CN112492053B - Cross-network penetration method and system for P2P network - Google Patents
Cross-network penetration method and system for P2P network Download PDFInfo
- Publication number
- CN112492053B CN112492053B CN201910768314.9A CN201910768314A CN112492053B CN 112492053 B CN112492053 B CN 112492053B CN 201910768314 A CN201910768314 A CN 201910768314A CN 112492053 B CN112492053 B CN 112492053B
- Authority
- CN
- China
- Prior art keywords
- node
- network
- data
- nodes
- address
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/09—Mapping addresses
- H04L61/25—Mapping addresses of the same type
- H04L61/2503—Translation of Internet protocol [IP] addresses
- H04L61/256—NAT traversal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/74—Address processing for routing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
- H04L67/141—Setup of application sessions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/562—Brokering proxy services
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a cross-network penetration method for a P2P network, when an intranet node needs to send data to an extranet node, the intranet node detects whether the extranet node can be accessed, if the extranet node can be accessed, the data is sent, if the extranet node cannot be accessed, an IP address of a relay node is added to a communication message of transaction data and the sending is completed, the extranet sends the data to an intranet, the communication message containing a communication request is added to block transaction through the relay node, the communication message is extracted through a transaction processing link and is processed according to message content, and the process of sending the data to the intranet by the extranet is completed.
Description
Technical Field
The present invention relates to the field of block chain technology, and in particular, to a method and system for cross-network penetration in a P2P network.
Background
The blockchain is an important infrastructure of the future credit era, and provides access and use of various crowds and various devices anywhere and in any environment, while the underlying P2P network of the blockchain is the basis for providing access and access of various participants, i.e. the coverage of the P2P network determines the coverage of the future blockchain network. At present, mobile internet is developed, almost one mobile phone is used, one WIFI device is used for each family, and when people use the mobile phone to surf the internet through the WIFI devices, the mobile phone is actually a small local area network in their own family, and then the mobile phone is connected to the internet through an outlet of the small local area network. At present, more and more organizations and more public areas start to provide WIFI access to internet, even network operators start to provide wide-range coverage WIFI access service, which is equivalent to expanding the range of local area networks, but as a result, these terminal internet devices are further isolated from the internet, if other devices on the internet need to directly access these internal devices, no special network configuration is available, because of the large number of internal internet devices, it is not practical to configure networks for each of them, and because of the consideration of factors such as safety, and the requirements of most users are connected outwards and hardly need to be connected inwards, there is no great power to change the current situation. However, when the mobile blockchain starts to be popular, this current situation becomes an important factor restricting the development of the blockchain, because if the node on the blockchain cannot access the node in the local area network, it means that only the node outside the local area network can become the node of the blockchain, which will greatly increase the access threshold of the blockchain node and restrict the popularization of the blockchain node. Therefore, how to set special network parameters without reducing security and enable nodes among various local area networks to be interconnected becomes a problem which needs to be solved urgently.
Disclosure of Invention
The invention aims to provide a cross-network penetration method and a cross-network penetration system for a P2P network, which solve the problem of active communication of nodes among different local area networks and realize the function of building the P2P network in a cross-network manner.
A cross-network penetration method for a P2P network, the method comprising:
the inner network sends data to the outer network: when the intranet node needs to send data to the extranet node, the intranet node detects whether the extranet node can be accessed, if so, the intranet node sends the data, and if not, the intranet node adds the IP address of the relay node to a communication message of transaction data and completes sending;
the outer network sends data to the inner network: when an external network node needs to send data to an internal network node, an internal network node IP address and other external network node IP addresses are obtained through IP address search, data transmission is carried out through establishing a connection relation with the internal network node, if the internal network node with which the external network node establishes the connection relation is not a target node of which the connection relation is to be established, a communication message containing a communication request is added to block transaction through a relay node, the communication message is extracted through a transaction processing link and is processed according to message content, and the process that the external network sends the data to the internal network is completed,
the process that the intranet sends data to the extranet and the process that the extranet sends data to the intranet both are alternately superpose mutually, can realize that the intranet is to the intranet, and the extranet is to the intranet, and the intranet is to the extranet, and the process of penetrating is crossed to the intranet still includes by intranet transmission data to intranet.
Further, the specific process of sending data from the extranet to the intranet includes:
s1, searching a nearby network by an external network node to obtain a connectable node, when the external network node receives data sent by a target node and the external network node needs to feed back the data to the target node, if the connectable node comprises the target node of which the connection relation is to be established by the external network node, directly connecting and completing cross-network penetration, and if the connectable node does not comprise the target node, entering S2;
s2, the external network node extracts an additional communication message sent by the target node to further obtain the IP address of the relay node and perform connection, if the connection cannot be completed, the network is continuously searched or a next active report of the target node is waited, if the connection can be established, a communication message containing data transmission to the target node is created and added to the transaction and sent to the relay node;
s3, the relay node extracts a communication message after receiving the data sent from the external network node, judges whether the data is sent to the relay node according to the content of the communication message, directly processes the data if the data is sent to the relay node, and extracts a terminal IP address of the communication message and establishes a connection relation if the data is not sent to the relay node;
s4, if the relay node and the target node cannot be connected, continuing to search the network until the target node is found and a connection relation is established with the target node, and if the target node is in a deeper network, circulating the steps S1-S4 until the relay node is connected;
and S5, after the relay node and the target node establish a connection relation, the target node receives the data from the relay node and extracts the data content, the target node judges the data to be sent to the target node and judges the original sender of the data to be an extranet node, and the process of sending the extranet data to the intranet is completed.
The present invention further provides an inter-network penetration system for a P2P network based on the above inter-network penetration method, the system comprising:
a network detector: the system is used for scanning and discovering nodes in a local area network and nodes in a public network, and analyzing basic conditions of the network, wherein the basic conditions include but are not limited to network speed and delay conditions;
a node manager: the system is used for managing the scanned nodes, comparing the IP address positions of the scanned nodes, and dividing the scanned nodes into an extranet or an intranet according to the positions;
a data repeater: the routing rule is used for generating a routing rule from the data sending node to the target node and forwarding the data according to the routing rule;
in the system, a network detector searches a local area network and finds a plurality of nodes, when a node manager creates transaction data and a node outside the local area network needs to send the transaction data to the node inside the local area network, the address of a relay node is added to a communication message of the transaction data through the node manager and then sent, a data relay extracts the additional communication message in the transaction data and transmits a specified target address in the additional communication message to the next node until the whole transaction data reaches the target node, and the network detector, the node manager and the data relay are connected in a cross mesh mode and can access the data.
Further, the network probe includes:
an address generation module: the network address list is used for generating a network address list waiting for searching according to the network environment of the current node, if the network of the current node is a local area network, the local area network is taken as the main network, if the network of the current node is a public network, the public network is taken as the main network, and if the local area network and the public network are both available, the local area network is preferentially scanned and the existing bidirectional communicable node is found;
a network connection module: the system comprises a port for trying to initiate a connection request to a designated port of a designated address, checking the validity of connection according to an upper application protocol, checking whether the designated address is a legal node or not, and recording the valid and effective address;
an address storage module: the system is used for storing the effective address, recording the effective address in the position of the public network and the local area network address, and grouping the local area network addresses adopting the unified outlet to mark the local area network area.
Further, the node manager includes:
a node information module: the system comprises a base information recording module, a data forwarding module and a data forwarding module, wherein the base information recording module is used for recording the base information of nodes, and the correspondingly recorded information is different according to the difference of upper layer applications, and the information comprises but is not limited to the height of a block and network information corresponding to the nodes, and also comprises at least more than two IP addresses according to the difference of network depths where the nodes are located, so that the IP addresses can be forwarded to a final internal receiving address layer by layer during data forwarding;
a node consensus module: the node consensus method is used for carrying out consensus on the effectiveness of the nodes, judging the effectiveness of the nodes according to a consensus mechanism in a block chain environment, judging the nodes with consistent data as effective nodes, and judging whether the inconsistent nodes are effective after waiting for the next round of consensus;
a node expansion module: the method is used for expanding the node list of the network detector according to the node lists of other nodes, further using the node list as a search address list of the network detector, and further expanding the node list according to the expanded node list after rapidly expanding the range of the available nodes.
Further, the data repeater includes:
a routing table module: the system comprises a plurality of local area networks, a plurality of relay nodes and a plurality of network distribution conditions, wherein the relay nodes are used for analyzing and extracting the relay nodes of each local area network and the network distribution conditions of the relay nodes;
a path planning module: the relay node is used for calculating the optimal relay node which needs to be experienced when the specified website is moved to another website;
the data forwarding module: the data forwarding module is used for forwarding data which do not belong to the node, sending the data to the next node according to the path planned by the path planning module, and further forwarding the data to the next node when forwarding of others is received until the target node receives the data.
Compared with the prior art, the invention has the following advantages:
(1) The invention is characterized in that a proxy node for establishing connection between a local area network and an external network is obtained by means of the principle of routing, and the communication address of a network layer is converted by the proxy node, so that the data information transmission between the local area network and a public network is completed;
(2) By establishing a transfer penetration protocol in a relay node, namely an agent node, special configuration of devices such as a gateway, a router and the like is not needed, the calculation power and time required by cross-network penetration are greatly shortened, and the data transmission efficiency is improved;
(3) The cross-network penetration method is established on an application layer, and is more flexible and stronger than the method of realizing network penetration by setting a fixed special gateway or routing configuration in a communication protocol.
Drawings
Fig. 1 is a schematic flow chart of an outer network sending data to an inner network in the cross-network penetration method according to the present invention;
FIG. 2 is a schematic diagram of the cross-web penetration system of the present invention;
FIG. 3 is a schematic diagram of the network probe according to the present invention;
FIG. 4 is a schematic diagram of the node manager according to the present invention;
figure 5 is a schematic diagram of the data repeater according to the present invention,
wherein: 100 network probes; 200 a node manager; 300 a data repeater; 101 an address generation module; 102 a network connection module; 103 address storage module; 201 a node information module; 202, a node consensus module; 203 node expansion module; 301 a routing table module; a 302 path planning module; 303 data forwarding module
Detailed Description
The invention is described in further detail below with reference to the figures and specific examples. It should be noted that the technical features involved in the embodiments of the present invention described below may be combined with each other as long as they do not conflict with each other.
As shown in fig. 1, when a mobile blockchain starts to be popular, this situation becomes an important factor restricting the development of the blockchain, because if a node on the blockchain cannot access a node in the lan, it means that only a node outside the lan can become a node of the blockchain, which will greatly increase the access threshold of the blockchain node and restrict the popularity of the blockchain node, and in order to solve the problem that nodes between lans of various sizes can be interconnected without reducing security setting special network parameters, the present invention provides a cross-network penetration method for a P2P network.
Before describing the method of the present invention, a definition of a "P2P network" is described, the so-called "P2P network" is also called a Peer-to-Peer network, i.e. a Peer-to-Peer computer network, is a distributed application architecture for distributing tasks and workloads among peers (peers), and is a networking or network form formed by a Peer-to-Peer computing model in an application layer, in a P2P network environment, a plurality of computers connected to each other are in a Peer-to-Peer status, each computer has the same function, and there is no master-slave division, and one computer can be used as a server, and set shared resources for other computers in the network, and can be used as a workstation, and the whole network does not generally depend on a dedicated centralized server, nor has a dedicated workstation. Each computer in the network can both act as a requester of network services and provide resources, services and content in response to requests from other computers. Typically these resources and services include: sharing and exchange of information, computing resources (e.g., CPU computing power sharing), storage sharing (e.g., cache and disk space usage), network sharing, printer sharing, and the like.
The cross-network penetration method comprises the following steps:
(1) The inner network sends data to the outer network: when the intranet node needs to send data to the extranet node, the intranet node detects whether the extranet node can be accessed, if so, the intranet node sends the data, and if not, the intranet node adds the IP address of the relay node to a communication message of transaction data and completes sending;
(2) The outer net sends data to the inner net: when an external network node needs to send data to an internal network node, an internal network node IP address and other external network node IP addresses are obtained through IP address search, data transmission is carried out through establishing a connection relation with the internal network node, if the internal network node with which the external network node establishes the connection relation is not a target node of which the connection relation is to be established, a communication message containing a communication request is added to block transaction through a relay node, the communication message is extracted through a transaction processing link and is processed according to message content, and the process that the external network sends the data to the internal network is completed,
the process that the intranet sends data to the extranet and the process that the extranet sends data to the intranet both are alternately superpose mutually, can realize that the intranet is to the intranet, and the extranet is to the intranet, and the intranet is to the extranet, and the process of penetrating is crossed to the intranet still includes by intranet transmission data to intranet.
Preferably, the specific process of sending data from the extranet to the intranet includes:
s1, searching a nearby network by an external network node to obtain a connectable node, when the external network node receives data sent by a target node and the external network node needs to feed back the data to the target node, if the connectable node comprises the target node of which the connection relation is to be established by the external network node, directly connecting and completing cross-network penetration, and if the connectable node does not comprise the target node, entering S2;
s2, the external network node extracts an additional communication message sent by the target node to further obtain the IP address of the relay node and perform connection, if the connection cannot be completed, the network is continuously searched or a next active report of the target node is waited, if the connection can be established, a communication message containing data transmission to the target node is created and added to the transaction and sent to the relay node;
s3, the relay node extracts a communication message after receiving the data sent from the external network node, judges whether the data are sent to the relay node according to the content of the communication message, directly processes the data if the data are sent to the relay node, and extracts a terminal IP address of the communication message and establishes a connection relation if the data are not sent to the relay node;
s4, if the relay node and the target node can not be connected, continuing searching the network until the target node is found and a connection relation is established with the target node, and if the target node is in a deeper network, circulating the steps S1-S4 until the relay node is connected;
and S5, after the relay node and the target node establish a connection relation, the target node receives the data from the relay node and extracts the data content, the target node judges the data to be sent to the target node, and then judges the original sender of the data to be an extranet node, so that the process of sending the extranet data to the intranet is completed.
In order to better specifically describe the above cross-network method, the present invention preferably uses ABC as three nodes in a local area network, DE as two nodes in a public network or an external network, and C node is located at the intersection of the local area network and the external network, and belongs to a relay node that can be accessed by both AB and DE nodes, and in the field of internet communication, most of the user requirements are connected to the outside, that is, a node can send a message to D node actively, but when D node has information to send to a node, it will not be able to reach or send a destination error, and the sending of information fails, so that D node cannot know the existence of a node, and a node is also difficult to join into the node network, in fact, in the bottom layer communication, a node sends data to D node through the gateway of C node, the data will specify the source address and destination address sent when sending, but the IP address of a node in local area network is 192.168.0, while D node is a local area network 202, and when D node is not able to send data, it is not possible to specify the IP address of a local area network, that it is not exactly one local area network address, i.168.202, and it is not possible to determine that when D node is a node, it is a local area network, and it is not able to send data, it is a node, and it is a network.
The key step in the process of S1-S5 is to establish a transit protocol at the relay node C, and it is set in the transit protocol that when the node D has data to send to the node a, the node D converts the data into data to send to the node C, and when the node C receives the data, the data is sent to the node a again, because NAT address conversion already exists in the network communication protocol layer, the address conversion here is completed in the application layer, and no special configuration is needed for devices such as gateways, routers, and the like, so that the calculation power of cross-network penetration in the block chain network is greatly saved, and more light weight nodes can participate in the communication of the whole network.
Because the blockchain network has a decentralization characteristic, the C node may not stably provide transit service, and sometimes the computing power or rights and interests of the C node do not reach a fixed configuration capable of working, the role of the relay node of the C node may be provided by the a node or the B node, which needs to be determined according to the scale of the network and the performance of the node capable of establishing bidirectional connection in the network, and the node establishing bidirectional connection is not obtained by configuring a gateway or a router, and is still implemented in an application layer, which is also a more flexible and stronger place than the network penetration achieved by setting a fixed special gateway or routing configuration in a communication protocol.
As shown in fig. 2-5, the present invention provides a cross-network penetration system for P2P network based on the above cross-network penetration method, including a network probe 100, a node manager 200, and a data relay 300, where the network probe 100 is used to scan and discover nodes in a local area network and nodes in a public network, and analyze the basic situations of the network, including but not limited to network speed and delay situations; the node manager 200 is used for managing the scanned nodes, comparing the IP address positions of the scanned nodes, and dividing the scanned nodes into an extranet or an intranet according to the positions; the data relay 300 is used for generating a routing rule from the data sending node to the target node, and forwarding the data according to the routing rule; in the system, a network detector 100 searches a local area network and finds a plurality of nodes, when a node manager 200 creates transaction data and a node outside the local area network needs to send the transaction data to a node inside the local area network, the node manager 200 attaches an address of a relay node to a communication message of the transaction data and then sends the transaction data, a data relay 300 extracts the additional communication message in the transaction data and transmits a specified target address in the additional communication message to a next node until the whole transaction data reaches the target node, and the network detector 100, the node manager 200 and the data relay 300 are connected in a cross mesh manner, so that data access can be realized.
Preferably, the network probe 100 includes:
the address generation module 101: the network address list is used for generating a network address list waiting for searching according to the network environment of the current node, if the network of the current node is a local area network, the local area network is taken as the main network, if the network of the current node is a public network, the public network is taken as the main network, and if the local area network and the public network are both available, the local area network is preferentially scanned and the existing bidirectional communicable node is found;
the network connection module 102: the system comprises a port for trying to initiate a connection request to a designated port of a designated address, checking the validity of connection according to an upper application protocol, checking whether the designated address is a legal address, and recording the legal and effective address;
the address storage module 103: the system is used for storing the effective address, recording the effective address in the position of the public network and the local area network address, and grouping the local area network addresses adopting the unified outlet to mark the local area network area.
Preferably, the node manager 200 includes:
the node information module 201: the system comprises a base node, a plurality of nodes and a plurality of IP addresses, wherein the base node is used for recording basic information of the nodes, the correspondingly recorded information is different according to different upper layer applications, the information comprises but is not limited to the height of a block and network information corresponding to the nodes, and the IP addresses comprise at least two IP addresses according to different network depths of the nodes and are used for forwarding the data layer by layer to a final internal receiving address during data forwarding;
the node consensus module 202: the node consensus method is used for carrying out consensus on the effectiveness of the nodes, judging the effectiveness of the nodes according to a consensus mechanism in a block chain environment, judging the nodes with consistent data as effective nodes, and judging whether the inconsistent nodes are effective after waiting for the next round of consensus;
the node expansion module 203: the method is used for expanding the node list of the network detector according to the node lists of other nodes, further using the node list as a search address list of the network detector, and further expanding the node list according to the expanded node list after rapidly expanding the range of the available nodes.
Preferably, the data repeater 300 includes:
routing table module 301: the system comprises a plurality of local area networks, a plurality of relay nodes and a plurality of network distribution conditions, wherein the relay nodes are used for analyzing and extracting the relay nodes of each local area network and the network distribution conditions of the relay nodes;
the path planning module 302: the relay node is used for calculating the optimal relay node which needs to be experienced when the specified website is moved to another website;
the data forwarding module 303: the data forwarding module is used for forwarding data which do not belong to the node per se, sending the data to the next node according to the path planned by the path planning module, and further forwarding the data to the next node when forwarding of others is received until the target node receives the data.
The key point of the invention is to obtain the proxy node for establishing the connection between the local area network and the external network by the principle of routing, and the communication address conversion of the network layer is carried out by the proxy node, thereby completing the data information transmission between the local area network and the public network.
The above-mentioned embodiments are only preferred embodiments of the present invention, and do not limit the technical scope of the present invention, so that the changes and modifications made by the claims and the specification of the present invention should fall within the scope of the present invention.
Claims (5)
1. A cross-network penetration method for a P2P network, the method comprising:
the internal network sends data to the external network: when the intranet node needs to send data to the extranet node, the intranet node detects whether the extranet node can be accessed, if so, the intranet node sends the data, and if not, the intranet node adds the IP address of the relay node to a communication message of transaction data and completes sending;
the outer net sends data to the inner net: when an extranet node needs to send data to an intranet node, an intranet node IP address and other extranet node IP addresses are obtained through IP address searching, data transmission is carried out through connection relation establishment with the intranet node, if the intranet node with which the extranet node establishes the connection relation is not a target node of the connection relation to be established, a communication message containing a communication request is added to block transaction through a relay node, the communication message is extracted through a transaction processing link and is processed according to message content, and a process that the extranet sends data to the intranet is completed;
the specific process of sending data from the outer network to the inner network comprises the following steps:
s1, searching a nearby network by an external network node to obtain a connectable node, when the external network node receives data sent by a target node and the external network node needs to feed back the data to the target node, if the connectable node comprises the target node of which the connection relation is to be established by the external network node, directly connecting and completing cross-network penetration, and if the connectable node does not comprise the target node, entering S2;
s2, extracting an additional communication message sent by a target node by the external network node to further obtain an IP address of the relay node and connect, if the connection cannot be completed, continuing to search a network or waiting for a next active report of the target node, and if the connection can be established, creating a communication message containing data transmission to the target node, adding the communication message into a transaction and sending the communication message to the relay node;
s3, the relay node extracts a communication message after receiving the data sent from the external network node, judges whether the data is sent to the relay node according to the content of the communication message, directly processes the data if the data is sent to the relay node, and extracts a terminal IP address of the communication message and establishes a connection relation if the data is not sent to the relay node;
s4, if the relay node and the target node cannot be connected, continuing to search the network until the target node is found and a connection relation is established with the target node, and if the target node is in a deeper network, circulating the steps S1-S4 until the relay node is connected;
and S5, after the relay node and the target node establish a connection relation, the target node receives the data from the relay node and extracts the data content, the target node judges the data to be sent to the target node and judges the original sender of the data to be an extranet node, and the process of sending the extranet data to the intranet is completed.
2. A cross-network penetration system for a P2P network, the system comprising:
a network detector: the system comprises a network management server, a network management server and a network management server, wherein the network management server is used for scanning and discovering nodes in a local area network and nodes in a public network and analyzing basic conditions of the network, wherein the basic conditions comprise network speed and delay conditions;
a node manager: the system comprises a scanning module, a data processing module and a data processing module, wherein the scanning module is used for managing scanned nodes, comparing IP address positions where the scanned nodes are located, and dividing the scanned nodes to be in an outer network or an inner network according to the positions;
a data repeater: the routing rule is used for generating a routing rule from the data sending node to the target node and forwarding the data according to the routing rule;
in the system, a network detector searches a local area network and finds a plurality of nodes, when a node manager creates transaction data and a node outside the local area network needs to send the transaction data to the node inside the local area network, the address of a relay node is added to a communication message of the transaction data through the node manager and then sent, a data relay extracts the additional communication message in the transaction data and transmits a specified target address in the additional communication message to the next node until the whole transaction data reaches the target node, and the network detector, the node manager and the data relay are connected in a cross mesh mode and can access the data.
3. The system of claim 2, wherein the network probe comprises:
an address generation module: the network address list is used for generating a network address list waiting for searching according to the network environment of the current node, if the network of the current node is a local area network, the local area network is taken as the main network, if the network of the current node is a public network, the public network is taken as the main network, and if the local area network and the public network are both available, the local area network is preferentially scanned and the existing bidirectional communicable node is found;
a network connection module: the system comprises a port for trying to initiate a connection request to a designated port of a designated address, checking the validity of connection according to an upper application protocol, checking whether the designated address is a legal node or not, and recording the valid and effective address;
an address storage module: the system is used for storing the effective address, recording the effective address in the position of the public network and the local area network address, and grouping the local area network addresses adopting the unified outlet to mark the local area network area.
4. The system of claim 2, wherein the node manager comprises:
a node information module: the system comprises a plurality of nodes, a base information recording module, a network information transmitting module, a data forwarding module and a data forwarding module, wherein the base information recording module is used for recording the base information of the nodes, the correspondingly recorded information is different according to different upper layer applications, the information comprises the height of a block and the network information corresponding to the nodes, and the base information also comprises at least more than two IP addresses according to different network depths of the nodes and is used for forwarding to a final internal receiving address layer by layer during data forwarding;
a node consensus module: the node consensus method is used for carrying out consensus on the effectiveness of the nodes, judging the effectiveness of the nodes according to a consensus mechanism in a block chain environment, judging the nodes with consistent data as effective nodes, and judging whether the inconsistent nodes are effective after waiting for the next round of consensus;
a node expansion module: the method is used for expanding the node list of the network detector according to the node lists of other nodes, further using the node list as a search address list of the network detector, and further expanding the node list according to the expanded node list after rapidly expanding the range of the available nodes.
5. The system of claim 2, wherein the data repeater comprises: a routing table module: the system comprises a plurality of local area networks, a plurality of relay nodes and a plurality of network distribution conditions, wherein the relay nodes are used for analyzing and extracting the relay nodes of each local area network and the network distribution conditions of the relay nodes;
a path planning module: the relay node is used for calculating the optimal relay node which needs to be experienced when the specified website is moved to another website;
a data forwarding module: the data forwarding module is used for forwarding data which do not belong to the node per se, sending the data to the next node according to the path planned by the path planning module, and further forwarding the data to the next node when forwarding of others is received until the target node receives the data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910768314.9A CN112492053B (en) | 2019-08-20 | 2019-08-20 | Cross-network penetration method and system for P2P network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910768314.9A CN112492053B (en) | 2019-08-20 | 2019-08-20 | Cross-network penetration method and system for P2P network |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112492053A CN112492053A (en) | 2021-03-12 |
CN112492053B true CN112492053B (en) | 2023-04-07 |
Family
ID=74919790
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910768314.9A Active CN112492053B (en) | 2019-08-20 | 2019-08-20 | Cross-network penetration method and system for P2P network |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112492053B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115442416A (en) * | 2022-08-31 | 2022-12-06 | 上海奇夜语网络科技有限公司 | Cross-network communication method, device and communication network |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1878118A (en) * | 2005-06-06 | 2006-12-13 | 腾讯科技(深圳)有限公司 | System for realizing data communication and its method |
CN101079783A (en) * | 2006-05-27 | 2007-11-28 | 腾讯科技(深圳)有限公司 | A method for establishing P2P channel in P2P network |
CN103957287A (en) * | 2014-04-25 | 2014-07-30 | 浙江大学城市学院 | Internet of things device P2P connection method based on NAT penetration adapter |
WO2017166808A1 (en) * | 2016-03-30 | 2017-10-05 | 上海斐讯数据通信技术有限公司 | Method, device, server, and system for implementing p2p communication by going through nat |
CN109274735A (en) * | 2018-09-11 | 2019-01-25 | 腾讯科技(深圳)有限公司 | A kind of peer-to-peer network connection method and relevant device |
CN109922156A (en) * | 2019-03-20 | 2019-06-21 | 深圳市网心科技有限公司 | A kind of data communications method and its relevant device |
CN109936603A (en) * | 2017-12-18 | 2019-06-25 | 厦门本能管家科技有限公司 | One kind being based on the non-associated network network communication means of HTTP |
-
2019
- 2019-08-20 CN CN201910768314.9A patent/CN112492053B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1878118A (en) * | 2005-06-06 | 2006-12-13 | 腾讯科技(深圳)有限公司 | System for realizing data communication and its method |
CN101079783A (en) * | 2006-05-27 | 2007-11-28 | 腾讯科技(深圳)有限公司 | A method for establishing P2P channel in P2P network |
CN103957287A (en) * | 2014-04-25 | 2014-07-30 | 浙江大学城市学院 | Internet of things device P2P connection method based on NAT penetration adapter |
WO2017166808A1 (en) * | 2016-03-30 | 2017-10-05 | 上海斐讯数据通信技术有限公司 | Method, device, server, and system for implementing p2p communication by going through nat |
CN109936603A (en) * | 2017-12-18 | 2019-06-25 | 厦门本能管家科技有限公司 | One kind being based on the non-associated network network communication means of HTTP |
CN109274735A (en) * | 2018-09-11 | 2019-01-25 | 腾讯科技(深圳)有限公司 | A kind of peer-to-peer network connection method and relevant device |
CN109922156A (en) * | 2019-03-20 | 2019-06-21 | 深圳市网心科技有限公司 | A kind of data communications method and its relevant device |
Also Published As
Publication number | Publication date |
---|---|
CN112492053A (en) | 2021-03-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7860019B2 (en) | Peer-to-peer network and user information discovery and sharing for mobile users and devices | |
EP1925123B1 (en) | Controlled temporary mobile network | |
US9077637B2 (en) | Determining a physical location of a wireless mobile device | |
Delmastro | From Pastry to CrossROAD: CROSS-layer Ring Overlay for AD hoc networks | |
US20080071900A1 (en) | Device and a method for communicating in a network | |
JP2010527561A (en) | Peer-to-peer collaboration system using edge routing | |
CN101321128B (en) | Communication equipment, communication network system and communication method | |
CN100452734C (en) | Global Internet topology knowledge-based P2P application construction method | |
JP4607764B2 (en) | Mobile peer-to-peer network construction | |
Ippisch et al. | Infrastructure mode based opportunistic networks on android devices | |
CN112492053B (en) | Cross-network penetration method and system for P2P network | |
JP5726302B2 (en) | Secret or protected access to a network of nodes distributed across a communication architecture using a topology server | |
CN112491935A (en) | Water wave type broadcasting method and system for block chain | |
D'Angelo et al. | Mobile computing in digital ecosystems: Design issues and challenges | |
Seada et al. | Social networks: the killer app for wireless ad hoc networks? | |
WO2011150710A1 (en) | Service data transmission method and system based on personal network | |
Al Ogaili et al. | A critical review of Optimization MANET routing protocols | |
US11902099B2 (en) | Methods and systems for automatically building an internet protocol (IP) network | |
Safa et al. | An interoperability model for supporting reliability and power-efficient routing in MANETs | |
WO2024038606A1 (en) | Communication control system, communication control method, and communication control program | |
Singh | The Grid-Based Service Discovery in Mobile Ad Hoc Networks | |
Yamamoto et al. | Evaluation of Dynamic Routing in Information-Centric based Wireless Sensor Networks | |
CN116669149A (en) | Cross-operator service discovery method, device, computer equipment and storage medium | |
CN116744409A (en) | Cross-operator service discovery method, device, computer equipment and storage medium | |
Saravanan et al. | Secure and Efficient Data Search using Continuous Neighbor Discovery Algorithm in MANET |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20210402 Address after: Room 2201, 703c, Desai science and technology building, 9789 Shennan Avenue, high tech Zone community, Yuehai street, Nanshan District, Shenzhen, Guangdong 518000 Applicant after: Benchainless Technology (Shenzhen) Co.,Ltd. Address before: 361006 unit 202, No.50, anling 2nd Road, Huli District, Xiamen City, Fujian Province Applicant before: XIAMEN INSTINCT BLOCKCHAIN TECHNOLOGY Co.,Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |