CN109412842A - A kind of data interactive method based on computer network - Google Patents
A kind of data interactive method based on computer network Download PDFInfo
- Publication number
- CN109412842A CN109412842A CN201811175791.6A CN201811175791A CN109412842A CN 109412842 A CN109412842 A CN 109412842A CN 201811175791 A CN201811175791 A CN 201811175791A CN 109412842 A CN109412842 A CN 109412842A
- Authority
- CN
- China
- Prior art keywords
- data
- service
- node
- data service
- packet
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
- H04L41/0806—Configuration setting for initial configuration or provisioning, e.g. plug-and-play
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0236—Filtering by address, protocol, port number or service, e.g. IP-address or URL
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1001—Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/22—Parsing or analysis of headers
Abstract
The present invention provides a kind of data interactive method based on computer network, it is related to big data field, calculating process is initiated node RN (Request Node) from data service by computer network and is transmitted to data service offer node SN (Service Node) by the present invention, it is to detect and unconventional artificial detection automatically, therefore improve efficiency of transmission in the detection process;Meanwhile what is transmitted in network of the invention is data service procedure control information and result data rather than data source information, effectively avoids leaking data and protects the interests of data providing.It initiates to formulate stringent Data Security, augmentation data safety protecting mechanism between node and data service providing node in data service.In a word, the present invention can physically completely cut off data source and data result, and the Data Security of node SN is provided using data service to execute control, this data interaction mode can reduce the transmission total amount of the data in data network, promote the efficiency of transmission of data network.
Description
Technical field
The present invention relates to big data field more particularly to a kind of data interactive methods based on computer network.
Background technique
As the burst of big data era data volume increases, the exchange method of data has also derived oneself unique skill
Art and framework, and pushed directly on the development of storage, network and computing technique.With structural data and unstructured
The sustainable growth of data volume, and the diversification of analysis data source, the data interactive method of existing computer network is
It is unable to satisfy the needs of big data era.
Existing data interactive method is primarily present two problems: first is that is transmitted in computer network is a large amount of data
Content, this exchange method accessed based on content service with network early period is adaptable, but arriving with big data era
Come, network access with result obtain based on exchange method be increasingly widely used.Therefore, it is obtained in computer network with result
It is taken as main data interactive method and needs new mode to promote the efficiency of network transmission, adapt to the user behavior side of network access
Method.
Second is that the data permission and problem of data safety of data requirements side and provider's growing interest, are related to nature in data
People and when legal person's privacy, most data data providing is not intended to directly provide data content to data requirements side, together
When, the data directly transmitted in a computer network face the challenge of transmission safety and network security always.Therefore, one kind is designed
The data interactive method of safety becomes most important.
Summary of the invention
It is an object of the invention to: transmission efficiency is low to solve the existing data interactive method based on computer network with
And the problem of easy leaking data, the present invention provides a kind of data interactive method based on computer network.
Technical scheme is as follows:
A kind of data interactive method based on computer network, includes the following steps:
S101: data service initiates node RN (Request Node) initial configuration parameter, and configuration parameter is necessary to ensure that
Service providing node SN (Service Node) is able to carry out data service under set environment;
S102: data service provides node SN and requires to carry out ability inspection with inherent parameters according to the configuration parameter in S101
It surveys, if ability detection passes through, makes the response for indicating can receive the data service request that data service initiates node RN;
Node RN refusal service is initiated conversely, then replying and receiving data service, and Reason For Denial code is provided;
S103: data service initiates node RN asks to the data service offer node SN initiation data service by detecting
It asks, and carries data service and execute content;
S104: data service provides node SN and executes data service, and retention process during executing data service
Information is controlled, data service content and control information is packaged into corresponding data packet;The packaged type of data packet can be used two
System, octal system, hexadecimal or other agreements code word encoded;The detailed process of packet encapsulation are as follows:
Protocol header of the encapsulation control information as data packet, including mandatory parameter and optional parameters, mandatory parameter include envelope
Protocol version, the sequence number of data packet, the sequence number of respond request, status code, reason code are filled, optional parameters is according to actual number
Arranged in tunneling according to interactive demand;Using data service content as data load according to corresponding coding mode
It is encoded, the data service content more than code length needs subpackage to handle, to guarantee that the data packet after integration meets network
The length requirement of agreement;Then it carries out protocol header and data load to be integrally formed data packet;Data packet after integration is as upper
The data load of layer protocol is further encapsulated and is transmitted by upper-layer protocol;
S105: data service initiates node RN received data packet, makees after completing data check to data service offer node
It is corresponding out, it terminates data and takes session;
S106: data service provides root node SN and agrees to terminate data service session, and session connection physics disconnects.
Specifically, in the S103, it is same to the data service offer node SN by detection that data service initiates node RN
When carry data safety request, the S105-S106 replaces with following steps:
S105: data service provides node SN and executes number according to the data safety request that data service initiates node RN request
According to security strategy, the data audited by data safety are packaged into the corresponding network of computer network as data service result and assist
View packet;
S106: data service initiate node RN receiving network protocol packet, complete data check after to data service provide section
Point is made accordingly, is terminated data and is taken session;
S107: data service provides root node SN and agrees to terminate data service session, and session connection physics disconnects.
In the S101, the configuration parameter includes network environment parameters, hardware environment parameter, software environment parameter, number
According to service parameter, Data Security parameter and QoS parameter;Data service includes but is not limited to data acquisition service, number
Service, Data distributing are administered according to processing service, data operation service, data.
Specifically, the data service initiates node RN and the data request service of data service providing node SN can be
The arbitrary patterns of one-to-one, one-to-many, many-one or multi-to-multi.
After adopting the above scheme, beneficial effects of the present invention are as follows:
(1) calculating process is transmitted to data service from data service initiation node RN by computer network and mentioned by the present invention
It is to detect and unconventional artificial detection automatically, therefore improve efficiency of transmission in the detection process for node.
(2) what is transmitted in network is data service procedure control information and result data rather than data source information, is effectively kept away
Exempt from leaking data and protects the interests of data providing.It initiates to formulate between node and data service providing node in data service
Stringent Data Security, augmentation data safety protecting mechanism.In short, the present invention can carry out data source and data result
Physically completely cut off, and provides the Data Security of node SN using data service to execute control, this data interaction mode
It can reduce the data transmission total amount in data network, promote the efficiency of transmission of data network.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is the present invention
Some embodiments for those of ordinary skill in the art without creative efforts, can also basis
These attached drawings obtain other attached drawings.
Fig. 1 is data interaction flow chart of the invention.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention
In attached drawing, technical solution in the embodiment of the present invention carry out it is clear,
It is fully described by.Obviously, described embodiments are some of the embodiments of the present invention, rather than whole implementation
Example.Based on the embodiments of the present invention, obtained by those of ordinary skill in the art without making creative efforts
Every other embodiment, shall fall within the protection scope of the present invention.
Below in conjunction with the drawings and examples technical solution that the present invention will be described in detail.
Embodiment 1
A kind of data interactive method based on computer network of the present embodiment, includes the following steps:
S101: data service initiates node RN initial configuration parameter, and configuration parameter is necessary to ensure that the energy under set environment
Enough execute data service;The configuration parameter includes network environment parameters, hardware environment parameter, software environment parameter, data clothes
Business parameter, Data Security parameter and QoS parameter;Data service includes but is not limited to data acquisition service, at data
The service of managing, data operation service, data administer service, Data distributing.
S102: data service provides node SN and requires to carry out ability inspection with inherent parameters according to the configuration parameter in S101
It surveys, if ability detection passes through, data service, which provides node, which makes, indicates can receive the number that data service initiates node RN
According to the response of service request;Node RN refusal service is initiated conversely, then replying and receiving data service, and Reason For Denial generation is provided
Code;The initiation mode of data service capabilities detection and path are different according to the technical parameter of network and the difference of framework;Parameter
Ability detection mode and response mode it is different according to the difference of technical solution.
S103: data service initiates node RN asks to the data service offer node SN initiation data service by detecting
It asks, and carries data service and execute content;The mode and data service execution content of request can be with according to the difference of technical solution
There is different agreements;It can be one that the data service, which initiates node RN and the data request service of data service providing node SN,
To the arbitrary patterns of one, one-to-many, many-one or multi-to-multi.
S104: data service provides node SN and executes data service, and retention process during executing data service
Information is controlled, data service content and control information is packaged into corresponding data packet;The packaged type of data packet can be used two
System, octal system, hexadecimal or other agreements code word encoded;The detailed process of packet encapsulation are as follows:
Protocol header of the encapsulation control information as data packet, including mandatory parameter and optional parameters, mandatory parameter include envelope
Protocol version, the sequence number of data packet, the sequence number of respond request, status code, reason code are filled, optional parameters is according to actual number
Arranged in tunneling according to interactive demand;Using data service content as data load according to corresponding coding mode
It is encoded, the data service content more than code length needs subpackage to handle, to guarantee that the data packet after integration meets network
The length requirement of agreement;Then it carries out protocol header and data load to be integrally formed data packet;Data packet after integration is as upper
The data load of layer protocol is further encapsulated and is transmitted by upper-layer protocol;
S105: data service initiates node RN received data packet, makees after completing data check to data service offer node
It is corresponding out, it terminates data and takes session;
S106: data service provides root node SN and agrees to terminate data service session, and session connection physics disconnects.
S105: data service initiates node RN received data packet, makees after completing data check to data service offer node
It is corresponding out, it terminates data and takes session.
S106: data service provides root node SN and agrees to terminate data service session, and session connection physics disconnects.
Embodiment 2
On the basis of embodiment 1, in S103, data service initiates node RN to the data by detection to the present embodiment
Service providing node SN has initiated data safety request simultaneously, and S105-S106 is replaced with following steps:
S105: data service provides node SN and executes number according to the data safety request that data service initiates node RN request
According to security strategy, the corresponding data of computer network are packaged into as data service result by the data that data safety is audited
Packet;Data Security needs are arranged according to actual technical solution, and Data Security must be the number of RN Yu SN both sides
According to security conventions.
S106: data service initiates node RN received data packet, makees after completing data check to data service offer node
It is corresponding out, it terminates data and takes session;The termination needs of data service session are arranged according to actual technical solution.
S107: data service provides root node SN and agrees to terminate data service session, and session connection physics disconnects.
Embodiment 3
S101: data service initiates node RN initial configuration parameter, and configuration parameter is necessary to ensure that the energy under set environment
Enough execute data service;The configuration parameter specifically includes:
Network environment parameters: network type=Ethernet, network protocol=TCP/IP;
Hardware environment parameter: processor=Intel Core i5-750 (dominant frequency 2.66GHz) or more, memory size=
64GB or more, hard-disk capacity=1TB or more, network interface card=hundred Broadcoms or more;
Software environment parameter: including two parts of system software and application software, system software configuration as shown in table 1, is answered
It is as shown in table 2 with software configuration;
Table 1
Table 2
Data service parameter:
Calculating process parameter: select XS. student number, XS. name, system where XS., XX. course number, KC. course name from
XS join XX on XS. student number=XX. student number join KC on KC. course number=XX. course number
Group by XS. student number, XS. name, system where XS., XX. course number, KC. course name
ORNer by XX. course number
Result parameter:
Result.txt
Data service parameter can be any type of operation executable under the present circumstances, it only sends out data service
It is transparent to play node RN, data service provides node SN and only opens the resource of request according to demand, can not obtain data service
Parameter.
Data Security parameter: OpenSSL executes ciphering process
QoS parameter: general (Normal).
Data service includes but is not limited to data acquisition service, data processing service, data operation service, data improvement clothes
Business, Data distributing.
S102: data service provides node SN and requires to carry out ability inspection with inherent parameters according to the configuration parameter in S101
It surveys, detection passes through, and meets service condition, the basic data of data service needs, including XS table, KC table, XX table are existed simultaneously, point
Not as shown in table 3, table 4 and table 5;
Table 3
ID | Student number | Name | Gender | Age | Place system |
1 | 1001 | Liu Dehua | Male | 40 | Computer |
2 | 1002 | Zhou Jielun | Male | 30 | Chinese |
3 | 1003 | Zhang Ziyi | Female | 28 | Mathematics |
4 | 1004 | Lin Xinru | Female | 25 | Chinese |
NULL | NULL | NULL | NULL | NULL | NULL |
Table 4
Table 5
ID | Student number | Course number | Achievement |
1 | 1001 | 1 | 92 |
2 | 1002 | 2 | 85 |
3 | 1003 | 3 | 88 |
4 | 1004 | 2 | 90 |
5 | 1005 | 3 | 92 |
6 | 1006 | 4 | 80 |
NULL | NULL | NULL | NULL |
S103: data service initiates node RN asks to the data service offer node SN initiation data service by detecting
It asks, selects then directly to execute SQL query statement under one-to-one mode, select then directly to execute Spark SQL under a pair of of multi-mode
Query statement.
S104: data service provides node SN and executes data service, obtains data result, as shown in table 6, and by number of results
According to changing into result data packet: Result.txt;
Table 6
Course number | Average achievement | Number |
1 | 92 | 1 |
2 | 87 | 2 |
3 | 86 | 3 |
S105: data service provides node SN and executes number according to the data safety request that data service initiates node RN request
According to security strategy, OpenSSL executes ciphering process.
S106: data service initiates node RN and receives service result Result.txt and pass through verification, initiates to terminate data
Service conversation request.
S107: data service provides root node SN and agrees to terminate data service session, and session connection physics disconnects.
Claims (4)
1. a kind of data interactive method based on computer network, which comprises the steps of:
S101: data service initiates node RN initial configuration parameter, and configuration parameter is necessary to ensure that under set environment, service mentions
Data service is able to carry out for node SN;
S102: data service provides node SN and requires to carry out ability detection with inherent parameters according to the configuration parameter in S101, such as
The detection of fruit ability passes through, then makes the response for indicating can receive the data service request that data service initiates node RN;Conversely,
It then replys and receives data service initiation node RN refusal service, and Reason For Denial code is provided;
S103: data service initiates node RN and provides node SN initiation data service request to the data service by detection, and
It carries data service and executes content;
S104: data service provides node SN and executes data service, and retention process controls during executing data service
Data service content and control information is packaged into corresponding data packet by information;The packaged type of data packet can be used binary system,
The code word of octal system, hexadecimal or other agreements is encoded;The detailed process of packet encapsulation are as follows:
Protocol header of the encapsulation control information as data packet, including mandatory parameter and optional parameters, mandatory parameter include encapsulation association
Version number, the sequence number of data packet, the sequence number of respond request, status code, reason code are discussed, optional parameters is handed over according to real data
Mutual demand is arranged in tunneling;It is carried out using data service content as data load according to corresponding coding mode
Coding, the data service content more than code length need subpackage to handle, to guarantee that the data packet after integration meets network protocol
Length requirement;Then it carries out protocol header and data load to be integrally formed data packet;Data packet after integration is assisted as upper layer
The data load of view is further encapsulated and is transmitted by upper-layer protocol;
S105: data service initiates node RN received data packet, provides node to data service after completion data check and makes phase
It answers, terminates data and take session;
S106: data service provides root node SN and agrees to terminate data service session, and session connection physics disconnects.
2. a kind of data interactive method based on computer network according to claim 1, which is characterized in that the S103
In, data service initiates node RN and provides node SN to the data service by detection while carrying data safety request, described
S105-S106 replaces with following steps:
S105: data service provides node SN and executes data peace according to the data safety request that data service initiates node RN request
Full strategy is packaged into the corresponding network protocol of computer network as data service result by the data that data safety is audited
Packet;
S106: data service initiates node RN receiving network protocol packet, makees after completing data check to data service offer node
It is corresponding out, it terminates data and takes session;
S107: data service provides root node SN and agrees to terminate data service session, and session connection physics disconnects.
3. a kind of data interactive method based on computer network according to claim 1 or 2, which is characterized in that described
In S101, the configuration parameter includes network environment parameters, hardware environment parameter, software environment parameter, data service parameter, number
According to security policy parameters and QoS parameter;Data service includes but is not limited to data acquisition service, data processing service, number
Service, Data distributing are administered according to computational service, data.
4. a kind of data interactive method based on computer network according to claim 1 or 2, which is characterized in that described
It can be one-to-one, one-to-many, multipair that data service, which initiates node RN and the data request service of data service providing node SN,
It is one or more to more arbitrary patterns.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811175791.6A CN109412842A (en) | 2018-10-10 | 2018-10-10 | A kind of data interactive method based on computer network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811175791.6A CN109412842A (en) | 2018-10-10 | 2018-10-10 | A kind of data interactive method based on computer network |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109412842A true CN109412842A (en) | 2019-03-01 |
Family
ID=65466912
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811175791.6A Pending CN109412842A (en) | 2018-10-10 | 2018-10-10 | A kind of data interactive method based on computer network |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109412842A (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1289494A (en) * | 1998-01-29 | 2001-03-28 | 艾普动力公司 | System and method for using domain names to route data sent to a destination on a network |
CN101686241A (en) * | 2008-09-26 | 2010-03-31 | 深圳华为通信技术有限公司 | Method and device for providing capability information on URI selection server based on condition |
CN107656972A (en) * | 2017-09-02 | 2018-02-02 | 复旦大学 | A kind of opening data fine-grained access control method for keeping data scarcity |
-
2018
- 2018-10-10 CN CN201811175791.6A patent/CN109412842A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1289494A (en) * | 1998-01-29 | 2001-03-28 | 艾普动力公司 | System and method for using domain names to route data sent to a destination on a network |
CN101686241A (en) * | 2008-09-26 | 2010-03-31 | 深圳华为通信技术有限公司 | Method and device for providing capability information on URI selection server based on condition |
CN107656972A (en) * | 2017-09-02 | 2018-02-02 | 复旦大学 | A kind of opening data fine-grained access control method for keeping data scarcity |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108596613A (en) | block chain transaction processing method, device and storage medium | |
US9294463B2 (en) | Apparatus, method and system for context-aware security control in cloud environment | |
CN104331329B (en) | The mobile office security system and method for support region management | |
US20110047385A1 (en) | Methods and Systems for Digitally Signing a Document | |
CN105007272A (en) | Information exchange system with safety isolation | |
CN105763297B (en) | A kind of teledata optimized transmission method and device based on cloud computing system | |
US10146919B1 (en) | Multicomputer system for user data authentication and processing | |
CN108684018A (en) | 5G mMTC aggregation node module construction methods based on block chain | |
CN109391635A (en) | Data transmission method, device, equipment and medium based on two-way gateway | |
EP3594871A1 (en) | Access token management for state preservation and reuse | |
CN104951524A (en) | Mobile platform for database operation and maintenance and using method of mobile platform | |
CN105592141B (en) | A kind of connection number control method and device | |
CN110022374A (en) | Method for connecting network, device, communication equipment and storage medium based on Internet of Things | |
CN105721509B (en) | A kind of server system | |
CN109889558A (en) | Data transmission method, middleware and the system of internet of things oriented application | |
CN104636249B (en) | A kind of application program Debugging message generates system and method | |
CN105323236B (en) | For checking system, the method and apparatus of online communication session via polymorphic TSM Security Agent | |
CN104519069A (en) | Method and device for intercepting resource requests | |
CN110097330A (en) | A kind of service request processing method, device and computer readable storage medium | |
CN105991442B (en) | Message forwarding method and device | |
CN109286688A (en) | A kind of data download method and device | |
US9608965B2 (en) | Secure network request anonymization | |
CN109412842A (en) | A kind of data interactive method based on computer network | |
CN106302361A (en) | A kind of method and apparatus preventing network attack | |
CN106488055A (en) | Calling list rearrangement method, back end equipment and routing node device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190301 |
|
RJ01 | Rejection of invention patent application after publication |