CN108848191A - A kind of joint connecting method and relevant device - Google Patents
A kind of joint connecting method and relevant device Download PDFInfo
- Publication number
- CN108848191A CN108848191A CN201810834819.6A CN201810834819A CN108848191A CN 108848191 A CN108848191 A CN 108848191A CN 201810834819 A CN201810834819 A CN 201810834819A CN 108848191 A CN108848191 A CN 108848191A
- Authority
- CN
- China
- Prior art keywords
- node
- host
- identification information
- host node
- file
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
- H04L67/1044—Group management mechanisms
- H04L67/1046—Joining mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
- H04L67/1044—Group management mechanisms
- H04L67/1053—Group management mechanisms with pre-configuration of logical or physical connections with a determined number of other peers
- H04L67/1055—Group management mechanisms with pre-configuration of logical or physical connections with a determined number of other peers involving connection limits
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Mathematical Physics (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer And Data Communications (AREA)
Abstract
This application discloses a kind of joint connecting method and relevant devices, including:First host node receives the first the first connection request sent from node connecting with first host node first;Then according to the first connection request, the second host node being selected from other host nodes, and sending the second connection request to the second host node, the second connection request is used to indicate the second host node and multiple is selected from node second from node from what is connect with second host node;Then the second of the transmission of the second host node is received from the target identification information of node;Target identification information finally is sent to first from node, which is used to indicate first and establishes connection from node from node and second.It, can be with saving network flow, the fluency of the raising network operation using the embodiment of the present application.
Description
Technical field
This application involves computer network field more particularly to a kind of joint connecting methods and relevant device.
Background technique
In interspace file system, in order to guarantee normal operation peer-to-peer network (Peer to Peer, P2P) agreement of network
Defining node need to constantly find other nodes.As shown in Figure 1, in P2P network include multiple peer nodes, each node and its
His node direct or indirect connection.Requesting node periodically sends findpeer to other nodes being directly connected to this node and asks
It asks, wherein the required parameter that findpeer request includes is a node identification information (random generated at random
Identification, randomID), any one node all can serve as requesting node to other nodes hair being attached thereto
Findpeer is sent to request.After other nodes receive the request, the identification information of several nodes is returned according to randomID
To requesting node, requesting node sends handshake request to this several node again, in order to which it establishes connection, if successful connection,
Then update the routing iinformation of requesting node.Since findpeer request has been sent to each section being attached thereto by requesting node
Point will cause the huge consumption of network flow, influence the smoothness of the network operation when node huge there are data in network
Property.
Summary of the invention
The embodiment of the present application provides a kind of joint connecting method and relevant device.It can be with saving network flow, raising network
The fluency of operation.
The application first aspect provides a kind of joint connecting method, and the method is applied to the first host node, including:
Receive the first the first connection request sent from node connecting with first host node;Connect according to described first
Request is connect, the second host node is selected from other host nodes;To second host node send the second connection request, described second
Connection request be used to indicate second host node from connect with second host node it is multiple from node selection second from
Node;Target identification information of receive that second host node sends described second from node;It is sent out to described first from node
The target identification information is sent, the target identification information is used to indicate described first and is established from node with described second from node
Connection.
Wherein, first connection request includes the slave node identification information generated at random;It is described to connect according to described first
Request is connect, selects the second host node to include from other host nodes:Obtain the main section of each host node in other described host nodes
Point identification information;According to described from node identification information and the host node identification information, each host node and institute are determined
State the connection distance from node corresponding from node identification information;By with described from the corresponding institute from node of node identification information
It states connection distance and is determined as second host node less than the host node of preset threshold.
Wherein, it is described according to from node identification information and the host node identification information, determine each main section
Point corresponding from node identification information includes from the connection distance of node with described:To described from node identification information and the master
Node identification information carries out XOR operation;According to the XOR operation as a result, determining the connection distance.
Wherein, first connection request includes the fisrt feature code of file to be stored;It is described to be connected according to described first
Request, selects the second host node to include from other host nodes:Obtain the host node of each host node in other described host nodes
Identification information;According to the fisrt feature code and the host node identification information, the file to be stored and described each is determined
The transmission range of host node;It is main that the host node nearest with the transmission range of the file to be stored is determined as described second
Node.
Wherein, described according to the fisrt feature code and the host node identification information, determine the file to be stored with
The transmission range of each host node includes:Exclusive or fortune is carried out to the fisrt feature code and the host node identification information
It calculates;According to the XOR operation as a result, determining the transmission range.
Wherein, first connection request includes the second feature code of file to be read;It is described to be connected according to described first
Request, selects the second host node to include from other host nodes:Each host node in other described host nodes is obtained to store extremely
A few file eigenvalue;By each file eigenvalue in the second feature code and at least one described file eigenvalue into
Row matching determines at least one described file eigenvalue whether include the second feature code;Described in being stored at least
Host node in one file eigenvalue comprising the second feature code is determined as second host node.
Correspondingly, the application second aspect provides another joint connecting method, and the method is applied to the second main section
Point, including:
The second connection request of the first host node transmission is received, second connection request is received by first host node
The first connection request for being sent to first connect with first host node from node and according to first connection request from
Second host node is selected to send in other host nodes later;According to second connection request, led from described second
Multiple selections second from node of node connection are from node;The described second target from node is sent to first host node
Identification information, the target identification information are used to indicate institute after node being transmitted to described first by first host node
It states first and establishes connection from node from node and described second.
Wherein, second connection request includes the slave node identification information generated at random;It is described to connect according to described second
Request is connect, includes from node from the multiple selections second from node being connect with second host node:Obtain it is the multiple from
Each from the target identification information of node in node;According to described from node identification information and the target identification information,
Determine it is described each from node with described from the corresponding connection distance from node of node identification information;It will be with described from node mark
Know the corresponding slave node for being less than preset threshold from the connection distance of node of information and is determined as described second from node.
Wherein, it is described according to from node identification information and the target identification information, determine described each from node
Corresponding from node identification information include from the connection distance of node with described:To described from node identification information and the target
Identification information carries out XOR operation;According to the XOR operation as a result, determining the connection distance.
Wherein, second connection request includes the fisrt feature code of file to be stored;It is described to be connected according to described second
It requests, includes from node from the multiple selections second from node being connect with second host node:It obtains the multiple from section
Each from the target identification information of node in point;According to the fisrt feature code and the target identification information, institute is determined
State file to be stored and described each from the transmission range of node;It will be nearest with the transmission range of the file to be stored
It is determined as described second from node from node.
Wherein, described according to the fisrt feature code and the target identification information, determine the file to be stored and institute
It states and each includes from the transmission range of node:XOR operation is carried out to the fisrt feature code and the target identification information;Root
According to the XOR operation as a result, determining the transmission range.
Wherein, second connection request includes the second feature code of file to be read;It is described to be connected according to described second
It requests, includes from node from the multiple selections second from node being connect with second host node:It is looked into from file route table
Look for corresponding with the second feature code from node, the file route table includes file eigenvalue and the corresponding pass from node
System, the file eigenvalue are the condition code of the multiple file stored from node;It will be corresponding with the second feature code
Slave node as described second from node.
The embodiment of the present application third aspect provides a kind of first host node, including:
Receiving module, for receiving the connect with first host node first the first connection request sent from node;
Selecting module, for selecting the second host node from other host nodes according to first connection request;Sending module, to institute
It states the second host node and sends the second connection request, second connection request is used for
Indicate second host node from the multiple selections second from node connecting with second host node from node;
The receiving module, is also used to receive that second host node sends described second from the target identification information of node;It is described
Sending module is also used to send the target identification information to described first from node, and the target identification information is used to indicate
Described first establishes connection from node from node and described second.
Wherein, first connection request includes the slave node identification information generated at random;The selecting module is also used to:
Obtain the host node identification information of each host node in other described host nodes;According to described from node identification information and the master
Node identification information determines each host node with described from the corresponding connection distance from node of node identification information;It will
It is determined as with the host node for being less than preset threshold from the corresponding connection distance from node of node identification information described
Second host node.
Wherein, the selecting module is also used to:It is carried out to described from node identification information and the host node identification information
XOR operation;According to the XOR operation as a result, determining the connection distance.
Wherein, first connection request includes the fisrt feature code of file to be stored;The selecting module is also used to:It obtains
Take the host node identification information of each host node in other described host nodes;According to the fisrt feature code and the host node mark
Know information, determines the transmission range of the file to be stored Yu each host node;By with described in the file to be stored
The nearest host node of transmission range is determined as second host node.
Wherein, the selecting module is also used to:Exclusive or is carried out to the fisrt feature code and the host node identification information
Operation;According to the XOR operation as a result, determining the transmission range.
Wherein, first connection request includes the second feature code of file to be read;The selecting module is also used to:It obtains
Take at least one file eigenvalue of each host node storage in other described host nodes;By the second feature code and it is described extremely
Each file eigenvalue in a few file eigenvalue is matched, and determines whether wrap at least one described file eigenvalue
Containing the second feature code;It include the host node of the second feature code at least one file eigenvalue described in being stored
It is determined as second host node.
The fourth aspect of the embodiment of the present application provides a kind of second host node, including:
Receiving module, for receiving the second connection request of the first host node transmission, second connection request is by described
First host node receives the first the first connection request sent from node connecting with first host node and according to described
What the first connection request was sent after selecting second host node in other host nodes;Selecting module, for according to
Second connection request, from the multiple selections second from node being connect with second host node from node;Sending module is used for
The described second target identification information from node is sent to first host node, the target identification information is used for described
First host node hair is transmitted to described first and indicates that described first establishes company from node with described second from node after node
It connects.
Wherein, second connection request includes the slave node identification information generated at random;The selecting module is also used to:
Obtain it is the multiple from node each from the target identification information of node;According to it is described from node identification information with it is described
Target identification information, determine it is described each from node with described from the corresponding connection distance from node of node identification information;It will
It is determined as with the slave node for being less than preset threshold from the corresponding connection distance from node of node identification information described
Second from node.
Wherein, the selecting module is also used to:To described different from node identification information and target identification information progress
Or operation;According to the XOR operation as a result, determining the transmission range.
Wherein, second connection request includes the fisrt feature code of file to be stored;The selecting module is also used to:It obtains
Take it is the multiple from node each from the target identification information of node;According to the fisrt feature code and the target mark
Know information, determines the file to be stored and described each from the transmission range of node;By with described in the file to be stored
The nearest slave node of transmission range is determined as described second from node.
Wherein, the selecting module is also used to:Exclusive or fortune is carried out to the fisrt feature code and the target identification information
It calculates;According to the XOR operation as a result, determining the transmission range.
Wherein, second connection request includes the second feature code of file to be read;The selecting module is also used to:From
In file route table search it is corresponding with the second feature code from node, the file route table include file eigenvalue and from
The corresponding relationship of node, the file eigenvalue are the condition code of the multiple file stored from node;It will be with described
Two condition codes it is corresponding from node as described second from node.
Correspondingly, this application provides a kind of storage mediums, wherein the storage medium is for storing application program, institute
Application program is stated for executing a kind of joint connecting method disclosed in the embodiment of the present application first aspect at runtime.
Correspondingly, this application provides a kind of application programs, wherein the application program for executing this Shen at runtime
It please a kind of joint connecting method disclosed in embodiment first aspect.
Implement the embodiment of the present application, the first host node receives first connect with first host node first and sends from node
The first connection request;Then according to the first connection request, the second host node is selected from other host nodes, and to the second main section
Point send the second connection request, the second connection request be used to indicate the second host node from connect with second host node it is multiple from
Selection second is from node in node;Then the second of the transmission of the second host node is received from the target identification information of node;Finally to
First sends target identification information from node, which, which is used to indicate first and establishes from node and second from node, connects
It connects, it can be with saving network flow, the fluency of the raising network operation.
Detailed description of the invention
Technical solution in ord to more clearly illustrate embodiments of the present application, below will be to required use in embodiment description
Attached drawing be briefly described, it should be apparent that, the accompanying drawings in the following description is some embodiments of the present application, for this field
For those of ordinary skill, without creative efforts, it is also possible to obtain other drawings based on these drawings.
Fig. 1 is a kind of P2P schematic network structure that background technique provides;
Fig. 2 is another kind P2P schematic network structure provided by the embodiments of the present application;
Fig. 3 is a kind of P2P cellular logic configuration diagram provided by the embodiments of the present application;
Fig. 4 is a kind of flow diagram to network from node provided by the embodiments of the present application;
Fig. 5 is a kind of flow diagram of joint connecting method provided by the embodiments of the present application;
Fig. 6 is the flow diagram of another joint connecting method provided by the embodiments of the present application;
Fig. 7 is a kind of structural schematic diagram of first host node provided by the embodiments of the present application;
Fig. 8 is a kind of structural schematic diagram of second host node provided by the embodiments of the present application;
Fig. 9 is the structural schematic diagram of another first host node provided by the embodiments of the present application;
Figure 10 is the structural schematic diagram of another second host node provided by the embodiments of the present application.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete
Site preparation description, it is clear that described embodiment is some embodiments of the present application, instead of all the embodiments.Based on this Shen
Please in embodiment, every other implementation obtained by those of ordinary skill in the art without making creative efforts
Example, shall fall in the protection scope of this application.
Referring to FIG. 2, Fig. 2 is another kind P2P schematic network structure provided by the embodiments of the present application.As shown, should
It include multiple host nodes in P2P network, each host node is connected to multiple from node.Wherein, host node can be not responsible deposit
Storage file only provides the node of the routing iinformation of file and the routing iinformation for the slave node being attached thereto, for example, file server,
Database server etc..It can be the node for capableing of storage file, such as personal computer, mobile phone from node.It is all from node
Between can establish connection, routing iinformation is generated, and routing iinformation is stored on corresponding host node, then between node
It can carry out the transmission of file.The logical architecture of the embodiment of the present application P2P network is as shown in Figure 3, wherein host node and main section
Point, host node are all based on P2P protocol realization with from the communication between node.In order to guarantee the normal of network, P2P agreement rule
Determine to need to constantly discover other from node to establish connection from node and therewith.
It should be noted that when a new slave node needs to be added the P2P network, as shown in figure 4, the new slave section
Point can send the request that networks to any one host node first, may include the mark of the new slave node in the request that networks
Know information, then receives the host node for the request that networks according to all host nodes in the identification information and network of the new slave node
Identification information, determine the connection distance of the new slave node and each host node, wherein connection distance and machine in the application
The physical distance of device is unrelated, only a kind of agreement in logic.Then indicate that the new slave node is connected to therewith apart from most
On close host node.
Based on above-mentioned P2P network, the embodiment of the present application provides following joint connecting method.
Referring to FIG. 5, Fig. 5 is a kind of flow diagram of joint connecting method provided by the embodiments of the present application.As schemed
Show, the method in the embodiment of the present application includes:
S501, the first host node receive the first connection that first connect with first host node sends from node and ask
It asks.
In the specific implementation, can connect on the first host node it is multiple from node, first can be from node it is multiple from node
Any one.Wherein, each from node can according to prefixed time interval (such as 1 minute/time) or need to read file,
Or when having file to need to store, connection request is sent to the first host node.
S502 selects the second host node according to first connection request from other host nodes.
In the specific implementation, the first connection request may include the slave node identification information generated at random, wherein from node mark
Knowing information can be the first one 16 character strings generated at random from node, such as ag1g dg890juh 781d.First from
Included slave node identification information is all different in the first connection request that node is sent to the first host node every time.First is main
Node can obtain the host node identification information for other host nodes connecting with first host node first, wherein host node mark
Knowing information can be, but not limited to one 16 character strings to obtain according to secure Hash (Hash) algorithm;Then according to described
From node identification information and the host node identification information, determine each host node with it is described corresponding from node identification information
Slave node connection distance, wherein can be by being carried out to described from node identification information and the host node identification information
XOR operation, further according to the XOR operation as a result, determining the connection distance.For example, from node identification information and main section
The exclusive or result of point identification information is 0,010 0,000 1,000 0101, then can be by the highest order of number 1 in the exclusive or result
Digit 14 is as connection distance, wherein remoter or by prefix 0 the number 2 of the bigger expression connection distance of the digit of 1 highest order
As connection distance, wherein the number of prefix 0 more multilist shows that connection distance is closer.It then will be with described from node identification information
The corresponding host node for being less than preset threshold from the connection distance of node is determined as second host node, wherein default
Threshold value can be the arbitrary numbers such as 14,3.
Optionally, the first connection request includes the first fisrt feature code from the file to be stored in node, wherein first
Condition code can be the hash value of the file to be stored obtained according to Secure Hash Algorithm, which can be one 16
Character string.First host node can obtain the host node identification information of each host node in other described host nodes first;It connects
According to the fisrt feature code and the host node identification information, determine the file to be stored and each host node
Transmission range, wherein the fisrt feature code and the host node identification information can be subjected to XOR operation, further according to described
XOR operation as a result, determining the transmission range, wherein transmission range in the application and physical transfer are apart from unrelated, only
It is only a kind of agreement in logic.For example, the exclusive or result of fisrt feature code and host node identification information is 00001000
10000101, then it can regard the digit 12 of the highest order of number 1 in the exclusive or result as transmission range, wherein 1 highest order
Digit it is bigger indicate transmission range it is remoter or by the number 4 of prefix 0 as connection distance, wherein 0 number of prefix is got over
Multilist shows that transmission range is closer:Then the host node nearest with the transmission range of the file to be stored is determined as second
Host node.
Optionally, the first connection request includes the first second feature code from node file to be read, and first is first from node
First obtain the second feature code of the file to be read, wherein second feature code can be, but not limited to as according to Secure Hash Algorithm
The hash value of obtained file to be read.First host node can obtain each host node storage in other described host nodes first
At least one file eigenvalue, wherein the file eigenvalue stored on each host node is the slave section connecting with the host node
The condition code of the file stored on point.Then by each text in the second feature code and at least one described file eigenvalue
Part condition code is matched, and determines at least one described file eigenvalue whether include the second feature code;Then by institute
Host node at least one described file eigenvalue of storage comprising the second feature code is determined as second host node.
Optionally, the special code of the file stored on the slave node connecting with the host node is also stored on the first host node,
Therefore before selecting the second host node in other host nodes, first can be led first according to first connection request
At least one file eigenvalue stored on node is matched with second feature code, is determined at least one file eigenvalue
It whether include second feature code, if being on slave node that the first host node connects comprising, then it represents that file storage to be read,
There is no need to be executed again according to the connection request, the operation of the second host node is selected from other host nodes;If not including,
Indicate that file to be read is not stored on the slave node of the first host node connection, it is therefore desirable to execute according to the connection
Request, selects the operation of the second host node from other host nodes.
S503, the first host node send the second connection request to second host node, and second connection request is used for
Indicate second host node from the multiple selections second from node connecting with second host node from node.
S504, the first host node receive that second host node sends described second from the target identification information of node.
Wherein, target identification information can be, but not limited to the character string for one 16.
S505, the first host node send the target identification information, the target identification information to described first from node
It is used to indicate described first and establishes connection from node from node and described second.
In the specific implementation, first can send handshake request to second from node from node, when receiving second from node
When the feedback information of transmission, illustrate that second is online from node and receives first from the handshake request of node, confirmation
It establishes a connection with first from node.After establishing connection from node with second, first can update this node from node
Routing iinformation, and updated routing iinformation is stored in the first host node;It then, first can will text be stored from node
Part is stored in second and reads file from node from second from node or according to the second feature code of file to be read.
During above-mentioned first establishes connection from node from node and second, first leads to from the connection request of node
It crosses host node to be handled, any other will not receive the first connection request from node from node, to save a large amount of
Network flow.
In the embodiment of the present application, the first host node receives first connect with first host node first and sends from node
The first connection request;Then according to the first connection request, the second host node is selected from other host nodes, and to the second main section
Point send the second connection request, the second connection request be used to indicate the second host node from connect with second host node it is multiple from
Selection second is from node in node;Then the second of the transmission of the second host node is received from the target identification information of node;Finally to
First sends target identification information from node, which, which is used to indicate first and establishes from node and second from node, connects
It connects, it can be with saving network flow, the fluency of the raising network operation.
Referring to FIG. 6, Fig. 6 is the flow diagram of another joint connecting method provided by the embodiments of the present application.Such as figure
Shown, the method in the embodiment of the present application includes:
S601, first sends the first connection request from node to the first host node.
In the specific implementation, first can be any one multiple from node connecting with the first host node from node.
Wherein, first can shine prefixed time interval (such as 1 minute/time) from node or need to read file or have file needs to deposit
Chu Shi sends the first connection request to the first host node
S602, the first host node select the second host node according to the first connection request from other host nodes.This step with
S502 in a upper embodiment is identical, this step repeats no more.
S603, the first host node send the second connection request to the second host node.
S604, the second host node multiple are selected from what is connect with second host node from node according to the second connection request
Second is selected from node.
In the specific implementation, the second connection request may include the slave node identification information generated at random.Second host node can
With obtain first it is the multiple from node each from the target identification information of node;Then according to described from node identification
Information and the target identification information, determine it is described each from node with described from the corresponding company from node of node identification information
Connect distance, wherein XOR operation can be carried out from node identification information and the target identification information to described, according to described different
Or operation as a result, determining the connection distance;Then by with described from the corresponding company from node of node identification information
The slave node that distance is connect less than preset threshold is determined as described second from node.
Optionally, the second connection request includes the first fisrt feature code from the file to be stored in node, wherein first
Condition code can be the hash value of the file to be stored obtained according to Secure Hash Algorithm, which can be one 16
Character string.Second host node can obtain first it is the multiple from node each from the target identification information of node;Then
According to fisrt feature code and the target identification information, the file to be stored and described each from the transmission distance of node is determined
From, wherein XOR operation can be carried out to fisrt feature code and target identification information, further according to XOR operation as a result, determining
Transmission range.For example, the exclusive or result of fisrt feature code and target identification information is 00,001,000 1,000 0101, then can incite somebody to action
The digit 12 of the highest order of number 1 is used as transmission range in the exclusive or result, wherein the bigger expression of the digit of 1 highest order passes
Defeated distance is remoter or regard the number 4 of prefix 0 as connection distance, wherein the number of prefix 0 more multilist shows that transmission range is closer:
Then the slave node nearest with the transmission range of the file to be stored is determined as second from node.
Optionally, the second connection request includes the first second feature code from node file to be read.Second host node can
Corresponding with the second feature code from node to search from file route table, the file route table includes file eigenvalue
With the corresponding relationship from node, the file eigenvalue is the condition code of the multiple file stored from node.Wherein, literary
Part routing table is stored in the second host node, and this document condition code can be, but not limited to be calculated using Secure Hash Algorithm
File hash value.
Such as:First from the condition code of node file to be read be bhhi08hggyhu9876.As shown in table 1, file road
By including that multiple file eigenvalues and each file eigenvalue are corresponding from node in table, wherein abdg hu9y bg23
780d is corresponding with from node 1, bhhi 08hg gyhu 9876 and cy6t nj21 90hu by21 with from node 2 it is corresponding and
Vet6 90f7 vhu1 gy70 is corresponding with from node 3.It is all to be connected to the second host node from node 1, from node 2 and from node 3
On slave node.Therefore, can find from file route table with the condition code of file to be read is bhhi 08hg gyhu
9876 is corresponding for from node 2, so will be determined as second from node from node 2.
1. file route table of table
File eigenvalue | From node |
abdg hu9y bg23 780d | From node 1 |
bhhi 08hg gyhu 9876 | From node 2 |
cy6t nj21 90hu by21 | From node 2 |
vet6 90f7 vhu1 gy70 | From node 3 |
S605, the second host node send the second target identification information from node to the first host node.
S606, the first host node send the second target identification information from node to first from node.
S607, first establishes connection from node according to target identification information and second from node.
In the specific implementation, first can send handshake request to second from node from node, when receiving second from node
When the feedback information of transmission, illustrate second be online and receive from node first from the handshake request of node, really
Recognize and establishes a connection with first from node.Then the first routing iinformation that can update this node from node, and after updating
Routing iinformation be stored in the first host node.
In the embodiment of the present application, the first host node receives first connect with first host node first and sends from node
The first connection request;Then according to the first connection request, the second host node is selected from other host nodes, and to the second main section
Point send the second connection request, the second connection request be used to indicate the second host node from connect with second host node it is multiple from
Selection second is from node in node;Then the second of the transmission of the second host node is received from the target identification information of node;Finally to
First sends target identification information from node, which, which is used to indicate first and establishes from node and second from node, connects
It connects, it can be with saving network flow, the fluency of the raising network operation.
Referring to FIG. 7, Fig. 7 is a kind of structural schematic diagram of first host node provided by the embodiments of the present application.As shown,
The first host node in the embodiment of the present application includes:
Receiving module 701 is asked for receiving the first connection that connect with first host node first sends from node
It asks.
In the specific implementation, can connect on the first host node it is multiple from node, first can be from node it is multiple from node
Any one.Wherein, each from node can according to prefixed time interval (such as 1 minute/time) or need to read file,
Or when having file to need to store, the first connection request is sent to the first host node.
Selecting module 702, for selecting the second host node from other host nodes according to first connection request.
In the specific implementation, the first connection request may include the slave node identification information generated at random, wherein from node mark
Knowing information can be the first one 16 character strings generated at random from node, such as ag1g dg890juh 781d.First from
Included slave node identification information is all different in the connection request that node is sent to the first host node every time.First host node
The host node identification information for other host nodes connecting with first host node can be obtained first, wherein host node mark letter
Breath can be, but not limited to one 16 character strings to obtain according to secure Hash (Hash) algorithm;Then according to described from section
Point identification information and the host node identification information, determine each host node with it is described from node identification information it is corresponding from
The connection distance of node, wherein can be by carrying out exclusive or from node identification information and the host node identification information to described
Operation, further according to the XOR operation as a result, determining the connection distance.For example, from node identification information and host node mark
The exclusive or result for knowing information is 0,010 0,000 1,000 0101, then can be by the digit of the highest order of number 1 in the exclusive or result
14 are used as connection distance, wherein the bigger expression connection distance of the digit of 1 highest order is remoter or regard 0 number 2 of prefix as company
Connect distance, wherein the 0 number more multilist of prefix shows that connection distance is closer.Then will with it is described corresponding from node identification information
Slave node the connection distance be less than preset threshold host node be determined as second host node, wherein preset threshold
It can be the arbitrary numbers such as 14,3.
Optionally, the first connection request includes the first fisrt feature code from the file to be stored in node, wherein first
Condition code can be the hash value of the file to be stored obtained according to Secure Hash Algorithm, which can be one 16
Character string.First host node can obtain the host node identification information of each host node in other described host nodes first;It connects
According to the fisrt feature code and the host node identification information, determine the file to be stored and each host node
Transmission range, wherein the fisrt feature code and the host node identification information can be subjected to XOR operation, further according to described
XOR operation as a result, determining the transmission range, wherein transmission range in the application and physical transfer are apart from unrelated, only
It is only a kind of agreement in logic.For example, the exclusive or result of fisrt feature code and host node identification information is 00,001,000 1000
0101, then it can regard the digit 12 of the highest order of number 1 in the exclusive or result as transmission range, wherein the position of 1 highest order
Number is bigger to indicate that transmission range is remoter or regard the number 4 of prefix 0 as connection distance, wherein 0 number of prefix gets over multilist
Show that transmission range is closer:Then the host node nearest with the transmission range of the file to be stored is determined as the second main section
Point.
Optionally, the first connection request includes the first second feature code from node file to be read, and first is first from node
First obtain the second feature code of the file to be read, wherein second feature code can be, but not limited to as according to Secure Hash Algorithm
Obtained file hash value to be read.First host node can obtain each host node storage in other described host nodes first
At least one file eigenvalue, wherein the file eigenvalue stored on each host node is the slave node connecting with the host node
The condition code of the file of upper storage.Then by each file in the second feature code and at least one described file eigenvalue
Condition code is matched, and determines at least one described file eigenvalue whether include the second feature code;Then it will be deposited
Host node at least one described file eigenvalue of storage comprising the second feature code is determined as second host node.
Optionally, the special code of the file stored on the slave node connecting with the host node is also stored on the first host node,
Therefore it can choose module 702 to be also used to according to the connection request, it is first before selecting the second host node in other host nodes
At least one file eigenvalue stored on the first host node is matched with second feature code first, determines at least one text
It whether include second feature code in part condition code, if comprising, then it represents that file storage to be read is that the first host node connects
Slave node on, there is no need to be executed again according to the connection request, the operation of the second host node is selected from other host nodes;
If not including, then it represents that file to be read is not stored on the slave node of the first host node connection, it is therefore desirable to be executed
According to the connection request, the operation of the second host node is selected from other host nodes.
Sending module 703, for sending the second connection request to second host node, second connection request is used for
Indicate second host node from the multiple selections second from node connecting with second host node from node.
Receiving module 701 is also used to receive second host node is sent described second and believes from the first identifier of node
Breath.Wherein, target identification information can be, but not limited to the character string for one 16.
Sending module 703 is also used to send the target identification information, the target identification letter to described first from node
Breath is used to indicate described first and establishes connection from node from node and described second.
In the specific implementation, first can send handshake request to second from node from node, when receiving second from node
When the feedback information of transmission, illustrate that second is online from node and receives first from the handshake request of node, confirmation
Connection is established from node with first.After establishing connection from node with second, first can update the routing of this node from node
Information, and updated routing iinformation is stored in the first host node;Then, first file to be stored can be deposited from node
Storage reads file from second from node or according to the second feature code of file to be read second from node.
In the embodiment of the present application, the first host node receives first connect with first host node first and sends from node
The first connection request;Then according to the first connection request, the second host node is selected from other host nodes, and to the second main section
Point send the second connection request, the second connection request be used to indicate the second host node from connect with second host node it is multiple from
Selection second is from node in node;Then the second of the transmission of the second host node is received from the target identification information of node;Finally to
First sends target identification information from node, which, which is used to indicate first and establishes from node and second from node, connects
It connects, it can be with saving network flow, the fluency of the raising network operation.
Referring to FIG. 8, Fig. 8 is a kind of structural schematic diagram of second host node provided by the embodiments of the present application.As shown,
The second host node in the embodiment of the present application includes:
Receiving module 801, for receiving the second connection request of the first host node transmission.Wherein, the second connection request by
First host node receives the first connection request that first connect with first host node sends from node and basis
What first connection request was sent after selecting second host node in other host nodes.
Selecting module 802 multiple is selected from what is connect with the second host node from node for according to the second connection request
Second from node.
In the specific implementation, the second connection request may include the slave node identification information generated at random.Second host node can
With obtain first it is the multiple from node each from the target identification information of node;Then according to described from node identification
Information and the target identification information, determine it is described each from node with described from the corresponding company from node of node identification information
Connect distance, wherein XOR operation can be carried out from node identification information and the target identification information to described, according to described different
Or operation as a result, determining the connection distance;Then by with described from the corresponding company from node of node identification information
The slave node that distance is connect less than preset threshold is determined as described second from node.
Optionally, the second connection request includes the first fisrt feature code from the file to be stored in node, wherein first
Condition code can be the hash value of the file to be stored obtained according to Secure Hash Algorithm, which can be one 16
Character string.Second host node can obtain first it is the multiple from node each from the target identification information of node;Then
According to fisrt feature code and the target identification information, the file to be stored and described each from the transmission distance of node is determined
From, wherein XOR operation can be carried out to fisrt feature code and target identification information, further according to XOR operation as a result, determining
Transmission range.For example, the exclusive or result of fisrt feature code and target identification information is 00,001,000 1,000 0101, then can incite somebody to action
The digit 12 of the highest order of number 1 is used as transmission range in the exclusive or result, wherein the bigger expression of the digit of 1 highest order passes
Defeated distance it is remoter or by the number 4 of prefix 0 as connection distance, wherein the 0 number more multilist of prefix show transmission range more
Closely:Then the slave node nearest with the transmission range of the file to be stored is determined as second from node.
Optionally, the second connection request includes the first second feature code from node file to be read.Second host node can
Corresponding with the second feature code from node to search from file route table, the file route table includes file eigenvalue
With the corresponding relationship from node, the file eigenvalue is the condition code of the multiple file stored from node.Wherein, literary
Part routing table is stored in the second host node, and this document condition code can be, but not limited to be calculated using Secure Hash Algorithm
File hash value.
Sending module 803, for sending the second target identification information from node to the first host node.Wherein, the target
Identification information indicates that after node, this first is established from node from node and second and connect being transmitted to first by the first host node
It connects.
In the embodiment of the present application, the first host node receives first connect with first host node first and sends from node
The first connection request;Then according to the first connection request, the second host node is selected from other host nodes, and to the second main section
Point send the second connection request, the second connection request be used to indicate the second host node from connect with second host node it is multiple from
Selection second is from node in node;Then the second of the transmission of the second host node is received from the target identification information of node;Finally to
First sends target identification information from node, which, which is used to indicate first and establishes from node and second from node, connects
It connects, it can be with saving network flow, the fluency of the raising network operation.
Referring to FIG. 9, Fig. 9 is a kind of structural schematic diagram of first host node provided by the embodiments of the present application.As shown,
First host node may include:At least one processor 901, such as CPU, at least one communication interface 902, at least one is deposited
Reservoir 903, at least one bus 904.Wherein, bus 904 is for realizing the connection communication between these components.Wherein, this Shen
It please the communication interface 902 of electronic equipment be wired sending port in embodiment, or wireless device is traditional thread binding for example including day
It sets, for carrying out the communication of signaling or data with other node devices.Memory 903 can be high speed RAM memory, can also be with
It is non-labile memory (non-volatile memory), for example, at least a magnetic disk storage.Memory 903 is optional
Can also be that at least one is located remotely from the storage device of aforementioned processor 901.Batch processing generation is stored in memory 903
Code, and processor 901 is used to call the program code stored in memory, for performing the following operations:
Receive the first the first connection request sent from node connecting with first host node;
According to first connection request, the second host node is selected from other host nodes;
The second connection request is sent to second host node, second connection request is used to indicate the described second main section
Point multiple is selected from node second from node from what is connect with second host node;
Target identification information of receive that second host node sends described second from node;
The target identification information is sent to described first from node, the target identification information is used to indicate described first
Connection is established from node from node and described second.
Wherein, first connection request includes the slave node identification information generated at random;
Processor 901 is also used to perform the following operations step:
Obtain the host node identification information of each host node in other described host nodes;
According to described from node identification information and the host node identification information, determine each host node and it is described from
The corresponding connection distance from node of node identification information;
By with the host node for being less than preset threshold from the corresponding connection distance from node of node identification information
It is determined as second host node.
Wherein, processor 901 is also used to perform the following operations step:
XOR operation is carried out from node identification information and the host node identification information to described;
According to the XOR operation as a result, determining the connection distance.
Wherein, first connection request includes the fisrt feature code of file to be stored;
Processor 901 is also used to perform the following operations step:
Obtain the host node identification information of each host node in other described host nodes;
According to the fisrt feature code and the host node identification information, the file to be stored and each master are determined
The transmission range of node;
The host node nearest with the transmission range of the file to be stored is determined as second host node.
Wherein, processor 901 is also used to perform the following operations step:
XOR operation is carried out to the fisrt feature code and the host node identification information;
According to the XOR operation as a result, determining the transmission range.
Wherein, first connection request includes the second feature code of file to be read;
Processor 901 is also used to perform the following operations step:
Obtain at least one file eigenvalue of each host node storage in other described host nodes;
The second feature code is matched with each file eigenvalue at least one described file eigenvalue, really
It whether include the second feature code at least one fixed described file eigenvalue;
Host node at least one file eigenvalue described in being stored comprising the second feature code is determined as institute
State the second host node.
Further, processor can also be matched with memory and communication interface, be executed in above-mentioned application embodiment
The operation of one host node.
Referring to FIG. 10, Figure 10 is a kind of structural schematic diagram of second host node provided by the embodiments of the present application.As schemed
Show, which may include:At least one processor 1001, such as CPU, at least one communication interface 1002, at least
One memory 1003, at least one bus 1004.Wherein, bus 1004 is for realizing the connection communication between these components.
Wherein, the communication interface 1002 of electronic equipment is wired sending port in the embodiment of the present application, or wireless device, such as
Including antenna assembly, for carrying out the communication of signaling or data with other node devices.Memory 1003 can be high-speed RAM and deposit
Reservoir is also possible to non-labile memory (non-volatile memory), for example, at least a magnetic disk storage.It deposits
Reservoir 1003 optionally can also be that at least one is located remotely from the storage device of aforementioned processor 1001.It is deposited in memory 1003
Batch processing code is stored up, and processor 1001 is used to call the program code stored in memory, for performing the following operations:
The second connection request of the first host node transmission is received, second connection request is received by first host node
The first connection request for being sent to first connect with first host node from node and according to first connection request from
Second host node is selected to send in other host nodes later;
According to second connection request, from the multiple selections second from node being connect with second host node from section
Point;
The described second target identification information from node is sent to first host node, the target identification information is by institute
It states the first host node and is sent to described first and is used to indicate described first from node and is established from node with described second from node and connect
It connects.
Wherein, second connection request includes the slave node identification information generated at random;
Processor 1001 is also used to perform the following operations step:
Obtain it is the multiple from node each from the target identification information of node;
According to described from node identification information and described each from the target identification information of node, determine described each
From node with described from the corresponding connection distance from node of node identification information;
By with the slave node for being less than preset threshold from the corresponding connection distance from node of node identification information
It is determined as described second from node.
Wherein, processor 1001 is also used to perform the following operations step:
To described from node identification information and described each from the target identification information of node progress XOR operation;
According to the XOR operation as a result, determining the transmission range.
Wherein, second connection request includes the fisrt feature code of file to be stored;
Processor 1001 is also used to perform the following operations step:
Obtain it is the multiple from node each from the target identification information of node;
According to the fisrt feature code and described each from the target identification information of node, the text to be stored is determined
Part and described each from the transmission range of node;
The slave node nearest with the transmission range of the file to be stored is determined as described second from node.
Wherein, processor 1001 is also used to perform the following operations step:
XOR operation each is carried out from the target identification information of node with described to the fisrt feature code;
According to the XOR operation as a result, determining the transmission range.
Wherein, second connection request includes the second feature code of file to be read;
Processor 1001 is also used to perform the following operations step:
Lookup is corresponding with the second feature code from node from file route table, and the file route table includes file
Condition code and the corresponding relationship from node, the file eigenvalue are the condition code of the multiple file stored from node;
Will it is corresponding with the second feature code from node as described second from node.
Further, processor can also be matched with memory and communication interface, be executed in above-mentioned application embodiment
The operation of two host nodes.
In the above-described embodiments, can come wholly or partly by software, hardware, firmware or any combination thereof real
It is existing.When implemented in software, it can entirely or partly realize in the form of a computer program product.The computer program
Product includes one or more computer instructions.When loading on computers and executing the computer program instructions, all or
It partly generates according to process or function described in the embodiment of the present application.The computer can be general purpose computer, dedicated meter
Calculation machine, computer network or other programmable devices.The computer instruction can store in computer readable storage medium
In, or from a computer readable storage medium to the transmission of another computer readable storage medium, for example, the computer
Instruction can pass through wired (such as coaxial cable, optical fiber, number from a web-site, computer, server or data center
User's line (DSL)) or wireless (such as infrared, wireless, microwave etc.) mode to another web-site, computer, server or
Data center is transmitted.The computer readable storage medium can be any usable medium that computer can access or
It is comprising data storage devices such as one or more usable mediums integrated server, data centers.The usable medium can be with
It is magnetic medium, (for example, floppy disk, hard disk, tape), optical medium (for example, DVD) or semiconductor medium (such as solid state hard disk
Solid State Disk (SSD)) etc..Above-described specific embodiment, to the purpose of the application, technical solution and beneficial
Effect has been further described.Within the spirit and principles of this application, made any modification, equivalent replacement,
Improve etc., it should be included within the scope of protection of this application.
Claims (14)
1. a kind of joint connecting method, which is characterized in that the method is applied to the first host node, the method includes:
Receive the first the first connection request sent from node connecting with first host node;
According to first connection request, the second host node is selected from other host nodes;
To second host node send the second connection request, second connection request be used to indicate second host node from
The multiple selections second from node connecting with second host node are from node;
Target identification information of receive that second host node sends described second from node;
The target identification information is sent to described first from node, the target identification information is used to indicate described first from section
Point establishes connection from node with described second.
2. the method as described in claim 1, which is characterized in that first connection request includes the slave node mark generated at random
Know information;
It is described according to first connection request, select the second host node to include from other host nodes:
Obtain the host node identification information of each host node in other described host nodes;
According to described from node identification information and the host node identification information, each host node and described from node is determined
The corresponding connection distance from node of identification information;
It will be determined from node identification information is corresponding from the connection distance of node less than the host node of preset threshold with described
For second host node.
3. method according to claim 2, which is characterized in that it is described according to from node identification information and the host node
Identification information determines that each host node corresponding from node identification information includes from the connection distance of node with described:
XOR operation is carried out from node identification information and the host node identification information to described;
According to the XOR operation as a result, determining the connection distance.
4. the method as described in claim 1, which is characterized in that first connection request includes the first spy of file to be stored
Levy code;
It is described according to first connection request, select the second host node to include from other host nodes:
Obtain the host node identification information of each host node in other described host nodes;
According to the fisrt feature code and the host node identification information, the file to be stored and each host node are determined
Transmission range;
The host node nearest with the transmission range of the file to be stored is determined as second host node.
5. method as claimed in claim 4, which is characterized in that described to be identified according to the fisrt feature code and the host node
Information determines that the transmission range of the file to be stored and each host node includes:
XOR operation is carried out to the fisrt feature code and the host node identification information;
According to the XOR operation as a result, determining the transmission range.
6. the method as described in claim 1, which is characterized in that first connection request includes the second spy of file to be read
Levy code;
It is described according to first connection request, select the second host node to include from other host nodes:
Obtain at least one file eigenvalue of each host node storage in other described host nodes;
The second feature code is matched with each file eigenvalue at least one described file eigenvalue, determines institute
It whether states at least one file eigenvalue comprising the second feature code;
Host node at least one file eigenvalue described in being stored comprising the second feature code is determined as described the
Two host nodes.
7. a kind of joint connecting method, which is characterized in that the method is applied to the second host node, the method includes:
Receive the first host node transmission the second connection request, second connection request by first host node receive with
The first connection request that the first of first host node connection sends from node and according to first connection request from other
Second host node is selected to send in host node later;
According to second connection request, from the multiple selections second from node being connect with second host node from node;
The described second target identification information from node is sent to first host node, the target identification information is used in quilt
First host node is transmitted to described first and indicates that described first establishes with described second from node from node after node
Connection.
8. the method for claim 7, which is characterized in that second connection request includes the slave node mark generated at random
Know information;
It is described according to second connection request, from the multiple selections second from node being connect with second host node from section
It puts and includes:
Obtain it is the multiple from node each from the target identification information of node;
According to described from node identification information and the target identification information, determine described each from node and described from node mark
Know the corresponding connection distance from node of information;
It will be determined from node identification information is corresponding from the connection distance of node less than the slave node of preset threshold with described
For described second from node.
9. method according to claim 8, which is characterized in that it is described according to from node identification information and the target mark
Know information, determines and described each corresponding from node identification information include from the connection distance of node from node with described:
XOR operation is carried out from node identification information and the target identification information to described;
According to the XOR operation as a result, determining the connection distance.
10. the method for claim 7, which is characterized in that second connection request includes the first of file to be stored
Condition code;
It is described according to second connection request, from the multiple selections second from node being connect with second host node from section
It puts and includes:
Obtain it is the multiple from node each from the target identification information of node;
According to the fisrt feature code and the target identification information, the file to be stored and described each from node is determined
Transmission range;
The slave node nearest with the transmission range of the file to be stored is determined as described second from node.
11. method as claimed in claim 10, which is characterized in that described according to the fisrt feature code and the target identification
Information determines that the file to be stored each includes from the transmission range of node with described:
XOR operation is carried out to the fisrt feature code and the target identification information;
According to the XOR operation as a result, determining the transmission range.
12. the method for claim 7, which is characterized in that second connection request includes the second of file to be read
Condition code;
It is described according to second connection request, from the multiple selections second from node being connect with second host node from section
It puts and includes:
Lookup is corresponding with the second feature code from node from file route table, and the file route table includes file characteristic
Code and the corresponding relationship from node, the file eigenvalue are the condition code of the multiple file stored from node;
Will it is corresponding with the second feature code from node as described second from node.
13. a kind of first host node, which is characterized in that including:Processor, memory, communication interface and bus;
The processor, the memory are connected by the bus with the communication interface and complete mutual communication;
The memory stores executable program code;
The processor is run and the executable program by reading the executable program code stored in the memory
The corresponding program of code, for executing joint connecting method as claimed in any one of claims 1 to 6.
14. a kind of second host node, which is characterized in that including:Processor, memory, communication interface and bus;
The processor, the memory are connected by the bus with the communication interface and complete mutual communication;
The memory stores executable program code;
The processor is run and the executable program by reading the executable program code stored in the memory
The corresponding program of code, for executing such as the described in any item joint connecting methods of claim 7-12.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810834819.6A CN108848191A (en) | 2018-07-26 | 2018-07-26 | A kind of joint connecting method and relevant device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810834819.6A CN108848191A (en) | 2018-07-26 | 2018-07-26 | A kind of joint connecting method and relevant device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108848191A true CN108848191A (en) | 2018-11-20 |
Family
ID=64192172
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810834819.6A Pending CN108848191A (en) | 2018-07-26 | 2018-07-26 | A kind of joint connecting method and relevant device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108848191A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110611881A (en) * | 2019-09-26 | 2019-12-24 | 北京邮电大学 | Control node determination method and device |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1925444A (en) * | 2006-09-14 | 2007-03-07 | 华为技术有限公司 | Method for establishing point-to-point collection in P2P network and nodes in P2P network |
CN101106503A (en) * | 2007-08-31 | 2008-01-16 | 华为技术有限公司 | Autonomous method for peer-to-peer network, node device and system |
KR20080048835A (en) * | 2006-11-29 | 2008-06-03 | 삼성네트웍스 주식회사 | System for real time internet broadcast service and management method thereof |
CN101645831A (en) * | 2009-05-08 | 2010-02-10 | 中国科学院声学研究所 | Node organization method in P2P system |
CN101753610A (en) * | 2008-12-19 | 2010-06-23 | 华为技术有限公司 | Distributed network structure method, device, system and task processing method |
CN101841484A (en) * | 2010-05-12 | 2010-09-22 | 中国科学院计算技术研究所 | Method and system for realizing NAT traversal in structured P2P network |
CN101860474A (en) * | 2009-04-08 | 2010-10-13 | 中兴通讯股份有限公司 | Peer-to-peer network and resource information processing method based on same |
CN102065112A (en) * | 2009-11-18 | 2011-05-18 | 中国移动通信集团公司 | Peer-to-peer (P2P) network system and method and related device for establishing the same |
CN103209224A (en) * | 2013-04-28 | 2013-07-17 | 上海海事大学 | P2P (peer-to-peer)-based underwater acoustic sensor network system and data transmission method thereof |
-
2018
- 2018-07-26 CN CN201810834819.6A patent/CN108848191A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1925444A (en) * | 2006-09-14 | 2007-03-07 | 华为技术有限公司 | Method for establishing point-to-point collection in P2P network and nodes in P2P network |
KR20080048835A (en) * | 2006-11-29 | 2008-06-03 | 삼성네트웍스 주식회사 | System for real time internet broadcast service and management method thereof |
CN101106503A (en) * | 2007-08-31 | 2008-01-16 | 华为技术有限公司 | Autonomous method for peer-to-peer network, node device and system |
CN101753610A (en) * | 2008-12-19 | 2010-06-23 | 华为技术有限公司 | Distributed network structure method, device, system and task processing method |
CN101860474A (en) * | 2009-04-08 | 2010-10-13 | 中兴通讯股份有限公司 | Peer-to-peer network and resource information processing method based on same |
CN101645831A (en) * | 2009-05-08 | 2010-02-10 | 中国科学院声学研究所 | Node organization method in P2P system |
CN102065112A (en) * | 2009-11-18 | 2011-05-18 | 中国移动通信集团公司 | Peer-to-peer (P2P) network system and method and related device for establishing the same |
CN101841484A (en) * | 2010-05-12 | 2010-09-22 | 中国科学院计算技术研究所 | Method and system for realizing NAT traversal in structured P2P network |
CN103209224A (en) * | 2013-04-28 | 2013-07-17 | 上海海事大学 | P2P (peer-to-peer)-based underwater acoustic sensor network system and data transmission method thereof |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110611881A (en) * | 2019-09-26 | 2019-12-24 | 北京邮电大学 | Control node determination method and device |
CN110611881B (en) * | 2019-09-26 | 2020-09-18 | 北京邮电大学 | Control node determination method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102100032B (en) | System from reputation shaping a peer-to-peer network | |
JP6181740B2 (en) | How to extend a web service's application programming interface using a query language | |
US9270671B2 (en) | Biometric-based wireless device association | |
WO2022121538A1 (en) | Data synchronization method and system based on blockchain, and related device | |
KR20050009685A (en) | State migration in multiple nic rdma enabled devices | |
US20130198198A1 (en) | Generating method, generating system, and recording medium | |
WO2015196815A1 (en) | Ip hard disk and storage system, and data operating method therefor | |
CN111338806B (en) | Service control method and device | |
CN110191428A (en) | A kind of data distributing method based on intelligent cloud platform | |
CN102891872B (en) | The method and system of data storage and query in a kind of peer-to-peer network | |
RU2585973C2 (en) | Method and apparatus for controlling locking operation of database system | |
CN105868251A (en) | Cache data updating method and device | |
JP2021039585A (en) | Method for controlling connection with client or server | |
CN103546380A (en) | Message forwarding method and device based on strategy routing | |
JP2016515256A (en) | Apparatus and method for a distributed memory system including a memory node | |
CN108848191A (en) | A kind of joint connecting method and relevant device | |
JP3756349B2 (en) | Database management apparatus and recording medium on which program is recorded | |
US20150026799A1 (en) | Information processing system, information processing method, and non-transitory computer readable medium | |
CN110502187A (en) | A kind of snapshot rollback method and device | |
JP2019153189A (en) | Server for caching session information set, and cache control method of session information set | |
JP2016099969A (en) | Information processing apparatus, data storage system, and data storage method | |
US10185735B2 (en) | Distributed database system and a non-transitory computer readable medium | |
JP2009289161A (en) | Clustered storage system, node device thereof, and method and program for controlling data read/write | |
WO2016172948A1 (en) | Routing information configuration method and apparatus | |
CN110245307A (en) | Page cache management method and system, terminal device and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181120 |