively identified as belonging to a malicious device, rather than another router that is part of the Internet infrastructure.

一个日益增长的威胁来自由一组感染设备213、215、216构成的BOT网络,所述感染设备由诸如214等命令和控制(C&C)服务器控制。这些设备可共同地执行批量攻击,例如分布式拒绝服务(DDoS),其中主机服务器设备可能被大量涌入它们容量中的过多请求淹没,导致分离出来自合法主机客户端设备的请求变得缓慢或者完全无法解析。A growing threat comes from BOT networks consisting of a group of infected devices 213, 215, 216 controlled by a command and control (C&C) server such as 214. These devices can collectively perform bulk attacks, such as distributed denial of service (DDoS), in which host server devices may be overwhelmed by too many requests flooding into their capacity, causing requests from legitimate host client devices to become slow to parse or completely fail to parse.

BOT网络还可用以在C&C服务器的协调下执行秘密黑客攻击,因此与来自单一IP地址的相同攻击相比,尝试词典密码攻击的大批不同来源的IP地址将更难以完全阻止。BOT networks can also be used to carry out covert hacking attacks coordinated by a C&C server, so a large number of different IP addresses attempting dictionary password attacks will be more difficult to completely block than the same attack from a single IP address.

BOT网络还是用于垃圾(SPAM)电子邮件、钓鱼电子邮件、恶意软件分布和其他恶意目的的分布机制。BOT networks are also a distribution mechanism for spam emails, phishing emails, malware distribution, and other malicious purposes.

诸如304等国家防火墙会阻止自由信息流。这些防火墙可用作阻止国家认为不良流量的审查工具。它亦可用作暗地窃取工业、商业或其他机密的拦截设备。根据当日时间、总互联网流量和这些国家防火墙的健康状况,传输通过它们的流量可能遭受延迟时间或分组丢失,或者被成形为最大带宽进而形成瓶颈,或者以上全部或甚至其他问题的组合。National firewalls, such as the 304, block the free flow of information. These firewalls can be used as censorship tools to block traffic deemed objectionable by the state. They can also be used as interception devices to steal industrial, commercial, or other secrets. Depending on the time of day, total internet traffic, and the health of these national firewalls, traffic passing through them may experience latency or packet loss, be shaped to maximum bandwidth, creating bottlenecks, or all or a combination of these issues.

上文提及的示例实施例仅描述了一些问题和威胁。还存在许多其他威胁,并且不时会出现新的威胁。The example embodiments mentioned above describe only some of the problems and threats. Many other threats exist, and new threats emerge from time to time.

图7示出了内容传递网络(CDN)解析和区域特定内容的传递。内容传递网络(CDN)可在速度和灵活性方面提供显著优点并且当将内容提供至客户端时提供负载平衡。内容请求7REQ000从主机客户端(C)7100流至主机服务器(S)并且内容传递的应答流7RESP002作为文件或数据流或数据块从主机服务器(S)返回到主机客户端(C)7100。Figure 7 illustrates the resolution and delivery of region-specific content by a content delivery network (CDN). A content delivery network (CDN) can provide significant advantages in terms of speed and flexibility and provide load balancing when delivering content to clients. A content request 7REQ000 flows from a host client (C) 7100 to a host server (S), and a response stream 7RESP002 for content delivery is returned from the host server (S) to the host client (C) 7100 as a file, data stream, or data chunk.

主机客户端(C)7100可以是设备,诸如膝上型计算机、桌上型计算机、电话、平板设备或用作与主机服务器(S)成客户端-服务器(CS)关系的客户端的其他设备。主机客户端(C)请求经由统一资源定位符(URL)来访问主机服务器(S)提供的内容。Host Client (C) 7100 can be a device such as a laptop, desktop, phone, tablet, or other device that acts as a client in a client-server (CS) relationship with a host server (S). The host client (C) requests access to content provided by the host server (S) via a uniform resource locator (URL).

POP 7102、DNS服务器7104、互联网7300以如上文所述的常规方式操作。The POP 7102, DNS server 7104, and Internet 7300 operate in the conventional manner as described above.

在CDN基础设施的情形中,CDN映射标记7200与CDN控制服务器7202协调操作。CDN映射标记7200和CDN控制服务器7202确定主机客户端设备所在的区域以及针对提供的内容主机客户端应连接至哪一CDN服务器。例如,如果主机客户端7100在区域A中,它将经由区域A中的服务器POP 7404被路由至区域A中的CDN服务器7504。区域B中的主机客户端7100将经由区域B中的服务器POP 7402连接至区域B中的CDN服务器7502。区域C中的主机客户端7100将经由区域C中的服务器POP 7400中的服务器的POP连接至区域C中的CDN服务器7500。In the context of a CDN infrastructure, CDN mapping tags 7200 coordinate operations with CDN control servers 7202. CDN mapping tags 7200 and CDN control servers 7202 determine the region in which the host client device is located and which CDN server the host client should connect to for content provided. For example, if host client 7100 is in region A, it will be routed to CDN server 7504 in region A via server POP 7404 in region A. Host client 7100 in region B will connect to CDN server 7502 in region B via server POP 7402 in region B. Host client 7100 in region C will connect to CDN server 7500 in region C via the POP of a server in region C's server POP 7400.

经由7P00、经由POP 7102、经由7P004的初始CDN映射标记7200查找可能非常快速,或者如果CDN映射标记服务器位于远离客户端设备的区域中,则可能花费相对高的查找时间。一旦完成查找,流量将经由7P008流至最近和或最佳可用CDN服务器。The initial CDN mapping tag 7200 lookup via 7P00, via POP 7102, via 7P004 may be very fast, or may take a relatively long lookup time if the CDN mapping tag server is located in an area far from the client device. Once the lookup is complete, traffic will flow to the nearest and or best available CDN server via 7P008.

为了说明此图,将区域定义为不同于另一地理区域的地理区域。它不一定表示大的面积但可能具有大面积,并且它还可表示从一个区域至另一区域的大距离或它们可非常接近于彼此。关键是一个区域中的客户端将经由来自该区域而不是来自另一个区域的CDN服务器接收内容。For the purposes of this diagram, a region is defined as a geographic area that is distinct from another. It doesn't necessarily represent a large area, but it can be. It can also represent a large distance from one region to another, or they can be very close to each other. The key is that clients in one region will receive content from CDN servers in that region, not from another.

在本示例实施例中,每个区域的内容与其他区域的内容不同。CDN服务器7500、7502和7504与源服务器7600之间的是内容区域服务器7700、7702和7704,这些内容区域服务器将区域特定内容发布到每个区域中的CND服务器,并随之将其提供给它们的对应区域中的客户端。In this example embodiment, the content of each region is different from the content of other regions. Between CDN servers 7500, 7502 and 7504 and origin server 7600 are content region servers 7700, 7702 and 7704, which publish the region-specific content to the CDN servers in each region, which then provide it to clients in their corresponding regions.

当一个区域,例如区域C中的客户端7100想要获取由来自另一区域的服务器7502或7504提供的内容时,无论它们做了什么,都仅向所述客户端提供来自它们所在区域中的服务器7500的内容。它们不能访问其他内容,即使它们尝试强制连接至它们期望从中接收内容的区域中的内容服务器。它们不断从所在区域获取内容而不进行选择。局部DNS查找7104解析仅指向所在区域的CDN服务器7500的IP。这可由于全局IP地址仅映射至所在区域中的CDN(在全局IP的情况下)或另一原因。结果是客户端可能在7P404或7P402被地理阻止。When a client 7100 in one region, such as region C, wants to obtain content provided by a server 7502 or 7504 from another region, no matter what they do, they are only provided with content from the server 7500 in their region. They cannot access other content, even if they try to force a connection to a content server in the region from which they expect to receive content. They continue to obtain content from their region without making any selections. The local DNS lookup 7104 resolves to the IP address of the CDN server 7500 in their region. This can be because the global IP address only maps to the CDN in their region (in the case of a global IP) or for another reason. As a result, the client may be geographically blocked at 7P404 or 7P402.

基于当前地理位置的经由7P008的正常连接不会被阻止,并且流量以使主机客户端7100经由主机服务器7500接收该地理位置的内容的方式流动。Normal connections via 7P008 based on the current geographic location are not blocked, and traffic flows in a manner that enables the host client 7100 to receive content for that geographic location via the host server 7500.

针对与当前地理位置7502和7504不同的目标,流量在7P402和/或7P408处停止并且主机客户端被来自远程地理目的地的内容拒绝。它们可能被迫连接至在它们当前位置7500中的服务器,或者不接收任何内容或者接收错误消息或仅不期望内容,这具体取决于CDN控制系统7202的配置和政策。For destinations other than the current geographic locations 7502 and 7504, traffic is stopped at 7P402 and/or 7P408 and the host clients are denied content from the remote geographic destinations. Depending on the configuration and policies of the CDN control system 7202, they may be forced to connect to a server in their current location 7500 and receive no content, an error message, or simply unwanted content.

图8示出了代理服务器的操作。内容请求或推送8REQ000作为文件或数据流或数据块从主机客户端(C)流至主机服务器(S)。内容传递8RESP002作为文件或数据流或数据块从主机服务器(S)返回主机客户端(C)。主机客户端8100,即与主机服务器8500成客户端-服务器(CS)关系的客户端设备,请求经由统一资源定位符(URL)从远程服务器(S)访问内容。此请求将通过运行代理客户端软件的网关(GW)设备8102。在其他情况下,代理客户端软件可直接在主机客户端8100上运行。代理客户端软件经由加密或未加密的隧道连接至代理服务器8306、经由路径8P02从网关GW 8102连接至存在点(POP)8200、经由路径8P04连接到WAN8308(互联网的一部分)、经由路径8P6连接到远程区域中的代理服务器8306。流量从代理服务器8306离开、经由路径8P16进入开放互联网8300并且经由路径8P12连到POP 8302并且随后经由路径8P10而连接至目标区域中的主机服务器8500。Figure 8 illustrates the operation of a proxy server. A content request or push 8REQ000 is streamed from a host client (C) to a host server (S) as a file, data stream, or data block. Content delivery 8RESP002 is returned from the host server (S) to the host client (C) as a file, data stream, or data block. A host client 8100, a client device in a client-server (CS) relationship with a host server 8500, requests access to content from a remote server (S) via a uniform resource locator (URL). This request passes through a gateway (GW) device 8102 running proxy client software. In other cases, the proxy client software can run directly on the host client 8100. The proxy client software connects to a proxy server 8306 via an encrypted or unencrypted tunnel, connects from the gateway GW 8102 to a point of presence (POP) 8200 via path 8P02, connects to a WAN 8308 (part of the Internet) via path 8P04, and connects to a proxy server 8306 in a remote area via path 8P6. Traffic exits the proxy server 8306, enters the open Internet 8300 via path 8P16 and connects to the POP 8302 via path 8P12 and then connects to the host server 8500 in the target area via path 8P10.

主机服务器将该流量视为来自代理服务器的IP地址和地理位置。如果所述IP处于由目标区域中的服务器限定的相同区域中,将会提供期望内容。为了帮助此本地化,代理服务器将通常连接至与代理服务器处于相同的区域中的DNS服务器8404。The host server sees the traffic as coming from the IP address and geographic location of the proxy server. If the IP is in the same region defined by the server in the target region, the desired content will be provided. To help with this localization, the proxy server will typically connect to a DNS server 8404 in the same region as the proxy server.

图9示出了两个网关设备9A1与9B1之间建立的点对点隧道TUN。每个设备9A1和9B1位于互联网EH3至EH15与它们对应的局域网(LAN)9A2和9B2之间的边缘9EDGE-1和9EDGE-2处。Figure 9 shows a point-to-point tunnel TUN established between two gateway devices 9A1 and 9B1. Each device 9A1 and 9B1 is located at the edge 9EDGE-1 and 9EDGE-2 between the Internet EH3 to EH15 and their corresponding local area networks (LANs) 9A2 and 9B2.

从EH1至EH17的基线描述了点对点的跳跃数量。从EH3至EH15的跳跃数量是假定的并且出于说明目的提供,而且现实连接路径中的跳跃数量可能更多或更少。采用隧道9TUN的客户端从9A2至9A1至9TUN至9B1至9B2的跳跃数量将为约四或五个可见跳跃。The baseline from EH1 to EH17 depicts the number of hops from point to point. The number of hops from EH3 to EH15 is hypothetical and provided for illustration purposes, and the number of hops in a real-world connection path may be higher or lower. A client using tunnel 9TUN will see approximately four or five visible hops from 9A2 to 9A1 to 9TUN to 9B1 to 9B2.

本示例实施例描述了LAN 9A2通过其网关9A1连接至一个互联网服务供应商9ISP-1的网络并且LAN 9B2通过其网关9B1连接至另一互联网服务供应商9ISP-3的情景。本示例实施例进一步说明了9ISP-1不与9ISP-3直接对等。9ISP-1和9ISP-3两者要求它们在两个方向的网络流量必须传输通过另一互联网服务供应商9ISP-2的网络。9ISP-1与9ISP-2之间的互连被定义为对等点9PP-01并且从9ISP-3至9ISP-2的互连被定义为9PP-02。This example embodiment describes a scenario in which LAN 9A2 is connected to the network of one Internet Service Provider (ISP) 9ISP-1 via its gateway 9A1, and LAN 9B2 is connected to another Internet Service Provider (ISP) 9ISP-3 via its gateway 9B1. This example embodiment further illustrates that ISP-1 is not directly peered with ISP-3. Both ISP-1 and ISP-3 require that their network traffic in both directions must pass through the network of another Internet Service Provider (ISP) 9ISP-2. The interconnection between ISP-1 and ISP-2 is defined as peering point 9PP-01, and the interconnection from ISP-3 to ISP-2 is defined as 9PP-02.

本示例实施例的点用于示出在互联网上,第三方互联网服务供应商或诸如主干或回程供应商等同等供应商通常会传输其他互联网服务供应商的流量。9ISP-1或9ISP-3对9ISP-2如何传输它本身的流量具有很少以至几乎没有控制。尽管9ISP-1的客户9A2能够直接向他们的供应商9ISP-1投诉服务问题并且9B2可直接向9ISP-3投诉,但是如果问题是关于9ISP-2,那么9A2或9B2几乎无法做任何事情来直接影响9ISP-2。The point of this example embodiment is to illustrate that on the internet, third-party ISPs or equivalent providers, such as backbone or backhaul providers, typically transport traffic for other ISPs. ISP-1 or ISP-3 has little to no control over how ISP-2 transports its own traffic. While ISP-1's customer 9A2 can complain directly to their provider 9ISP-1 about service issues, and ISP-3 can complain directly to ISP-3, if the problem is with ISP-2, there's little ISP-2 or ISP-3 can do to directly impact ISP-2.

潜在拥塞点可能出现在任何设备上,但是由于9PP-01和9PP-02是对等点,因此它们是关注区域。对全部连接的路由和服务质量的控制有限。因此,点对点隧道可能难以在距离上维持高质量、稳定连接,特别是在存在部分流量传输通过第三方网络时。Potential congestion points can occur on any device, but because 9PP-01 and 9PP-02 are peering points, they are areas of concern. Control over the routing and quality of service of the overall connection is limited. Therefore, point-to-point tunnels may struggle to maintain a high-quality, stable connection over distance, especially when some traffic is routed through a third-party network.

图10示出了在设备范围1080与全系统范围1090之间的安全特征的关系。它还指出通信范围1098和设备协作1089。10 shows the relationship of security features between device scope 1080 and system-wide scope 1090. It also indicates communication scope 1098 and device collaboration 1089.

关于设备范围1080,GVN保护其数据的客户端隐私性、网络数据流、凭证、对等体对信息,并且保护物理设备免受遭受入侵,其中所包括的专有代码免于遭受篡改或窃取,以及其他威胁。With respect to the device scope 1080, the GVN protects the client privacy of its data, network data flows, credentials, peer-to-peer information, and protects physical devices from intrusion, proprietary code contained therein from tampering or theft, and other threats.

全系统范围1090需要保护不受入侵或诸如DDoS攻击等其他恶意流量,防误操作,进行围绕次优设备或路径的路由,平衡和分散负载并且防止耗尽资源、IP地址或其他全局问题。System-wide 1090 needs to protect against intrusion or other malicious traffic such as DDoS attacks, prevent misuse, perform routing around suboptimal devices or paths, balance and distribute load, and prevent exhaustion of resources, IP addresses, or other global issues.

通信范围1098的重点在于主要通过流量隧道TUN而推送通过GVN的流量途径。它还覆盖在GVN的外部网络与内部网络之间的出入点(EIP)。它可防止流量劫持、中间人攻击、中毒信息源(诸如不良DNS等等)以及其他威胁。此外,对各个网络分段的质量和其性质的测试使GVN能够理解完整路径QoS并且绕过问题。Communication scope 1098 focuses on the traffic path through the GVN, primarily through traffic tunnels (TUNs). It also covers the entry and exit points (EIPs) between the GVN's external and internal networks. It protects against traffic hijacking, man-in-the-middle attacks, poisoned information sources (such as bad DNS servers), and other threats. Furthermore, testing the quality and properties of each network segment enables the GVN to understand the complete path QoS and circumvent issues.

设备协作1089安全特征处于适当位置以保护GVN内的各个设备的操作完整性。安全返回通道、抗入侵机制、DNS安全网、诸如旋转按键等各种数据库保护、中立API机制(NAPIM)、自动测试、更新、对等体对关系、验证和其它模块可确保维持系统完整性。Device collaboration 1089 security features are in place to protect the operational integrity of each device within the GVN. Secure return channels, anti-intrusion mechanisms, DNS security nets, various database protections such as rotation keys, neutral API mechanisms (NAPIM), automated testing, updates, peer-to-peer relationships, authentication, and other modules ensure that system integrity is maintained.

图11示出了全局虚拟网络的设备之间的信息流。由数据库B200和文件存储器HFS200构成的中央存储库驻留在中央服务器(SRV_CNTRL)200上。Figure 11 shows the information flow between devices in the global virtual network. The central repository consisting of the database B200 and the file storage HFS200 resides on the central server (SRV_CNTRL) 200.

标记为P###的设备之间的通信路径可以表示API调用、数据库复制、直接文件转换、诸如通过API调用的数据库复制等组合或者其他形式的信息交换。较粗的线11P200100、11P200300、11P200500、11P100200、11P100300、11P10011500、11P300200、11P300500、和11P500200表示具有对等体对的GVN设备之间的通信并且彼此之间特权关系。The communication paths between devices labeled P### may represent API calls, database replication, direct file conversion, a combination of database replication such as via API calls, or other forms of information exchange. The thicker lines 11P200100, 11P200300, 11P200500, 11P100200, 11P100300, 11P10011500, 11P300200, 11P300500, and 11P500200 represent communications between GVN devices that have peer pairs and privileged relationships with each other.

图中示出了从SRV_CNTRL 200经由11P200100到EPD 100,从SRV_CNTRL 200经由11P200300到SRV_AP 300,或从SRV_CNTRL 200经由11P200500到其他设备11500的循环模式的对等体对通信。EPD 100经由11P100200与SRV_CNTRL 200通信、经由11P100300与SRV_AP300通信,并且经由11P1001500与其他设备11500通信。The figure shows peer-to-peer communication in a round-robin pattern from SRV_CNTRL 200 to EPD 100 via 11P200100, from SRV_CNTRL 200 to SRV_AP 300 via 11P200300, or from SRV_CNTRL 200 to other devices 11500 via 11P200500. EPD 100 communicates with SRV_CNTRL 200 via 11P100200, with SRV_AP 300 via 11P100300, and with other devices 11500 via 11P1001500.

在一些情况下,设备会共享信息环路,诸如EPD 100可以经由11P100200向SRV_CNTRL200请求信息,并且该请求将经由11P200100发回到EPD 100。In some cases, devices may share information loops, such as EPD 100 may request information from SRV_CNTRL 200 via 11P100200 , and the request will be sent back to EPD 100 via 11P200100 .

在其他情况下,一个设备可以报告与其他设备相关的信息,诸如SRV_AP 300经由11P300200向SRV_CNTRL 200报告,而SRV_CNTRL 200随后经由11P200100将信息发送到EPD100和SRV_AP 300,并且经由11P200300将信息发送到发出报告的SRV_AP 300以外的其他SRV_AP 300,并经由11P200500将信息发送到其他设备11500。In other cases, one device may report information related to other devices, such as SRV_AP 300 reporting to SRV_CNTRL 200 via 11P300200, and SRV_CNTRL 200 then sending the information to EPD 100 and SRV_AP 300 via 11P200100, and sending the information to other SRV_APs 300 other than the reporting SRV_AP 300 via 11P200300, and sending the information to other devices 11500 via 11P200500.

在其他情况下,无需完整环路,诸如从诸如EPD 100等设备经由11P100200将日志记录信息发送到SRV_CNTRL 200,不需要进一步转发这个信息。然而,日志记录信息可能之后经由11P200500从SRV_CNTRL 200上的存储库移动到长期日志记录存储服务器11500。In other cases, a full loop is not required, such as sending logging information from a device such as EPD 100 to SRV_CNTRL 200 via 11P100200 without forwarding this information further. However, the logging information may then be moved from the repository on SRV_CNTRL 200 to the long-term logging storage server 11500 via 11P200500.

设备EPD 100与SRV_AP 300之间存在直接链路11P100300。直接链路11P300500是从SRV_AP 300到其他设备11500。直接链路涉及设备之间不需要SRV_CNTRL 200参与的通信。There is a direct link 11P100300 between the device EPD 100 and the SRV_AP 300. The direct link 11P300500 is from the SRV_AP 300 to another device 11500. A direct link involves communication between devices without the involvement of the SRV_CNTRL 200.

来自SRV_CNTRL200的推送信息可以是经由11P306发布的RSS馈入信息或其他类型的信息。来自SRV_CNTRL200的API可以是传统API事务,也可以是经由11P302REQ发出请求并经由11P302RESP接收响应的RESTful API调用。呈现的推送信息和API元素用于示出不共享对等体对关系、特权状态的设备和/或具有GVN设备的相似系统架构。The information pushed from SRV_CNTRL 200 can be RSS feed information or other types of information published via 11P 306. The API from SRV_CNTRL 200 can be a traditional API transaction or a RESTful API call that issues a request via 11P 302REQ and receives a response via 11P 302RESP. The push information and API elements presented are intended to illustrate devices that do not share peer-to-peer relationships, privileged status, and/or similar system architectures with GVN devices.

图12描述了用于支持GVN中一些设备的自动化的堆栈。具体来说,此图示出了自动化设备协作和联网以及操作系统(O/S)管理所需要的模块。Figure 12 depicts a stack for supporting automation of some devices in a GVN. Specifically, this diagram shows the modules required for automated device collaboration and networking, as well as operating system (O/S) management.

EPD 100是端点设备。SRV_AP 300是位于目标目的地区域中的接入点服务器。SRV_CNTRL 200是可由EPD和SRV_AP二者以及由可支持图形目的地机制的其他设备或者其他GVN模块、组件或服务器访问的中央控制服务器。EPD 100 is an endpoint device. SRV_AP 300 is an access point server located in the target destination area. SRV_CNTRL 200 is a central control server accessible by both EPD and SRV_AP as well as by other devices that can support the graphics destination mechanism or other GVN modules, components or servers.

每个设备EPD 100、SRV_AP 300和SRV_CNTRL 200将关于它们本身的信息以列表、文件、数据库表和记录的形式以及以其他方式储存在本地信息存储库中。此存储库还包括关于对等体设备关系、储存日志记录的信息以及其他相关操作信息。SRV_CNTRL 200还具有额外储存功能并且它的作用是向与其相关的其他设备和/或向可能与其连接的对等体设备提供信息,以便评估当前状态并且提供类似于集中控制的指导,例如发布服务器可用性列表和其他功能。中立API机制(NAPIM)可在设备与这些设备的相连对等体之间发送信息,并且还可用以更新API本身。Each device, EPD 100, SRV_AP 300, and SRV_CNTRL 200, stores information about itself in a local information repository in the form of lists, files, database tables, records, and other means. This repository also includes information about peer device relationships, stored logging, and other relevant operational information. SRV_CNTRL 200 also has additional storage capabilities and is used to provide information to other devices associated with it and/or to peer devices that may be connected to it, so as to assess the current status and provide guidance similar to centralized control, such as publishing server availability lists and other functions. A neutral API mechanism (NAPIM) can be used to send information between devices and their connected peers and can also be used to update the API itself.

SRV_CNTRL 200上的数据库S293用作该设备本身的相关信息的存储库以及其他设备的中央存储库。许多位置中可能有许多不同SRV_CNTRL 200服务器来充当多主设备。每个数据库可以储存特定信息,包括隧道信息、对等体信息、流量信息、高速缓存信息和其他信息。安全性和其他方面由每个设备独立管理,包括心跳功能、触发脚本和其他机制。The database S293 on the SRV_CNTRL 200 serves as a repository for information about the device itself, as well as a central repository for other devices. There may be many different SRV_CNTRL 200 servers in many locations, acting as a multi-master device. Each database can store specific information, including tunnel information, peer information, traffic information, cache information, and other information. Security and other aspects are managed independently by each device, including heartbeat functionality, trigger scripts, and other mechanisms.

GVN软件D196、D296、D396包括隧道构建器/管理器、虚拟接口管理器、自动智能路由、测试模块、安全、日志记录和其他功能。图11还示出了操作系统(O/S)级数据包D195、D295、D395并且包括硬件和软件驱动程序、驱动程序、安装的数据包,包括它们的从属软件数据包,以及系统硬件组件之上构建的其他项目。The GVN software D196, D296, D396 includes a tunnel builder/manager, a virtual interface manager, automatic intelligent routing, a testing module, security, logging, and other functionality. Figure 11 also shows operating system (O/S) level packages D195, D295, D395 and includes hardware and software drivers, drivers, installed packages, including their dependent software packages, and other items built on top of the system hardware components.

图13示出了包括在互联网或暗色光纤上的主干段的GVN拓扑。标题为“用于从远程网络区域检索内容的系统和方法”(SYSTEM AND METHOD FOR CONTENT RETRIEVALFROMREMOTE NETWORK REGIONS)的国际专利申請第PCT/UJS15/64242号(中公开了一种特征,其中多个文件被聚集成较大文件并且经由“链式高速缓存”通过文件传输从一个地理区域发送至另一地理区域。为了实现这一有利特征,文件传输需要尽可能快。作为多种数据有效负载“文件”群组的传输方法,本发明的信息弹射(information slingshot)方法与先前技术的方法相比,更快速地将较大的数据块从世界一端移动至另一端。FIG13 shows a GVN topology including a backbone segment on the Internet or dark fiber. International Patent Application No. PCT/UJS15/64242, entitled "SYSTEM AND METHOD FOR CONTENT RETRIEVAL FROM REMOTE NETWORK REGIONS," discloses a feature in which multiple files are aggregated into larger files and sent from one geographic region to another via file transfer via "chain caching." To achieve this advantageous feature, the file transfer needs to be as fast as possible. As a method of transmitting groups of multiple data payload "files," the information slingshot method of the present invention moves larger data blocks from one end of the world to the other more quickly than prior art methods.

参见图13,示出了多个区:LAN区0(ZL00)、LAN区1(Z110)、互联网区0(ZI00)、互联网区1(ZI10)、互联网区2(ZI20)、互联网区3(ZI30)、互联网数据中央区2(ZD20)以及互联网数据中央区3(ZD30)。13 , multiple zones are shown: LAN Zone 0 (ZL00), LAN Zone 1 (Z110), Internet Zone 0 (ZI00), Internet Zone 1 (ZI10), Internet Zone 2 (ZI20), Internet Zone 3 (ZI30), Internet Data Central Zone 2 (ZD20), and Internet Data Central Zone 3 (ZD30).

区域或区ZD20中的SRV_BBX 1372可通过暗色光纤13220经由暗色光纤连接13P220连接至另一区域或区ZD30中的SRV_BBX 1380。SRV_BBX 1372经由13P220、绕过SRV_BBX堆栈1380并且经由路径13P82经由远程直接记忆装置存取(RDMA)将文件直接写入至平行文件存储器PFS 1382。SRV_BBX 1380使用本发明来经由13P220、绕过SRV_BBX堆栈1372并且经由路径13P74经由远程直接记忆装置存取(RDMA))将文件直接写入至平行文件存储器PFS 1374。An SRV_BBX 1372 in a zone or zone ZD20 may be connected to an SRV_BBX 1380 in another zone or zone ZD30 via a dark fiber connection 13P220 over dark fiber 13220. The SRV_BBX 1372 writes files directly to a parallel file store PFS 1382 via remote direct memory access (RDMA) via 13P220, bypassing the SRV_BBX stack 1380, and via path 13P82. The SRV_BBX 1380 uses the present invention to write files directly to a parallel file store PFS 1374 via 13P220, bypassing the SRV_BBX stack 1372, and via path 13P74 via remote direct memory access (RDMA).

路径13P210可为IPv4或某种标准化互联网协议,流量通过这些标准化互联网协议经由隧道或其他类型通信路径经由GVN之上的路径13P210从SRV_AP 13300流至SRV_AP13310和/或从SRV_AP 13310流至SRV_AP 13300。Path 13P210 may be IPv4 or some standardized Internet protocol over which traffic flows from SRV_AP 13300 to SRV_AP 13310 and/or from SRV_AP 13310 to SRV_AP 13300 via path 13P210 over the GVN via a tunnel or other type of communication path.

这表明,各种类型网络结构可组合成更大的网络毯式框架(Tapestry)。这些结构可无缝地编在一起,如美国临时专利申請第62/174,394号中所述。这可以是独立方法,也可以集成为由多个网络分段构成的较大网络路径内的网络分段。本示例实施例示出了全局虚拟网络(GVN)、其多个设备、通信路径和其他实施例的拓扑。它示出了各种地理区域或区或地区如何通过各个类型路径而链接在一起。This demonstrates that various types of network structures can be combined into a larger network tapestry. These structures can be seamlessly woven together, as described in U.S. Provisional Patent Application No. 62/174,394. This can be a standalone approach or integrated as a network segment within a larger network path composed of multiple network segments. This example embodiment illustrates the topology of a global virtual network (GVN), its multiple devices, communication paths, and other embodiments. It shows how various geographic areas, regions, or districts can be linked together through various types of paths.

图14示出了在由GVN实现的云中的分布式防火墙(FW)。由于GVN的拓扑、设备到设备通信和安全流量路径的性质,防火墙机制可基于云并且还可以是虚拟化的。凭借经由开放互联网14000的出入点(EIP)流至和流自GVN的面对防火墙的跳跃144,可以存在云防火墙(CFW)负载平衡器144LB,所述CFW负载平衡器能够分配诸如144-2、144,3等云防火墙资源等。Figure 14 illustrates a distributed firewall (FW) in a cloud implemented by a GVN. Due to the nature of the GVN's topology, device-to-device communication, and secure traffic paths, the firewall mechanism can be cloud-based and can also be virtualized. With traffic flowing to and from the GVN via an entry/exit point (EIP) via the open internet 14000, a cloud firewall (CFW) load balancer 144LB can exist, capable of distributing cloud firewall resources such as 144-2, 144-3, and the like.

这种按需提供的可缩放性为GVN客户端提供了众多优点。通过消减云中即将遭受的威胁的攻击命中率,客户端的“最后一英里连接性”不受影响。与控制节点和分析器相结合的该云防火墙使遭受攻击的区域中的FW能够感知攻击的性质、来源、标记和其他特征,以便云防火墙能够在目标转移时意识到并准备抵御攻击。此外,关于过去和当前攻击的信息可经由GVN的中立API机制(NAPIM)共享至其他CFW实例,以使能够感知全局威胁。这还提供同时运行多种类型FW机制的优点,如参考图15所述。This on-demand scalability provides numerous advantages for GVN clients. By reducing the attack hit rate of impending threats in the cloud, the client's "last mile connectivity" is not affected. This cloud firewall, combined with the control node and analyzer, enables the FW in the attacked area to perceive the nature, source, signature, and other characteristics of the attack, so that the cloud firewall can be aware of and prepare to defend against the attack when the target shifts. In addition, information about past and current attacks can be shared with other CFW instances via the GVN's Neutral API Mechanism (NAPIM), enabling global threat awareness. This also provides the advantage of running multiple types of FW mechanisms simultaneously, as described with reference to Figure 15.

图15示出了由全局虚拟网络驱动的云中的多周界防火墙(MPFW)。GVN隧道15TUN0在端点设备(EPD)15100与紧靠EPD 15100的接入点服务器(SRV_AP)15300之间的互联网顶部之上(over the top,OTT)。Figure 15 shows a multi-perimeter firewall (MPFW) in the cloud driven by a global virtual network. The GVN tunnel 15TUN0 is over the top (OTT) of the Internet between the endpoint device (EPD) 15100 and the access point server (SRV_AP) 15300 next to the EPD 15100.

本示例实施例中指出的三个周界是:15M1,它表示客户端位置与其通向互联网的链路之间的边界;15M2,它是云中紧靠SRV_AP 15300的数据中心处的边界;以及15M3,它是与SRV_AP 15300处于相同数据中心处或紧靠SRV_AP 15302的另一位置处的另一边界。The three perimeters indicated in this example embodiment are: 15M1, which represents the boundary between the client location and its link to the Internet; 15M2, which is the boundary at the data center in the cloud close to SRV_AP 15300; and 15M3, which is another boundary at the same data center as SRV_AP 15300 or at another location close to SRV_AP 15302.

隧道15TUN2与15TUN0是相似的,而在一个方面中有所不同,即,它连接的个人端点设备(PEPD)15130可能是移动式设备,因此通过公共接入无线或有线或其他网络连接至SRV_AP15300以集成到GVN中。Tunnel 15TUN2 is similar to 15TUN0 but differs in one respect, namely, the personal endpoint device (PEPD) 15130 it connects may be a mobile device and therefore connected to SRV_AP 15300 via a public access wireless or wired or other network for integration into the GVN.

每个SRV_AP 15300和SRV_AP 15302可表示可经由一个或多个隧道与EPD 15100和/或EPD 15130同时连接的一个或多个SRV_AP设备。Each SRV_AP 15300 and SRV_AP 15302 may represent one or more SRV_AP devices that may be simultaneously connected to the EPD 15100 and/or EPD 15130 via one or more tunnels.

在本示例实施例中描述了三种类型的防火墙。FW本地15442是客户端可用以保护其局域网(LAN)不受基于互联网的威胁的示例防火墙。这通常位于EPD 15100与LAN 15000之间。此FW 15442可提供诸如IP地址和端口阻塞、转发以及其他功能等特征。所示出的其他两种类型的防火墙是提供状态分组检查(SPI)的位于15M3的FW SPI 15446以及提供深度分组检查(DPI)的位于15M2的FW DPI 15444。In this example embodiment, three types of firewalls are described. FW Local 15442 is an example firewall that a client can use to protect its local area network (LAN) from Internet-based threats. This is typically located between EPD 15100 and LAN 15000. This FW 15442 can provide features such as IP address and port blocking, forwarding, and other functions. The other two types of firewalls shown are FW SPI 15446 located at 15M3, which provides stateful packet inspection (SPI), and FW DPI 15444 located at 15M2, which provides deep packet inspection (DPI).

在SPI与DPI之间的差异涉及到性能与可见度之间的权衡。SPI检查分组标头处以查找恶意信息或查找图案,或者将来自已知威胁列表的IP地址或端口或其他信息与当前的分组流进行匹配。从名称中可看出,DPI更深度地查看整个分组,并且在多部分、多分组传输的情况下,它将会查看对一系列分组的编译以便进一步了解所传输的数据。The difference between SPI and DPI involves a trade-off between performance and visibility. SPI examines packet headers for malicious information or patterns, or matches IP addresses, ports, or other information from a list of known threats to the current packet flow. As the name suggests, DPI looks deeper into the entire packet and, in the case of multi-part, multi-packet transmissions, compiles a series of packets to gain further insight into the transmitted data.

所有防火墙可以被配置用于调查并且对传入和传出流量应用规则,并且提供其他相关的功能性。在许多情况下,客户端将必须在SPI的效率与DPI的彻底但耗费资源和时间的需求之间做出选择。All firewalls can be configured to investigate and apply rules to incoming and outgoing traffic, and provide other related functionality.In many cases, clients will have to choose between the efficiency of SPI and the thorough but resource- and time-consuming requirements of DPI.

GVN提供将这些FW分布于云中的多个点的机会。并且对于要彼此前后紧接着操作的各种类型的防火墙,还不妨碍流量流。GVN provides the opportunity to distribute these FWs at multiple points in the cloud and for various types of firewalls to operate in close proximity to each other without hindering traffic flow.

通过经由远程EIP 15310将FW SPI 15446定位在15M3,即互联网15302的最近边缘处,可以抵御来自已知源IP地址或具有已识别的恶意标头的大量攻击流量。流量从SRV_AP15302经由15T10流至FW SPI 15446并且经由15T12返回。FW SPI 15446可以是具有大量需求资源的CFW负载平衡器(参见图14)。15M3处的SRV_AP可以是具有巨大容量的多宿主主干。因此,在第一周界处,可捕获攻击,从而保护GVN中的带宽。By positioning FW SPI 15446 at 15M3, the closest edge of the Internet 15302, via remote EIP 15310, it is possible to protect against large amounts of attack traffic originating from known source IP addresses or with identified malicious headers. Traffic flows from SRV_AP 15302 via 15T10 to FW SPI 15446 and back via 15T12. FW SPI 15446 can be a CFW load balancer with significant demand resources (see Figure 14). The SRV_AP at 15M3 can be a multi-homed backbone with significant capacity. Thus, attacks can be captured at the first perimeter, protecting bandwidth within the GVN.

在下一周界15M2处,FW DPI 15444可使全部流量流过或仅经由15T20从SRV_AP15300接收流量副本,并且可能或可能不经由15T22返回流量。重点在于DPI特征可以是允许特定流量通过但分析并记录结果的后缘指示器。此FW DPI 15444还可以是CFW,所述CFW在需要时采用根据需要提供的资源进行负载平衡,以在需要时应付大规模的事件,而不需要使各个客户端必须处理或承担用于在正常期间维持基础设施的成本负担。At the next boundary 15M2, FW DPI 15444 can either allow all traffic to pass through or simply receive a copy of the traffic from SRV_AP 15300 via 15T20, and may or may not return the traffic via 15T22. The key point is that the DPI feature can be a trailing-edge indicator that allows specific traffic to pass through but analyzes and records the results. This FW DPI 15444 can also be a CFW, which can load balance when needed, using resources provided on demand, to cope with large-scale events when needed, without requiring individual clients to handle or bear the cost burden of maintaining the infrastructure during normal times.

来自FW SPI 15446和FW DPI 15444的信息经由内部通信路径15P6彼此共享,所述内部通信路径可由GVN的NAPIM或通过GVN隧道或通过GVN返回隧道或经由其他通信途径传输。每个FW机制还与GVN的中央控制服务器(SRV_CNTRL)15200共享信息。此信息可以在中继至世界范围内的其他FW SPI和FW DPI,以使得数据库中可提供攻击矢量、来源、有效负载和其他相关信息,从而使得SPI和DPI检查可以具有用于比对的参考点。这实现了规模效率的提高,因为信息全局分布提供额外的安全网。Information from FW SPI 15446 and FW DPI 15444 is shared with each other via an internal communication path 15P6, which can be transmitted by the GVN's NAPIM, through a GVN tunnel, through a GVN return tunnel, or via other communication pathways. Each FW mechanism also shares information with the GVN's Central Control Server (SRV_CNTRL) 15200. This information can be relayed to other FW SPIs and FW DPIs worldwide, so that attack vectors, sources, payloads, and other relevant information are available in the database, allowing SPI and DPI checks to have a reference point for comparison. This achieves increased efficiency at scale, as the global distribution of information provides an additional safety net.

在客户端LAN外部和在云中捕获恶意流量可保护客户端的最后一英里互联网连接性免于被不期望流量饱和。将流量卸载至可缩放CFW还向客户端提供众多优点。Capturing malicious traffic outside the client LAN and in the cloud protects the client's last mile Internet connectivity from being saturated with unwanted traffic.Offloading traffic to a scalable CFW also provides numerous advantages to the client.

本地FW 15442可为独立设备、在EPD 15100内部运行的软件应用(APP)或者其他类型的FW设备。The local FW 15442 can be a standalone device, a software application (APP) running inside the EPD 15100, or other types of FW devices.

FW SPI 15446和FW DPI 15444设备以及诸如负载平衡器、云防火墙或其他设备等相关设备可以定制或可由其他供应商提供现货,从而为客户端最佳选择组合。这些设备必须能够接收和转发流量、识别威胁和最重要的是能够传达威胁发现,并且从其他设备接收威胁概况和其他信息。The FW SPI 15446 and FW DPI 15444 appliances, along with related devices such as load balancers, cloud firewalls, or other appliances, can be custom-built or available off-the-shelf from other vendors to create the best combination for the client. These appliances must be able to receive and forward traffic, identify threats, and most importantly, communicate threat findings, as well as receive threat profiles and other information from other devices.

随着威胁数据累积,可以对内容、图案、攻击矢量以及由FW收集的其他信息进行分析。此分析可提供对新的潜在威胁应用启发式分析的基础。As threat data accumulates, it can analyze the content, patterns, attack vectors, and other information collected by the FW. This analysis can provide the basis for applying heuristic analysis to new potential threats.

这可仅由GVN的安全网络优化(SNO)服务或由通过安全隧道和通信路径这两者连接的相关设备组成的相似网络来实现。This can be achieved solely by the Secure Network Optimization (SNO) service of the GVN or a similar network consisting of related devices connected by both secure tunnels and communication paths.

图16示出了作为全局虚拟网络(GVN)的一部分共同工作的三种类型的网络设备的软件架构的逻辑视图。如图所示,软件和硬件可以分布在网络设备内,并且可以跨不同的电路板、处理器、网络接口卡、存储器和记忆装置分布。Figure 16 shows a logical view of the software architecture of three types of network devices working together as part of a global virtual network (GVN). As shown in the figure, the software and hardware can be distributed within the network device and can be distributed across different circuit boards, processors, network interface cards, memory and storage devices.

一个所述网络设备是端点设备(EPD)100。另一所述网络设备是中央服务器(SRV_CNTRL)200,并且第三设备是接入点服务器(SRV_AP)设备300。One of the network devices is an endpoint device (EPD) 100 , another of the network devices is a central server (SRV_CNTRL) 200 , and a third device is an access point server (SRV_AP) device 300 .

EPD 100经由描述成通信路径的加密隧道而连接至SRV_AP 300,该路径可以是经由加密隧道SYSC04连到存在点(POP)SYS406,通过通信路径SYS06连到WAN SYS400到通信路径SYSCP10到POP SYS402到通信路径SYSCP12。通过WAN SYS400的路径还可通过常规未加密互联网。EPD 100 is connected to SRV_AP 300 via an encrypted tunnel described as a communication path, which can be via encrypted tunnel SYSC04 to point of presence (POP) SYS406, through communication path SYS06 to WAN SYS400 to communication path SYSCP10 to POP SYS402 to communication path SYSCP12. The path through WAN SYS400 can also be through the regular unencrypted Internet.

每个设备EPD 100和SRV_AP 300还可经由通信路径SYSCP08而连接到SRV_CNTRL设备200。Each device EPD 100 and SRV_AP 300 may also be connected to the SRV_CNTRL device 200 via a communication path SYSCP08.

EPD 100和SRV_AP 300的软件架构彼此非常相似,区别在于每个设备在操作中的作用不同以及一些模块不同。The software architectures of the EPD 100 and SRV_AP 300 are very similar to each other, differing in the role each device plays in operation and in some modules.

每个设备的最低级是记忆装置(RAM)106、206、306和处理器(CPU)102、202、302以及网络接口(NIC)108、208、308。所有这些都在硬件级上。操作系统(O/S)110、210、310可以是LINUX系统或者是诸如Debian或其他系统等同等系统。该操作系统描述包括用于路由、托管、通信和其他系统级操作软件的数据包和配置。At the lowest level of each device is the memory (RAM) 106, 206, 306, the processor (CPU) 102, 202, 302, and the network interface (NIC) 108, 208, 308. All of this is at the hardware level. The operating system (O/S) 110, 210, 310 can be a Linux system or an equivalent system such as Debian or other systems. The operating system describes the data packages and configurations used for routing, hosting, communication, and other system-level operating software.

操作系统110、210、310之上存在全局虚拟网络(GVN的)操作系统的系统软件层112、212、312。自定义命令、系统模块、管理器和其他组成部分均在此操作,同时还包括GVN的其他组件。GVN中的每种类型的设备可以具有系统软件层的这些部分中的一些或全部或不同部分,具体具体取决于它们的角色。Above the operating systems 110, 210, 310 lies the system software layer 112, 212, 312 of the global virtual network (GVN) operating system. Custom commands, system modules, managers, and other components all operate here, along with other components of the GVN. Each type of device in the GVN can have some, all, or different portions of these parts of the system software layer, depending on its role.

数据库模块Db 120、220、320和托管模块122、222和322在本示例实施例中被配置用于GVN中立API机制(NAPIM)、图形用户接口(GUI)和其他服务器侧脚本托管站点的监听、发送、处理、存储、检索以及其他相关基础级别操作。数据库120、220、320(Db)模块可以是MySQL或诸如MariaDb等等效物并且托管模块122、222和322可以是Apache和PHP脚本或其他类型托管语言。命令行脚本也使用并且可以以Bash、C、PHP、Pearl、Python或其他语言编写。In this example embodiment, the database modules Db 120, 220, 320 and the hosting modules 122, 222, and 322 are configured for monitoring, sending, processing, storing, retrieving, and other related basic level operations for the GVN Neutral API Mechanism (NAPIM), graphical user interface (GUI), and other server-side script hosting sites. The database 120, 220, 320 (Db) modules can be MySQL or equivalents such as MariaDB, and the hosting modules 122, 222, and 322 can be Apache and PHP scripts or other types of hosting languages. Command line scripts are also used and can be written in Bash, C, PHP, Pearl, Python, or other languages.

计费模块可协作并共享通过消费模型计费的信息,例如隧道流量消耗的数据量。记账模块ACC 132、232、332在EPD 100上操作并且SRV_AP 300具有对应计费模块。两个模块均可将向报告屏幕提供财务信息,提供支付形式、以电子邮件发送的报表和GVN产生的其他财务数据。The billing modules can collaborate and share information about billing through consumption models, such as the amount of data consumed by tunneled traffic. Accounting modules ACC 132, 232, 332 operate on EPD 100, and SRV_AP 300 has a corresponding billing module. Both modules can provide financial information to reporting screens, providing payment forms, emailed reports, and other financial data generated by the GVN.

SRV_CNTRL 200具有存储库管理器238,所述存储库管理器处理计费信息、隧道管理器信息以及可由GVN中的各种设备采用的其他数据。存储库管理器238还通过GVN的中立API机制(NAPIM)来处理与连接到其他API对等体的独立设备的对等体信息、凭证和其他信息的共享的协调。The SRV_CNTRL 200 has a repository manager 238 that handles billing information, tunnel manager information, and other data that can be used by various devices in the GVN. The repository manager 238 also handles the coordination of sharing peer information, credentials, and other information with independent devices connected to other API peers through the GVN's Neutral API Mechanism (NAPIM).

EPD 100具有API模块130,SRV_CNTRL具有API模块230并且SRV_AP 300具有API模块330。为了简单解释本示例实施例,每个设备仅描述一个API模块。实际上,根据设备在GVN中的功能,设备可以起到组合的客户端和服务器作用。EPD 100 has API module 130, SRV_CNTRL has API module 230 and SRV_AP 300 has API module 330. To simplify the explanation of this exemplary embodiment, only one API module is described for each device. In practice, depending on the function of the device in the GVN, the device can play the role of a combined client and server.

SRV_CNTRL 200上的高速缓存管理器管理跨GVN的许多设备分布的多个链式高速缓存的主索引。EPD 100上的压缩引擎136和SRV_AP 300上的压缩引擎336管理储存在文件上、DB表中的数据的压缩和解压,或者用于流式传输数据。The cache manager on SRV_CNTRL 200 manages the master index of multiple chained caches distributed across many devices in the GVN. The compression engine 136 on EPD 100 and the compression engine 336 on SRV_AP 300 manage the compression and decompression of data stored in files, DB tables, or for streaming data.

EPD 100上的高级智能路由(ASR)150模块处理从EPD 100经由GVN的路由至目的地最佳出口点的流量路由。The Advanced Smart Routing (ASR) 150 module on the EPD 100 handles the routing of traffic from the EPD 100 via the GVN to the optimal egress point at the destination.

SRV_AP 300上的远程取回器BOT 311是地理目的地机制(Geo-D)的核心组件。The Remote Retrieval BOT 311 on the SRV_AP 300 is the core component of the Geographic Destination Mechanism (Geo-D).

SRV_CNTRL 200上的DNS管理器254管理主DNS索引,所述主DNS索引可以将DNS服务器播种在各种GVN设备上,诸如将DNS 154播种在EPD 100上。The DNS manager 254 on the SRV_CNTRL 200 manages the master DNS index that can seed DNS servers on various GVN devices, such as seeding the DNS 154 on the EPD 100 .

SRV_CNTRL 200上的日志记录管理器管理本地日志记录和经由API调用由设备共享至存储库的日志记录。本示例实施例中的日志记录管理器被赋予记录操作事件、API行为和事务的功能,并且该日志记录器还具有用于GVN操作的多个方面的其他作用和进程。The logging manager on SRV_CNTRL 200 manages local logging and logging shared by devices to the repository via API calls. The logging manager in this example embodiment is empowered to log operational events, API actions, and transactions, and has other roles and processes for various aspects of GVN operations.

EPD 100上的本地高速缓存152和SRV_AP 300上的本地高速缓存352将数据进行本地高速缓存。The local cache 152 on the EPD 100 and the local cache 352 on the SRV_AP 300 cache the data locally.

GVN管理器272在SRV_CNTRL 200上操作以控制在SRV_CNTRL 200和GVN的其他设备上的系统的各个组件的操作。The GVN manager 272 operates on the SRV_CNTRL 200 to control the operation of the various components of the system on the SRV_CNTRL 200 and other devices of the GVN.

EPD 100上的本地DNS服务器和高速缓存154以及SRV_AP 300上的高速缓存354允许高速缓存DNS查找,以实现快速本地检索。DNS 154和354可以完全清洗、清除个别项,或者设定在一定时间之后删除所检索的查找的超时。The local DNS server and cache 154 on the EPD 100 and the cache 354 on the SRV_AP 300 allow DNS lookups to be cached for fast local retrieval. The DNS 154 and 354 can be completely flushed, individual entries can be cleared, or a timeout can be set to delete retrieved lookups after a certain period of time.

EPD 100上设有内容传递代理(CDA)158,该内容传递代理是Geo-D的组件。SRV_AP300上设有内容拉取代理(Content Pulling Agent,CPA)358,该内容拉取代理也是Geo-D的组件。CPA 358与SRV_300上的BOT 311一起工作,以使用从该区域播种的本地DNS 354从远程区域拉取内容。CPA 358采用隧道、高速缓存和GVN的其他改进功能将抓取的内容发送到CDA158。EPD 100 is equipped with a Content Delivery Agent (CDA) 158, a component of Geo-D. SRV_AP 300 is equipped with a Content Pulling Agent (CPA) 358, also a component of Geo-D. CPA 358 works with BOT 311 on SRV_300 to pull content from remote zones using a local DNS 354 seeded from that zone. CPA 358 uses tunneling, caching, and other advanced features of GVN to send the fetched content to CDA 158.

EPD 100上、SRV_CNTRL 200上和SRV_AP 300上的防火墙(FW)(未示出)进行操作以保护对设备以及设备与其他者之间的通信路径的接入。Firewalls (FWs) (not shown) on the EPD 100, on the SRV_CNTRL 200, and on the SRV_AP 300 operate to protect access to the devices and communication paths between the devices and others.

EPD 100上和SRV_AP 300上的连接性管理器(未图示)管理设备之间的隧道以及其他设备到设备通信路径。SRV_CNTRL 200的215上的压缩管理器管理本地压缩并且还与EPD100上的压缩引擎136、SRV_AP 300的压缩引擎336和GVN的其他设备上的压缩引擎协作。EPD上的路由与ASR 150、Geo-D和其他元件协作以管理流量路由。Connectivity managers (not shown) on EPD 100 and SRV_AP 300 manage tunnels and other device-to-device communication paths between devices. The compression manager on SRV_CNTRL 200 215 manages local compression and also collaborates with compression engine 136 on EPD 100, compression engine 336 on SRV_AP 300, and compression engines on other devices in the GVN. Routing on the EPD collaborates with ASR 150, Geo-D, and other elements to manage traffic routing.

SDB100、SDB200和SDB300中的数据库表的结构对于设备操作来说是等效的,而每个数据库表的数据是特定于设备类型的,并且每个设备具有标识特定设备。在SR V_CNTRL200上,存储库数据库SDB202用于存储所有设备的唯一信息,并且存储库管理库238可以使用此信息来将API凭证、隧道信息或其他信息传达给设备。The structure of the database tables in SDB100, SDB200, and SDB300 is equivalent for device operations, but the data in each database table is specific to the device type, and each device has a unique identifier for the specific device. On SR V_CNTRL200, the repository database SDB202 is used to store unique information for all devices, and the repository management library 238 can use this information to communicate API credentials, tunnel information, or other information to the device.

每个设备中均存储有关于设备本身及设备的对等体对合作伙伴的标识和API对等体信息,事务列表和队列数据以及其他信息。除了所描述的用途之外,所述方法和数据库还有其他用途,但是为了简单说明,此示例仅涵盖几个示例性核心功能元件。Each device stores information about the device itself and its peers, API peer information, transaction lists, queue data, and other information. In addition to the uses described, the method and database have other uses, but for simplicity of explanation, this example only covers a few exemplary core functional elements.

拓扑Topology

示出了使用具有主干段和八角形路由的轴辐式(hub and spoke)拓扑的GVN。图17示出了两个不同区域17-RGN-A和17-RGN-B中的GVN的网络拓扑以及所述区域如何经由路径17-P0A和17-P0B通过全局连接17-RGN-ALL连接。此外,图17示出了这两个区域中的每个区域中的轴辐式连接。图17与图15相似并且以轴辐式模型的附加辐条的形式在每个区域中添加了多个出入点(EIP)。A GVN using a hub-and-spoke topology with backbone segments and octagonal routing is shown. Figure 17 shows the network topology of the GVN in two different regions, 17-RGN-A and 17-RGN-B, and how the regions are connected via paths 17-P0A and 17-P0B through a global connection 17-RGN-ALL. Furthermore, Figure 17 shows the hub-and-spoke connectivity within each of the two regions. Figure 17 is similar to Figure 15 but adds multiple entry/exit points (EIPs) in each region in the form of additional spokes of the hub-and-spoke model.

SRV_BBX 17-280和SRV_BBX 17-282是主干交换服务器并且提供全局连接。SRV_BBX可能是在某个区域中用作全局链路的一个或多个负载平衡服务器。在17-17-RGN-A中的接入点服务器(SRV_AP)17-302、17-304和17-306连接至SRV_BBX 17-280。中央控制服务器(SRV_CNTRL)17-200为该区域中的所有设备服务,并且它可能是一个或多个多主SRV_CNTRL服务器。端点设备(EPD)17-100至17-110将通过一个或多个多个并行隧道与一个或多个多个SRV_AP服务器连接。SRV_BBX 17-280 and SRV_BBX 17-282 are backbone switching servers and provide global connectivity. SRV_BBX may be one or more load balancing servers serving as global links within a region. Access point servers (SRV_AP) 17-302, 17-304, and 17-306 in 17-17-RGN-A are connected to SRV_BBX 17-280. Central control server (SRV_CNTRL) 17-200 serves all devices in the region and may be one or more multi-master SRV_CNTRL servers. Endpoint devices (EPDs) 17-100 through 17-110 connect to one or more SRV_AP servers via one or more parallel tunnels.

此图还示出了每个区域中作为轴辐式(hub and spoke)模型的附加辐条的多个出入点(EIP)17-EIP420、17-EIP400、17-EIP430和17-EIP410,这些出入点具有通向和来自开放互联网的路径。此拓扑可通过GVN提供与远程区域中的EIP的EPD连接。在替代方案中,此拓扑也支持EPD连接到相同区域中的EIP、连接到相同区域中的EPD,或者连接到远程区域中的EPD。这些连接通过GVN安全优化。The diagram also shows multiple entry/exit points (EIPs) 17-EIP420, 17-EIP400, 17-EIP430, and 17-EIP410 in each region as additional spokes in a hub-and-spoke model, with paths to and from the open internet. This topology provides EPD connectivity to EIPs in remote regions through the GVN. Alternatively, this topology supports EPDs connecting to EIPs in the same region, to EPDs in the same region, or to EPDs in remote regions. These connections are securely optimized through the GVN.

图18示出了在北美、欧洲和亚洲的一些GVN全局节点与其对应服务区之间的主干连接。如图18右下方的图例框所述,本文从联网视角指出的每一区被描述为全局节点。全局节点经由高性能网络链路彼此连接。各点之间的延迟时间越低,信息传输越快。Figure 18 illustrates the backbone connections between some GVN global nodes and their corresponding service areas in North America, Europe, and Asia. As indicated in the legend box in the lower right corner of Figure 18, each area described herein from a networking perspective is described as a global node. Global nodes are connected to each other via high-performance network links. The lower the latency between each point, the faster the information transfer.

全局节点周围的两个环表示例如从源信息所在的中心起的半径内的连接性质量区类型。这仅出于简单说明目的,因为这些区的大小和形状由许多因素决定。然而,这两个区可彼此区分成最近的区是高性能区,而另一区是最佳服务区。The two rings around the global node represent the types of connectivity quality zones within a radius from the center of the source information. This is for illustrative purposes only, as the size and shape of these zones are determined by many factors. However, the two zones can be distinguished from each other, with the closest zone being the high-performance zone and the other zone being the best service zone.

查询客户端或服务器或其他类型设备相距全局节点越远,信息流动所花费的时间越长,并且在某点处由于距离过大以致QoS下降,使得设备不再在高性能区中,而现在位于最佳服务区中。The further a query client or server or other type of device is from the global node, the longer it takes for information to flow, and at some point the distance becomes so great that the QoS degrades so that the device is no longer in the high performance zone and is now in the best service zone.

如果QoS降至特定阈值以下,那么设备位于最佳服务区之外,并且因此该设备与全局节点之间距离过大以致除安全外,由GVN提供的优点可能存在不确定性。If the QoS drops below a certain threshold, then the device is outside the optimal service area and therefore the distance between the device and the global node is too great that the benefits provided by the GVN, other than security, may be uncertain.

图18示出了美国加利福尼亚州圣何塞市的区SJC 18-01、美国纽约州纽约市的区JFK18-02、荷兰阿姆斯特丹市的区AMS 18-11、日本东京的区NRT 18-21和中国香港特别行政区的区HKG 18-22。世界范围内的许多其他地点均需要放置重要全局节点,但为了简便说明,仅出于说明目的而示出几个位置。FIG18 shows SJC 18-01 in San Jose, California, USA, JFK 18-02 in New York, New York, USA, AMS 18-11 in Amsterdam, Netherlands, NRT 18-21 in Tokyo, Japan, and HKG 18-22 in Hong Kong, China. Many other locations around the world require placement of important global nodes, but for simplicity of illustration, only a few locations are shown for illustrative purposes.

图18还示出了各个全局节点之间的代表路径,例如JFK 18-02与AMS 18-11之间。实际上,两点之间存在表示海底线缆的许多路径。Figure 18 also shows representative paths between various global nodes, such as between JFK 18-02 and AMS 18-11. In reality, there are many paths between two points representing submarine cables.

图19示出了GVN内的各个设备之间的连接性,其中指出了从辐条中的设备至中心设备的多个连接路径。SRV_BBX(主干交换服务器)19-800和19-810点的放置点基于客户端关于相对于管道、互连的最佳互联网数据中心(IDC)的位置,用于服务于目标区域、同时经由路径19-BB2和19-BB6连接全局位置。Figure 19 illustrates the connectivity between various devices within the GVN, indicating multiple connection paths from devices in the spokes to the hub. The placement of SRV_BBX (backbone exchange servers) 19-800 and 19-810 is based on the client's location relative to the optimal Internet Data Center (IDC) for interconnection, serving the target region while connecting to global locations via paths 19-BB2 and 19-BB6.

SRV_BBX用作它所服务的区域的中心。中心通过在互联网中的以太网链路的顶部之上(OTT)的隧道、直接以太网链路之上的隧道、光纤之上的无限宽带、以太网之上的无限宽带或者区域之间的其他形式的连接性来彼此连接。每个中心为多个SRV_AP服务器提供服务,例如为全局区域内的一个区域提供服务的19-302、19-306、19-308。SRV_AP 19-312、19-316和19-318可以为全局区域的另一区域服务。The SRV_BBX serves as the hub for the region it serves. Hubs are connected to each other via over-the-top (OTT) tunnels over Ethernet links in the Internet, tunnels over direct Ethernet links, unlimited broadband over fiber, unlimited broadband over Ethernet, or other forms of connectivity between regions. Each hub serves multiple SRV_AP servers, such as 19-302, 19-306, and 19-308, which serve one region within the global region. SRV_APs 19-312, 19-316, and 19-318 can serve another region within the global region.

诸如19-100至19-128等端点设备(EPD)将与相对于它们的位置、网络连接性、对等和其他相关因素而言最适当的SRV_AP服务器连接。这些因素不断改变,并且因此连到多个SRV_AP服务器的多个隧道始终由EPD维持。每个EPD同时与各种(一个或多个)SRV_AP服务器连接。Endpoint devices (EPDs) such as 19-100 through 19-128 will connect to the most appropriate SRV_AP server relative to their location, network connectivity, peers, and other relevant factors. These factors are constantly changing, and therefore multiple tunnels to multiple SRV_AP servers are always maintained by the EPD. Each EPD is connected to various (one or more) SRV_AP servers simultaneously.

EPD处、SRV_AP处和其他位置处设有出入点(EIP),该这些出入点处,流量可离开GVN进入互联网或者从互联网进入GVN,并且GVN尽可能远地保护和优化流量。There are entry and exit points (EIPs) at EPDs, SRV_APs, and other locations where traffic can leave the GVN and enter the Internet or enter the GVN from the Internet, and the GVN protects and optimizes the traffic as far as possible.

诸如SRV_AP 19-308和SRV_AP 19-318等SRV_AP设备还通过19P60等隧道路径彼此连接,以便诸如EPD 19-110等两个EPD可经由路径19P22至19P60至19P58与EPD 19-128连接。SRV_AP devices such as SRV_AP 19-308 and SRV_AP 19-318 are also connected to each other through tunnel paths such as 19P60 so that two EPDs such as EPD 19-110 can connect with EPD 19-128 via paths 19P22 through 19P60 through 19P58.

中央控制服务器(SRV_CNTRL)19-200链接到多个设备,例如经由路径19P62链接到SRV_AP 19-302,用于中立API机制(NAPIM)信息交换。EPD还经由NAPIM路径与SRV_CNTRL19-200连接。为使本示例实施例相对简单,未示出NAPIM EPD至SRV_CNTRL路径。The central control server (SRV_CNTRL) 19-200 is connected to multiple devices, such as the SRV_AP 19-302 via path 19P62 for Neutral API Mechanism (NAPIM) information exchange. The EPD is also connected to the SRV_CNTRL 19-200 via the NAPIM path. To keep this example embodiment relatively simple, the NAPIM EPD to SRV_CNTRL path is not shown.

在SRV_CNTRL与各种设备之间交换的NAPIM信息可以用于共享使用统计、隧道建立信息,例如IP地址、端口、协议、安全凭证、证书、密钥,并且共享其他信息,从而实现GVN的自动和安全操作。The NAPIM information exchanged between the SRV_CNTRL and various devices can be used to share usage statistics, tunnel establishment information such as IP addresses, ports, protocols, security credentials, certificates, keys, and other information to achieve automatic and secure operation of the GVN.

图20示出了GVN模块和设备的交互方式。全局虚拟网络(GVN)由独立操作以及与其他设备协作的各种设备组成。尽管每者作用基于它们的类型和基础功能而可能不同,但是它们遵循相似的代码库、数据库模式和其他架构元素。Figure 20 illustrates how GVN modules and devices interact. A Global Virtual Network (GVN) consists of various devices that operate independently and collaborate with other devices. While each device's role may differ based on its type and underlying functionality, they all share similar code bases, database schemas, and other architectural elements.

基础设施安装在某个区域中,以便支持EPD和PEPD的操作。诸如端点设备(EPD)100、便携式端点设备(PEPD)和端点中心(EPH)等设备经由连到接入点服务器(SRV_AP)300的隧道将各种LAN、PAN和其他网络连接至GVN。每个设备具有自己的本地托管数据库。Infrastructure is installed in an area to support the operation of EPDs and PEPDs. Devices such as endpoint devices (EPDs) 100, portable endpoint devices (PEPDs), and endpoint hubs (EPHs) connect various LANs, PANs, and other networks to the GVN via tunnels to access point servers (SRV_APs) 300. Each device has its own locally managed database.

冗余是由具有多个主SRV_CNTRL和其他服务器类型的每个区域中有每种类型的多个服务器提供。中央数据存储库位于中央控制服务器(SRV_CNTRL)200上。SRV_CNTRL的工作是经由GVN的中立API机制而连接至各种设备。经由GVN的NAPIM的API调用经由用于设备之间通信,例如EPD 100到SRV_BC 20-502通信的路径20P02。SRV_CNTRL上的Db存储库中的设备_ID和注册/区域映射允许API对等体对关系管理,生成适当服务器可用性列表(SAL)并且接受日志记录。这样可实现对与SRV_AP和GW服务器的关系和连接进行有效管理。Redundancy is provided by having multiple primary SRV_CNTRLs and multiple servers of each type in each region for other server types. A central data repository resides on the Central Control Server (SRV_CNTRL) 200. The SRV_CNTRL's job is to connect to various devices via the GVN's neutral API mechanism. API calls via the GVN's NAPIM are routed via path 20P02 for inter-device communication, such as EPD 100 to SRV_BC 20-502. The device_ID and registration/region mappings in the Db repository on the SRV_CNTRL allow API peers to manage relationships, generate appropriate Server Availability Lists (SALs), and receive logging. This allows for efficient management of relationships and connections with SRV_AP and GW servers.

GVN的后端服务器和基础设施设备包括反向信道服务器(SRV_BC)20-502;安全引导服务器(SRV_SB)20-504;认证、授权、记账服务器(SRV_AAA)20-508和日志记录服务器(SRV_LOG)20-516等等。The backend servers and infrastructure devices of the GVN include a backchannel server (SRV_BC) 20-502; a secure boot server (SRV_SB) 20-504; an authentication, authorization, and accounting server (SRV_AAA) 20-508; and a logging server (SRV_LOG) 20-516, among others.

网关服务器和其他设备经由连接器20AD0而连接至SRV_CNTRL 200并且经由“所有设备”中心20AD2而连接至网关设备。这可包括网关电子邮件服务器(SRV_GW_Mail)20-510、用于财务事务的网关服务器(SRV_GW_FIN)20-518和/或作为一类其他SRV_GW_*20-512的用于第三方连接(SRV_GW_TPC)的网关服务器。Gateway servers and other devices connect to the SRV_CNTRL 200 via connector 20AD0 and to gateway devices via the "all devices" hub 20AD2. This may include a gateway email server (SRV_GW_Mail) 20-510, a gateway server for financial transactions (SRV_GW_FIN) 20-518, and/or a gateway server for third-party connections (SRV_GW_TPC) as a class of other SRV_GW_* 20-512.

起特殊作用的网关服务器可以针对该功能作用而调整并且以为其提供保护的方式。通过授权电子邮件网关服务器,可将其设为安全电子邮件发送器和接收器。这将需要配置和维护并且观察其操作。不过同时,无需其他服务器来处理电子邮件,从而释放那些设备的管理负担。所有设备可经由由请求发送电子邮件的动作调用发送至API的数据有效负载来转发电子邮件。有效负载中的旗标可以指示电子邮件是立即发送还是在特定时间发送,或者应当以什么优先级发送。其他设置可以管控它的发送方式。SRV_GW_EMAIL将会接收这些数据有效负载、将其添加至其电子邮件发送队列,并且电子邮件管理器将会处理传递电子邮件的时间和方式并且将相应地对该事件进行日志记录。弹回、答复和其他输入电子邮件还可以由一个点服务器类型SRV_GW_EMAIL处理。A specialized gateway server can be tailored to that function and the way it provides protection. By authorizing an email gateway server, it can be set up as a secure email sender and receiver. This will require configuration, maintenance, and monitoring of its operation. However, at the same time, no additional servers are needed to handle email, freeing up the management burden of those devices. All devices can forward emails via a data payload sent to the API by an action call requesting to send an email. Flags in the payload can indicate whether the email should be sent immediately, at a specific time, or with what priority. Other settings can govern how it is sent. SRV_GW_EMAIL will receive these data payloads and add them to its email send queue, and the email manager will handle when and how the email is delivered and will log the event accordingly. Bounces, replies, and other incoming emails can also be handled by a peer server type SRV_GW_EMAIL.

日志记录服务器和其他设备还可以由GVN设备经由20AD4访问。The logging server and other devices may also be accessed by the GVN devices via 20AD4.

图21示出了关于GVN模块和设备之间的交互方式的额外细节。这些额外细节包括通信路径,例如从SRV_BC 4-502至SRV_CNTRL 200的21Q00,用于从反向信道服务器向中央控制服务器进行信息的报告。重点在于尽管GVN设备将会需要关于其自身、其对等体、其连接性选项的信息以及其他信息来进行操作,但是将性能和其他数据共享至SRV_CNTRL 200和/或其他设备可以整体地了解较大系统。恒定反馈环路允许自动调节和在传输过程中学习,以便做出更好决策。FIG21 shows additional details about how the GVN modules and devices interact. These additional details include communication paths, such as 21Q00 from SRV_BC 4-502 to SRV_CNTRL 200, for reporting information from the backchannel server to the central control server. The key point is that while a GVN device will need information about itself, its peers, its connectivity options, and other information to operate, sharing performance and other data with SRV_CNTRL 200 and/or other devices provides a holistic understanding of the larger system. This constant feedback loop allows for automatic adjustments and learning on the fly, enabling better decision-making.

图22示出了GVN模块和设备的拓扑和连接性以及它们如何在互联网上与其他设备交互。图22所示通信路径包括外部路径(PE)、隧道路径(用于流量)(PT)、控制路径(CP)、加密系统路径(ES)和GVN设备之间的API通信路径(PA)以及更多通信路径。Figure 22 shows the topology and connectivity of GVN modules and devices and how they interact with other devices on the Internet. The communication paths shown in Figure 22 include the external path (PE), the tunnel path (for traffic) (PT), the control path (CP), the encryption system path (ES), the API communication path (PA) between GVN devices, and more communication paths.

中央服务器(SRV_CNTRL)200包括保存重要系统信息的文件存储库和数据库。SRV_CNTRL能够经由PA路径与所有GVN设备连接以进行API通信。端点设备(EPD)100是局域网(LAN)和互联网之间、经由各种并行潜在通信路径的网络接入点。The central server (SRV_CNTRL) 200 includes a file repository and database that stores important system information. The SRV_CNTRL is able to connect to all GVN devices via PA paths for API communication. The endpoint device (EPD) 100 is a network access point between the local area network (LAN) and the Internet via various parallel potential communication paths.

EPD内的高级智能路径(ASR)可将本地流量经由路径22-PE00到存在点(POP)22-020到22-PE02,发送至最靠近的互联网22-010。反向信道服务器(SRV_BC)22-502经由从22ES04通过22-010经由22ES02至201至22ES020进入EPD 100中的反向信道连接来连接至EPD 100。ES##路径是加密控制路径并独立于传输流量的隧道路径。Advanced Smart Path (ASR) within the EPD sends local traffic to the nearest Internet connection 22-010 via path 22-PE00 to point of presence (POP) 22-020 to 22-PE02. A reverse channel server (SRV_BC) 22-502 connects to the EPD 100 via a reverse channel connection from 22ES04 through 22-010, via 22ES02 to 201, and into the EPD 100 to 22ES020. The ES## path is a tunnel path that encrypts the control path and is independent of the transport traffic.

EPD 100维持连到多个接入点服务器(SRV_AP)中的每一者的多个隧道,即经由22PT00和22PT02至SRV_AP 300、经由22PT04和22PT08至SRV_AP 22-302、经由22PT10和22PT12至SRV_AP 22-306以及经由22PT14和22PT16至SRV_AP 22-308。EPD 100 maintains multiple tunnels to each of multiple access point servers (SRV_APs), namely, SRV_AP 300 via 22PT00 and 22PT02, SRV_AP 22-302 via 22PT04 and 22PT08, SRV_AP 22-306 via 22PT10 and 22PT12, and SRV_AP 22-308 via 22PT14 and 22PT16.

该图未按比例绘制,但是例如SRV_AP 22-302和SRV_AP 300在相同区域中,并且经由路径22PE04至POP 22-022至22PE08至互联网22-012以及路径22PE16经POP 22-026至22PE12至互联网22-012,从GVN离开进入互联网22-012。EPD都可以对域名服务(DNS)服务器22-402进行本地DNS查找。The figure is not drawn to scale, but for example, SRV_AP 22-302 and SRV_AP 300 are in the same area and exit the GVN into the Internet 22-012 via path 22PE04 to POP 22-022 to 22PE08 to the Internet 22-012 and path 22PE16 via POP 22-026 to 22PE12 to the Internet 22-012. Both EPDs can perform local DNS lookups on a Domain Name Service (DNS) server 22-402.

SRV_AP 22-302和SRV_AP 300这两者均维持分别经由22PA02和22PA08至SRV_CNTRL 200的API通信路径。Both SRV_AP 22-302 and SRV_AP 300 maintain an API communication path to SRV_CNTRL 200 via 22PA02 and 22PA08, respectively.

网关设备(SRV_GW)22-514位于与SRV_AP 22-302和SRV_AP 300相同的区域中。这可发送电子邮件、处理财务事务和GVN的SRV_GW设备的其他功能性。The gateway device (SRV_GW) 22-514 is located in the same area as the SRV_AP 22-302 and SRV_AP 300. This can send emails, process financial transactions and other functionality of the SRV_GW device of the GVN.

SRV_AP 22-306经由22PA10连接至SRV_CNTRL 200,并且在其区域中通向互联网22-014的出口点是经由22PE20至POP 22-024至22PE22至互联网22-014。The SRV_AP 22-306 is connected to the SRV_CNTRL 200 via 22PA10, and the egress point in its area to the Internet 22-014 is via 22PE20 to POP 22-024 to 22PE22 to the Internet 22-014.

SRV_GW服务器22-516经由22PA24而连接至SRV_CNTRL 200,并且经由22PE26至POP22-024至22PE22至互联网22-014连接至互联网22-014。The SRV_GW server 22-516 is connected to the SRV_CNTRL 200 via 22PA24 and is connected to the Internet 22-014 via 22PE26 to POP22-024 to 22PE22 to the Internet 22-014.

SRV_AP 22-304经由22PA18连接至SRV_CNTRL 200,且在其区域中通向互联网22-016的出口点是经由22PE26至POP 22-028至22PA30至互联网22-016。The SRV_AP 22-304 is connected to the SRV_CNTRL 200 via 22PA18, and the egress point in its area to the Internet 22-016 is via 22PE26 to POP 22-028 to 22PA30 to the Internet 22-016.

SRV_GW 22-512经由22PA14而连接至SRV_CNTRL并且经由22PA16而连接至SRV_AP。来自SRV_GW 22-516的本地流量经由22PE28而离开至POP 22-208至22PA30至互联网22-016。The SRV_GW 22-512 is connected to the SRV_CNTRL via 22PA14 and to the SRV_AP via 22PA16. Local traffic from the SRV_GW 22-516 exits to the POP 22-208 via 22PE28 to 22PA30 to the Internet 22-016.

在GVN内存在其他设备,并且它们承担特定作用,诸如备份服务器SRV_Backup 22-522和日志记录服务器SRV_Logging 22-516。这些分别经由22PA20和22PA22而连接至SRV_CNTRL。它们可以接受从SRV_CNTRL 200或从其他设备经由PA##路径而中继到SRV_Backup22-522或SRV_Logging 22-516的数据。There are other devices within the GVN that perform specific roles, such as the backup server SRV_Backup 22-522 and the logging server SRV_Logging 22-516. These are connected to the SRV_CNTRL via 22PA20 and 22PA22, respectively. They can receive data from SRV_CNTRL 200 or from other devices via the PA## path, which is relayed to SRV_Backup 22-522 or SRV_Logging 22-516.

GVN的所描述的拓扑允许来自EPD 100的流量具有通过多个隧道至多个SRV_AP服务器的每区域流量的多个选项。其他设备确保信息被分布到各个设备以供有效利用。The described topology of the GVN allows traffic from the EPD 100 to have multiple options for per-region traffic through multiple tunnels to multiple SRV_AP servers. Other devices ensure that information is distributed to various devices for efficient utilization.

图23示出了在端点设备(EPD)100、23-102、23-158与接入点服务器(SRV_AP)300、23-302之间的多个隧道连接性。这些隧道可以用于客户端数据流量、内部系统数据或其他传输。此图进一步说明了诸如中央服务器(SRV_CNTRL)200和反向信道管理服务器(SRV_BC)23-502等全局虚拟网络(GVN)基础设施设备与GVN中的其他设备的连接。Figure 23 shows multiple tunnel connectivity between endpoint devices (EPDs) 100, 23-102, 23-158 and access point servers (SRV_AP) 300, 23-302. These tunnels can be used for client data traffic, internal system data, or other transmissions. This figure further illustrates the connection of global virtual network (GVN) infrastructure devices such as central server (SRV_CNTRL) 200 and reverse channel management server (SRV_BC) 23-502 to other devices in the GVN.

SRV_BC 23-502建立并且维持至反向信道隧道23PA02至EPD 100、23P018至EPD23-102、23PA06至EPD 23-158、23TP50至SRV_AP 23-302等等。GVN内可能存在更多SRV_BC服务器,以便一个SRV_BC不操作的情况下提供冗余,并且还通过将SRV_BC服务器置于靠近它们连接到的设备的策略位置来确保最佳性能。The SRV_BC 23-502 establishes and maintains reverse channel tunnels 23PA02 to EPD 100, 23P018 to EPD 23-102, 23PA06 to EPD 23-158, 23TP50 to SRV_AP 23-302, etc. There may be more SRV_BC servers within the GVN to provide redundancy in case one SRV_BC is inoperative, and also to ensure optimal performance by placing SRV_BC servers in strategic locations close to the devices they connect to.

EPD 100将一个LAN 23-002连接至通过GVN的数据所采用的各种路径,诸如经由三个多个隧道23TP00、23TP02或23TP04中的一者至SRV_AP 300、经由路径23PE00至出口点至互联网23-410。The EPD 100 connects one LAN 23-002 to various paths taken by data through the GVN, such as via one of three multiple tunnels 23TP00, 23TP02, or 23TP04 to the SRV_AP 300, via path 23PE00 to an exit point to the Internet 23-410.

另一路径是经由三个多个隧道23TP10、23TP12或23TP14中的一者从SRV_AP 300至SRV_AP 23-302。Another path is from SRV_AP 300 to SRV_AP 23-302 via one of the three multiple tunnels 23TP10, 23TP12, or 23TP14.

从SRV_AP 23-302的路径选项是经由23-382至互联网23-412出口点。The routing option from SRV_AP 23-302 is via 23-382 to the Internet 23-412 exit point.

从互联网23-412进入GVN的外部入口点X-IP 305允许由非GVN设备连接以通过GVN对设备进行寻址和访问,从而实现在由GVN传输的流量通行的持续期间内增强GVN。The external entry point X-IP 305 into the GVN from the Internet 23-412 allows connections by non-GVN devices to address and access the device through the GVN, thereby enhancing the GVN for the duration of traffic carried by the GVN.

由GVN实现的另一益处是与提供与在云中的服务提供合作伙伴组织的位置处的EPD23-158的安全隧道连接,以便实现经由GVN通向它们的服务器和在LAN 23-152的位置处的相关服务的安全隧道。Another benefit achieved by the GVN is providing secure tunnel connections with EPDs 23-158 at the locations of service providing partner organizations in the cloud to achieve secure tunneling via the GVN to their servers and related services at the locations of the LANs 23-152.

从LAN 23-002至LAN 23-012的LAN-WAN-LAN网桥可以经由从23-002至23CP02至GWD23-004至23CP04至EPD 100至23TP00 23TP02 23TP04至SRV_AP 300至23TP1023TP1223TP14至SRV_AP 23-302至23TP20 23TP22 23TP24至EPD 23-102至23CP14至GWD23-014至23CP12至LAN 23-012的通信路径。由这个网桥传输的所有流量由GVN机制提供保护并且改进。The LAN-WAN-LAN bridge from LAN 23-002 to LAN 23-012 can communicate via a path from 23-002 to 23CP02 to GWD 23-004 to 23CP04 to EPD 100 to 23TP00, 23TP02, 23TP04 to SRV_AP 300 to 23TP10, 23TP12, 23TP14 to SRV_AP 23-302 to 23TP20, 23TP22, 23TP24 to EPD 23-102 to 23CP14 to GWD 23-014 to 23CP12 to LAN 23-012. All traffic transmitted by this bridge is protected and improved by the GVN mechanism.

在两个设备之间的多个隧道诸如23TP00 23TP02 23TP04或23TP10 23TP1223TP14或23TP20 23TP22 23Tp24可通过沿着一个隧道发送流量而提供单个通信路径,或者两个或更多个隧道可聚集在一起,其中两个或更多个绑定隧道可如同是一个隧道那样传输流量。Multiple tunnels such as 23TP00 23TP02 23TP04 or 23TP10 23TP12 23TP14 or 23TP20 23TP22 23TP24 between two devices may provide a single communication path by sending traffic along one tunnel, or two or more tunnels may be aggregated together where two or more bound tunnels may transmit traffic as if it were one tunnel.

具有在对等体对之间的API通信路径以及连到其他设备的隧道的SRV_CNTRL 200可以用于经由路径例如23PA00至EPD 100或23TP30至23-302至23TP22至EPD 23-102或23PA04至23-302至23TP60至EPD 23-158和其他潜在选项进行文件传输和数据交换。The SRV_CNTRL 200 with API communication paths between peer pairs and tunnels to other devices can be used for file transfer and data exchange via paths such as 23PA00 to EPD 100 or 23TP30 to 23-302 to 23TP22 to EPD 23-102 or 23PA04 to 23-302 to 23TP60 to EPD 23-158 and other potential options.

在本示例实施例中存在其他可能通信路径,并且还存在通过GVN的通信路径的更多选项。在本示例实施例中,所有隧道都表示了经由GVN的第三层的链路,它们各自构建在互联网之上的GVN第一层上。In this example embodiment, there are other possible communication paths, and there are more options for communication paths through the GVN. In this example embodiment, all tunnels represent links via the third layer of the GVN, each of which is built on the first layer of the GVN above the Internet.

图24是当今互联网的工作原理的简化示例图,其中考虑到跳跃计数或生存时间(TTL)以及由于对等关系和相关路由政策采取的路径。Figure 24 is a simplified example diagram of how the Internet works today, taking into account hop counts or time to live (TTL) and the paths taken due to peering relationships and associated routing policies.

A0表示互联网服务供应商(ISP)的网络。A1至A06表示存在点(POP),并且这些POP进一步连接至交换机设备或客户端设备以便将它们链接至互联网。此跳跃和轴辐式结构示出更广的ISP网络内的网络群集。具有线帽形式的圆圈的线指示此连接性。为了简单起见,在本示例实施例中,A1、A2、A3和其他POP的结构没有示出最后一英里网络的链路,但是应当暗指这些链路。每个POP具有其自身至网络的轴辐式连接性,诸如局域网(LAN)或经由POP实现互联网连接的互联网数据中心(IDC)。A0 represents the network of an Internet Service Provider (ISP). A1 to A06 represent points of presence (POPs), and these POPs are further connected to switch devices or client devices to link them to the Internet. This hop and spoke structure shows a cluster of networks within the wider ISP network. Lines with circles in the form of line caps indicate this connectivity. For simplicity, in this example embodiment, the structure of A1, A2, A3 and other POPs does not show links to the last mile network, but these links should be implied. Each POP has its own hub-and-spoke connectivity to a network, such as a local area network (LAN) or an Internet data center (IDC) that enables Internet connectivity via the POP.

H0是单宿主ISP的示例,表明它依赖于其与互联网之间的一个路径。如果此路径被切断或发生故障,那么从此ISP至更广互联网的连接性就被切断。H0 is an example of a single-homed ISP, meaning it relies on a single path between it and the Internet. If this path is severed or fails, connectivity from this ISP to the wider Internet is severed.

B0是它本身与其他ISP网络之间示出了五个连接的多宿主ISP的示例,即使一个路径不可用,流量仍可流过互联网,但是是通过不太直接路径进行的。B0 is an example of a multi-homed ISP showing five connections between itself and other ISP networks; even if one path becomes unavailable, traffic can still flow across the Internet, but through a less direct path.

IX1和IX2是互联网交换(IX)的示例,互联网交换可能通过主干或主干专用连接彼此独立链接。IX是ISP和其他ISP可以在“与我会和房间(meet-me room)”处或用于直接网络至网络对等连接的等效布置中彼此连接。IX1 and IX2 are examples of Internet Exchanges (IXs), which may be independently linked to each other via backbone or backbone-dedicated connections. IXs are where ISPs and other ISPs can connect to each other at a "meet-me room" or equivalent arrangement for direct network-to-network peering.

ISP的网络与其他ISP的网络之间也存在通信路径,或者它们之间存在IX或与中间路由器。这些主干通信路径由在两端有箭头帽的线示出。中间设备由带箭头帽的线之间的圆圈示出。IX之间的回程连接性由两端有箭头帽的虚线示出。分页连接符IBH1用于示出国际回程(IBH),即IX2还具有与未在本示例实施例中示出的另一IX的连接性。Communication paths also exist between the ISP's network and other ISPs' networks, or between them, with IXs or intermediate routers. These backbone communication paths are represented by lines with arrowheads at both ends. Intermediate devices are represented by circles between arrowheaded lines. Backhaul connectivity between IXs is represented by dashed lines with arrowheads at both ends. The paging connector IBH1 is used to indicate international backhaul (IBH), meaning that IX2 also has connectivity with another IX not shown in this example embodiment.

为了示出在ISP之间的直接有效连接,从A0至G0经由路径AX1-1->AX1-2->IX1->GX1-1仅有四个中间跳跃并且应是最有效的路由。To illustrate the direct efficient connection between ISPs, there are only four intermediate hops from A0 to G0 via the path AX1-1->AX1-2->IX1->GX1-1 and this should be the most efficient route.

为了示出因路径故障导致的迂回路径,如果路径GX1-1发生故障,那么来自H0或A0的以G0为目的地的流量将无法经由IX1通过GX1-1。替代选择是流量经由B0和E0去往G0。过去从A0经由AX1-1->AX1-2->IX1->GX1-1只需4个中间跳跃,现在需要更多跳跃AX1-1至AX1-2至IX1至BX1-4至BX1-3至BX1-2至BX1-1至B0至EB-5至EB-4至EB-3至EB-2至EB-1至E0至GE-3至GE-2至Ge-1才能G0。如果GX101发生故障,那么现在从A0到达G0的流量需要17个中间跳跃和对应的较高延迟时间。To illustrate the detours caused by path failures, if path GX1-1 fails, traffic from H0 or A0 destined for G0 will not be able to pass through GX1-1 via IX1. Instead, traffic must pass through B0 and E0 to reach G0. Previously, traffic from A0 via AX1-1->AX1-2->IX1->GX1-1 required only four intermediate hops. Now, more hops are required: AX1-1 to AX1-2 to IX1 to BX1-4 to BX1-3 to BX1-2 to BX1-1 to B0 to EB-5 to EB-4 to EB-3 to EB-2 to EB-1 to E0 to GE-3 to GE-2 to Ge-1 to reach G0. If GX101 fails, traffic from A0 to G0 now requires 17 intermediate hops and correspondingly higher latency.

同时,应经过GX1-1的单个中间跳跃的从G0至IX1的流量将不得不从G0去往E0至B0并随后到达IX1。Meanwhile, traffic from G0 to IX1 that should go through the single intermediate hop of GX1-1 will have to go from G0 to E0 to B0 and then to IX1.

此额外流量可能耗尽连接,并且可能造成较高延迟时间和与拥塞相关的分组丢失。通过IX对等通常将会具有多得多的容量和能力来处理大体积的流量。当从G0至IX1的单个中间跳跃GX1-1不可用时,通过替代路由的额外跳跃(TTL)和往返时延(RTT)可能导致跳跃过多或者时间过长,继而导致分组被标记为不可传递或基于互联网的服务超时。This additional traffic can overwhelm the connection and potentially cause higher latency and congestion-related packet loss. Peering through IX typically has much more capacity and capability to handle the higher volume of traffic. When a single intermediate hop, GX1-1, from G0 to IX1 is unavailable, the additional hops (TTL) and round-trip delay (RTT) through the alternate route can result in excessive or long hops, leading to packets being marked as undeliverable or timing out on Internet-based services.

两个ISP网络之间经由IX和通过采用回程实现的最佳连接性由路径H2至H0至HX1-1至HX1-2至IX1至X1X2-1至X1X2-2至IX-2至DX2-2至DX2-1至D0至D2表示。这样,从POP至POP共12个跳跃。The best connectivity between the two ISP networks via the IX and using backhaul is represented by the path H2 to H0 to HX1-1 to HX1-2 to IX1 to X1X2-1 to X1X2-2 to IX-2 to DX2-2 to DX2-1 to D0 to D2. Thus, there are 12 hops from POP to POP.

下一直接路径应是经由B0,共16个跳跃。路径是H2至H0至HX1-1至HX1-2至IX1至BX1-4至BX1-3至BX1-2至BX1-1至B0至DB-4至DB-3至DB-2至DB-1至D0至D2。The next direct path should be via B0, a total of 16 hops. The path is H2 to H0 to HX1-1 to HX1-2 to IX1 to BX1-4 to BX1-3 to BX1-2 to BX1-1 to B0 to DB-4 to DB-3 to DB-2 to DB-1 to D0 to D2.

下一直接路径将是经由A0经由C0,共19个跳跃。路径是H2至H0至HX1-1至HX1-2至IX1至AX1-2至AX1-1至A0至AC-1至AC-2至AC-3至AC-4至AC-5至C0至CD-1至CD-2至CD-3至D0至D2。The next direct path would be via A0 via C0, a total of 19 hops. The path is H2 to H0 to HX1-1 to HX1-2 to IX1 to AX1-2 to AX1-1 to A0 to AC-1 to AC-2 to AC-3 to AC-4 to AC-5 to C0 to CD-1 to CD-2 to CD-3 to D0 to D2.

由于路由政策和对等关系,间接但可能的路径可以是30个跳跃,例如经由G9经由E0经由B0经由F0。路径是H2至H0至HX1-1至HX1-2至IX1至GX1-1至G0至GE-1至GE-2至GE-3至E0至EB-1至EB-2至EB-3至EB-4至EB-5至B0至FB-5至FB-4至FB-3至FB-2至FB-1至F0至DF-5至DF-4至DF-3至DF-2至DF-1至D0至D2。Due to routing policies and peer relationships, an indirect but possible path can be 30 hops, for example, via G9 via E0 via B0 via F0. The path is H2 to H0 to HX1-1 to HX1-2 to IX1 to GX1-1 to G0 to GE-1 to GE-2 to GE-3 to E0 to EB-1 to EB-2 to EB-3 to EB-4 to EB-5 to B0 to FB-5 to FB-4 to FB-3 to FB-2 to FB-1 to F0 to DF-5 to DF-4 to DF-3 to DF-2 to DF-1 to D0 to D2.

当流量无法到达目的地时就会发生循环,这是因为不良或不正确的路由政策管控起始地和目的地之间的中间设备而造成的。例如,如果来自C0的流量期望路由至G0,那么由于C0可能认为B0和E0彼此靠近并且这是最佳路径,因此C0在认为B0将向E0发送流量时就会选择去往B0。然而,B0可能不直接与E0对等,而与F0具有强对等关系。F0也不具有对等关系或到达E0的路径,并且因此其可能将流量发送至D0。D0仅具有将流量发送至C0或至B0的两个选择,在两种情况下,最终结果都是流量循环、不可传递。这种循环还有其他原因,诸如路由表故障、设备受损、入侵和其他错误行为或者其他原因。Loops occur when traffic cannot reach its destination due to poor or incorrect routing policies governing the intermediate devices between the origin and destination. For example, if traffic from C0 is intended to be routed to G0, C0 may choose to send traffic to B0, as it believes B0 will send traffic to E0, since C0 may believe that B0 and E0 are close to each other and this is the best path. However, B0 may not be directly peered with E0, but may have a strong peering relationship with F0. F0 also does not have a peering relationship or a path to E0, and therefore may send traffic to D0 instead. D0 only has two options: to send traffic to C0 or to B0, and in both cases, the end result is a looped, undeliverable traffic. This looping can also occur for other reasons, such as routing table failures, compromised devices, intrusions and other erroneous behavior, or other reasons.

过多跳跃和过高延迟时间的最终结果是超时或分组被丢弃。The end result of too many hops and too high a latency is timeout or packet drop.

图25示出了用以增强性能的基础设施的策略定位。在这个示例内存在三个或四个关键点,其中SRV_AP服务器和其他GVN基础设施的策略定位将会确保在所示出的示例网络拓扑上的所有点之间的最佳对等和性能。Figure 25 shows the strategic positioning of infrastructure to enhance performance. Within this example there are three or four key points where strategic positioning of SRV_AP servers and other GVN infrastructure will ensure optimal peering and performance between all points on the example network topology shown.

为了包括可选路由选项和故障恢复而在IX1-IDC、B5和IX2-IDC处以及有可能在D5处,安装和操作的SRV_AP服务器将会提供与其他所有网络的对等并且通过提供绕过任何损坏路径进行路由的选择而提供SRV_AP之间的稳定路径。这种策略定位提供实现其他性能增强的灵活性和可能性。To include alternative routing options and failover, SRV_AP servers installed and operating at IX1-IDC, B5, and IX2-IDC, and possibly at D5, will provide peering with all other networks and provide stable paths between SRV_APs by providing the option to route around any damaged paths. This strategic positioning provides flexibility and the possibility to implement other performance enhancements.

图26示出了GVN可如何结合诸如网络弹射(Network Slingshot)等技术以跨距离无缝地实现很多优点。网络弹射(Network Slingshot)进一步在美国临时专利US62/266,060中描述。Figure 26 illustrates how GVN can be combined with technologies such as Network Slingshot to achieve many advantages seamlessly across distances. Network Slingshot is further described in US Provisional Patent No. 62/266,060.

第一边界是互联网和GVN之间的GVN EIP 26-322。下一边界是安全周界26-182。这种分层安全方法保护GVN所立足的核心基础设施。The first boundary is GVN EIP 26-322, between the internet and GVN. The next boundary is the security perimeter 26-182. This layered security approach protects the core infrastructure on which GVN is built.

在GVN与GVN主干之间的安全周界26-182保护高速全局网络。在周界26-822之上的GVN部分具有经由安全GVN隧道在开放互联网顶部之上(OTT)流动的流量。在安全周界26-182下,GVN连接采用在暗色光纤之上的各种协议或不可从互联网直接到达的其他连接。A secure perimeter 26-182 between the GVN and the GVN backbone protects the high-speed global network. The portion of the GVN above the perimeter 26-822 has traffic flowing over the open Internet (OTT) via a secure GVN tunnel. Below the secure perimeter 26-182, GVN connections utilize various protocols over dark fiber or other connections not directly accessible from the Internet.

超级计算机节点26-538可在安全周界26-832内部(下方)操作,所述安全周界可操作具有高级特征例如对平行文件系统(PFS)26-602设备的远程直接记忆装置存取(RDMA)的真实内部网络。The supercomputer nodes 26-538 may operate inside (below) a secure perimeter 26-832 that may operate a true internal network with advanced features such as Remote Direct Memory Access (RDMA) to Parallel File System (PFS) 26-602 devices.

图27示出了在各种GVN设备的数据库上的表如何彼此相关和它们交互方式。例如,SRV_CNTRL上的存储库数据库DB_2300上具有关于设备以及设备之间经由GVN的中立API机制(NAPIM)的交互的各种表。数据库DB_2300中的表例如设备注册表DBT_2310被指定为REPO_ACTIVE,这意味着该表从许多来源接收信息,进行读取/写入并且能够作为信息源被查询以用于选择性地或完全地将表例如设备标识DBT_2102复制作为数据库EPD本地Db DB_2100的一部分。此表DBT_2101具有标识SEL_REP+W,这允许从DBT_2310选择性地复制并允许将相关标识回报给设备注册表。Figure 27 illustrates how the tables in various GVN device databases relate to each other and how they interact. For example, the repository database DB_2300 on SRV_CNTRL contains various tables related to devices and interactions between them via the GVN's Neutral API Mechanism (NAPIM). Tables in database DB_2300, such as the device registry DBT_2310, are designated as REPO_ACTIVE, meaning they receive information from many sources, read/write, and can be queried as information sources for selective or complete replication of tables, such as the device identification DBT_2102, as part of the EPD local database DB_2100. This table DBT_2101 has the flag SEL_REP+W, which allows for selective replication from DBT_2310 and for reporting relevant identification back to the device registry.

信息的控制和释放由数据管理器管控。数据库表类型指示符包括正常读取/写入表“常规”(REGULAR)、只读复制表REP_INFO、仅具有相关行的只读部分复制表SEL_REPSEL_REP、从诸如标识等设备注册表DBT_2310的存储库上的所有源的合并表REPOS_ACTIVE。其他的可能性包括来自要在SR V_LOG S上的数据库DB 2800上合并的源表的“日志记录”(LOGGING)。表的这些标识仅是用于举例目的并且可在现实用途方面不同,并且基于用途存在更多的表和其他类型。The control and release of information is managed by the data manager. Database table type indicators include "REGULAR" for normal read/write tables, REP_INFO for read-only replicas, SEL_REPSEL_REP for read-only partial replicas with only relevant rows, and REPOS_ACTIVE for merging all sources from a repository such as the device registry DBT_2310. Other possibilities include "LOGGING" for source tables to be merged from the database DB 2800 on SR V_LOG S. These table identifiers are for example purposes only and may differ in real-world applications, with more tables and other types existing depending on the application.

图28示出了在各个模块、机制、技术和GVN其他组件之间的协作成果。Figure 28 shows the collaborative efforts among various modules, mechanisms, technologies and other components of GVN.

GVN存在3层,层1是在其顶部之上(OTT)建立GVN的物理网络层,例如互联网。层3是被客户端设备视为通向目的地的部分或完整路径的GVN网络层。层2是这二者之间的逻辑层。GVNs exist in three layers. Layer 1 is the physical network layer on top of which the GVN is built (over-the-top (OTT)), such as the Internet. Layer 3 is the GVN network layer that client devices view as a partial or complete path to their destination. Layer 2 is the logical layer between these two layers.

存在与物理条件28-00交互的组件。28-20处的动态构造模块致力于维持GVN的连接性。本文所述的联合作用部分将GVN的相关模块链接至物理28-00和动态28-20元件。例如,为了使高级智能路径(ASR)模块G106适当运作,必须将多个接入点服务器(SRV_AP)GP106置于具有路由和对等GR106的多个位置。为了使EPD能够选择最适当的SRV_AP以与之建立连接,需要关于哪个SRV_AP最佳的信息。ASR服务器可用性模块SA106基于由ASR测试管理器TM106提供的信息为该特定EPD对服务器进行排名并且当EPD需要建立新的隧道时,它会采用服务器可用性列表SA106来建立新的隧道。随后,经由TM106在所述隧道上运行测试。There are components that interact with the physical conditions 28-00. The dynamic configuration module at 28-20 is dedicated to maintaining the connectivity of the GVN. The joint action described herein links the relevant modules of the GVN to the physical 28-00 and dynamic 28-20 elements. For example, in order for the Advanced Smart Path (ASR) module G106 to function properly, multiple access point servers (SRV_APs) GP106 must be placed in multiple locations with routing and peering GR106. In order for the EPD to select the most appropriate SRV_AP to establish a connection with, information about which SRV_AP is best is required. The ASR Server Availability Module SA106 ranks servers for that particular EPD based on information provided by the ASR Test Manager TM106, and when the EPD needs to establish a new tunnel, it uses the Server Availability List SA106 to establish the new tunnel. Subsequently, tests are run on the tunnel via TM106.

作为另一示例,为了操作NAPIM G102,主机服务器上需要API监听器和处理器HL102。NAPIM中的主机客户端和主机服务器这两者上均运行操作管理器OM102,以处理API请求和响应的准备,然后发送、处置、处理。NAPIM的动态构造需要对等体管理PM102、相关NAPIM动作管理AM102以及在物理TP102和动态TM102处的事务。As another example, to operate NAPIM G102, an API listener and handler HL102 are required on the host server. Both the host client and the host server in NAPIM run an operations manager OM102 to handle the preparation, routing, handling, and processing of API requests and responses. The dynamic configuration of NAPIM requires a peer manager PM102, a related NAPIM action manager AM102, and transactions at the physical TP102 and dynamic TM102.

构造structure

示出了GVN的高级智能路由(ASR)特征。具体来说,该图示出了对通往世界多个区域中的出口点的多个路径的端点设备(EPD)103内的GVN的高级智能路由(ASR)特征。The Advanced Smart Routing (ASR) feature of the GVN is shown. Specifically, the figure shows the Advanced Smart Routing (ASR) feature of the GVN within the End Point Device (EPD) 103 for multiple paths to egress points in multiple regions of the world.

在本示例实施例中的流量从诸如主机客户端101等已连接的设备在LANA 102中开始。在本示例实施例中示出的目标流量区域是:1)本地流量经由POP 401停留在本地,其中GVN隧道将不一定会使性能提高;2)本地流量在加密隧道TUN1中载送到互联网203;3)送往另一区域的流量经由TUN2到达该区域中的SRV_AP 301以访问互联网303;以及4)流量经由TUN3到达其他远程区域,其中在SRV_AP 501上存在一些ASR。Traffic in this example embodiment begins in LANA 102 from a connected device such as host client 101. The target traffic areas shown in this example embodiment are: 1) local traffic stays local via POP 401, where a GVN tunnel will not necessarily improve performance; 2) local traffic is carried in encrypted tunnel TUN1 to the Internet 203; 3) traffic destined for another area reaches SRV_AP 301 in that area via TUN2 to access the Internet 303; and 4) traffic reaches other remote areas via TUN3, where some ASR exists on SRV_AP 501.

EPD 103内的DNS高速缓存103-4从每个目标区域处的DNS服务器进行DNS查找,包括用于互联网402的DNS 404、用于互联网203的DNS 204以及用于互联网303的DNS 304以及用于互联网503的DNS 504。内部DNS高速缓存103-4能够经由路径DP4进行访问。DNS cache 103-4 within EPD 103 performs DNS lookups from DNS servers at each target zone, including DNS 404 for Internet 402, DNS 204 for Internet 203, DNS 304 for Internet 303, and DNS 504 for Internet 503. Internal DNS cache 103-4 is accessible via path DP4.

EPD 103的物理网络接口控制器(NIC)硬件设备包括四个端口。ETH0103-9是经由通向ISP的通往互联网402的POP 401的P401将EPD 103连接到互联网的网络接入点(NAP)的WAN端口。来自EPD的所有流量都会经过作为GVN网络的第一层的该连接。在这个连接之上的TUN隧道是GVN的第三层。ETH1 103-1是经由路径P102连接到LAN A 102的局域网(LAN)端口。ETH2103-2是经由路径P104连接到LAN B 104的另一物理LAN端口。最后,存在充当网桥BR0103-3的虚拟接口(VIF),用于分别经由内部路径DPI和DP2连通LAN接口103-1和103-2。The physical network interface controller (NIC) hardware device of EPD 103 includes four ports. ETH0 103-9 is the WAN port that connects EPD 103 to the Internet's network access point (NAP) via P401, which leads to the ISP's POP 401, which leads to the Internet 402. All traffic from the EPD passes through this connection, which is the first layer of the GVN network. The TUN tunnel above this connection is the third layer of the GVN. ETH1 103-1 is a local area network (LAN) port connected to LAN A 102 via path P102. ETH2 103-2 is another physical LAN port connected to LAN B 104 via path P104. Finally, there is a virtual interface (VIF) acting as a bridge BR0 103-3, which is used to connect LAN interfaces 103-1 and 103-2 via internal paths DPI and DP2, respectively.

来自LAN网桥BR0103-3的流量经由设备路径DP3发送到虚拟接口(VIF)链。在每个VIF处应用高级智能路由(ASR),利用IP地址的路由表在将流量流从每个VIF引向两个或更多个出口点中的一个。最后一个VIF对“所有其他”剩余流量可能只有一个可能的出口点。Traffic from LAN bridge BR0103-3 is sent to a chain of virtual interfaces (VIFs) via device path DP3. Advanced Smart Routing (ASR) is applied at each VIF, using the IP address routing table to direct traffic from each VIF to one of two or more egress points. The last VIF has only one possible egress point for all other remaining traffic.

例如,在VIF0103-5处,本地流量经由P401离开。通过VIF0103-5的所有其他流量经由DP5发送到所述链中的下一个VIF,即,VIF1 103-6。来自VIF1 103-6、目的地为互联网203的流量经由路径P201从EPD103离开,通过加密隧道TUN1到达SRV_AP 201,然后到达路径P202到POP 202到P203再到互联网203。从此位置,可经由路径P204通过SRV_DNS 204来查询区域DNS查找。可分别经由P205和P206连接到主机客户端205或主机服务器206。For example, at VIF0 103-5, local traffic exits via P401. All other traffic passing through VIF0 103-5 is sent via DP5 to the next VIF in the chain, VIF1 103-6. Traffic from VIF1 103-6 destined for the Internet 203 exits EPD 103 via path P201, through encrypted tunnel TUN1 to SRV_AP 201, then to path P202 to POP 202 to P203 and then to the Internet 203. From this location, regional DNS lookups can be queried via SRV_DNS 204 via path P204. Connections to host client 205 or host server 206 are possible via P205 and P206, respectively.

来自VIF1 103-6的任何剩余流量经由路径DP6发送到VIF2 103-7。基于应用到VIF2103-7的路由表,目的地为互联网303以及该位置处的相连设备例如主机服务器306的所有流量经由路径P301离开VIF2到达TUN2到SRV_AP 301,并且继续通过互联网303并且到达互联网以外的其他地方。Any remaining traffic from VIF1 103-6 is sent to VIF2 103-7 via path DP6. Based on the routing table applied to VIF2 103-7, all traffic destined for the Internet 303 and connected devices at that location, such as host server 306, leaves VIF2 via path P301 to TUN2 to SRV_AP 301 and continues through the Internet 303 and beyond.

来自VIF2 103-7的任何另外剩余流量将发送到VIF3 103-8。来自VIF3 103-8的所有流量经由加密隧道TUN3发送到SRV_AP 501。在SRV_AP 501处应用ASR路由,使目的地为互联网503内的IP地址的流量经由路径P502发送POP 502再到到互联网503。Any remaining traffic from VIF2 103-7 is sent to VIF3 103-8. All traffic from VIF3 103-8 is sent via encrypted tunnel TUN3 to SRV_AP 501. ASR routing is applied at SRV_AP 501, so that traffic destined for IP addresses within Internet 503 is sent via path P502 to POP 502 and then to Internet 503.

来自SRV_AP 501、目的地为互联网603的流量经由相连的加密隧道TUN4发送到SRV_AP601到路径P602到POP 602到P603再到互联网603,并且到达互联网以外的其他地方。Traffic from SRV_AP 501 destined for the Internet 603 is sent via the connected encrypted tunnel TUN4 to SRV_AP 601 to the path P602 to POP 602 to P603 to the Internet 603 and reaches somewhere else outside the Internet.

可对SRV_DNS 604进行互联网603的区域中的DNS查找,并且可例如经由通向主机服务器605或其他设备的P605连接到该位置处的设备。A DNS lookup in the area of the Internet 603 may be performed on SRV_DNS 604 and may connect to devices at that location, for example, via P 605 to a host server 605 or other device.

这种ASR机制可以在各种流量结点处使用,以便优化地将流量发送到位于多个目标区域中的互联网上的最佳出口点流量,从而实现地理目的地流量,并且获得由GVN实现的其他优点。This ASR mechanism can be used at various traffic nodes to optimally send traffic to the best exit points on the Internet located in multiple target regions, thereby achieving geographical destination traffic and obtaining other advantages achieved by GVN.

图30示出了在客户端(C)与服务器(S)之间建立一系列加密隧道。步骤30-0至30-18示出了在C和S之间的一系列的简化通信。Figure 30 shows a series of encrypted tunnels established between a client (C) and a server (S). Steps 30-0 to 30-18 show a series of simplified communications between C and S.

第一步骤是打开从C到S的连接30-0。下一步骤是S接受连接握手30-2。如果握手数据格式有误或者与预期格式不符,那么过程可在此停止。The first step is to open a connection 30-0 from C to S. The next step is S accepting the connection handshake 30-2. If the handshake data is malformed or does not match the expected format, the process can stop here.

接收和接受握手30-4后,C向S提供证书,以便S将该证书连同所需安全信息一起用以在这两者间建立安全套接字层(SSL)连接30-8。将从C接收的证书与S上的对应证书密钥进行比较。如果证书过期或不正确,那么就将无法建立SSL连接,并且过程将停止。After receiving and accepting the handshake 30-4, C provides the certificate to S so that S can use it along with the required security information to establish a Secure Sockets Layer (SSL) connection 30-8 between the two. The certificate received from C is compared with the corresponding certificate key on S. If the certificate is expired or incorrect, then the SSL connection cannot be established and the process stops.

这种连接将被用于从C向S发送关于隧道的信息30-10,包括通行短语、量度和关于隧道量度的其他信息,包括每个设备将使用哪个IP地址和端口来进行隧道流量,以及其他信息。This connection will be used to send information 30-10 about the tunnel from C to S, including a pass phrase, a metric, and other information about the tunnel metric, including which IP address and port each device will use for tunnel traffic, as well as other information.

S将针对其自身版本的隧道量度和通行短语以及其他信息来验证这个信息30-12。如果信息并不准确,那么过程将在这个步骤停止。S will verify this information against its own version of the tunnel metric and pass phrase and other information 30-12. If the information is not accurate, the process will stop at this step.

在成功验证后,S将向C发回响应,使得C可以利用所提供的配置设置开始发起或构建隧道的过程30-14。After successful authentication, S will send a response back to C so that C can begin the process of initiating or building a tunnel using the provided configuration settings 30-14.

在隧道建立后,可以在C或S或这两者处应用路由30-16。虽然已建立了隧道,但是在向其添加路由的过程期间,流量可能无法流过隧道,或者即使流量能够流过隧道,也会存在数据泄漏风险。这种风险发生的原因是,应用所有路由之前,送往目标IP地址的流量可以在不加密或行进通过隧道的情况下离开默认出口路径到达互联网。已将路由添加到隧道后,后续流量将受保护,因为它将被传输通过隧道。根据要对隧道应用的路由表的大小,这个延迟可能是相当长的时间量。After the tunnel is established, routes 30-16 can be applied at C, S, or both. Although the tunnel is established, traffic may not be able to flow through the tunnel during the process of adding routes to it. Even if traffic can flow through the tunnel, there is a risk of data leakage. This risk occurs because before all routes are applied, traffic destined for the destination IP address can leave the default egress path to the internet without encryption or passing through the tunnel. After the routes are added to the tunnel, subsequent traffic will be protected because it will be transmitted through the tunnel. Depending on the size of the routing table to be applied to the tunnel, this delay can be considerable.

当路由全部已全部应用到隧道时,隧道可用于将流量推送通过其中30-18。When all routes have been applied to the tunnel, the tunnel can be used to push traffic through it 30-18.

图31示出了对等体对中的两个对等体所需的信息流。所述对等体可以是客户端(C)与服务器(S),或者P-2-P拓扑中一个对等体到另一个对等体。为了简化本示例实施例中的标记和描述,C至S和P-2-P表示相同类型的两个对等体关系,本文中描述的是C到S关系。GVN主要使用设备之间的C到S关系,但是其方法和技术也可以应用于P-2-P对等体对用于进行隧道构建。Figure 31 illustrates the information flows required for two peers in a peer pair. The peers can be a client (C) and a server (S), or from one peer to another in a P-2-P topology. To simplify the notation and description in this example embodiment, C-to-S and P-2-P represent two peer relationships of the same type; the C-to-S relationship is described herein. GVN primarily uses C-to-S relationships between devices, but its methods and techniques can also be applied to P-2-P peer pairs for tunneling.

加密隧道在本质上是数据可流过的安全通信路径。当客户端和服务器隔开一定距离并且它们之间的连接是在开放未加密的互联网之上时,加密隧道是用来安全交换数据的理想通道。如果任一端均有人类网络管理员,那么他们就可以对设备进行编程。不过,关于如何中继如通行短语、密钥和其他信息的安全信息存在挑战。有些可以使用语音电话进行协调,有些可以通过安全网站使用一系列的帖子共享信息,或者可以使用其他方法。可能需要执行手动设置单个隧道的任务。管理多个隧道可能变得麻烦。An encrypted tunnel is essentially a secure communication path through which data can flow. When the client and server are separated by a distance and the connection between them is over the open, unencrypted internet, an encrypted tunnel is ideal for securely exchanging data. If a human network administrator is present on either end, they can program the device. However, there are challenges in relaying secure information such as passphrases, keys, and other information. Some coordination can be done using voice calls, others using a series of posts to share information via a secure website, or other methods can be used. Setting up individual tunnels manually may be necessary. Managing multiple tunnels can become cumbersome.

为了在对等体对中的两个设备之间自动构建一系列的加密隧道,需要安全地共享信息。隧道信息还需要是当前的并安全储存在设备上。此外,在建立过程期间,存在必须要解决的威胁。虽然已建立了隧道,但是存在将需要解决的其他威胁。In order to automatically build a series of encrypted tunnels between the two devices in a peer pair, information needs to be shared securely. The tunnel information also needs to be current and securely stored on the devices. Furthermore, during the setup process, there are threats that must be addressed. Even after the tunnel is established, there are still other threats that need to be addressed.

SRV_CNTRL 31D00是中央服务器,其中包括存储库,所述储存库管理数据库表中的信息、储存在安全文件储存系统中的文件、位于储存器中的列表以及其他相关信息。SRV_CNTRL还具有评估某些数据以生成信息报告的算法和机制。SRV_CNTRL 31D00 is a central server that includes a repository that manages information in database tables, files stored in a secure file storage system, lists located in storage, and other related information. SRV_CNTRL also has algorithms and mechanisms to evaluate certain data to generate information reports.

客户端设备31D02表示将经由特定IP地址和端口通过“拨号”连接到服务器设备来发起隧道构建的设备。许多客户端32D02设备可采用类似的软件和配置同时连接到GVN,设备之间的区分性因素为唯一设备标识UUID,以及每客户端每通道的唯一信息。Client device 31D02 refers to a device that initiates tunnel establishment by "dialing" to a server device via a specific IP address and port. Many client devices 32D02 can simultaneously connect to the GVN using similar software and configuration. The distinguishing factors between devices are the unique device identifier (UUID) and unique information per client per channel.

服务器设备31D06表示将收听在特定IP地址和端口上的客户端连接尝试的设备。如果客户端遵循正确的协议和建立顺序,并且提供正确的凭证和其他安全信息,那么服务器将允许客户端构建通向服务器的隧道。许多服务器31D06设备可采用类似的软件和配置同时连接到GVN,区分性因素为唯一设备标识UUID和唯一信息。A server device 31D06 represents a device that listens for client connection attempts at a specific IP address and port. If the client follows the correct protocol and setup sequence, and provides the correct credentials and other security information, the server will allow the client to establish a tunnel to the server. Many server 31D06 devices with similar software and configuration can simultaneously connect to the GVN, distinguished by their unique device identifier (UUID) and unique information.

隧道信息31S2示出储存在客户端设备31D02和服务器设备31D06上的信息。每个设备可以建立多个隧道,并且每个隧道将具有其自己的隧道信息和安全信息集合。一些隧道信息集合可以用于构建当前活动隧道,并且其他隧道信息集合可以保存在储库中以供用于未来隧道。Tunnel information 31S2 shows information stored on client device 31D02 and server device 31D06. Each device can establish multiple tunnels, and each tunnel will have its own set of tunnel information and security information. Some tunnel information sets can be used to build the currently active tunnel, and other tunnel information sets can be saved in a repository for use in future tunnels.

C与S之间的某些信息是等同的,例如一个将呈现给另一个的密码短语,其他信息将取决于可用性而有所不同。在两点之间构建隧道的信息要求可以包括:客户端/服务器拓扑和设置;隧道将使用的每个端点的IP和端口;隧道量度,包括MTU大小、协议和用于其操作的其他信息;密钥、通行短语和有关隧道使用的安全保护的其他信息;SSL证书以及用于保护隧道建立前的信息交换的其他信息;以及其他信息。这些信息使用GVN的中立API的特定API动作调用在设备之间共享。Some information between C and S is equivalent, such as the passphrase that one will present to the other, while other information will vary depending on availability. The information required to establish a tunnel between two points may include: client/server topology and settings; the IP and port of each endpoint that the tunnel will use; tunnel metrics, including MTU size, protocol, and other information used for its operation; keys, passphrases, and other information about the security protections used by the tunnel; SSL certificates and other information used to protect the information exchanged before the tunnel is established; and other information. This information is shared between devices using specific API action calls using the GVN neutral API.

隧道前31S0描述在设备31D02 31D06与SRV_CNTRL上的存储库31D00之间接收和共享信息,并将其返回到设备31D02 31D06的过程。API通信路径API-31CP0、API-31CP2、API-31CP4和API-31CP6表示请求-响应信息交换,箭头表示从一个设备到另一设备的信息流动方向。Tunnel front 31S0 describes the process of receiving and sharing information between devices 31D02 31D06 and repository 31D00 on SRV_CNTRL, and returning it to devices 31D02 31D06. API communication paths API-31CP0, API-31CP2, API-31CP4, and API-31CP6 represent request-response information exchanges, with arrows indicating the direction of information flow from one device to another.

服务器31D06经由路径API-31CP0将信息报告给SRV_CNTRL 31D00设备的接收信息31C-0模块。SRV_CNTRL 31D00从服务器接收信息,并且将相关标识、隧道、当前负载和其他信息储存在其存储库中。例如,SRV_CNTRL 31D00上的算法和AI逻辑分析服务器负载,并且基于来自客户端31D02设备的当前需求和预期需求,对服务器可用性C-1矩阵进行更新。服务器可用性C-1信息可以通过以下方式传输:共享信息31C-6模块通过GVN的API经由API调用路径API-31CP6将数据库复制到客户端31D02;经由GVN的直接文件共享;或者其他方法。Server 31D06 reports this information to the Receive Information 31C-0 module of the SRV_CNTRL 31D00 device via API-31CP0. SRV_CNTRL 31D00 receives information from the server and stores relevant identifiers, tunnels, current load, and other information in its repository. For example, algorithms and AI logic on SRV_CNTRL 31D00 analyze server load and update the Server Availability C-1 matrix based on current and expected demand from the Client 31D02 device. Server Availability C-1 information can be transmitted via the Shared Information 31C-6 module replicating the database to the Client 31D02 via the GVN API via API call API-31CP6; via direct file sharing within the GVN; or other methods.

客户端31D02经由路径API-31CP2将信息报告给SRV_CNTRL 31D00设备的接收信息31C-0模块。这个信息将会储存在SRV_CNTRL 31D00的存储库中。来自客户端31D02的特定隧道信息可由共享信息31C-6模块经由路径API-31CP4与服务器31D04共享。Client 31D02 reports this information to the Receive Information 31C-0 module of the SRV_CNTRL 31D00 device via API-31CP2. This information is stored in the repository of SRV_CNTRL 31D00. Tunnel-specific information from client 31D02 can be shared with server 31D04 via API-31CP4 using the Share Information 31C-6 module.

SRV_CNTRL 31D00编译每服务器的当前客户端31C-4列表,该列表经由共享信息31C-6模块、经由路径API-31CP4发布到服务器31D06。SRV_CNTRL 31D00 compiles a list of current clients 31C-4 per server, which is published to the server 31D06 via the shared information 31C-6 module via the path API-31CP4.

如果客户端31D02或服务器31D06检测到利用当前隧道信息建立隧道存在问题,那么一个设备或另一设备可以分别经由API-31CP2或API-31CP0请求由SRV_CNTRL生成新的隧道信息集合。可经由共享信息31C-6与对等体对中的这两个对等体共享新的隧道信息集合,其中客户端31D02信息经由API-31CP4发送,并且服务器D02信息经由API-31CP6发送。If either the client 31D02 or the server 31D06 detects a problem establishing the tunnel using the current tunnel information, one device or the other may request a new set of tunnel information to be generated by SRV_CNTRL via API-31CP2 or API-31CP0, respectively. The new set of tunnel information may be shared with both peers in the peer pair via shared information 31C-6, with the client 31D02 information being sent via API-31CP4 and the server D02 information being sent via API-31CP6.

所述客户端31C-4列表以及服务器31D06的当前状态将直接影响到服务器可用性31C-2。The client 31C-4 list and the current status of the server 31D06 will directly affect the server availability 31C-2.

每个服务器31D06需要整理、保护和协调其客户端31C-4列表,客户端31C-4列表将尝试为服务器31D06的共享资源建立新的隧道。这个信息将会是流畅的,并且需要经由对SRV_CNTRL 31D00的安全API调用进行定期更新。Each server 31D06 needs to organize, protect, and coordinate its list of clients 31C-4 that will attempt to establish new tunnels to the shared resources of the server 31D06. This information will be fluid and will need to be updated regularly via secure API calls to SRV_CNTRL 31D00.

在设备之间安全协调信息的需要对于保护它们之间隧道的完整性是必要的。The need to securely coordinate information between devices is necessary to protect the integrity of the tunnels between them.

隧道构建31S4阶段描述经由共享信息31C-6进行隧道建立的过程。参考图30,了解在客户端与服务器之间构建隧道所采取的步骤。路径31TP0表示在客户端31D02与信息交换31C-10之间以及从信息交换31C-10经由路径31TP2到达服务器31D06的路径。The tunnel establishment phase 31S4 describes the process of establishing a tunnel via shared information 31C-6. Refer to Figure 30 for the steps taken to establish a tunnel between a client and a server. Path 31TP0 represents the path between client 31D02 and information exchange 31C-10, and from information exchange 31C-10 to server 31D06 via path 31TP2.

建立威胁31C-8是指在隧道建立期间对信息交换31C-10的威胁。如果隧道类型的签名是可见的,那么在隧道建立期间可能存在威胁31CC-8,诸如来自中间非法操作符的伪传输层安全性(TLS)握手、握手时的TLS错误、造成阻塞或阻碍的端口和IP标识、滤波设备引起的超时、中间ISP或防火墙或设备发送的重置分组或其他威胁。Establishment threats 31C-8 are threats to the information exchange 31C-10 during tunnel establishment. If a tunnel-type signature is visible, then threats 31CC-8 may exist during tunnel establishment, such as a fake Transport Layer Security (TLS) handshake from an intermediary illegal operator, TLS errors during the handshake, blocked or obstructed port and IP identification, timeouts caused by filtering devices, reset packets sent by intermediary ISPs or firewalls or devices, or other threats.

如果信息交换31C-10成功,那么执行构件隧道31C-12步骤,其中将应用路由以及其他相关操作,以使得能够在客户端31D02与服务器31D06之间安全构建隧道TUN。If the information exchange 31C-10 is successful, the step of building a tunnel 31C-12 is executed, in which routing and other related operations are applied to enable a tunnel TUN to be securely built between the client 31D02 and the server 31D06.

隧道建立31S6描述在通过隧道的正常流量流期间的阶段。必须要在设备之间传达信息,并且需要SRV_CNTRL D00管理各种客户端31D02和服务器31D06设备的唯一信息,以及在它们之间构建的多个隧道的唯一信息。Tunnel establishment 31S6 describes the stages during normal traffic flow through a tunnel. Information must be communicated between devices, and SRV_CNTRL D00 is required to manage unique information for the various client 31D02 and server 31D06 devices, as well as the multiple tunnels established between them.

在设备之间的信息交换必须定期发生,因为常常需要形成全新动态隧道。在IP地址上的一些端口可能被阻塞或变得阻塞,并且只要改变该IP地址的端口就将允许构建隧道并使数据流动。此外,每个隧道需要每IP地址一个或多个唯一端口,以便避免隧道之间的冲突。当客户端31D02设备请求创建新的隧道信息时,生成随机端口号,并且针对以下两个或更多个的因素检查目标服务器31D06上的该特定IP地址的端口可用性:该端口是否已经被现有隧道使用(可操作的端口或可进入操作状态的备用端口);以及该端口过去是否曾被特定客户端31D02/服务器31D06对等体对使用过并且是否已被阻塞。在两种情况下,都将生成新随机数。每IP地址有65,536个可用端口,其中保留一定数量用于特定服务。例如5,500的下限值将剩余60,036个可用端口,这些可用端口可由最小值为5001、最大值为65536的随机数字发生器使用。当拆除隧道并且将端口标记为对于某个对等体对阻塞时,可供其他对等体对使用。该端口释放是必要的,以便避免端口耗尽。因此,SRV_CNTRL 31D00对IP和端口组合的跟踪是必要的。Information exchange between devices must occur regularly because it is often necessary to form new dynamic tunnels. Some ports on an IP address may be blocked or become blocked, and simply changing the port for that IP address will allow the tunnel to be built and data to flow. In addition, each tunnel requires one or more unique ports per IP address to avoid conflicts between tunnels. When a client 31D02 device requests the creation of new tunnel information, a random port number is generated and the port availability for that specific IP address on the target server 31D06 is checked based on two or more of the following factors: whether the port is already in use by an existing tunnel (an operational port or a standby port that can enter an operational state); and whether the port has been used in the past by a specific client 31D02/server 31D06 peer pair and whether it has been blocked. In both cases, a new random number will be generated. There are 65,536 available ports per IP address, with a certain number reserved for specific services. For example, a lower limit of 5,500 will leave 60,036 available ports, which can be used by a random number generator with a minimum value of 5001 and a maximum value of 65536. When a tunnel is torn down and a port is marked blocked for a peer pair, it becomes available for use by another peer pair. This port release is necessary to avoid port exhaustion. Therefore, it is necessary for SRV_CNTRL 31D00 to keep track of IP and port combinations.

隧道可通过步骤来帮助其自己的建立,但是这也有局限性。虽然是安全的,但是大多数的隧道在建立期间是可见的。关于该隧道的类型的握手和签名都在操作期间可见。手动设置密钥繁琐并且不会经常改变,而且如果使用时间过长,就有可能增加它们被损坏风险;因此,密钥应当经常重新替代成新的密钥。Tunnels can be set up by themselves through procedures, but this has limitations. While secure, most tunnels are visible during their establishment. Handshakes and signatures regarding the tunnel type are visible during operation. Manually setting keys is tedious and infrequently changed, increasing the risk of them becoming compromised if used for extended periods; therefore, keys should be frequently replaced with new ones.

自动系统需要确保可以创建诸如新的密钥、IP地址的端口和其他信息等信息,并且该信息可用于对等体对的两方以使得能够进行隧道的构建和重建。这两方必须被配置并准备好能够建立隧道。因此,对等体对之间的信息交换需要是安全的,否则隧道本身的安全整体性将被破坏。The automated system needs to ensure that information, such as new keys, IP addresses, ports, and other information, can be created and made available to both peers to enable tunnel establishment and reestablishment. Both peers must be configured and ready to establish the tunnel. Therefore, the information exchange between the peers needs to be secure, otherwise the security integrity of the tunnel itself will be compromised.

虽然隧道已经建立并且推送流量,但是存在操作威胁31C-14。隧道签名可能是可见的(例如,如果隧道是能够嗅探的而不会被混淆的话)。如果能够发现隧道类型,那么就会知道隧道结构。这造成了以下风险:分组流被夺取,并且使用强力密钥破解来将隧道内容解密。如果重置代码或其他隧道控制代码是已知的,那么重置信号可能中断隧道。因此,为了维护对等体对中的客户端31D02和服务器31D06设备之间的隧道安全性和完整性,需要自动并且安全地进行信息的更新和共享。Although the tunnel has been established and is pushing traffic, there is an operational threat 31C-14. The tunnel signature may be visible (for example, if the tunnel is sniffable without being obfuscated). If the tunnel type can be discovered, then the tunnel structure is known. This creates the risk that the packet stream can be intercepted and the tunnel contents can be decrypted using a brute force key cracking. If the reset code or other tunnel control code is known, then the reset signal may interrupt the tunnel. Therefore, in order to maintain the security and integrity of the tunnel between the client 31D02 and server 31D06 devices in the peer pair, information needs to be updated and shared automatically and securely.

GVN结构使设备能够基于最近信息在对等体对之间自动安全地建立隧道。安全特征和方法的组合提供自我加强保护。The GVN architecture enables devices to automatically and securely establish tunnels between peer pairs based on the latest information. The combination of security features and methods provides self-enforcing protection.

图32-35示出了GVN的相对于GVN隧道的中立性和安全性的第三层,同时将跳跃数与基础互联网连接的跳跃数进行比较。在这些附图中使用术语LAN一般是有意的,并且可以表示家庭或办公室或互联网数据中心(IDC)的网络。设备可以是连接到LAN的客户端或服务器。图32示出了从LAN到EPD到SRV_AP到互联网的GVN隧道。图33示出了从LAN到EPD到SRV_AP到EPD到LAN的GVN隧道。图34示出了从LAN到EPD到SRV_AP到SRV_AP到EPD到LAN的GVN隧道。图35示出了图34的从LAN到EPD到SRV_AP到SRV_AP到EPD到LAN的GVN隧道的附加元素,其包括对等点。Figures 32-35 illustrate the third layer of neutrality and security of the GVN with respect to the GVN tunnel, while comparing the number of hops to the number of hops of the basic Internet connection. The use of the term LAN in these figures is general and can represent the network of a home or office or an Internet data center (IDC). The device can be a client or server connected to the LAN. Figure 32 shows a GVN tunnel from the LAN to the EPD to the SRV_AP to the Internet. Figure 33 shows a GVN tunnel from the LAN to the EPD to the SRV_AP to the EPD to the LAN. Figure 34 shows a GVN tunnel from the LAN to the EPD to the SRV_AP to the SRV_AP to the EPD to the LAN. Figure 35 shows additional elements of the GVN tunnel from the LAN to the EPD to the SRV_AP to the SRV_AP to the EPD to the LAN of Figure 34, which includes peers.

所有四个附图都包括了从EH1到EH17的共同基线元素,其表示了基础互联网连接的外部跳跃。在每个跳跃之间的距离不按比例,并且并不表示除跳数之外的任何东西。其他公共元素包括在在一端处具有网关设备GWD1的局域网LAN1和在另一端具有GWD2的另一LAN2。本示例实施例的每个变型还具有连接到接入点服务器AP-1的GVN端点设备EPD-1。这些设备之间存在隧道,并且GVN的第三层内的每个设备NH1和NH2都有一个中立跳跃。All four figures include a common baseline element from EH1 to EH17, which represents the external hops of the basic internet connection. The distances between each hop are not to scale and do not represent anything other than the number of hops. Other common elements include a local area network LAN1 with a gateway device GWD1 at one end and another LAN2 with GWD2 at the other end. Each variation of this example embodiment also has a GVN endpoint device EPD-1 connected to an access point server AP-1. Tunnels exist between these devices, and each device NH1 and NH2 within the third layer of the GVN has a neutral hop.

图32示出了从LAN到EPD到SRV_AP到互联网的GVN隧道。隧道还可在另一方向上起作用,从而提供从互联网到GVN隧道再返回LAN的入口访问。在AP-1与互联网之间存在存在点POP-1。在互联网和GWD2之间存在另一POP-2,其表示了用于该LAN的连接的网络接入点(NAP)。Figure 32 shows a GVN tunnel from the LAN to the EPD to the SRV_AP to the Internet. The tunnel can also function in the other direction, providing access from the Internet to the GVN tunnel and back to the LAN. There is a point of presence POP-1 between AP-1 and the Internet. There is another POP-2 between the Internet and GWD2, which represents the network access point (NAP) for the connection of the LAN.

图33示出了从LAN到EPD到SRV_AP到EPD到LAN的GVN隧道。这种变型示出经由一个SRV_AP在两个LAN的边缘之间的端到端GVN隧道。这种变型与图32之间的差异在于隧道延伸通过从EH3通过互联网到EH15的整个传输。示出第二EPD-2。Figure 33 shows a GVN tunnel from LAN to EPD to SRV_AP to EPD to LAN. This variation shows an end-to-end GVN tunnel between the edges of two LANs via a single SRV_AP. The difference between this variation and Figure 32 is that the tunnel extends through the entire transport from EH3 to EH15 via the Internet. A second EPD-2 is shown.

在EPD-1与AP-1之间存在一个隧道。这联接至在AP-1和EPD-2之间的第二隧道。与在EH3与EH15之间的基础互联网上的13个跳跃相比,在GVN的第三层内存在由NH1、NH2和NH3表示的三个中立跳跃。There is one tunnel between EPD-1 and AP-1. This connects to a second tunnel between AP-1 and EPD-2. Compared to the 13 hops on the underlying Internet between EH3 and EH15, there are three neutral hops within the third layer of the GVN, represented by NH1, NH2, and NH3.

因此,从LAN1到LAN2的总跳跃计数为从LAN1到GWD1到NH1到NH2到NH3到GWD2到LAN2最少七个跳跃。端到端计数包括在从EH1到EH17的两端处的两个内部跳跃,并且总计最少17个跳跃。Therefore, the total hop count from LAN1 to LAN2 is a minimum of seven hops from LAN1 to GWD1 to NH1 to NH2 to NH3 to GWD2 to LAN2. The end-to-end count includes two internal hops at both ends from EH1 to EH17 and totals a minimum of 17 hops.

图34示出了从LAN到EPD到SRV_AP到SRV_AP到EPD到LAN的GVN隧道。这种变型示出经由两个(或有可能更多个)SRV_AP在两个LAN的边缘之间的端到端GVN隧道。这种变型与图33之间的差异在于第二AP-2被插入路径以表示隧道AP-1到AP-2和隧道AP-2到EPD-2的另一联接。添加另一内部中立跳跃使GVN的第三层内的跳跃计数达八个。FIG34 illustrates a GVN tunnel from LAN to EPD to SRV_AP to SRV_AP to EPD to LAN. This variation shows an end-to-end GVN tunnel between the edges of two LANs via two (or possibly more) SRV_APs. The difference between this variation and FIG33 is that a second AP-2 is inserted into the path to represent another connection, tunneling AP-1 to AP-2 and tunneling AP-2 to EPD-2. Adding another internal neutral hop brings the hop count within Layer 3 of the GVN to eight.

图35示出了图34的从LAN到EPD到SRV_AP到SRV_AP到EPD到LAN的GVN隧道的附加元素,其包括对等点,该对等点将ISP与网络边缘之间的点对等。这种变型示出经由两个SRV_AP在两个LAN的边缘之间的端到端GVN隧道,并且还进一步示出关于在EH-3与EH-15之间载送流量通过互联网的某些部分的不同互联网服务提供商(ISP)更多信息。Figure 35 shows additional elements of the GVN tunnel from LAN to EPD to SRV_AP to SRV_AP to EPD to LAN of Figure 34, including peering points that peer between the ISP and the edge of the network. This variation shows an end-to-end GVN tunnel between the edges of the two LANs via two SRV_APs, and further shows more information about the different Internet Service Providers (ISPs) carrying traffic between EH-3 and EH-15 through certain parts of the Internet.

这种变型与图34之间的区别在于已指示了附加元素。如图9所示的以下元素在本示例实施例的这种变型中已被覆盖:a)EDGE-1是LAN-1的设备与ISP-1的POP之间的网络接入连接的分界点;b)PP-01是ISP-1与ISP-2网络之间出现对等的点;c)PP-02是ISP-2与ISP-3网络之间出现对等的点;以及d)EDGE-2是LAN-2的设备与ISP-3的POP之间的网络接入连接的分界点。The difference between this variation and Figure 34 is that additional elements have been indicated. The following elements, as shown in Figure 9, have been covered in this variation of the example embodiment: a) EDGE-1 is the demarcation point for the network access connection between the devices of LAN-1 and the POP of ISP-1; b) PP-01 is the point at which peering occurs between the networks of ISP-1 and ISP-2; c) PP-02 is the point at which peering occurs between the networks of ISP-2 and ISP-3; and d) EDGE-2 is the demarcation point for the network access connection between the devices of LAN-2 and the POP of ISP-3.

可通过将SRV_AP-1放在PP-1处以使这个SRV_AP直接可与ISP-1和ISP-2两者对等来实现某些优点。可通过将SRV_AP-2放在PP-2上以使这个SRV_AP直接可与ISP-2和ISP-3两者对等来实现更多优点。如果ISP-2的网络不太理想,那么可替代地通过另一路由或线路或ISP或载体由GVN绕开ISP-2路由流量。Certain advantages can be achieved by placing SRV_AP-1 at PP-1 so that it can directly peer with both ISP-1 and ISP-2. Further advantages can be achieved by placing SRV_AP-2 at PP-2 so that it can directly peer with both ISP-2 and ISP-3. If ISP-2's network is less than ideal, traffic can alternatively be routed by the GVN through another route or line or ISP or carrier, bypassing ISP-2.

通过GVN的中立第三层的跳跃计数仍然如图34中的那样保持为八个。在ISP之间的距离不按比例。此外,ISP的网络内可能有更多跳跃,但是为了简单起见,已经简化所示数量。The hop count through the neutral third layer of the GVN remains at eight as in Figure 34. The distances between ISPs are not to scale. Furthermore, there may be more hops within the ISP's network, but the number shown has been simplified for simplicity.

虽然图33、图34和图35都示出了在AP跳跃处的隧道的联接,但是这被视为LAN1和LAN2内的客户端设备的单个隧道。这个单一隧道表示GVN的中立第三层,在第三层内能够运行将通常在互联网上传输的所有流量,包括TCP、UDP和其他协议,除此之外还有其他隧道,诸如IPSec、OpenVPN、PPTP等等。GVN的第三层还实现了其他优点。一些优点包括较低TTL和对路由具有更多控制的能力,除此之外还有其他优点。While Figures 33, 34, and 35 all illustrate tunneling at the AP hop, this is considered a single tunnel for client devices within LAN1 and LAN2. This single tunnel represents the neutral Layer 3 of the GVN, within which all traffic typically transmitted over the Internet can run, including TCP, UDP, and other protocols, as well as other tunnels such as IPSec, OpenVPN, PPTP, and others. The Layer 3 of the GVN also enables other advantages. These include lower TTLs and the ability to have more control over routing, among others.

图35示出了将各种网络结构一起编入网络毯式框架中。本示例实施例示出在物理层处将各种网络结构编在一起,全局虚拟网络(GVN)在物理层之上(OTT)操作。在物理层36102处的这些结构构成一系列的网络节段,这些网络节段可以例如是IPv4和IPv6感知的,或者仅是一个或另一个协议。端点设备(EPD)36100到LAN(36000)可以是IPv4和/或IPv6。隧道TUN 36P2可以是EPD 36100与接入点服务器(SRV_AP)36300之间的一个或另一个协议或是两个协议。FIG35 illustrates weaving various network structures together into a network carpet framework. This example embodiment illustrates weaving various network structures together at the physical layer, with a global virtual network (GVN) operating over the physical layer (OTT). These structures at the physical layer 36102 form a series of network segments that can, for example, be IPv4 and IPv6 aware, or just one or the other protocol. The endpoint device (EPD) 36100 to the LAN (36000) can be IPv4 and/or IPv6. The tunnel TUN 36P2 can be one or the other protocol, or both protocols, between the EPD 36100 and the access point server (SRV_AP) 36300.

出口/入口点(EIP)36302指示在互联网层级上从GVN到网络结构的出口点和入口点。路径36P04指示与IPv4互联网网络36400的连接,并且路径36P06指示与IPv6互联网网络36600的连接。Exit/Entry Point (EIP) 36302 indicates the exit and entry points from the GVN to the network structure at the Internet level. Path 36P04 indicates a connection to the IPv4 Internet network 36400, and path 36P06 indicates a connection to the IPv6 Internet network 36600.

关键点是GVN的毯式框架允许诸如IPv4互联网36408的结构到LAN 3600中的IPv4的端到端链接或从互联网36600到LAN 36000的端到端IPv63608,即使在物理层级36102上可能存在一些不同节段也是如此。The key point is that the carpet framework of the GVN allows structures such as an end-to-end link from the IPv4 Internet 36408 to IPv4 in a LAN 3600 or end-to-end IPv6 3608 from the Internet 36600 to a LAN 36000 even though there may be some different segments at the physical layer 36102.

图37示出了GVN中的用于自动化设备协作的通信通路。本示例实施例示出了由中立API机制(NAPIM)API 37202 37206 37208用来实现在一起工作以构成全局虚拟网络(GVN)的各种设备之间的自动化交互的通信通路,诸如P37202-C。Figure 37 shows a communication path for automated device collaboration in a GVN. This example embodiment shows a communication path used by Neutral API Mechanism (NAPIM) APIs 37202 37206 37208 to implement automated interactions between various devices working together to form a global virtual network (GVN), such as P37202-C.

关键操作方面可自动化以便促成快速系统响应。这些包括基础架构操作、心跳例程、连接、测试和诊断、以及其他功能。Key operational aspects can be automated to facilitate rapid system response. These include infrastructure operations, heartbeat routines, connectivity, testing and diagnostics, and other functions.

基础架构操作诸如有可预测性地使设备操作系统软件和数据包从可靠来源更新、维护GVN模块和数据库、以及其他操作。例如,端点设备(EPD)100可以沿着路径P37202-B至37202-C经由API 37202查询中央控制服务器(SRV_CNTRL)200。在另一示例中,电子邮件门户服务器(SRV_GW_Email)37310可从作为受信任的系统软件的可靠来源的SRV_CNTRL200来更新系统数据包。Infrastructure operations such as predictably updating device operating system software and packages from reliable sources, maintaining GVN modules and databases, and other operations. For example, the endpoint device (EPD) 100 can query the central control server (SRV_CNTRL) 200 via API 37202 along path P37202-B to 37202-C. In another example, the email portal server (SRV_GW_Email) 37310 can update system packages from SRV_CNTRL 200, which is a reliable source of trusted system software.

经由守护进程或其他重复周期操作运行的其他项诸如心跳功能包括通过从设备(诸如接入点服务器(SRV_AP)300)经由API 37202通过路径P37202-A到P37202-C向SRV_CNTRL200进行报告保持服务启动、运行和健康。还存在有诸如经由API 37208通过路径P37208-A到P37208-C的冗余路径。其他心跳功能可以保持队列运行和将队列清除,可以复制日志记录数据,并且可以进行其他此类操作。Other items such as heartbeat functions, which operate via daemons or other recurring operations, include keeping services up, running, and healthy by reporting from a device (such as access point server (SRV_AP) 300) via API 37202 via paths P37202-A to P37202-C to SRV_CNTRL 200. Redundant paths also exist, such as via API 37208 via paths P37208-A to P37208-C. Other heartbeat functions can keep queues running and clear them, replicate logging data, and perform other such operations.

对于连接(诸如在EPD 100和SRV_AP 300之间的隧道P37206-C),该隧道的两端、即SRV_AP 300处的监听器和启动器EPD 100要求相关信息。这个信息可以包括与每个设备相关或与隧道相关的对等体对信息。两者都是经由经由API 37202的独立路径与SRV_CNTRL200通信。For a connection (such as tunnel P37206-C between EPD 100 and SRV_AP 300), both ends of the tunnel, the listener at SRV_AP 300 and the initiator EPD 100, require relevant information. This information may include peer pair information related to each device or related to the tunnel. Both communicate with SRV_CNTRL 200 via independent paths via API 37202.

通过将多个隧道挂接到虚拟接口以及在设备之间的多于一个隧道的选项(诸如EPD100至SRV_AP 200或SRV_AP 200至SRV_AP 20x之间),要求各种不同API调用管理多个隧道、路由、以及其他信息。With multiple tunnels attached to a virtual interface and the option of more than one tunnel between devices (such as between EPD 100 to SRV_AP 200 or SRV_AP 200 to SRV_AP 20x), various different API calls are required to manage the multiple tunnels, routes, and other information.

功率服务器可用性算法依赖对各种信息的系统分析,以便为EPD提供它们可经由隧道连接的SRV_AP服务器列表。由于每个隧道在映射到GVN构造的任一端部处要求IP地址和端口以便路由清晰,因此需要更新正改变的信息。自动化设备协作有助于此。The Power Server Availability Algorithm relies on systematic analysis of various information to provide EPDs with a list of SRV_AP servers they can connect to via tunnels. Since each tunnel requires an IP address and port at either end of the GVN fabric for routing clarity, this information needs to be updated as it changes. Automated device collaboration helps with this.

用于信息共享的关键部件是用于来自层1物理网络、来自GVN构造层3、以及来自GVN层2处的逻辑的测试和诊断数据的信息共享。这个连接信息提供关于对SRV_CNTRL 200的分析的更多信息。对这个数据的复制也可经由API 37208或其他通信路径送往日志记录服务器。分析结果也可储存在日志记录服务器上。A key component for information sharing is the sharing of test and diagnostic data from the physical network at layer 1, from the GVN fabric layer 3, and from the logic at GVN layer 2. This connection information provides more information about the analysis of the SRV_CNTRL 200. A copy of this data can also be sent to the logging server via API 37208 or other communication paths. The analysis results can also be stored on the logging server.

API还可用于更新关于配对中的每一个对等体本身的信息(诸如对等体对凭据、ID、以及其他信息)、每一个对等体上的队列、用于调解的事务日志,通过内部安全审核进行更新,并且用于更新或添加或弃用API机制本身的动作功能。The API can also be used to update information about each peer in the pairing itself (such as peer pair credentials, ID, and other information), queues on each peer, transaction logs used for mediation, be updated through internal security audits, and be used to update or add or deprecate action functions of the API mechanism itself.

系统和资源监测和报告对于自动传达有关服务启动和正在运行、主机正在工作、数据库引擎启动和正在运行、安全系统正在运行和更多的信息同样是关键的。System and resource monitoring and reporting are also critical for automatically communicating information about services that are up and running, hosts that are functioning, database engines that are up and running, security systems that are functioning, and more.

图38示出了动态隧道建立的问题和挑战。这个示例使用了从GVN的存储库38R-00到设备38D-00的文件、数据库结构和其他数据的传输来说明动态隧道构建的问题和挑战。在大多数的情况下,存储库38R-00将是在GVN的中央服务器(SRV_CNTRL)上。设备38D-00可以是端点设备(EPD)、接入点服务器(SRV_AP)、网关服务器(SRV_GW_XX)或GVN的其他设备。Figure 38 illustrates the issues and challenges of dynamic tunnel establishment. This example uses the transfer of files, database structures, and other data from a repository 38R-00 in the GVN to a device 38D-00 to illustrate the issues and challenges of dynamic tunnel establishment. In most cases, the repository 38R-00 will be on a central server (SRV_CNTRL) in the GVN. The device 38D-00 can be an endpoint device (EPD), an access point server (SRV_AP), a gateway server (SRV_GW_XX), or other GVN device.

根据设备类型,新创建的设备可以加载要在首次引导期间配置的主盘的复制体,或者如远程服务器的情况那样,第一引导脚本将安全地传输到服务器以运行来拉动基本系统文件。其他可能情景可以结合预先加载文件与要远程加载的文件的组合。Depending on the device type, a newly created device can load a copy of the master disk to be configured during the first boot, or, as in the case of a remote server, a first boot script will be securely transferred to the server to be run to pull the basic system files. Other possible scenarios may combine a combination of pre-loaded files and files to be loaded remotely.

在运行第一引导脚本时,大多数的当前数据库结构从来自DB结构存储库38R-06-A的存储库38R-00复制到设备38D-00上的Db 38D-04。填充该数据库的数据将经由38P06从DB数据存储库38R-06-B发送到标识信息模块38S-00。可过滤和修改传递通过38S-00的一些数据,以便并入标识信息(诸如Device_ID和其他UUID元素)和以直接复制而无修改的方式传递通过的其他数据。When the first boot script is run, most of the current database structure is copied from the repository 38R-00 from the DB structure repository 38R-06-A to the Db 38D-04 on the device 38D-00. The data that populates the database is sent from the DB data repository 38R-06-B to the identification information module 38S-00 via 38P06. Some of the data passed through 38S-00 may be filtered and modified to incorporate identification information (such as Device_ID and other UUID elements), and other data is passed through directly without modification.

根据设备类型和该设备的通用唯一标识符(UUID),适用于设备38D-00的数据经由路径38P16而发送到数据库38D-04。一些信息还可能被填入模板配置文件,所述模板配置文件可以被克隆到设备38D-00上的软件和配置文件存储器38D-02。对于设备而言是唯一的标识信息可能包括:设备属性、命名和UUID信息、凭据/密钥、密钥调节器、其他信息。Data applicable to device 38D-00 is sent to database 38D-04 via path 38P16 based on the device type and its universally unique identifier (UUID). Some information may also be populated into a template configuration file, which can be cloned into software and configuration file storage 38D-02 on device 38D-00. Identifying information unique to a device may include device attributes, naming and UUID information, credentials/keys, key modifiers, and other information.

用于系统数据包和其他模块的设置文件将从存储库38R-00上的设置文件存储库38R-02-B克隆并且经由路径38P02发送到设备38D-00上的软件和配置文件存储器38D-02。一些“出厂默认设置”和其他文件还可能经由路径38P10复制到设备38D-0上的安全文件存储器38D06。安全文件存储器38D-06是由GVN的文件和文件夹管理器来管理。需要时来自38D-06的文件还可能经由38P12被克隆至38D-02,诸如在必须返回到出厂设置的情形下。Configuration files for system packages and other modules are cloned from configuration file repository 38R-02-B on repository 38R-00 and sent to software and configuration file storage 38D-02 on device 38D-00 via path 38P02. Some "factory default settings" and other files may also be copied to secure file storage 38D06 on device 38D-0 via path 38P10. Secure file storage 38D-06 is managed by the GVN's file and folder manager. Files from 38D-06 may also be cloned to 38D-02 via 38P12 when needed, such as in the event of a necessary return to factory settings.

来自存储库39R-00的代码库文件39R-02-A可以经由路径38P00被复制到软件和配置文件存储器38D-02,并且还可以经由路径38P8被复制到安全文件存储器38D-06。The code base file 39R-02-A from the repository 39R-00 may be copied to the software and configuration file storage 38D-02 via path 38P00 and may also be copied to the secure file storage 38D-06 via path 38P8.

上述示出了在首次引导、更新、定期数据交换和其他操作期间的文件和数据从存储库至设备的载入。The above illustrates the loading of files and data from the repository to the device during first boot, updates, periodic data exchanges, and other operations.

图39示出了经由两个或更多个EPD将两个LAN桥接为广域网(WAN)。更具体来说,此图示出了经由EPD将两个LAN39-000和39-010桥接为广域网(WAN)。各个EPD首先经由在其互联网连接之上建立的基站隧道连接至接入点服务器SRV_AP 39-200。Figure 39 shows bridging two LANs into a wide area network (WAN) via two or more EPDs. More specifically, this figure shows bridging two LANs 39-000 and 39-010 into a wide area network (WAN) via EPDs. Each EPD first connects to an access point server SRV_AP 39-200 via a base station tunnel established over its Internet connection.

从EPD 39-100,基站连接性路径OTT是经由路径39-PO02至存在点(POP)39-002至互联网39-004至SRV_AP 39-200的POP 39-006。从EPD 39-110,基站连接性路径OTT是经由路径39-PO12至存在点(POP)39-012至互联网39-014至SRV_AP 39-200的POP 39-016。From EPD 39-100, the base station connectivity path OTT is via path 39-PO02 to point of presence (POP) 39-002 to the Internet 39-004 to POP 39-006 of SRV_AP 39-200. From EPD 39-110, the base station connectivity path OTT is via path 39-PO12 to point of presence (POP) 39-012 to the Internet 39-014 to POP 39-016 of SRV_AP 39-200.

从POP 39-006至POP 39-016的传输路径39-P06可以是通过互联网的路径,藉由经过SRV_AP并且依赖于在公共网络上的路由。若EPD 39-100想要经由互联网连接至39-102,则其可能基于无法控制GVN或EPD的策略沿着不同路由。The transmission path 39-P06 from POP 39-006 to POP 39-016 may be a path through the Internet, by passing through the SRV_AP and relying on routing on the public network. If EPD 39-100 wants to connect to 39-102 via the Internet, it may follow a different route based on policies that are beyond the control of the GVN or EPD.

EPD 39-100在其自身与SRV_AP 39-200之间建立隧道TUN 39-P10。EPD 39-102还在自身与SRV_AP 39-200之间建立隧道TUN 39-P12。一个或两个这种隧道可能或可能不被加密或被保护。还可以存在另一隧道,内部隧道INT TUN 39-P20,所述内部隧道穿过两个其他隧道,在流量可以流过的SRV_AP 39-200处接合。此隧道可以是建立WAN的通信路径。EPD 39-100 establishes a tunnel, TUN 39-P10, between itself and SRV_AP 39-200. EPD 39-102 also establishes a tunnel, TUN 39-P12, between itself and SRV_AP 39-200. One or both of these tunnels may or may not be encrypted or protected. There may also be another tunnel, an internal tunnel, INT TUN 39-P20, that passes through the two other tunnels and joins at SRV_AP 39-200, through which traffic can flow. This tunnel may establish a WAN communication path.

所述隧道和基站连接连接性可以使用不同网络协议。由GVN提供的网络毯式框架可以是不同网络协议的混合,所述网络协议被映射至一系列各种网络节段,同时GVN可以是在内部隧道内的一种网络类型的端对端。The tunnel and base station connection connectivity can use different network protocols. The network carpet framework provided by the GVN can be a mixture of different network protocols mapped to a series of various network segments, while the GVN can be one type of network end to end within the internal tunnel.

图40示出了在GVN上运行的多周界机制(MPFWM)。此实例表明了在全局虚拟网络(GVN)中的元素之上(OTT)可以如何存在第二级40TOP88。在第一级OTT 40TOP86处,GVN 40-86操作OTT,基站互联网连接性40-82。在多周界防火墙机制40-88构造的情形下,GVN操作OTT并且由此可以被构造为顶部元素之上的第二级40TOP88。Figure 40 illustrates a multi-perimeter firewall mechanism (MPFWM) running on a GVN. This example illustrates how a second level 40TOP88 can exist above the elements (OTT) in a global virtual network (GVN). At the first level OTT 40TOP86, the GVN 40-86 operates the OTT, the base station Internet connectivity 40-82. In the case of a multi-perimeter firewall mechanism 40-88 configuration, the GVN operates the OTT and can thus be configured as a second level 40TOP88 above the top element.

图41示出了建立在互联网顶部之上(OTT)的GVN堆栈。此实例描述了建立在互联网41-000之上的GVN 41-800堆栈。该图图示了经由隧道TUN 41-100-300和TUN 41-100-302的在EPD 100与两个SRV_AP服务器300和302之间的连接性。这样的两个隧道是在EPD与最佳当前接入点服务器(SRV_AP)之间的多个隧道选项的实例,基于服务器可用性和其他因素诸如目的地、流量类型、在起始点与目的地之间的各种网络节段的QoS和其他。FIG41 illustrates a GVN stack built on top of the Internet (OTT). This example depicts a GVN 41-800 stack built on top of the Internet 41-000. The figure illustrates connectivity between an EPD 100 and two SRV_AP servers 300 and 302 via tunnels TUN 41-100-300 and TUN 41-100-302. These two tunnels are examples of multiple tunnel options between an EPD and a best-current access point server (SRV_AP), based on server availability and other factors such as destination, traffic type, QoS of various network segments between the origin and destination, and others.

毯式框架41-500将独立网络节段的各种网络协议以及端对端协议编织在一起,所述端对端协议可以是“经过”GVN路径。The carpet framework 41 - 500 weaves together the various network protocols of the independent network segments as well as the end-to-end protocols that may be “through” the GVN path.

群集GVN设备41-600表示在GVN设备之间的路由的物理层。Clustered GVN devices 41-600 represent the physical layer of routing between GVN devices.

经由其他链路41-700的GVN全局网络OTT互联网+是GVN层2逻辑,其中诸如地理目的地、DNS管理、高级智能路由(ASR)/全局ASR(GASR)、服务器可用性、隧道管理和构建器模块、等等的模块操作。The GVN Global Network OTT Internet+ via other links 41-700 is the GVN layer 2 logic, where modules such as geographic destination, DNS management, Advanced Smart Routing (ASR)/Global ASR (GASR), server availability, tunnel management and builder modules, etc. operate.

GVN 41-800表示客户端用户看到的网络。GVN 41-800 represents the network seen by client users.

图42将互联网协议IP堆栈B2、OSI模型C2和GVN堆栈C3进行比较。FIG42 compares the Internet Protocol IP stack B2, the OSI model C2, and the GVN stack C3.

IP堆栈由网络接口T1、互联网T2、传输T3和应用T4组成。The IP stack consists of the network interface T1, the internet T2, transport T3, and applications T4.

针对非GVN流量并且针对通过ETH NIC N1流出的客户端不可见的物理隧道,由客户端看到的IP堆栈沿着在网络接口T1层处的元素R1、在互联网T2层处的元素R2A、在传输T3层处的元素R3A或R3B和在应用T4层处的元素R4A、R4B或R4C。For non-GVN traffic and for the client-invisible physical tunnel flowing through ETH NIC N1, the IP stack seen by the client is along element R1 at the network interface T1 layer, element R2A at the internet T2 layer, element R3A or R3B at the transport T3 layer, and element R4A, R4B or R4C at the application T4 layer.

针对通过GVN隧道和网络的流量,客户端将在网络接口T1层处的R4C、在互联网T2层处的R5、在传输T3层处的R6A或R6B、以及在应用T4层处的R7A、R7B或R7C观察到其GVN流量。For traffic passing through the GVN tunnel and network, the client will observe its GVN traffic at R4C at the network interface T1 layer, R5 at the internet T2 layer, R6A or R6B at the transport T3 layer, and R7A, R7B, or R7C at the application T4 layer.

尽管OSI模型可能被客户端用于通过隧道的IP流量,GVN具有其自身网络接口G1、互联网G2、传输G3、GVN路由与逻辑G4、GVN互联网G5、GVN传输G6和应用G7的堆栈。While the OSI model may be used by the client for IP traffic passing through the tunnel, the GVN has its own stack of network interfaces G1, internet G2, transport G3, GVN routing and logic G4, GVN internet G5, GVN transport G6, and applications G7.

逻辑logic

示出了国家之间经由众多可能路由的全局互联网流。在全局互联网上的流量在国家之间经由众多可能路由流动,所述路由在对等体之间传输不同互连。Shown is the global Internet flow between countries via numerous possible routes. Traffic on the global Internet flows between countries via numerous possible routes that carry different interconnections between peers.

在区域诸如亚洲内国家的互联网主要由地面和淹没的海洋链路彼此连接。通常它们在从一个国家至另一国家的流量传输中间的第三或其他国家的地方链接。Internet access in regions such as Asia is primarily connected to one another by terrestrial and submerged ocean links, often linking to a third country or other country in the middle of traffic transmission from one country to another.

43-X01表示从亚洲至欧洲的最直接路由。例如经由43-X01从香港至巴黎的延迟时间根据采取的路由将在180ms与250ms之间。43-X01 represents the most direct route from Asia to Europe. For example, the latency from Hong Kong to Paris via 43-X01 will be between 180ms and 250ms depending on the route taken.

43-X02是间接的较长路径,其中通过互联网自然推送流量。此处流量从亚洲经由链路43-P400去往美国西海岸43-400随后经由链路43P402去往美国东海岸43-402,并且随后经由链路43P600去往欧洲43-600的着陆点。经由43-X02的延迟时间根据欧洲的目的地将为近似396ms至550ms或更久。43-X02 is an indirect, longer path where traffic is naturally pushed through the internet. Here, traffic goes from Asia via link 43-P400 to the US West Coast 43-400, then via link 43P402 to the US East Coast 43-402, and then via link 43P600 to the landing point in Europe 43-600. The latency via 43-X02 will be approximately 396ms to 550ms or more, depending on the destination in Europe.

在离开区域之前,流量可能在其可以接入国际主干之前必须从一个国家中继至一个或多个其他国家(等)。这样的额外区域中跳跃可以将50ms至150ms或更多添加至RTT,甚至在流量离开区域之前。Before leaving the region, traffic may have to be relayed from one country to one or more other countries (etc.) before it can access the international backbone. Such additional intra-regional hops can add 50ms to 150ms or more to the RTT, even before the traffic leaves the region.

一旦在目的地区域中,流量将在一个国家中例如在UK 43-600中从跨大西洋链路43P600着陆。从UK 43-600,流量将经由链路43-600运行至法国43-602并随后经由链路43P606运行至德国43-606。这样的额外区域中跳跃可以根据目的地将30ms至更多ms添加到RTT。Once in the destination region, traffic will land in a country, such as the UK 43-600, from transatlantic link 43P600. From the UK 43-600, traffic will run via link 43-600 to France 43-602 and then via link 43P606 to Germany 43-606. This additional intra-region hop can add 30ms to more milliseconds to the RTT, depending on the destination.

国际回程质量还可以在对等体之间变化,其中各者具有各种RTT QoS时间。在正常互联网上的路由和对应速度是决定的中间人参与者,并且这些在基于通常传递慢RTT速度的最低费用的大部分情形下。高延迟时间不是较低质量网络要应付的唯一问题。这些通常具有较高拥塞级别和对应高分组丢失。丢失和缓慢链路显著降低性能。International backhaul quality can also vary between peers, each with varying RTT QoS times. Routing and corresponding speeds are intermediary players in the regular internet, and in most cases, these are based on the lowest cost, typically delivering slow RTT speeds. High latency isn't the only issue lower-quality networks have to contend with. These often have higher congestion levels and correspondingly higher packet loss. Lossy and slow links significantly degrade performance.

图44再次将互联网协议IP堆栈、OSI模型和GVN网络堆栈进行比较。此实例再次将各种概念性网络模型诸如TCP/IP堆栈B2、开放系统互连模型(OSI)A2C2、还有变化诸如在GVN堆栈A3中的TCP/IP模型、以及GVN C3的模型进行比较。Figure 44 again compares the Internet Protocol (IP) stack, the OSI model, and the GVN network stack. This example again compares various conceptual network models such as the TCP/IP stack B2, the Open Systems Interconnection (OSI) model A2C2, and variations such as the TCP/IP model in the GVN stack A3, and the GVN C3 model.

呈现两种角度。客户端角度A1将A2和A3并列比较。全局虚拟模型架构C1将C2与C3比较。还存在B2的树状连接层。Two perspectives are presented. Client perspective A1 compares A2 and A3 side by side. Global virtual model architecture C1 compares C2 and C3. There is also a tree-like connection layer B2.

在TCP/IP模型B2中,存在与以太网协议R1对应的网络接口T1。互联网T2与互联网协议(IP)R2对应。传输T3层与TCP协议R3A和UDP协议R3B对应。其他协议可存在并且在此层操作。此层之上是应用层T4,其中存在超文本传输协议HTTP R4A、邮件服务POP3R4B和GVN应用。其他应用诸如文件传输协议(FTP)或其他服务可以存在于此层中。In the TCP/IP model B2, there is a network interface T1 corresponding to the Ethernet protocol R1. The Internet T2 corresponds to the Internet Protocol (IP) R2. The transport layer T3 corresponds to the TCP protocol R3A and the UDP protocol R3B. Other protocols may exist and operate at this layer. Above this layer is the application layer T4, which includes the Hypertext Transfer Protocol HTTP R4A, the mail service POP3 R4B, and the GVN application. Other applications such as the File Transfer Protocol (FTP) or other services may also exist at this layer.

为了在B2范围中比较TCP/IP模型与OSI模型,OSI数据链路S9和物理链路S8与T1平行。OSI网络S10与T2平行。OSI传输S11与T3平行。To compare the TCP/IP model with the OSI model in scope B2, the OSI data link S9 and physical link S8 are parallel to T1. The OSI network S10 is parallel to T2. The OSI transport S11 is parallel to T3.

OSI会话S12、表示S13和应用S14层在R4C,GVN应用的范围内。The OSI session S12, presentation S13 and application S14 layers are within the scope of R4C, GVN application.

通过GVN B3的TCP/IP模型建立了至R4C顶部的网络树的延伸。The extension of the network tree to the top of R4C is established through the TCP/IP model of GVN B3.

从客户端角度,层T1、T2、T3、T4结合为单个TCP/IP模型层T5,变成用于GVN的中立第三层的网络接口层。这与OSI模型A2物理S1和数据链路S2层进行比较。From the client's perspective, layers T1, T2, T3, and T4 are combined into a single TCP/IP model layer, T5, which becomes the network interface layer for the GVN, a neutral third layer. This is comparable to the OSI model A2 physical S1 and data link S2 layers.

在R4C之上,存在第三层中的互联网层的表示。互联网IP层于R5处并且这与互联网T6的A3等级和A2网络等级S3对应。Above R4C, there is a representation of the Internet layer in layer 3. The Internet IP layer is at R5 and this corresponds to the A3 level of the Internet T6 and the A2 network level S3.

TCP协议R6A和UDP协议R6B和此等级与A3等级传输T7和A2等级传输S4对应。其他协议可存在并且在此层操作。TCP protocol R6A and UDP protocol R6B correspond to this level with A3 level transmission T7 and A2 level transmission S4. Other protocols may exist and operate at this layer.

从客户端角度T8的应用层与互联网协议诸如FTP R7A、HTTP R7B和POP3对应。OSI模型将应用层T8拆分为三个层,会话S5、表示S6和应用S7。From the client's perspective, the application layer T8 corresponds to Internet protocols such as FTP R7A, HTTP R7B, and POP3. The OSI model divides the application layer T8 into three layers: session S5, presentation S6, and application S7.

在GVN的三层模型中,A1描述了在第三层中的操作而B1、B2描述了在第一层中的操作。在T4处的GVN应用R4C和在C1下的操作描述了第二层如何用以允许第三层在第一层之上操作。In the three-layer model of GVN, A1 describes operations in layer 3 while B1, B2 describe operations in layer 1. The GVN application R4C at T4 and operations under C1 describe how the second layer is used to allow the third layer to operate on top of the first layer.

在GVN的第三层和第一层中的网络操作之间存在相似性。There are similarities between the network operations in the third layer and the first layer of GVN.

网络连接性N0可以是经由WAN N2、专用电路N3、MPLS线路N4或其他链路至互联网的在定期互联网N1上的其他网络连接性。The network connectivity NO may be other network connectivity on the regular Internet N1 to the Internet via a WAN N2, a dedicated circuit N3, an MPLS line N4 or other link.

图45示出了在两个LAN之间经由GVN的隧道。特别地,此图描述了从LAN 45-000至LAN45-002通过GVN路径45P00至45P10的内部路径,所述分段通过内部隧道45L300。在两个LAN之间的任一方向中存在对客户端可见的五个跳跃45H0至45H8。通过45L300的路径是对客户端可见的GVN层。Figure 45 illustrates a tunnel between two LANs via the GVN. Specifically, this figure depicts the internal path from LAN 45-000 to LAN 45-002 via GVN paths 45P00 to 45P10, which are segmented through internal tunnel 45L300. In either direction between the two LANs, there are five hops 45H0 to 45H8 visible to the client. The path through 45L300 is the GVN layer visible to the client.

GVN 1级网络层45L100表示针对各种不同类型网络节段端对端的物理网络层。尽管在此图中未表明跳跃数量,并且网络节段至少等于并且最有可能大于在内部隧道45L300中对客户端可见的彼等网络节段。The GVN Level 1 network layer 45L100 represents the physical network layer end-to-end for various types of network segments. Although the number of hops is not indicated in this figure, the network segments are at least equal to and most likely larger than those visible to the client in the internal tunnel 45L300.

逻辑层2级逻辑45L200是发生各种网络节段整合、路由和其他GVN操作的逻辑。Logical layer level 2 logic 45L200 is the logic where various network segment integration, routing, and other GVN operations occur.

若客户端路径是通过隧道的IPv6,针对IPv4段而言仅如同45-104,则内部IPv6流量可以此方式封包使得其可以与网络层45L100的网络类型无关地保持固有IPv6端对端。If the client path is IPv6 through a tunnel, just like 45-104 for the IPv4 segment, the internal IPv6 traffic can be packetized in such a way that it can remain native IPv6 end-to-end regardless of the network type of the network layer 45L100.

图46将在基站等级经由路径P01至P13的网络与通过GVN T01至T03的网络进行比较。FIG. 46 compares the network at base station level via paths P01 to P13 with the network through GVNs T01 to T03.

在基站互联网等级CTN140的大量测量是经由EPD 46-100至SRV_AP 46-300的LAN至GVN,针对此测量评估带宽BW、延迟时间Δt=A ms、分组丢失和其他因素的连接性指标。在连接的另一端,在CTN142的相似测量BW、Δt=C ms、分组丢失和其他因素测量了流量从EPD46-102至GVN中的上升。通过在SRV_AP 46-300和SRV_AP 46-302之间的GVN,针对GVN跨区域OTT,各种互联网节段CTN340测量了BW、Δt=B ms、分组丢失,并且评估其他因素。通过GVN层三GVN4-3的全部路径延迟时间可以被计算为延迟时间的总和A+B+C,全部以毫秒计。At the base station internet-level CTN 140, extensive measurements are made from the LAN to the GVN via EPD 46-100 to SRV_AP 46-300. Connectivity metrics such as bandwidth (BW), latency (Δt = A ms), packet loss, and other factors are evaluated for these measurements. At the other end of the connection, similar measurements of BW, Δt = C ms, packet loss, and other factors at CTN 142 measure the rise in traffic from EPD 46-102 to the GVN. Through the GVN between SRV_AP 46-300 and SRV_AP 46-302, various internet segments (CTN 340) measure BW, Δt = B ms, packet loss, and other factors for GVN cross-regional OTT. The total path latency through GVN layer 3, GVN 4-3, can be calculated as the sum of latency times A+B+C, all measured in milliseconds.

在GVN层三GVN4-3,ASR和其他特征支配了流量如何流过GVN并且在何处流过GVN。这需要确定基于目标区域发送流量的最佳隧道和流量类型、通过GVN的节段的QoS和其他因素。At GVN layer 3, GVN4-3, ASR and other features govern how and where traffic flows through the GVN. This requires determining the best tunnel and traffic type to send traffic based on the target area, the QoS of the segments passing through the GVN, and other factors.

在GVN层一GVN4-1,基站网络连接性的物理条件被监控并测试以确定最佳路由选项,在所述路由选项之上构建GVN隧道和通过其等的路径。GVN路径可以通过相连隧道传输,所述相连隧道经过SRV_AP、SRV_BBX和其他GVN硬件设备。这还可确定继续使用哪些隧道和弃用哪些隧道。At the GVN layer, GVN4-1, the physical conditions of the base station's network connectivity are monitored and tested to determine the best routing options. GVN tunnels and paths through them are then constructed based on these routing options. GVN paths can be transported through connected tunnels that pass through SRV_APs, SRV_BBXs, and other GVN hardware devices. This also determines which tunnels to continue using and which to abandon.

在GVN层二GVN4-2的机制、模块和构成部分有助于设置、测试、管理和另外操作在层三GVN4-3与GVN层一GVN4-1之间的管道。隧道测试46-310可以在EPD 4100并且在SRV_AP46-300经由其隧道测试器46-312在层三中完成。The mechanisms, modules and components at GVN layer two GVN 4-2 facilitate setting up, testing, managing and otherwise operating the pipe between layer three GVN 4-3 and GVN layer one GVN 4-1. Tunnel testing 46-310 may be accomplished at layer three at the EPD 4100 and at the SRV_AP 46-300 via its tunnel tester 46-312.

图47示出了高级智能路由(ASR)特征以及端点设备(EPD)内的GVN的地理目的地机制的元素。这包括使用多个DNS源来将流量经由多个路径发送至在世界各个区域中的流出点。在本示例实施例中示出的目标流量区域是:1)本地流量从VIF3 47-118至互联网47-004保持本地;2)去往其他区域互联网47-002的流量将从VIF1 47-112通过TUN1 102-6至路径47P48至SRV_AP 47-300并随后经由路径47P50至互联网47-002;3)用于其他区域互联网47-006的流量将从VIF2 47-116通过TUN2 102-8至路径47P52至SRV_AP 47-302并随后经由路径47P54至互联网47-006;以及4)用于其他区域互联网47-008的流量将从VIF3 47-118通过TUN3 102-10至路径47P56至SRV_AP 47-304并随后经由路径47P62至互联网47-008。Figure 47 shows the Advanced Smart Routing (ASR) feature and elements of the geographic destination mechanism of the GVN within the endpoint device (EPD). This includes using multiple DNS sources to send traffic via multiple paths to egress points in various regions of the world. The target traffic areas shown in this example embodiment are: 1) local traffic remains local from VIF3 47-118 to the Internet 47-004; 2) traffic destined for the other regional Internet 47-002 will be from VIF1 47-112 through TUN1 102-6 to path 47P48 to SRV_AP 47-300 and then to the Internet 47-002 via path 47P50; 3) traffic for the other regional Internet 47-006 will be from VIF2 47-116 through TUN2 102-8 to path 47P52 to SRV_AP 47-302 and then to the Internet 47-006 via path 47P54; and 4) traffic for the other regional Internet 47-008 will be from VIF3 47-118 through TUN3 102-10 to path 47P56 to SRV_AP 47-304 and then via path 47P62 to the Internet 47-008.

SRV_AP 47-304包括更多细节以示出其组件AP逻辑47-314和内容拉取代理47-318的一些功能性。此外,EPD 100包括更多细节的流程图以示出其内部功能组件。The SRV_AP 47-304 includes more detail to illustrate some of the functionality of its components, the AP logic 47-314 and the content pull proxy 47-318. Additionally, the EPD 100 includes a flow diagram in more detail to illustrate its internal functional components.

隧道TUN1 102-6、TUN2 102-8、TUN3 102-10和通过VJF具有在虚拟接口VIF1 47-112、VIF2 47-116、VIF3 47-118各者应用的路由表的流量流以与虚拟接口和隧道相似的方式操作。Tunnels TUN1 102-6, TUN2 102-8, TUN3 102-10 and traffic flows through the VJF with routing tables applied at each of virtual interfaces VIF1 47-112, VIF2 47-116, VIF3 47-118 operate in a similar manner to virtual interfaces and tunnels.

DNS高速缓存47-114从多个DNS源经由本地DNS查询机制47-110通过路径47P38经由47P34播种至互联网47-004至SRV_DNS 47-104。远程DNS查询机制47-108可以使DNS请求经由内容拉取代理(CPA)47-318经由47P44至SRV_DNS 47-114。The DNS cache 47-114 is seeded from multiple DNS sources via a local DNS query mechanism 47-110 through path 47P38 via 47P34 to the Internet 47-004 to SRV_DNS 47-104. The remote DNS query mechanism 47-108 may make DNS requests via a content pull proxy (CPA) 47-318 via 47P44 to SRV_DNS 47-114.

地理目的地机制(Geo-D)经由连接内容传递代理(CDA)47-106与CPA 47-318的47P04将路由信息推送到路由管理器47-104。经由J01的路径47P30至47P40是表示CPA 47-318与CDA47-106一起工作的协调的抽象。在CPA&CDA之间的通信仍是经由隧道和或API调用,或经由链接的高速缓存传输、通过隧道、或可以经由其他机制。The geographic destination mechanism (Geo-D) pushes routing information to the routing manager 47-104 via 47P04, which connects the content delivery agent (CDA) 47-106 with the CPA 47-318. Paths 47P30 to 47P40 via J01 are abstractions representing the coordination of the CPA 47-318 and the CDA 47-106 working together. Communication between the CPA and CDA is still via tunnels and/or API calls, or via linked cache transfers, through tunnels, or other mechanisms.

在此示例实施例中,通过Geo-D,CPA 47-318将全部区域内容从互联网47-008经由47P62拉取至SRV_AP 47-304以从寄存目的地内容的主机服务器47-110经由47P66拉取内容,并且在所述内容中CPA 47-318可能发现用于其他内容的链路并且CPA 47-318将随后从主机服务器47-108经由47P64拉取内容流。其他内容可能经由47P68从主机服务器47-112拉取。通常众多网站将网页寄存在一个服务器上、视频文件从另一服务器流动并且图形从另一服务器提供。In this example embodiment, through Geo-D, the CPA 47-318 pulls all regional content from the Internet 47-008 via 47P62 to the SRV_AP 47-304 to pull the content from the host server 47-110 hosting the destination content via 47P66. Within the content, the CPA 47-318 may find links to other content and the CPA 47-318 will then pull the content stream from the host server 47-108 via 47P64. Other content may be pulled from the host server 47-112 via 47P68. Typically, many websites host web pages on one server, stream video files from another server, and provide graphics from another server.

图48示出经由GVN采取的多个并行型流量路径的示例。EDGE-1的左侧表示LAN侧。右侧表示互联网面向侧。EDGE-2的右侧表示LAN侧并且左侧表示互联网面向侧。Figure 48 shows an example of multiple parallel traffic paths taken through a GVN. The left side of EDGE-1 represents the LAN side. The right side represents the Internet-facing side. The right side of EDGE-2 represents the LAN side and the left side represents the Internet-facing side.

来自LAN 001中设备的流量使EPD 101经由P002通过加密隧道P003离开至SRV_AP102并且可以流出至通用互联网106以经由路径H005到达主机客户端或服务器设备D005。来自LAN201中设备的流量使EPD 301经由P103离开至SRV_AP 302并且可以经由P106流出至互联网106以经由路径H005到达主机客户端或服务器设备D005。Traffic from devices in LAN 001 leaves EPD 101 via P002 through encrypted tunnel P003 to SRV_AP 102 and can flow out to the public Internet 106 to reach host client or server device D005 via path H005. Traffic from devices in LAN 201 leaves EPD 301 via P103 to SRV_AP 302 and can flow out to the Internet 106 via P106 to reach host client or server device D005 via path H005.

EPD 101可以经由互联网106通过P003至SRV_AP 102至P006至互联网106至P106至SRV_AP 302至P103至EPD 301链接至EPD 301。在EPD与SRV_AP之间存在经由路径P003和P103的安全隧道。为了确保完全安全性,针对端对端安全隧道,在EPD之间的路径是EPD 101至P005至SRV_AP 103至P007至WAN 107至P107至SRV_AP 302至P105至EPD 301。EPD 101 can be linked to EPD 301 via Internet 106 via P003 to SRV_AP 102 to P006 to Internet 106 to P106 to SRV_AP 302 to P103 to EPD 301. A secure tunnel exists between the EPD and SRV_AP via paths P003 and P103. To ensure full security, the path between EPDs for an end-to-end secure tunnel is EPD 101 to P005 to SRV_AP 103 to P007 to WAN 107 to P107 to SRV_AP 302 to P105 to EPD 301.

EPD 101可以构建经由P003至SRV_AP 102的安全隧道并且从彼处经由P201至WAN103至P202至SRV_AP 104链接至另一安全隧道,并且随后在远程区域中经由路径P203流出至互联网105并经由路径H002流出至主机客户端或服务器设备D002。EPD 101 may build a secure tunnel via P003 to SRV_AP 102 and from there link to another secure tunnel via P201 to WAN 103 to P202 to SRV_AP 104 and then outbound in the remote region via path P203 to Internet 105 and via path H002 to host client or server device D002.

EPD 301可以构建经由P103至SRV_AP 302的安全隧道并且从彼处经由P301至WAN303至P302至SRV_AP 304链接至另一安全隧道,并且随后在远程区域中经由路径P303流出至互联网305并经由路径H004流出至主机客户端或服务器设备D004。EPD 301 may build a secure tunnel via P103 to SRV_AP 302 and from there link to another secure tunnel via P301 to WAN303 to P302 to SRV_AP 304 and then outbound in the remote region via path P303 to Internet 305 and via path H004 to host client or server device D004.

EPD 101还能够经由在EPD 101之间至SRV_102至SRV_AP 302至SRV_AP 304的安全隧道到达互联网305中的设备,并且从彼处流出至互联网305。EPD 101 can also reach devices in Internet 305 via secure tunnels between EPD 101 to SRV_102 to SRV_AP 302 to SRV_AP 304 and out to Internet 305 from there.

EPD 301还能够经由在EPD 301之间至SRV_302至SRV_AP 102至SRV_AP 104的安全隧道到达互联网105中的设备,并且从彼处流出至互联网105。EPD 301 can also reach devices in Internet 105 via secure tunnels between EPD 301 to SRV_302 to SRV_AP 102 to SRV_AP 104 and flow out from there to Internet 105 .

存在经由端对端隧道路由、至开放互联网上流出点的隧道、经由多个SRV_AP设备的隧道和其他选项的众多其他选项。There are numerous other options via end-to-end tunnel routing, tunneling to an egress point on the open Internet, tunneling via multiple SRV_AP devices, and other options.

由此示例示出的重要点是由GVN承运的客户端流量是通过GVN第三层,从客户端的角度所述通过GVN第三层与通过互联网的路径相同并且因此能够承运任何类型通过它的流量,尽管仍认识到由GVN提供的改良益处和较高安全度。The important point illustrated by this example is that client traffic carried by the GVN is through the GVN layer 3, which from the client's perspective is the same path as through the Internet and is therefore capable of carrying any type of traffic that passes through it, while still recognizing the improved benefits and higher security provided by the GVN.

例如,路径P008示出了在防火墙GW 002设备与防火墙GW 202设备之间以产生LAN-WAN-LAN网桥的WAN优化连接性。设备与设备间的通信在GVN的第三层内承运并且对GW 002和GW 202透明。For example, path P008 shows WAN optimized connectivity between firewall GW 002 and firewall GW 202 to create a LAN-WAN-LAN bridge. Device-to-device communications are carried within the third layer of the GVN and are transparent to GW 002 and GW 202.

出于简便目的,存在点(POP)网络接入点未在此图中示出。往返于互联网诸如互联网105的至设备D002的路径在H002中间具有POP。For simplicity, point of presence (POP) network access points are not shown in this figure. The path to device D002 to and from the Internet, such as Internet 105, has a POP in the middle of H002.

在此示例实施例中的WAN表示在互联网之上的GVN设备之间的安全隧道,并且因此任何提及WAN是在GVN的第三层,其中全部GVN流量仍传输第一层。The WAN in this example embodiment represents a secure tunnel between GVN devices over the Internet, and therefore any reference to the WAN is at layer 3 of the GVN, with all GVN traffic still traveling layer 1.

图49描述了从开始处的一个设备49-000到端点设备49-800的自动高级智能路由(ASR)。若路由不可用,则自动高级智能路由可以构建路由,包括但不限于构建新的隧道、以及针对最优化路径来更新内部路由。Figure 49 depicts Automatic Advanced Intelligent Routing (ASR) from a starting device 49-000 to an endpoint device 49-800. If a route is unavailable, Automatic Advanced Intelligent Routing can build a route, including but not limited to building a new tunnel and updating internal routing for the most optimized path.

表1直至表5由此算法用作数据点以出于路由目的使用,诸如确定用于从GVN通过接入点服务器至开放互联网的流量的最佳流出点。此数据还可以由算法用以帮助相对于另一路由区分哪一路由更优先。Tables 1 through 5 are used by the algorithm as data points for routing purposes, such as determining the best egress point for traffic from the GVN through the access point server to the open internet. This data can also be used by the algorithm to help prioritize which route over another.

表1列出从起始点到目的地的各种可用路径并且包括路径排名的评级。Table 1 lists the various available paths from the origin to the destination and includes a ranking of the paths.

表#1-评估通过GVN的各种路由的QoSTable #1 - Evaluating QoS of various routes through GVN

EPD和SRV_AP2指示从设备到互联网或从互联网到设备的出口/入口点(EIP)。双向箭头符示在两个设备之间的路由路径。这可以作为互联网之上的网络段,作为隧道或其他机制(可能作为GVN的部分)直接通过互联网或经由设备之间的其他网络路径。起始点在左侧并且目的地意味着流量将路由至或从此路由的最后位置。The EPD and SRV_AP2 indicate the egress/entry point (EIP) from the device to the internet or vice versa. The bidirectional arrow symbolizes the routing path between the two devices. This can be a network segment above the internet, directly through the internet via a tunnel or other mechanism (possibly as part of a GVN), or via another network path between the devices. The origin is on the left, and the destination indicates the final location to or from which the traffic will be routed.

所述评级是基于数个因素的用于路由的计算值。评级0.00意味着不可能路由。评级1.00意味着在有线线路速度延迟时间具有最高带宽的最佳路由。RT_ID是同时出于实用性、测试和记录目的区分一个路由与另一个的路由ID编号。这用以确定通过GVN的各种路由的质量。RT_ID是来自路由列表的特殊路由的识别符。The rating is a calculated value for a route based on several factors. A rating of 0.00 means an impossible route. A rating of 1.00 means the best route with the highest bandwidth at wireline speed and latency. RT_ID is a route ID number that distinguishes one route from another for practical purposes, testing, and logging purposes. This is used to determine the quality of various routes through the GVN. RT_ID is an identifier for a specific route from the route list.

表2描述了服务器可用性矩阵。Table 2 describes the server availability matrix.

表#2-服务器可用性矩阵Table #2 - Server Availability Matrix

在服务器可用性矩阵中保持的信息包括服务器_ID、服务器IP_地址_ID、端口编号、EPD_ID字段、参数字段(包括安全性和配置设定、状态标志和时间戳)。The information maintained in the server availability matrix includes server_ID, server IP_address_ID, port number, EPD_ID field, parameter fields (including security and configuration settings, status flags, and timestamps).

PRI是用以与EPD连接的服务器的加权优先级次序。优先级1是绝对最低优先级。0指示服务器是当前不可到达的。这在Flag_State方面不同,所述Flag_State指示记录是否是当前的。PRI可被保持在相同表中或在另一相关表中,由于PRI是持续变化值并且另一表将允许历史记录并分析。The PRI is a weighted priority order for servers to connect to the EPD. Priority 1 is the absolute lowest priority. 0 indicates that the server is currently unreachable. This differs from the Flag_State, which indicates whether the record is current. The PRI can be maintained in the same table or in another related table, as the PRI is a continuously changing value and another table will allow for historical recording and analysis.

Flag_State为0指示其是备用条目。Flag_State为1指示其是活动的并且其可以被使用。Flag_State为-1指示其已被隐退、不可使用。A Flag_State of 0 indicates that it is a spare entry. A Flag_State of 1 indicates that it is active and can be used. A Flag_State of -1 indicates that it has been retired and cannot be used.

表3示出了完全路径的延迟时间以及构成网络段的延迟时间。Table 3 shows the delay times of the complete path and the delay times of the constituent network segments.

表#3-路由->路径延迟时间评估Table #3 - Routing->Path Delay Time Evaluation

从LAN经由EPD至GVN的路径和或互联网或各种网络节段的组合具有总的路径等待时间,所述等待时间被另外称为RTT,往返时延。所述时间以毫秒计(ms)并用于从起始点到目的地和其返回至起始点的ICMP脉冲。The path from the LAN via the EPD to the GVN and either the Internet or a combination of various network segments has an overall path latency, otherwise known as RTT, round trip time. This time is measured in milliseconds (ms) and is used for an ICMP pulse from the origin to the destination and back to the origin.

为了评估最佳路由,其可能被拆分为网络节段组,所述网络节段组组成总的网络路径的构成部分。各个节段的评估可以提供关于路由的信息并提供可以使用的数据点。路径评级将总是给予流量额外优先级加权以传输互联网的GVN OTT对传输开放互联网的流量。To evaluate the best route, it can be broken down into groups of network segments that make up the overall network path. Evaluating each segment can provide information about the route and provide useful data points. Path ranking will always give extra priority to traffic that carries GVN OTT traffic over the open internet.

总的路径延迟时间是以下延迟时间的总和:LAN至EPD加EPD至SRV_AP加GVN传输加GVN流出至目的地。The total path delay time is the sum of the following delay times: LAN to EPD plus EPD to SRV_AP plus GVN transmission plus GVN outflow to the destination.

表4列出路由的服务属性的测得质量。Table 4 lists the measured quality of service attributes of the routes.

表#4-路由->测量到的QoS因素(当前和历史的)Table #4 - Routing->Measured QoS Factors (Current and Historical)

此表被保存为在另一位置和或区域中的源对等体与另一对等体之间的路由的当前和历史QoS(服务质量)结果的日志记录。其可以被实时使用以基于现实状况做出QoS期望决定。此表位于各个起始点设备上并且指示路由性能。This table is saved as a log record of current and historical QoS (Quality of Service) results for routes between a source peer and another peer in another location and/or region. It can be used in real time to make QoS expectation decisions based on current conditions. This table is located at each originating point device and indicates route performance.

各种因素用以评估线路质量比较。此等因素包括系统负载(负载)、安全性(SEC)、往返时延(RTT)、分组丢失(R-可靠性)、带宽(BW)、跳跃计数(EFF-效率)和其他因素(可用以评估线路参数的值阵列)。Various factors are used to evaluate and compare line quality. These factors include system load (load), security (SEC), round-trip time (RTT), packet loss (R - reliability), bandwidth (BW), hop count (EFF - efficiency), and other factors (an array of values that can be used to evaluate line parameters).

采用用于各个点的基线和其间的网络段,以便可以在具有不同硬件配置和网络速度、带宽、以及其他评级的资源之间进行比较。Baselines are used for various points and network segments in between so that comparisons can be made between resources with different hardware configurations and network speeds, bandwidth, and other ratings.

L_ID指示用于记录的路由信息的行ID。L_ID indicates a row ID for recorded routing information.

RT_ID是路径id。所述路径可以指示通过基站互联网、通过隧道、接合隧道、或其他GVN相关路由的路径。RT_ID is a path id. The path may indicate a path through the base station Internet, through a tunnel, through a bonded tunnel, or other GVN-related routing.

Reg_ID是目标区域ID。Reg_ID is the target region ID.

RTT是基于历史标准的往返时间或延迟时间。值1.0是标准的,而大于1.0指示低于通常延迟时间并且小于1.0指示大于通常延迟时间。RTT is the round trip time or latency based on historical standards. A value of 1.0 is standard, while values greater than 1.0 indicate lower than typical latency and values less than 1.0 indicate higher than typical latency.

SEC是安全性评级。值1.0是安全的,且值0.0指示完全不安全和完全折衷的资源。这是基于安全性测试、性能记录和其他数据点。低于1.0的任何值备受关注。SEC stands for Security Rating. A value of 1.0 is secure, while a value of 0.0 indicates a completely unsafe and compromised resource. This is based on security testing, performance records, and other data points. Any value below 1.0 is of concern.

R是可靠性并且涉及路由上的分组丢失。例如,R=0.97指示路由上的3%分组丢失。值R=1.0指示0%数据包丢失和100%可靠性。大于一的评级指示沿着路由发送的分组的平行复制。R=2.0指示针对发送的复制分组的100%可靠性。R is reliability and relates to packet loss along a route. For example, R = 0.97 indicates 3% packet loss along a route. A value of R = 1.0 indicates 0% packet loss and 100% reliability. A rating greater than one indicates parallel replication of packets sent along the route. R = 2.0 indicates 100% reliability for the replicated packets sent.

EFF指示就跳跃计数而言相对于路由长度的线路效率并且基于其历史平均值。EFF值1.0意味着标准跳跃计数且小于1意味着大于通常跳跃计数。大于一的值意味着小于通常跳跃计数。EFF indicates the line efficiency in terms of hop count relative to the route length and is based on its historical average. An EFF value of 1.0 means a standard hop count and less than 1 means a larger than usual hop count. A value greater than one means a smaller than usual hop count.

BW(带宽)基于针对与两点之间的完全网络节段结合的基站连接的线路评级。针对BW的值1.0意味着100%的BW是可用的。值0.5意味着基于路由BW评级仅50%的BW是可用的。并且若值大于一,诸如2.0,则这意味着200%的所述路由的BW容量评级是可用的并且可被采用。例如,针对两点之间的1GigE基站链接,0.55的评级指示550Mbp是可用的。2.0的评级指示可以采用2GigE、等等。BW (Bandwidth) is based on the route rating for a base station connection combined with a complete network segment between two points. A value of 1.0 for BW means 100% of BW is available. A value of 0.5 means only 50% of BW is available based on the route BW rating. And if the value is greater than one, such as 2.0, this means 200% of the route's BW capacity rating is available and can be used. For example, for a 1GigE base station link between two points, a rating of 0.55 indicates 550 Mbps is available. A rating of 2.0 indicates 2GigE can be used, and so on.

在RT_ID=1的情形下,1.0的SEC(安全性)值指示其是100%安全的,并且大于一的值RTT=1.1和BW=2.0指示从一点至另一点的所述路由RT_ID的连接性具有10%较低延迟时间并且是所述点之间的平均路由的可比较基线性能的带宽的两倍。In the case of RT_ID=1, a SEC (Security) value of 1.0 indicates that it is 100% secure, and values greater than one, RTT=1.1 and BW=2.0, indicate that the connectivity of the route RT_ID from one point to another has a 10% lower latency and twice the bandwidth of a comparable baseline performance of the average route between the points.

例如,其中RT_ID=5,0.80的安全性评级指示存在正在进行的安全性风险,并且0.30的相关可用BW评级显示服务器受到诸如DDoS或强力(Brute Force)的攻击,其中多个安全性威胁诸如多个并行请求的攻击(onslaught),所述请求使可用BW(带宽)饱和同时降低SEC(安全性)。For example, where RT_ID=5, a security rating of 0.80 indicates that there is an ongoing security risk, and the associated available BW rating of 0.30 shows that the server is under attack such as DDoS or Brute Force, with multiple security threats such as onslaughts of multiple parallel requests that saturate the available BW (bandwidth) while degrading SEC (security).

Flag_State=1指示当前的活动路由。且Flag_State=0指示不再使用的历史路由性能。时间戳指示UNIX时间戳的开始时间(自所述时刻的秒数)。Flag_State=1 indicates the current active route. And Flag_State=0 indicates the historical routing capability that is no longer used. Timestamp indicates the start time of the UNIX timestamp (the number of seconds since the time).

L_ID=3和L_ID=5表明了于两个不同UNIX时间戳1448674238和1448848558从起始点至区域Reg_ID=44之间的比较。其显示了随后的性能已经自先前的评级提高。相对于负载=0.7,负载=0.9的负载是较佳的,并且基本网络连接性也已改进。L_ID=3 and L_ID=5 show a comparison between the starting point and the region Reg_ID=44 at two different UNIX timestamps 1448674238 and 1448848558. This shows that the subsequent performance has improved from the previous rating. Compared to load=0.7, load=0.9 is better, and the basic network connectivity has also improved.

此表还可以用以藉由比较各个路由的QoS因素确定从起始点设备至目标区域的两个路由中的较佳路由。例如,L_ID=5和L_ID=6均指示从起始点至Reg_ID=44的当前(Flag_State=1)路由,尽管RT_ID=5和RT_ID=9的路由是不同的。跨此范围的二者中的较佳路由是RT_ID=9并且应在服务器可用性列表中以较高优先级加权。This table can also be used to determine the better of two routes from the originating device to the target region by comparing the QoS factors of each route. For example, L_ID=5 and L_ID=6 both indicate the current (Flag_State=1) route from the originating device to Reg_ID=44, even though the routes for RT_ID=5 and RT_ID=9 are different. The better of the two routes across this range is RT_ID=9 and should be weighted with a higher priority in the server availability list.

表5评估并排序在目标区域中的出入点(EIP)。Table 5 evaluates and ranks the entry and exit points (EIPs) in the target region.

表#5-区域中的EIPTable #5 - EIPs in Regions

ATR字段是属性字段。这是用以描述EIP规范(RAM、核心、存储空间、其他因素、等等)的属性阵列。S_ID字段保存服务器ID。IP_ID字段保存IP地址ID。带宽(BW)以GigE测量。例如,20Mbp是0.02,100Mbp是0.1且1GigE是1,并且40GigE是40。The ATR field is an attribute field. This is an array of attributes used to describe the EIP specifications (RAM, cores, storage, other factors, etc.). The S_ID field stores the server ID. The IP_ID field stores the IP address ID. Bandwidth (BW) is measured in GigE. For example, 20 Mbps is 0.02, 100 Mbps is 0.1, 1 GigE is 1, and 40 GigE is 40.

QoS(服务质量)表示用以处理连接和流量的服务器的当前EIP(出入点)适用性。1.0的QoS表示以可接受的可用BW(带宽)和极少直至无负载(服务器的资源负载,RAM、CPU、NIC和其他因素的组合)与EPD连接的服务器的理想状态,QoS (Quality of Service) indicates the suitability of the server's current EIP (Entry/Exit Point) to handle connections and traffic. A QoS of 1.0 indicates an ideal state for a server connected to an EPD with acceptable available BW (bandwidth) and little to no load (a combination of the server's resource load, RAM, CPU, NIC, and other factors).

小于1.0的QoS意指正被采用的服务器。若QoS接近零,则这意指由于容量饱和其接近全部无用。作为基准并且为了系统健康,小于0.40的QoS将指示服务器将以更低评级优先排序,以便加权具有更健康QoS的服务器以在列表上更高呈现并且由此将吸引连接并且不使任何当前服务器过载。A QoS of less than 1.0 means that the server is being used. If the QoS is close to zero, this means that it is close to being completely useless due to capacity saturation. As a baseline and for system health, a QoS of less than 0.40 will indicate that the server will be prioritized with a lower rating, so that servers with healthier QoS are weighted to appear higher on the list and thus attract connections without overloading any current servers.

此评估和评级机制还可以用作关于如何支持物理基础设施的构建的确定因素。This assessment and rating mechanism can also be used as a determining factor as to how to support the construction of physical infrastructure.

图50示出了低于周界50-832的BB/主干层与高于周界50-822的IP/互联网层之间的安全周界50-182。FIG. 50 illustrates a security perimeter 50 - 182 between the BB/backbone layer below the perimeter 50 - 832 and the IP/Internet layer above the perimeter 50 - 822 .

在适当位置存在两重自然保护。第一重保护是将两层接合在一起的唯一方式是经由路径50-TR6B22和50-TR6B32并且必须穿过安全周界。仅有效GVN流量可以在任一方向中经由两个逻辑检查传输。适当位置的其他安全保护是在安全周界50-182之上和之下的网络类型是不同的。Two layers of natural protection are in place. The first layer is that the only way to connect the two layers is via paths 50-TR6B22 and 50-TR6B32, which must traverse the security perimeter. Only valid GVN traffic can be transmitted in either direction, subject to both logical checks. Another layer of security protection is that the network types above and below the security perimeter 50-182 are different.

图51是全局虚拟网络(GVN)内的高级智能路由(ASR)的流程图。Figure 51 is a flow chart of Advanced Smart Routing (ASR) within a Global Virtual Network (GVN).

从在连接至端点设备(EPD)103的局域网(LAN)102中的主机客户端101设备的开始点,GVN提供EPD至多个潜在终端点的大量连接路径。这是流程图是路由逻辑的高级图示,分组可看作其采用ASR传输GVN以用于优化性能。从主机客户端101的角度,其流量将流过互联网协议(IP)网络,由于GVN的第三层的极少数跳跃和最佳可能延迟时间。GVN的第一层是具有虚拟接口、隧道、路由和其他网络政策的构造的自动配置的基站互联网。GVN的第二层是算法、软件和逻辑支配在层三与层一之间的操作的层。Starting from a host client 101 device in a local area network (LAN) 102 connected to an endpoint device (EPD) 103, the GVN provides numerous connection paths from the EPD to multiple potential endpoints. This flowchart is a high-level illustration of the routing logic, with packets being transported through the GVN using ASR for optimized performance. From the perspective of the host client 101, their traffic will flow through the Internet Protocol (IP) network, thanks to the very few hops and best possible latency of the GVN's Layer 3. The first layer of the GVN is an automatically configured network of base stations with the construction of virtual interfaces, tunnels, routing, and other network policies. The second layer of the GVN is the layer where the algorithms, software, and logic govern operations between Layer 3 and Layer 1.

第一主要路由判决是在EPOD内的逻辑门104处,其中流量流出至本地互联网107(此处EPD经由路径P104定位)或若其将经由P107经过安全缠绕并混淆的隧道至接入点服务器(SRV_AP)110,则提供至定位SRV_AP 110的区域的最佳连接性。在流量流出SRV_AP110之前,其经过路由逻辑门111。本地流出至互联网113的流量将经由路径P111去往那里的主机客户端115或主机服务器116。若流量不是本地的而是被中继至另一区域,则其将经由路径P116通过隧道118去往下一SRV_AP 119。The first major routing decision is at logic gate 104 within the EPOD, where traffic flows out to the local Internet 107 (where the EPD is located via path P104) or, if it will go through a securely wrapped and obfuscated tunnel via P107 to an access point server (SRV_AP) 110, providing optimal connectivity to the area where SRV_AP 110 is located. Before traffic flows out of SRV_AP 110, it passes through routing logic gate 111. Local traffic flowing out to the Internet 113 will go to host clients 115 or host servers 116 there via path P111. If the traffic is not local and is being relayed to another area, it will go to the next SRV_AP 119 via path P116 through tunnel 118.

在SRV_AP 119处,众多可能路由选项的三个选项由流量可采取的路径示出。逻辑门126确定流量应保留并且流出至本地互联网129,还是流量应通过隧道经由P126去往另一区域127中的SRV_AP。经由路径P119示出了另一可能性,其表明从SRV_AP 119至远端区域中的另一EPD 121的隧道。这是经由多个桥接隧道桥接的EPD 103至EPD 121。At SRV_AP 119, three of the many possible routing options are shown by the paths that traffic can take. Logic gate 126 determines whether the traffic should remain and flow out to the local internet 129, or whether the traffic should be tunneled via P126 to an SRV_AP in another region 127. Another possibility is shown via path P119, which indicates a tunnel from SRV_AP 119 to another EPD 121 in a remote region. This is EPD 103 to EPD 121, bridged via multiple bridge tunnels.

进一步可能性是流量到达LAN 122中的客户端设备125126,其中EPD 121通过EPD的连接P121定位。A further possibility is that the traffic arrives at client device 125126 in LAN 122, where EPD 121 is located via EPD's connection P121.

图52是通过GVN从起始点C 52-002到目的地S 52-502可用的各种路由的流程图。可以存在未示出或未论述的更多可能组合。Figure 52 is a flow diagram of the various routes available through the GVN from origin C 52-002 to destination S 52-502. There may be many more possible combinations that are not shown or discussed.

从客户端C 52-002至EPD 52-108的路径52CP00可以用于测量通过LAN至EPD的客户端的性能。最佳路由的匹配在测试后并评估可用路径的实时数据来实现。GVN从EPD经由第一跳跃52CP00进入接入点服务器(SRV_AP)52-102、52-104、52-106、52-202、52-204。The path 52CP00 from client C 52-002 to EPD 52-108 can be used to measure the performance of clients traveling through the LAN to the EPD. The best route is determined after testing and evaluating real-time data on available paths. The GVN from the EPD enters the access point servers (SRV_AP) 52-102, 52-104, 52-106, 52-202, and 52-204 via the first hop 52CP00.

从EPD至第一SRV_AP的路径可以被定义为从EPD至GVN中的入口点并且由此测量。从SRV_AP至SRV_AP的内部跳跃沿着内部路由,所述内部路由总是尝试维持最佳路径连接性。这些可以是OTT互联网、在主干之上、在暗色光纤之上、或其他相关路由。The path from the EPD to the first SRV_AP can be defined as and measured from the entry point from the EPD to the GVN. Internal hops from SRV_AP to SRV_AP follow internal routes that always attempt to maintain optimal path connectivity. These can be over-the-top internet, on a backbone, on dark fiber, or other relevant routes.

GVN之外的最佳出口点也保持本地追踪,所述本地追踪在该远程区域中并且还整体上用于从起始点至目的地的完整网络段。The best exit point outside the GVN also keeps local track, both in that remote area and also as a whole for the complete network segment from the origin to the destination.

测试可以考虑到评估的各种因素在各个分段、分段组合和从一端至另一端的总的网络路径上运行。流量类型和路径确定可以根据数据属性和简档QsS需求。主要路径选择总是基于路径之上流量的最佳因素。此机制的功能是匹配在目的地与起始点之间的路径以针对最佳可能双向路由流动。Tests can be run on individual segments, combinations of segments, and the overall network path from one end to the other, taking into account various factors to be evaluated. Traffic type and path determination can be based on data attributes and profile QsS requirements. Primary path selection is always based on the best factor for the traffic on that path. This mechanism functions to match paths between destinations and origins for the best possible bidirectional routing of flows.

表6是基于IP地址、协议(等)和端口(等)要本地保存的IP地址的列表。Table 6 is a list of IP addresses to be stored locally based on IP address, protocol (etc.) and port (etc.).

表#6-要本地保存的IP地址Table #6 - IP addresses to be saved locally

此表保存了要本地保存哪些IP地址,使得直接在EPD上或经由与EPD相同区域中的SRV_AP传输EIP(出口/入口点)。所述This table stores which IP addresses are to be stored locally so that the EIP (egress/entry point) is transmitted directly on the EPD or via an SRV_AP in the same region as the EPD.

LRI_ID字段保持本地路由IP地址ID。区域值0指示要本地保存的IP地址(等)应从EPD从其本地EIP直接去往互联网。区域值1至300指示国家和地区。较高区域ID的区域值表示更细化的粒度。IP4_地址字段保持IPv4地址。The LRI_ID field holds the local routing IP address ID. A region value of 0 indicates that the IP address (etc.) to be stored locally should be directed to the internet from its local EIP from the EPD. Region values 1 to 300 indicate countries and regions. Higher region values indicate finer granularity. The IP4_Address field holds the IPv4 address.

在栏诸如协议或端口下,星号(“*”)意味着通配符涵盖在允许范围中或在允许值列表集合中的全部可能值。如果一个或多个值在一栏中并由逗点分开,那么其指示可以使用一个以上端口、或协议、或其他栏值。则仅明确指出的那些值将受表规定影响,未规定的其他值遵循默认行为。Under fields such as protocol or port, an asterisk ("*") is a wildcard character that covers all possible values in the allowed range or set of allowed values. If one or more values are in a field separated by commas, this indicates that more than one port, protocol, or other field value can be used. Only those values explicitly specified will be affected by the table specification; other values not specified follow the default behavior.

表7是IP地址范围、其目标地理目的地ID和此等规则应用至的EPD ID的列表。Table 7 is a list of IP address ranges, their target geographic destination IDs, and the EPD IDs to which these rules apply.

表#7-要经由地理目的地路由的IP地址表Table #7 - Table of IP addresses to be routed via geographical destinations

GDReg_ID字段保持地理目的地ID。区域值0指示要本地保存的IP地址(等)应从EPD从其本地EIP直接去往互联网。区域值1至300指示国家和地区。较高区域ID的区域值表示更细化的粒度。IP4_Start和IP4_End字段保持开始和结束IPv4地址。The GDReg_ID field holds the geographic destination ID. A region value of 0 indicates that the IP address (etc.) to be stored locally should be directed to the internet from its local EIP from the EPD. Region values 1 to 300 indicate countries and regions. Higher region values indicate finer granularity. The IP4_Start and IP4_End fields hold the starting and ending IPv4 addresses.

表8是由地理目的地机制采用的国家和其他地理区域的IP地址的基准。由于采用的大量IP地址,采用了CIDR符号。Table 8 is a benchmark of IP addresses for countries and other geographic regions used by the geographic destination mechanism. Due to the large number of IP addresses used, CIDR notation is used.

表#8-每区域的IP地址的基准Table #8 - Benchmarks of IP addresses per region

此表根据针对区域路由采用的粒度限定了全国范围块或区域块的IP地址范围。地理目的地路由的地址在区域IP地址表之前按顺序路由并且由此首先路由。This table defines the range of IP addresses for nationwide blocks or regional blocks, depending on the granularity used for regional routing. Addresses for geographic destination routing are routed in order before the regional IP address table and are therefore routed first.

CIPB_ID字段保持国家IP地址块ID。CIDR4栏指示IPv4地址的范围的CIDR。CIDR代表无类别域间路由,所述路由是描述IP地址范围的符号。例如,斜线八(/8)符号表示16,780,000个IP地址块。斜线二十(/20)表示4,096个IP地址。Total_IP4栏指示由CIDR4限定的范围覆盖的IPv4地址总数。The CIPB_ID field holds the national IP address block ID. The CIDR4 column indicates the CIDR number for the range of IPv4 addresses. CIDR stands for Classless Inter-Domain Routing, a notation used to describe IP address ranges. For example, a slash eight (/8) notation represents a block of 16,780,000 IP addresses. A slash twenty (/20) represents 4,096 IP addresses. The Total_IP4 column indicates the total number of IPv4 addresses covered by the CIDR4 range.

图53是控制从起点设备到端点设备的流量路由选择的算法的流程图。53 is a flow chart of an algorithm that controls the routing of traffic from an origin device to an endpoint device.

在GVN中,存在用于在GVN设备与各个其他设备诸如EPD和SRV_AP之间的基本等级互联网的途径的路由表,所述互联网之上可以构建隧道。路由表控制等级1(互联网等级)流量已经于等级3通过GVN的路由。有时,隧道可能不存在或者若隧道存在,其等可能不是最优的。GVN路由可以根据拓扑数据库被映射至现存和可能的GVN路由。关于基本网络段和设备间的链路的全部信息被存储在GVN数据库中。In the GVN, there is a routing table for the basic level internet route between GVN devices and various other devices, such as EPDs and SRV_APs, over which tunnels can be built. The routing table controls the routing of Level 1 (internet level) traffic through the GVN at Level 3. Sometimes, tunnels may not exist, or if they do exist, they may not be optimal. GVN routes can be mapped to existing and possible GVN routes based on the topology database. All information about basic network segments and links between devices is stored in the GVN database.

算法由识别特定GVN流量的目标区域开始。接着,进行检查以查看路径是否通过GVN5306存在。若路径不存在,则构建新的隧道5310。下一步骤是检查隧道5312的健康。若其不健康,则将构建新的替代隧道5310。一旦健康隧道是可用的,检查路由健康5320。The algorithm begins by identifying the target area for a particular GVN traffic flow. Next, a check is performed to see if a path exists through GVN 5306. If not, a new tunnel 5310 is constructed. The next step is to check the health of tunnel 5312. If it is unhealthy, a new replacement tunnel 5310 is constructed. Once a healthy tunnel is available, the route health is checked 5320.

若在目标区域5322中至EIP的路径存在路由并且检查所述路由以查看它对流量类型而言是否是最佳路由。若它是最佳路由,则使用所述路由5360。If a route exists in the target area 5322 to the EIP, the route is checked to see if it is the best route for the traffic type. If it is the best route, the route is used 5360.

若所述路由对数据类型而言是不理想的,则检查以查看是否存在替代5350。若存在替代,则采用对流量类型而言最佳的路由5352并且使用彼最佳路由5360。当使用路由时,过程评估路由性能5365。在算法完成之前,另一过程将性能数据经由P5328保存在关于服务器可用性、关于EIP 5322的列表还有关于由5302使用的至目标区域的映射路径的日志中。If the route is not ideal for the data type, a check is performed to see if an alternative exists 5350. If an alternative exists, the best route for the traffic type is taken 5352 and used 5360. When a route is used, the process evaluates the performance of the route 5365. Before the algorithm completes, another process saves performance data in a log via P 5328 regarding server availability, a list of EIPs 5322, and the mapping path used by 5302 to the target zone.

如果于5350的测试确定对数据类型而言路由是不理想的并且不存在替代,将那么经由路径P5314构建新的隧道5310。If the test at 5350 determines that the routing is not ideal for the data type and no alternative exists, a new tunnel 5310 will be constructed via path P 5314.

控制control

示出了GVN中的自动设备协作和信息交换所需的模块。The modules required for automatic device collaboration and information exchange in GVN are shown.

EPD 100是端点设备。SRV_AP 300是位于目标目的地区域中的接入点服务器。SRV_CNTRL 200是可由EPD和SRV_AP以及由可能支援图形目的地机制的其他设备访问的中央服务器。The EPD 100 is an endpoint device. The SRV_AP 300 is an access point server located in the target destination area. The SRV_CNTRL 200 is a central server accessible by the EPD and SRV_AP, as well as by other devices that may support the graphical destination mechanism.

各个设备EPD 100、SRV_AP 200和SRV_CNTRL 300将关于自身的信息以列表、文件、数据库表和记录的形式以及其他方式存储在本地信息存储库中。此存储库还包括关于对等体设备关系、储存日志记录的信息以及其他相关操作信息。SRV_CNTRL 200还具有额外储存功能并且它的作用是向与其相关的其他设备和/或向可能与其连接的对等体设备提供信息,以便评估当前状态并且提供类似于集中控制的指导,例如发布服务器可用性列表和其他功能。中立API机制(NAPIM)可在设备与这些设备的相连对等体之间发送信息,并且还可用以更新API本身。Each device, EPD 100, SRV_AP 200, and SRV_CNTRL 300, stores information about itself in a local information repository in the form of lists, files, database tables, records, and other means. This repository also includes information about peer device relationships, stored log records, and other relevant operational information. SRV_CNTRL 200 also has additional storage capabilities and is used to provide information to other devices associated with it and/or to peer devices that may be connected to it, so as to assess the current status and provide guidance similar to centralized control, such as publishing server availability lists and other functions. A neutral API mechanism (NAPIM) can be used to send information between devices and their connected peers and can also be used to update the API itself.

在SRV_CNTRL 200上的数据库用作关于自身信息的存储库和用于其他设备的集中存储库。许多位置中可能有许多不同SRV_CNTRL 200服务器来充当多主设备。每个数据库可以储存特定信息,包括隧道信息、对等体信息、流量信息、高速缓存信息和其他信息。安全性和其他方面由每个设备独立管理,包括心跳功能、触发脚本和其他机制。The database on SRV_CNTRL 200 serves as a repository for information about itself and a centralized repository for other devices. There may be many different SRV_CNTRL 200 servers in many locations, acting as a multi-master device. Each database can store specific information, including tunnel information, peer information, traffic information, cache information, and other information. Security and other aspects are managed independently by each device, including heartbeat functionality, trigger scripts, and other mechanisms.

图55Figure 55

示出了经由GVN的中立API机制(NAPIM)经由路径API-55A1-55A2、API-55A3-55A2和API-55A1-55A3的EPD 100、SRV CNTRL 200和SRV AP 300之间的通信。The communication between the EPD 100, the SRV CNTRL 200 and the SRV AP 300 via the paths API-55A1-55A2, API-55A3-55A2 and API-55A1-55A3 via the Neutral API Mechanism (NAPIM) of the GVN is shown.

针对将在EPD 100与SRV_AP 300之间构建的隧道TUN55-1、TUN55-2和TUN55-3以及针对经由TUN55-5从EPD 100至其他SRV_AP服务器诸如TUN55-4和从其他EPD至SRV_AP 300的隧道,在对等体对中的各个设备需要每个隧道的特定信息。For tunnels TUN55-1, TUN55-2 and TUN55-3 to be built between EPD 100 and SRV_AP 300, and for tunnels from EPD 100 to other SRV_AP servers such as TUN55-4 and from other EPDs to SRV_AP 300 via TUN55-5, each device in a peer pair requires specific information for each tunnel.

NAPIM机制存储针对当经由隧道管理器55110和55310构建新的隧道时采用的对等体对的各侧的相关凭据、坐标和其他信息。在SRV_CNTRL 300上的服务器可用性机制55222评估各种隧道的性能,所述隧道经由隧道测试器55112在EPD侧上测试并且通过隧道测试器55312在SRV_AP侧上测试。来自测试的信息被中继至SRV_CNTRL 200上的连接性分析器55288。测试结果包括分配的IP地址和端口组合、使用的端口、来自历史组合使用的结果、来自端口光谱测试的结果和其他相关信息。The NAPIM mechanism stores relevant credentials, coordinates, and other information for each side of a peer pair that is employed when building new tunnels via tunnel managers 55110 and 55310. A server availability mechanism 55222 on SRV_CNTRL 300 evaluates the performance of various tunnels, which are tested on the EPD side via tunnel tester 55112 and on the SRV_AP side via tunnel tester 55312. Information from the tests is relayed to connectivity analyzer 55288 on SRV_CNTRL 200. Test results include assigned IP address and port combinations, ports used, results from historical combination usage, results from port spectrum testing, and other relevant information.

服务器可用性列表表示具有IP地址列表的EPD 100和可由隧道管理器用以构建新的隧道的端口。在列表上提及的SRV_AP 300和其他SRV_AP服务器将被通知期望55320并且收听由EPD 100做出的连接尝试。The server availability list represents the EPD 100 with a list of IP addresses and ports that can be used by the tunnel manager to build new tunnels. The SRV_AP 300 and other SRV_AP servers mentioned on the list will be notified to expect 55320 and listen for connection attempts made by the EPD 100.

服务器可用性根据构建的隧道的期望最佳性能优先分级SRV_AP IP地址和端口组合的列表,同时还查看可用SRV_AP服务器的当前负载、平衡给予其他EPD的分配列表以及其他可用信息。Server availability prioritizes the list of SRV_AP IP address and port combinations based on expected best performance of established tunnels, while also looking at the current load of available SRV_AP servers, the allocation lists balanced to other EPDs, and other available information.

图56示出了经由NAPIM的GVN设备之间可用的各种类型的通信。FIG56 illustrates various types of communications available between GVN devices via NAPIM.

闭合环路可用作在已知对等体对之间的NAPIM REQ/RESP通信并且存在两种主要类型;设备至存储库56-P2C和设备至设备56-P2P。Closed loops may be used for NAPIM REQ/RESP communications between known pairs of peers and there are two main types; device to repository 56 - P2C and device to device 56 - P2P.

RESTful URL公布是对未知对等体(诸如可以分享的通用或一般非敏感信息)的开放访问(若允许彼特定动作)。RESTful URL publication is open access to unknown peers such as general or generally non-sensitive information that can be shared (if that specific action is allowed).

各个限定的API动作具有控制经由具有可能值的路径类型访问的标志、关于是否需要认证的另一标志、加上其他控制。例如,EPD 100可以经由56REQ100200请求可用服务器列表以及对应IP地址和端口并且从SRV_CNTRL 200经由响应路径56RESP100200接收所述列表。同时,SRV_AP 300可能经由56REQ100300由EPD 100通知或可能经由NAPIM、通过数据库复制、经由反向通道、或其他消息从SRV_CNTRL 200接收信息。Each defined API action has a flag controlling access via a path type with possible values, another flag regarding whether authentication is required, and other controls. For example, EPD 100 may request a list of available servers and corresponding IP addresses and ports via 56REQ100200 and receive the list from SRV_CNTRL 200 via response path 56RESP100200. Meanwhile, SRV_AP 300 may be notified by EPD 100 via 56REQ100300 or may receive information from SRV_CNTRL 200 via NAPIM, through database replication, via a backchannel, or other messaging.

图57描述了全局虚拟网络(GVN)内的不同类型设备之间的API调用组57202、57206和57208。每个API调用实质上是循环式,其中请求从客户端发送到服务器,并且响应发回到客户端。在大多数情况下,客户端可以是对等体对中的一端或另一端,只要另一个对等体已经启用收听功能从而充当服务器即可。Figure 57 depicts a set of API calls 57202, 57206, and 57208 between different types of devices within a global virtual network (GVN). Each API call is essentially a round-robin, where a request is sent from a client to a server, and a response is sent back to the client. In most cases, the client can be either end of a peer pair, as long as the other peer has enabled the listening function, thereby acting as a server.

API调用组57202表示从中央服务器(SRV_CNTRL)200经由路径P57202-C的调用,到端点设备(EPD)100经由P57202-B的调用以及接入点服务器(SRV_AP)300经由P57202-A的调用。这种类型的通信可以交换在SRV_CNTRL 200和EPD 100以及SRV_AP300上的存储库数据库与文件储存器之间交换关于隧道信息、日志信息、计费信息、设备对等体对数据和其他形式的相关信息的信息。API call group 57202 represents calls from central server (SRV_CNTRL) 200 via path P57202-C, to endpoint device (EPD) 100 via P57202-B, and to access point server (SRV_AP) 300 via P57202-A. This type of communication can exchange information regarding tunnel information, logging information, billing information, device peer pair data, and other forms of related information between the repository databases and file stores on SRV_CNTRL 200 and EPD 100, as well as SRV_AP 300.

EPD100与SRV_AP 300之间是两种类型的通信路径。它们之间的直接隧道可经由路径P57206-C将第三层流量、信息和二进制文件作为数据包推送。EPD 100与SRV_AP 300之间还存在经由P57206-B到57206到P57206-A的路径实现的API调用架构57206。There are two types of communication paths between the EPD 100 and the SRV_AP 300. A direct tunnel between them pushes Layer 3 traffic, information, and binary files as packets via path P57206-C. There is also an API call architecture 57206 between the EPD 100 and the SRV_AP 300, implemented via the path P57206-B to 57206 to P57206-A.

EPD 100与SRV_AP 300之间经由API 57206实现的的直接连接可以用于信息共享、协作和验证以及其他信息。例如,重新启动隧道的尝试通常可以由一侧触发,另一侧自动响应并重建它。然而,在隧道被阻塞并且不能重建的情况下,API可以用于发送命令以尝试强制在两端重新启动隧道,并且如果仍然不成功,则可以在设备之间共享信息。该信息可能触发需要使用新隧道信息来在两个设备之间构建不同隧道,或者使两个设备均向SVR_CNTRL200发送查询以获得新的隧道构建信息。因此,经由API 57206在它们之间建立通信路径是非常有用的。The direct connection between the EPD 100 and the SRV_AP 300, via API 57206, can be used for information sharing, collaboration, and verification, among other things. For example, an attempt to restart a tunnel can typically be triggered by one side, with the other side automatically responding and reestablishing it. However, in the event that a tunnel is blocked and cannot be reestablished, the API can be used to send commands to attempt to force a tunnel restart on both ends, and if that fails, information can be shared between the devices. This information may trigger the need to establish a different tunnel between the two devices using new tunnel information, or cause both devices to send queries to the SVR_CNTRL 200 to obtain new tunnel establishment information. Therefore, establishing a communication path between them via API 57206 is very useful.

API调用组57208表示从CNTRL_SRV 200和内部后端基础设施设备以及GVN的其他基础设施支持设备经由路径P57208-C进行的调用。为了简单说明,本示例实施例中示出了一些网关设备,并且此处未示出的GVN中可能存在经由此路径连接到SRV_CNTRL的其他类型的基础设施设备。API call group 57208 represents calls made from CNTRL_SRV 200 and internal backend infrastructure devices and other infrastructure support devices of the GVN via path P57208-C. For simplicity of illustration, some gateway devices are shown in this example embodiment, and other types of infrastructure devices may exist in the GVN that are not shown here and are connected to SRV_CNTRL via this path.

SRV_GW_电子邮件57310表示电子邮件服务器,并经由P57208-B1链接到57208,再链接到P57208-C,从而链接到CNTRL_SRV 100。可以经由电子邮件网络接入点(NAP)57401发送和接收电子邮件。专用的电子邮件服务器使其他设备能够专注于自己的功能,并且还提供简化的管理,因为它是在电子邮件服务器管理方面唯一需要维护的设备类型。SRV_GW_Email 57310 represents an email server and is linked to 57208 via P57208-B1, then to P57208-C, and thus to CNTRL_SRV 100. Email can be sent and received via the email network access point (NAP) 57401. A dedicated email server allows other devices to focus on their own functions and also provides simplified management, as it is the only device type that needs to be maintained in terms of email server management.

SRV_GW_FIN 57318表示财务网关服务器,使用该财务网关服务器可经由外部API57501NAP与第三方进行信用卡和其他财务相关交易。与示例SRV_GW_电子邮件一样,专注于单一功能的设备型角色使其他设备能够专注于其核心功能,并提供简化管理,因为只需要对SRV_GW_FIN服务器进行额外的管理以保护与第三方的财务交易。SRV_GW_FIN 57318 represents a financial gateway server that can be used to conduct credit card and other financial transactions with third parties via external API 57501NAP. As with the SRV_GW_Email example, this single-function focused appliance role allows other devices to focus on their core functionality and provides simplified management, as only the SRV_GW_FIN server requires additional management to secure financial transactions with third parties.

SRV_GW_其他57315表示GVN与互联网上的其他服务之间的其他类型的网关。这些类型的网关服务器与SRV_CNTRL 200之间的通信经由P57208-B3到57208到P57208-C实现。SRV_GW_Other 57315 represents other types of gateways between the GVN and other services on the Internet. Communication between these types of gateway servers and SRV_CNTRL 200 is achieved via P57208-B3 to 57208 to P57208-C.

SRV_AP 300与SRV_CNTRL 200之间的辅助API路径是经由P57208-A到57208再到P57208-C,并且出于冗余目的存在并且用于该对等体对之间的基础设施相关通信。The secondary API path between SRV_AP 300 and SRV_CNTRL 200 is via P57208-A to 57208 to P57208-C and exists for redundancy purposes and for infrastructure-related communications between this peer pair.

来自SRV_AP服务器的另一组调用可经由从P57208-A到57208到P57208-B1的路径,建立从SRV_AP 300到SRV_GW_电子邮件57310的路径;并且经由从P57208-A到57208到P57208-B2的路径,建立从SRV_AP 300到SRV_GW_F1N 57218的路径;到并且经由从P57208-A到57208到P57208-B3的路径,建立从SRV_AP 300到SRV_GW_其他57315的路径。这些可以实现用于直接从SRV_AP 300到这些设备进行数据交换的API调用。Another set of calls from the SRV_AP server may establish a path from SRV_AP 300 to SRV_GW_Email 57310 via a path from P57208-A to 57208 to P57208-B1, a path from SRV_AP 300 to SRV_GW_F1N 57218 via a path from P57208-A to 57208 to P57208-B2, and a path from SRV_AP 300 to SRV_GW_Other 57315 via a path from P57208-A to 57208 to P57208-B3. These may implement API calls for exchanging data directly from SRV_AP 300 to these devices.

经由P57208-A传输的API调用也可以表示其他设备经由SRV_AP 300进行的中继API调用,例如经由路径P57206-B到57206到P57206-A到300到P57208-A到57208到P57208-B2实现的从EPD 100到SRV_GW_FIN 57318的调用,在这种情况下,通过SRV_AP 300实现的API调用流程只是链中的另一个跳跃,其中客户端是一端EPD 100,并且服务器是另一端SRV_GW_FIN57318。API calls transmitted via P57208-A can also represent relayed API calls made by other devices via SRV_AP 300, such as a call from EPD 100 to SRV_GW_FIN 57318 via path P57206-B to 57206 to P57206-A to 300 to P57208-A to 57208 to P57208-B2. In this case, the API call flow implemented through SRV_AP 300 is just another hop in the chain, where the client is EPD 100 on one end and the server is SRV_GW_FIN 57318 on the other end.

API调用和其他类型的信息交换对GVN中设备的操作而言至关重要。存在数种类型的自动基础设施操作。这些操作包括:使设备操作系统配置保持最新;从可容纳更新软件的可靠存储库来源更新O/S和模块的软件数据包,以便轻松且可预见地实现修补、更新和最新安装;部署新的全局虚拟网络软件模块并且使已安装的模块保持更新;对GVN数据库进行可控复制;使API操作库保持最新;以及其他操作。API calls and other types of information exchange are critical to the operation of devices in the GVN. Several types of automated infrastructure operations exist. These operations include: keeping device operating system configurations up to date; updating O/S and module software packages from reliable repositories that contain updated software, allowing for easy and predictable patching, updates, and fresh installations; deploying new global virtual network software modules and keeping installed modules up to date; performing controlled replication of the GVN database; keeping the API operation library up to date; and other operations.

在各个设备上,存在后台程序和心搏功能性,其中需要自动化和设备间交互。这包括使后台程序保持运行、使服务保持在线、使队列保持在线以及使其等保持未堵塞、心搏功能、记录功能。On each device, there are background processes and heartbeat functionality where automation and inter-device interaction are required. This includes keeping background processes running, keeping services online, keeping queues online and unblocked, heartbeat functionality, and recording functionality.

GVN中的连接性和构造结构包括虚拟接口(VIF)、隧道、多个隧道、路由、服务器可用性、地理目的地、DNS和高速缓存与链接的高速缓存。Connectivity and fabric structures in a GVN include virtual interfaces (VIFs), tunnels, multiple tunnels, routing, server availability, geographic destinations, DNS, and cache and linked caches.

需要最新的信息来进行隧道建立,并且该信息需要在客户端与服务器之间共享,否则隧道将无法构建。因此,需要进行测试和诊断,同时报告结果数据以进行集中分析,以便了解GVN的整体运作。测试和诊断信息可以包括:第一层条件;隧道的连接性;互联网上的最佳点到点路由;用于最佳路由通过GVN的高级智能路由(ASR);以及设备操作状态。Tunnel establishment requires up-to-date information, and this information needs to be shared between the client and server; otherwise, the tunnel will fail. Therefore, testing and diagnostics are required, with the resulting data reported for centralized analysis to understand the overall operation of the GVN. Testing and diagnostic information can include: Layer 1 conditions; tunnel connectivity; optimal point-to-point routing on the Internet; Advanced Smart Routing (ASR) for optimal routing through the GVN; and device operational status.

API还可以用于传达关于其自身的信息,例如对等体对信息、队列信息、事务日志、安全/记账和其他日志以及API动作、模式、数据结构以及客户端或服务器上处理动作的相关脚本。The API may also be used to convey information about itself, such as peer pair information, queue information, transaction logs, security/accounting and other logs, as well as API actions, modes, data structures, and associated scripts on the client or server to process the actions.

也可以经由从设备传输对SRV_CNTRL或其他设备的API调用来传输关于托管服务的状态和配置的信息。此信息可以包括服务在线/离线状态、API模块在线/离线状态并且若可回答,还包括站点的托管状态、数据库状态、安全套接字层(SSL)证书状态、GVN组件状态(例如,诸如地理目的地等组件是否运行)。Information about the status and configuration of the hosted service can also be transmitted via API calls to SRV_CNTRL or other devices from the device. This information can include service online/offline status, API module online/offline status, and if answerable, the hosting status of the site, database status, Secure Sockets Layer (SSL) certificate status, GVN component status (e.g., whether components such as geographic destinations are running).

经由API进行的信息交换存在与安全/FW/监控/协作/信息交换以及GVN的其他任务关键方面相关的其他用途。API是用于信息交换的强大媒介并且是完整性的自我修复机制,因此可以跨设备部署。Information exchange via APIs has other uses related to security/FW/monitoring/collaboration/information exchange and other mission-critical aspects of GVN. APIs are a powerful medium for information exchange and are self-healing mechanisms for integrity, so they can be deployed across devices.

图58描述了从客户端设备对等体(源)006发起,通过发送到服务器设备007007B并返回客户端006006B的API调用所采取的步骤。Figure 58 describes the steps taken by an API call originating from a client device peer (source) 006, sent to a server device 007007B and returned to the client 006006B.

API事务在API起始001触发。将数据传递至常见类或其他类型的处理器以创建内部有效负载002。将所述内部有效负载添加到可在存储器中的队列003,将其保存到数据库,平面文件或其他机制中。可以利用立即发送的API调用绕过队列步骤或者可以将该队列步骤设置成在一定时间发送。作为客户端设备006的心搏功能的一部分,并且根据队列中的API调用的优先级标志,有效负载可以立即处理、在特定时间处理或基于诸如负载、队列003长度、网络条件或其他因素等因素而延迟。当从队列处理项目时,准备好外部有效负载并且针对特殊、单一用途的API调用产生相关事务数据004。当外部API REQUEST有效负载已准备好被发送时,将所述外部有效负载经由中立API机制005传送,进而通过互联网Q01经由路径CP01至Q01至CP03或通过安全隧道WAN Q02经由路径CP02至Q02至CP04发送到对等体目标007主机(服务器)API。An API transaction is triggered at API Initiate 001. Data is passed to a common class or other type of handler to create an internal payload 002. This internal payload is added to a queue 003, which can be stored in memory, a database, a flat file, or other mechanism. The queue step can be bypassed with an API call that is sent immediately, or it can be set to be sent at a certain time. As part of the client device's 006 heartbeat function, and depending on the priority flag of the API call in the queue, the payload can be processed immediately, at a specific time, or delayed based on factors such as the payload, queue 003 length, network conditions, or other factors. As an item is processed from the queue, an external payload is prepared and associated transaction data 004 is generated for the specific, single-purpose API call. When the external API REQUEST payload is ready to be sent, it is transmitted via a neutral API mechanism 005 and sent to the peer target 007 host (server) API via the Internet Q01 via the path CP01 to Q01 to CP03 or via a secure WAN tunnel Q02 via the path CP02 to Q02 to CP04.

接收008到请求有效负载RP01之后,服务器007将随后开始解析并解释所述有效负载。在处理请求有效负载RP01时,将进行安全性和数据完整性检查并且将解密外部有效负载以发现内部有效负载的内容009。通过对内部和外部有效负载进行比较,将实现进一步安全性和数据完整性检查。验证之后,将有效负载传送到对应的脚本以采取规定的动作010。在完成请求动作时,创建用于响应的内部有效负载011。外部有效负载创建012和事务准备013采用创建API请求外部有效负载RP01时所采用的相同过程来创建外部API RESPONSE有效负载RP02。随后经由中立API 014发送回响应。After receiving 008 the request payload RP01, the server 007 will then begin parsing and interpreting it. When processing the request payload RP01, security and data integrity checks are performed, and the outer payload is decrypted to reveal the contents of the inner payload 009. Further security and data integrity checks are performed by comparing the inner and outer payloads. After verification, the payload is passed to the corresponding script to take the specified action 010. Upon completion of the request action, an inner payload for the response is created 011. The outer payload creation 012 and transaction preparation 013 use the same process used to create the API request outer payload RP01 to create the outer API RESPONSE payload RP02. The response is then sent back via the neutral API 014.

API RESP(响应)RP02沿着相同路径从API服务器007返回API客户端006。API RESP (response) RP02 returns from API server 007 to API client 006 along the same path.

由对等体源API客户端设备006接收回015API RESP RP02。解析016并处理017有效负载。根据API动作类型,接收回的数据将被传送到006上的API处理器脚本。记录全部事务018。The API RESP RP02 is received back 015 by the peer source API client device 006. The payload is parsed 016 and processed 017. Depending on the API action type, the received data is passed to the API handler script on 006. The entire transaction is logged 018.

如果规定020回调019,那么将经由路径P019发起并且经由路径P020并行新的调用,原始API调用在API完成022处完成。If callback 019 is specified 020 , then a new call will be initiated via path P019 and in parallel via path P020 , with the original API call completed at API completion 022 .

如果在API RESP RP02中未规定021回调,则原始调用经由P021进行至终止点022以完成该事务。If no 021 callback is specified in API RESP RP02, the original call proceeds to termination point 022 via P021 to complete the transaction.

图59是示出EPD与SRV_AP之间用于获得地理目的地功能性的交互的流程图。具体来说,此图描述了地理目的地机制的处理流,该流程开始于客户端000并且沿着顺次序且有时并行的通信路径从CP0到达步骤12端点设备(EPD 100),其中EPD 100与接入点服务器交互(SRV_AP 300)。Figure 59 is a flow chart illustrating the interaction between the EPD and the SRV_AP for obtaining geo-destination functionality. Specifically, this figure describes the process flow of the geo-destination mechanism, which begins at the client 000 and follows sequential and sometimes parallel communication paths from CP0 to the endpoint device (EPD 100) at step 12, where the EPD 100 interacts with the access point server (SRV_AP 300).

当已将远程区域内的内容拉取至SRV_AP 300并随后经由传输及在地理目的地机制内的高速缓存发送回EPD 100,进而在步骤15中经由路径CP203提供回客户端000时,此处理流结束。This process flow ends when the content within the remote region has been pulled to the SRV_AP 300 and then sent back to the EPD 100 via transport and caching within the geographic destination mechanism, and then provided back to the client 000 via path CP203 in step 15.

步骤8中,经由CP13、CP14、CP12从内容服务器SRV 803、804、802并行地拉取内容,并且将结果经由CP10发送回以用于列表并随后处理数据拉取。In step 8, content is pulled in parallel from content servers SRV 803, 804, 802 via CP13, CP14, CP12, and the results are sent back via CP10 for listing and subsequent processing of the data pull.

步骤1、12、13和15相对于客户端000和EPD 100在原始区域中发生。Steps 1 , 12 , 13 and 15 occur in the original area with respect to client 000 and EPD 100 .

步骤2、10、11和14是在EPD 100与SRV_AP 300之间的任一个或两个方向中传输时发生的步骤。Steps 2, 10, 11 and 14 are steps that occur when transmitting in either or both directions between the EPD 100 and the SRV_AP 300.

步骤5、6和9在SRV_AP 300上发生。Steps 5, 6, and 9 occur on SRV_AP 300.

步骤3、4、7和8从SRV_AP 300、在该SRV_AP 300所在的远程区域中的互联网上经由EIP(出口/入口点)发生。Steps 3, 4, 7 and 8 occur from the SRV_AP 300, over the Internet in the remote area where the SRV_AP 300 is located, via the EIP (Egress/Ingress Point).

步骤3用于对客户端000请求的内容的初始URL、URI和URN进行DNS查找。步骤7用于DNS查找作为初始拉取内容的构成部分而拉取的嵌套内容。Step 3 is used to perform a DNS lookup on the initial URL, URI, and URN of the content requested by client 000. Step 7 is used to DNS lookup the nested content pulled as part of the initially pulled content.

图60描述了地理目的地内的设备协作,总体来说组成部分指示为模块并且在各个设备上提及的其构成部分包括存储在记忆体和数据库中的信息和信息交换,以及针对API流量以及数据传输诸如设备间的文件传输经由通信路径通信的信息。GVN使得能够控制跨多个设备延伸的复杂自动结构一起工作以实现共同目标。Figure 60 illustrates device collaboration within a geographic destination. Generally, components are indicated as modules, and the components mentioned on each device include information stored in memory and databases and information exchanged, as well as information communicated via communication paths for API traffic and data transfers, such as file transfers between devices. GVN enables the control of complex automated structures extending across multiple devices working together to achieve a common goal.

该图示出了EPD 100的组件并且示出了在端点设备(EPD)上的地理目的地机制。该图还示出了SRV_AP 300的组件并且示出了在来自EPD的远程区域中的接入点服务器(SRV_AP 300)上的地理目的地机制。The figure shows the components of the EPD 100 and shows the geo-destination mechanism on an endpoint device (EPD).The figure also shows the components of the SRV_AP 300 and shows the geo-destination mechanism on an access point server (SRV_AP 300) in a remote area from the EPD.

内容拉取代理D302位于SRV_AP 300上。CPA D302从位于EPD上的CDA D102接收目标URL/URI。客户端希望到达的此目标地址位于来自客户端的另一区域中并且是客户端希望拉取内容的位置。CPA D302将请求地址传送至远程抓取器BOT(R.F.BOT 301)。The content pull proxy D302 resides on the SRV_AP 300. The CPA D302 receives a target URL/URI from the CDA D102 on the EPD. This target address, which the client wishes to reach, is located in a different region from the client and is the location from which the client wishes to pull content. The CPA D302 transmits the request address to the remote crawler BOT (R.F.BOT 301).

R.F.BOT D301的工作是进行DNS查找D304并且随后使用所述信息经由数据拉取301来拉取内容。R.F.BOT D301经由CP01与CPA D302协作以解析抓取结果,进而查找辅助内容的任何其他地址,所述辅助内容可以并且应作为该内容的构成部分拉取。将请求存储在数据库D302中以供CPA D302和R.F.BOT D301访问并进一步参考。将内容文件列表L301从R.F.BOT D301传送到CPA D302。将数据文件内容从数据拉取301经由R.F.BOT D301传送到高速缓存管理器D303。将拉取的文件发送到高速缓存管理器D303以用于作为文件聚集或作为独立文件传输。The job of R.F.BOT D301 is to perform a DNS lookup D304 and then use that information to pull the content via Data Pull 301. R.F.BOT D301 collaborates with CPA D302 via CP01 to parse the crawl results and find any additional addresses for ancillary content that can and should be pulled as part of the content. The request is stored in Database D302 for access and further reference by CPA D302 and R.F.BOT D301. The content file list L301 is transferred from R.F.BOT D301 to CPA D302. The data file content is transferred from Data Pull 301 via R.F.BOT D301 to Cache Manager D303. The pulled files are sent to Cache Manager D303 for transfer as a file aggregate or as individual files.

根据从起始点到地理目的地区域的距离、文件类型和QoS,在高速缓存中拉取的文件可能聚集为通过链式高速缓存统一传输的单个文件或者可以以作为并行并发流形式发送的独立文件。Depending on the distance from the origin to the geographic destination area, file type, and QoS, files pulled from the caches may be aggregated into a single file that is transmitted uniformly through the chained caches or may be independent files that are sent as parallel concurrent streams.

存在多个到远程区域的可选路径。数据可以经由在API与TP01至TP02之间的路径、在TP01与TP03之间的路径、以及在TP02与TP03之间的路径传输。数据文件还可以通过GVN经由路径CP38、CP39或P06至CPBB等等传输。CP38是从SRV_AP 300经由GVN D888至SRV_APD555的经由隧道的路径。CPBB是在SRV_AP D555与SRV_AP 300之间经由中继SRV_AP D505路径P06的主干路径。CP39是在GVN之上从高速缓存701经由SRV_AP D555至EPD100的文件传输路径。CP02指示SRV_AP 300与EPD 100之间的直接连接路径可能性。There are multiple optional paths to remote areas. Data can be transferred via the paths between the API and TP01 to TP02, the path between TP01 and TP03, and the path between TP02 and TP03. Data files can also be transferred through the GVN via paths CP38, CP39, or P06 to CPBB, and so on. CP38 is a tunneled path from SRV_AP 300 to SRV_AP D555 via GVN D888. CPBB is a trunk path between SRV_AP D555 and SRV_AP 300, relaying path P06 via SRV_AP D505. CP39 is a file transfer path from cache 701 to EPD 100 via SRV_AP D555 on the GVN. CP02 indicates the possibility of a direct connection path between SRV_AP 300 and EPD 100.

基于当前状况、网络分段属性和这些属性如何贡献于最佳传输、数据类型以及其他因素,到达远程区域的可选路径提供了流量经由最佳路由流动的选项。Alternative paths to remote areas provide options for traffic to flow via the best route based on current conditions, network segment properties and how these properties contribute to optimal transmission, data type, and other factors.

图61示出了全局分布的平行文件系统(PFS)如何经由GVN连接。具体来说,此图示出了全局分布的平行文件系统(PFS)可如何允许使用本地RDMA接入通过在各种非本地网络光纤顶部之上(OTT)的GVN毯式框架(Tapestry)无缝地接入三个61308、或61318或61328PFS存储节点中的一个节点,以实现所需服务质量(QoS)并且符合此功能性所需的高性能计算(HPC)原理。PFS 61308是链接至“云端中”的两个其他PFS实例的EPD之后的客户端LAN中一个PFS实例的示例,其中全部三个PFS存储节点之间的IB之上的本地RDMA允许真正地并行接入,不论基本分段处的网络类型是什么。链路61CP06是EPD 100和SRV_AP 300之间的基本互联网连接并且TUN1在61CP06的OTT运行。61CP10在IDC或OTT互联网之内。PFS 61308经由路径61CP08->8CP02->8CP06/TUN1->8CP10->8CP12->8CP18连接至PFS 61318,所述路径表示区域内的短距离。这些设备均位于相同高性能区内。Figure 61 illustrates how a globally distributed parallel file system (PFS) can be connected via a GVN. Specifically, this figure illustrates how a globally distributed parallel file system (PFS) can allow seamless access to one of three 61308, 61318, or 61328 PFS storage nodes using local RDMA access through the GVN tapestry over the top (OTT) of various non-local network fabrics, achieving the required quality of service (QoS) and conforming to the high-performance computing (HPC) principles required for this functionality. PFS 61308 is an example of a PFS instance in a client LAN behind an EPD connected to two other PFS instances "in the cloud," where local RDMA over the IB between all three PFS storage nodes allows true parallel access regardless of the network type at the underlying segment. Link 61CP06 is the primary internet connection between EPD 100 and SRV_AP 300, and TUN1 runs over the top of 61CP06. 61CP10 is within the IDC or OTT internet. PFS 61308 is connected to PFS 61318 via the path 61CP08->8CP02->8CP06/TUN1->8CP10->8CP12->8CP18, which represents a short distance within the area. These devices are all located in the same high performance zone.

SRV_AP 300经由61CP10连接至SRV_BBX 61310并且二者均位于相同全局节点内。The SRV_AP 300 is connected to the SRV_BBX 61310 via 61CP10 and both are located within the same global node.

PFS 61318经由连接至SRV_BBX 61320的SRV_BBX 61310连接至PFS 61328,这表示经由GVN的全局节点至全局节点的远距离通信。The PFS 61318 is connected to the PFS 61328 via the SRV_BBX 61310 which is connected to the SRV_BBX 61320, which represents long distance communication via the global node to global node of the GVN.

本发明的范围不限于本文描述的特定实施例。事实上,除了本文中描述的内容之外,本领域中的普通技术人员可以从以上描述内容和附图清楚地了解到本发明的其他多个实施例和对本发明的修改。因此,此类其他实施例和修改预期在本发明的范围内。此外,尽管本发明已经在针对至少一个特定目的的至少一个特定环境中的至少一个特定实施例的上下文中进行了描述,但是本领域中的普通技术人员将认识到本发明的有用性不限于此,并且本发明可以在出于任何数量的目的在任何数量的环境中有益地实现。因此,所附权利要求书应根据本文所述的本发明的完整广度和精神来解释。The scope of the present invention is not limited to the specific embodiments described herein. In fact, in addition to what is described herein, a person of ordinary skill in the art can clearly understand other multiple embodiments of the present invention and modifications to the present invention from the above description and the accompanying drawings. Therefore, such other embodiments and modifications are expected to be within the scope of the present invention. In addition, although the present invention has been described in the context of at least one specific embodiment in at least one specific environment for at least one specific purpose, a person of ordinary skill in the art will recognize that the usefulness of the present invention is not limited thereto, and the present invention can be beneficially implemented in any number of environments for any number of purposes. Therefore, the appended claims should be interpreted in light of the full breadth and spirit of the present invention as described herein.

Claims (10)

1.一种全局虚拟网络系统,包括:1. A global virtual network system, comprising: 第一设备;First equipment; 第二设备;Second equipment; 多个中间接入点服务器,形成连接所述第一设备和所述第二设备的多个端到端隧道;以及Multiple intermediate access point servers form multiple end-to-end tunnels connecting the first device and the second device; and 控制服务器,从所述多个中间接入点服务器中的至少一个中间接入点服务器接收信息并且基于所述信息选择所述多个端到端隧道中的一个端到端隧道用于所述第一设备和所述第二设备之间的通信,The control server receives information from at least one of the plurality of intermediate access point servers and selects one of the plurality of end-to-end tunnels for communication between the first device and the second device based on the information. 其中所述信息能够包括:客户端/服务器拓扑和设置;隧道将使用的每个端点的互联网协议和端口;隧道量度和用于其操作的信息,包括最大传输单元的大小和协议;有关隧道使用的安全保护的信息,包括密钥和通行短语;以及用于保护隧道建立前的信息交换的信息,包括安全套接子层证书。The information described therein may include: client/server topology and settings; the Internet protocol and port for each endpoint the tunnel will use; tunnel metrics and information used for its operation, including the size of the maximum transmission unit and the protocol; information about the security protections used by the tunnel, including keys and passphrases; and information for protecting information exchange prior to tunnel establishment, including Secure Sockets Layer certificates. 2.根据权利要求1所述的全局虚拟网络系统,其中所述第一设备和所述多个中间接入点服务器中的至少一者被配置用于执行域名系统查找以便定位所述第二设备。2. The global virtual network system according to claim 1, wherein at least one of the first device and the plurality of intermediate access point servers is configured to perform a Domain Name System lookup to locate the second device. 3.根据权利要求1所述的全局虚拟网络系统,其中所述第一设备和所述多个中间接入点服务器中的至少一者被配置用于从高速缓存中执行域名系统查找以便定位所述第二设备。3. The global virtual network system of claim 1, wherein at least one of the first device and the plurality of intermediate access point servers is configured to perform a Domain Name System lookup from a cache to locate the second device. 4.根据权利要求1所述的全局虚拟网络系统,其中所述多个中间接入点服务器中的至少一个中间接入点服务器被配置用于缓存内容。4. The global virtual network system according to claim 1, wherein at least one of the plurality of intermediate access point servers is configured to cache content. 5.根据权利要求1所述的全局虚拟网络系统,其中所述第一设备、所述第二设备和所述多个中间接入点服务器中的至少一者被配置用于执行智能路由。5. The global virtual network system according to claim 1, wherein at least one of the first device, the second device, and the plurality of intermediate access point servers is configured to perform intelligent routing. 6.根据权利要求5所述的全局虚拟网络系统,其中所述智能路由基于最佳带宽、最低延迟时间、最少跳跃和无分组丢失中的至少一者。6. The global virtual network system of claim 5, wherein the intelligent routing is based on at least one of optimal bandwidth, lowest latency, fewest hops, and no packet loss. 7.根据权利要求5所述的全局虚拟网络系统,其中所述智能路由基于实时统计和历史统计中的至少一者。7. The global virtual network system according to claim 5, wherein the intelligent routing is based on at least one of real-time statistics and historical statistics. 8.根据权利要求1所述的全局虚拟网络系统,其中所述第一设备、所述第二设备和所述多个中间接入点服务器中的至少一者被配置用于执行防火墙服务。8. The global virtual network system according to claim 1, wherein at least one of the first device, the second device, and the plurality of intermediate access point servers is configured to perform firewall services. 9.根据权利要求8所述的全局虚拟网络系统,其中所述第一设备在所述第一设备与所述多个中间接入点服务器之间提供防火墙服务。9. The global virtual network system according to claim 8, wherein the first device provides firewall services between the first device and the plurality of intermediate access point servers. 10.根据权利要求8所述的全局虚拟网络系统,其中所述多个中间接入点服务器中的第一中间接入点服务器在所述第一设备与所述多个中间接入点服务器中的其他中间接入点服务器或所述第二设备之间提供防火墙服务。10. The global virtual network system according to claim 8, wherein the first intermediate access point server among the plurality of intermediate access point servers provides firewall services between the first device and the other intermediate access point servers among the plurality of intermediate access point servers or the second device.
HK18106121.9A 2015-01-28 2016-01-28 System and method for a global virtual network HK1247001B (en)

Applications Claiming Priority (15)

Application Number Priority Date Filing Date Title
US201562108987P 2015-01-28 2015-01-28
US62/108,987 2015-01-28
US201562144293P 2015-04-07 2015-04-07
US62/144,293 2015-04-07
US201562151174P 2015-04-22 2015-04-22
US62/151,174 2015-04-22
US201562174394P 2015-06-11 2015-06-11
US62/174,394 2015-06-11
USPCT/US2015/064242 2015-12-07
PCT/US2015/064242 WO2016094291A1 (en) 2014-12-08 2015-12-07 System and method for content retrieval from remote network regions
US201562266060P 2015-12-11 2015-12-11
US62/266,060 2015-12-11
PCT/IB2016/000110 WO2016110785A1 (en) 2015-01-06 2016-01-05 System and method for neutral application programming interface
WOPCT/IB2016/00110 2016-01-05
PCT/US2016/015278 WO2016123293A1 (en) 2015-01-28 2016-01-28 System and method for a global virtual network

Publications (2)

Publication Number Publication Date
HK1247001A1 HK1247001A1 (en) 2018-09-14
HK1247001B true HK1247001B (en) 2022-01-07

Family

ID=

Similar Documents

Publication Publication Date Title
US12289183B2 (en) System and method for a global virtual network
US12309001B2 (en) Systems and methods for providing a global virtual network (GVN)
US11563665B2 (en) Detecting web probes versus regular traffic through a proxy including encrypted traffic
US12294471B2 (en) Network layer performance and security provided by a distributed cloud computing network
US20240214363A1 (en) Cloud-based tunnel protocol systems and methods for multiple ports and protocols
HK1247001B (en) System and method for a global virtual network
US20250392554A1 (en) Systems and methods for providing a global virtual network (gvn)
Le Implementation of GlobalProtect and Data Centre Interconnect