CN112910978B - Method and system for synchronizing network configuration data - Google Patents

Method and system for synchronizing network configuration data Download PDF

Info

Publication number
CN112910978B
CN112910978B CN202110106227.4A CN202110106227A CN112910978B CN 112910978 B CN112910978 B CN 112910978B CN 202110106227 A CN202110106227 A CN 202110106227A CN 112910978 B CN112910978 B CN 112910978B
Authority
CN
China
Prior art keywords
network
network configuration
authentication server
network controller
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110106227.4A
Other languages
Chinese (zh)
Other versions
CN112910978A (en
Inventor
李宁森
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou DPTech Technologies Co Ltd
Original Assignee
Hangzhou DPTech Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou DPTech Technologies Co Ltd filed Critical Hangzhou DPTech Technologies Co Ltd
Priority to CN202110106227.4A priority Critical patent/CN112910978B/en
Publication of CN112910978A publication Critical patent/CN112910978A/en
Application granted granted Critical
Publication of CN112910978B publication Critical patent/CN112910978B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0654Management of faults, events, alarms or notifications using network fault recovery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)
  • Computer And Data Communications (AREA)

Abstract

The present specification provides a method for synchronizing network configuration data, wherein an authentication server receives identity authentication information of a user, performs identity authentication on the user, generates network configuration according to the identity authentication information if the authentication is successful, and issues the generated network configuration to a network controller, so that the network controller controls traffic between the user and a network service according to the network configuration. After receiving the network configuration of the user, the network controller respectively stores the network configuration of the user to the internal memory and the external memory of the network controller, and returns a processing result of successful storage to the authentication server. And after receiving the processing result of successful storage, the authentication server determines that the network controller successfully receives the network configuration of the user, stores the network configuration of the user in an external memory, and ensures that the authentication server and the network controller have the same stored network configuration for the user.

Description

Method and system for synchronizing network configuration data
Technical Field
The present disclosure relates to the field of computer networks, and in particular, to a method and system for synchronizing network configuration data.
Background
In the existing networking mode, a user needs to pass through a network controller to acquire network services, when the user accesses the network controller for the first time, the user needs to access an authentication server through the network controller to perform identity authentication, after the identity authentication is passed, the authentication server generates network configuration corresponding to the user for the user, the generated network configuration is stored in an external memory, then the generated network configuration is issued to the network controller, and the network controller controls the flow between the user and the network services according to the network configuration corresponding to the user.
In practical applications, it is necessary to ensure that the network configuration stored by the authentication server is consistent with the network configuration stored by the network controller for the same user. In order to satisfy such consistency, the existing network configuration data synchronization method is troublesome.
Disclosure of Invention
In order to overcome the problem of troublesome network configuration data synchronization, the present specification provides a method and a system for network configuration data synchronization.
The present specification provides a method for synchronizing network configuration data, which is applied to a user authentication system and comprises an authentication server and a network controller; the method comprises the following steps:
the authentication server receives authentication information of a user and authenticates the user; if the authentication is successful, generating network configuration for the user according to authentication information, and sending the network configuration to the network controller, so that the network controller can control the flow between the user and network service according to the network configuration;
the network controller stores the network configuration to a self memory and a self external memory; after the storage is successful, a processing result of successful storage is sent to the authentication server;
and after receiving the processing result of successful storage, the authentication server stores the network configuration to an external memory of the authentication server.
The present specification also provides a system for network configuration data synchronization, the system comprising an authentication server, a network controller;
the authentication server receives and authenticates the authentication information of the user; if the authentication is successful, generating network configuration for the user according to authentication information, and sending the network configuration to the network controller, so that the network controller can control the flow between the user and network service according to the network configuration; after receiving the processing result of successful storage, storing the network configuration to an external memory of the network configuration;
the network controller stores the network configuration to a self memory and a self external memory; and after the storage is successful, sending a processing result of successful storage to the authentication server.
In the technical solution of the embodiment of the present specification, after receiving the identity authentication information of the user, the authentication server performs identity authentication on the user, and if the authentication is successful, generates a network configuration according to the identity authentication information, and issues the generated network configuration to the network controller, so that the network controller controls the traffic between the user and the network service according to the network configuration. After receiving the network configuration of the user, the network controller respectively stores the network configuration of the user to the internal memory and the external memory of the network controller, and returns a processing result of successful storage to the authentication server. And after receiving the processing result of successful storage, the authentication server determines that the network controller successfully receives the network configuration of the user, stores the network configuration of the user in an external memory, and ensures that the authentication server and the network controller have the same stored network configuration for the user.
Through the technical solution of the embodiment of the present specification, on one hand, after the authentication server generates the network configuration according to the authentication information of the user, the network configuration is not directly saved, but the network configuration corresponding to the user is saved after the network controller returns a processing result of successful saving, so as to avoid a situation that the network controller fails to save and execute the network configuration of the user for various reasons, but the authentication service saves the configuration of the user, thereby ensuring that the network configurations saved by the authentication server and the network controller are the same for the same user. On the other hand, because the network configuration of the same user is the same between the authentication server and the network controller, when the server or the network controller fails, the network configuration data stored in the external memory of the network controller is consistent with the network configuration data stored in the external memory of the authentication server, so that when the failed device works again, the network controller does not need to acquire the network configuration of each user from the authentication server again, the efficiency of working recovery when the failure occurs is improved, the dependence of the network controller on the authentication server when the failure occurs is reduced, and the user experience is improved.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the specification.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present specification and together with the description, serve to explain the principles of the specification.
Fig. 1 is a schematic diagram of a networking mode shown in this specification.
Fig. 2 is a flowchart illustrating a network configuration data synchronization method shown in this specification.
Fig. 3 is a flowchart illustrating a network configuration data synchronization method shown in this specification.
Fig. 4 is a schematic diagram illustrating interaction between devices when network configuration data is synchronized, as described herein.
Fig. 5 is a schematic diagram of a process in which a problem occurs in the authentication server shown in this specification.
Fig. 6 is a schematic diagram illustrating a process of a network controller causing a problem according to the present specification.
Detailed Description
The networking mode in practical application is as shown in fig. 1, when a user obtains a network service through a network controller for the first time, the user needs to pass the identity authentication of an authentication server, the authentication server is responsible for the authentication of all users served by the network controller, after the authentication of the authentication server passes, network configuration is generated and stored according to identity authentication information, and then the network configuration of the user is sent to the network controller. The network controller controls traffic between the user and the network service according to the network configuration. The network controller is a default user that can access the authentication server, that is, before the user does not perform identity authentication, the user cannot obtain other network services through the network controller, but can interact with the authentication server through network control.
However, in one aspect, after the authentication server stores the network configuration of the user, the network controller does not necessarily receive the network configuration of the user, and therefore the network configuration of the user stored by the authentication server does not necessarily coincide with the network configuration executed by the network controller. And the user confirms the network configuration of the user through interaction with the authentication server, and if the network configuration stored by the authentication server is not consistent with the network configuration actually executed by the network controller, inconvenience is brought to the user. For example, the authentication server receives authentication information of a user, stores network configuration of the user after the authentication of the authentication server is successful, and then sends the network configuration to the network controller, but the network configuration of the user is not successfully executed by the network controller due to network congestion or the network controller having no memory, so that the user confirms that the network configuration is the network configuration in the server, and the network controller cannot execute the network configuration, that is, the user fails to acquire network service through the network control server, which brings bad experience to the user.
On the other hand, if the network controller or the authentication server fails, since the network configuration of the user of the network controller depends on the authentication server, if the network controller or the authentication server fails, all the users need to perform the authentication process again to ensure the consistency of the network configuration of the authentication server and the network controller for the same user, which is time-consuming and not good for the user experience. For example, the network controller is restarted, during which the authentication server may change the network configuration of the user, but since the network controller cannot receive the network configuration generated by the authentication server during the restart, the user needs to perform authentication again (i.e., the authentication server re-issues the network configuration of the user) to ensure consistency between the network configuration executed by the network controller and the network configuration stored by the authentication server, and therefore, all users need to perform authentication again, which is time-consuming and user-unfriendly.
In one or more embodiments of the present disclosure, after receiving identity authentication information of a user, an authentication server performs identity authentication on the user, generates a network configuration according to the identity authentication information if the authentication is successful, and issues the generated network configuration to a network controller, so that the network controller controls traffic between the user and a network service according to the network configuration. After receiving the network configuration of the user, the network controller respectively stores the network configuration of the user to the internal memory and the external memory of the network controller, and returns a processing result of successful storage to the authentication server. And after receiving the processing result of successful storage, the authentication server determines that the network controller successfully receives the network configuration of the user, stores the network configuration of the user in an external memory, and ensures that the authentication server and the network controller have the same stored network configuration for the user.
By using one or more embodiments of the present disclosure, on one hand, after the authentication server generates the network configuration according to the authentication information of the user, the network configuration is not directly saved, but the network configuration corresponding to the user is saved after the network controller returns a processing result of successful saving, so as to avoid a situation that the network controller fails to save and execute the network configuration of the user for various reasons, but the authentication service saves the configuration of the user, thereby ensuring that the network configurations saved by the authentication server and the network controller are the same for the same user. On the other hand, because the network configuration of the same user is the same between the authentication server and the network controller, when the server or the network controller fails, the network configuration data stored in the external memory of the network controller is consistent with the network configuration data stored in the external memory of the authentication server, so that when the failed device works again, the network controller does not need to acquire the network configuration of each user from the authentication server again, the efficiency of working recovery when the failure occurs is improved, the dependence of the network controller on the authentication server when the failure occurs is reduced, and the user experience is improved.
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present specification. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the specification, as detailed in the appended claims.
The terminology used in the description herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the description. As used in this specification and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It should be understood that although the terms first, second, third, etc. may be used herein to describe various information, these information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, the first information may also be referred to as second information, and similarly, the second information may also be referred to as first information, without departing from the scope of the present specification. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context.
The following provides a detailed description of examples of the present specification.
In one or more embodiments of the present description, for a user obtaining a network service through a network controller, the network controller may control traffic between the user and the network service. According to different practical application scenarios, the network controller may be a router, a switch, a bandwidth access server, or other network devices.
The authentication server is responsible for authenticating the identity information of the users served by the network controller (i.e., for authenticating the users obtaining network services through the network controller). The authentication server may be in the same network as the network controller and the user terminal (i.e., the authentication server is in an intranet), or may be in a different network from the network controller and the user terminal (i.e., the authentication server is in an extranet), and the network controller and the authentication server may communicate with each other.
It should be noted that one or more embodiments of the present description are described with respect to one user and a plurality of user analogies.
As shown in fig. 2, fig. 2 is a flowchart illustrating a network configuration data synchronization method according to an exemplary embodiment, and includes the following steps:
step 201, the authentication server receives and authenticates the authentication information of the user, and generates network configuration according to the authentication information after the authentication is successful.
The network configuration of the present description has different roles according to different actual application scenarios. For example, in a campus network, users are divided into students and teachers, the authentication server generates different network configurations (accessible resource configurations) according to different identities, and resources accessible by the students and teachers are different. For another example, a merchant provides a network service, and generates different network configurations (bandwidth configurations) for different levels of users, wherein the higher the user level, the greater the bandwidth for acquiring the network service. As another example, an enterprise may not want employees to access some network services during the work hours, generating different network configurations (restricted access resource configurations) for different users (employees).
The network configuration comprises identity information of the user, and the network controller identifies the user according to the identity information, so that different network configurations are executed for different users.
In addition, in practical application, before performing identity authentication, the authentication server may check whether the format of the authentication information input by the user is correct, and if not, return a prompt message indicating that the format of the authentication information is incorrect to the user to prompt the user to resend the authentication information with the correct format. And if the identity authentication information is correct, performing identity authentication according to the identity authentication information.
When the user interacts with the authentication server, the use cost of the user can be reduced in a webpage mode (namely, a special client does not need to be installed, and the user can access the authentication server through a browser), and the system compatibility of the user terminal is stronger.
Step 203, the authentication server sends the generated network configuration to the network controller.
In order to ensure that a reliable communication connection is established between the authentication server and the network controller, reduce invalid interaction between the authentication server and the network controller, and ensure interaction between the authentication server and the network controller, a hypertext Transfer Protocol (HTTP) may be used. Since HTTP is based on Transmission Control Protocol (TCP), TCP performs three-way handshake before performing interaction each time, so as to ensure that authentication servers at two interactive ends are intercommunicated with a network controller, thereby reducing the risk of data loss during interaction. The authentication server and the network controller can mutually confirm the result of each step of interaction through the request/response paradigm of HTTP itself.
Step 205, the network controller saves the network configuration of the user to its own memory and external memory.
The network configuration data stored in the memory is network configuration data which can be quickly acquired by the network controller when the network controller executes network configuration of a user, and the network configuration data stored in the memory is lost when the network controller is restarted or fails. The network configuration data stored in the external memory is backup network configuration data of the network controller, and as long as the network configuration data stored in the external memory is not actively deleted, the network configuration data stored in the external memory cannot be lost regardless of restart or failure, so that the network configuration data stored in the external memory can be copied to the internal memory when the network controller is restarted or fails, and the network controller can quickly restore and execute network configuration.
In practical application, after receiving the network configuration sent by the authentication server, the network controller may first check whether the format of the network configuration is correct (that is, determine whether the format of the network configuration is an agreed format, or say that the validity of the network configuration data is verified), and if the format of the network configuration is correct, store the network configuration data in its own internal memory and its external memory. If not, the network controller returns the processing result with the incorrect format to the authentication server.
And after receiving the processing result with the incorrect format returned by the network control server, the authentication server determines that the format of the network configuration data is incorrect, does not store the network configuration to the external memory of the authentication server, generates the network configuration data aiming at the user again, and sends the regenerated network configuration data to the network controller again.
In addition, when the network controller stores the network configuration into its own memory and external memory, it may fail to store (for example, the memory of the network controller is full), and if the network controller fails to store the network configuration into its own memory or its external memory, it returns a processing result of the storage failure to the authentication server. After receiving the processing result of the storage failure, the authentication server determines that the network controller fails to store the network configuration data, and at this time, the authentication server does not store the network configuration data to the external memory of the authentication server, and can send the result of the configuration failure to the user. In one or more embodiments, the authentication server sends the network configuration data of the user again after receiving a period of time from the network controller to store the failed processing result.
The processing result of the failure of storage may be specifically divided into a processing result of failure of storage to the memory and a processing result of failure of storage to the external memory.
And step 207, after the network controller successfully stores the network configuration, returning a successfully stored processing result to the authentication server.
Step 209, after receiving the processing result sent by the network controller and successfully stored, the authentication server stores the network configuration of the user in its own external memory.
After receiving the processing result of successful storage sent by the network controller, the authentication server can determine that the network controller has successfully received and stored the network configuration of the user, and then store the network configuration data of the user to an external memory so that the user can inquire the network configuration of the user. Therefore, the network configuration data stored in the external memory by the authentication server and the network configuration data stored in the external memory or the internal memory by the network controller can be ensured to be consistent for the same user.
Moreover, the authentication server and the network configuration data stored by the network controller are the same, so that when the network controller or the authentication service fails and then resumes working, the network controller does not need to ask the authentication server for the network configuration of the user (that is, the authentication server does not need to re-issue the network configurations of all the users), the user is directly served according to the network configuration data of the user stored by the authentication server, the failure recovery efficiency is improved, and the user experience is better.
In practical applications, the network configuration of the same user may change, for example, the same network resource may be acquired through different networks, and if the original user configuration is that the network service is acquired through the first network and is now acquired through the second network, the network configuration information of the user needs to be changed. Or the original user uses the network controller to obtain the network service and is not used at present, so that the original network controller has the network configuration of the user, the user does not need to be served at present, and the network configuration information of the user is deleted.
In one or more embodiments of the present description, therefore, as shown in figure 3,
step 301, step 303, the authentication server detects that the network configuration of a certain user changes, and sends an instruction for changing the network configuration corresponding to the user to the network controller.
The instruction for changing the network configuration corresponding to the user comprises an instruction for changing the network configuration corresponding to the user and an instruction for deleting the network configuration corresponding to the user.
Step 305, the network controller changes the network configuration stored in the internal memory and the external memory according to the instruction for changing the network configuration.
In practical application, after receiving the network configuration sent by the authentication server, the network controller may first check whether the format of the modification instruction is correct (i.e., determine whether the format of the modification instruction is an agreed format, or say that the validity of the modification instruction is verified), and if the format of the modification instruction is correct, modify the network configuration of the internal memory and the external memory of the network controller. If not, the network controller returns the processing result that the format of the change instruction is not correct to the authentication server.
After the authentication server receives the processing result that the format of the change instruction returned by the network control server is incorrect, the format of the change instruction is determined to be incorrect, the network configuration of the external memory of the authentication server is not changed, the change instruction is generated aiming at the changed network configuration again, and then the regenerated change instruction is sent to the network controller again.
In addition, when the network controller changes the network configuration of the internal memory and the external memory according to the change instruction, the change may fail, and at this time, the network controller may return a processing result of the change failure to the authentication server. After receiving the processing result of the change failure, the authentication server determines that the network controller fails to change the network configuration, and at this time, the authentication server may return the result of the change failure to the user, or may generate a change instruction for the changed network configuration again, and then send the regenerated change instruction to the network controller again.
Step 307, after the network controller successfully changes the network configuration of the internal memory and the external memory, the network controller sends a processing result of successful change to the authentication server.
Step 309, after receiving the processing result of successful change, the authentication server changes the network configuration stored in its external memory.
After receiving the processing result of successful storage sent by the network controller, the authentication server can determine that the network controller has successfully changed the network configuration, and then change the network configuration of the external memory of the authentication server, so that the network configuration data stored by the authentication server to the external memory can be ensured to be consistent with the network configuration data stored by the network controller in the external memory or the internal memory for the same user.
As shown in fig. 4, for one embodiment shown in this description, the user terminal sends authentication information to the authentication server through the network controller. And after receiving the authentication information of the user, the authentication server authenticates the user, generates network configuration according to the authentication information if the authentication is passed, and sends the network configuration to the network controller. And after the network controller receives the network configuration of the user, the network controller stores the network configuration to the internal memory and the external memory of the network controller, and returns a processing result of successful storage to the authentication server after the network configuration is successfully stored. And after the authentication server determines that the network controller successfully stores the network configuration, the authentication server stores the network configuration to an external memory of the authentication server, and returns a successful configuration result to the user to prompt the user that the network controller successfully executes the network configuration for the user.
In the interaction process, problems may occur in both the authentication server and the network controller, as shown in fig. 5, which are problems that may occur in the authentication server and are dealt with. As shown in fig. 6, is a problem and process that may occur for a network controller. And if a certain link has a problem, returning the specific problem of the certain link to the user and returning to the previous step to improve the accuracy of step execution. By using one or more embodiments of the present disclosure, whether the authentication server and the network controller have a problem in that stage, consistency between the network configuration data stored outside the authentication server and the network configuration data stored outside the network controller can be ensured.
By using one or more embodiments of the present description, the consistency between the user configuration data of the network controller and the network configuration data of the authentication server is ensured, and therefore, for the same network data, it is not necessary to perform interaction again subsequently to ensure the consistency of the network configuration data, so that when the network controller is restarted or the authentication server is restarted, the network controller can directly acquire the network configuration data in its own external memory without performing identity authentication again for the configured user (i.e., without the authentication server having to send the network configuration of the user to the network controller again), thereby recovering the service to the user quickly.
The present description also provides a system for network configuration data synchronization, the system comprising an authentication server, a network controller;
the authentication server receives and authenticates the authentication information of the user; if the authentication is successful, generating network configuration for the user according to authentication information, and sending the network configuration to the network controller, so that the network controller can control the flow between the user and network service according to the network configuration; after receiving the processing result of successful storage, storing the network configuration to an external memory of the network configuration;
the network controller stores the network configuration to a self memory and a self external memory; and after the storage is successful, sending a processing result of successful storage to the authentication server.
The authentication server sends an instruction for changing the network configuration to the network controller if the network configuration is detected to be changed; after receiving the processing result of successful change, the authentication server changes the network configuration stored in the external memory of the authentication server;
the network controller changes the network configuration stored in the memory and the external memory according to the instruction for changing the network configuration; and after the change is successful, sending a processing result of the successful change to the authentication server.
And the network controller returns a processing result of storage failure to the authentication server if the network configuration is stored in the memory of the network controller or the external memory of the network controller fails.
The network controller checks whether the format of the network configuration is correct or not after receiving the network configuration, and if the format of the network configuration is correct, the network controller stores the network configuration to a self memory and a self external memory; and if the format is incorrect, returning a processing result with an incorrect format to the authentication server.
And the authentication server does not store the network configuration to the external memory of the authentication server after receiving the processing result that the format of the network control is incorrect or the storage fails.
The implementation process of the functions and actions of each device in the system is specifically described in the implementation process of the corresponding steps in the method, and is not described herein again.
The present specification also provides an apparatus comprising a memory, a processor, and a program stored on the memory and executable on the processor, wherein the processor is configured to perform the method performed by any of the above-mentioned authentication server and network controller.
Embodiments of the present specification further provide a computer-readable storage medium, on which a computer program is stored, where the computer program is executed by a processor to perform the method performed by any one of the authentication server and the network controller.
Computer-readable media, including both permanent and non-permanent, removable and non-removable media, may implement the information storage by any method or technology. Information may be computer readable instructions, data structures, units of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
The foregoing description has been directed to specific embodiments of this disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
Other embodiments of the present description will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This specification is intended to cover any variations, uses, or adaptations of the specification following, in general, the principles of the specification and including such departures from the present disclosure as come within known or customary practice within the art to which the specification pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the specification being indicated by the following claims.
It will be understood that the present description is not limited to the precise arrangements described above and shown in the drawings, and that various modifications and changes may be made without departing from the scope thereof. The scope of the present description is limited only by the appended claims.
The above description is only a preferred embodiment of the present disclosure, and should not be taken as limiting the present disclosure, and any modifications, equivalents, improvements, etc. made within the spirit and principle of the present disclosure should be included in the scope of the present disclosure.

Claims (10)

1. A method for synchronizing network configuration data is applied to a user authentication system and comprises an authentication server and a network controller; the method comprises the following steps:
the authentication server receives authentication information of a user and authenticates the user; if the authentication is successful, generating network configuration for the user according to authentication information, and sending the network configuration to the network controller, so that the network controller can control the flow between the user and network service according to the network configuration;
the network controller stores the network configuration to a self memory and a self external memory; after the storage is successful, a processing result of successful storage is sent to the authentication server;
and after receiving the processing result of successful storage, the authentication server stores the network configuration to an external memory of the authentication server.
2. The method of claim 1, further comprising:
if the authentication server detects that the network configuration changes, the authentication server sends an instruction for changing the network configuration to the network controller;
the network controller changes the network configuration stored in the memory and the external memory according to the instruction for changing the network configuration; after the change is successful, a processing result of the successful change is sent to the authentication server;
and after receiving the processing result of successful change, the authentication server changes the network configuration stored in the external memory of the authentication server.
3. The method of claim 1, further comprising:
between the authentication server and the network controller, a transmission layer uses a Transmission Control Protocol (TCP), and an application layer uses a hypertext transfer protocol (HTTP).
4. The method of claim 1, further comprising:
after receiving the network configuration, the network controller checks whether the format of the network configuration is correct, and if so, the network configuration is stored to the memory of the network controller and the external memory of the network controller; and if the format is incorrect, returning a processing result with an incorrect format to the authentication server.
5. The method of claim 1, further comprising:
and if the network controller fails to store the network configuration to the memory of the network controller or the external memory of the network controller, returning a processing result of storage failure to the authentication server.
6. The method of any of claims 4-5, further comprising:
and after receiving the processing result that the format of the network control is incorrect or the storage fails, the authentication server does not store the network configuration to the external memory of the authentication server.
7. A system for synchronizing network configuration data is characterized by comprising an authentication server and a network controller;
the authentication server receives and authenticates the authentication information of the user; if the authentication is successful, generating network configuration for the user according to authentication information, and sending the network configuration to the network controller, so that the network controller can control the flow between the user and network service according to the network configuration; after receiving the processing result which is successfully stored, storing the network configuration to an external memory of the network configuration;
the network controller stores the network configuration to a self memory and a self external memory; and after the storage is successful, sending a processing result of successful storage to the authentication server.
8. The system of claim 7, wherein the system further comprises:
the authentication server sends an instruction for changing the network configuration to the network controller if the network configuration is detected to be changed; after receiving the processing result of successful change, the authentication server changes the network configuration stored in the external memory of the authentication server;
the network controller changes the network configuration stored in the memory and the external memory according to the instruction for changing the network configuration; and after the change is successful, sending a processing result of the successful change to the authentication server.
9. The system of claim 7, further comprising:
and the network controller returns a processing result of storage failure to the authentication server if the network configuration is stored in the memory of the network controller or the external memory of the network controller fails.
10. The system of claim 9, further comprising:
and the authentication server does not store the network configuration to the external memory of the authentication server after receiving the processing result that the network control format is incorrect or the storage fails.
CN202110106227.4A 2021-01-26 2021-01-26 Method and system for synchronizing network configuration data Active CN112910978B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110106227.4A CN112910978B (en) 2021-01-26 2021-01-26 Method and system for synchronizing network configuration data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110106227.4A CN112910978B (en) 2021-01-26 2021-01-26 Method and system for synchronizing network configuration data

Publications (2)

Publication Number Publication Date
CN112910978A CN112910978A (en) 2021-06-04
CN112910978B true CN112910978B (en) 2022-07-01

Family

ID=76120324

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110106227.4A Active CN112910978B (en) 2021-01-26 2021-01-26 Method and system for synchronizing network configuration data

Country Status (1)

Country Link
CN (1) CN112910978B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007034386A (en) * 2005-07-22 2007-02-08 Softbank Telecom Corp Terminal for network storage access and remote data storage system using the same
CN101119283A (en) * 2006-07-31 2008-02-06 北京华旗资讯数码科技有限公司 System and method for obtaining network information using electronic device
CN102271134A (en) * 2011-08-11 2011-12-07 北京星网锐捷网络技术有限公司 Method and system for configuring network configuration information, client and authentication server
CN106102061A (en) * 2016-06-07 2016-11-09 北京小米移动软件有限公司 Method for connecting network and device
CN110990052A (en) * 2019-11-29 2020-04-10 杭州迪普科技股份有限公司 Configuration saving method and device
CN111031540A (en) * 2019-11-22 2020-04-17 儒庭信息技术(上海)有限公司 Wireless network connection method and computer storage medium
CN111400777A (en) * 2019-11-14 2020-07-10 杭州海康威视系统技术有限公司 Network storage system, user authentication method, device and equipment

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007034386A (en) * 2005-07-22 2007-02-08 Softbank Telecom Corp Terminal for network storage access and remote data storage system using the same
CN101119283A (en) * 2006-07-31 2008-02-06 北京华旗资讯数码科技有限公司 System and method for obtaining network information using electronic device
CN102271134A (en) * 2011-08-11 2011-12-07 北京星网锐捷网络技术有限公司 Method and system for configuring network configuration information, client and authentication server
CN106102061A (en) * 2016-06-07 2016-11-09 北京小米移动软件有限公司 Method for connecting network and device
CN111400777A (en) * 2019-11-14 2020-07-10 杭州海康威视系统技术有限公司 Network storage system, user authentication method, device and equipment
CN111031540A (en) * 2019-11-22 2020-04-17 儒庭信息技术(上海)有限公司 Wireless network connection method and computer storage medium
CN110990052A (en) * 2019-11-29 2020-04-10 杭州迪普科技股份有限公司 Configuration saving method and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
策略驱动网络;沈鑫剡等;《中国数据通信》;20010720(第07期);全文 *

Also Published As

Publication number Publication date
CN112910978A (en) 2021-06-04

Similar Documents

Publication Publication Date Title
US20070033441A1 (en) System for and method of multi-location test execution
CN112612985A (en) Websocket-based multi-user and multi-type message pushing system and method
CN110929202B (en) Page request failure processing method and device and computer equipment
CN115277727B (en) Data disaster recovery method, system, device and storage medium
CN108647105B (en) Idempotent control method, device and system in system switching process
CN110717171A (en) Access token management for state saving and reuse
KR20140047230A (en) Method for optimizing distributed transaction in distributed system and distributed system with optimized distributed transaction
CN113556389B (en) RPC type cloud edge communication method, system and storage medium
CN112737921B (en) Message interaction method, client and communication system
CN112910978B (en) Method and system for synchronizing network configuration data
CN113849127A (en) SAN storage dual-active network-based arbitration method and device and electronic equipment
CN111327680B (en) Authentication data synchronization method, device, system, computer equipment and storage medium
CN106899652B (en) Method and device for pushing service processing result
US7962799B2 (en) System and method for synchronizing test runs on separate systems
CN113190607B (en) HTTP request-based database load balancing method, device and medium
CN113098936A (en) Method, device and equipment for pushing message to mobile terminal
CN106851648B (en) Method, device and system for sharing access information of wireless access point
CN114827017B (en) Communication method and device of Kafka cluster, electronic equipment and storage medium
CN117353952A (en) Data processing method and device, electronic equipment and storage medium
CN112165519B (en) Synchronous node realization method and system for synchronizing data according to needs
CN111464520B (en) Data processing method and device, storage medium and electronic equipment
CN114079578B (en) Login information processing method and device, storage medium and electronic equipment
CN110971576A (en) Security authentication method and related device
CN117591393A (en) Process test method and device based on http request
CN116366743A (en) Communication access method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant