CN108848191A - A kind of joint connecting method and relevant device - Google Patents

A kind of joint connecting method and relevant device Download PDF

Info

Publication number
CN108848191A
CN108848191A CN201810834819.6A CN201810834819A CN108848191A CN 108848191 A CN108848191 A CN 108848191A CN 201810834819 A CN201810834819 A CN 201810834819A CN 108848191 A CN108848191 A CN 108848191A
Authority
CN
China
Prior art keywords
node
host
identification information
host node
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810834819.6A
Other languages
Chinese (zh)
Inventor
刘均
龙德帆
刘新
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Launch Technology Co Ltd
Original Assignee
Shenzhen Launch Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Launch Technology Co Ltd filed Critical Shenzhen Launch Technology Co Ltd
Priority to CN201810834819.6A priority Critical patent/CN108848191A/en
Publication of CN108848191A publication Critical patent/CN108848191A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • H04L67/1044Group management mechanisms 
    • H04L67/1046Joining mechanisms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • H04L67/1044Group management mechanisms 
    • H04L67/1053Group management mechanisms  with pre-configuration of logical or physical connections with a determined number of other peers
    • H04L67/1055Group management mechanisms  with pre-configuration of logical or physical connections with a determined number of other peers involving connection limits

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Mathematical Physics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer And Data Communications (AREA)

Abstract

This application discloses a kind of joint connecting method and relevant devices, including:First host node receives the first the first connection request sent from node connecting with first host node first;Then according to the first connection request, the second host node being selected from other host nodes, and sending the second connection request to the second host node, the second connection request is used to indicate the second host node and multiple is selected from node second from node from what is connect with second host node;Then the second of the transmission of the second host node is received from the target identification information of node;Target identification information finally is sent to first from node, which is used to indicate first and establishes connection from node from node and second.It, can be with saving network flow, the fluency of the raising network operation using the embodiment of the present application.

Description

A kind of joint connecting method and relevant device
Technical field
This application involves computer network field more particularly to a kind of joint connecting methods and relevant device.
Background technique
In interspace file system, in order to guarantee normal operation peer-to-peer network (Peer to Peer, P2P) agreement of network Defining node need to constantly find other nodes.As shown in Figure 1, in P2P network include multiple peer nodes, each node and its His node direct or indirect connection.Requesting node periodically sends findpeer to other nodes being directly connected to this node and asks It asks, wherein the required parameter that findpeer request includes is a node identification information (random generated at random Identification, randomID), any one node all can serve as requesting node to other nodes hair being attached thereto Findpeer is sent to request.After other nodes receive the request, the identification information of several nodes is returned according to randomID To requesting node, requesting node sends handshake request to this several node again, in order to which it establishes connection, if successful connection, Then update the routing iinformation of requesting node.Since findpeer request has been sent to each section being attached thereto by requesting node Point will cause the huge consumption of network flow, influence the smoothness of the network operation when node huge there are data in network Property.
Summary of the invention
The embodiment of the present application provides a kind of joint connecting method and relevant device.It can be with saving network flow, raising network The fluency of operation.
The application first aspect provides a kind of joint connecting method, and the method is applied to the first host node, including:
Receive the first the first connection request sent from node connecting with first host node;Connect according to described first Request is connect, the second host node is selected from other host nodes;To second host node send the second connection request, described second Connection request be used to indicate second host node from connect with second host node it is multiple from node selection second from Node;Target identification information of receive that second host node sends described second from node;It is sent out to described first from node The target identification information is sent, the target identification information is used to indicate described first and is established from node with described second from node Connection.
Wherein, first connection request includes the slave node identification information generated at random;It is described to connect according to described first Request is connect, selects the second host node to include from other host nodes:Obtain the main section of each host node in other described host nodes Point identification information;According to described from node identification information and the host node identification information, each host node and institute are determined State the connection distance from node corresponding from node identification information;By with described from the corresponding institute from node of node identification information It states connection distance and is determined as second host node less than the host node of preset threshold.
Wherein, it is described according to from node identification information and the host node identification information, determine each main section Point corresponding from node identification information includes from the connection distance of node with described:To described from node identification information and the master Node identification information carries out XOR operation;According to the XOR operation as a result, determining the connection distance.
Wherein, first connection request includes the fisrt feature code of file to be stored;It is described to be connected according to described first Request, selects the second host node to include from other host nodes:Obtain the host node of each host node in other described host nodes Identification information;According to the fisrt feature code and the host node identification information, the file to be stored and described each is determined The transmission range of host node;It is main that the host node nearest with the transmission range of the file to be stored is determined as described second Node.
Wherein, described according to the fisrt feature code and the host node identification information, determine the file to be stored with The transmission range of each host node includes:Exclusive or fortune is carried out to the fisrt feature code and the host node identification information It calculates;According to the XOR operation as a result, determining the transmission range.
Wherein, first connection request includes the second feature code of file to be read;It is described to be connected according to described first Request, selects the second host node to include from other host nodes:Each host node in other described host nodes is obtained to store extremely A few file eigenvalue;By each file eigenvalue in the second feature code and at least one described file eigenvalue into Row matching determines at least one described file eigenvalue whether include the second feature code;Described in being stored at least Host node in one file eigenvalue comprising the second feature code is determined as second host node.
Correspondingly, the application second aspect provides another joint connecting method, and the method is applied to the second main section Point, including:
The second connection request of the first host node transmission is received, second connection request is received by first host node The first connection request for being sent to first connect with first host node from node and according to first connection request from Second host node is selected to send in other host nodes later;According to second connection request, led from described second Multiple selections second from node of node connection are from node;The described second target from node is sent to first host node Identification information, the target identification information are used to indicate institute after node being transmitted to described first by first host node It states first and establishes connection from node from node and described second.
Wherein, second connection request includes the slave node identification information generated at random;It is described to connect according to described second Request is connect, includes from node from the multiple selections second from node being connect with second host node:Obtain it is the multiple from Each from the target identification information of node in node;According to described from node identification information and the target identification information, Determine it is described each from node with described from the corresponding connection distance from node of node identification information;It will be with described from node mark Know the corresponding slave node for being less than preset threshold from the connection distance of node of information and is determined as described second from node.
Wherein, it is described according to from node identification information and the target identification information, determine described each from node Corresponding from node identification information include from the connection distance of node with described:To described from node identification information and the target Identification information carries out XOR operation;According to the XOR operation as a result, determining the connection distance.
Wherein, second connection request includes the fisrt feature code of file to be stored;It is described to be connected according to described second It requests, includes from node from the multiple selections second from node being connect with second host node:It obtains the multiple from section Each from the target identification information of node in point;According to the fisrt feature code and the target identification information, institute is determined State file to be stored and described each from the transmission range of node;It will be nearest with the transmission range of the file to be stored It is determined as described second from node from node.
Wherein, described according to the fisrt feature code and the target identification information, determine the file to be stored and institute It states and each includes from the transmission range of node:XOR operation is carried out to the fisrt feature code and the target identification information;Root According to the XOR operation as a result, determining the transmission range.
Wherein, second connection request includes the second feature code of file to be read;It is described to be connected according to described second It requests, includes from node from the multiple selections second from node being connect with second host node:It is looked into from file route table Look for corresponding with the second feature code from node, the file route table includes file eigenvalue and the corresponding pass from node System, the file eigenvalue are the condition code of the multiple file stored from node;It will be corresponding with the second feature code Slave node as described second from node.
The embodiment of the present application third aspect provides a kind of first host node, including:
Receiving module, for receiving the connect with first host node first the first connection request sent from node; Selecting module, for selecting the second host node from other host nodes according to first connection request;Sending module, to institute It states the second host node and sends the second connection request, second connection request is used for
Indicate second host node from the multiple selections second from node connecting with second host node from node; The receiving module, is also used to receive that second host node sends described second from the target identification information of node;It is described Sending module is also used to send the target identification information to described first from node, and the target identification information is used to indicate Described first establishes connection from node from node and described second.
Wherein, first connection request includes the slave node identification information generated at random;The selecting module is also used to: Obtain the host node identification information of each host node in other described host nodes;According to described from node identification information and the master Node identification information determines each host node with described from the corresponding connection distance from node of node identification information;It will It is determined as with the host node for being less than preset threshold from the corresponding connection distance from node of node identification information described Second host node.
Wherein, the selecting module is also used to:It is carried out to described from node identification information and the host node identification information XOR operation;According to the XOR operation as a result, determining the connection distance.
Wherein, first connection request includes the fisrt feature code of file to be stored;The selecting module is also used to:It obtains Take the host node identification information of each host node in other described host nodes;According to the fisrt feature code and the host node mark Know information, determines the transmission range of the file to be stored Yu each host node;By with described in the file to be stored The nearest host node of transmission range is determined as second host node.
Wherein, the selecting module is also used to:Exclusive or is carried out to the fisrt feature code and the host node identification information Operation;According to the XOR operation as a result, determining the transmission range.
Wherein, first connection request includes the second feature code of file to be read;The selecting module is also used to:It obtains Take at least one file eigenvalue of each host node storage in other described host nodes;By the second feature code and it is described extremely Each file eigenvalue in a few file eigenvalue is matched, and determines whether wrap at least one described file eigenvalue Containing the second feature code;It include the host node of the second feature code at least one file eigenvalue described in being stored It is determined as second host node.
The fourth aspect of the embodiment of the present application provides a kind of second host node, including:
Receiving module, for receiving the second connection request of the first host node transmission, second connection request is by described First host node receives the first the first connection request sent from node connecting with first host node and according to described What the first connection request was sent after selecting second host node in other host nodes;Selecting module, for according to Second connection request, from the multiple selections second from node being connect with second host node from node;Sending module is used for The described second target identification information from node is sent to first host node, the target identification information is used for described First host node hair is transmitted to described first and indicates that described first establishes company from node with described second from node after node It connects.
Wherein, second connection request includes the slave node identification information generated at random;The selecting module is also used to: Obtain it is the multiple from node each from the target identification information of node;According to it is described from node identification information with it is described Target identification information, determine it is described each from node with described from the corresponding connection distance from node of node identification information;It will It is determined as with the slave node for being less than preset threshold from the corresponding connection distance from node of node identification information described Second from node.
Wherein, the selecting module is also used to:To described different from node identification information and target identification information progress Or operation;According to the XOR operation as a result, determining the transmission range.
Wherein, second connection request includes the fisrt feature code of file to be stored;The selecting module is also used to:It obtains Take it is the multiple from node each from the target identification information of node;According to the fisrt feature code and the target mark Know information, determines the file to be stored and described each from the transmission range of node;By with described in the file to be stored The nearest slave node of transmission range is determined as described second from node.
Wherein, the selecting module is also used to:Exclusive or fortune is carried out to the fisrt feature code and the target identification information It calculates;According to the XOR operation as a result, determining the transmission range.
Wherein, second connection request includes the second feature code of file to be read;The selecting module is also used to:From In file route table search it is corresponding with the second feature code from node, the file route table include file eigenvalue and from The corresponding relationship of node, the file eigenvalue are the condition code of the multiple file stored from node;It will be with described Two condition codes it is corresponding from node as described second from node.
Correspondingly, this application provides a kind of storage mediums, wherein the storage medium is for storing application program, institute Application program is stated for executing a kind of joint connecting method disclosed in the embodiment of the present application first aspect at runtime.
Correspondingly, this application provides a kind of application programs, wherein the application program for executing this Shen at runtime It please a kind of joint connecting method disclosed in embodiment first aspect.
Implement the embodiment of the present application, the first host node receives first connect with first host node first and sends from node The first connection request;Then according to the first connection request, the second host node is selected from other host nodes, and to the second main section Point send the second connection request, the second connection request be used to indicate the second host node from connect with second host node it is multiple from Selection second is from node in node;Then the second of the transmission of the second host node is received from the target identification information of node;Finally to First sends target identification information from node, which, which is used to indicate first and establishes from node and second from node, connects It connects, it can be with saving network flow, the fluency of the raising network operation.
Detailed description of the invention
Technical solution in ord to more clearly illustrate embodiments of the present application, below will be to required use in embodiment description Attached drawing be briefly described, it should be apparent that, the accompanying drawings in the following description is some embodiments of the present application, for this field For those of ordinary skill, without creative efforts, it is also possible to obtain other drawings based on these drawings.
Fig. 1 is a kind of P2P schematic network structure that background technique provides;
Fig. 2 is another kind P2P schematic network structure provided by the embodiments of the present application;
Fig. 3 is a kind of P2P cellular logic configuration diagram provided by the embodiments of the present application;
Fig. 4 is a kind of flow diagram to network from node provided by the embodiments of the present application;
Fig. 5 is a kind of flow diagram of joint connecting method provided by the embodiments of the present application;
Fig. 6 is the flow diagram of another joint connecting method provided by the embodiments of the present application;
Fig. 7 is a kind of structural schematic diagram of first host node provided by the embodiments of the present application;
Fig. 8 is a kind of structural schematic diagram of second host node provided by the embodiments of the present application;
Fig. 9 is the structural schematic diagram of another first host node provided by the embodiments of the present application;
Figure 10 is the structural schematic diagram of another second host node provided by the embodiments of the present application.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete Site preparation description, it is clear that described embodiment is some embodiments of the present application, instead of all the embodiments.Based on this Shen Please in embodiment, every other implementation obtained by those of ordinary skill in the art without making creative efforts Example, shall fall in the protection scope of this application.
Referring to FIG. 2, Fig. 2 is another kind P2P schematic network structure provided by the embodiments of the present application.As shown, should It include multiple host nodes in P2P network, each host node is connected to multiple from node.Wherein, host node can be not responsible deposit Storage file only provides the node of the routing iinformation of file and the routing iinformation for the slave node being attached thereto, for example, file server, Database server etc..It can be the node for capableing of storage file, such as personal computer, mobile phone from node.It is all from node Between can establish connection, routing iinformation is generated, and routing iinformation is stored on corresponding host node, then between node It can carry out the transmission of file.The logical architecture of the embodiment of the present application P2P network is as shown in Figure 3, wherein host node and main section Point, host node are all based on P2P protocol realization with from the communication between node.In order to guarantee the normal of network, P2P agreement rule Determine to need to constantly discover other from node to establish connection from node and therewith.
It should be noted that when a new slave node needs to be added the P2P network, as shown in figure 4, the new slave section Point can send the request that networks to any one host node first, may include the mark of the new slave node in the request that networks Know information, then receives the host node for the request that networks according to all host nodes in the identification information and network of the new slave node Identification information, determine the connection distance of the new slave node and each host node, wherein connection distance and machine in the application The physical distance of device is unrelated, only a kind of agreement in logic.Then indicate that the new slave node is connected to therewith apart from most On close host node.
Based on above-mentioned P2P network, the embodiment of the present application provides following joint connecting method.
Referring to FIG. 5, Fig. 5 is a kind of flow diagram of joint connecting method provided by the embodiments of the present application.As schemed Show, the method in the embodiment of the present application includes:
S501, the first host node receive the first connection that first connect with first host node sends from node and ask It asks.
In the specific implementation, can connect on the first host node it is multiple from node, first can be from node it is multiple from node Any one.Wherein, each from node can according to prefixed time interval (such as 1 minute/time) or need to read file, Or when having file to need to store, connection request is sent to the first host node.
S502 selects the second host node according to first connection request from other host nodes.
In the specific implementation, the first connection request may include the slave node identification information generated at random, wherein from node mark Knowing information can be the first one 16 character strings generated at random from node, such as ag1g dg890juh 781d.First from Included slave node identification information is all different in the first connection request that node is sent to the first host node every time.First is main Node can obtain the host node identification information for other host nodes connecting with first host node first, wherein host node mark Knowing information can be, but not limited to one 16 character strings to obtain according to secure Hash (Hash) algorithm;Then according to described From node identification information and the host node identification information, determine each host node with it is described corresponding from node identification information Slave node connection distance, wherein can be by being carried out to described from node identification information and the host node identification information XOR operation, further according to the XOR operation as a result, determining the connection distance.For example, from node identification information and main section The exclusive or result of point identification information is 0,010 0,000 1,000 0101, then can be by the highest order of number 1 in the exclusive or result Digit 14 is as connection distance, wherein remoter or by prefix 0 the number 2 of the bigger expression connection distance of the digit of 1 highest order As connection distance, wherein the number of prefix 0 more multilist shows that connection distance is closer.It then will be with described from node identification information The corresponding host node for being less than preset threshold from the connection distance of node is determined as second host node, wherein default Threshold value can be the arbitrary numbers such as 14,3.
Optionally, the first connection request includes the first fisrt feature code from the file to be stored in node, wherein first Condition code can be the hash value of the file to be stored obtained according to Secure Hash Algorithm, which can be one 16 Character string.First host node can obtain the host node identification information of each host node in other described host nodes first;It connects According to the fisrt feature code and the host node identification information, determine the file to be stored and each host node Transmission range, wherein the fisrt feature code and the host node identification information can be subjected to XOR operation, further according to described XOR operation as a result, determining the transmission range, wherein transmission range in the application and physical transfer are apart from unrelated, only It is only a kind of agreement in logic.For example, the exclusive or result of fisrt feature code and host node identification information is 00001000 10000101, then it can regard the digit 12 of the highest order of number 1 in the exclusive or result as transmission range, wherein 1 highest order Digit it is bigger indicate transmission range it is remoter or by the number 4 of prefix 0 as connection distance, wherein 0 number of prefix is got over Multilist shows that transmission range is closer:Then the host node nearest with the transmission range of the file to be stored is determined as second Host node.
Optionally, the first connection request includes the first second feature code from node file to be read, and first is first from node First obtain the second feature code of the file to be read, wherein second feature code can be, but not limited to as according to Secure Hash Algorithm The hash value of obtained file to be read.First host node can obtain each host node storage in other described host nodes first At least one file eigenvalue, wherein the file eigenvalue stored on each host node is the slave section connecting with the host node The condition code of the file stored on point.Then by each text in the second feature code and at least one described file eigenvalue Part condition code is matched, and determines at least one described file eigenvalue whether include the second feature code;Then by institute Host node at least one described file eigenvalue of storage comprising the second feature code is determined as second host node.
Optionally, the special code of the file stored on the slave node connecting with the host node is also stored on the first host node, Therefore before selecting the second host node in other host nodes, first can be led first according to first connection request At least one file eigenvalue stored on node is matched with second feature code, is determined at least one file eigenvalue It whether include second feature code, if being on slave node that the first host node connects comprising, then it represents that file storage to be read, There is no need to be executed again according to the connection request, the operation of the second host node is selected from other host nodes;If not including, Indicate that file to be read is not stored on the slave node of the first host node connection, it is therefore desirable to execute according to the connection Request, selects the operation of the second host node from other host nodes.
S503, the first host node send the second connection request to second host node, and second connection request is used for Indicate second host node from the multiple selections second from node connecting with second host node from node.
S504, the first host node receive that second host node sends described second from the target identification information of node. Wherein, target identification information can be, but not limited to the character string for one 16.
S505, the first host node send the target identification information, the target identification information to described first from node It is used to indicate described first and establishes connection from node from node and described second.
In the specific implementation, first can send handshake request to second from node from node, when receiving second from node When the feedback information of transmission, illustrate that second is online from node and receives first from the handshake request of node, confirmation It establishes a connection with first from node.After establishing connection from node with second, first can update this node from node Routing iinformation, and updated routing iinformation is stored in the first host node;It then, first can will text be stored from node Part is stored in second and reads file from node from second from node or according to the second feature code of file to be read.
During above-mentioned first establishes connection from node from node and second, first leads to from the connection request of node It crosses host node to be handled, any other will not receive the first connection request from node from node, to save a large amount of Network flow.
In the embodiment of the present application, the first host node receives first connect with first host node first and sends from node The first connection request;Then according to the first connection request, the second host node is selected from other host nodes, and to the second main section Point send the second connection request, the second connection request be used to indicate the second host node from connect with second host node it is multiple from Selection second is from node in node;Then the second of the transmission of the second host node is received from the target identification information of node;Finally to First sends target identification information from node, which, which is used to indicate first and establishes from node and second from node, connects It connects, it can be with saving network flow, the fluency of the raising network operation.
Referring to FIG. 6, Fig. 6 is the flow diagram of another joint connecting method provided by the embodiments of the present application.Such as figure Shown, the method in the embodiment of the present application includes:
S601, first sends the first connection request from node to the first host node.
In the specific implementation, first can be any one multiple from node connecting with the first host node from node. Wherein, first can shine prefixed time interval (such as 1 minute/time) from node or need to read file or have file needs to deposit Chu Shi sends the first connection request to the first host node
S602, the first host node select the second host node according to the first connection request from other host nodes.This step with S502 in a upper embodiment is identical, this step repeats no more.
S603, the first host node send the second connection request to the second host node.
S604, the second host node multiple are selected from what is connect with second host node from node according to the second connection request Second is selected from node.
In the specific implementation, the second connection request may include the slave node identification information generated at random.Second host node can With obtain first it is the multiple from node each from the target identification information of node;Then according to described from node identification Information and the target identification information, determine it is described each from node with described from the corresponding company from node of node identification information Connect distance, wherein XOR operation can be carried out from node identification information and the target identification information to described, according to described different Or operation as a result, determining the connection distance;Then by with described from the corresponding company from node of node identification information The slave node that distance is connect less than preset threshold is determined as described second from node.
Optionally, the second connection request includes the first fisrt feature code from the file to be stored in node, wherein first Condition code can be the hash value of the file to be stored obtained according to Secure Hash Algorithm, which can be one 16 Character string.Second host node can obtain first it is the multiple from node each from the target identification information of node;Then According to fisrt feature code and the target identification information, the file to be stored and described each from the transmission distance of node is determined From, wherein XOR operation can be carried out to fisrt feature code and target identification information, further according to XOR operation as a result, determining Transmission range.For example, the exclusive or result of fisrt feature code and target identification information is 00,001,000 1,000 0101, then can incite somebody to action The digit 12 of the highest order of number 1 is used as transmission range in the exclusive or result, wherein the bigger expression of the digit of 1 highest order passes Defeated distance is remoter or regard the number 4 of prefix 0 as connection distance, wherein the number of prefix 0 more multilist shows that transmission range is closer: Then the slave node nearest with the transmission range of the file to be stored is determined as second from node.
Optionally, the second connection request includes the first second feature code from node file to be read.Second host node can Corresponding with the second feature code from node to search from file route table, the file route table includes file eigenvalue With the corresponding relationship from node, the file eigenvalue is the condition code of the multiple file stored from node.Wherein, literary Part routing table is stored in the second host node, and this document condition code can be, but not limited to be calculated using Secure Hash Algorithm File hash value.
Such as:First from the condition code of node file to be read be bhhi08hggyhu9876.As shown in table 1, file road By including that multiple file eigenvalues and each file eigenvalue are corresponding from node in table, wherein abdg hu9y bg23 780d is corresponding with from node 1, bhhi 08hg gyhu 9876 and cy6t nj21 90hu by21 with from node 2 it is corresponding and Vet6 90f7 vhu1 gy70 is corresponding with from node 3.It is all to be connected to the second host node from node 1, from node 2 and from node 3 On slave node.Therefore, can find from file route table with the condition code of file to be read is bhhi 08hg gyhu 9876 is corresponding for from node 2, so will be determined as second from node from node 2.
1. file route table of table
File eigenvalue From node
abdg hu9y bg23 780d From node 1
bhhi 08hg gyhu 9876 From node 2
cy6t nj21 90hu by21 From node 2
vet6 90f7 vhu1 gy70 From node 3
S605, the second host node send the second target identification information from node to the first host node.
S606, the first host node send the second target identification information from node to first from node.
S607, first establishes connection from node according to target identification information and second from node.
In the specific implementation, first can send handshake request to second from node from node, when receiving second from node When the feedback information of transmission, illustrate second be online and receive from node first from the handshake request of node, really Recognize and establishes a connection with first from node.Then the first routing iinformation that can update this node from node, and after updating Routing iinformation be stored in the first host node.
In the embodiment of the present application, the first host node receives first connect with first host node first and sends from node The first connection request;Then according to the first connection request, the second host node is selected from other host nodes, and to the second main section Point send the second connection request, the second connection request be used to indicate the second host node from connect with second host node it is multiple from Selection second is from node in node;Then the second of the transmission of the second host node is received from the target identification information of node;Finally to First sends target identification information from node, which, which is used to indicate first and establishes from node and second from node, connects It connects, it can be with saving network flow, the fluency of the raising network operation.
Referring to FIG. 7, Fig. 7 is a kind of structural schematic diagram of first host node provided by the embodiments of the present application.As shown, The first host node in the embodiment of the present application includes:
Receiving module 701 is asked for receiving the first connection that connect with first host node first sends from node It asks.
In the specific implementation, can connect on the first host node it is multiple from node, first can be from node it is multiple from node Any one.Wherein, each from node can according to prefixed time interval (such as 1 minute/time) or need to read file, Or when having file to need to store, the first connection request is sent to the first host node.
Selecting module 702, for selecting the second host node from other host nodes according to first connection request.
In the specific implementation, the first connection request may include the slave node identification information generated at random, wherein from node mark Knowing information can be the first one 16 character strings generated at random from node, such as ag1g dg890juh 781d.First from Included slave node identification information is all different in the connection request that node is sent to the first host node every time.First host node The host node identification information for other host nodes connecting with first host node can be obtained first, wherein host node mark letter Breath can be, but not limited to one 16 character strings to obtain according to secure Hash (Hash) algorithm;Then according to described from section Point identification information and the host node identification information, determine each host node with it is described from node identification information it is corresponding from The connection distance of node, wherein can be by carrying out exclusive or from node identification information and the host node identification information to described Operation, further according to the XOR operation as a result, determining the connection distance.For example, from node identification information and host node mark The exclusive or result for knowing information is 0,010 0,000 1,000 0101, then can be by the digit of the highest order of number 1 in the exclusive or result 14 are used as connection distance, wherein the bigger expression connection distance of the digit of 1 highest order is remoter or regard 0 number 2 of prefix as company Connect distance, wherein the 0 number more multilist of prefix shows that connection distance is closer.Then will with it is described corresponding from node identification information Slave node the connection distance be less than preset threshold host node be determined as second host node, wherein preset threshold It can be the arbitrary numbers such as 14,3.
Optionally, the first connection request includes the first fisrt feature code from the file to be stored in node, wherein first Condition code can be the hash value of the file to be stored obtained according to Secure Hash Algorithm, which can be one 16 Character string.First host node can obtain the host node identification information of each host node in other described host nodes first;It connects According to the fisrt feature code and the host node identification information, determine the file to be stored and each host node Transmission range, wherein the fisrt feature code and the host node identification information can be subjected to XOR operation, further according to described XOR operation as a result, determining the transmission range, wherein transmission range in the application and physical transfer are apart from unrelated, only It is only a kind of agreement in logic.For example, the exclusive or result of fisrt feature code and host node identification information is 00,001,000 1000 0101, then it can regard the digit 12 of the highest order of number 1 in the exclusive or result as transmission range, wherein the position of 1 highest order Number is bigger to indicate that transmission range is remoter or regard the number 4 of prefix 0 as connection distance, wherein 0 number of prefix gets over multilist Show that transmission range is closer:Then the host node nearest with the transmission range of the file to be stored is determined as the second main section Point.
Optionally, the first connection request includes the first second feature code from node file to be read, and first is first from node First obtain the second feature code of the file to be read, wherein second feature code can be, but not limited to as according to Secure Hash Algorithm Obtained file hash value to be read.First host node can obtain each host node storage in other described host nodes first At least one file eigenvalue, wherein the file eigenvalue stored on each host node is the slave node connecting with the host node The condition code of the file of upper storage.Then by each file in the second feature code and at least one described file eigenvalue Condition code is matched, and determines at least one described file eigenvalue whether include the second feature code;Then it will be deposited Host node at least one described file eigenvalue of storage comprising the second feature code is determined as second host node.
Optionally, the special code of the file stored on the slave node connecting with the host node is also stored on the first host node, Therefore it can choose module 702 to be also used to according to the connection request, it is first before selecting the second host node in other host nodes At least one file eigenvalue stored on the first host node is matched with second feature code first, determines at least one text It whether include second feature code in part condition code, if comprising, then it represents that file storage to be read is that the first host node connects Slave node on, there is no need to be executed again according to the connection request, the operation of the second host node is selected from other host nodes; If not including, then it represents that file to be read is not stored on the slave node of the first host node connection, it is therefore desirable to be executed According to the connection request, the operation of the second host node is selected from other host nodes.
Sending module 703, for sending the second connection request to second host node, second connection request is used for Indicate second host node from the multiple selections second from node connecting with second host node from node.
Receiving module 701 is also used to receive second host node is sent described second and believes from the first identifier of node Breath.Wherein, target identification information can be, but not limited to the character string for one 16.
Sending module 703 is also used to send the target identification information, the target identification letter to described first from node Breath is used to indicate described first and establishes connection from node from node and described second.
In the specific implementation, first can send handshake request to second from node from node, when receiving second from node When the feedback information of transmission, illustrate that second is online from node and receives first from the handshake request of node, confirmation Connection is established from node with first.After establishing connection from node with second, first can update the routing of this node from node Information, and updated routing iinformation is stored in the first host node;Then, first file to be stored can be deposited from node Storage reads file from second from node or according to the second feature code of file to be read second from node.
In the embodiment of the present application, the first host node receives first connect with first host node first and sends from node The first connection request;Then according to the first connection request, the second host node is selected from other host nodes, and to the second main section Point send the second connection request, the second connection request be used to indicate the second host node from connect with second host node it is multiple from Selection second is from node in node;Then the second of the transmission of the second host node is received from the target identification information of node;Finally to First sends target identification information from node, which, which is used to indicate first and establishes from node and second from node, connects It connects, it can be with saving network flow, the fluency of the raising network operation.
Referring to FIG. 8, Fig. 8 is a kind of structural schematic diagram of second host node provided by the embodiments of the present application.As shown, The second host node in the embodiment of the present application includes:
Receiving module 801, for receiving the second connection request of the first host node transmission.Wherein, the second connection request by First host node receives the first connection request that first connect with first host node sends from node and basis What first connection request was sent after selecting second host node in other host nodes.
Selecting module 802 multiple is selected from what is connect with the second host node from node for according to the second connection request Second from node.
In the specific implementation, the second connection request may include the slave node identification information generated at random.Second host node can With obtain first it is the multiple from node each from the target identification information of node;Then according to described from node identification Information and the target identification information, determine it is described each from node with described from the corresponding company from node of node identification information Connect distance, wherein XOR operation can be carried out from node identification information and the target identification information to described, according to described different Or operation as a result, determining the connection distance;Then by with described from the corresponding company from node of node identification information The slave node that distance is connect less than preset threshold is determined as described second from node.
Optionally, the second connection request includes the first fisrt feature code from the file to be stored in node, wherein first Condition code can be the hash value of the file to be stored obtained according to Secure Hash Algorithm, which can be one 16 Character string.Second host node can obtain first it is the multiple from node each from the target identification information of node;Then According to fisrt feature code and the target identification information, the file to be stored and described each from the transmission distance of node is determined From, wherein XOR operation can be carried out to fisrt feature code and target identification information, further according to XOR operation as a result, determining Transmission range.For example, the exclusive or result of fisrt feature code and target identification information is 00,001,000 1,000 0101, then can incite somebody to action The digit 12 of the highest order of number 1 is used as transmission range in the exclusive or result, wherein the bigger expression of the digit of 1 highest order passes Defeated distance it is remoter or by the number 4 of prefix 0 as connection distance, wherein the 0 number more multilist of prefix show transmission range more Closely:Then the slave node nearest with the transmission range of the file to be stored is determined as second from node.
Optionally, the second connection request includes the first second feature code from node file to be read.Second host node can Corresponding with the second feature code from node to search from file route table, the file route table includes file eigenvalue With the corresponding relationship from node, the file eigenvalue is the condition code of the multiple file stored from node.Wherein, literary Part routing table is stored in the second host node, and this document condition code can be, but not limited to be calculated using Secure Hash Algorithm File hash value.
Sending module 803, for sending the second target identification information from node to the first host node.Wherein, the target Identification information indicates that after node, this first is established from node from node and second and connect being transmitted to first by the first host node It connects.
In the embodiment of the present application, the first host node receives first connect with first host node first and sends from node The first connection request;Then according to the first connection request, the second host node is selected from other host nodes, and to the second main section Point send the second connection request, the second connection request be used to indicate the second host node from connect with second host node it is multiple from Selection second is from node in node;Then the second of the transmission of the second host node is received from the target identification information of node;Finally to First sends target identification information from node, which, which is used to indicate first and establishes from node and second from node, connects It connects, it can be with saving network flow, the fluency of the raising network operation.
Referring to FIG. 9, Fig. 9 is a kind of structural schematic diagram of first host node provided by the embodiments of the present application.As shown, First host node may include:At least one processor 901, such as CPU, at least one communication interface 902, at least one is deposited Reservoir 903, at least one bus 904.Wherein, bus 904 is for realizing the connection communication between these components.Wherein, this Shen It please the communication interface 902 of electronic equipment be wired sending port in embodiment, or wireless device is traditional thread binding for example including day It sets, for carrying out the communication of signaling or data with other node devices.Memory 903 can be high speed RAM memory, can also be with It is non-labile memory (non-volatile memory), for example, at least a magnetic disk storage.Memory 903 is optional Can also be that at least one is located remotely from the storage device of aforementioned processor 901.Batch processing generation is stored in memory 903 Code, and processor 901 is used to call the program code stored in memory, for performing the following operations:
Receive the first the first connection request sent from node connecting with first host node;
According to first connection request, the second host node is selected from other host nodes;
The second connection request is sent to second host node, second connection request is used to indicate the described second main section Point multiple is selected from node second from node from what is connect with second host node;
Target identification information of receive that second host node sends described second from node;
The target identification information is sent to described first from node, the target identification information is used to indicate described first Connection is established from node from node and described second.
Wherein, first connection request includes the slave node identification information generated at random;
Processor 901 is also used to perform the following operations step:
Obtain the host node identification information of each host node in other described host nodes;
According to described from node identification information and the host node identification information, determine each host node and it is described from The corresponding connection distance from node of node identification information;
By with the host node for being less than preset threshold from the corresponding connection distance from node of node identification information It is determined as second host node.
Wherein, processor 901 is also used to perform the following operations step:
XOR operation is carried out from node identification information and the host node identification information to described;
According to the XOR operation as a result, determining the connection distance.
Wherein, first connection request includes the fisrt feature code of file to be stored;
Processor 901 is also used to perform the following operations step:
Obtain the host node identification information of each host node in other described host nodes;
According to the fisrt feature code and the host node identification information, the file to be stored and each master are determined The transmission range of node;
The host node nearest with the transmission range of the file to be stored is determined as second host node.
Wherein, processor 901 is also used to perform the following operations step:
XOR operation is carried out to the fisrt feature code and the host node identification information;
According to the XOR operation as a result, determining the transmission range.
Wherein, first connection request includes the second feature code of file to be read;
Processor 901 is also used to perform the following operations step:
Obtain at least one file eigenvalue of each host node storage in other described host nodes;
The second feature code is matched with each file eigenvalue at least one described file eigenvalue, really It whether include the second feature code at least one fixed described file eigenvalue;
Host node at least one file eigenvalue described in being stored comprising the second feature code is determined as institute State the second host node.
Further, processor can also be matched with memory and communication interface, be executed in above-mentioned application embodiment The operation of one host node.
Referring to FIG. 10, Figure 10 is a kind of structural schematic diagram of second host node provided by the embodiments of the present application.As schemed Show, which may include:At least one processor 1001, such as CPU, at least one communication interface 1002, at least One memory 1003, at least one bus 1004.Wherein, bus 1004 is for realizing the connection communication between these components. Wherein, the communication interface 1002 of electronic equipment is wired sending port in the embodiment of the present application, or wireless device, such as Including antenna assembly, for carrying out the communication of signaling or data with other node devices.Memory 1003 can be high-speed RAM and deposit Reservoir is also possible to non-labile memory (non-volatile memory), for example, at least a magnetic disk storage.It deposits Reservoir 1003 optionally can also be that at least one is located remotely from the storage device of aforementioned processor 1001.It is deposited in memory 1003 Batch processing code is stored up, and processor 1001 is used to call the program code stored in memory, for performing the following operations:
The second connection request of the first host node transmission is received, second connection request is received by first host node The first connection request for being sent to first connect with first host node from node and according to first connection request from Second host node is selected to send in other host nodes later;
According to second connection request, from the multiple selections second from node being connect with second host node from section Point;
The described second target identification information from node is sent to first host node, the target identification information is by institute It states the first host node and is sent to described first and is used to indicate described first from node and is established from node with described second from node and connect It connects.
Wherein, second connection request includes the slave node identification information generated at random;
Processor 1001 is also used to perform the following operations step:
Obtain it is the multiple from node each from the target identification information of node;
According to described from node identification information and described each from the target identification information of node, determine described each From node with described from the corresponding connection distance from node of node identification information;
By with the slave node for being less than preset threshold from the corresponding connection distance from node of node identification information It is determined as described second from node.
Wherein, processor 1001 is also used to perform the following operations step:
To described from node identification information and described each from the target identification information of node progress XOR operation;
According to the XOR operation as a result, determining the transmission range.
Wherein, second connection request includes the fisrt feature code of file to be stored;
Processor 1001 is also used to perform the following operations step:
Obtain it is the multiple from node each from the target identification information of node;
According to the fisrt feature code and described each from the target identification information of node, the text to be stored is determined Part and described each from the transmission range of node;
The slave node nearest with the transmission range of the file to be stored is determined as described second from node.
Wherein, processor 1001 is also used to perform the following operations step:
XOR operation each is carried out from the target identification information of node with described to the fisrt feature code;
According to the XOR operation as a result, determining the transmission range.
Wherein, second connection request includes the second feature code of file to be read;
Processor 1001 is also used to perform the following operations step:
Lookup is corresponding with the second feature code from node from file route table, and the file route table includes file Condition code and the corresponding relationship from node, the file eigenvalue are the condition code of the multiple file stored from node;
Will it is corresponding with the second feature code from node as described second from node.
Further, processor can also be matched with memory and communication interface, be executed in above-mentioned application embodiment The operation of two host nodes.
In the above-described embodiments, can come wholly or partly by software, hardware, firmware or any combination thereof real It is existing.When implemented in software, it can entirely or partly realize in the form of a computer program product.The computer program Product includes one or more computer instructions.When loading on computers and executing the computer program instructions, all or It partly generates according to process or function described in the embodiment of the present application.The computer can be general purpose computer, dedicated meter Calculation machine, computer network or other programmable devices.The computer instruction can store in computer readable storage medium In, or from a computer readable storage medium to the transmission of another computer readable storage medium, for example, the computer Instruction can pass through wired (such as coaxial cable, optical fiber, number from a web-site, computer, server or data center User's line (DSL)) or wireless (such as infrared, wireless, microwave etc.) mode to another web-site, computer, server or Data center is transmitted.The computer readable storage medium can be any usable medium that computer can access or It is comprising data storage devices such as one or more usable mediums integrated server, data centers.The usable medium can be with It is magnetic medium, (for example, floppy disk, hard disk, tape), optical medium (for example, DVD) or semiconductor medium (such as solid state hard disk Solid State Disk (SSD)) etc..Above-described specific embodiment, to the purpose of the application, technical solution and beneficial Effect has been further described.Within the spirit and principles of this application, made any modification, equivalent replacement, Improve etc., it should be included within the scope of protection of this application.

Claims (14)

1. a kind of joint connecting method, which is characterized in that the method is applied to the first host node, the method includes:
Receive the first the first connection request sent from node connecting with first host node;
According to first connection request, the second host node is selected from other host nodes;
To second host node send the second connection request, second connection request be used to indicate second host node from The multiple selections second from node connecting with second host node are from node;
Target identification information of receive that second host node sends described second from node;
The target identification information is sent to described first from node, the target identification information is used to indicate described first from section Point establishes connection from node with described second.
2. the method as described in claim 1, which is characterized in that first connection request includes the slave node mark generated at random Know information;
It is described according to first connection request, select the second host node to include from other host nodes:
Obtain the host node identification information of each host node in other described host nodes;
According to described from node identification information and the host node identification information, each host node and described from node is determined The corresponding connection distance from node of identification information;
It will be determined from node identification information is corresponding from the connection distance of node less than the host node of preset threshold with described For second host node.
3. method according to claim 2, which is characterized in that it is described according to from node identification information and the host node Identification information determines that each host node corresponding from node identification information includes from the connection distance of node with described:
XOR operation is carried out from node identification information and the host node identification information to described;
According to the XOR operation as a result, determining the connection distance.
4. the method as described in claim 1, which is characterized in that first connection request includes the first spy of file to be stored Levy code;
It is described according to first connection request, select the second host node to include from other host nodes:
Obtain the host node identification information of each host node in other described host nodes;
According to the fisrt feature code and the host node identification information, the file to be stored and each host node are determined Transmission range;
The host node nearest with the transmission range of the file to be stored is determined as second host node.
5. method as claimed in claim 4, which is characterized in that described to be identified according to the fisrt feature code and the host node Information determines that the transmission range of the file to be stored and each host node includes:
XOR operation is carried out to the fisrt feature code and the host node identification information;
According to the XOR operation as a result, determining the transmission range.
6. the method as described in claim 1, which is characterized in that first connection request includes the second spy of file to be read Levy code;
It is described according to first connection request, select the second host node to include from other host nodes:
Obtain at least one file eigenvalue of each host node storage in other described host nodes;
The second feature code is matched with each file eigenvalue at least one described file eigenvalue, determines institute It whether states at least one file eigenvalue comprising the second feature code;
Host node at least one file eigenvalue described in being stored comprising the second feature code is determined as described the Two host nodes.
7. a kind of joint connecting method, which is characterized in that the method is applied to the second host node, the method includes:
Receive the first host node transmission the second connection request, second connection request by first host node receive with The first connection request that the first of first host node connection sends from node and according to first connection request from other Second host node is selected to send in host node later;
According to second connection request, from the multiple selections second from node being connect with second host node from node;
The described second target identification information from node is sent to first host node, the target identification information is used in quilt First host node is transmitted to described first and indicates that described first establishes with described second from node from node after node Connection.
8. the method for claim 7, which is characterized in that second connection request includes the slave node mark generated at random Know information;
It is described according to second connection request, from the multiple selections second from node being connect with second host node from section It puts and includes:
Obtain it is the multiple from node each from the target identification information of node;
According to described from node identification information and the target identification information, determine described each from node and described from node mark Know the corresponding connection distance from node of information;
It will be determined from node identification information is corresponding from the connection distance of node less than the slave node of preset threshold with described For described second from node.
9. method according to claim 8, which is characterized in that it is described according to from node identification information and the target mark Know information, determines and described each corresponding from node identification information include from the connection distance of node from node with described:
XOR operation is carried out from node identification information and the target identification information to described;
According to the XOR operation as a result, determining the connection distance.
10. the method for claim 7, which is characterized in that second connection request includes the first of file to be stored Condition code;
It is described according to second connection request, from the multiple selections second from node being connect with second host node from section It puts and includes:
Obtain it is the multiple from node each from the target identification information of node;
According to the fisrt feature code and the target identification information, the file to be stored and described each from node is determined Transmission range;
The slave node nearest with the transmission range of the file to be stored is determined as described second from node.
11. method as claimed in claim 10, which is characterized in that described according to the fisrt feature code and the target identification Information determines that the file to be stored each includes from the transmission range of node with described:
XOR operation is carried out to the fisrt feature code and the target identification information;
According to the XOR operation as a result, determining the transmission range.
12. the method for claim 7, which is characterized in that second connection request includes the second of file to be read Condition code;
It is described according to second connection request, from the multiple selections second from node being connect with second host node from section It puts and includes:
Lookup is corresponding with the second feature code from node from file route table, and the file route table includes file characteristic Code and the corresponding relationship from node, the file eigenvalue are the condition code of the multiple file stored from node;
Will it is corresponding with the second feature code from node as described second from node.
13. a kind of first host node, which is characterized in that including:Processor, memory, communication interface and bus;
The processor, the memory are connected by the bus with the communication interface and complete mutual communication;
The memory stores executable program code;
The processor is run and the executable program by reading the executable program code stored in the memory The corresponding program of code, for executing joint connecting method as claimed in any one of claims 1 to 6.
14. a kind of second host node, which is characterized in that including:Processor, memory, communication interface and bus;
The processor, the memory are connected by the bus with the communication interface and complete mutual communication;
The memory stores executable program code;
The processor is run and the executable program by reading the executable program code stored in the memory The corresponding program of code, for executing such as the described in any item joint connecting methods of claim 7-12.
CN201810834819.6A 2018-07-26 2018-07-26 A kind of joint connecting method and relevant device Pending CN108848191A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810834819.6A CN108848191A (en) 2018-07-26 2018-07-26 A kind of joint connecting method and relevant device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810834819.6A CN108848191A (en) 2018-07-26 2018-07-26 A kind of joint connecting method and relevant device

Publications (1)

Publication Number Publication Date
CN108848191A true CN108848191A (en) 2018-11-20

Family

ID=64192172

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810834819.6A Pending CN108848191A (en) 2018-07-26 2018-07-26 A kind of joint connecting method and relevant device

Country Status (1)

Country Link
CN (1) CN108848191A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110611881A (en) * 2019-09-26 2019-12-24 北京邮电大学 Control node determination method and device

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1925444A (en) * 2006-09-14 2007-03-07 华为技术有限公司 Method for establishing point-to-point collection in P2P network and nodes in P2P network
CN101106503A (en) * 2007-08-31 2008-01-16 华为技术有限公司 Autonomous method for peer-to-peer network, node device and system
KR20080048835A (en) * 2006-11-29 2008-06-03 삼성네트웍스 주식회사 System for real time internet broadcast service and management method thereof
CN101645831A (en) * 2009-05-08 2010-02-10 中国科学院声学研究所 Node organization method in P2P system
CN101753610A (en) * 2008-12-19 2010-06-23 华为技术有限公司 Distributed network structure method, device, system and task processing method
CN101841484A (en) * 2010-05-12 2010-09-22 中国科学院计算技术研究所 Method and system for realizing NAT traversal in structured P2P network
CN101860474A (en) * 2009-04-08 2010-10-13 中兴通讯股份有限公司 Peer-to-peer network and resource information processing method based on same
CN102065112A (en) * 2009-11-18 2011-05-18 中国移动通信集团公司 Peer-to-peer (P2P) network system and method and related device for establishing the same
CN103209224A (en) * 2013-04-28 2013-07-17 上海海事大学 P2P (peer-to-peer)-based underwater acoustic sensor network system and data transmission method thereof

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1925444A (en) * 2006-09-14 2007-03-07 华为技术有限公司 Method for establishing point-to-point collection in P2P network and nodes in P2P network
KR20080048835A (en) * 2006-11-29 2008-06-03 삼성네트웍스 주식회사 System for real time internet broadcast service and management method thereof
CN101106503A (en) * 2007-08-31 2008-01-16 华为技术有限公司 Autonomous method for peer-to-peer network, node device and system
CN101753610A (en) * 2008-12-19 2010-06-23 华为技术有限公司 Distributed network structure method, device, system and task processing method
CN101860474A (en) * 2009-04-08 2010-10-13 中兴通讯股份有限公司 Peer-to-peer network and resource information processing method based on same
CN101645831A (en) * 2009-05-08 2010-02-10 中国科学院声学研究所 Node organization method in P2P system
CN102065112A (en) * 2009-11-18 2011-05-18 中国移动通信集团公司 Peer-to-peer (P2P) network system and method and related device for establishing the same
CN101841484A (en) * 2010-05-12 2010-09-22 中国科学院计算技术研究所 Method and system for realizing NAT traversal in structured P2P network
CN103209224A (en) * 2013-04-28 2013-07-17 上海海事大学 P2P (peer-to-peer)-based underwater acoustic sensor network system and data transmission method thereof

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110611881A (en) * 2019-09-26 2019-12-24 北京邮电大学 Control node determination method and device
CN110611881B (en) * 2019-09-26 2020-09-18 北京邮电大学 Control node determination method and device

Similar Documents

Publication Publication Date Title
CN102100032B (en) System from reputation shaping a peer-to-peer network
JP6181740B2 (en) How to extend a web service's application programming interface using a query language
US9270671B2 (en) Biometric-based wireless device association
WO2022121538A1 (en) Data synchronization method and system based on blockchain, and related device
KR20050009685A (en) State migration in multiple nic rdma enabled devices
US20130198198A1 (en) Generating method, generating system, and recording medium
WO2015196815A1 (en) Ip hard disk and storage system, and data operating method therefor
CN111338806B (en) Service control method and device
CN110191428A (en) A kind of data distributing method based on intelligent cloud platform
CN102891872B (en) The method and system of data storage and query in a kind of peer-to-peer network
RU2585973C2 (en) Method and apparatus for controlling locking operation of database system
CN105868251A (en) Cache data updating method and device
JP2021039585A (en) Method for controlling connection with client or server
CN103546380A (en) Message forwarding method and device based on strategy routing
JP2016515256A (en) Apparatus and method for a distributed memory system including a memory node
CN108848191A (en) A kind of joint connecting method and relevant device
JP3756349B2 (en) Database management apparatus and recording medium on which program is recorded
US20150026799A1 (en) Information processing system, information processing method, and non-transitory computer readable medium
CN110502187A (en) A kind of snapshot rollback method and device
JP2019153189A (en) Server for caching session information set, and cache control method of session information set
JP2016099969A (en) Information processing apparatus, data storage system, and data storage method
US10185735B2 (en) Distributed database system and a non-transitory computer readable medium
JP2009289161A (en) Clustered storage system, node device thereof, and method and program for controlling data read/write
WO2016172948A1 (en) Routing information configuration method and apparatus
CN110245307A (en) Page cache management method and system, terminal device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20181120