CN105897382A - Data synchronization method and device - Google Patents

Data synchronization method and device Download PDF

Info

Publication number
CN105897382A
CN105897382A CN201610405252.1A CN201610405252A CN105897382A CN 105897382 A CN105897382 A CN 105897382A CN 201610405252 A CN201610405252 A CN 201610405252A CN 105897382 A CN105897382 A CN 105897382A
Authority
CN
China
Prior art keywords
packet
management
management node
coding
management nodes
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610405252.1A
Other languages
Chinese (zh)
Inventor
陈翔
胡勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
LeTV Holding Beijing Co Ltd
LeTV Information Technology Beijing Co Ltd
Original Assignee
LeTV Holding Beijing Co Ltd
LeTV Information Technology Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by LeTV Holding Beijing Co Ltd, LeTV Information Technology Beijing Co Ltd filed Critical LeTV Holding Beijing Co Ltd
Priority to CN201610405252.1A priority Critical patent/CN105897382A/en
Publication of CN105897382A publication Critical patent/CN105897382A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/004Arrangements for detecting or preventing errors in the information received by using forward error control
    • H04L1/0056Systems characterized by the type of code used
    • HELECTRICITY
    • H03ELECTRONIC CIRCUITRY
    • H03MCODING; DECODING; CODE CONVERSION IN GENERAL
    • H03M13/00Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
    • H03M13/37Decoding methods or techniques, not specific to the particular type of coding provided for in groups H03M13/03 - H03M13/35
    • H03M13/3761Decoding methods or techniques, not specific to the particular type of coding provided for in groups H03M13/03 - H03M13/35 using code combining, i.e. using combining of codeword portions which may have been transmitted separately, e.g. Digital Fountain codes, Raptor codes or Luby Transform [LT] codes

Abstract

The embodiment of the invention provides a data synchronization method and device, and relates to the technical field of the internet. The method comprises following steps of to-be-synchronously-transmitted data packets; carrying out fountain coding to the data packets; and sending the coded data packets to other management nodes. When data synchronization needs to be carried out, the fountain coding is carried out on the to-be-synchronously-transmitted data packets; the coded data packets can be transmitted reliably under a condition that a network environment is relatively poor; moreover, the fountain coding is realized in a software mode, the speed is relatively fast, and the synchronism of synchronous transmission of the data packets is ensured; and coded transmission rather than plaintext transmission is carried out on the data packets, equivalently, the data packets are encrypted, and the data transmission security is ensured.

Description

Method of data synchronization and device
Technical field
The present embodiments relate to Internet technical field, particularly relate to a kind of method of data synchronization and dress Put.
Background technology
Along with the development of Internet technology, various network applications are weeded out the old and bring forth the new, and day by day affect people's Producing, live, the thing followed is that the magnanimity of data volume increases and the extensive covering of service area.Face To the hugest data volume and coverage so the most widely, traditional by single server to certain The mode that network application carries out managing concentratedly and safeguarding certainly will be able to not be tackled, and distributed structure/architecture is operated and given birth to.
For example, for certain network application, management node can be arranged in different areas, often Individual management node such as can be implemented as the multi-form such as server or server and storage system.And be Ensure this network application data consistency when in the face of the user of different regions, need to ensure each number pipe The data syn-chronization of reason node.Wherein, these data can be the data of the software program of this network application, Can also be management, safeguard the data that this network application runs, it is also possible to be that numerous terminal uses use this Produced user data during network application.
In realizing process of the present invention, inventor finds that in prior art, at least there are the following problems: actual In application, between the management node in each area when carrying out data synchronization transmissions, if network environment is severe, Likely result in data synchronization transmissions failure, or need repeatedly to retransmit the synchronization that could finally realize data Transmission.Therefore, in the case of network environment is poor, the reliability of data synchronization transmissions is poor.
Summary of the invention
The embodiment of the present invention provides a kind of method of data synchronization and device, in order in the poor situation of network environment Under, improve the reliability of data synchronization transmissions.
The embodiment of the present invention provides a kind of method of data synchronization based on fountain codes, including:
Receiving the packet of transmission to be synchronized, described packet has predetermined bit length;
Described packet is carried out fountain codes coding;
Packet after coding is respectively sent to other management nodes each.
Technique scheme has the advantages that
When certain management node receives a packet, this packet is carried out fountain codes coding, and Packet after coding is respectively sent to other management nodes each, to realize this packet in all management Synchronous transfer in node and storage.In the embodiment of the present invention, when needs carry out data syn-chronization, pass through The packet treating synchronous transfer carries out fountain codes coding so that even if the packet after coding is in network rings In the case of border is poor, it is also possible to obtain transmitting, reliably decode.Further, since fountain codes be with The coding that software mode realizes, speed, advantageously ensure that the synchronicity that packet synchronisation transmits;And And, packet is carried out coding transmission rather than plaintext transmission, is equivalent to packet has been carried out " encryption ", Also ensure that the safety that data are transmitted.
The embodiment of the present invention provides a kind of data synchronization unit, including:
First receiver module, for receiving the packet of transmission to be synchronized, described packet has presets ratio Bit length;
Coding module, carries out fountain codes volume for the described packet receiving described first receiver module Code;
Sending module, the packet after being encoded by described coding module is respectively sent to other management each Node.
Technique scheme has the advantages that
When certain management node receives a packet by the first receiver module, pass through coding module This packet is carried out fountain codes coding, and by sending module, the packet after coding is respectively sent to Other management nodes each, to realize this packet synchronous transfer in all management nodes and storage.This In inventive embodiments, when needs carry out data syn-chronization, spray by treating the packet of synchronous transfer Spring code encodes so that even if the packet after coding is in the case of network environment is poor, it is also possible to obtain Transmitting, reliably decode;Further, owing to fountain codes is the coding realized with software mode, speed is relatively Hurry up, advantageously ensure that the synchronicity that packet synchronisation transmits;And, packet is carried out coding transmission and Ciphertext transmits, and is equivalent to packet has been carried out " encryption ", also ensure that the safety that data are transmitted.
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to reality Execute the required accompanying drawing used in example or description of the prior art to be briefly described, it should be apparent that under, Accompanying drawing during face describes is some embodiments of the present invention, for those of ordinary skill in the art, On the premise of not paying creative work, it is also possible to obtain other accompanying drawing according to these accompanying drawings.
The network architecture schematic diagram of a kind of optional management node that Fig. 1 provides for the embodiment of the present invention;
The flow chart of the method for data synchronization embodiment one that Fig. 2 provides for the embodiment of the present invention;
The flow chart of the method for data synchronization embodiment two that Fig. 3 provides for the embodiment of the present invention;
Fig. 4 is the flow chart of the specific implementation of step 202 in embodiment illustrated in fig. 3 two;
The structural representation of the data synchronization unit embodiment one that Fig. 5 provides for the embodiment of the present invention;
The structural representation of the data synchronization unit embodiment two that Fig. 6 provides for the embodiment of the present invention.
Detailed description of the invention
For making the purpose of the embodiment of the present invention, technical scheme and advantage clearer, below in conjunction with this Accompanying drawing in bright embodiment, is clearly and completely described the technical scheme in the embodiment of the present invention, Obviously, described embodiment is a part of embodiment of the present invention rather than whole embodiments.Based on Embodiment in the present invention, those of ordinary skill in the art are obtained under not making creative work premise The every other embodiment obtained, broadly falls into the scope of protection of the invention.
The term used in embodiments of the present invention be only merely for describe specific embodiment purpose, and It is not intended to be limiting the present invention.Odd number shape used in the embodiment of the present invention and appended claims " a kind of ", " described " and " being somebody's turn to do " of formula is also intended to include most form, unless context understands Ground represents other implications.
Should be appreciated that term "and/or" used herein is only a kind of to describe affiliated partner Incidence relation, can there are three kinds of relations, such as, A and/or B, can represent: individually deposit in expression At A, there is A and B, individualism B these three situation simultaneously.It addition, character "/" herein, Typically represent the forward-backward correlation relation to liking a kind of "or".
Although should be appreciated that and may using term first, second, third, etc. in embodiments of the present invention Describe XXX, but these XXX should not necessarily be limited by these terms.These terms are only used for by XXX each other Distinguish.Such as, in the case of without departing from range of embodiment of the invention, an XXX can also be by Being referred to as the 2nd XXX, similarly, the 2nd XXX can also be referred to as an XXX.
Depend on linguistic context, word as used in this " if ", " if " can be construed to " ... time " or " when ... " or " in response to determining " or " in response to detection ".Similar Ground, depends on linguistic context, phrase " if it is determined that " or " if detection (condition of statement or event) " " when determining " or " in response to determining " can be construed to or " when the detection (condition of statement Or event) time " or " in response to detection (condition of statement or event) ".
Also, it should be noted term " includes ", " comprising " or its any other variant are intended to contain Comprising of lid nonexcludability, so that include that the commodity of a series of key element or system not only include those Key element, but also include other key elements being not expressly set out, or also include for this commodity or The key element that system is intrinsic.In the case of there is no more restriction, statement " including ... " limit Fixed key element, it is not excluded that there is also other identical want in the commodity including described key element or system Element.
First combine Fig. 1 introduce the embodiment of the present invention provide method of data synchronization based on fountain codes permissible The application scenarios being applicable to.
The network architecture schematic diagram of a kind of optional management node that Fig. 1 provides for the embodiment of the present invention, as Shown in Fig. 1, it is assumed that there are A, B, C tri-manages node, current management node A receives certain number According to bag, this packet refers to the packet with bit length, such as can correspond to user and applies certain net A certain amount of data produced during network application, may comprise one or more user data.Relative to currently For receiving the management node A of packet, management node B and management node C is referred to as other management joints Point.
In the embodiment of the present invention optionally, management node A and management node B and the management of packet are received Node C can lay respectively in the different bands of position, and such as management node A is positioned at area 1, management Node B is positioned at area 2, management node 3 is positioned at area 3;Or, receive the management node A of packet Different with the communication network that management node C uses with management node B, such as management node A uses network A, management node B use network b, management node 3 to use network c;Or, receive the pipe of packet Reason node A is different with the communication network that management node C uses with management node B, and lays respectively at not In the same band of position, such as management node A is positioned at area 1, uses the communication network of China Mobile, Management node B be positioned at area 2, use CHINAUNICOM communication network, management node 3 be positioned at area 3, Use the communication network of China Telecom.
What deserves to be explained is, the management node A of the example above, management node B and management node C place The band of position, the communication network used are different, but in actual application, the band of position, communication Network can be the most different between management node A, management node B and management node C, such as manage Node A and management node B is to use communication network a, and management node C uses communication network b. Therefore, the example above is not to difference management region, node present position, the communication network that used only One limits, primarily to the diversity of each management node is described, respectively management node is in position district Territory, the communication network aspect used there are differences.
Management node A, management node B, management node C are respectively adopted the communication network of heterogeneous networks operator In the case of network realizes correspondence with foreign country, when carrying out data syn-chronization between each management node, due to be into Row inter-network or perhaps the transmission of rete mirabile data, the less stable of the data transmission link of inter-network, network rings Border is poor so that the reliability of data synchronization transmissions is very poor.
Transmission side data it addition, what deserves to be explained is, in the embodiment of the present invention, between each management node Formula can be to use UDP (User Datagram Protocol is called for short UDP) mode Realize, i.e. receiving the management node A of packet to management node B and the management same step number of node C During according to bag, its transmission means used is UDP mode.In like manner, when the management node receiving packet During for management node B, it is also adopted by UDP mode and connects to management node A and management node C synchronous transfer The packet received.
The flow chart of the method for data synchronization embodiment one that Fig. 2 provides for the embodiment of the present invention, this embodiment The method of data synchronization provided can be performed by data synchronization unit, and this data synchronization unit can be arranged on In arbitrary management node in above-mentioned network structure, in the present embodiment as a example by being arranged in management node A Illustrate.As in figure 2 it is shown, the method comprises the steps:
Step 101, receive the packet of transmission to be synchronized.
Step 102, packet is carried out fountain codes coding.
Step 103, the packet after coding is respectively sent to other management nodes each.
In actual application, this fountain codes can be LT code, it is also possible to be Raptor code.
Wherein, LT code is to implement the first time of fountain codes, Michael Luby propose, Amin Shokrol lahi was made that improvement to LT code later, it is proposed that Equations of The Second Kind fountain codes, i.e. Raptor Code.
LT code have employed the thought of random coded, is a kind of unrestricted code of code check, also referred to as without code check code. LT code can produce infinite number of coded data packet in source, until receiving terminal can correct Restorer varieties file.
Raptor code includes a two-forty precoding and LT code, and wherein, the purpose of precoding is simply come Say and expand the original information number of packet i.e. quantity of original data packet exactly, thus obtain intermediate packets, And then carry out LT code coding with intermediate packets for the input that LT code encodes.
So-called fountain codes, it is simply that refer to use this kind of coding can be generated arbitrarily by k original data packet The coding groups of quantity, and only it is to be understood that wherein any n (n >=k) individual coding groups, can pass through Successfully decoded recover whole original data packet.
In the present embodiment, it is assumed that a length of L bit of the packet received, by a length of L bit Packet segmentation becomesIndividual original data packet, a length of l of the most each original data packet.
Definition: degree d represents the number every time choosing original data packet in fountain codes cataloged procedure.
The detailed process that fountain codes coding generates a coding groups is as follows:
1) (pseudorandom) selects a degree d at random;
2) from all of original data packet, random (pseudorandom) chooses d different initial data Packet;
3) this d different original data packet is carried out XOR, generate a coding groups.
Assuming known n coding groups, each coding groups represents one the linear of k Unknown worm Equation.The most whole decoding process can be regarded as n equation and combines the linear equation solving k unknown number Group G × X=N, wherein G is generator matrix, size be n × k, X be the initial data to be solved of k × 1 Packet vector, N is the coding groups vector of n × 1.When the order of the generator matrix i.e. G of G sequency spectrum is k, Original data packet X to be solved has and uniquely determines solution.
Based on above-mentioned fountain codes coding, decoding process, need to be synchronized to it when management node A receives After he manages the packet of node B and C, according to above-mentioned cataloged procedure, this packet is carried out fountain codes volume Code.Just can be transmitted to management node B and management node C after often obtaining a coding groups, Therefore, in the present embodiment, the packet after coding is respectively sent to other management nodes each, Ke Yishi Successively the coding groups that coding obtains is respectively sent to other management nodes each.Due to management node A pair Packet carries out to generate substantial amounts of coding groups in the cataloged procedure of fountain codes, and these coding groups depend on Secondary constantly it is transmitted to management node B and management node C, even if current network environment is unstable, These substantial amounts of coding groups can not be managed node B and management node C completely and receive, but management joint Point B and management node C also can receive code segment therein packet, if management node B and management The quantity of the coding groups that node C receives meets its decoding demand, just can accurately decode acquisition data Bag.And the quantity of coding groups produced based on fountain codes coding is far longer than the coding groups needed for decoding Quantity, therefore, encodes packet based on fountain codes, it is possible to ensure in the feelings that network environment is poor Under condition, management node B and management node C as recipient still are able to accurately decode acquisition packet, Realize the reliable synchronization transmission of packet.
In the present embodiment, when certain management node receives a packet, this packet is sprayed Spring code encodes, and the packet after coding is respectively sent to other management nodes each, to realize this data Wrap in the synchronous transfer in all management nodes and storage.In the embodiment of the present invention, when needs carry out data During synchronization, carry out fountain codes coding by treating the packet of synchronous transfer so that the packet after coding Even if in the case of network environment is poor, it is also possible to obtain transmitting;Further, due to fountain codes it is The coding realized with software mode, speed, advantageously ensure that the synchronicity that packet synchronisation transmits; And, packet is carried out coding transmission rather than plaintext transmission, is equivalent to packet has been carried out " encryption ", Also ensure that the safety that data are transmitted.
The flow chart of the method for data synchronization embodiment two that Fig. 3 provides for the embodiment of the present invention, the method is still Illustrate as a example by executive agent, such as Fig. 3 using the data synchronization unit being arranged in management node A Shown in, the method comprises the steps:
Step 201, receive the packet of transmission to be synchronized.
Step 202, determine, from other management nodes each, the objective management needing to synchronize described packet Node.
In actual application, be likely to be due to certain reason, when management node A receive certain packet carry out to When managing the data syn-chronization of node B and management node C, manage node B, management node C may be Receiving and store this packet, now, management node A is to management node B, the number of management node C Meaning will be lost according to synchronization process.
Therefore, in order to ensure to manage node A to management node B and the data synchronization processing of management node C Effectiveness, management node A needs predetermined management node B and management node C the need of carrying out Data synchronization processing, if management node B and management node C is required for, then management node A will encode After packet send to need management node B and management node C;If management node B or management Node C is required for, then management node A will coding after packet send to need management node B or Management node C;Otherwise, if all need not, then management node A will not carry out packet to management joint Point B and the synchronous transfer of management node C.
Optionally, as shown in Figure 4, step 202 is determined from other management nodes each need to synchronize The objective management node of packet, can be accomplished in that
Step 2021, the finger print information of acquisition packet, this finger print information is used for identification data packet.
Wherein, data fingerprint can be that some attribute informations according to packet generate, and generating mode can To realize with reference to existing mode, the present embodiment only illustrates with following example.
Assume that this packet is a management document receiving of node A, the document include font format, These attribute informations of paragraph format, these attribute informations are only for example.In actual application, can be in advance Set up the corresponding relation of font format, paragraph format and code identification, the code identification that the such as Song typeface is corresponding Being 00000001, the code identification that regular script is corresponding is 00000002.It is thus possible to based on this corresponding relation Determine code identification that the font format of the document is corresponding and code identification corresponding to paragraph format.Enter And the two code identification obtained is carried out certain computing, and such as XOR, obtain identifying this article The finger print information of shelves.
Step 2022, send data synchronization request, in data synchronization request to other management nodes each respectively Including finger print information.
The data sync response that step 2023, reception other management nodes each send, each data syn-chronization rings Should include that other management nodes corresponding determine whether to have stored the instruction of packet according to finger print information Information.
Step 2024, according to the instruction information in each data sync response, from other management nodes each really Set the goal management node.
Still as a example by the network architecture shown in Fig. 1, management node A is calculating the finger print information obtaining packet After, the data synchronization request carrying this finger print information is sent respectively to management node B and management node C. What deserves to be explained is, each packet that management node B and management node C stores for it, also association is deposited Contain the finger print information that this packet is corresponding.
Therefore, when management node B and management node C receives this data synchronization request, therefrom parse After this finger print information, mating of the finger print information carrying out receiving with this from the finger print information of local maintenance Processing, if matching consistent finger print information, illustrating to have stored this packet, to management node The data sync response of A feedback comprises instruction and stores the instruction information of this packet;Contrary, Without matching consistent finger print information, illustrate the most not store this packet, then to management joint The data sync response of some A feedback comprises instruction and does not store the instruction information of this packet.
Thus, management node A, according to management node B and the data sync response of management node C, determines Management node B and management node C had stored this packet.To not store this packet Management node as objective management node.
Step 203, will coding after packet send to objective management node.
Assuming to determine that result represents that management node B had stored this packet, management node C does not deposit Stored up this packet, then management node A determines that management node C is objective management node, after coding Packet sends to management node C.
Step 204, receive objective management node send reception confirm message, stop send coding after Packet.
According to the description encoding, decoding process in previous embodiment for fountain codes, it is assumed that objective management saves Point C is successfully received n (n >=k) individual coding groups, and it can go out this number with decoding success According to bag, then it can send to receive to management node A and confirm message, be used for informing management node A its Through being properly received this packet, this is properly received the decoding that means success and obtains this packet.Thus, Management node A can stop the generation of follow-up coding groups, and stops continuing to send to management node C Follow-up coding groups, and when there is next number and needing synchronous transfer according to bag, carry out next packet Synchronous transfer process.
Or, management node A stops the packet after sending coding, it is also possible to be following situation: pipe Node A is after coded data packet obtains multiple coding groups that this packet is corresponding to reason, by each coding groups Send to management node C.Confirm message without receiving above-mentioned reception, then management node A is permissible Repeating to send this coding groups according to preset strategy, if receiving this reception to confirm message, then stopping weight This each coding groups is given in recurrence, and in the case of having next packets need to send, processes the next one Packet.Therefore, the packet after this stopping sends coding may also mean that stopping repeats to send this coding After packet.
In the present embodiment, receive the management node of packet of transmission to be synchronized by obtaining this packet Finger print information and be transferred to other management node so that other management nodes can believe based on to this fingerprint Breath mates with the finger print information corresponding to the most stored packet, it is determined whether had stored and has treated together The packet of step transmission.Thus, the management node of the packet receiving transmission to be synchronized has only to not having There is management this packet of node synchronous transfer storing this packet, it is to avoid calculating etc. process resource Waste, it is ensured that the effectiveness of data synchronization processing.It addition, by packet is carried out fountain codes coding, Packet after encoding with fountain codes carries out synchronous transfer, it is ensured that the reliability of synchronous transfer.
The structural representation of the data synchronization unit embodiment one that Fig. 5 provides for the embodiment of the present invention, such as figure Shown in 5, this data synchronization unit includes: the first receiver module 11, coding module 12, sending module 13.
First receiver module 11, for receiving the packet of transmission to be synchronized, described packet has default Bit length.
Coding module 12, sprays for the described packet receiving described first receiver module 11 Spring code encodes.
Sending module 13, the packet after described coding module 12 is encoded be respectively sent to each its He manages node.
Optionally, management node and described other management nodes each of receiving described packet lay respectively at not In the same band of position, and/or, receive the management node of described packet and described other management nodes each The communication network used is different.
Optionally, management node and described other management nodes each of receiving described packet lead to each other Cross the packet after UDP mode transmits described coding.
Fig. 5 shown device can perform the method for embodiment illustrated in fig. 2, and the present embodiment does not describes in detail Part, refers to the related description to Fig. 2.
The technical scheme of the embodiment of the present invention has the advantages that
When certain management node receives a packet by the first receiver module, pass through coding module This packet is carried out fountain codes coding, and by sending module, the packet after coding is respectively sent to Other management nodes each, to realize this packet synchronous transfer in all management nodes and storage.This In inventive embodiments, when needs carry out data syn-chronization, spray by treating the packet of synchronous transfer Spring code encodes so that even if the packet after coding is in the case of network environment is poor, it is also possible to obtain Transmitting;Further, owing to fountain codes is the coding realized with software mode, speed, be conducive to Ensure the synchronicity of packet synchronisation transmission;And, packet is carried out coding transmission rather than plaintext transmission, Be equivalent to packet has been carried out " encryption ", also ensure that the safety that data are transmitted.
The structural representation of the data synchronization unit embodiment two that Fig. 6 provides for the embodiment of the present invention, such as figure Shown in 6, on the basis of embodiment illustrated in fig. 5, optionally, this device also comprises determining that module 21.
Determine module 21, need to synchronize described packet for determining from described other management nodes each Objective management node.
Accordingly, described sending module 13 specifically for: the packet after coding is sent to described target Management node.
Concrete, described determine that module 21 includes: acquiring unit 211, transmitting element 212, receive single Unit 213, determine unit 214.
Acquiring unit 211, for obtaining the finger print information of described packet, described finger print information is used for marking Know described packet.
Transmitting element 212, for sending data synchronization request, institute to described other management nodes each respectively State data synchronization request and include described finger print information.
Receive unit 213, for receiving the data sync response that described other management nodes each send, institute State data sync response and include that other management nodes corresponding determine whether to have deposited according to described finger print information Stored up the instruction information of described packet.
Determine unit 214, for according to the described instruction information in each described data sync response, from institute State in other management nodes each and determine objective management node.
Optionally, this device also includes: the second receiver module 22.
Second receiver module 22, the reception sent for receiving described other management nodes each confirms message.
Described sending module 13 is additionally operable to: receives described reception at described second receiver module 22 and confirms During message, stop the packet after sending described coding.
Fig. 6 shown device can perform the method for embodiment illustrated in fig. 3, and the present embodiment does not describes in detail Part, refers to the related description to Fig. 3.
The technical scheme of the embodiment of the present invention has the advantages that
The management node of the packet receiving transmission to be synchronized obtains the finger of this packet by acquiring unit Stricture of vagina information is also transferred to other management nodes so that other management nodes can based on to this finger print information with The coupling of the most stored finger print information corresponding to packet, it is determined whether stored biography to be synchronized Defeated packet.Thus, the management node of the packet receiving transmission to be synchronized has only to not depositing Stored up management this packet of node synchronous transfer of this packet, it is to avoid calculating etc. process the waste of resource, Ensure that the effectiveness of data synchronization processing.It addition, by packet is carried out fountain codes coding, with spray Packet after spring code coding carries out synchronous transfer, it is ensured that the reliability of synchronous transfer.
Optionally, also a kind of management equipment of the embodiment of the present invention, this management equipment include processor and The memorizer being connected by bus with processor, in this memorizer, storage has computer program, and processor is adjusted With this computer program to perform each step in above-mentioned Fig. 2-Fig. 3 embodiment of the method.This memorizer can be real It it is now computer readable recording medium storing program for performing.
Device embodiment described above is only schematically, wherein said illustrates as separating component Unit can be or may not be physically separate, the parts shown as unit can be or Person may not be physical location, i.e. may be located at a place, or can also be distributed to multiple network On unit.Some or all of module therein can be selected according to the actual needs to realize the present embodiment The purpose of scheme.Those of ordinary skill in the art are not in the case of paying performing creative labour, the most permissible Understand and implement.
Through the above description of the embodiments, those skilled in the art is it can be understood that arrive each reality The mode of executing can add the mode of required general hardware platform by software and realize, naturally it is also possible to by firmly Part.Based on such understanding, the portion that prior art is contributed by technique scheme the most in other words Dividing and can embody with the form of software product, this computer software product can be stored in computer can Read in storage medium, such as ROM/RAM, magnetic disc, CD etc., including some instructions with so that a meter Calculate machine (can be personal computer, server, or network equipment etc.) and perform each embodiment Or the method described in some part of embodiment.
Last it is noted that above example is only in order to illustrate technical scheme, rather than to it Limit;Although the present invention being described in detail with reference to previous embodiment, the ordinary skill of this area Personnel it is understood that the technical scheme described in foregoing embodiments still can be modified by it, or Person carries out equivalent to wherein portion of techniques feature;And these amendments or replacement, do not make corresponding skill The essence of art scheme departs from the spirit and scope of various embodiments of the present invention technical scheme.

Claims (10)

1. a method of data synchronization, it is characterised in that including:
Receiving the packet of transmission to be synchronized, described packet has predetermined bit length;
Described packet is carried out fountain codes coding;
Packet after coding is respectively sent to other management nodes each.
Method the most according to claim 1, it is characterised in that the number of described reception transmission to be synchronized After bag, also include:
Determine from described other management nodes each and need to synchronize the objective management node of described packet;
Accordingly, described packet after coding is respectively sent to other management nodes each, including:
Packet after described coding is sent to described objective management node.
Method the most according to claim 2, it is characterised in that described from described other management joints each Point is determined the objective management node needing to synchronize described packet, including:
Obtaining the finger print information of described packet, described finger print information is used for identifying described packet;
Send data synchronization request to described other management nodes each respectively, described data synchronization request is wrapped Include described finger print information;
Receive the data sync response that described other management nodes each send, described data sync response is wrapped Include other management nodes described and determine whether to have stored the finger of described packet according to described finger print information Show information;
According to the described instruction information in each described data sync response, from described other management nodes each Determine described objective management node.
Method the most according to claim 1, it is characterised in that described will coding after packet divide Do not send after other management nodes each, also include:
Receive the reception confirmation message that described other management nodes each send, after stopping sending described coding Packet.
5. want the method according to any one of 1 to 4 according to right, it is characterised in that receive described data Management node and described other management nodes each of bag lay respectively in the different bands of position, and/or, connect The management node receiving described packet is different with the communication network that described other management nodes each use;
Management node and described other management nodes each of receiving described data cell pass through user each other Datagram protocol UDP mode transmits the packet after described coding.
6. a data synchronization unit, it is characterised in that including:
First receiver module, for receiving the packet of transmission to be synchronized, described packet has presets ratio Bit length;
Coding module, carries out fountain codes volume for the described packet receiving described first receiver module Code;
Sending module, the packet after being encoded by described coding module is respectively sent to other management each Node.
Device the most according to claim 6, it is characterised in that also include:
Determine module, need to synchronize described packet for determining from described other management nodes each Objective management node;
Accordingly, described sending module specifically for: by described coding module encode after packet send To described objective management node.
Device the most according to claim 7, it is characterised in that described determine that module includes:
Acquiring unit, for obtaining the finger print information of described packet, described finger print information is used for identifying institute State packet;
Transmitting element, for sending data synchronization request, described number to described other management nodes each respectively Described finger print information is included according to synchronization request;
Receive unit, for receiving the data sync response that described other management nodes each send, described number Include that other management nodes corresponding determine whether to have stored according to described finger print information according to sync response The instruction information of described packet;
Determine unit, for according to the described instruction information in each described data sync response, from described respectively Other management nodes determine described objective management node.
Device the most according to claim 6, it is characterised in that also include:
Second receiver module, the reception sent for receiving described other management nodes each confirms message;
Described sending module is additionally operable to: when described second receiver module receives described reception confirmation message, Stop the packet after sending described coding.
10. according to the device according to any one of claim 6 to 9, it is characterised in that receive described Management node and described other management nodes each of packet lay respectively in the different bands of position, and/ Or, the management node receiving described packet is different with the communication network that described other management nodes each use;
Management node and described other management nodes each of receiving described packet pass through number of users each other The packet after described coding is transmitted according to datagram protocol UDP mode.
CN201610405252.1A 2016-06-08 2016-06-08 Data synchronization method and device Pending CN105897382A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610405252.1A CN105897382A (en) 2016-06-08 2016-06-08 Data synchronization method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610405252.1A CN105897382A (en) 2016-06-08 2016-06-08 Data synchronization method and device

Publications (1)

Publication Number Publication Date
CN105897382A true CN105897382A (en) 2016-08-24

Family

ID=56729223

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610405252.1A Pending CN105897382A (en) 2016-06-08 2016-06-08 Data synchronization method and device

Country Status (1)

Country Link
CN (1) CN105897382A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110995391A (en) * 2019-11-18 2020-04-10 国能日新科技股份有限公司 Data transmission method in isolated network, server and terminal

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101330368A (en) * 2008-05-06 2008-12-24 华中科技大学 Self-adaption multicast transmission method
CN101741569A (en) * 2009-12-24 2010-06-16 中兴通讯股份有限公司 Data synchronization method, data synchronization system, client and server
CN101895376A (en) * 2010-08-06 2010-11-24 浙江大学 Transmission method for realizing data broadcasting in multi-hop wireless network
CN102170332A (en) * 2011-05-18 2011-08-31 西安电子科技大学 Opportunistic routing protocol data distributing method based on fountain code and network coding
CN102684824A (en) * 2011-03-17 2012-09-19 中兴通讯股份有限公司 Data transmission method and system
CN104104727A (en) * 2014-07-24 2014-10-15 中国传媒大学 Raptor code based large file transmission method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101330368A (en) * 2008-05-06 2008-12-24 华中科技大学 Self-adaption multicast transmission method
CN101741569A (en) * 2009-12-24 2010-06-16 中兴通讯股份有限公司 Data synchronization method, data synchronization system, client and server
CN101895376A (en) * 2010-08-06 2010-11-24 浙江大学 Transmission method for realizing data broadcasting in multi-hop wireless network
CN102684824A (en) * 2011-03-17 2012-09-19 中兴通讯股份有限公司 Data transmission method and system
CN102170332A (en) * 2011-05-18 2011-08-31 西安电子科技大学 Opportunistic routing protocol data distributing method based on fountain code and network coding
CN104104727A (en) * 2014-07-24 2014-10-15 中国传媒大学 Raptor code based large file transmission method

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110995391A (en) * 2019-11-18 2020-04-10 国能日新科技股份有限公司 Data transmission method in isolated network, server and terminal

Similar Documents

Publication Publication Date Title
CN107078910B (en) Method, device, node, signature device and system for generating block chain block
Gope et al. A realistic lightweight authentication protocol preserving strong anonymity for securing RFID system
US8713329B2 (en) Authenticated secret sharing
CN109327548A (en) A kind of block chain update method and block chain more new system
CN107480990A (en) Block chain bookkeeping methods and device
CN111934889B (en) Key generation method, signature and signature verification method, device, equipment and medium
CN105187200A (en) Method For Generating A Key In A Network And User On A Network And Network
CN104955050A (en) Composed message authentication code
CN105208028B (en) Data transmission method and related device and equipment
CN110505627B (en) Authentication method and device based on access node group
CN104717644B (en) A kind of two layers of sensor network range query method that can verify that secret protection
CN105763317A (en) Secret information transmission method based on BitTorrent protocol Have message
CN113645278B (en) Cross-chain message transmission method, device and storage medium of block chain
CN108243001A (en) A kind of data encryption communication means
CN106452758A (en) Multi-party quantum key distribution system and error correction method thereof
CN106452757A (en) Quantum secret sharing system, a sharing method thereof and error correction method
CN106972917B (en) Safety verification method for user running track
US10389481B2 (en) Methods and apparatus for calculating transport block (TB) cyclic redundancy ceck (CRC) values
CN105897382A (en) Data synchronization method and device
Tamaki et al. Security of quantum key distribution with iterative sifting
CN105848150B (en) A kind of wireless sensor network grouping small data safety distributing method
CN107426251A (en) Terminal security detection method and device
CN105979003A (en) File downloading method, device and system
Chiou An Efficient RFID Authentication Protocol Using Dynamic Identity.
CN116743713A (en) Remote online paperless conference method and device based on Internet of Things

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20160824