CN112260952A - Wifi6 router rapid data access protection method - Google Patents

Wifi6 router rapid data access protection method Download PDF

Info

Publication number
CN112260952A
CN112260952A CN202011135139.9A CN202011135139A CN112260952A CN 112260952 A CN112260952 A CN 112260952A CN 202011135139 A CN202011135139 A CN 202011135139A CN 112260952 A CN112260952 A CN 112260952A
Authority
CN
China
Prior art keywords
data
priority
protection method
executing
access protection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011135139.9A
Other languages
Chinese (zh)
Inventor
李俊画
白云波
马剑
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Tianyi Comheart Telecom Co Ltd
Original Assignee
Sichuan Tianyi Comheart Telecom Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Tianyi Comheart Telecom Co Ltd filed Critical Sichuan Tianyi Comheart Telecom Co Ltd
Priority to CN202011135139.9A priority Critical patent/CN112260952A/en
Publication of CN112260952A publication Critical patent/CN112260952A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/74Address processing for routing
    • H04L45/742Route cache; Operation thereof
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/60Router architectures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a wifi6 router fast data access protection method, which relates to the technical field of router data access and comprises the following steps: s1, the data flow enters a data module; s2, judging whether the data module to be operated in the step S1 is idle, if not, executing the step S3, if so, executing the step S4; s3, according to the priority of each process in the data flow, performing chain queuing, and executing the step S4; s4, processing the data stream, and executing the step S5; s5, outputting the result, the invention can well prevent the situation of data confusion caused by competition due to the simultaneous operation of multiple processes on the same data block in the program, and in addition, the blocking phenomenon of the data due to the processing of the attribution block is well processed due to the modularization of the data block.

Description

Wifi6 router rapid data access protection method
Technical Field
The invention relates to the technical field of router data access, in particular to a wifi6 router rapid data access protection method.
Background
With the development of technology, routers have evolved from the fifth generation to the sixth generation. The number of functions included in the router is increasing, and the shared data is also very frequently processed and used. However, most of the technologies use a single-lock method to protect data, so as to prevent multiple processes from operating on data, which results in confusion when data is used. The method can well ensure data security. However, the data protection of this method results in slow running of part of the program. If the program calls improperly, the program may be deadlock, and the program is troublesome to maintain. And this approach becomes complicated for data sharing and inconvenient for data maintenance.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provides a wifi6 router fast data access protection method.
The purpose of the invention is realized by the following technical scheme:
a wifi6 router fast data access protection method includes the following steps:
s1, the data flow enters a data module;
s2, judging whether the data module to be operated in the step S1 is idle, if not, executing the step S3, if so, executing the step S4;
s3, according to the priority of each process in the data flow, performing chain queuing, and executing the step S4;
s4, processing the data stream, and executing the step S5;
and S5, outputting the result.
Preferably, the step S3 is to determine that the priority of each process in the data stream includes the following:
and judging whether to perform insertion priority processing according to the priority of the program in the determined process priority. If the queue has a higher priority than the process, the sequence of the operations is arranged behind the queue. When it is judged that the operations in the entire chain are higher than this, the operations are inserted from the end in order. For processes of equal priority, the initial level is assumed to be the lowest priority level for unregistered processes according to who comes first and performs processing actions.
Preferably, for each data flow entering the linked list, there are two initial states, one is a wait state and one is a process state. In order to prevent the data from being processed for too long time, when the processing time is reached, the return value is waited for a certain time, if the processing time is over, the return value returns to a state, and when the processing time is over, the return value returns to a state, so that the program can normally proceed, and the program is prevented from entering a long waiting state.
Preferably, in step S4, the data stream is partitioned into blocks by the required data and functions, and each block of data is marked with a key.
Preferably, the key value has uniqueness and cannot be the same as other key values.
Preferably, for a data block of a key value, the data block is in an idle state when no process performs any operation on the data block, and when a process operates on the data of the block, the data block is converted into a busy state. And the process times out as it begins processing the data, processes the data over time and returns the results. When the data is still occupied within the specified time, the occupied process is released in time, and a state is returned to the process.
The invention has the beneficial effects that:
the data is modularized, and the combination of data chains is utilized to realize the rapid application of the data, so that the operation of reading and writing corresponding data in the existing data protection mechanism can be efficiently solved, and the condition that the data is disordered due to competition caused by simultaneously operating the same data block by multiple processes in a program can be well prevented. In addition, due to the modularization of the data blocks, the congestion phenomenon caused by processing the data belonging to one block is well processed, and the method has the advantages of preventing competition and quickly and efficiently realizing the reading and writing of the data.
Drawings
FIG. 1 is a diagram illustrating a data block and key value mapping according to the present invention;
FIG. 2 is a process read flow diagram of the present invention;
fig. 3 is a flow chart of data flow processing according to the present invention.
Detailed Description
The technical solutions of the present invention are further described in detail below with reference to the accompanying drawings, but the scope of the present invention is not limited to the following.
With the development of technology, routers have evolved from the fifth generation to the sixth generation. The number of functions included in the router is increasing, and the shared data is also very frequently processed and used. However, most of the technologies use a single-lock method to protect data, so as to prevent multiple processes from operating on data, which results in confusion when data is used. The method can well ensure data security. However, the data protection of this method results in slow running of part of the program. If the program calls improperly, the program may be deadlock, and the program is troublesome to maintain. And this approach becomes complicated for data sharing and inconvenient for data maintenance.
Therefore, the invention provides a wifi6 router fast data access protection method, which mainly considers that the data are processed in a blocking mode, so that the flexible processing of the data is increased, the situation of mutual competition on data reading and writing of multiple processes is avoided, the data processing speed is increased, and the problem of data abnormity caused by improper data processing is prevented.
As shown in fig. 1, a two-dimensional modeling manner is adopted to modularize data, and block processing is performed on the entire data, where data of each block is usually targeted for a specific function, and it is considered that key value marking is performed on commonly used data blocks, and since the data amount in a router is moderate, only the simplest key value 1,2,3 is used here. Simple key value distinction is performed.
As shown in fig. 2, when a process reads data, if the process operates on the data out of order, the data may be confused, here, a chain structure is used to ensure that only one member operates on the data each time, and the process processes the data according to the priority level of the process, and the process may wait for the subsequent process to process the data. Here, the chain structure is constructed according to the priority of the process carrying.
As shown in fig. 3, when a data flow enters, it is first determined whether a data module to be operated currently is idle, and when it is detected that the module to be operated does not have any data to be operated, the data module can be directly processed. If the current data is being processed, the action to be operated is queued, the queuing is performed according to the priority of the program to be operated, and whether to perform insertion priority processing is judged according to the priority of the program in the determined process priority. If the queue has a higher priority than the process, the sequence of the operations is arranged behind the queue. When it is judged that the operations in the entire chain are higher than this, the operations are inserted from the end in order. For equal priority processes, the process action is based on who comes first and then goes. For unregistered processes, the initial level is generally assumed to be the lowest priority.
It should be noted that, in order to ensure fast processing of data in a device, especially some core processes cannot postpone the real-time effect of their returned results. The priorities of all processes must be reasonably arranged, and the processes are reasonably arranged according to the priorities of the processes. For each data flow entering the linked list, there are two initial states, one is a wait state and one is a process state. In order to prevent the data from being processed for too long time, when the processing time is reached, the return value is waited for a certain time, if the processing time is over, the return value returns to a state, when the processing time is over, the return value returns to a state, so that the program can normally proceed, and the program is prevented from entering a long waiting state.
The data processing process comprises the following steps:
for the modularized data, there may be many processes to operate on the data of the same block at any time, but in a state of operating the data at the same time, the data is easily confused. The invention adopts the blocking processing for the data processing. The data of each block is marked with a key value, and the key value has uniqueness and can not be the same as other key values, so that data errors in operation caused by the fact that the key values are the same are prevented.
Basic attribute parameter table necessary for data of data block:
name (R) Properties
Key value Unique identification of data block
Time of day Data processing timeout
Status of state Corresponding data block status
For data processing, the above table is the most basic parameter, on which other parameters can be added as appropriate if desired. For a data block of a certain key value, the data block is in an idle state when no process performs any operation on the data block, and when a process operates the data of the block, the data block is required to be converted into a busy state. And the process times out as it begins processing the data, processes the data over time and returns the results. When the data is still occupied within the specified time, the occupied process is released in time, and a state is returned to the process. This operation is to prevent the data from being occupied by one process for a long time and being unable to exit in time, so that other processes are always in a waiting state.
The two main applications of the invention are in the priority of the process to operate on data, and by this, it is determined which processes must be processed with priority and which processes can wait for processing. The other point is that for the same processed data block, when the same processed data block is in a busy state, the processing time is recorded to prevent the data block from being occupied for a long time and being incapable of being released due to the problem of the process, so that time timing is added, and when the time timing is exceeded, the data block returns to an overtime state immediately, so that other processes can process the data in time, and the process which gives the problem is also released in time to perform subsequent other event feedback.
The foregoing is merely a preferred embodiment of the invention, it being understood that the embodiments described are part of the invention, and not all of it. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention. The invention is not intended to be limited to the forms disclosed herein, but is to be accorded the widest scope consistent with the principles and novel features disclosed herein. And that modifications and variations may be effected by those skilled in the art without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (6)

1. A wifi6 router fast data access protection method is characterized by comprising the following steps:
s1, the data flow enters a data module;
s2, judging whether the data module to be operated in the step S1 is idle, if not, executing the step S3, if so, executing the step S4;
s3, according to the priority of each process in the data flow, performing chain queuing, and executing the step S4;
s4, processing the data stream, and executing the step S5;
and S5, outputting the result.
2. The wifi6 router fast data access protection method according to claim 1, wherein the determining the priority of each process in the data stream in step S3 includes the following:
in the process priority already fixed, judge whether to insert the priority to process according to the priority of the procedure, if have priority higher than this process in the team, arrange the course order of the operation behind it, when judging the operation in the whole chain is higher than it, insert from the end in order, for the process of the equal priority, according to who comes first and who carries on the processing action, for the process not registered, presume the initial rank is the lowest priority altogether.
3. The wifi6 router fast data access protection method of claim 1, wherein there are two initial states for each data flow entering the linked list, one is a waiting state and the other is a processing state, where in order to prevent the data from being processed too long, when the processing time is reached, the return value is waited for a certain time, if the certain time is exceeded, the return state is returned, when the time is exceeded, the return state is returned, so that the program can proceed normally, preventing the program from entering the long waiting state.
4. The wifi6 router fast data access protection method of claim 1, wherein in step S4, the data stream is partitioned into blocks by the required data and functions, and each block of data is marked with a key.
5. The wifi6 router fast data access protection method according to claim 4, wherein the key value has uniqueness and cannot be the same as other key values.
6. The wifi6 router fast data access protection method of claim 5, wherein for a key-value data block, when no process performs any operation on it, it is idle, when a process operates on the data of this block, it will change its status to busy, and when the process starts to process the data, it will count time, process the data within the time and return the result, when the data is still occupied within the specified time, it will timely release the occupied process and return a status to it.
CN202011135139.9A 2020-10-20 2020-10-20 Wifi6 router rapid data access protection method Pending CN112260952A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011135139.9A CN112260952A (en) 2020-10-20 2020-10-20 Wifi6 router rapid data access protection method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011135139.9A CN112260952A (en) 2020-10-20 2020-10-20 Wifi6 router rapid data access protection method

Publications (1)

Publication Number Publication Date
CN112260952A true CN112260952A (en) 2021-01-22

Family

ID=74264585

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011135139.9A Pending CN112260952A (en) 2020-10-20 2020-10-20 Wifi6 router rapid data access protection method

Country Status (1)

Country Link
CN (1) CN112260952A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150127400A1 (en) * 2013-11-07 2015-05-07 Oracle International Corporation Team-based approach to skills-based agent assignment
CN106375241A (en) * 2016-08-29 2017-02-01 中国工商银行股份有限公司 Batch data processing method, front-end system, host and batch data processing system
CN107274471A (en) * 2017-06-15 2017-10-20 深圳市彬讯科技有限公司 It is a kind of to dispatch system based on rendering parallel multipriority queue offline in real time
CN109445944A (en) * 2018-10-25 2019-03-08 武汉虹旭信息技术有限责任公司 A kind of network data acquisition processing system and its method based on DPDK
CN109446114A (en) * 2018-10-12 2019-03-08 咪咕文化科技有限公司 Spatial data caching method and device and storage medium
US10235248B1 (en) * 2017-04-27 2019-03-19 EMC IP Holding Company LLC Processing I/O operations in parallel while maintaining read/write consistency using range and priority queues in a data protection system
CN111027762A (en) * 2019-12-06 2020-04-17 山东科技大学 Block chain prediction model for time, price and purchase amount in stock transaction

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150127400A1 (en) * 2013-11-07 2015-05-07 Oracle International Corporation Team-based approach to skills-based agent assignment
CN106375241A (en) * 2016-08-29 2017-02-01 中国工商银行股份有限公司 Batch data processing method, front-end system, host and batch data processing system
US10235248B1 (en) * 2017-04-27 2019-03-19 EMC IP Holding Company LLC Processing I/O operations in parallel while maintaining read/write consistency using range and priority queues in a data protection system
CN107274471A (en) * 2017-06-15 2017-10-20 深圳市彬讯科技有限公司 It is a kind of to dispatch system based on rendering parallel multipriority queue offline in real time
CN109446114A (en) * 2018-10-12 2019-03-08 咪咕文化科技有限公司 Spatial data caching method and device and storage medium
CN109445944A (en) * 2018-10-25 2019-03-08 武汉虹旭信息技术有限责任公司 A kind of network data acquisition processing system and its method based on DPDK
CN111027762A (en) * 2019-12-06 2020-04-17 山东科技大学 Block chain prediction model for time, price and purchase amount in stock transaction

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
MIN-WOO LEE: "Reconfigurable CORDIC-Based Low-Power DCT Architecture Based on Data Priority", 《IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS》 *
李周志: "基于多优先级缓存队列的远程数据传输技术", 《计算机工程》 *

Similar Documents

Publication Publication Date Title
CN109784930B (en) Block chain transaction data processing method and device, electronic equipment and medium
JP2003044296A5 (en)
US7606958B2 (en) Interrupt control method, interrupt control apparatus and interrupt control medium
US20170262224A1 (en) Memory Cleaning Method and Apparatus
CN114567607B (en) Multi-port arbitration method, device, equipment and computer readable storage medium
EP2676189B1 (en) Sorting
WO2010135926A1 (en) Method and device for scheduling queues based on chained list
CN110362450A (en) A kind of log data acquisition method, device and computer readable storage medium
US9135195B2 (en) Prediction of electronic component behavior in bus-based systems
CN109714249A (en) A kind of method for pushing and relevant apparatus of small routine message
CN112040001A (en) Request processing method and device based on distributed storage
CN112260952A (en) Wifi6 router rapid data access protection method
US7266650B2 (en) Method, apparatus, and computer program product for implementing enhanced circular queue using loop counts
CN112433839B (en) Method, equipment and storage medium for realizing high-speed scheduling of network chip
Cena et al. Achieving round-robin access in controller area networks
CN108062459B (en) Method and device for preventing page information from being captured
KR20170117326A (en) Direct memory access control device for at least one processing unit having a random access memory
CN115495249A (en) Task execution method of cloud cluster
US11940890B2 (en) Timing index anomaly detection method, device and apparatus
CN115080435A (en) Case testing method and device
CN106293536B (en) Input/output I/O dispatching method and device
JP5239769B2 (en) Request order control system, request order control method, and request order control program
CN109597832B (en) Data processing method, computing device, storage device, and storage medium
CN112181618A (en) Data transmission method and device, computer equipment and storage medium
CN113750517B (en) Keyboard operation data transmission method and device and keyboard operation execution method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210122

RJ01 Rejection of invention patent application after publication