CN115460271B - Network control method and device based on edge calculation and storage medium - Google Patents

Network control method and device based on edge calculation and storage medium Download PDF

Info

Publication number
CN115460271B
CN115460271B CN202210936713.3A CN202210936713A CN115460271B CN 115460271 B CN115460271 B CN 115460271B CN 202210936713 A CN202210936713 A CN 202210936713A CN 115460271 B CN115460271 B CN 115460271B
Authority
CN
China
Prior art keywords
edge
target
container
configuration file
network configuration
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210936713.3A
Other languages
Chinese (zh)
Other versions
CN115460271A (en
Inventor
黄超
杜杨浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Qianhai Huanrong Lianyi Information Technology Service Co Ltd
Original Assignee
Shenzhen Qianhai Huanrong Lianyi Information Technology Service Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Qianhai Huanrong Lianyi Information Technology Service Co Ltd filed Critical Shenzhen Qianhai Huanrong Lianyi Information Technology Service Co Ltd
Priority to CN202210936713.3A priority Critical patent/CN115460271B/en
Publication of CN115460271A publication Critical patent/CN115460271A/en
Application granted granted Critical
Publication of CN115460271B publication Critical patent/CN115460271B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/2866Architectures; Arrangements
    • H04L67/30Profiles
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The application discloses a network control method and device based on edge calculation, a storage medium and computer equipment, wherein the method comprises the following steps: when any edge container is successfully operated, generating a network configuration file based on the network configuration information of any edge container, and storing the network configuration file in a designated storage space local to the edge node; and when the edge node is abnormal and returns to normal operation, determining a target configuration file corresponding to a target edge container from the network configuration files stored in the designated storage space, reading target network configuration information of the target edge container from the target configuration file, and restoring the network state of the target edge container based on the target network configuration information, wherein the target edge container is the edge container which is running before the edge node is abnormal. The method and the device are beneficial to simply and rapidly ensuring the normal service of the edge node under the condition of cloud edge disconnection.

Description

Network control method and device based on edge calculation and storage medium
Technical Field
The present invention relates to the field of edge computing technologies, and in particular, to a network control method and apparatus based on edge computing, a storage medium, and a computer device.
Background
With more and more intelligent devices such as intelligent televisions, intelligent homes, intelligent mobile phones and intelligent automobiles accessing the internet, the centralized service cannot meet the demands of users. Centralized services suffer from high latency and are often the most culprit of poor application performance, greatly affecting the user experience. The advent of edge computation has contributed significantly to solving this problem. Edge computation was developed to bring the data processing closer to the user and to solve the performance problems associated with the network. While the advent of edge containers has moved easily deployed software packages to the edges of the network, lower network costs and better response times can be achieved.
Edge containers have an important role in the implementation of edge computation. However, in some cases, the edge node may fail or be abnormally restarted, so as to ensure that the network service of the edge container is recovered to be normal, and the edge node obtains the network state of the edge node abnormality or restarting the front edge container through communication with the cloud edge. However, if the cloud edge is disconnected, the network of the edge container cannot be restored to the previous state, so that the edge service fails.
Disclosure of Invention
In view of this, the present application provides a network control method and apparatus based on edge computing, a storage medium, and a computer device, which generate a network configuration file for each edge container that successfully runs on an edge node and store the network configuration file in a local designated storage space of the edge node, and then when the edge node is abnormal and resumes normal operation, quickly restore the network state of the target edge container to the network state before the edge node is abnormal according to the network configuration file stored in the local designated storage space, so that the service of the edge node is not affected even if the cloud edge is disconnected, thereby being beneficial to simply and quickly ensuring the normal service of the edge node.
According to one aspect of the present application, there is provided a network control method based on edge computation, applied to an edge node, including:
when any edge container is successfully operated, generating a network configuration file based on the network configuration information of any edge container, and storing the network configuration file in a designated storage space local to the edge node;
and when the edge node is abnormal and returns to normal operation, determining a target configuration file corresponding to a target edge container from the network configuration files stored in the designated storage space, reading target network configuration information of the target edge container from the target configuration file, and restoring the network state of the target edge container based on the target network configuration information, wherein the target edge container is the edge container which is running before the edge node is abnormal.
According to another aspect of the present application, there is provided a network control device based on edge computation, applied to an edge node, including:
the configuration file generation module is used for generating a network configuration file based on the network configuration information of any edge container when any edge container is successfully operated, and storing the network configuration file in a designated storage space local to the edge node;
and the network state recovery module is used for determining a target configuration file corresponding to a target edge container from the network configuration files stored in the designated storage space when the edge node is abnormal and recovering the network state of the target edge container based on the target network configuration information, wherein the target edge container is the edge container running before the edge node is abnormal.
According to still another aspect of the present application, there is provided a storage medium having stored thereon a computer program which, when executed by a processor, implements the above-described network control method based on edge computation.
According to still another aspect of the present application, there is provided a computer device including a storage medium, a processor, and a computer program stored on the storage medium and executable on the processor, the processor implementing the above-mentioned network control method based on edge calculation when executing the program.
By means of the technical scheme, the network control method and device based on edge calculation, the storage medium and the computer equipment can correspondingly generate the network configuration file corresponding to the edge container based on the network configuration information of the edge container when the edge container is generated on the edge node and successfully operated. After the network configuration file is generated, the network configuration file may be stored in a designated storage space local to the edge node. When the edge node is abnormal and resumes normal operation again, the target configuration file corresponding to the target edge container can be determined based on the network configuration file stored in the designated storage space. The target edge container may be an edge container that is running before an anomaly occurs in the edge node. Then, the target network configuration information corresponding to the target edge container can be further read from the target configuration file corresponding to the target edge container. Thus, the edge node can restore the network state of the target edge container to the network state before the edge node is abnormal according to the target network configuration information, so that the service of the edge node is restored to normal operation. According to the method and the device, the network configuration file is correspondingly generated for each edge container successfully operated on the edge node and stored in the local appointed storage space of the edge node, and then when the edge node is abnormal and then returns to normal operation, the network state of the target edge container can be quickly restored to the network state before the edge node is abnormal according to the network configuration file stored in the local appointed storage space, the service of the edge node is not affected even if the cloud edge is disconnected, and the method and the device are beneficial to simply and quickly guaranteeing the normal service of the edge node.
The foregoing description is only an overview of the technical solutions of the present application, and may be implemented according to the content of the specification in order to make the technical means of the present application more clearly understood, and in order to make the above-mentioned and other objects, features and advantages of the present application more clearly understood, the following detailed description of the present application will be given.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiments of the application and together with the description serve to explain the application and do not constitute an undue limitation to the application. In the drawings:
fig. 1 is a schematic flow chart of a network control method based on edge calculation according to an embodiment of the present application;
fig. 2 is a schematic flow chart of another network control method based on edge calculation according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of a network control device based on edge calculation according to an embodiment of the present application.
Detailed Description
The present application will be described in detail hereinafter with reference to the accompanying drawings in conjunction with embodiments. It should be noted that, in the case of no conflict, the embodiments and features in the embodiments may be combined with each other.
In this embodiment, a network control method based on edge calculation is provided, which is applied to an edge node, as shown in fig. 1, and the method includes:
step 101, when any edge container is successfully operated, generating a network configuration file based on the network configuration information of the any edge container, and storing the network configuration file in a designated storage space local to the edge node.
The network control method based on edge calculation, which is provided by the embodiment of the application, can be particularly applied to edge nodes to realize network autonomy of the edge nodes. When a certain edge container is generated and successfully operated on an edge node, a network configuration file corresponding to the edge container can be correspondingly generated based on the network configuration information of the edge container. That is, each time an edge container starts to run successfully, the network configuration file can be generated by the network configuration information corresponding to the edge container. The network configuration information may be IP address information, MAC address information, etc. corresponding to the edge container, and the network configuration file may include network configuration information, and may further include other information. After the network configuration file is generated, the network configuration file may be stored in a designated storage space. Here, the designated storage space may be a local storage space corresponding to the edge node.
And 102, when the edge node is abnormal and returns to normal operation, determining a target configuration file corresponding to a target edge container from the network configuration files stored in the designated storage space, reading target network configuration information of the target edge container from the target configuration file, and restoring the network state of the target edge container based on the target network configuration information, wherein the target edge container is the edge container which is running before the edge node is abnormal.
In this embodiment, the edge node may fail for various reasons resulting in an outage or restart. When the edge node is abnormal and resumes normal operation again, the target configuration file corresponding to the target edge container can be determined based on the network configuration file stored in the designated storage space. The target edge container may be an edge container that is running before an anomaly occurs in the edge node. Then, the target network configuration information corresponding to the target edge container can be further read from the target configuration file corresponding to the target edge container. Thus, the edge node can restore the network state of the target edge container to the network state before the edge node is abnormal according to the target network configuration information, so that the service of the edge node is restored to normal operation. Here, the target edge container may be one or a plurality of target edge containers.
By applying the technical scheme of the embodiment, when a certain edge container is generated and successfully operated on an edge node, a network configuration file corresponding to the edge container can be correspondingly generated based on the network configuration information of the edge container. After the network configuration file is generated, the network configuration file may be stored in a designated storage space local to the edge node. When the edge node is abnormal and resumes normal operation again, the target configuration file corresponding to the target edge container can be determined based on the network configuration file stored in the designated storage space. The target edge container may be an edge container that is running before an anomaly occurs in the edge node. Then, the target network configuration information corresponding to the target edge container can be further read from the target configuration file corresponding to the target edge container. Thus, the edge node can restore the network state of the target edge container to the network state before the edge node is abnormal according to the target network configuration information, so that the service of the edge node is restored to normal operation. According to the method and the device, the network configuration file is correspondingly generated for each edge container successfully operated on the edge node and stored in the local appointed storage space of the edge node, and then when the edge node is abnormal and then returns to normal operation, the network state of the target edge container can be quickly restored to the network state before the edge node is abnormal according to the network configuration file stored in the local appointed storage space, the service of the edge node is not affected even if the cloud edge is disconnected, and the method and the device are beneficial to simply and quickly guaranteeing the normal service of the edge node.
Further, as a refinement and extension of the foregoing embodiment, in order to fully describe a specific implementation procedure of the embodiment, another network control method based on edge calculation is provided and applied to an edge node, as shown in fig. 2, where the method includes:
step 201, when any edge container is successfully operated, packaging network configuration information of the any edge container, naming the packaged network configuration information according to a preset naming rule, and generating the network configuration file, wherein the preset naming rule at least comprises a unique identifier of the any edge container, and the network configuration information comprises IP address information and/or MAC address information.
In this embodiment, when an edge container is generated and successfully operated on an edge node, the network configuration information corresponding to the edge container may be packaged, and at the same time, the packaged network configuration information may be named according to a preset naming rule. The preset naming convention may include other information in addition to the unique identification of the edge container. Specifically, when the unique identifier of the edge container is the container name of the edge container, the preset naming rule may be the container space name+the container name. For example, the container space name is default, the container name is ngix-1, and then the file name of the network configuration file obtained according to the preset naming rule is default-ngix-1. And naming the packaged network configuration information to obtain the network configuration file. The container space name may be the run position of the target edge container on the edge node. The network configuration information may include IP address information, MAC address information, and other information.
Step 202, storing the network configuration file in a designated storage space local to the edge node.
In this embodiment, after the network configuration file is generated, the network configuration file may be stored in a designated storage space. Here, the designated storage space may be a local storage space corresponding to the edge node. In the prior art, when the edge node resumes normal operation after abnormality, if the network state of the edge container is to be recovered, the edge node must communicate with the cloud edge, and the network state of the edge container is recovered to be consistent with the previous state through the network configuration information stored in the cloud edge. However, if the cloud edge is disconnected in this case, the network state of the edge container cannot be restored to the previous state because the stored network configuration information cannot be acquired from the cloud edge. According to the embodiment of the application, the network configuration information corresponding to the edge container running on the edge node is stored in the local designated storage space of the edge node in the form of the configuration file, so that the IP address, the MAC address and the like of the edge container can be quickly restored to the state before abnormality or before restarting through the configuration file stored in the local designated storage space after the edge node is restarted, and the network state is kept unchanged, and therefore, even if the cloud edge is disconnected, the edge container can still keep the network state before abnormality or restarting, and network autonomy of the edge node can be effectively realized.
And 203, when the edge node is abnormal and returns to normal operation, determining a target configuration file corresponding to a target edge container from the network configuration files stored in the designated storage space, reading target network configuration information of the target edge container from the target configuration file, and restoring the network state of the target edge container based on the target network configuration information, wherein the target edge container is the edge container which is running before the edge node is abnormal.
In this embodiment, the edge node may fail for various reasons resulting in an outage or restart. When the edge node is abnormal and resumes normal operation again, the target configuration file corresponding to the target edge container can be determined based on the network configuration file stored in the designated storage space. The target edge container may be an edge container that is running before an anomaly occurs in the edge node. Then, the target network configuration information corresponding to the target edge container can be further read from the target configuration file corresponding to the target edge container. Thus, the edge node can restore the network state of the target edge container to the network state before the edge node is abnormal according to the target network configuration information, so that the service of the edge node is restored to normal operation. Here, the target edge container may be one or a plurality of target edge containers.
In an embodiment of the present application, optionally, after step 202, the method further includes: and when the edge node normally operates, if the edge container is in the end operation, determining a first configuration file corresponding to the edge container which is in the end operation from the network configuration files, and removing the first configuration file from the appointed storage space.
In this embodiment, when the edge node is in a normal running state, if there is a certain edge container running end in the edge containers, the first configuration file corresponding to the running end edge container may be removed from the designated storage space. Therefore, if the edge node is in normal operation after abnormality, the edge containers corresponding to the network configuration files stored in the designated storage space are all edge containers running before the abnormality occurs to the edge node, which is favorable for quickly determining the target network configuration information of the target edge container, so that the target edge container is quickly restored to the network state before the abnormality of the edge node, and the service is quickly restored to normal.
In an embodiment of the present application, optionally, after step 202, the method further includes: when the edge node normally operates, if an edge container is in operation, determining a first configuration file corresponding to the edge container ending operation from the network configuration file, and adding an operation ending tag to the first configuration file; correspondingly, the determining the target configuration file corresponding to the target edge container from the network configuration files stored in the designated storage space includes: and determining a second configuration file without the operation end label from the network configuration files stored in the appointed storage space, and determining a target configuration file corresponding to a target edge container according to the unique identifier corresponding to the second configuration file.
In this embodiment, when the edge node is in a normal running state, if there is a certain edge container running end in the edge container, a running end tag may be added to a first configuration file corresponding to the running end edge container, and by using the running end tag, it may be determined which edge containers are running and which are running end. If the edge node is abnormal and then resumes normal operation, the second configuration files without operation end labels can be screened out of the network configuration files stored in the appointed storage space, and the second configuration files are the network configuration files corresponding to the edge container running before the edge node is abnormal. After the second configuration file is determined, the target network configuration information corresponding to the target edge container can be read from the second configuration file. Specifically, the target configuration file corresponding to the unique identifier may be found from the second configuration file according to the unique identifier of the target edge container. According to the method and the device for processing the network configuration file, the operation end label is added to the network configuration file corresponding to the edge container which is operated in the normal operation state of the edge node, so that the target network configuration information of the target edge container can be determined quickly, the target edge container can be restored to the network state before the edge node is abnormal, and the service can be restored to be normal quickly.
In an embodiment of the present application, optionally, after step 202, the method further includes: responding to a target query request, and determining an edge container to be queried indicated by the target query request; finding out third configuration files corresponding to the edge container to be queried from the network configuration files, and determining target time information corresponding to each third configuration file, wherein the target time information at least comprises file generation time; and determining the operation information of the edge container to be queried on the edge node according to the target time information.
In this embodiment, the same edge container may run multiple times on the same edge node, and the user may view details of the running of any edge container on the edge node. For example, when the edge node is an edge server, the user may generate a target query request through a terminal device communicatively connected to the edge node. The edge node may then receive the target query request and identify a corresponding edge container to be queried from the target query request. After determining the edge container to be queried, the edge node may determine a third configuration file corresponding to the edge container to be queried from the network configuration files stored in the designated storage space. And then, respectively determining the target time information corresponding to each third configuration file. Here, the target time information may include a tag addition time in addition to the file generation time. For the third configuration file to which the end of run tag is not added, the target time information includes only the file generation time, and for the third configuration file to which the end of run tag is added, the target time information may include both the file generation time and the tag addition time, where the tag addition time may laterally reflect the time at which the edge container is run to end. After determining the target time information of each third configuration file, the running information of the edge container to be queried on the edge node may be further determined. For example, the running information may be a running start time (derived from file generation time) of the edge container to be queried at each time on the edge node, and may further include a running end time (derived from tag addition time) of the edge container to be queried. In addition, the operation information may be operation time information obtained from an operation start time and an operation end time, or the like.
After obtaining the operation information corresponding to the edge container to be queried, the operation information can be sent to the terminal equipment corresponding to the user, and the user can see the operation condition of the edge container to be queried on the edge node through the terminal equipment. According to the method and the device for determining the operation information of the edge container to be queried on the edge node through the target query request, a user can quickly and conveniently determine specific operation details of the edge container to be queried on the edge node, and the user can analyze specific use conditions of each edge container.
In this embodiment, optionally, after "resume normal operation after the edge node is abnormal" in step 203, the method further includes: and determining the restarting times of the target edge container when the edge node is abnormal and then resumes normal operation, generating alarm information when the restarting times exceed a preset frequency threshold value, and sending the alarm information to a preset management terminal.
In this embodiment, when the edge node is abnormal and then resumes normal operation, the number of times of restarting the target edge container, that is, the total number of times of restarting the target edge container on the basis of the current restart, indicates that the restart or failure of the edge node is likely to be caused by the operation of the target edge container if the number of times of restarting the target edge container exceeds a preset number threshold, and then the alarm information may be generated and then may be sent to a preset management terminal, so that a worker corresponding to the preset management terminal may perform operations such as testing, maintenance, etc. on the target edge container indicated by the alarm information. For example, after the edge node is abnormal and returns to normal operation, the target edge container is the edge container 1, the edge container 2 and the edge container 3, the preset number of times threshold is 20, wherein the number of times of restarting the edge container 1 based on the current restart is 6 times, the number of times of restarting the edge container 2 based on the current restart is 11 times, and the number of times of restarting the edge container 3 based on the current restart is 20 times, then the alarm information is generated based on the edge container 3, and the alarm information is sent to the preset management terminal. When the number of times of restarting the target edge container is calculated, the number of times of restarting the edge container after the edge node is abnormal and returns to normal operation is calculated, and the number of times of restarting the edge container is not counted every time the edge container starts to run. According to the method and the device, whether the alarm information is generated or not is determined through the restarting times of a certain edge container when the edge node is abnormal and returns to normal operation, so that workers can find the edge container with problems quickly, and the edge node service is guaranteed to be normal.
In this embodiment of the present application, optionally, the "generating alarm information when the number of times exceeds a preset number of times threshold" includes: when the number of times exceeds a preset number of times threshold, acquiring a log generated in a preset time before the edge node is abnormal, and generating the alarm information based on the log, the unique identification of the target edge container and the corresponding time when the target edge container is started last time.
In this embodiment, if the number of times of restarting the target edge container exceeds the preset number of times threshold, the log generated in the preset time before the occurrence of the abnormality of the edge node may be further acquired. For example, if the preset time is 10 minutes, that is, when the restart number of the target edge container exceeds the preset number threshold, a log generated within 10 minutes before the edge node is abnormal may be obtained, and the running condition before the edge node is abnormal may be approximately determined through the log. The alert information may then be generated based on the log, the unique identification of the target edge container, and the time corresponding to the last time the target edge container was started. Specifically, the unique identifier of the target edge container can be used as the name of the alarm information, so that a worker can quickly know the edge container corresponding to the alarm information. According to the method and the device for determining the edge node operation condition, the log generated in the preset time is added to the alarm information, so that a worker can quickly determine the operation condition of the edge node before the abnormality according to the log in the alarm information, whether the abnormality of the edge node is related to the edge container with the restarting times exceeding the preset times threshold value or not can be judged according to the operation condition, and the operation maintainer of the edge container can position the edge container with the problem.
Further, as a specific implementation of the method of fig. 1, an embodiment of the present application provides a network control device based on edge computation, which is applied to an edge node, as shown in fig. 3, and the device includes:
the configuration file generation module is used for generating a network configuration file based on the network configuration information of any edge container when any edge container is successfully operated, and storing the network configuration file in a designated storage space local to the edge node;
and the network state recovery module is used for determining a target configuration file corresponding to a target edge container from the network configuration files stored in the designated storage space when the edge node is abnormal and recovering the network state of the target edge container based on the target network configuration information, wherein the target edge container is the edge container running before the edge node is abnormal.
Optionally, the configuration file generation module is configured to:
and packaging the network configuration information of any edge container, naming the packaged network configuration information according to a preset naming rule, and generating the network configuration file, wherein the preset naming rule at least comprises a unique identifier of any edge container, and the network configuration information comprises IP address information and/or MAC address information.
Optionally, the apparatus further comprises:
and the file removing module is used for determining a first configuration file corresponding to the edge container which finishes running from the network configuration file when the edge node normally runs after the network configuration file is stored in the appointed storage space of the edge node, and removing the first configuration file from the appointed storage space if the edge container finishes running.
Optionally, the apparatus further comprises:
the label adding module is used for determining a first configuration file corresponding to the edge container which finishes running from the network configuration file when the edge node normally runs after the network configuration file is stored in the appointed storage space of the edge node, and adding the first configuration file with a running ending label;
accordingly, the network state recovery module is configured to:
and determining a second configuration file without the operation end label from the network configuration files stored in the appointed storage space, and determining a target configuration file corresponding to a target edge container according to the unique identifier corresponding to the second configuration file.
Optionally, the apparatus further comprises:
a request receiving module, configured to determine, after the network configuration file is stored in a specified storage space local to the edge node, an edge container to be queried indicated by a target query request in response to the target query request;
the time information determining module is used for finding out third configuration files corresponding to the edge container to be queried from the network configuration files, and determining target time information corresponding to each third configuration file, wherein the target time information at least comprises file generation time;
and the operation information determining module is used for determining the operation information of the edge container to be queried on the edge node according to the target time information.
Optionally, the apparatus further comprises:
and the alarm information generation module is used for determining the restarting times of the target edge container when the edge node is abnormal and returns to normal operation after the edge node is abnormal, generating alarm information when the restarting times exceed a preset time threshold value, and sending the alarm information to a preset management terminal.
Optionally, the alarm information generating module is further configured to:
when the number of times exceeds a preset number of times threshold, acquiring a log generated in a preset time before the edge node is abnormal, and generating the alarm information based on the log, the unique identification of the target edge container and the corresponding time when the target edge container is started last time.
It should be noted that, other corresponding descriptions of each functional unit related to the network control device based on edge calculation provided in the embodiment of the present application may refer to corresponding descriptions in the methods of fig. 1 to fig. 2, and are not repeated herein.
Based on the above-mentioned methods shown in fig. 1 to 2, correspondingly, the embodiments of the present application further provide a storage medium having a computer program stored thereon, where the computer program, when executed by a processor, implements the above-mentioned network control method based on edge computation shown in fig. 1 to 2.
Based on such understanding, the technical solution of the present application may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (may be a CD-ROM, a U-disk, a mobile hard disk, etc.), and includes several instructions for causing a computer device (may be a personal computer, a server, or a network device, etc.) to perform the methods described in various implementation scenarios of the present application.
Based on the method shown in fig. 1 to fig. 2 and the virtual device embodiment shown in fig. 3, in order to achieve the above object, the embodiment of the present application further provides a computer device, which may specifically be a personal computer, a server, a network device, or the like, where the computer device includes a storage medium and a processor; a storage medium storing a computer program; a processor for executing a computer program to implement the above-described edge calculation-based network control method as shown in fig. 1 to 2.
Optionally, the computer device may also include a user interface, a network interface, a camera, radio Frequency (RF) circuitry, sensors, audio circuitry, WI-FI modules, and the like. The user interface may include a Display screen (Display), an input unit such as a Keyboard (Keyboard), etc., and the optional user interface may also include a USB interface, a card reader interface, etc. The network interface may optionally include a standard wired interface, a wireless interface (e.g., bluetooth interface, WI-FI interface), etc.
It will be appreciated by those skilled in the art that the architecture of a computer device provided in the present embodiment is not limited to the computer device, and may include more or fewer components, or may combine certain components, or may be arranged in different components.
The storage medium may also include an operating system, a network communication module. An operating system is a program that manages and saves computer device hardware and software resources, supporting the execution of information handling programs and other software and/or programs. The network communication module is used for realizing communication among all components in the storage medium and communication with other hardware and software in the entity equipment.
From the above description of the embodiments, it will be apparent to those skilled in the art that the present application may be implemented by means of software plus necessary general hardware platforms, or may be implemented by hardware. When a certain edge container is generated and successfully operated on an edge node, a network configuration file corresponding to the edge container can be correspondingly generated based on the network configuration information of the edge container. After the network configuration file is generated, the network configuration file may be stored in a designated storage space local to the edge node. When the edge node is abnormal and resumes normal operation again, the target configuration file corresponding to the target edge container can be determined based on the network configuration file stored in the designated storage space. The target edge container may be an edge container that is running before an anomaly occurs in the edge node. Then, the target network configuration information corresponding to the target edge container can be further read from the target configuration file corresponding to the target edge container. Thus, the edge node can restore the network state of the target edge container to the network state before the edge node is abnormal according to the target network configuration information, so that the service of the edge node is restored to normal operation. According to the method and the device, the network configuration file is correspondingly generated for each edge container successfully operated on the edge node and stored in the local appointed storage space of the edge node, and then when the edge node is abnormal and then returns to normal operation, the network state of the target edge container can be quickly restored to the network state before the edge node is abnormal according to the network configuration file stored in the local appointed storage space, the service of the edge node is not affected even if the cloud edge is disconnected, and the method and the device are beneficial to simply and quickly guaranteeing the normal service of the edge node.
Those skilled in the art will appreciate that the drawings are merely schematic illustrations of one preferred implementation scenario, and that the modules or flows in the drawings are not necessarily required to practice the present application. Those skilled in the art will appreciate that modules in an apparatus in an implementation scenario may be distributed in an apparatus in an implementation scenario according to an implementation scenario description, or that corresponding changes may be located in one or more apparatuses different from the implementation scenario. The modules of the implementation scenario may be combined into one module, or may be further split into a plurality of sub-modules.
The foregoing application serial numbers are merely for description, and do not represent advantages or disadvantages of the implementation scenario. The foregoing disclosure is merely a few specific implementations of the present application, but the present application is not limited thereto and any variations that can be considered by a person skilled in the art shall fall within the protection scope of the present application.

Claims (10)

1. A network control method based on edge calculation, applied to an edge node, comprising:
when any edge container is successfully operated, generating a network configuration file based on the network configuration information of any edge container, and storing the network configuration file in a designated storage space local to the edge node;
and when the edge node is abnormal and returns to normal operation, determining a target configuration file corresponding to a target edge container from the network configuration files stored in the designated storage space, reading target network configuration information of the target edge container from the target configuration file, and restoring the network state of the target edge container based on the target network configuration information, wherein the target edge container is the edge container which is running before the edge node is abnormal.
2. The method of claim 1, wherein generating a network configuration file based on the network configuration information of the any edge container comprises:
and packaging the network configuration information of any edge container, naming the packaged network configuration information according to a preset naming rule, and generating the network configuration file, wherein the preset naming rule at least comprises a unique identifier of any edge container, and the network configuration information comprises IP address information and/or MAC address information.
3. The method of claim 2, wherein after the storing the network profile in the designated storage space local to the edge node, the method further comprises:
and when the edge node normally operates, if the edge container is in the end operation, determining a first configuration file corresponding to the edge container which is in the end operation from the network configuration files, and removing the first configuration file from the appointed storage space.
4. The method of claim 2, wherein after the storing the network profile in the designated storage space local to the edge node, the method further comprises:
when the edge node normally operates, if an edge container is in operation, determining a first configuration file corresponding to the edge container ending operation from the network configuration file, and adding an operation ending tag to the first configuration file;
correspondingly, the determining the target configuration file corresponding to the target edge container from the network configuration files stored in the designated storage space includes:
and determining a second configuration file without the operation end label from the network configuration files stored in the appointed storage space, and determining a target configuration file corresponding to a target edge container according to the unique identifier corresponding to the second configuration file.
5. The method of claim 4, wherein after the storing the network profile in the designated storage space local to the edge node, the method further comprises:
responding to a target query request, and determining an edge container to be queried indicated by the target query request;
finding out third configuration files corresponding to the edge container to be queried from the network configuration files, and determining target time information corresponding to each third configuration file, wherein the target time information at least comprises file generation time;
and determining the operation information of the edge container to be queried on the edge node according to the target time information.
6. The method of claim 1, wherein after the restoration of normal operation after the edge node is abnormal, the method further comprises:
and determining the restarting times of the target edge container when the edge node is abnormal and then resumes normal operation, generating alarm information when the restarting times exceed a preset frequency threshold value, and sending the alarm information to a preset management terminal.
7. The method of claim 6, wherein generating the alert information when the number exceeds a preset number threshold comprises:
when the number of times exceeds a preset number of times threshold, acquiring a log generated in a preset time before the edge node is abnormal, and generating the alarm information based on the log, the unique identification of the target edge container and the corresponding time when the target edge container is started last time.
8. A network control device based on edge calculation, applied to an edge node, comprising:
the configuration file generation module is used for generating a network configuration file based on the network configuration information of any edge container when any edge container is successfully operated, and storing the network configuration file in a designated storage space local to the edge node;
and the network state recovery module is used for determining a target configuration file corresponding to a target edge container from the network configuration files stored in the designated storage space when the edge node is abnormal and recovering the network state of the target edge container based on the target network configuration information, wherein the target edge container is the edge container running before the edge node is abnormal.
9. A storage medium having stored thereon a computer program, which when executed by a processor, implements the method of any of claims 1 to 7.
10. A computer device comprising a storage medium, a processor and a computer program stored on the storage medium and executable on the processor, characterized in that the processor implements the method of any one of claims 1 to 7 when executing the computer program.
CN202210936713.3A 2022-08-05 2022-08-05 Network control method and device based on edge calculation and storage medium Active CN115460271B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210936713.3A CN115460271B (en) 2022-08-05 2022-08-05 Network control method and device based on edge calculation and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210936713.3A CN115460271B (en) 2022-08-05 2022-08-05 Network control method and device based on edge calculation and storage medium

Publications (2)

Publication Number Publication Date
CN115460271A CN115460271A (en) 2022-12-09
CN115460271B true CN115460271B (en) 2023-07-04

Family

ID=84296487

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210936713.3A Active CN115460271B (en) 2022-08-05 2022-08-05 Network control method and device based on edge calculation and storage medium

Country Status (1)

Country Link
CN (1) CN115460271B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102710509A (en) * 2012-05-18 2012-10-03 杭州华三通信技术有限公司 Automatic data center configuration method and method
CN108039969A (en) * 2017-12-13 2018-05-15 深圳市科力锐科技有限公司 Network method of automatic configuration, device, system, storage medium and object-computer
CN112217856A (en) * 2019-07-11 2021-01-12 华为技术有限公司 Address acquisition method, device, equipment and storage medium of application example
CN113204378A (en) * 2021-04-21 2021-08-03 深圳市广和通无线股份有限公司 Configuration file state synchronization method, device, terminal, server and storage medium
CN113946408A (en) * 2021-10-26 2022-01-18 北京同创永益科技发展有限公司 Cloud native edge container control method and system and storage medium

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080263183A1 (en) * 2007-04-20 2008-10-23 Lisa Midori Nishiyama Management of Kernel configurations for nodes in a clustered system
US11388054B2 (en) * 2019-04-30 2022-07-12 Intel Corporation Modular I/O configurations for edge computing using disaggregated chiplets

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102710509A (en) * 2012-05-18 2012-10-03 杭州华三通信技术有限公司 Automatic data center configuration method and method
CN108039969A (en) * 2017-12-13 2018-05-15 深圳市科力锐科技有限公司 Network method of automatic configuration, device, system, storage medium and object-computer
CN112217856A (en) * 2019-07-11 2021-01-12 华为技术有限公司 Address acquisition method, device, equipment and storage medium of application example
CN113204378A (en) * 2021-04-21 2021-08-03 深圳市广和通无线股份有限公司 Configuration file state synchronization method, device, terminal, server and storage medium
CN113946408A (en) * 2021-10-26 2022-01-18 北京同创永益科技发展有限公司 Cloud native edge container control method and system and storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
" 移动边缘计算环境下无服务器框架的研究";石丁;《中国优秀硕士学位论文全文数据库(电子期刊)信息科技辑》;全文 *
Anas Toma ; Juri Wenner ; Jan Eric Lenssen ; Jian-Jia Chen."Adaptive Quality Optimization of Computer Vision Tasks in Resource-Constrained Devices using Edge Computing".《2019 19th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID)》.2019,全文. *

Also Published As

Publication number Publication date
CN115460271A (en) 2022-12-09

Similar Documents

Publication Publication Date Title
CN110224854B (en) Block chain node deployment method and device and storage medium
CN107682172B (en) Control center device, service system processing method and medium
CN112579356B (en) Fault processing method and server
CN114363334B (en) Cloud system, network configuration method, device and equipment of cloud desktop virtual machine
CN111897697A (en) Server hardware fault repairing method and device
CN111444043A (en) Data backup method, device, node, system and medium
CN114328029B (en) Backup method and device of application resources, electronic equipment and storage medium
CN105550071A (en) System file upgrading and detecting method and communication device
CN110196749B (en) Virtual machine recovery method and device, storage medium and electronic device
CN106204031B (en) Card application processing method and device
CN106911508B (en) DNS configuration recovery method and device
CN115460271B (en) Network control method and device based on edge calculation and storage medium
CN114691445A (en) Cluster fault processing method and device, electronic equipment and readable storage medium
CN114679295B (en) Firewall security configuration method and device
CN112596750B (en) Application testing method and device, electronic equipment and computer readable storage medium
CN107766232B (en) Plug-in management method and device
CN113656378A (en) Server management method, device and medium
CN113297149A (en) Method and device for monitoring data processing request
CN110289977B (en) Fault detection method, system, equipment and storage medium for logistics warehouse system
CN112306527A (en) Server upgrading method and device, computer equipment and storage medium
CN110837431A (en) Service control method, service control device, computer equipment and computer-readable storage medium
CN112416698A (en) Monitoring system expansion method and device, storage medium and electronic equipment
CN109039785B (en) Trap alarm recovery method and device based on SNMP
CN113411800B (en) Method and device for assisting client in wireless network switching
CN115858251B (en) Control method and device of substrate control unit, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant