CN108718236A - The data transmission method of internet self-organizing confluence - Google Patents
The data transmission method of internet self-organizing confluence Download PDFInfo
- Publication number
- CN108718236A CN108718236A CN201810489722.6A CN201810489722A CN108718236A CN 108718236 A CN108718236 A CN 108718236A CN 201810489722 A CN201810489722 A CN 201810489722A CN 108718236 A CN108718236 A CN 108718236A
- Authority
- CN
- China
- Prior art keywords
- behalf
- data
- request
- ccn
- acts
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/302—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/568—Storing data temporarily at an intermediate stage, e.g. caching
Abstract
The data transmission method of internet self-organizing confluence, for each specific message transfer request, CA programs in internet on neighbouring user terminal will generate its transmission agency by interaction, also interaction generates the high Primary Transmit agency in bigger regional extent between simultaneous transmission agency, this process can repeat, so that convergence generates the highest transmission agency of the message in a backbone network regional extent;Transmission agency after convergence proposes transmission request to the CCN of an operation over the backbone, and utilizes CA&CM server authentications CCN;All CCN operated in backbone network adaptively arrange transmission and local data buffer storage scheme according to the transmission request received, optimize data transmission efficiency;Under the premise of not changing existing network framework, is occupied with lower backbone bandwidth and realize good transmission performance under lower lower deployment cost, and all nodes for participating in transmission keep balance of power status, greatly protect the privacy of user.
Description
Technical field
The present invention relates to a kind of to converge by Ad hoc mode and optimize the data stream transmitting of point-to-multipoint/multi-multipoint
Tissue and implementation method, and in particular to a kind of data transmission method of internet self-organizing confluence.
Background technology
All kinds of computing terminals that internet will be distributed over different zones in world wide link together, and pass through IP agreement reality
Communication between existing any two terminal.Although the communication of terminal room is mainly carried out in a manner of point-to-point on internet,
In practical application, the propagation of information in most of internet be in the form of point-to-area (point-to-multipoint) existing for.Such as:People
Like accessing hot spot website, watch video and news, shopping, to release news from media mode to good friend or follower, and
Commercial activity, etc. on the internets such as advertisement orientation publication.With the rapid development of electronic information technology, internet has been at present
Through being almost connected into different majors equipment and the large number of personal electric consumer goods terminal of all industries, produce daily
Give birth to astronomical data traffic.
On the basis of the point to point protocol transmitted based on IP packets, realize that point-to-area transmission can have efficiency of transmission and ask
Topic, such as:Information is from some terminal, when being transmitted to multiple reception terminals, if multiple receiving terminals be in same area,
Or it is received in different time, the wasting phenomenon that will all cause information transmission that can reuse Internet resources.Therefore, it studies and opens
It sends out point-to-area transport protocol efficient, is always the hot issue in interconnected communication technology.
Existing point-to-area agreement transport protocol has the modes such as ip multicast, P2P and CDN.Ip multicast passes through QoS routing
Device is replicated and is forwarded to data packet, ensures data packet all transmission primaries in each of the links, can be very good to reduce band
Width consumption, however ip multicast has to the support of multicast router, most of routers are not multicast roads on internet at present
By device;Multicast transmission is unreliable, once some receiving terminal data-bag lost, needs source to retransmit, other receiving terminals can also be again
Data packet is received, inefficiency is caused;In addition any safety verification is not supported in multicast, is not suitable for safe communication.
P2P (Peer to Peer) is a kind of point to point protocol, all node status equalitys, and a certain biography is completed in collaboration
Defeated task.For P2P in the case where Node distribution is not concentrated, backbone network is largely crossed in transmission, is easily caused backbone network congestion while being dropped
Low transmission rate.Statistical data shows that the bandwidth early in internet in 2004 40% has occupied (Parker by P2P programs
A.The True Picture of Peer-to-Peer File sharing[J].2004,4(5):55-60.), in 2006
70% bandwidth is occupied that (Ou Yangrong, thunder shake the research of bright .BitTorrent types P2P system models by P2P programs in internet
With performance evaluation [J] Beijing University of Post & Telecommunications journal, 2006,29 (z2):113-117.), so P2P programs are widely used just
Precious backbone bandwidth resource is gradually swallowed, the transmission of the data of other business of internet is endangered.
CDN (Content Delivery Network), will be a certain by largely disposing cache server in network edge
The request of zone user is redirected to identical cache server to reduce the pressure of backbone network.This transmission mode needs in portion
The a large amount of high performance CDN cache servers of administration, so needing a large amount of expensive hardware resources.Simultaneously in a certain range, CDN bands
Wider, service performance is better, so in order to provide good service, CDN needs massive band width resource, which in turns increases
The lower deployment cost of CDN.When in addition being transmitted using CDN modes, user directly obtains data, user and use from CDN cache servers
Any data exchange is not present between family, so CDN modes are there is no the uploading bandwidth for utilizing user, this is to existing resource
Waste.
In addition to this, in the transmission of the information on existing internetworking point opposite, the information safety protection of user is one tight
Weight problem.First, information source terminal (website) is often it is well known that user accesses information source by this Given information
Website, for example user logs in some specific webpage by browser or user accesses the website by client-side program
Resource.No matter the request of which kind of mode user always pools together, and by special server set group records and processing.Due to
IP address it is direct-connected, the address information of oneself is directly exposed to server cluster by user, and server cluster is deposited by big data
The request of mass users is stored up, and by the behavior of the means analysis single user such as data mining, social network analysis, is obtained single
The privacy information of user.Secondly, there is information source terminal powerful information search ability, information source terminal can pass through some hands
Section grasps a large number of users information, such as a large amount of client-side program of user installation, and code is not open and clear, these clients
There may be eavesdropping programs for program, spy upon privacy of user and send information source terminal to, information source terminal can grasp user's
Private information.Above-mentioned two aspect all illustrates that the information on internet provides source terminal and has great ability, is received for information
Person has asymmetric Information Superiority, and it is impaired that this also means that the interests of information receiving terminal user in internet communication are easy.
Invention content
There are above-mentioned problems for multi-party transport protocols such as existing internetworking point opposites, the purpose of the present invention is to propose to
A kind of data transmission method of internet self-organizing confluence.
To achieve the above object, the technical solution adopted by the present invention is as follows:
A kind of data transmission method of internet self-organizing confluence, includes the following steps:
1) CA programs are run on each user terminal, and multiple CCN and at least one CA&CM services are set over the backbone
Device;
CA programs are for generating request of data, interacting and carry out data transmission;
CCN is used to receive interaction and matched data request, cooperation between the request of data of CA programs, CCN and generates a number
According to transimission and storage scheme;A CA program is run on CCN, the CA programs run on CCN externally state that itself is represented
It is by being run on CCN that CCN, CCN, which receive the data-transformation facility of interaction and CCN between the request of data of CA programs, CCN,
CA programs carry out;
CA&CM servers are for verifying CCN;
2) for the request of data of same type, the CA journeys of the request of data of same type are proposed in the same area network range
Elect by interaction between sequence and act on behalf of CA, it is described act on behalf of CA using CA&CM server authentications CCN it is legal after, to a CCN
It is proposed its type request of data acted on behalf of;
3) CCN for receiving the type request of data arranges transmission and local data slow according to the transmission request received
Deposit scheme;
4) if there is data transfer task, CCN is carried out data transmission by the CA that acts on behalf of to CA programs.
It further improves and is in the present invention, request of data is encapsulated into message piece according to fixed message format, and
It is issued and is received in the form of message piece;The data attribute of the message piece includes message code, transmission property, number of users
Amount, timestamp, description, hotspot designation position and act on behalf of position;
The message code is that CA&CM servers generate and what can freely be downloaded carries out exhaustive division to all data resources
A series of codes;
Transmission property is the action involved by request of data, including publication, reception and inquiry;
Number of users is the number of users with the message code in the user interknited;
At the time of timestamp is that user generates the message piece;
Description shows the detailed information omitted after request of data for supplementing with code table;
Hotspot designation position is used to that request of data to be marked, and optimizes transmission and the distributed storage side of request of data
Case;
It is a flag bit to act on behalf of position, for describing whether the request of data produces agency.
It further improves and is in the present invention, the data attribute of the message piece further includes attributes preferred, for recording
The access preference of user.
It further improves and is in the present invention, the message piece is by running CA programmed acquisition users on the subscriber terminal
The request of data post package sent out forms.
It further improves and is in the present invention, when message code generates, the message piece corresponding to the message code exists
Hotspot designation position is marked as common message piece;After message code generation, if within a certain period of time in network data request
No longer there is the message code, then the message piece corresponding to the message code is marked as interim message piece in hotspot designation position;
After message code generation, if the number for occurring the message code in network data request within a certain period of time is more than setting
Threshold value, then the message piece corresponding to the message code be marked as hot spot message piece in hotspot designation position;It is marked as disappearing temporarily
The message code corresponding to the message piece of piece or hot spot message piece is ceased, if occurring the message in request of data within a certain period of time
Code and the number of appearance are not more than the threshold value of setting, then the message piece is marked as common message piece.
It further improves and is in the present invention, the CA journeys acted on behalf of CA and act on behalf of other request of data having the same
Sequence acts on behalf of the number of users that CA records the program addresses CA information and agency that it is acted on behalf of in independent request of data stores list
Amount, and create CA and act on behalf of list.
It further improves and is in the present invention, the CA that acts on behalf of includes LAN agency and multistage route agent;
LAN Agent on behalf all request identical datas requests in a local network CA programs, upward primary network station hair
Go out request of data;
Route agent represents the CA programs of all users of some router connection or the generation of secondary level-1 router network
CA is managed, upward primary network station sends out request of data;
Highest level route agent between secondary level-one route agent CA, CCN and CA&CM server for being led to
News.
It further improves and is in the present invention, the production method of LAN agency is:
CA programs generate request of data, and request of data is broadcast to other CA programs in same LAN, other CA
The request of data is stored in after receiving the request of data of broadcast in the request of data list of itself by program;Inside each CA programs
The CA elections module of acting on behalf of being arranged checks request of data list in real time, is counted respectively for each request of data and sends out identical number
According to the number of users summation of request;After the number of users summation of certain request of data is more than the threshold value of setting, CA elections are acted on behalf of
What module elected the request of data acts on behalf of CA;It acts on behalf of CA and creates a subprocess, CA functions are acted on behalf of in execution.
It further improves and is in the present invention, the production method of route agent CA is:
It is generated in one LAN after LAN acts on behalf of CA, LAN acts on behalf of CA and passes through the CA programs of Different LANs
Interactive function finds other LAN Informations under same router, and interaction LAN acts on behalf of CA inquiry request of data, obtains
The LAN obtained in other LANs acts on behalf of CA information;LAN acts on behalf of CA and acts on behalf of CA foundation connection with other LANs respectively simultaneously
The request of data that interaction is respectively acted on behalf of, CA is acted on behalf of according to LAN is elected;
It is connected to and establishes the number that contact and interaction are respectively acted on behalf of between the secondary level-one route agent CA under same router
After request, the route agent CA of the router is elected.
It further improves and is in the present invention, if the router tree-like hierarchical structure of network is similar to tree structure,
Cut operator is carried out to the structure, becomes tree structure.
It further improves and is in the present invention, CA, which acts on behalf of list and is recorded in, to be acted on behalf of in CA, and CA is acted on behalf of for recording this
The host IP address and port of the IP address for the CA programs acted on behalf of or secondary first-level agent CA;CA acts on behalf of list while recording generation
The upper level of reason CA acts on behalf of the IP address information of CA.
It further improves and is in the present invention, in step 4), CCN carries out data by the CA that acts on behalf of to CA programs
The method of transmission is:
CCN, which is transferred data to, acts on behalf of CA, acts on behalf of CA and according to CA acts on behalf of CA programs that form finding is acted on behalf of and to CA journeys
Sequence distributes data;
If there is Multistage Proxy CA, Ze Gao first-level agents CA acts on behalf of the next stage that form finding is acted on behalf of by CA and acts on behalf of
CA, and first-level agent CA distributes data downwards.
It further improves and is in the present invention, request of data is marked as a specific authentication code, CA proxy tables
It is single to mark or name using the specific authentication code;When to CA transmission data are acted on behalf of, one is embedded in data message stem
The specific authentication code;CA is acted on behalf of when receiving data message, analysis stem obtains the specific authentication code, and according to this
Specific authentication code searches corresponding CA and acts on behalf of list.
It further improves and is in the present invention, there are one health examination modules in CA programs, are used for regular check CA journeys
Sequence acts on behalf of whether CA survives, if detection finds that acting on behalf of CA does not survive, it is new that generation one is re-elected between CA programs
Act on behalf of CA;
The health examination module regular check of the CA programs where CA its CA program for being acted on behalf of is acted on behalf of, if acting on behalf of CA hairs
It is offline that its existing CA acts on behalf of some CA program in list, then acts on behalf of in list this CA program from CA and delete.
It further improves and is in the present invention, the CA programs increased newly in LAN send to LAN broadcast the message first
Detect whether the request of data that it sends out acts on behalf of CA:If it find that existing act on behalf of CA, then newly-increased CA programs automatically will
It is existing to act on behalf of act on behalf of CAs of the CA as oneself, while actively reporting the presence of oneself to acting on behalf of CA, it acts on behalf of after CA receives report
This CA program is added in CA acts on behalf of list;If not finding to act on behalf of CA, elects act on behalf of CA in a local network.
It further improves and is in the present invention, new to act on behalf of after CA generates, new acts on behalf of CA using Different LANs
The interacting message function discovery of CA programs is connected in other LAN Informations under same router with it, and into these LANs
User terminal initiate route agent CA search requests, after finding route agent CA, current router is inquired to route agent CA
Under whether generated route agent CA, if having generated route agent CA, new acts on behalf of CA to the route agent generated
CA sends message, illustrates oneself to be the newly-increased CA that acts on behalf of, and the route agent CA generated increases described new in CA acts on behalf of list
The information for acting on behalf of CA;If not generating route agent CA, according to the method for route agent's generation under same router
Generate new route agent CA.
It further improves and is in the present invention, whether user can be arranged opens mobile agent CA functions, if do not had
Mobile agent CA functions are opened, then when detecting current CA programs and being in mobile terminal, this mobile terminal will not become agency
CA;If user actively opens mobile agent CA functions, when detecting that current CA programs are in mobile terminal, the mobile terminal
Also it can become and act on behalf of CA.
It further improves and is in the present invention, the method for CA&CM server authentications CCN is:
Pairs of asymmetric encryption public key and private key are generated in advance on CA&CM servers, legal CCN has the right from CA&
Private key is obtained on CM servers, CA is acted on behalf of and obtains public key from CA&CM servers, is verified using whether public key and private key match
CCN。
It further improves and is in the present invention, if CCN certifications do not pass through, act on behalf of CA and serviced to long-range CA&CM
Device sends out alarm.
It further improves and is in the present invention, if user terminal is the resource producer, user terminal actively passes through CA
Program is contacted with CCN, and is sent resource to CCN and issued request of data.
Further improve and be in the present invention, in step 3), receive the CCN of the type request of data according to
The transmission request received arranges to transmit and the method for local data buffer storage scheme is:
1) CCN receive act on behalf of that CA sends out there is the request of data for receiving attribute after, which finds and belongs to receiving
Property request of data match have publication attribute request of data;
2) CCN where the request of data with publication attribute to match is to publication with the request of data for issuing attribute
CA programs send out request, receive and cache corresponding resource;
3) CCN where the request of data with publication attribute to match is by the corresponding resource transmission of caching to step
The corresponding caching resource that CCN in 1, the CCN will be received;
4) the corresponding resource cached is sent to by the CCN in the step 1 proposes that there are the data for receiving attribute to ask
That asks acts on behalf of CA.
Compared with prior art, the device have the advantages that:
The present invention is that the CA programs operated on user terminal, CCN the and CA&CM servers on backbone network cooperate with each other institute
The transmission plan of composition.For each specific message transfer request, if it is publication type transmission request, then internet
In CA programs on neighbouring user terminal will nearest operation directly be found over the backbone by method for discovering network topology
CCN, and the CA programs resource informations of itself is packaged into publication message piece and is sent to nearest operation over the backbone
CCN.It is passed simultaneously if it is type transmission requests such as reception/inquiry/preferences then CA programs generate transmission agency by interaction
Also interaction generates the high Primary Transmit agency in bigger regional extent between defeated agency, this process can repeat, so that
Convergence generates the highest transmission agency of the message within the scope of a regional network;Transmission agency after convergence is nearest to one
The CCN of operation over the backbone proposes transmission request, and utilizes CA&CM server authentications CCN;The CCN of operation over the backbone
According to the transmission request received, Query Resource Information request is initiated to other CCN, other CCN run over the backbone summarize
Resource information and the transmission agency being sent to after convergence, transmission agency successively forward the data to time first-level agent.By CCN,
Transmission agency forms the forwarding structure of application layer under same region, and the present invention is relative to existing transmission method, with lower section
Face has significant advantage:
1. since transmission process only has message a small amount of between source server and CCN to need across backbone network, so comparing
At random in P2P Node distributions, the case where mass data message interaction is needed across backbone network, this method can substantially reduce backbone
The occupancy of net resource is conducive to the overall transfer quality for promoting Internet.
2. due to needing the new equipment introduced there was only the CCN of each region in transmission process, they are cloud computing nodes, can
Directly to be rented from cloud service manufacturer, and CCN only needs general bandwidth condition, so CDN in being transmitted compared to CDN
Cache server needs the case where ultra high bandwidth, and this method can save a large amount of lower deployment costs.In addition, since this method is in user
Between form tree structure, and complete data distribution using tree structure, the uploading bandwidth of user can be made full use of, thus this
Method takes full advantage of conventional network resources.
3. in the present invention IP information of each CA program be only retained in it is associated act on behalf of in CA, in data transmission
In, the supplier recipient of data can not know the IP address of Data receiver, be effectively protected the privacy information of user, together
When transmission process in it is all participate in transmission entities be in balance of power status, there is no advantage imformosome, prevented surging information
Body is collected and analyzes the behavior of user preferences, and the privacy of user is greatly protected, and improves network security performance.This transmission
Agreement does not interfere with the existing profit models in internets such as advertisement orientation push.Because while list can be analyzed without surging node
A user behavior, but CA programs can utilize the attributes preferred information requirement for sending out oneself in message piece it is expected, utilize this
The transmission plan of invention, it is same to realize the existing profit models in internets such as orientation push.Since analytic process is for any
Single user, so the present invention can't generate harm to the privacy of user.In addition the CA programs of this method, which may be used, increases income
Mode discloses source code, and installation is independently compiled by user, prevents the behavior of embedded trojan horse program, effective protection privacy of user.
Description of the drawings
Fig. 1 is system construction drawing --- the operational diagram of whole system of the present invention.In figure, A, B, C, D, E, F, G, H, I,
J, K, L, one transmission agency of each symbology.CA 1, CA2 ... CAt, one CA program of each symbology.
Fig. 2 is system construction drawing --- the CA procedural models in same LAN of the present invention.
Fig. 3 is the system construction drawing of the present invention --- act on behalf of CA procedural models under same router.
Fig. 4 is system construction drawing --- the Three Tiered Network Architecture model of the present invention.
Fig. 5 is system construction drawing --- CCN the and CA&CM server distribution figures in Internet of the present invention.
Fig. 6 is that the LAN agency of the present invention generates principle.
Fig. 7 is the discovering network topology principle of the present invention.
Fig. 8 is that the route agent of the present invention generates principle.
Fig. 9 is that the route agent of the present invention identifies the whether legal Handshake Protocol figure of CCN identity.
The message packet format that Figure 10 mutually broadcasts for each CA programs in the LAN of the present invention.
Figure 11 is the LAN Proxy Statement sovereignty message of the present invention.
Figure 12 is the message of other LAN proxy informations of the LAN proxy requests of the present invention.
Figure 13 is the infomational message of other subnet user response LANs agency of the present invention.
Specific implementation mode
The present invention is described in detail below in conjunction with the accompanying drawings.
Key nouns in the present invention are explained as follows:
1) message piece (Message)
The request of data post package that message piece is sent out by the CA programmed acquisition users run on the subscriber terminal forms.This hair
It is bright to encapsulate the requests such as the desired data publication/inquiry/reception of the network user using a kind of data structure being referred to as message piece.
I.e. request of data is encapsulated into message piece according to fixed message format, and is issued and received in the form of message piece, it
Including data attribute have but be not limited only to:Message code, transmission property, number of users, timestamp, description, hotspot designation position,
Position and CRLF are acted on behalf of, is described in detail below:Message code is a unified coding, it be for all message sources into
A series of codes of row exhaustive division, are generated by CA&CM servers, and can freely be downloaded, and are carried out to all data resources
A series of codes of exhaustive division, message piece can be named with affiliated message code;Transmission property has recorded message and is passing
Involved action in defeated, including:Publication/reception/inquiry/preference etc., can continue to expand;Number of users refers to for specific
Message code, the number of users with the message code in the user interknited;Timestamp is that user generates the message piece
At the time of;Description is the datail description to message piece, and the detailed information omitted after message is indicated with code for supplementing;Hot spot mark
Will position, for request of data to be marked, and the transmission for optimizing request of data and distributed storage scheme;Act on behalf of position
It is a flag bit, for describing whether the request of data produces agency;CRLF is a new line symbol, for indicating one
The end of message segment.
In addition, in order to inherit in existing the Internet transmission pattern, publication number is oriented by collecting the access preference of user
According to improve the way of user experience, message piece can also include the data attribute that some reflection users access preference.
2) CA programs
CA (chinwag agent) program is connected on the user terminal of internet at each and runs, and receives user's hair
The requests such as the news release/reception/inquiry/preference gone out, message piece is packaged by the message of request.Meanwhile CA programs also foundation
Other CA programs with identical message code in certain regular related network.It is all in finding network that there is identical disappear
After the CA programs for ceasing code, CA electoral machinery is acted on behalf of according in the present invention, is established according to transmission property between these CA programs
Information transfer channel, to realize information transformation task.It is necessary to be noted that query task in transmission property will be by
CCN is completed by distributed query.
3) route topological hierarchical structure
Internet is made of the network of three levels, is backbone network, regional network and user network composition respectively.Backbone network
It is the express network for connecting multiple regions net, Local Area Network is the network of city size grade, and user network then passes through multistage road
By device access area network.Three-decker is all of coupled connections using router.User network is in the network topology bottom, largely
User is in the LAN of private address composition, passes through a gateway and extraneous network connection, the multistage road of gateway and outer net
By connection network consisting routing topology and it is ultimately connected to backbone network, such multistage network topology forms regional network network
Structure.Typical region web frame includes core layer, convergence-level and access layer.Core layer provides the height of data for data convergence-level
Speed forwarding, interconnects with backbone network.The business that data convergence-level accesses data access layer converges.Access layer provides various types of
The access nearby of type user.User then accesses metropolitan area web frame by access layer.
In such a configuration, one or more nets converged by secondary level-1 router are connected to per level-1 router
Network has user terminal for various purposes (such as computer, smart mobile phone).For CA programs if necessary to seek in a network
Other CA programs with identical message code are looked for, must just penetrate Intranet first, and other CA are looked for using snmp protocol
Program simultaneously establishes interconnecting relation, then establishes information transmission mechanism by analyzing respective message code on this basis.
4) transmission mechanism is acted on behalf of
In order to protect privacy of user and promote efficiency of transmission, pass through gateway and router transmission message step by step in CA programs
In the process, the present invention is directed to each message code in every primary network station, and an agency is elected according to CA electoral machinery is acted on behalf of
CA is assisted we term it CA is acted on behalf of using SNMP for representing all CA programs in this grade of network about this message code
View finds acting on behalf of CA and establishing interconnecting relation with identical message code in upper level network.In this engineering, by generation
The IP address of the CA programs of reason need not be apprised of in upper level network communication, to protect privacy of user;Data transmission
In the process, list is acted on behalf of using CCN and the CA at different levels acted on behalf of in CA, data is successively forwarded, it is final to deliver LAN generation
Reason, LAN agency can service a large number of users simultaneously using LAN broadcast or LAN multicast.
5) CA is acted on behalf of
The CA programs that CA acts on behalf of other (other CA other than itself) request of data having the same are acted on behalf of, CA is acted on behalf of
The number of users of the program addresses CA information and agency that it is acted on behalf of is recorded in independent request of data stores list, and is created
CA acts on behalf of list.Another function of CA programs is inside one LAN of agency or to be connected under the same router
Other CA programs with same code message or act on behalf of CA, upward primary network station proposes publication/reception/inquiry/preference etc.
Request.When CA programs undertake such factorage, it is referred to as acting on behalf of CA simultaneously.It acts on behalf of CA and may also be referred to as transmission generation
Reason, because its major function is responsible for agency's transmission work of data when transmission data.Acting on behalf of CA electoral machinery simultaneously is
LAN acts on behalf of electoral machinery and route agent's electoral machinery.
It acts on behalf of CA and is divided into LAN agency and route agent's two types, be summarized as follows.
LAN Agent on behalf all request identical message codes in a local network CA programs, upward primary network station carries
Go out information transmission request.CA programs in each LAN are using other operations in LAN broadcast's protocol contact LAN
The terminal of CA programs.CA programs analyze the content for the message piece that all CA programs generate jointly, when the message piece of some code is full
(such as it is expected that the CA program quantity for executing reception/inquiry reaches some threshold value, will separately arrange), CA journeys when certain requirement enough
LAN broadcast can be used to negotiate the LAN agency that the message piece is transmitted in election between sequence.
Route agent is the CA program or agency time level-1 router network of all users of some router connection
Act on behalf of in CA, act on behalf of CA according to what certain rule elected, for acting on behalf of above-mentioned CA programs/act on behalf of CA, and use
Snmp protocol find upper level network CA programs/act on behalf of CA, establish a communications link, negotiate generate it is more higher leveled act on behalf of CA,
Or it establishes and acts on behalf of transmission mechanism.Highest level route agent is used for and secondary level-one route agent CA, CCN and CA&CM server
Between communicated.
6) CA acts on behalf of list
CA, which acts on behalf of list and is recorded in, to be acted on behalf of in CA, and for a certain certain types of message, CA institutes are acted on behalf of for recording this
Agency secondary first-level agent CA host IP address or LAN in proxied CA IP address and this act on behalf of the upper of CA
(purpose is to make CA proxy table simple forms list structure in pairs to the host IP address of first-level agent CA, convenient for acting on behalf of looking into for CA information
It looks for).CA, which acts on behalf of list and is only stored in, to be acted on behalf of in CA, and will generate a CA per level-one CA agencies acts on behalf of list.CA acts on behalf of list not
Transmission request is submitted to upper level CA agencies or CCN with information segment and pass to upper level host, thus protect user's
Privacy information.
7) CCN cloud computing servers
CCN (Confluence Computing Node) cloud computing confluence node server is responsible for the letter on backbone network
Breath transmission and distributed storage task.Specially CCN is used to receive interaction and coupling number between the request of data of CA programs, CCN
The transimission and storage scheme of a data is generated according to request, cooperation;A CA program, the CA journeys run on CCN are run on CCN
It states itself to represent CCN outside ordered pair, CCN receives the data-transformation facility of interaction and CCN between the request of data of CA programs, CCN
It is to be carried out by the CA programs run on CCN.
8) CA&CM servers
CA&CM servers (Authentication&Coding Message) be used to generate in the present invention and safeguard
The legitimacy of message code and certification CCN servers.
In terms of generating and safeguarding message code, the server by utilizing is artificial or the method for big data analysis, by internet
In message carry out classification and coding.When message code generates, the message piece corresponding to the message code is in hotspot designation position
It is marked as common message piece;After message code generation, if be no longer somebody's turn to do in network data request within a certain period of time
Message code, then the message piece corresponding to the message code be marked as interim message piece in hotspot designation position;In message code
It, should if the number for occurring the message code in network data request within a certain period of time is more than the threshold value of setting after generation
Message piece corresponding to message code is marked as hot spot message piece in hotspot designation position;It is marked as interim message piece or hot spot
Message code corresponding to the message piece of message piece, if occurring the message code and appearance in request of data within a certain period of time
Number no more than setting threshold value, then the message piece be marked as common message piece.
In terms of the legitimacy of certification CCN servers, pairs of asymmetric encryption public key is generated in advance on CA&CM servers
And private key, legal CCN have the right to obtain private key from CA&CM servers, act on behalf of CA and obtain public key from CA&CM servers,
CCN is verified using whether public key and private key match.If CCN certifications do not pass through, CA is acted on behalf of to long-range CA&CM servers
Send out alarm.
Fig. 2, Fig. 3, Fig. 4 and Fig. 5 together constitute the system construction drawing of the present invention, self-organizing confluence in internet of the invention
Data transmission method basic step it is as follows:Each user terminal of LAN runs a CA program, and CA programs pass through letter
Breath acquisition module obtains user and needs the information such as publication/reception/inquiry/preference, and these information and CA&CM servers are defined
Message code be packaged into message piece and broadcasted in LAN, be sent to the CA programs of LAN other users;Message piece exists
Then message piece interaction between CA programs is generated in CA programs.Multiple CA program pins in LAN disappear to each type
Breath piece is summarized, and the message piece of each type is negotiated to generate a LAN agency between CA programs, such to be responsible for
Publication/reception/inquiry/preference request task of type message piece;LAN agency, which generates, to be basically described how in a local network
The suitable CA for acting on behalf of CA for acting on behalf of all same type of messages in LAN of election one.LAN agency passes through SNMP
Protocal analysis local network topology, searches the LAN agency of other subnets under same router, and LAN is mutual between acting on behalf of
Negotiate to generate a route agent to be responsible for being directed to publication/reception/inquiry/preference of the message under the router in all-ones subnet
Equal request tasks;Route agent generates in each LAN agency basically described how under same router and elects one
CA is acted on behalf of for all LANs agency of all same type of messages under agent router and route agent how according to road
It is converged and is generated upwards step by step by topological hierarchical structure.Under route topological hierarchical structure, secondary level-one route agent passes through SNMP
Agreement, which constantly converges, generates new route agent, eventually finds the CCN of a same operation CA program;Any one is legal
CCN can be by a CA&CM server authentication;When route agent finds CCN, the CA of CCN operations states it oneself is one
CCN servers, route agent will pass through the legitimacy of the CA&CM server authentications CCN;After being verified, route agent is by institute
News release/reception/inquiry/preference request of agency submits to CCN.CCN obtain information describe CCN how with route agent
Acquisition of information is completed in communication.The requests such as all news release/reception/inquiry/preferences acquired are gathered together by CCN,
The message transimission and storage scheme of optimization is formed between all CCN.CCN is generated between resource map describes CCN and how to be carried out
Distributed storage is to generate resource map.Cooperated with CCN by the CA at different levels that act on behalf of, realizes that the transmission that sends and receives of message is appointed
Business.Transmission plan generation describes how to complete data transmission procedure using CCN, route agent and LAN agency.
Referring to Fig. 1, the data transmission method of self-organizing confluence in internet of the invention includes the following steps:
1) CA programs are run on each user terminal, and multiple CCN and at least one CA&CM services are set over the backbone
Device;
CA programs are for generating request of data, interacting and carry out data transmission;
CCN is used to receive interaction and matched data request, cooperation between the request of data of CA programs, CCN and generates a number
According to transimission and storage scheme;A CA program is run on CCN, the CA programs run on CCN externally state that itself is represented
It is by being run on CCN that CCN, CCN, which receive the data-transformation facility of interaction and CCN between the request of data of CA programs, CCN,
CA programs carry out;
CA&CM servers are for verifying CCN;
2) for the request of data of same type, the CA journeys of the request of data of same type are proposed in the same area network range
Elect by interaction between sequence and act on behalf of CA, it is described act on behalf of CA using CA&CM server authentications CCN it is legal after, to a CCN
It is proposed its type request of data acted on behalf of;
3) CCN for receiving the type request of data arranges transmission and local data slow according to the transmission request received
Deposit scheme;
4) if there is data transfer task, CCN is carried out data transmission by the CA that acts on behalf of to CA programs.Specifically,
CCN, which is transferred data to, acts on behalf of CA, acts on behalf of CA and according to CA acts on behalf of CA programs that form finding is acted on behalf of and to CA program distribution numbers
According to;If there is Multistage Proxy CA, Ze Gao first-level agents CA acts on behalf of the next stage that form finding is acted on behalf of by CA and acts on behalf of CA, and
Downward first-level agent CA distributes data.
Request of data is marked as a specific authentication code, and CA acts on behalf of list using the specific authentication code label
Or name;When to CA transmission data are acted on behalf of, the specific authentication code is embedded in data message stem;CA is acted on behalf of to receive
When to data message, analysis stem obtains the specific authentication code, and searches corresponding CA according to the specific authentication code
Act on behalf of list.
The present invention is made of three parts, including:CA programs, CCN cloud computings confluence node and CA&CM servers.
1.CA programs
In the present invention, each user terminal will run a CA program, and CA program functions include the following:1) message
It generates;2) interacting message;3) CA is acted on behalf of to generate and operate;4) mobile terminal identifies.
1.1 message generate
Message generates:1) task is obtained.The CA programs of operation on the client receive the data of user's generation
Request task is transmitted, which includes publication, reception and inquiry of information etc..CA programs are usually and browser program
The request task that user generates is collected in association.2) information coding.For being obtained for task, according to unified message coding and
Message packet format (message coding and message packet format both of which can be downloaded from CA&CM servers) is by message coding
Message piece is generated afterwards.
1.2 interacting message
The interacting message of CA programs in same LAN:CA programs utilize LAN broadcast by message piece in same LAN
It is sent to other CA programs in LAN.The interacting message of the CA programs of Different LANs:CA programs pass through in one LAN
Detection network topology obtains direct-connected in same router or by other a sequence of LAN Informations between multi-stage router, and profit
It is established with ICP/IP protocol and connects and carry out interacting message.
1.3, which act on behalf of CA, generates and operates
Act on behalf of the function module that CA is CA.It includes LAN agency and route agent to act on behalf of CA, is respectively used to act on behalf of
Under same LAN and same router under identical message type message piece transformation task.Act on behalf of each task packet of CA
It includes:1) it creates CA and acts on behalf of list;2) health examination is deleted with CA programs;3) CA programs are newly-increased.
The method that LAN agency generates is as follows:
CA programs generate message piece, and message piece is broadcast to other CA programs in LAN, other CA programs receive
It is stored it in the message piece list of itself after broadcast message piece.CA election modules are acted on behalf of there are one inside each CA programs,
It acts on behalf of CA election modules to be responsible for checking message piece list in real time, the number of users for counting the message piece with identical message code is total
With, when the message piece total number of users of some message code reach some setting threshold value (threshold value can dynamically be set in configuration file
Set) after, that acts on behalf of that CA elections module elects the type message piece acts on behalf of CA.It elects after acting on behalf of CA, acts on behalf of CA election modules
It creates a subprocess execution and acts on behalf of CA functions.User's request sum that CA has recorded certain type of message piece is acted on behalf of, by it
It is recorded in independent message piece storage list.In addition acting on behalf of CA uses all generations in the CA proxy tables unirecord LAN should
The CA program informations of message piece.
It is as follows that LAN acts on behalf of generating principle:
Illustrate the principle that LAN agency generates referring now to Fig. 6.1st step, CA programs are first turned on 8124 ports UDP
As local area network communication port.2nd step, CA programs obtain user's request.User's request is packaged into message by the 3rd step, CA programs
Piece.4th step, CA programs are to one LAN agents query message of LAN broadcast.5th step, CA programs are according to the inquiry of the 4th step
As a result determine whether that generated LAN agency is directly acted on behalf of using existing LAN, local if so, executing the 6th step
Net is acted on behalf of generation process and is terminated;If not, execute the 7th step, each CA program timings generate a series of message pieces, and by message piece
Message is packaged into be broadcasted to LAN.Message is being locally created after CA programs receive the message piece message of broadcast in 8th step
Piece list.9th step, CA program timings check whether each message piece is overtime.If it times out, carrying out the 10th step, CA programs
Clear up out-of-date message piece.The time-out time needs of message piece carry out dynamic configuration in configuration file.After the completion of cleaning, if
There is no any message piece time-out, then carries out the 11st step, check whether the accumulation number of each message piece reaches a certain threshold value immediately, such as
Fruit is more than this threshold value (threshold value is set by configuration file), then carries out the 12nd step.Otherwise, the 7th step is returned to.12nd step,
A CA program checkouts should become the agency of some message piece to oneself in LAN, then carry out the 13rd step, local area network
The message of one statement sovereignty of broadcast.14th step checks local when other CA programs receive the message of a statement sovereignty
Whether the CA programs of message piece list, verification statement sovereignty are legal.If illegal, the 15th step is carried out, one is replied and denies
Message chooses the LAN agency that CA programs are used as the message piece between CA programs again by majority rule.Such as
Fruit is legal, then carries out the 16th step, replys a confirmation message, the success of LAN proxy authentication.CA programs elect LAN agency
When, in all same type CA under same LAN, CA programs that the timestamp of message piece is earliest or bandwidth can be selected most
Big CA programs, also or the strongest CA programs of process performance are acted on behalf of for LAN, and electoral machinery can be according to real network environment
Flexible configuration, as long as areal uses consistent electoral machinery.Timestamp is identical or bandwidth is identical also or place
In the case of rationality energy is identical, the CA programs of IP address minimum are selected, are acted on behalf of as LAN.
Route agent generates as follows:
Such as Fig. 3, many LANs are often connected under same router, are a subnet referred to here as each LAN, it is right
In certain type of message piece (i.e. the message piece with a certain message code), it is likely to that an agency can be generated in subnet
CA.It is exactly that each under same router acts on behalf of and selected in CA under CA programmatic agents this router that route agent, which generates,
It is all act on behalf of CA, such CA programs are known as route agent.Route agent, which generates, needs following steps:1) nat port maps:
For the LAN using private address, the two-way communication for ensureing intranet host using nat port mapping is needed.2) same routing
CA interactions of acting on behalf of under device in each LAN generate route agent.3) route agent of lower layer according to router tree-like hierarchical structure to
It converges on upper layer:Route agent searches the all-ones subnet information of high level-1 router using snmp protocol, and is generated more according to step 2
Higher leveled route agent.Route agent is up converged by router tree-like hierarchical structure until finding nearest CCN.If network
Router tree-like hierarchical structure be similar to tree structure, then the structure carry out cut operator, become tree structure.
1) nat port maps
For the LAN using publicly-owned address, can directly be communicated with outer net;And for being communicated using private address
LAN, due to private address cannot directly public network use, so needing to carry out NAT Intranets port by the way of certain
Mapping.Common NAT Intranets, which penetrate scheme, has UDP to burrow or Simple Traversal of UDP Through Network Address Translators, but these methods are required for known to another
The server being deployed under public network environment.The present invention uses UPnP protocol.UPnP protocol operation principle:
1. control point and equipment could carry out the work of next step after all first obtaining IP address first;
2. control point first has to find the UPnP device in whole network, while the equipment on network will also declare itself
In the presence of;
3. control point will obtain the description of equipment, including which type of service is these equipment provide;
4. control point sends out action message to equipment;
5. the state of control point audiomonitor makes corresponding processing action when state changes;
As soon as can the port mapping of the machine to an outer net port be passed through outer net port+outer net IP by UPnP protocol
The mutual access of outer net may be implemented.For using private address LAN, every host by port be sequentially mapped to from
8124 start port range backward.
2) the CA interactions of acting on behalf of under same router in each LAN generate route agent
It include mainly two parts content:1) SNMP discovering network topologies.2) route agent's life based on discovering network topology
At.The CA that acts on behalf of in one LAN obtains network topological information using SNMP discovering network topologies, is then based on the net of discovery
Network topology acts on behalf of CA and searches other LANs under same router, and carries out interacting message with survival host therein, generates road
It is generated by agency.
SNMP discovering network topologies
Illustrate that SNMP discovering network topology processes, this process are based on graph theory BFS search, the 1st step, agency with reference to Fig. 7
Search queue is added in the gateway ip of LAN residing for itself by CA.2nd step judges whether queue is empty, if so, carrying out the
3 steps store network topology structure using graph theory cascade synthesis, terminate.If not, the 4th step is carried out, by head of the queue element (i.e. router
IP address) fall out, it is initiated SNMP request.5th step obtains the corresponding subnet information in each outlet of the router, interface
Information and direct-connected route-map and mac address information.6th step, and the router that not yet accesses direct-connected with the router
BFS search queues are added in ip, are then return to the 2nd step.
Route agent based on discovering network topology generates
Illustrate the flow that route agent generates referring to Fig. 8.1st step disappears when the CA programs in a LAN become
When acting on behalf of CA of piece is ceased, CA is acted on behalf of the gateway is read by snmp protocol and connect other LAN Informations;2nd step, this acts on behalf of CA
Since 8124 ports, the external public network address of other LANs is detected;3rd step, checks whether detection port survives;If visited
It surveys port not survive, then carrying out the 4th step;4th step, port numbers are incremented by 1, return to the 2nd step, continue to detect;If detecting end
Mouth survival, then carry out the 5th step;5th step sends a request for acting on behalf of CA for inquiring certain message piece to the port;6th
It walks, after survival host receives query message in other LANs, the CA information of acting on behalf of of the demand is returned, CA is acted on behalf of and mutually deposits each other
Information;7th step, the information inspection returned according to the 6th step act on behalf of whether CA has generated, CA are acted on behalf of if generated,
The 8th step is carried out, the existing CA that acts on behalf of is acted on behalf of into CA as oneself;CA is acted on behalf of if do not generated, carries out the 9th step.9th
Step checks whether all other LANs complete by detection;If it is not complete, returning to the 2nd step;If all detection is completed,
Carry out the 10th step;10th step, the CA that acts on behalf of of each LAN is broadcasted select all-ones subnet under the router each other under same router
General agency, i.e. route agent;If the router and other routers are direct-connected, found by snmp protocol, route generation
It manages and cut operator is carried out to the complex network topologies figure of discovery, form typical tree structure, then route agent is by the layer set
Secondary structure successively converges, i.e. repeatedly the 1st step to the 10th step, continues to look for new route agent;It is reached after successively converging several times
CCN, highest level route agent are communicated with CCN, complete authentication, message transmission and data transmission.
All under same router act on behalf of in CA, the timestamp of message piece it is earliest act on behalf of CA or bandwidth is maximum
Act on behalf of CA, also or process performance it is strongest to act on behalf of CA elections be route agent, electoral machinery can be according to the spirit of real network environment
Configuration living, as long as areal uses consistent electoral machinery.Timestamp is identical or bandwidth is identical also or processing
In the case of performance is identical, select IP address minimum acts on behalf of CA, as route agent.
3) route agent of lower layer converges according to router tree-like hierarchical structure to upper layer
Such as Fig. 4, this is the typical three-layer network framework model of Local Area Network, including core layer, convergence-level and access layer.Phase
Hierarchical relationship between adjacent two layers of routing is it is obvious that still lower layer's router often more routers of the first line of a couplet, in this way in routing generation
When reason election, lower layer's routing may simultaneously be acted on behalf of by multiple route agents, this is undesirable.A kind of beta pruning is proposed thus
Scheme ensures lower layer's router one router of the first line of a couplet when route agent is elected.Assuming that on lower layer's router
The accessor collection of connection is combined into { ip1, ip2......ipn, each IP in gathering IP asks 128 information of SHA-1 to pluck
It wants, selects minimum one of informative abstract as first line of a couplet router.It can ensure lower layer's router more balancedly first line of a couplet in this way
To upper level router.After completing cut operator, network topology can form typical tree structure, act on behalf of and elect according to router
Strategy successively generates route agent.After finally converging to the core router of top, route agent and the CCN of top are carried out
Interaction.Wherein convergence refer under same router act on behalf of CA by election mechanism select it is new act on behalf of CA, new acts on behalf of CA again
It is successively converged upwards by the tree structure of network using identical election mechanism.
It should be noted that if the upper level router B of a router A is connected to multiple and router A peers road
By device, then the route agent A lookups of router A are as follows with route agent's process of level router:Route agent A utilizes SNMP
Agreement searches a LAN of the subtree that one of them is formed with level router, and detects any survival master in LAN
Machine, survival host return to its LAN agency, and LAN agency stores its upper level agency again, therefore according to proxy table
The characteristic for the similar doubly linked list singly having can find the routing generation with the router of router A peers using iterative query
Reason.
The each task for acting on behalf of CA includes:1) it creates CA and acts on behalf of list;2) health examination is deleted with CA programs;3) CA programs
It is newly-increased.
It creates CA and acts on behalf of list
CA, which acts on behalf of list and is recorded in, to be acted on behalf of in CA, and for some specific message, CA institute's generations are acted on behalf of for recording this
The host IP address and port of the IP address of the CA programs of reason or secondary first-level agent CA;CA acts on behalf of list while record acts on behalf of CA
Upper level act on behalf of the IP address information of CA, a double linked list structure is formed in this way, convenient for subsequently carrying out acting on behalf of the lookup of CA.
Health examination is deleted with CA programs
It acts on behalf of the health examination module timing probe in the CA programs where CA and acts on behalf of the upper level agency of CA and whether survive,
If upper level agency is not survived, this, which is acted on behalf of CA and is renegotiated with first-level agent CA with it, generates one and new acts on behalf of CA.
With level-one, other act on behalf of CA with it for new CA requests of acting on behalf of, and obtain the new upper level for acting on behalf of CA and act on behalf of CA information, and will be new
It acts on behalf of CA information and reports and act on behalf of CA to upper level, upper level acts on behalf of CA updates CA and acts on behalf of list.The health of CA is each acted on behalf of simultaneously
Check module also can regular check its agency all secondary first-level agent CA/CA programs, if it find that newly-increased or offline time
First-level agent's CA/CA programs, then acting on behalf of CA accordingly increases or delete time first-level agent's CA/CA programs newly in CA acts on behalf of list
Information.
CA programs are newly-increased
For newly-increased CA programs, it can send whether broadcast message detects the type of message of its agency to LAN
Act on behalf of CA, 1) if it find that existing act on behalf of CA, then newly-increased CA programs act on behalf of generations of the CA as oneself using existing automatically
CA is managed, while actively reporting the presence of oneself to acting on behalf of CA, acts on behalf of after CA receives report and adds this CA journey in CA acts on behalf of list
Sequence;If 2) do not find to act on behalf of CA, acts on behalf of electoral machinery using LAN and elect and new act on behalf of CA.Then, generation
Reason CA has found other LANs being connected in it under same router using the interacting message function of the CA programs of Different LANs
Information, and message is searched by survival host interaction route agent thereto, finds and inquires current router to it after route agent
Under whether generated route agent, if having generated route agent, act on behalf of CA and send message to the route agent that has generated,
Illustrate oneself to be the newly-increased CA that acts on behalf of, the route agent generated increases this information for acting on behalf of CA in CA acts on behalf of list;Such as
Fruit does not generate route agent, then being generated newly according to the method for generating route agent in Different LANs under same router
Route agent.
1.4 mobile terminals identify
Whether terminal where detecting current CA programs is mobile terminal, if it is then mobile terminal will not become agency
CA;Since mobile terminal flow is precious and electricity is relatively low, it should not execute that request of data is intensive, flow consumes big function, so working as
There are one mobile terminal identification modules in CA programs, and whether user can be arranged in systems opens mobile agent CA functions, if do not had
Have and open mobile agent CA functions, then when detecting current CA programs and being in mobile terminal, this mobile terminal will not become generation
Manage CA.If user actively opens mobile agent CA functions, when detecting that current CA programs are in mobile terminal, the movement
End, which can also become, acts on behalf of CA.
2.CCN cloud computings confluence node server
On the responsible backbone network of CCN (Confluence Computing Node) cloud computing confluence node server
Information is transmitted and distributed storage task.Specially CCN receives the request of data of CA programs, interaction and matched data between CCN
Request to generate resource map, between CCN cooperation generate the transimission and storage scheme of a data.Such as Fig. 5, transported on CCN
One CA program of row, the CA programs run on CCN externally state itself to represent CCN, CCN receive CA programs request of data,
The data-transformation facility of interaction and CCN are carried out by the CA programs run on CCN between CCN.CCN is placed adjacent to
On the network network of backbone network, according to the transmission of the structure, Regional Distribution and message of backbone network and distribution character, the present invention needs
Arrange a certain number of CCN.
CCN receives the request of data of CA programs
CCN receive CA programs request of data before in order to prevent malicious node pretend to be CCN steal informations, need to CCN into
The process of row authentication, such as Fig. 9, CCN authentications is as follows:
1) CA&CM servers generate one group of public key and private key for being used for asymmetric encryption;
2) private key is issued CCN by the connection of CA&CM server by utilizing secret, and route agent downloads from CA&CM servers and corresponds to
Public key;
3) route agent generates 128 random numbers using random algorithm, using public key encryption, generates authentication report
Text is sent to CCN to be determined.
4) after CCN receives authentication message, encryption information string is extracted, is decrypted using the private key of itself.After decryption, solution
Close information generates authentication response message and sends back to route agent, route agent compare the string in response message whether with from
The string that oneself generates is consistent.
If 5) consistent, authentication passes through;If inconsistent, do not pass through, and is sent out to long-range CA&CM servers
Go out alarm.
Generate resource map
CCN receives the request message piece of the route agent generated by the convergence of message piece, the transmission category in each message piece
Property have recorded message involved action in the transmission, including:Publication/reception/inquiry/preference etc..In addition CCN, which can also be received, comes
From the publication message piece of the resource producer.CCN stores the message piece with regard near field, all CCN united recordings together
The message piece of all areas forms the hum pattern of all resource producers and consumers in CCN in this way.
For the resource producer, they can the Resource Encapsulation of itself storage at the message piece of publication type, and actively with
CCN contacts on nearest backbone network, and the message piece for issuing type is sent to CCN, CCN can parse disappearing for distribution pattern
Cease piece.Even user terminal is the resource producer, then user terminal is actively contacted by CA programs with CCN, and is sent and provided to CCN
Issue request of data in source.Although the resource producer actively contacts with CCN, actually the resource producer exposes itself IP information
Too big influence is not had to CCN, because carrying out big data analysis not too big commercial value to the content that releases news,
The privacy leakage problem that the resource producer brings without having to worry about big data analysis.
In above-mentioned transmission process, with the letter for carrying out user experience optimization in current internet by accessing the preference of user
Breath still can be in some way encapsulated in above-mentioned message segment, but this information is:1) it is by user-driven completely
No addition;2) IP address of terminal that user has been concealed in multi-Agent CA transmission processes is believed so as to avoid the secret of user
Breath is excessively excavated.
Cooperation generates the transimission and storage scheme of a data:
1) a specific CCN receive act on behalf of that CA sends out there is the request of data for receiving attribute after, the specific CCN
By the distributed system that is formed between CCN find with the request of data for receiving attribute match with issuing attribute
Request of data;
2) CCN where the request of data with publication attribute to match is to publication with the request of data for issuing attribute
CA programs send out request, receive and cache corresponding resource;
3) CCN where the request of data with publication attribute to match is by the corresponding resource transmission of caching to described
Specific CCN, the corresponding caching resource that the specific CCN will be received;
4) the corresponding resource cached is sent to the generation for proposing there is the request of data for receiving attribute by the specific CCN
Manage CA.
3.CA&CM servers
CA&CM servers (Authentication&Coding Message) be used to generate herein and maintenance disappears
Cease code and the legitimacy of certification CCN.
In terms of generating and safeguarding message code, the server by utilizing is artificial or the method for big data analysis, by internet
In message carry out classification and coding.The message of coding is divided into 2 classes:1) basic messae, such message code will be permanently effective, generation
Most common message in table internet;2) interim message, interim message code generate temporarily for reply special circumstances, such as
Over time, no longer there is the interim message of certain code in fruit in network data transmission, which will be labeled, should
Label will be used to optimize information transmission and distributed storage scheme.This is realized by the hotspot designation position of message coding, root
Transmit that Statistic Analysis obtains according to information in network as a result, transmitting the big message code of flow into rower to current information
Note, the transmission for optimizing message and distributed storage scheme.
Pairs of asymmetric encryption secret key can be generated in terms of the legitimacy of certification CCN, on CA&CM servers, CCN has
Power logs in CA&CM servers by secret link and obtains private key, when route agent needs to carry out legitimacy certification to CCN, road
CA&CM servers can be asked to obtain the corresponding public keys of the CCN by agency, if public key can be matched with private key, CCN recognizes
Card passes through;Otherwise, CCN authentification failures.
Act on behalf of transmission mechanism
Resource data directly may be transmitted directly by CA programs, it is also possible to act on behalf of CA auxiliary transmissions by CCN+.Basic principle
It is that CA auxiliary transmissions are acted on behalf of by CCN+ when number of requests is very big if directly transmitted by CA programs when number of requests is smaller.Pass through
A Cost Model is built, transmission cost, CCN costs and income are considered, to choose optimal transmission mode.Work as receipts
It is auxiliary that the value of benefit/(transmission cost+CCN costs) using CCN+ acts on behalf of CA when being higher than a certain threshold value (being set dynamically in configuration file)
Help distribution;It is directly transmitted using CA programs when its value is less than threshold value.Wherein income refers to the economic value that data transmission is brought,
Transmission cost refers to the cost of consumed resource for acting on behalf of the tree-like distributions of CA, CCN costs refer to configure CCN hardware and bandwidth at
This.1) when directly being transmitted using CA programs, Resource consumers scale is smaller, Resource consumers are directly to the CA of the resource producer
Program initiates acquisition request resource;2) it when acting on behalf of CA auxiliary transmissions using CCN+, that is, uses and acts on behalf of transmission mechanism:Resources consumption
It is the message packet received that person, which generates transmission property, and gradually converges to CCN 1 by generating LAN agency and route agent
Place.If having cached the resource data on CCN1, resource data is directly transmitted to route agent by CCN1;If CCN1 does not have
Have and cache the resource data, then CCN 1 asks all CCN, searches the resource manufacturer information of related news piece, if it find that
Resource information is at CCN2, then CCN1 initiates transmission request to CCN2, if CCN2 stores resource in itself, directly will
Resource forwarding is to CCN1;Otherwise, CCN2 initiates to ask to the resource producer, and in CCN2 local caches, while being transmitted to CCN1.
CCN1 caches the resource data received, while resource data is transmitted to route agent by CCN1, and route agent receives from resource
After the resource data of the producer, according to list is acted on behalf of, by resource, layer proxy CA is sent down for route agent, specially transmission data
When data message stem be embedded in a message code, per first-level agent CA receive data when, analysis stem obtain message code,
It acts on behalf of CA and list is acted on behalf of according to the corresponding CA of message code lookup, and to secondary first-level agent CA/CA program delivery data, until arriving
It is acted on behalf of up to LAN, final LAN agency is responsible for message distribution to Resource consumers.It should be noted that the distribution of resource
Process is can be optimized using certain algorithm.
Communication system message format
Illustrate the Primary communication message format used in the present invention below, including LAN CA interprogram communications message format and
Intermediate router level communication message format.
LAN agency generates communication message format:
The message packet format that Figure 10 mutually broadcasts for CA programs in the LAN of the present invention.This is that CA programs obtain user
It is encapsulated into message piece after the message of generation, and fixed time broadcast is sent to the message of CA programs around.
Figure 11 is the LAN agent broadcast message of the present invention.This is that certain CA program finds that oneself becomes alternative proxy CA
When, to the message of LAN other CA programs statement message piece sovereignty.
Route agent generates communication message format:
Figure 12 is that one of the present invention acts on behalf of the message that CA asks other to act on behalf of CA.This is one and acts on behalf of CA searchings with all the way
By the request message initiated other subnets CA when other act on behalf of CA under device.
Figure 13 is other sub-network host computer response agent CA infomational messages of the present invention.
The present invention is that the CA programs operated on user terminal, CCN and CA&CM servers cooperate with each other formed transmission
Scheme.For each specific message transfer request, the CA programs in internet on neighbouring user terminal will be produced by interaction
Its raw transmission agency, the high Primary Transmit that also interaction generates in bigger regional extent between simultaneous transmission is acted on behalf of are acted on behalf of, this process
It can repeat, so that convergence generates the highest transmission agency of the message in a backbone network regional extent;Convergence
Transmission agency afterwards proposes transmission request to the CCN of an operation over the backbone, and utilizes CA&CM server authentications CCN;Fortune
All CCNs of the row in backbone network adaptively arrange transmission and local data buffer storage scheme according to the transmission request received, with
Optimize data transmission efficiency;The present invention can be accounted under the premise of not changing existing network framework with lower backbone bandwidth
With with realize good transmission performance under lower lower deployment cost, and all nodes for participating in transmission keep balance of power status, pole
The big privacy for protecting user.
The present invention connects information publisher and information reception in internet using CA programs, CCN with CA&CM servers
Person, while reducing the occupancy of backbone bandwidth using transmission mechanism is acted on behalf of, in addition CCN only needs to rent from cloud service manufacturer,
And without the Cloud Server of high bandwidth, therefore the lower deployment cost of the present invention is relatively low.Therefore the present invention can be in lower backbone network
Point-to-area/face-to-face transmission is realized under bandwidth occupancy and lower lower deployment cost.At the same time, the present invention is by message transmitting procedure
In all participation entities be in balance of power status, prevented surging individual excessively analysis and profit in the transmission of current internet information
With the behavior of user's private information, the privacy of user is greatly protected, improves network security performance.
Claims (21)
1. a kind of data transmission method of internet self-organizing confluence, which is characterized in that include the following steps:
1) CA programs are run on each user terminal, and multiple CCN and at least one CA&CM servers are set over the backbone;
CA programs are for generating request of data, interacting and carry out data transmission;
CCN is used to receive interaction and matched data request, cooperation between the request of data of CA programs, CCN and generates data
Transimission and storage scheme;A CA program is run on CCN, the CA programs run on CCN are externally stated itself to represent CCN, CCN
It is the CA journeys by being run on CCN to receive the data-transformation facility of interaction and CCN between the request of data of CA programs, CCN
Sequence carries out;
CA&CM servers are for verifying CCN;
2) for the request of data of same type, proposed in the same area network range the request of data of same type CA programs it
Between elect by interaction and act on behalf of CA, it is described act on behalf of CA using CA&CM server authentications CCN it is legal after, proposed to a CCN
Its type request of data acted on behalf of;
3) CCN for receiving the type request of data arranges transmission and local data buffer storage side according to the transmission request received
Case;
4) if there is data transfer task, CCN is carried out data transmission by the CA that acts on behalf of to CA programs.
2. the data transmission method of internet self-organizing as described in claim 1 confluence, which is characterized in that request of data according to
Fixed message format is encapsulated into message piece, and is issued and received in the form of message piece;The data of the message piece
Attribute includes message code, transmission property, number of users, timestamp, description, hotspot designation position and acts on behalf of position;
The message code is one that all data resources carried out with exhaustive division that CA&CM servers are generated and can freely be downloaded
Series code;
Transmission property is the action involved by request of data, including publication, reception and inquiry;
Number of users is the number of users with the message code in the user interknited;
At the time of timestamp is that user generates the message piece;
Description shows the detailed information omitted after request of data for supplementing with code table;
Hotspot designation position is used to that request of data to be marked, and optimizes transmission and the distributed storage scheme of request of data;
It is a flag bit to act on behalf of position, for describing whether the request of data produces agency.
3. the data transmission method of self-organizing confluence in internet as claimed in claim 2, which is characterized in that the message piece
Data attribute further includes attributes preferred, the access preference for recording user.
4. the data transmission method of internet self-organizing as claimed in claim 2 confluence, which is characterized in that the message piece by
The request of data post package that the CA programmed acquisition users of operation on the subscriber terminal send out forms.
5. the data transmission method of self-organizing confluence in internet as claimed in claim 2, which is characterized in that produced in message code
When raw, the message piece corresponding to the message code is marked as common message piece in hotspot designation position;After message code generation,
If no longer there is the message code in network data request within a certain period of time, the message piece corresponding to the message code exists
Hotspot designation position is marked as interim message piece;After message code generation, if within a certain period of time in network data request
The number for the message code occur is more than the threshold value of setting, then the message piece corresponding to the message code is marked in hotspot designation position
It is denoted as hot spot message piece;It is marked as the message code corresponding to the message piece of interim message piece or hot spot message piece, if
The number for occurring the message code and appearance in certain time in request of data is not more than the threshold value set, then the message piece is marked
It is denoted as common message piece.
6. the data transmission method of self-organizing confluence in internet as described in claim 1, which is characterized in that described to act on behalf of CA generations
The CA programs for managing other request of data having the same act on behalf of CA and record it in independent request of data stores list and acted on behalf of
The program addresses CA information and agency number of users, and create CA and act on behalf of list.
7. the data transmission method of self-organizing confluence in internet as claimed in claim 6, which is characterized in that described to act on behalf of CA packets
Include LAN agency and multistage route agent;
LAN Agent on behalf all request identical datas requests in a local network CA programs, upward primary network station sends out number
According to request;
Route agent represents the CA programs of all users of some router connection or secondary level-1 router network acts on behalf of CA,
Upward primary network station sends out request of data;
Highest level route agent between secondary level-one route agent CA, CCN and CA&CM server for being communicated.
8. the data transmission method of self-organizing confluence in internet as claimed in claim 7, which is characterized in that LAN agency's
Production method is:
CA programs generate request of data, and request of data is broadcast to other CA programs in same LAN, other CA programs
The request of data is stored in the request of data list of itself after receiving the request of data of broadcast;Setting inside each CA programs
CA elections module of acting on behalf of check request of data list in real time, counted respectively for each request of data and send out identical data and ask
The number of users summation asked;After the number of users summation of certain request of data is more than the threshold value of setting, CA election modules are acted on behalf of
That elects the request of data acts on behalf of CA;It acts on behalf of CA and creates a subprocess, CA functions are acted on behalf of in execution.
9. the data transmission method of self-organizing confluence in internet as claimed in claim 7, which is characterized in that route agent CA's
Production method is:
It is generated in one LAN after LAN acts on behalf of CA, LAN acts on behalf of interactions of the CA by the CA programs of Different LANs
Function finds other LAN Informations under same router, and interaction LAN acts on behalf of CA inquiry request of data, obtains it
LAN in his LAN acts on behalf of CA information;LAN acts on behalf of CA and acts on behalf of CA foundation connection with other LANs respectively and interact
The request of data respectively acted on behalf of acts on behalf of CA according to LAN is elected;
The data that foundation contacts between the secondary level-one route agent CA under same router and interaction is respectively acted on behalf of are connected to ask
After asking, the route agent CA of the router is elected.
10. the data transmission method of self-organizing confluence in internet as claimed in claim 9, which is characterized in that if the road of network
Tree structure is similar to by device tree-like hierarchical structure, then cut operator is carried out to the structure, becomes tree structure.
11. the data transmission method of self-organizing confluence in internet as claimed in claim 6, which is characterized in that CA acts on behalf of list
It is recorded in and acts on behalf of in CA, the host for recording the IP address for acting on behalf of the CA programs that CA is acted on behalf of or secondary first-level agent CA
IP address and port;CA acts on behalf of list while record acts on behalf of the upper level of CA and acts on behalf of the IP address information of CA.
12. the data transmission method of self-organizing confluence in internet as claimed in claim 11, which is characterized in that in step 4)
In, CCN acts on behalf of the method that CA carries out data transmission to CA programs and is by described:
CCN, which is transferred data to, acts on behalf of CA, acts on behalf of CA and according to CA acts on behalf of CA programs that form finding is acted on behalf of and to CA programs point
Send out data;
If there is Multistage Proxy CA, Ze Gao first-level agents CA acts on behalf of the next stage that form finding is acted on behalf of by CA and acts on behalf of CA,
And first-level agent CA distributes data downwards.
13. the data transmission method of self-organizing confluence in internet as claimed in claim 12, which is characterized in that request of data quilt
Labeled as a specific authentication code, CA acts on behalf of list using the specific authentication code label or name;To acting on behalf of CA
When transmitting data, the specific authentication code is embedded in data message stem;CA is acted on behalf of when receiving data message, is analyzed
Stem obtains the specific authentication code, and searches corresponding CA according to the specific authentication code and act on behalf of list.
14. the data transmission method of self-organizing confluence in internet as claimed in claim 6, which is characterized in that have in CA programs
One health examination module acts on behalf of whether CA survives for regular check CA programs, if detection finds that acting on behalf of CA does not survive,
It is so re-elected between CA programs and generates one and new act on behalf of CA;
The health examination module regular check of the CA programs where CA its CA program for being acted on behalf of is acted on behalf of, if acting on behalf of CA finds it
It is offline that CA acts on behalf of some CA program in list, then acts on behalf of in list this CA program from CA and delete.
15. the data transmission method of self-organizing confluence in internet as claimed in claim 8, which is characterized in that new in LAN
The CA programs of increasing send broadcast message to LAN first and detect whether its request of data sent out acts on behalf of CA:If hair
It there is now and act on behalf of CA, then newly-increased CA programs act on behalf of act on behalf of CAs of the CA as oneself using existing automatically, while actively to agency
CA reports the presence of oneself, acts on behalf of after CA receives report and adds this CA program in CA acts on behalf of list;If not finding to act on behalf of
CA is then elected and is acted on behalf of CA in a local network.
16. the data transmission method of self-organizing confluence in internet as claimed in claim 8, which is characterized in that new acts on behalf of CA
After generation, the new CA that acts on behalf of has found to be connected under same router with it using the interacting message function of the CA programs of Different LANs
Other LAN Informations, and user terminal into these LANs initiates route agent's CA search requests, finds routing generation
After managing CA, inquire whether generated route agent CA under current router to route agent CA, if having generated routing generation
CA is managed, the new CA that acts on behalf of sends message to the route agent CA generated, illustrates oneself to be the newly-increased CA that acts on behalf of, the road generated
Increase the new information for acting on behalf of CA in CA acts on behalf of list by acting on behalf of CA;If not generating route agent CA, press
The method generated according to route agent under same router generates new route agent CA.
17. the data transmission method of self-organizing confluence in internet as claimed in claim 6, which is characterized in that user can set
It sets and whether opens mobile agent CA functions, if being not turned on mobile agent CA functions, detect current CA programs and be in shifting
When dynamic terminal, this mobile terminal, which will not become, acts on behalf of CA;If user actively opens mobile agent CA functions, detect
When current CA programs are in mobile terminal, which, which can also become, acts on behalf of CA.
18. the data transmission method of self-organizing confluence in internet as described in claim 1, which is characterized in that CA&CM servers
Verification CCN method be:
Pairs of asymmetric encryption public key and private key are generated in advance on CA&CM servers, legal CCN has the right to take from CA&CM
Private key is obtained on business device, CA is acted on behalf of and obtains public key from CA&CM servers, CCN is verified using whether public key and private key match.
19. the data transmission method of self-organizing confluence in internet as claimed in claim 18, which is characterized in that if CCN recognizes
Card does not pass through, then acts on behalf of CA and send out alarm to long-range CA&CM servers.
20. the data transmission method of self-organizing confluence in internet as described in claim 1, which is characterized in that if user terminal
For the resource producer, then user terminal is actively contacted by CA programs with CCN, and is sent resource to CCN and issued request of data.
21. the data transmission method of self-organizing confluence in internet as described in claim 1, which is characterized in that in step 3),
The CCN for receiving the type request of data arranges the side of transmission and local data buffer storage scheme according to the transmission request received
Method is:
1) CCN receive act on behalf of that CA sends out there is the request of data for receiving attribute after, the CCN find with receiving attribute
The request of data with publication attribute that request of data matches;
2) CA with the CCN where the request of data for issuing attribute to request of data of the publication with publication attribute to match
Program sends out request, receives and caches corresponding resource;
3) CCN where the request of data with publication attribute to match is by the corresponding resource transmission of caching in step 1
CCN, the corresponding caching resource which will be received;
4) the corresponding resource cached is sent to by the CCN in the step 1 proposes there is the request of data for receiving attribute
Act on behalf of CA.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810489722.6A CN108718236B (en) | 2018-05-21 | 2018-05-21 | Data transmission method for internet self-organizing convergence |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810489722.6A CN108718236B (en) | 2018-05-21 | 2018-05-21 | Data transmission method for internet self-organizing convergence |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108718236A true CN108718236A (en) | 2018-10-30 |
CN108718236B CN108718236B (en) | 2020-08-18 |
Family
ID=63900170
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810489722.6A Active CN108718236B (en) | 2018-05-21 | 2018-05-21 | Data transmission method for internet self-organizing convergence |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108718236B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110213063A (en) * | 2019-06-10 | 2019-09-06 | 南京大学 | A kind of application layer control system and method suitable for data center network |
CN114020207A (en) * | 2021-09-06 | 2022-02-08 | 西安电子科技大学 | Tree structure data insertion method for distributed storage network |
CN116233247A (en) * | 2023-04-25 | 2023-06-06 | 合肥智鼎科技服务有限公司 | Data transmission processing system with preprocessing performance |
CN116319111A (en) * | 2023-05-24 | 2023-06-23 | 北京中超伟业信息安全技术股份有限公司 | Data chain transmission method and system based on evolutionary algorithm |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102075444A (en) * | 2011-02-28 | 2011-05-25 | 北京邮电大学 | Network system and method for guaranteeing multi-type service quality |
CN102308532A (en) * | 2009-05-21 | 2012-01-04 | 华为终端有限公司 | Method, system and server for processing point to multi-point push message |
CN102647335A (en) * | 2011-02-22 | 2012-08-22 | 中国移动通信集团公司 | Data routing method, device and system |
CN104158891A (en) * | 2014-08-21 | 2014-11-19 | 腾讯科技(深圳)有限公司 | Method, device and system of cross-regional data transmission, and server |
US20140379817A1 (en) * | 2013-06-25 | 2014-12-25 | Nest Labs, Inc. | Fabric network |
CN106031118A (en) * | 2013-11-11 | 2016-10-12 | 阿道罗姆股份有限公司 | Cloud service security broker and proxy |
CN106101055A (en) * | 2016-04-29 | 2016-11-09 | 乐视控股(北京)有限公司 | The data access method of a kind of multiple database and system thereof and proxy server |
CN106331175A (en) * | 2016-10-27 | 2017-01-11 | 苏州云融信息技术有限公司 | Cloud AP (access point) oriented multi-control proxy unified management system and method |
-
2018
- 2018-05-21 CN CN201810489722.6A patent/CN108718236B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102308532A (en) * | 2009-05-21 | 2012-01-04 | 华为终端有限公司 | Method, system and server for processing point to multi-point push message |
CN102647335A (en) * | 2011-02-22 | 2012-08-22 | 中国移动通信集团公司 | Data routing method, device and system |
CN102075444A (en) * | 2011-02-28 | 2011-05-25 | 北京邮电大学 | Network system and method for guaranteeing multi-type service quality |
US20140379817A1 (en) * | 2013-06-25 | 2014-12-25 | Nest Labs, Inc. | Fabric network |
CN106031118A (en) * | 2013-11-11 | 2016-10-12 | 阿道罗姆股份有限公司 | Cloud service security broker and proxy |
CN104158891A (en) * | 2014-08-21 | 2014-11-19 | 腾讯科技(深圳)有限公司 | Method, device and system of cross-regional data transmission, and server |
CN106101055A (en) * | 2016-04-29 | 2016-11-09 | 乐视控股(北京)有限公司 | The data access method of a kind of multiple database and system thereof and proxy server |
CN106331175A (en) * | 2016-10-27 | 2017-01-11 | 苏州云融信息技术有限公司 | Cloud AP (access point) oriented multi-control proxy unified management system and method |
Non-Patent Citations (1)
Title |
---|
顾建伟: "《代理集群服务质量和负载均衡系统的设计与实现》", 《中国优秀硕士学位论文全文数据库(电子期刊),信息科技辑》 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110213063A (en) * | 2019-06-10 | 2019-09-06 | 南京大学 | A kind of application layer control system and method suitable for data center network |
CN110213063B (en) * | 2019-06-10 | 2020-09-18 | 南京大学 | Application layer multicast system and method suitable for data center network |
CN114020207A (en) * | 2021-09-06 | 2022-02-08 | 西安电子科技大学 | Tree structure data insertion method for distributed storage network |
CN116233247A (en) * | 2023-04-25 | 2023-06-06 | 合肥智鼎科技服务有限公司 | Data transmission processing system with preprocessing performance |
CN116319111A (en) * | 2023-05-24 | 2023-06-23 | 北京中超伟业信息安全技术股份有限公司 | Data chain transmission method and system based on evolutionary algorithm |
CN116319111B (en) * | 2023-05-24 | 2023-08-01 | 北京中超伟业信息安全技术股份有限公司 | Data chain transmission method and system based on evolutionary algorithm |
Also Published As
Publication number | Publication date |
---|---|
CN108718236B (en) | 2020-08-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108718236A (en) | The data transmission method of internet self-organizing confluence | |
CN101595688B (en) | Private virtual LAN spanning a public network for connection of arbitrary hosts | |
Dunkels et al. | Connecting wireless sensornets with TCP/IP networks | |
EP1703701B1 (en) | APIs to build peer to peer messaging applications | |
CN104518967B (en) | Method for routing, equipment and system | |
Alderson et al. | The many facets of internet topology and traffic | |
CN101309301A (en) | Peer-to-peer communication system and method | |
Jia et al. | The collaboration for content delivery and network infrastructures: A survey | |
CN106936811A (en) | Safety means, system and method | |
CN106105164A (en) | Agent intercepts | |
CN104408777B (en) | Internet attendance management system and method based on P2P communication realized by NAT traversal | |
Jacobsen et al. | Infrastructure for intelligent automation services in the smart grid | |
CN101365014B (en) | Distributed adaptive listening system, generation and monitor control method | |
CN107733686A (en) | A kind of method of double optimization communication path in anonymous communication system and communication process | |
Nazaralipoorsoomali et al. | Performance improvement of routing protocol for low‐power and lossy networks protocol in an internet of things‐based smart retail system | |
Song et al. | Exploring Reliable Decentralized Networks with Smart Collaborative Theory | |
CN100591024C (en) | Mobile access controller, mobile locak area network and metropolitan area network, and access method | |
WO2019180526A1 (en) | Systems and methods for random differential relay and network coding | |
CN102387062A (en) | Method for improving transmission rate of peer-to-peer (p2p) node in crossing network by dynamic bridging contact | |
Kong et al. | Let your cyberalter ego share information and manage spam | |
Chuchico-Arcos et al. | Sensor nodes and communication protocols of the internet of things applied to intelligent agriculture | |
CN102088399B (en) | Flow control method of peer-to-peer (P2P) network, routing equipment and communication system | |
Kärkkäinen et al. | Applications in Delay‐Tolerant and Opportunistic Networks | |
Ahmed et al. | Implementation of Internet of Things (IoT) based on IPv6 over wireless sensor networks | |
CN102714664B (en) | data sharing method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |