CN108718236A - The data transmission method of internet self-organizing confluence - Google Patents

The data transmission method of internet self-organizing confluence Download PDF

Info

Publication number
CN108718236A
CN108718236A CN201810489722.6A CN201810489722A CN108718236A CN 108718236 A CN108718236 A CN 108718236A CN 201810489722 A CN201810489722 A CN 201810489722A CN 108718236 A CN108718236 A CN 108718236A
Authority
CN
China
Prior art keywords
behalf
data
request
ccn
acts
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810489722.6A
Other languages
Chinese (zh)
Other versions
CN108718236B (en
Inventor
牟轩沁
肖爱祥
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian Jiaotong University
Original Assignee
Xian Jiaotong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian Jiaotong University filed Critical Xian Jiaotong University
Priority to CN201810489722.6A priority Critical patent/CN108718236B/en
Publication of CN108718236A publication Critical patent/CN108718236A/en
Application granted granted Critical
Publication of CN108718236B publication Critical patent/CN108718236B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/302Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/568Storing data temporarily at an intermediate stage, e.g. caching

Abstract

The data transmission method of internet self-organizing confluence, for each specific message transfer request, CA programs in internet on neighbouring user terminal will generate its transmission agency by interaction, also interaction generates the high Primary Transmit agency in bigger regional extent between simultaneous transmission agency, this process can repeat, so that convergence generates the highest transmission agency of the message in a backbone network regional extent;Transmission agency after convergence proposes transmission request to the CCN of an operation over the backbone, and utilizes CA&CM server authentications CCN;All CCN operated in backbone network adaptively arrange transmission and local data buffer storage scheme according to the transmission request received, optimize data transmission efficiency;Under the premise of not changing existing network framework, is occupied with lower backbone bandwidth and realize good transmission performance under lower lower deployment cost, and all nodes for participating in transmission keep balance of power status, greatly protect the privacy of user.

Description

The data transmission method of internet self-organizing confluence
Technical field
The present invention relates to a kind of to converge by Ad hoc mode and optimize the data stream transmitting of point-to-multipoint/multi-multipoint Tissue and implementation method, and in particular to a kind of data transmission method of internet self-organizing confluence.
Background technology
All kinds of computing terminals that internet will be distributed over different zones in world wide link together, and pass through IP agreement reality Communication between existing any two terminal.Although the communication of terminal room is mainly carried out in a manner of point-to-point on internet, In practical application, the propagation of information in most of internet be in the form of point-to-area (point-to-multipoint) existing for.Such as:People Like accessing hot spot website, watch video and news, shopping, to release news from media mode to good friend or follower, and Commercial activity, etc. on the internets such as advertisement orientation publication.With the rapid development of electronic information technology, internet has been at present Through being almost connected into different majors equipment and the large number of personal electric consumer goods terminal of all industries, produce daily Give birth to astronomical data traffic.
On the basis of the point to point protocol transmitted based on IP packets, realize that point-to-area transmission can have efficiency of transmission and ask Topic, such as:Information is from some terminal, when being transmitted to multiple reception terminals, if multiple receiving terminals be in same area, Or it is received in different time, the wasting phenomenon that will all cause information transmission that can reuse Internet resources.Therefore, it studies and opens It sends out point-to-area transport protocol efficient, is always the hot issue in interconnected communication technology.
Existing point-to-area agreement transport protocol has the modes such as ip multicast, P2P and CDN.Ip multicast passes through QoS routing Device is replicated and is forwarded to data packet, ensures data packet all transmission primaries in each of the links, can be very good to reduce band Width consumption, however ip multicast has to the support of multicast router, most of routers are not multicast roads on internet at present By device;Multicast transmission is unreliable, once some receiving terminal data-bag lost, needs source to retransmit, other receiving terminals can also be again Data packet is received, inefficiency is caused;In addition any safety verification is not supported in multicast, is not suitable for safe communication.
P2P (Peer to Peer) is a kind of point to point protocol, all node status equalitys, and a certain biography is completed in collaboration Defeated task.For P2P in the case where Node distribution is not concentrated, backbone network is largely crossed in transmission, is easily caused backbone network congestion while being dropped Low transmission rate.Statistical data shows that the bandwidth early in internet in 2004 40% has occupied (Parker by P2P programs A.The True Picture of Peer-to-Peer File sharing[J].2004,4(5):55-60.), in 2006 70% bandwidth is occupied that (Ou Yangrong, thunder shake the research of bright .BitTorrent types P2P system models by P2P programs in internet With performance evaluation [J] Beijing University of Post & Telecommunications journal, 2006,29 (z2):113-117.), so P2P programs are widely used just Precious backbone bandwidth resource is gradually swallowed, the transmission of the data of other business of internet is endangered.
CDN (Content Delivery Network), will be a certain by largely disposing cache server in network edge The request of zone user is redirected to identical cache server to reduce the pressure of backbone network.This transmission mode needs in portion The a large amount of high performance CDN cache servers of administration, so needing a large amount of expensive hardware resources.Simultaneously in a certain range, CDN bands Wider, service performance is better, so in order to provide good service, CDN needs massive band width resource, which in turns increases The lower deployment cost of CDN.When in addition being transmitted using CDN modes, user directly obtains data, user and use from CDN cache servers Any data exchange is not present between family, so CDN modes are there is no the uploading bandwidth for utilizing user, this is to existing resource Waste.
In addition to this, in the transmission of the information on existing internetworking point opposite, the information safety protection of user is one tight Weight problem.First, information source terminal (website) is often it is well known that user accesses information source by this Given information Website, for example user logs in some specific webpage by browser or user accesses the website by client-side program Resource.No matter the request of which kind of mode user always pools together, and by special server set group records and processing.Due to IP address it is direct-connected, the address information of oneself is directly exposed to server cluster by user, and server cluster is deposited by big data The request of mass users is stored up, and by the behavior of the means analysis single user such as data mining, social network analysis, is obtained single The privacy information of user.Secondly, there is information source terminal powerful information search ability, information source terminal can pass through some hands Section grasps a large number of users information, such as a large amount of client-side program of user installation, and code is not open and clear, these clients There may be eavesdropping programs for program, spy upon privacy of user and send information source terminal to, information source terminal can grasp user's Private information.Above-mentioned two aspect all illustrates that the information on internet provides source terminal and has great ability, is received for information Person has asymmetric Information Superiority, and it is impaired that this also means that the interests of information receiving terminal user in internet communication are easy.
Invention content
There are above-mentioned problems for multi-party transport protocols such as existing internetworking point opposites, the purpose of the present invention is to propose to A kind of data transmission method of internet self-organizing confluence.
To achieve the above object, the technical solution adopted by the present invention is as follows:
A kind of data transmission method of internet self-organizing confluence, includes the following steps:
1) CA programs are run on each user terminal, and multiple CCN and at least one CA&CM services are set over the backbone Device;
CA programs are for generating request of data, interacting and carry out data transmission;
CCN is used to receive interaction and matched data request, cooperation between the request of data of CA programs, CCN and generates a number According to transimission and storage scheme;A CA program is run on CCN, the CA programs run on CCN externally state that itself is represented It is by being run on CCN that CCN, CCN, which receive the data-transformation facility of interaction and CCN between the request of data of CA programs, CCN, CA programs carry out;
CA&CM servers are for verifying CCN;
2) for the request of data of same type, the CA journeys of the request of data of same type are proposed in the same area network range Elect by interaction between sequence and act on behalf of CA, it is described act on behalf of CA using CA&CM server authentications CCN it is legal after, to a CCN It is proposed its type request of data acted on behalf of;
3) CCN for receiving the type request of data arranges transmission and local data slow according to the transmission request received Deposit scheme;
4) if there is data transfer task, CCN is carried out data transmission by the CA that acts on behalf of to CA programs.
It further improves and is in the present invention, request of data is encapsulated into message piece according to fixed message format, and It is issued and is received in the form of message piece;The data attribute of the message piece includes message code, transmission property, number of users Amount, timestamp, description, hotspot designation position and act on behalf of position;
The message code is that CA&CM servers generate and what can freely be downloaded carries out exhaustive division to all data resources A series of codes;
Transmission property is the action involved by request of data, including publication, reception and inquiry;
Number of users is the number of users with the message code in the user interknited;
At the time of timestamp is that user generates the message piece;
Description shows the detailed information omitted after request of data for supplementing with code table;
Hotspot designation position is used to that request of data to be marked, and optimizes transmission and the distributed storage side of request of data Case;
It is a flag bit to act on behalf of position, for describing whether the request of data produces agency.
It further improves and is in the present invention, the data attribute of the message piece further includes attributes preferred, for recording The access preference of user.
It further improves and is in the present invention, the message piece is by running CA programmed acquisition users on the subscriber terminal The request of data post package sent out forms.
It further improves and is in the present invention, when message code generates, the message piece corresponding to the message code exists Hotspot designation position is marked as common message piece;After message code generation, if within a certain period of time in network data request No longer there is the message code, then the message piece corresponding to the message code is marked as interim message piece in hotspot designation position; After message code generation, if the number for occurring the message code in network data request within a certain period of time is more than setting Threshold value, then the message piece corresponding to the message code be marked as hot spot message piece in hotspot designation position;It is marked as disappearing temporarily The message code corresponding to the message piece of piece or hot spot message piece is ceased, if occurring the message in request of data within a certain period of time Code and the number of appearance are not more than the threshold value of setting, then the message piece is marked as common message piece.
It further improves and is in the present invention, the CA journeys acted on behalf of CA and act on behalf of other request of data having the same Sequence acts on behalf of the number of users that CA records the program addresses CA information and agency that it is acted on behalf of in independent request of data stores list Amount, and create CA and act on behalf of list.
It further improves and is in the present invention, the CA that acts on behalf of includes LAN agency and multistage route agent;
LAN Agent on behalf all request identical datas requests in a local network CA programs, upward primary network station hair Go out request of data;
Route agent represents the CA programs of all users of some router connection or the generation of secondary level-1 router network CA is managed, upward primary network station sends out request of data;
Highest level route agent between secondary level-one route agent CA, CCN and CA&CM server for being led to News.
It further improves and is in the present invention, the production method of LAN agency is:
CA programs generate request of data, and request of data is broadcast to other CA programs in same LAN, other CA The request of data is stored in after receiving the request of data of broadcast in the request of data list of itself by program;Inside each CA programs The CA elections module of acting on behalf of being arranged checks request of data list in real time, is counted respectively for each request of data and sends out identical number According to the number of users summation of request;After the number of users summation of certain request of data is more than the threshold value of setting, CA elections are acted on behalf of What module elected the request of data acts on behalf of CA;It acts on behalf of CA and creates a subprocess, CA functions are acted on behalf of in execution.
It further improves and is in the present invention, the production method of route agent CA is:
It is generated in one LAN after LAN acts on behalf of CA, LAN acts on behalf of CA and passes through the CA programs of Different LANs Interactive function finds other LAN Informations under same router, and interaction LAN acts on behalf of CA inquiry request of data, obtains The LAN obtained in other LANs acts on behalf of CA information;LAN acts on behalf of CA and acts on behalf of CA foundation connection with other LANs respectively simultaneously The request of data that interaction is respectively acted on behalf of, CA is acted on behalf of according to LAN is elected;
It is connected to and establishes the number that contact and interaction are respectively acted on behalf of between the secondary level-one route agent CA under same router After request, the route agent CA of the router is elected.
It further improves and is in the present invention, if the router tree-like hierarchical structure of network is similar to tree structure, Cut operator is carried out to the structure, becomes tree structure.
It further improves and is in the present invention, CA, which acts on behalf of list and is recorded in, to be acted on behalf of in CA, and CA is acted on behalf of for recording this The host IP address and port of the IP address for the CA programs acted on behalf of or secondary first-level agent CA;CA acts on behalf of list while recording generation The upper level of reason CA acts on behalf of the IP address information of CA.
It further improves and is in the present invention, in step 4), CCN carries out data by the CA that acts on behalf of to CA programs The method of transmission is:
CCN, which is transferred data to, acts on behalf of CA, acts on behalf of CA and according to CA acts on behalf of CA programs that form finding is acted on behalf of and to CA journeys Sequence distributes data;
If there is Multistage Proxy CA, Ze Gao first-level agents CA acts on behalf of the next stage that form finding is acted on behalf of by CA and acts on behalf of CA, and first-level agent CA distributes data downwards.
It further improves and is in the present invention, request of data is marked as a specific authentication code, CA proxy tables It is single to mark or name using the specific authentication code;When to CA transmission data are acted on behalf of, one is embedded in data message stem The specific authentication code;CA is acted on behalf of when receiving data message, analysis stem obtains the specific authentication code, and according to this Specific authentication code searches corresponding CA and acts on behalf of list.
It further improves and is in the present invention, there are one health examination modules in CA programs, are used for regular check CA journeys Sequence acts on behalf of whether CA survives, if detection finds that acting on behalf of CA does not survive, it is new that generation one is re-elected between CA programs Act on behalf of CA;
The health examination module regular check of the CA programs where CA its CA program for being acted on behalf of is acted on behalf of, if acting on behalf of CA hairs It is offline that its existing CA acts on behalf of some CA program in list, then acts on behalf of in list this CA program from CA and delete.
It further improves and is in the present invention, the CA programs increased newly in LAN send to LAN broadcast the message first Detect whether the request of data that it sends out acts on behalf of CA:If it find that existing act on behalf of CA, then newly-increased CA programs automatically will It is existing to act on behalf of act on behalf of CAs of the CA as oneself, while actively reporting the presence of oneself to acting on behalf of CA, it acts on behalf of after CA receives report This CA program is added in CA acts on behalf of list;If not finding to act on behalf of CA, elects act on behalf of CA in a local network.
It further improves and is in the present invention, new to act on behalf of after CA generates, new acts on behalf of CA using Different LANs The interacting message function discovery of CA programs is connected in other LAN Informations under same router with it, and into these LANs User terminal initiate route agent CA search requests, after finding route agent CA, current router is inquired to route agent CA Under whether generated route agent CA, if having generated route agent CA, new acts on behalf of CA to the route agent generated CA sends message, illustrates oneself to be the newly-increased CA that acts on behalf of, and the route agent CA generated increases described new in CA acts on behalf of list The information for acting on behalf of CA;If not generating route agent CA, according to the method for route agent's generation under same router Generate new route agent CA.
It further improves and is in the present invention, whether user can be arranged opens mobile agent CA functions, if do not had Mobile agent CA functions are opened, then when detecting current CA programs and being in mobile terminal, this mobile terminal will not become agency CA;If user actively opens mobile agent CA functions, when detecting that current CA programs are in mobile terminal, the mobile terminal Also it can become and act on behalf of CA.
It further improves and is in the present invention, the method for CA&CM server authentications CCN is:
Pairs of asymmetric encryption public key and private key are generated in advance on CA&CM servers, legal CCN has the right from CA& Private key is obtained on CM servers, CA is acted on behalf of and obtains public key from CA&CM servers, is verified using whether public key and private key match CCN。
It further improves and is in the present invention, if CCN certifications do not pass through, act on behalf of CA and serviced to long-range CA&CM Device sends out alarm.
It further improves and is in the present invention, if user terminal is the resource producer, user terminal actively passes through CA Program is contacted with CCN, and is sent resource to CCN and issued request of data.
Further improve and be in the present invention, in step 3), receive the CCN of the type request of data according to The transmission request received arranges to transmit and the method for local data buffer storage scheme is:
1) CCN receive act on behalf of that CA sends out there is the request of data for receiving attribute after, which finds and belongs to receiving Property request of data match have publication attribute request of data;
2) CCN where the request of data with publication attribute to match is to publication with the request of data for issuing attribute CA programs send out request, receive and cache corresponding resource;
3) CCN where the request of data with publication attribute to match is by the corresponding resource transmission of caching to step The corresponding caching resource that CCN in 1, the CCN will be received;
4) the corresponding resource cached is sent to by the CCN in the step 1 proposes that there are the data for receiving attribute to ask That asks acts on behalf of CA.
Compared with prior art, the device have the advantages that:
The present invention is that the CA programs operated on user terminal, CCN the and CA&CM servers on backbone network cooperate with each other institute The transmission plan of composition.For each specific message transfer request, if it is publication type transmission request, then internet In CA programs on neighbouring user terminal will nearest operation directly be found over the backbone by method for discovering network topology CCN, and the CA programs resource informations of itself is packaged into publication message piece and is sent to nearest operation over the backbone CCN.It is passed simultaneously if it is type transmission requests such as reception/inquiry/preferences then CA programs generate transmission agency by interaction Also interaction generates the high Primary Transmit agency in bigger regional extent between defeated agency, this process can repeat, so that Convergence generates the highest transmission agency of the message within the scope of a regional network;Transmission agency after convergence is nearest to one The CCN of operation over the backbone proposes transmission request, and utilizes CA&CM server authentications CCN;The CCN of operation over the backbone According to the transmission request received, Query Resource Information request is initiated to other CCN, other CCN run over the backbone summarize Resource information and the transmission agency being sent to after convergence, transmission agency successively forward the data to time first-level agent.By CCN, Transmission agency forms the forwarding structure of application layer under same region, and the present invention is relative to existing transmission method, with lower section Face has significant advantage:
1. since transmission process only has message a small amount of between source server and CCN to need across backbone network, so comparing At random in P2P Node distributions, the case where mass data message interaction is needed across backbone network, this method can substantially reduce backbone The occupancy of net resource is conducive to the overall transfer quality for promoting Internet.
2. due to needing the new equipment introduced there was only the CCN of each region in transmission process, they are cloud computing nodes, can Directly to be rented from cloud service manufacturer, and CCN only needs general bandwidth condition, so CDN in being transmitted compared to CDN Cache server needs the case where ultra high bandwidth, and this method can save a large amount of lower deployment costs.In addition, since this method is in user Between form tree structure, and complete data distribution using tree structure, the uploading bandwidth of user can be made full use of, thus this Method takes full advantage of conventional network resources.
3. in the present invention IP information of each CA program be only retained in it is associated act on behalf of in CA, in data transmission In, the supplier recipient of data can not know the IP address of Data receiver, be effectively protected the privacy information of user, together When transmission process in it is all participate in transmission entities be in balance of power status, there is no advantage imformosome, prevented surging information Body is collected and analyzes the behavior of user preferences, and the privacy of user is greatly protected, and improves network security performance.This transmission Agreement does not interfere with the existing profit models in internets such as advertisement orientation push.Because while list can be analyzed without surging node A user behavior, but CA programs can utilize the attributes preferred information requirement for sending out oneself in message piece it is expected, utilize this The transmission plan of invention, it is same to realize the existing profit models in internets such as orientation push.Since analytic process is for any Single user, so the present invention can't generate harm to the privacy of user.In addition the CA programs of this method, which may be used, increases income Mode discloses source code, and installation is independently compiled by user, prevents the behavior of embedded trojan horse program, effective protection privacy of user.
Description of the drawings
Fig. 1 is system construction drawing --- the operational diagram of whole system of the present invention.In figure, A, B, C, D, E, F, G, H, I, J, K, L, one transmission agency of each symbology.CA 1, CA2 ... CAt, one CA program of each symbology.
Fig. 2 is system construction drawing --- the CA procedural models in same LAN of the present invention.
Fig. 3 is the system construction drawing of the present invention --- act on behalf of CA procedural models under same router.
Fig. 4 is system construction drawing --- the Three Tiered Network Architecture model of the present invention.
Fig. 5 is system construction drawing --- CCN the and CA&CM server distribution figures in Internet of the present invention.
Fig. 6 is that the LAN agency of the present invention generates principle.
Fig. 7 is the discovering network topology principle of the present invention.
Fig. 8 is that the route agent of the present invention generates principle.
Fig. 9 is that the route agent of the present invention identifies the whether legal Handshake Protocol figure of CCN identity.
The message packet format that Figure 10 mutually broadcasts for each CA programs in the LAN of the present invention.
Figure 11 is the LAN Proxy Statement sovereignty message of the present invention.
Figure 12 is the message of other LAN proxy informations of the LAN proxy requests of the present invention.
Figure 13 is the infomational message of other subnet user response LANs agency of the present invention.
Specific implementation mode
The present invention is described in detail below in conjunction with the accompanying drawings.
Key nouns in the present invention are explained as follows:
1) message piece (Message)
The request of data post package that message piece is sent out by the CA programmed acquisition users run on the subscriber terminal forms.This hair It is bright to encapsulate the requests such as the desired data publication/inquiry/reception of the network user using a kind of data structure being referred to as message piece. I.e. request of data is encapsulated into message piece according to fixed message format, and is issued and received in the form of message piece, it Including data attribute have but be not limited only to:Message code, transmission property, number of users, timestamp, description, hotspot designation position, Position and CRLF are acted on behalf of, is described in detail below:Message code is a unified coding, it be for all message sources into A series of codes of row exhaustive division, are generated by CA&CM servers, and can freely be downloaded, and are carried out to all data resources A series of codes of exhaustive division, message piece can be named with affiliated message code;Transmission property has recorded message and is passing Involved action in defeated, including:Publication/reception/inquiry/preference etc., can continue to expand;Number of users refers to for specific Message code, the number of users with the message code in the user interknited;Timestamp is that user generates the message piece At the time of;Description is the datail description to message piece, and the detailed information omitted after message is indicated with code for supplementing;Hot spot mark Will position, for request of data to be marked, and the transmission for optimizing request of data and distributed storage scheme;Act on behalf of position It is a flag bit, for describing whether the request of data produces agency;CRLF is a new line symbol, for indicating one The end of message segment.
In addition, in order to inherit in existing the Internet transmission pattern, publication number is oriented by collecting the access preference of user According to improve the way of user experience, message piece can also include the data attribute that some reflection users access preference.
2) CA programs
CA (chinwag agent) program is connected on the user terminal of internet at each and runs, and receives user's hair The requests such as the news release/reception/inquiry/preference gone out, message piece is packaged by the message of request.Meanwhile CA programs also foundation Other CA programs with identical message code in certain regular related network.It is all in finding network that there is identical disappear After the CA programs for ceasing code, CA electoral machinery is acted on behalf of according in the present invention, is established according to transmission property between these CA programs Information transfer channel, to realize information transformation task.It is necessary to be noted that query task in transmission property will be by CCN is completed by distributed query.
3) route topological hierarchical structure
Internet is made of the network of three levels, is backbone network, regional network and user network composition respectively.Backbone network It is the express network for connecting multiple regions net, Local Area Network is the network of city size grade, and user network then passes through multistage road By device access area network.Three-decker is all of coupled connections using router.User network is in the network topology bottom, largely User is in the LAN of private address composition, passes through a gateway and extraneous network connection, the multistage road of gateway and outer net By connection network consisting routing topology and it is ultimately connected to backbone network, such multistage network topology forms regional network network Structure.Typical region web frame includes core layer, convergence-level and access layer.Core layer provides the height of data for data convergence-level Speed forwarding, interconnects with backbone network.The business that data convergence-level accesses data access layer converges.Access layer provides various types of The access nearby of type user.User then accesses metropolitan area web frame by access layer.
In such a configuration, one or more nets converged by secondary level-1 router are connected to per level-1 router Network has user terminal for various purposes (such as computer, smart mobile phone).For CA programs if necessary to seek in a network Other CA programs with identical message code are looked for, must just penetrate Intranet first, and other CA are looked for using snmp protocol Program simultaneously establishes interconnecting relation, then establishes information transmission mechanism by analyzing respective message code on this basis.
4) transmission mechanism is acted on behalf of
In order to protect privacy of user and promote efficiency of transmission, pass through gateway and router transmission message step by step in CA programs In the process, the present invention is directed to each message code in every primary network station, and an agency is elected according to CA electoral machinery is acted on behalf of CA is assisted we term it CA is acted on behalf of using SNMP for representing all CA programs in this grade of network about this message code View finds acting on behalf of CA and establishing interconnecting relation with identical message code in upper level network.In this engineering, by generation The IP address of the CA programs of reason need not be apprised of in upper level network communication, to protect privacy of user;Data transmission In the process, list is acted on behalf of using CCN and the CA at different levels acted on behalf of in CA, data is successively forwarded, it is final to deliver LAN generation Reason, LAN agency can service a large number of users simultaneously using LAN broadcast or LAN multicast.
5) CA is acted on behalf of
The CA programs that CA acts on behalf of other (other CA other than itself) request of data having the same are acted on behalf of, CA is acted on behalf of The number of users of the program addresses CA information and agency that it is acted on behalf of is recorded in independent request of data stores list, and is created CA acts on behalf of list.Another function of CA programs is inside one LAN of agency or to be connected under the same router Other CA programs with same code message or act on behalf of CA, upward primary network station proposes publication/reception/inquiry/preference etc. Request.When CA programs undertake such factorage, it is referred to as acting on behalf of CA simultaneously.It acts on behalf of CA and may also be referred to as transmission generation Reason, because its major function is responsible for agency's transmission work of data when transmission data.Acting on behalf of CA electoral machinery simultaneously is LAN acts on behalf of electoral machinery and route agent's electoral machinery.
It acts on behalf of CA and is divided into LAN agency and route agent's two types, be summarized as follows.
LAN Agent on behalf all request identical message codes in a local network CA programs, upward primary network station carries Go out information transmission request.CA programs in each LAN are using other operations in LAN broadcast's protocol contact LAN The terminal of CA programs.CA programs analyze the content for the message piece that all CA programs generate jointly, when the message piece of some code is full (such as it is expected that the CA program quantity for executing reception/inquiry reaches some threshold value, will separately arrange), CA journeys when certain requirement enough LAN broadcast can be used to negotiate the LAN agency that the message piece is transmitted in election between sequence.
Route agent is the CA program or agency time level-1 router network of all users of some router connection Act on behalf of in CA, act on behalf of CA according to what certain rule elected, for acting on behalf of above-mentioned CA programs/act on behalf of CA, and use Snmp protocol find upper level network CA programs/act on behalf of CA, establish a communications link, negotiate generate it is more higher leveled act on behalf of CA, Or it establishes and acts on behalf of transmission mechanism.Highest level route agent is used for and secondary level-one route agent CA, CCN and CA&CM server Between communicated.
6) CA acts on behalf of list
CA, which acts on behalf of list and is recorded in, to be acted on behalf of in CA, and for a certain certain types of message, CA institutes are acted on behalf of for recording this Agency secondary first-level agent CA host IP address or LAN in proxied CA IP address and this act on behalf of the upper of CA (purpose is to make CA proxy table simple forms list structure in pairs to the host IP address of first-level agent CA, convenient for acting on behalf of looking into for CA information It looks for).CA, which acts on behalf of list and is only stored in, to be acted on behalf of in CA, and will generate a CA per level-one CA agencies acts on behalf of list.CA acts on behalf of list not Transmission request is submitted to upper level CA agencies or CCN with information segment and pass to upper level host, thus protect user's Privacy information.
7) CCN cloud computing servers
CCN (Confluence Computing Node) cloud computing confluence node server is responsible for the letter on backbone network Breath transmission and distributed storage task.Specially CCN is used to receive interaction and coupling number between the request of data of CA programs, CCN The transimission and storage scheme of a data is generated according to request, cooperation;A CA program, the CA journeys run on CCN are run on CCN It states itself to represent CCN outside ordered pair, CCN receives the data-transformation facility of interaction and CCN between the request of data of CA programs, CCN It is to be carried out by the CA programs run on CCN.
8) CA&CM servers
CA&CM servers (Authentication&Coding Message) be used to generate in the present invention and safeguard The legitimacy of message code and certification CCN servers.
In terms of generating and safeguarding message code, the server by utilizing is artificial or the method for big data analysis, by internet In message carry out classification and coding.When message code generates, the message piece corresponding to the message code is in hotspot designation position It is marked as common message piece;After message code generation, if be no longer somebody's turn to do in network data request within a certain period of time Message code, then the message piece corresponding to the message code be marked as interim message piece in hotspot designation position;In message code It, should if the number for occurring the message code in network data request within a certain period of time is more than the threshold value of setting after generation Message piece corresponding to message code is marked as hot spot message piece in hotspot designation position;It is marked as interim message piece or hot spot Message code corresponding to the message piece of message piece, if occurring the message code and appearance in request of data within a certain period of time Number no more than setting threshold value, then the message piece be marked as common message piece.
In terms of the legitimacy of certification CCN servers, pairs of asymmetric encryption public key is generated in advance on CA&CM servers And private key, legal CCN have the right to obtain private key from CA&CM servers, act on behalf of CA and obtain public key from CA&CM servers, CCN is verified using whether public key and private key match.If CCN certifications do not pass through, CA is acted on behalf of to long-range CA&CM servers Send out alarm.
Fig. 2, Fig. 3, Fig. 4 and Fig. 5 together constitute the system construction drawing of the present invention, self-organizing confluence in internet of the invention Data transmission method basic step it is as follows:Each user terminal of LAN runs a CA program, and CA programs pass through letter Breath acquisition module obtains user and needs the information such as publication/reception/inquiry/preference, and these information and CA&CM servers are defined Message code be packaged into message piece and broadcasted in LAN, be sent to the CA programs of LAN other users;Message piece exists Then message piece interaction between CA programs is generated in CA programs.Multiple CA program pins in LAN disappear to each type Breath piece is summarized, and the message piece of each type is negotiated to generate a LAN agency between CA programs, such to be responsible for Publication/reception/inquiry/preference request task of type message piece;LAN agency, which generates, to be basically described how in a local network The suitable CA for acting on behalf of CA for acting on behalf of all same type of messages in LAN of election one.LAN agency passes through SNMP Protocal analysis local network topology, searches the LAN agency of other subnets under same router, and LAN is mutual between acting on behalf of Negotiate to generate a route agent to be responsible for being directed to publication/reception/inquiry/preference of the message under the router in all-ones subnet Equal request tasks;Route agent generates in each LAN agency basically described how under same router and elects one CA is acted on behalf of for all LANs agency of all same type of messages under agent router and route agent how according to road It is converged and is generated upwards step by step by topological hierarchical structure.Under route topological hierarchical structure, secondary level-one route agent passes through SNMP Agreement, which constantly converges, generates new route agent, eventually finds the CCN of a same operation CA program;Any one is legal CCN can be by a CA&CM server authentication;When route agent finds CCN, the CA of CCN operations states it oneself is one CCN servers, route agent will pass through the legitimacy of the CA&CM server authentications CCN;After being verified, route agent is by institute News release/reception/inquiry/preference request of agency submits to CCN.CCN obtain information describe CCN how with route agent Acquisition of information is completed in communication.The requests such as all news release/reception/inquiry/preferences acquired are gathered together by CCN, The message transimission and storage scheme of optimization is formed between all CCN.CCN is generated between resource map describes CCN and how to be carried out Distributed storage is to generate resource map.Cooperated with CCN by the CA at different levels that act on behalf of, realizes that the transmission that sends and receives of message is appointed Business.Transmission plan generation describes how to complete data transmission procedure using CCN, route agent and LAN agency.
Referring to Fig. 1, the data transmission method of self-organizing confluence in internet of the invention includes the following steps:
1) CA programs are run on each user terminal, and multiple CCN and at least one CA&CM services are set over the backbone Device;
CA programs are for generating request of data, interacting and carry out data transmission;
CCN is used to receive interaction and matched data request, cooperation between the request of data of CA programs, CCN and generates a number According to transimission and storage scheme;A CA program is run on CCN, the CA programs run on CCN externally state that itself is represented It is by being run on CCN that CCN, CCN, which receive the data-transformation facility of interaction and CCN between the request of data of CA programs, CCN, CA programs carry out;
CA&CM servers are for verifying CCN;
2) for the request of data of same type, the CA journeys of the request of data of same type are proposed in the same area network range Elect by interaction between sequence and act on behalf of CA, it is described act on behalf of CA using CA&CM server authentications CCN it is legal after, to a CCN It is proposed its type request of data acted on behalf of;
3) CCN for receiving the type request of data arranges transmission and local data slow according to the transmission request received Deposit scheme;
4) if there is data transfer task, CCN is carried out data transmission by the CA that acts on behalf of to CA programs.Specifically, CCN, which is transferred data to, acts on behalf of CA, acts on behalf of CA and according to CA acts on behalf of CA programs that form finding is acted on behalf of and to CA program distribution numbers According to;If there is Multistage Proxy CA, Ze Gao first-level agents CA acts on behalf of the next stage that form finding is acted on behalf of by CA and acts on behalf of CA, and Downward first-level agent CA distributes data.
Request of data is marked as a specific authentication code, and CA acts on behalf of list using the specific authentication code label Or name;When to CA transmission data are acted on behalf of, the specific authentication code is embedded in data message stem;CA is acted on behalf of to receive When to data message, analysis stem obtains the specific authentication code, and searches corresponding CA according to the specific authentication code Act on behalf of list.
The present invention is made of three parts, including:CA programs, CCN cloud computings confluence node and CA&CM servers.
1.CA programs
In the present invention, each user terminal will run a CA program, and CA program functions include the following:1) message It generates;2) interacting message;3) CA is acted on behalf of to generate and operate;4) mobile terminal identifies.
1.1 message generate
Message generates:1) task is obtained.The CA programs of operation on the client receive the data of user's generation Request task is transmitted, which includes publication, reception and inquiry of information etc..CA programs are usually and browser program The request task that user generates is collected in association.2) information coding.For being obtained for task, according to unified message coding and Message packet format (message coding and message packet format both of which can be downloaded from CA&CM servers) is by message coding Message piece is generated afterwards.
1.2 interacting message
The interacting message of CA programs in same LAN:CA programs utilize LAN broadcast by message piece in same LAN It is sent to other CA programs in LAN.The interacting message of the CA programs of Different LANs:CA programs pass through in one LAN Detection network topology obtains direct-connected in same router or by other a sequence of LAN Informations between multi-stage router, and profit It is established with ICP/IP protocol and connects and carry out interacting message.
1.3, which act on behalf of CA, generates and operates
Act on behalf of the function module that CA is CA.It includes LAN agency and route agent to act on behalf of CA, is respectively used to act on behalf of Under same LAN and same router under identical message type message piece transformation task.Act on behalf of each task packet of CA It includes:1) it creates CA and acts on behalf of list;2) health examination is deleted with CA programs;3) CA programs are newly-increased.
The method that LAN agency generates is as follows:
CA programs generate message piece, and message piece is broadcast to other CA programs in LAN, other CA programs receive It is stored it in the message piece list of itself after broadcast message piece.CA election modules are acted on behalf of there are one inside each CA programs, It acts on behalf of CA election modules to be responsible for checking message piece list in real time, the number of users for counting the message piece with identical message code is total With, when the message piece total number of users of some message code reach some setting threshold value (threshold value can dynamically be set in configuration file Set) after, that acts on behalf of that CA elections module elects the type message piece acts on behalf of CA.It elects after acting on behalf of CA, acts on behalf of CA election modules It creates a subprocess execution and acts on behalf of CA functions.User's request sum that CA has recorded certain type of message piece is acted on behalf of, by it It is recorded in independent message piece storage list.In addition acting on behalf of CA uses all generations in the CA proxy tables unirecord LAN should The CA program informations of message piece.
It is as follows that LAN acts on behalf of generating principle:
Illustrate the principle that LAN agency generates referring now to Fig. 6.1st step, CA programs are first turned on 8124 ports UDP As local area network communication port.2nd step, CA programs obtain user's request.User's request is packaged into message by the 3rd step, CA programs Piece.4th step, CA programs are to one LAN agents query message of LAN broadcast.5th step, CA programs are according to the inquiry of the 4th step As a result determine whether that generated LAN agency is directly acted on behalf of using existing LAN, local if so, executing the 6th step Net is acted on behalf of generation process and is terminated;If not, execute the 7th step, each CA program timings generate a series of message pieces, and by message piece Message is packaged into be broadcasted to LAN.Message is being locally created after CA programs receive the message piece message of broadcast in 8th step Piece list.9th step, CA program timings check whether each message piece is overtime.If it times out, carrying out the 10th step, CA programs Clear up out-of-date message piece.The time-out time needs of message piece carry out dynamic configuration in configuration file.After the completion of cleaning, if There is no any message piece time-out, then carries out the 11st step, check whether the accumulation number of each message piece reaches a certain threshold value immediately, such as Fruit is more than this threshold value (threshold value is set by configuration file), then carries out the 12nd step.Otherwise, the 7th step is returned to.12nd step, A CA program checkouts should become the agency of some message piece to oneself in LAN, then carry out the 13rd step, local area network The message of one statement sovereignty of broadcast.14th step checks local when other CA programs receive the message of a statement sovereignty Whether the CA programs of message piece list, verification statement sovereignty are legal.If illegal, the 15th step is carried out, one is replied and denies Message chooses the LAN agency that CA programs are used as the message piece between CA programs again by majority rule.Such as Fruit is legal, then carries out the 16th step, replys a confirmation message, the success of LAN proxy authentication.CA programs elect LAN agency When, in all same type CA under same LAN, CA programs that the timestamp of message piece is earliest or bandwidth can be selected most Big CA programs, also or the strongest CA programs of process performance are acted on behalf of for LAN, and electoral machinery can be according to real network environment Flexible configuration, as long as areal uses consistent electoral machinery.Timestamp is identical or bandwidth is identical also or place In the case of rationality energy is identical, the CA programs of IP address minimum are selected, are acted on behalf of as LAN.
Route agent generates as follows:
Such as Fig. 3, many LANs are often connected under same router, are a subnet referred to here as each LAN, it is right In certain type of message piece (i.e. the message piece with a certain message code), it is likely to that an agency can be generated in subnet CA.It is exactly that each under same router acts on behalf of and selected in CA under CA programmatic agents this router that route agent, which generates, It is all act on behalf of CA, such CA programs are known as route agent.Route agent, which generates, needs following steps:1) nat port maps: For the LAN using private address, the two-way communication for ensureing intranet host using nat port mapping is needed.2) same routing CA interactions of acting on behalf of under device in each LAN generate route agent.3) route agent of lower layer according to router tree-like hierarchical structure to It converges on upper layer:Route agent searches the all-ones subnet information of high level-1 router using snmp protocol, and is generated more according to step 2 Higher leveled route agent.Route agent is up converged by router tree-like hierarchical structure until finding nearest CCN.If network Router tree-like hierarchical structure be similar to tree structure, then the structure carry out cut operator, become tree structure.
1) nat port maps
For the LAN using publicly-owned address, can directly be communicated with outer net;And for being communicated using private address LAN, due to private address cannot directly public network use, so needing to carry out NAT Intranets port by the way of certain Mapping.Common NAT Intranets, which penetrate scheme, has UDP to burrow or Simple Traversal of UDP Through Network Address Translators, but these methods are required for known to another The server being deployed under public network environment.The present invention uses UPnP protocol.UPnP protocol operation principle:
1. control point and equipment could carry out the work of next step after all first obtaining IP address first;
2. control point first has to find the UPnP device in whole network, while the equipment on network will also declare itself In the presence of;
3. control point will obtain the description of equipment, including which type of service is these equipment provide;
4. control point sends out action message to equipment;
5. the state of control point audiomonitor makes corresponding processing action when state changes;
As soon as can the port mapping of the machine to an outer net port be passed through outer net port+outer net IP by UPnP protocol The mutual access of outer net may be implemented.For using private address LAN, every host by port be sequentially mapped to from 8124 start port range backward.
2) the CA interactions of acting on behalf of under same router in each LAN generate route agent
It include mainly two parts content:1) SNMP discovering network topologies.2) route agent's life based on discovering network topology At.The CA that acts on behalf of in one LAN obtains network topological information using SNMP discovering network topologies, is then based on the net of discovery Network topology acts on behalf of CA and searches other LANs under same router, and carries out interacting message with survival host therein, generates road It is generated by agency.
SNMP discovering network topologies
Illustrate that SNMP discovering network topology processes, this process are based on graph theory BFS search, the 1st step, agency with reference to Fig. 7 Search queue is added in the gateway ip of LAN residing for itself by CA.2nd step judges whether queue is empty, if so, carrying out the 3 steps store network topology structure using graph theory cascade synthesis, terminate.If not, the 4th step is carried out, by head of the queue element (i.e. router IP address) fall out, it is initiated SNMP request.5th step obtains the corresponding subnet information in each outlet of the router, interface Information and direct-connected route-map and mac address information.6th step, and the router that not yet accesses direct-connected with the router BFS search queues are added in ip, are then return to the 2nd step.
Route agent based on discovering network topology generates
Illustrate the flow that route agent generates referring to Fig. 8.1st step disappears when the CA programs in a LAN become When acting on behalf of CA of piece is ceased, CA is acted on behalf of the gateway is read by snmp protocol and connect other LAN Informations;2nd step, this acts on behalf of CA Since 8124 ports, the external public network address of other LANs is detected;3rd step, checks whether detection port survives;If visited It surveys port not survive, then carrying out the 4th step;4th step, port numbers are incremented by 1, return to the 2nd step, continue to detect;If detecting end Mouth survival, then carry out the 5th step;5th step sends a request for acting on behalf of CA for inquiring certain message piece to the port;6th It walks, after survival host receives query message in other LANs, the CA information of acting on behalf of of the demand is returned, CA is acted on behalf of and mutually deposits each other Information;7th step, the information inspection returned according to the 6th step act on behalf of whether CA has generated, CA are acted on behalf of if generated, The 8th step is carried out, the existing CA that acts on behalf of is acted on behalf of into CA as oneself;CA is acted on behalf of if do not generated, carries out the 9th step.9th Step checks whether all other LANs complete by detection;If it is not complete, returning to the 2nd step;If all detection is completed, Carry out the 10th step;10th step, the CA that acts on behalf of of each LAN is broadcasted select all-ones subnet under the router each other under same router General agency, i.e. route agent;If the router and other routers are direct-connected, found by snmp protocol, route generation It manages and cut operator is carried out to the complex network topologies figure of discovery, form typical tree structure, then route agent is by the layer set Secondary structure successively converges, i.e. repeatedly the 1st step to the 10th step, continues to look for new route agent;It is reached after successively converging several times CCN, highest level route agent are communicated with CCN, complete authentication, message transmission and data transmission.
All under same router act on behalf of in CA, the timestamp of message piece it is earliest act on behalf of CA or bandwidth is maximum Act on behalf of CA, also or process performance it is strongest to act on behalf of CA elections be route agent, electoral machinery can be according to the spirit of real network environment Configuration living, as long as areal uses consistent electoral machinery.Timestamp is identical or bandwidth is identical also or processing In the case of performance is identical, select IP address minimum acts on behalf of CA, as route agent.
3) route agent of lower layer converges according to router tree-like hierarchical structure to upper layer
Such as Fig. 4, this is the typical three-layer network framework model of Local Area Network, including core layer, convergence-level and access layer.Phase Hierarchical relationship between adjacent two layers of routing is it is obvious that still lower layer's router often more routers of the first line of a couplet, in this way in routing generation When reason election, lower layer's routing may simultaneously be acted on behalf of by multiple route agents, this is undesirable.A kind of beta pruning is proposed thus Scheme ensures lower layer's router one router of the first line of a couplet when route agent is elected.Assuming that on lower layer's router The accessor collection of connection is combined into { ip1, ip2......ipn, each IP in gathering IP asks 128 information of SHA-1 to pluck It wants, selects minimum one of informative abstract as first line of a couplet router.It can ensure lower layer's router more balancedly first line of a couplet in this way To upper level router.After completing cut operator, network topology can form typical tree structure, act on behalf of and elect according to router Strategy successively generates route agent.After finally converging to the core router of top, route agent and the CCN of top are carried out Interaction.Wherein convergence refer under same router act on behalf of CA by election mechanism select it is new act on behalf of CA, new acts on behalf of CA again It is successively converged upwards by the tree structure of network using identical election mechanism.
It should be noted that if the upper level router B of a router A is connected to multiple and router A peers road By device, then the route agent A lookups of router A are as follows with route agent's process of level router:Route agent A utilizes SNMP Agreement searches a LAN of the subtree that one of them is formed with level router, and detects any survival master in LAN Machine, survival host return to its LAN agency, and LAN agency stores its upper level agency again, therefore according to proxy table The characteristic for the similar doubly linked list singly having can find the routing generation with the router of router A peers using iterative query Reason.
The each task for acting on behalf of CA includes:1) it creates CA and acts on behalf of list;2) health examination is deleted with CA programs;3) CA programs It is newly-increased.
It creates CA and acts on behalf of list
CA, which acts on behalf of list and is recorded in, to be acted on behalf of in CA, and for some specific message, CA institute's generations are acted on behalf of for recording this The host IP address and port of the IP address of the CA programs of reason or secondary first-level agent CA;CA acts on behalf of list while record acts on behalf of CA Upper level act on behalf of the IP address information of CA, a double linked list structure is formed in this way, convenient for subsequently carrying out acting on behalf of the lookup of CA.
Health examination is deleted with CA programs
It acts on behalf of the health examination module timing probe in the CA programs where CA and acts on behalf of the upper level agency of CA and whether survive, If upper level agency is not survived, this, which is acted on behalf of CA and is renegotiated with first-level agent CA with it, generates one and new acts on behalf of CA. With level-one, other act on behalf of CA with it for new CA requests of acting on behalf of, and obtain the new upper level for acting on behalf of CA and act on behalf of CA information, and will be new It acts on behalf of CA information and reports and act on behalf of CA to upper level, upper level acts on behalf of CA updates CA and acts on behalf of list.The health of CA is each acted on behalf of simultaneously Check module also can regular check its agency all secondary first-level agent CA/CA programs, if it find that newly-increased or offline time First-level agent's CA/CA programs, then acting on behalf of CA accordingly increases or delete time first-level agent's CA/CA programs newly in CA acts on behalf of list Information.
CA programs are newly-increased
For newly-increased CA programs, it can send whether broadcast message detects the type of message of its agency to LAN Act on behalf of CA, 1) if it find that existing act on behalf of CA, then newly-increased CA programs act on behalf of generations of the CA as oneself using existing automatically CA is managed, while actively reporting the presence of oneself to acting on behalf of CA, acts on behalf of after CA receives report and adds this CA journey in CA acts on behalf of list Sequence;If 2) do not find to act on behalf of CA, acts on behalf of electoral machinery using LAN and elect and new act on behalf of CA.Then, generation Reason CA has found other LANs being connected in it under same router using the interacting message function of the CA programs of Different LANs Information, and message is searched by survival host interaction route agent thereto, finds and inquires current router to it after route agent Under whether generated route agent, if having generated route agent, act on behalf of CA and send message to the route agent that has generated, Illustrate oneself to be the newly-increased CA that acts on behalf of, the route agent generated increases this information for acting on behalf of CA in CA acts on behalf of list;Such as Fruit does not generate route agent, then being generated newly according to the method for generating route agent in Different LANs under same router Route agent.
1.4 mobile terminals identify
Whether terminal where detecting current CA programs is mobile terminal, if it is then mobile terminal will not become agency CA;Since mobile terminal flow is precious and electricity is relatively low, it should not execute that request of data is intensive, flow consumes big function, so working as There are one mobile terminal identification modules in CA programs, and whether user can be arranged in systems opens mobile agent CA functions, if do not had Have and open mobile agent CA functions, then when detecting current CA programs and being in mobile terminal, this mobile terminal will not become generation Manage CA.If user actively opens mobile agent CA functions, when detecting that current CA programs are in mobile terminal, the movement End, which can also become, acts on behalf of CA.
2.CCN cloud computings confluence node server
On the responsible backbone network of CCN (Confluence Computing Node) cloud computing confluence node server Information is transmitted and distributed storage task.Specially CCN receives the request of data of CA programs, interaction and matched data between CCN Request to generate resource map, between CCN cooperation generate the transimission and storage scheme of a data.Such as Fig. 5, transported on CCN One CA program of row, the CA programs run on CCN externally state itself to represent CCN, CCN receive CA programs request of data, The data-transformation facility of interaction and CCN are carried out by the CA programs run on CCN between CCN.CCN is placed adjacent to On the network network of backbone network, according to the transmission of the structure, Regional Distribution and message of backbone network and distribution character, the present invention needs Arrange a certain number of CCN.
CCN receives the request of data of CA programs
CCN receive CA programs request of data before in order to prevent malicious node pretend to be CCN steal informations, need to CCN into The process of row authentication, such as Fig. 9, CCN authentications is as follows:
1) CA&CM servers generate one group of public key and private key for being used for asymmetric encryption;
2) private key is issued CCN by the connection of CA&CM server by utilizing secret, and route agent downloads from CA&CM servers and corresponds to Public key;
3) route agent generates 128 random numbers using random algorithm, using public key encryption, generates authentication report Text is sent to CCN to be determined.
4) after CCN receives authentication message, encryption information string is extracted, is decrypted using the private key of itself.After decryption, solution Close information generates authentication response message and sends back to route agent, route agent compare the string in response message whether with from The string that oneself generates is consistent.
If 5) consistent, authentication passes through;If inconsistent, do not pass through, and is sent out to long-range CA&CM servers Go out alarm.
Generate resource map
CCN receives the request message piece of the route agent generated by the convergence of message piece, the transmission category in each message piece Property have recorded message involved action in the transmission, including:Publication/reception/inquiry/preference etc..In addition CCN, which can also be received, comes From the publication message piece of the resource producer.CCN stores the message piece with regard near field, all CCN united recordings together The message piece of all areas forms the hum pattern of all resource producers and consumers in CCN in this way.
For the resource producer, they can the Resource Encapsulation of itself storage at the message piece of publication type, and actively with CCN contacts on nearest backbone network, and the message piece for issuing type is sent to CCN, CCN can parse disappearing for distribution pattern Cease piece.Even user terminal is the resource producer, then user terminal is actively contacted by CA programs with CCN, and is sent and provided to CCN Issue request of data in source.Although the resource producer actively contacts with CCN, actually the resource producer exposes itself IP information Too big influence is not had to CCN, because carrying out big data analysis not too big commercial value to the content that releases news, The privacy leakage problem that the resource producer brings without having to worry about big data analysis.
In above-mentioned transmission process, with the letter for carrying out user experience optimization in current internet by accessing the preference of user Breath still can be in some way encapsulated in above-mentioned message segment, but this information is:1) it is by user-driven completely No addition;2) IP address of terminal that user has been concealed in multi-Agent CA transmission processes is believed so as to avoid the secret of user Breath is excessively excavated.
Cooperation generates the transimission and storage scheme of a data:
1) a specific CCN receive act on behalf of that CA sends out there is the request of data for receiving attribute after, the specific CCN By the distributed system that is formed between CCN find with the request of data for receiving attribute match with issuing attribute Request of data;
2) CCN where the request of data with publication attribute to match is to publication with the request of data for issuing attribute CA programs send out request, receive and cache corresponding resource;
3) CCN where the request of data with publication attribute to match is by the corresponding resource transmission of caching to described Specific CCN, the corresponding caching resource that the specific CCN will be received;
4) the corresponding resource cached is sent to the generation for proposing there is the request of data for receiving attribute by the specific CCN Manage CA.
3.CA&CM servers
CA&CM servers (Authentication&Coding Message) be used to generate herein and maintenance disappears Cease code and the legitimacy of certification CCN.
In terms of generating and safeguarding message code, the server by utilizing is artificial or the method for big data analysis, by internet In message carry out classification and coding.The message of coding is divided into 2 classes:1) basic messae, such message code will be permanently effective, generation Most common message in table internet;2) interim message, interim message code generate temporarily for reply special circumstances, such as Over time, no longer there is the interim message of certain code in fruit in network data transmission, which will be labeled, should Label will be used to optimize information transmission and distributed storage scheme.This is realized by the hotspot designation position of message coding, root Transmit that Statistic Analysis obtains according to information in network as a result, transmitting the big message code of flow into rower to current information Note, the transmission for optimizing message and distributed storage scheme.
Pairs of asymmetric encryption secret key can be generated in terms of the legitimacy of certification CCN, on CA&CM servers, CCN has Power logs in CA&CM servers by secret link and obtains private key, when route agent needs to carry out legitimacy certification to CCN, road CA&CM servers can be asked to obtain the corresponding public keys of the CCN by agency, if public key can be matched with private key, CCN recognizes Card passes through;Otherwise, CCN authentification failures.
Act on behalf of transmission mechanism
Resource data directly may be transmitted directly by CA programs, it is also possible to act on behalf of CA auxiliary transmissions by CCN+.Basic principle It is that CA auxiliary transmissions are acted on behalf of by CCN+ when number of requests is very big if directly transmitted by CA programs when number of requests is smaller.Pass through A Cost Model is built, transmission cost, CCN costs and income are considered, to choose optimal transmission mode.Work as receipts It is auxiliary that the value of benefit/(transmission cost+CCN costs) using CCN+ acts on behalf of CA when being higher than a certain threshold value (being set dynamically in configuration file) Help distribution;It is directly transmitted using CA programs when its value is less than threshold value.Wherein income refers to the economic value that data transmission is brought, Transmission cost refers to the cost of consumed resource for acting on behalf of the tree-like distributions of CA, CCN costs refer to configure CCN hardware and bandwidth at This.1) when directly being transmitted using CA programs, Resource consumers scale is smaller, Resource consumers are directly to the CA of the resource producer Program initiates acquisition request resource;2) it when acting on behalf of CA auxiliary transmissions using CCN+, that is, uses and acts on behalf of transmission mechanism:Resources consumption It is the message packet received that person, which generates transmission property, and gradually converges to CCN 1 by generating LAN agency and route agent Place.If having cached the resource data on CCN1, resource data is directly transmitted to route agent by CCN1;If CCN1 does not have Have and cache the resource data, then CCN 1 asks all CCN, searches the resource manufacturer information of related news piece, if it find that Resource information is at CCN2, then CCN1 initiates transmission request to CCN2, if CCN2 stores resource in itself, directly will Resource forwarding is to CCN1;Otherwise, CCN2 initiates to ask to the resource producer, and in CCN2 local caches, while being transmitted to CCN1. CCN1 caches the resource data received, while resource data is transmitted to route agent by CCN1, and route agent receives from resource After the resource data of the producer, according to list is acted on behalf of, by resource, layer proxy CA is sent down for route agent, specially transmission data When data message stem be embedded in a message code, per first-level agent CA receive data when, analysis stem obtain message code, It acts on behalf of CA and list is acted on behalf of according to the corresponding CA of message code lookup, and to secondary first-level agent CA/CA program delivery data, until arriving It is acted on behalf of up to LAN, final LAN agency is responsible for message distribution to Resource consumers.It should be noted that the distribution of resource Process is can be optimized using certain algorithm.
Communication system message format
Illustrate the Primary communication message format used in the present invention below, including LAN CA interprogram communications message format and Intermediate router level communication message format.
LAN agency generates communication message format:
The message packet format that Figure 10 mutually broadcasts for CA programs in the LAN of the present invention.This is that CA programs obtain user It is encapsulated into message piece after the message of generation, and fixed time broadcast is sent to the message of CA programs around.
Figure 11 is the LAN agent broadcast message of the present invention.This is that certain CA program finds that oneself becomes alternative proxy CA When, to the message of LAN other CA programs statement message piece sovereignty.
Route agent generates communication message format:
Figure 12 is that one of the present invention acts on behalf of the message that CA asks other to act on behalf of CA.This is one and acts on behalf of CA searchings with all the way By the request message initiated other subnets CA when other act on behalf of CA under device.
Figure 13 is other sub-network host computer response agent CA infomational messages of the present invention.
The present invention is that the CA programs operated on user terminal, CCN and CA&CM servers cooperate with each other formed transmission Scheme.For each specific message transfer request, the CA programs in internet on neighbouring user terminal will be produced by interaction Its raw transmission agency, the high Primary Transmit that also interaction generates in bigger regional extent between simultaneous transmission is acted on behalf of are acted on behalf of, this process It can repeat, so that convergence generates the highest transmission agency of the message in a backbone network regional extent;Convergence Transmission agency afterwards proposes transmission request to the CCN of an operation over the backbone, and utilizes CA&CM server authentications CCN;Fortune All CCNs of the row in backbone network adaptively arrange transmission and local data buffer storage scheme according to the transmission request received, with Optimize data transmission efficiency;The present invention can be accounted under the premise of not changing existing network framework with lower backbone bandwidth With with realize good transmission performance under lower lower deployment cost, and all nodes for participating in transmission keep balance of power status, pole The big privacy for protecting user.
The present invention connects information publisher and information reception in internet using CA programs, CCN with CA&CM servers Person, while reducing the occupancy of backbone bandwidth using transmission mechanism is acted on behalf of, in addition CCN only needs to rent from cloud service manufacturer, And without the Cloud Server of high bandwidth, therefore the lower deployment cost of the present invention is relatively low.Therefore the present invention can be in lower backbone network Point-to-area/face-to-face transmission is realized under bandwidth occupancy and lower lower deployment cost.At the same time, the present invention is by message transmitting procedure In all participation entities be in balance of power status, prevented surging individual excessively analysis and profit in the transmission of current internet information With the behavior of user's private information, the privacy of user is greatly protected, improves network security performance.

Claims (21)

1. a kind of data transmission method of internet self-organizing confluence, which is characterized in that include the following steps:
1) CA programs are run on each user terminal, and multiple CCN and at least one CA&CM servers are set over the backbone;
CA programs are for generating request of data, interacting and carry out data transmission;
CCN is used to receive interaction and matched data request, cooperation between the request of data of CA programs, CCN and generates data Transimission and storage scheme;A CA program is run on CCN, the CA programs run on CCN are externally stated itself to represent CCN, CCN It is the CA journeys by being run on CCN to receive the data-transformation facility of interaction and CCN between the request of data of CA programs, CCN Sequence carries out;
CA&CM servers are for verifying CCN;
2) for the request of data of same type, proposed in the same area network range the request of data of same type CA programs it Between elect by interaction and act on behalf of CA, it is described act on behalf of CA using CA&CM server authentications CCN it is legal after, proposed to a CCN Its type request of data acted on behalf of;
3) CCN for receiving the type request of data arranges transmission and local data buffer storage side according to the transmission request received Case;
4) if there is data transfer task, CCN is carried out data transmission by the CA that acts on behalf of to CA programs.
2. the data transmission method of internet self-organizing as described in claim 1 confluence, which is characterized in that request of data according to Fixed message format is encapsulated into message piece, and is issued and received in the form of message piece;The data of the message piece Attribute includes message code, transmission property, number of users, timestamp, description, hotspot designation position and acts on behalf of position;
The message code is one that all data resources carried out with exhaustive division that CA&CM servers are generated and can freely be downloaded Series code;
Transmission property is the action involved by request of data, including publication, reception and inquiry;
Number of users is the number of users with the message code in the user interknited;
At the time of timestamp is that user generates the message piece;
Description shows the detailed information omitted after request of data for supplementing with code table;
Hotspot designation position is used to that request of data to be marked, and optimizes transmission and the distributed storage scheme of request of data;
It is a flag bit to act on behalf of position, for describing whether the request of data produces agency.
3. the data transmission method of self-organizing confluence in internet as claimed in claim 2, which is characterized in that the message piece Data attribute further includes attributes preferred, the access preference for recording user.
4. the data transmission method of internet self-organizing as claimed in claim 2 confluence, which is characterized in that the message piece by The request of data post package that the CA programmed acquisition users of operation on the subscriber terminal send out forms.
5. the data transmission method of self-organizing confluence in internet as claimed in claim 2, which is characterized in that produced in message code When raw, the message piece corresponding to the message code is marked as common message piece in hotspot designation position;After message code generation, If no longer there is the message code in network data request within a certain period of time, the message piece corresponding to the message code exists Hotspot designation position is marked as interim message piece;After message code generation, if within a certain period of time in network data request The number for the message code occur is more than the threshold value of setting, then the message piece corresponding to the message code is marked in hotspot designation position It is denoted as hot spot message piece;It is marked as the message code corresponding to the message piece of interim message piece or hot spot message piece, if The number for occurring the message code and appearance in certain time in request of data is not more than the threshold value set, then the message piece is marked It is denoted as common message piece.
6. the data transmission method of self-organizing confluence in internet as described in claim 1, which is characterized in that described to act on behalf of CA generations The CA programs for managing other request of data having the same act on behalf of CA and record it in independent request of data stores list and acted on behalf of The program addresses CA information and agency number of users, and create CA and act on behalf of list.
7. the data transmission method of self-organizing confluence in internet as claimed in claim 6, which is characterized in that described to act on behalf of CA packets Include LAN agency and multistage route agent;
LAN Agent on behalf all request identical datas requests in a local network CA programs, upward primary network station sends out number According to request;
Route agent represents the CA programs of all users of some router connection or secondary level-1 router network acts on behalf of CA, Upward primary network station sends out request of data;
Highest level route agent between secondary level-one route agent CA, CCN and CA&CM server for being communicated.
8. the data transmission method of self-organizing confluence in internet as claimed in claim 7, which is characterized in that LAN agency's Production method is:
CA programs generate request of data, and request of data is broadcast to other CA programs in same LAN, other CA programs The request of data is stored in the request of data list of itself after receiving the request of data of broadcast;Setting inside each CA programs CA elections module of acting on behalf of check request of data list in real time, counted respectively for each request of data and send out identical data and ask The number of users summation asked;After the number of users summation of certain request of data is more than the threshold value of setting, CA election modules are acted on behalf of That elects the request of data acts on behalf of CA;It acts on behalf of CA and creates a subprocess, CA functions are acted on behalf of in execution.
9. the data transmission method of self-organizing confluence in internet as claimed in claim 7, which is characterized in that route agent CA's Production method is:
It is generated in one LAN after LAN acts on behalf of CA, LAN acts on behalf of interactions of the CA by the CA programs of Different LANs Function finds other LAN Informations under same router, and interaction LAN acts on behalf of CA inquiry request of data, obtains it LAN in his LAN acts on behalf of CA information;LAN acts on behalf of CA and acts on behalf of CA foundation connection with other LANs respectively and interact The request of data respectively acted on behalf of acts on behalf of CA according to LAN is elected;
The data that foundation contacts between the secondary level-one route agent CA under same router and interaction is respectively acted on behalf of are connected to ask After asking, the route agent CA of the router is elected.
10. the data transmission method of self-organizing confluence in internet as claimed in claim 9, which is characterized in that if the road of network Tree structure is similar to by device tree-like hierarchical structure, then cut operator is carried out to the structure, becomes tree structure.
11. the data transmission method of self-organizing confluence in internet as claimed in claim 6, which is characterized in that CA acts on behalf of list It is recorded in and acts on behalf of in CA, the host for recording the IP address for acting on behalf of the CA programs that CA is acted on behalf of or secondary first-level agent CA IP address and port;CA acts on behalf of list while record acts on behalf of the upper level of CA and acts on behalf of the IP address information of CA.
12. the data transmission method of self-organizing confluence in internet as claimed in claim 11, which is characterized in that in step 4) In, CCN acts on behalf of the method that CA carries out data transmission to CA programs and is by described:
CCN, which is transferred data to, acts on behalf of CA, acts on behalf of CA and according to CA acts on behalf of CA programs that form finding is acted on behalf of and to CA programs point Send out data;
If there is Multistage Proxy CA, Ze Gao first-level agents CA acts on behalf of the next stage that form finding is acted on behalf of by CA and acts on behalf of CA, And first-level agent CA distributes data downwards.
13. the data transmission method of self-organizing confluence in internet as claimed in claim 12, which is characterized in that request of data quilt Labeled as a specific authentication code, CA acts on behalf of list using the specific authentication code label or name;To acting on behalf of CA When transmitting data, the specific authentication code is embedded in data message stem;CA is acted on behalf of when receiving data message, is analyzed Stem obtains the specific authentication code, and searches corresponding CA according to the specific authentication code and act on behalf of list.
14. the data transmission method of self-organizing confluence in internet as claimed in claim 6, which is characterized in that have in CA programs One health examination module acts on behalf of whether CA survives for regular check CA programs, if detection finds that acting on behalf of CA does not survive, It is so re-elected between CA programs and generates one and new act on behalf of CA;
The health examination module regular check of the CA programs where CA its CA program for being acted on behalf of is acted on behalf of, if acting on behalf of CA finds it It is offline that CA acts on behalf of some CA program in list, then acts on behalf of in list this CA program from CA and delete.
15. the data transmission method of self-organizing confluence in internet as claimed in claim 8, which is characterized in that new in LAN The CA programs of increasing send broadcast message to LAN first and detect whether its request of data sent out acts on behalf of CA:If hair It there is now and act on behalf of CA, then newly-increased CA programs act on behalf of act on behalf of CAs of the CA as oneself using existing automatically, while actively to agency CA reports the presence of oneself, acts on behalf of after CA receives report and adds this CA program in CA acts on behalf of list;If not finding to act on behalf of CA is then elected and is acted on behalf of CA in a local network.
16. the data transmission method of self-organizing confluence in internet as claimed in claim 8, which is characterized in that new acts on behalf of CA After generation, the new CA that acts on behalf of has found to be connected under same router with it using the interacting message function of the CA programs of Different LANs Other LAN Informations, and user terminal into these LANs initiates route agent's CA search requests, finds routing generation After managing CA, inquire whether generated route agent CA under current router to route agent CA, if having generated routing generation CA is managed, the new CA that acts on behalf of sends message to the route agent CA generated, illustrates oneself to be the newly-increased CA that acts on behalf of, the road generated Increase the new information for acting on behalf of CA in CA acts on behalf of list by acting on behalf of CA;If not generating route agent CA, press The method generated according to route agent under same router generates new route agent CA.
17. the data transmission method of self-organizing confluence in internet as claimed in claim 6, which is characterized in that user can set It sets and whether opens mobile agent CA functions, if being not turned on mobile agent CA functions, detect current CA programs and be in shifting When dynamic terminal, this mobile terminal, which will not become, acts on behalf of CA;If user actively opens mobile agent CA functions, detect When current CA programs are in mobile terminal, which, which can also become, acts on behalf of CA.
18. the data transmission method of self-organizing confluence in internet as described in claim 1, which is characterized in that CA&CM servers Verification CCN method be:
Pairs of asymmetric encryption public key and private key are generated in advance on CA&CM servers, legal CCN has the right to take from CA&CM Private key is obtained on business device, CA is acted on behalf of and obtains public key from CA&CM servers, CCN is verified using whether public key and private key match.
19. the data transmission method of self-organizing confluence in internet as claimed in claim 18, which is characterized in that if CCN recognizes Card does not pass through, then acts on behalf of CA and send out alarm to long-range CA&CM servers.
20. the data transmission method of self-organizing confluence in internet as described in claim 1, which is characterized in that if user terminal For the resource producer, then user terminal is actively contacted by CA programs with CCN, and is sent resource to CCN and issued request of data.
21. the data transmission method of self-organizing confluence in internet as described in claim 1, which is characterized in that in step 3), The CCN for receiving the type request of data arranges the side of transmission and local data buffer storage scheme according to the transmission request received Method is:
1) CCN receive act on behalf of that CA sends out there is the request of data for receiving attribute after, the CCN find with receiving attribute The request of data with publication attribute that request of data matches;
2) CA with the CCN where the request of data for issuing attribute to request of data of the publication with publication attribute to match Program sends out request, receives and caches corresponding resource;
3) CCN where the request of data with publication attribute to match is by the corresponding resource transmission of caching in step 1 CCN, the corresponding caching resource which will be received;
4) the corresponding resource cached is sent to by the CCN in the step 1 proposes there is the request of data for receiving attribute Act on behalf of CA.
CN201810489722.6A 2018-05-21 2018-05-21 Data transmission method for internet self-organizing convergence Active CN108718236B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810489722.6A CN108718236B (en) 2018-05-21 2018-05-21 Data transmission method for internet self-organizing convergence

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810489722.6A CN108718236B (en) 2018-05-21 2018-05-21 Data transmission method for internet self-organizing convergence

Publications (2)

Publication Number Publication Date
CN108718236A true CN108718236A (en) 2018-10-30
CN108718236B CN108718236B (en) 2020-08-18

Family

ID=63900170

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810489722.6A Active CN108718236B (en) 2018-05-21 2018-05-21 Data transmission method for internet self-organizing convergence

Country Status (1)

Country Link
CN (1) CN108718236B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110213063A (en) * 2019-06-10 2019-09-06 南京大学 A kind of application layer control system and method suitable for data center network
CN114020207A (en) * 2021-09-06 2022-02-08 西安电子科技大学 Tree structure data insertion method for distributed storage network
CN116233247A (en) * 2023-04-25 2023-06-06 合肥智鼎科技服务有限公司 Data transmission processing system with preprocessing performance
CN116319111A (en) * 2023-05-24 2023-06-23 北京中超伟业信息安全技术股份有限公司 Data chain transmission method and system based on evolutionary algorithm

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102075444A (en) * 2011-02-28 2011-05-25 北京邮电大学 Network system and method for guaranteeing multi-type service quality
CN102308532A (en) * 2009-05-21 2012-01-04 华为终端有限公司 Method, system and server for processing point to multi-point push message
CN102647335A (en) * 2011-02-22 2012-08-22 中国移动通信集团公司 Data routing method, device and system
CN104158891A (en) * 2014-08-21 2014-11-19 腾讯科技(深圳)有限公司 Method, device and system of cross-regional data transmission, and server
US20140379817A1 (en) * 2013-06-25 2014-12-25 Nest Labs, Inc. Fabric network
CN106031118A (en) * 2013-11-11 2016-10-12 阿道罗姆股份有限公司 Cloud service security broker and proxy
CN106101055A (en) * 2016-04-29 2016-11-09 乐视控股(北京)有限公司 The data access method of a kind of multiple database and system thereof and proxy server
CN106331175A (en) * 2016-10-27 2017-01-11 苏州云融信息技术有限公司 Cloud AP (access point) oriented multi-control proxy unified management system and method

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102308532A (en) * 2009-05-21 2012-01-04 华为终端有限公司 Method, system and server for processing point to multi-point push message
CN102647335A (en) * 2011-02-22 2012-08-22 中国移动通信集团公司 Data routing method, device and system
CN102075444A (en) * 2011-02-28 2011-05-25 北京邮电大学 Network system and method for guaranteeing multi-type service quality
US20140379817A1 (en) * 2013-06-25 2014-12-25 Nest Labs, Inc. Fabric network
CN106031118A (en) * 2013-11-11 2016-10-12 阿道罗姆股份有限公司 Cloud service security broker and proxy
CN104158891A (en) * 2014-08-21 2014-11-19 腾讯科技(深圳)有限公司 Method, device and system of cross-regional data transmission, and server
CN106101055A (en) * 2016-04-29 2016-11-09 乐视控股(北京)有限公司 The data access method of a kind of multiple database and system thereof and proxy server
CN106331175A (en) * 2016-10-27 2017-01-11 苏州云融信息技术有限公司 Cloud AP (access point) oriented multi-control proxy unified management system and method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
顾建伟: "《代理集群服务质量和负载均衡系统的设计与实现》", 《中国优秀硕士学位论文全文数据库(电子期刊),信息科技辑》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110213063A (en) * 2019-06-10 2019-09-06 南京大学 A kind of application layer control system and method suitable for data center network
CN110213063B (en) * 2019-06-10 2020-09-18 南京大学 Application layer multicast system and method suitable for data center network
CN114020207A (en) * 2021-09-06 2022-02-08 西安电子科技大学 Tree structure data insertion method for distributed storage network
CN116233247A (en) * 2023-04-25 2023-06-06 合肥智鼎科技服务有限公司 Data transmission processing system with preprocessing performance
CN116319111A (en) * 2023-05-24 2023-06-23 北京中超伟业信息安全技术股份有限公司 Data chain transmission method and system based on evolutionary algorithm
CN116319111B (en) * 2023-05-24 2023-08-01 北京中超伟业信息安全技术股份有限公司 Data chain transmission method and system based on evolutionary algorithm

Also Published As

Publication number Publication date
CN108718236B (en) 2020-08-18

Similar Documents

Publication Publication Date Title
CN108718236A (en) The data transmission method of internet self-organizing confluence
CN101595688B (en) Private virtual LAN spanning a public network for connection of arbitrary hosts
Dunkels et al. Connecting wireless sensornets with TCP/IP networks
EP1703701B1 (en) APIs to build peer to peer messaging applications
CN104518967B (en) Method for routing, equipment and system
Alderson et al. The many facets of internet topology and traffic
CN101309301A (en) Peer-to-peer communication system and method
Jia et al. The collaboration for content delivery and network infrastructures: A survey
CN106936811A (en) Safety means, system and method
CN106105164A (en) Agent intercepts
CN104408777B (en) Internet attendance management system and method based on P2P communication realized by NAT traversal
Jacobsen et al. Infrastructure for intelligent automation services in the smart grid
CN101365014B (en) Distributed adaptive listening system, generation and monitor control method
CN107733686A (en) A kind of method of double optimization communication path in anonymous communication system and communication process
Nazaralipoorsoomali et al. Performance improvement of routing protocol for low‐power and lossy networks protocol in an internet of things‐based smart retail system
Song et al. Exploring Reliable Decentralized Networks with Smart Collaborative Theory
CN100591024C (en) Mobile access controller, mobile locak area network and metropolitan area network, and access method
WO2019180526A1 (en) Systems and methods for random differential relay and network coding
CN102387062A (en) Method for improving transmission rate of peer-to-peer (p2p) node in crossing network by dynamic bridging contact
Kong et al. Let your cyberalter ego share information and manage spam
Chuchico-Arcos et al. Sensor nodes and communication protocols of the internet of things applied to intelligent agriculture
CN102088399B (en) Flow control method of peer-to-peer (P2P) network, routing equipment and communication system
Kärkkäinen et al. Applications in Delay‐Tolerant and Opportunistic Networks
Ahmed et al. Implementation of Internet of Things (IoT) based on IPv6 over wireless sensor networks
CN102714664B (en) data sharing method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant