CN112492053B - Cross-network penetration method and system for P2P network - Google Patents

Cross-network penetration method and system for P2P network Download PDF

Info

Publication number
CN112492053B
CN112492053B CN201910768314.9A CN201910768314A CN112492053B CN 112492053 B CN112492053 B CN 112492053B CN 201910768314 A CN201910768314 A CN 201910768314A CN 112492053 B CN112492053 B CN 112492053B
Authority
CN
China
Prior art keywords
node
network
data
nodes
address
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910768314.9A
Other languages
Chinese (zh)
Other versions
CN112492053A (en
Inventor
杨税令
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Benchainless Technology Shenzhen Co ltd
Original Assignee
Benchainless Technology Shenzhen Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Benchainless Technology Shenzhen Co ltd filed Critical Benchainless Technology Shenzhen Co ltd
Priority to CN201910768314.9A priority Critical patent/CN112492053B/en
Publication of CN112492053A publication Critical patent/CN112492053A/en
Application granted granted Critical
Publication of CN112492053B publication Critical patent/CN112492053B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/09Mapping addresses
    • H04L61/25Mapping addresses of the same type
    • H04L61/2503Translation of Internet protocol [IP] addresses
    • H04L61/256NAT traversal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/74Address processing for routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/562Brokering proxy services
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a cross-network penetration method for a P2P network, when an intranet node needs to send data to an extranet node, the intranet node detects whether the extranet node can be accessed, if the extranet node can be accessed, the data is sent, if the extranet node cannot be accessed, an IP address of a relay node is added to a communication message of transaction data and the sending is completed, the extranet sends the data to an intranet, the communication message containing a communication request is added to block transaction through the relay node, the communication message is extracted through a transaction processing link and is processed according to message content, and the process of sending the data to the intranet by the extranet is completed.

Description

Cross-network penetration method and system for P2P network
Technical Field
The present invention relates to the field of block chain technology, and in particular, to a method and system for cross-network penetration in a P2P network.
Background
The blockchain is an important infrastructure of the future credit era, and provides access and use of various crowds and various devices anywhere and in any environment, while the underlying P2P network of the blockchain is the basis for providing access and access of various participants, i.e. the coverage of the P2P network determines the coverage of the future blockchain network. At present, mobile internet is developed, almost one mobile phone is used, one WIFI device is used for each family, and when people use the mobile phone to surf the internet through the WIFI devices, the mobile phone is actually a small local area network in their own family, and then the mobile phone is connected to the internet through an outlet of the small local area network. At present, more and more organizations and more public areas start to provide WIFI access to internet, even network operators start to provide wide-range coverage WIFI access service, which is equivalent to expanding the range of local area networks, but as a result, these terminal internet devices are further isolated from the internet, if other devices on the internet need to directly access these internal devices, no special network configuration is available, because of the large number of internal internet devices, it is not practical to configure networks for each of them, and because of the consideration of factors such as safety, and the requirements of most users are connected outwards and hardly need to be connected inwards, there is no great power to change the current situation. However, when the mobile blockchain starts to be popular, this current situation becomes an important factor restricting the development of the blockchain, because if the node on the blockchain cannot access the node in the local area network, it means that only the node outside the local area network can become the node of the blockchain, which will greatly increase the access threshold of the blockchain node and restrict the popularization of the blockchain node. Therefore, how to set special network parameters without reducing security and enable nodes among various local area networks to be interconnected becomes a problem which needs to be solved urgently.
Disclosure of Invention
The invention aims to provide a cross-network penetration method and a cross-network penetration system for a P2P network, which solve the problem of active communication of nodes among different local area networks and realize the function of building the P2P network in a cross-network manner.
A cross-network penetration method for a P2P network, the method comprising:
the inner network sends data to the outer network: when the intranet node needs to send data to the extranet node, the intranet node detects whether the extranet node can be accessed, if so, the intranet node sends the data, and if not, the intranet node adds the IP address of the relay node to a communication message of transaction data and completes sending;
the outer network sends data to the inner network: when an external network node needs to send data to an internal network node, an internal network node IP address and other external network node IP addresses are obtained through IP address search, data transmission is carried out through establishing a connection relation with the internal network node, if the internal network node with which the external network node establishes the connection relation is not a target node of which the connection relation is to be established, a communication message containing a communication request is added to block transaction through a relay node, the communication message is extracted through a transaction processing link and is processed according to message content, and the process that the external network sends the data to the internal network is completed,
the process that the intranet sends data to the extranet and the process that the extranet sends data to the intranet both are alternately superpose mutually, can realize that the intranet is to the intranet, and the extranet is to the intranet, and the intranet is to the extranet, and the process of penetrating is crossed to the intranet still includes by intranet transmission data to intranet.
Further, the specific process of sending data from the extranet to the intranet includes:
s1, searching a nearby network by an external network node to obtain a connectable node, when the external network node receives data sent by a target node and the external network node needs to feed back the data to the target node, if the connectable node comprises the target node of which the connection relation is to be established by the external network node, directly connecting and completing cross-network penetration, and if the connectable node does not comprise the target node, entering S2;
s2, the external network node extracts an additional communication message sent by the target node to further obtain the IP address of the relay node and perform connection, if the connection cannot be completed, the network is continuously searched or a next active report of the target node is waited, if the connection can be established, a communication message containing data transmission to the target node is created and added to the transaction and sent to the relay node;
s3, the relay node extracts a communication message after receiving the data sent from the external network node, judges whether the data is sent to the relay node according to the content of the communication message, directly processes the data if the data is sent to the relay node, and extracts a terminal IP address of the communication message and establishes a connection relation if the data is not sent to the relay node;
s4, if the relay node and the target node cannot be connected, continuing to search the network until the target node is found and a connection relation is established with the target node, and if the target node is in a deeper network, circulating the steps S1-S4 until the relay node is connected;
and S5, after the relay node and the target node establish a connection relation, the target node receives the data from the relay node and extracts the data content, the target node judges the data to be sent to the target node and judges the original sender of the data to be an extranet node, and the process of sending the extranet data to the intranet is completed.
The present invention further provides an inter-network penetration system for a P2P network based on the above inter-network penetration method, the system comprising:
a network detector: the system is used for scanning and discovering nodes in a local area network and nodes in a public network, and analyzing basic conditions of the network, wherein the basic conditions include but are not limited to network speed and delay conditions;
a node manager: the system is used for managing the scanned nodes, comparing the IP address positions of the scanned nodes, and dividing the scanned nodes into an extranet or an intranet according to the positions;
a data repeater: the routing rule is used for generating a routing rule from the data sending node to the target node and forwarding the data according to the routing rule;
in the system, a network detector searches a local area network and finds a plurality of nodes, when a node manager creates transaction data and a node outside the local area network needs to send the transaction data to the node inside the local area network, the address of a relay node is added to a communication message of the transaction data through the node manager and then sent, a data relay extracts the additional communication message in the transaction data and transmits a specified target address in the additional communication message to the next node until the whole transaction data reaches the target node, and the network detector, the node manager and the data relay are connected in a cross mesh mode and can access the data.
Further, the network probe includes:
an address generation module: the network address list is used for generating a network address list waiting for searching according to the network environment of the current node, if the network of the current node is a local area network, the local area network is taken as the main network, if the network of the current node is a public network, the public network is taken as the main network, and if the local area network and the public network are both available, the local area network is preferentially scanned and the existing bidirectional communicable node is found;
a network connection module: the system comprises a port for trying to initiate a connection request to a designated port of a designated address, checking the validity of connection according to an upper application protocol, checking whether the designated address is a legal node or not, and recording the valid and effective address;
an address storage module: the system is used for storing the effective address, recording the effective address in the position of the public network and the local area network address, and grouping the local area network addresses adopting the unified outlet to mark the local area network area.
Further, the node manager includes:
a node information module: the system comprises a base information recording module, a data forwarding module and a data forwarding module, wherein the base information recording module is used for recording the base information of nodes, and the correspondingly recorded information is different according to the difference of upper layer applications, and the information comprises but is not limited to the height of a block and network information corresponding to the nodes, and also comprises at least more than two IP addresses according to the difference of network depths where the nodes are located, so that the IP addresses can be forwarded to a final internal receiving address layer by layer during data forwarding;
a node consensus module: the node consensus method is used for carrying out consensus on the effectiveness of the nodes, judging the effectiveness of the nodes according to a consensus mechanism in a block chain environment, judging the nodes with consistent data as effective nodes, and judging whether the inconsistent nodes are effective after waiting for the next round of consensus;
a node expansion module: the method is used for expanding the node list of the network detector according to the node lists of other nodes, further using the node list as a search address list of the network detector, and further expanding the node list according to the expanded node list after rapidly expanding the range of the available nodes.
Further, the data repeater includes:
a routing table module: the system comprises a plurality of local area networks, a plurality of relay nodes and a plurality of network distribution conditions, wherein the relay nodes are used for analyzing and extracting the relay nodes of each local area network and the network distribution conditions of the relay nodes;
a path planning module: the relay node is used for calculating the optimal relay node which needs to be experienced when the specified website is moved to another website;
the data forwarding module: the data forwarding module is used for forwarding data which do not belong to the node, sending the data to the next node according to the path planned by the path planning module, and further forwarding the data to the next node when forwarding of others is received until the target node receives the data.
Compared with the prior art, the invention has the following advantages:
(1) The invention is characterized in that a proxy node for establishing connection between a local area network and an external network is obtained by means of the principle of routing, and the communication address of a network layer is converted by the proxy node, so that the data information transmission between the local area network and a public network is completed;
(2) By establishing a transfer penetration protocol in a relay node, namely an agent node, special configuration of devices such as a gateway, a router and the like is not needed, the calculation power and time required by cross-network penetration are greatly shortened, and the data transmission efficiency is improved;
(3) The cross-network penetration method is established on an application layer, and is more flexible and stronger than the method of realizing network penetration by setting a fixed special gateway or routing configuration in a communication protocol.
Drawings
Fig. 1 is a schematic flow chart of an outer network sending data to an inner network in the cross-network penetration method according to the present invention;
FIG. 2 is a schematic diagram of the cross-web penetration system of the present invention;
FIG. 3 is a schematic diagram of the network probe according to the present invention;
FIG. 4 is a schematic diagram of the node manager according to the present invention;
figure 5 is a schematic diagram of the data repeater according to the present invention,
wherein: 100 network probes; 200 a node manager; 300 a data repeater; 101 an address generation module; 102 a network connection module; 103 address storage module; 201 a node information module; 202, a node consensus module; 203 node expansion module; 301 a routing table module; a 302 path planning module; 303 data forwarding module
Detailed Description
The invention is described in further detail below with reference to the figures and specific examples. It should be noted that the technical features involved in the embodiments of the present invention described below may be combined with each other as long as they do not conflict with each other.
As shown in fig. 1, when a mobile blockchain starts to be popular, this situation becomes an important factor restricting the development of the blockchain, because if a node on the blockchain cannot access a node in the lan, it means that only a node outside the lan can become a node of the blockchain, which will greatly increase the access threshold of the blockchain node and restrict the popularity of the blockchain node, and in order to solve the problem that nodes between lans of various sizes can be interconnected without reducing security setting special network parameters, the present invention provides a cross-network penetration method for a P2P network.
Before describing the method of the present invention, a definition of a "P2P network" is described, the so-called "P2P network" is also called a Peer-to-Peer network, i.e. a Peer-to-Peer computer network, is a distributed application architecture for distributing tasks and workloads among peers (peers), and is a networking or network form formed by a Peer-to-Peer computing model in an application layer, in a P2P network environment, a plurality of computers connected to each other are in a Peer-to-Peer status, each computer has the same function, and there is no master-slave division, and one computer can be used as a server, and set shared resources for other computers in the network, and can be used as a workstation, and the whole network does not generally depend on a dedicated centralized server, nor has a dedicated workstation. Each computer in the network can both act as a requester of network services and provide resources, services and content in response to requests from other computers. Typically these resources and services include: sharing and exchange of information, computing resources (e.g., CPU computing power sharing), storage sharing (e.g., cache and disk space usage), network sharing, printer sharing, and the like.
The cross-network penetration method comprises the following steps:
(1) The inner network sends data to the outer network: when the intranet node needs to send data to the extranet node, the intranet node detects whether the extranet node can be accessed, if so, the intranet node sends the data, and if not, the intranet node adds the IP address of the relay node to a communication message of transaction data and completes sending;
(2) The outer net sends data to the inner net: when an external network node needs to send data to an internal network node, an internal network node IP address and other external network node IP addresses are obtained through IP address search, data transmission is carried out through establishing a connection relation with the internal network node, if the internal network node with which the external network node establishes the connection relation is not a target node of which the connection relation is to be established, a communication message containing a communication request is added to block transaction through a relay node, the communication message is extracted through a transaction processing link and is processed according to message content, and the process that the external network sends the data to the internal network is completed,
the process that the intranet sends data to the extranet and the process that the extranet sends data to the intranet both are alternately superpose mutually, can realize that the intranet is to the intranet, and the extranet is to the intranet, and the intranet is to the extranet, and the process of penetrating is crossed to the intranet still includes by intranet transmission data to intranet.
Preferably, the specific process of sending data from the extranet to the intranet includes:
s1, searching a nearby network by an external network node to obtain a connectable node, when the external network node receives data sent by a target node and the external network node needs to feed back the data to the target node, if the connectable node comprises the target node of which the connection relation is to be established by the external network node, directly connecting and completing cross-network penetration, and if the connectable node does not comprise the target node, entering S2;
s2, the external network node extracts an additional communication message sent by the target node to further obtain the IP address of the relay node and perform connection, if the connection cannot be completed, the network is continuously searched or a next active report of the target node is waited, if the connection can be established, a communication message containing data transmission to the target node is created and added to the transaction and sent to the relay node;
s3, the relay node extracts a communication message after receiving the data sent from the external network node, judges whether the data are sent to the relay node according to the content of the communication message, directly processes the data if the data are sent to the relay node, and extracts a terminal IP address of the communication message and establishes a connection relation if the data are not sent to the relay node;
s4, if the relay node and the target node can not be connected, continuing searching the network until the target node is found and a connection relation is established with the target node, and if the target node is in a deeper network, circulating the steps S1-S4 until the relay node is connected;
and S5, after the relay node and the target node establish a connection relation, the target node receives the data from the relay node and extracts the data content, the target node judges the data to be sent to the target node, and then judges the original sender of the data to be an extranet node, so that the process of sending the extranet data to the intranet is completed.
In order to better specifically describe the above cross-network method, the present invention preferably uses ABC as three nodes in a local area network, DE as two nodes in a public network or an external network, and C node is located at the intersection of the local area network and the external network, and belongs to a relay node that can be accessed by both AB and DE nodes, and in the field of internet communication, most of the user requirements are connected to the outside, that is, a node can send a message to D node actively, but when D node has information to send to a node, it will not be able to reach or send a destination error, and the sending of information fails, so that D node cannot know the existence of a node, and a node is also difficult to join into the node network, in fact, in the bottom layer communication, a node sends data to D node through the gateway of C node, the data will specify the source address and destination address sent when sending, but the IP address of a node in local area network is 192.168.0, while D node is a local area network 202, and when D node is not able to send data, it is not possible to specify the IP address of a local area network, that it is not exactly one local area network address, i.168.202, and it is not possible to determine that when D node is a node, it is a local area network, and it is not able to send data, it is a node, and it is a network.
The key step in the process of S1-S5 is to establish a transit protocol at the relay node C, and it is set in the transit protocol that when the node D has data to send to the node a, the node D converts the data into data to send to the node C, and when the node C receives the data, the data is sent to the node a again, because NAT address conversion already exists in the network communication protocol layer, the address conversion here is completed in the application layer, and no special configuration is needed for devices such as gateways, routers, and the like, so that the calculation power of cross-network penetration in the block chain network is greatly saved, and more light weight nodes can participate in the communication of the whole network.
Because the blockchain network has a decentralization characteristic, the C node may not stably provide transit service, and sometimes the computing power or rights and interests of the C node do not reach a fixed configuration capable of working, the role of the relay node of the C node may be provided by the a node or the B node, which needs to be determined according to the scale of the network and the performance of the node capable of establishing bidirectional connection in the network, and the node establishing bidirectional connection is not obtained by configuring a gateway or a router, and is still implemented in an application layer, which is also a more flexible and stronger place than the network penetration achieved by setting a fixed special gateway or routing configuration in a communication protocol.
As shown in fig. 2-5, the present invention provides a cross-network penetration system for P2P network based on the above cross-network penetration method, including a network probe 100, a node manager 200, and a data relay 300, where the network probe 100 is used to scan and discover nodes in a local area network and nodes in a public network, and analyze the basic situations of the network, including but not limited to network speed and delay situations; the node manager 200 is used for managing the scanned nodes, comparing the IP address positions of the scanned nodes, and dividing the scanned nodes into an extranet or an intranet according to the positions; the data relay 300 is used for generating a routing rule from the data sending node to the target node, and forwarding the data according to the routing rule; in the system, a network detector 100 searches a local area network and finds a plurality of nodes, when a node manager 200 creates transaction data and a node outside the local area network needs to send the transaction data to a node inside the local area network, the node manager 200 attaches an address of a relay node to a communication message of the transaction data and then sends the transaction data, a data relay 300 extracts the additional communication message in the transaction data and transmits a specified target address in the additional communication message to a next node until the whole transaction data reaches the target node, and the network detector 100, the node manager 200 and the data relay 300 are connected in a cross mesh manner, so that data access can be realized.
Preferably, the network probe 100 includes:
the address generation module 101: the network address list is used for generating a network address list waiting for searching according to the network environment of the current node, if the network of the current node is a local area network, the local area network is taken as the main network, if the network of the current node is a public network, the public network is taken as the main network, and if the local area network and the public network are both available, the local area network is preferentially scanned and the existing bidirectional communicable node is found;
the network connection module 102: the system comprises a port for trying to initiate a connection request to a designated port of a designated address, checking the validity of connection according to an upper application protocol, checking whether the designated address is a legal address, and recording the legal and effective address;
the address storage module 103: the system is used for storing the effective address, recording the effective address in the position of the public network and the local area network address, and grouping the local area network addresses adopting the unified outlet to mark the local area network area.
Preferably, the node manager 200 includes:
the node information module 201: the system comprises a base node, a plurality of nodes and a plurality of IP addresses, wherein the base node is used for recording basic information of the nodes, the correspondingly recorded information is different according to different upper layer applications, the information comprises but is not limited to the height of a block and network information corresponding to the nodes, and the IP addresses comprise at least two IP addresses according to different network depths of the nodes and are used for forwarding the data layer by layer to a final internal receiving address during data forwarding;
the node consensus module 202: the node consensus method is used for carrying out consensus on the effectiveness of the nodes, judging the effectiveness of the nodes according to a consensus mechanism in a block chain environment, judging the nodes with consistent data as effective nodes, and judging whether the inconsistent nodes are effective after waiting for the next round of consensus;
the node expansion module 203: the method is used for expanding the node list of the network detector according to the node lists of other nodes, further using the node list as a search address list of the network detector, and further expanding the node list according to the expanded node list after rapidly expanding the range of the available nodes.
Preferably, the data repeater 300 includes:
routing table module 301: the system comprises a plurality of local area networks, a plurality of relay nodes and a plurality of network distribution conditions, wherein the relay nodes are used for analyzing and extracting the relay nodes of each local area network and the network distribution conditions of the relay nodes;
the path planning module 302: the relay node is used for calculating the optimal relay node which needs to be experienced when the specified website is moved to another website;
the data forwarding module 303: the data forwarding module is used for forwarding data which do not belong to the node per se, sending the data to the next node according to the path planned by the path planning module, and further forwarding the data to the next node when forwarding of others is received until the target node receives the data.
The key point of the invention is to obtain the proxy node for establishing the connection between the local area network and the external network by the principle of routing, and the communication address conversion of the network layer is carried out by the proxy node, thereby completing the data information transmission between the local area network and the public network.
The above-mentioned embodiments are only preferred embodiments of the present invention, and do not limit the technical scope of the present invention, so that the changes and modifications made by the claims and the specification of the present invention should fall within the scope of the present invention.

Claims (5)

1. A cross-network penetration method for a P2P network, the method comprising:
the internal network sends data to the external network: when the intranet node needs to send data to the extranet node, the intranet node detects whether the extranet node can be accessed, if so, the intranet node sends the data, and if not, the intranet node adds the IP address of the relay node to a communication message of transaction data and completes sending;
the outer net sends data to the inner net: when an extranet node needs to send data to an intranet node, an intranet node IP address and other extranet node IP addresses are obtained through IP address searching, data transmission is carried out through connection relation establishment with the intranet node, if the intranet node with which the extranet node establishes the connection relation is not a target node of the connection relation to be established, a communication message containing a communication request is added to block transaction through a relay node, the communication message is extracted through a transaction processing link and is processed according to message content, and a process that the extranet sends data to the intranet is completed;
the specific process of sending data from the outer network to the inner network comprises the following steps:
s1, searching a nearby network by an external network node to obtain a connectable node, when the external network node receives data sent by a target node and the external network node needs to feed back the data to the target node, if the connectable node comprises the target node of which the connection relation is to be established by the external network node, directly connecting and completing cross-network penetration, and if the connectable node does not comprise the target node, entering S2;
s2, extracting an additional communication message sent by a target node by the external network node to further obtain an IP address of the relay node and connect, if the connection cannot be completed, continuing to search a network or waiting for a next active report of the target node, and if the connection can be established, creating a communication message containing data transmission to the target node, adding the communication message into a transaction and sending the communication message to the relay node;
s3, the relay node extracts a communication message after receiving the data sent from the external network node, judges whether the data is sent to the relay node according to the content of the communication message, directly processes the data if the data is sent to the relay node, and extracts a terminal IP address of the communication message and establishes a connection relation if the data is not sent to the relay node;
s4, if the relay node and the target node cannot be connected, continuing to search the network until the target node is found and a connection relation is established with the target node, and if the target node is in a deeper network, circulating the steps S1-S4 until the relay node is connected;
and S5, after the relay node and the target node establish a connection relation, the target node receives the data from the relay node and extracts the data content, the target node judges the data to be sent to the target node and judges the original sender of the data to be an extranet node, and the process of sending the extranet data to the intranet is completed.
2. A cross-network penetration system for a P2P network, the system comprising:
a network detector: the system comprises a network management server, a network management server and a network management server, wherein the network management server is used for scanning and discovering nodes in a local area network and nodes in a public network and analyzing basic conditions of the network, wherein the basic conditions comprise network speed and delay conditions;
a node manager: the system comprises a scanning module, a data processing module and a data processing module, wherein the scanning module is used for managing scanned nodes, comparing IP address positions where the scanned nodes are located, and dividing the scanned nodes to be in an outer network or an inner network according to the positions;
a data repeater: the routing rule is used for generating a routing rule from the data sending node to the target node and forwarding the data according to the routing rule;
in the system, a network detector searches a local area network and finds a plurality of nodes, when a node manager creates transaction data and a node outside the local area network needs to send the transaction data to the node inside the local area network, the address of a relay node is added to a communication message of the transaction data through the node manager and then sent, a data relay extracts the additional communication message in the transaction data and transmits a specified target address in the additional communication message to the next node until the whole transaction data reaches the target node, and the network detector, the node manager and the data relay are connected in a cross mesh mode and can access the data.
3. The system of claim 2, wherein the network probe comprises:
an address generation module: the network address list is used for generating a network address list waiting for searching according to the network environment of the current node, if the network of the current node is a local area network, the local area network is taken as the main network, if the network of the current node is a public network, the public network is taken as the main network, and if the local area network and the public network are both available, the local area network is preferentially scanned and the existing bidirectional communicable node is found;
a network connection module: the system comprises a port for trying to initiate a connection request to a designated port of a designated address, checking the validity of connection according to an upper application protocol, checking whether the designated address is a legal node or not, and recording the valid and effective address;
an address storage module: the system is used for storing the effective address, recording the effective address in the position of the public network and the local area network address, and grouping the local area network addresses adopting the unified outlet to mark the local area network area.
4. The system of claim 2, wherein the node manager comprises:
a node information module: the system comprises a plurality of nodes, a base information recording module, a network information transmitting module, a data forwarding module and a data forwarding module, wherein the base information recording module is used for recording the base information of the nodes, the correspondingly recorded information is different according to different upper layer applications, the information comprises the height of a block and the network information corresponding to the nodes, and the base information also comprises at least more than two IP addresses according to different network depths of the nodes and is used for forwarding to a final internal receiving address layer by layer during data forwarding;
a node consensus module: the node consensus method is used for carrying out consensus on the effectiveness of the nodes, judging the effectiveness of the nodes according to a consensus mechanism in a block chain environment, judging the nodes with consistent data as effective nodes, and judging whether the inconsistent nodes are effective after waiting for the next round of consensus;
a node expansion module: the method is used for expanding the node list of the network detector according to the node lists of other nodes, further using the node list as a search address list of the network detector, and further expanding the node list according to the expanded node list after rapidly expanding the range of the available nodes.
5. The system of claim 2, wherein the data repeater comprises: a routing table module: the system comprises a plurality of local area networks, a plurality of relay nodes and a plurality of network distribution conditions, wherein the relay nodes are used for analyzing and extracting the relay nodes of each local area network and the network distribution conditions of the relay nodes;
a path planning module: the relay node is used for calculating the optimal relay node which needs to be experienced when the specified website is moved to another website;
a data forwarding module: the data forwarding module is used for forwarding data which do not belong to the node per se, sending the data to the next node according to the path planned by the path planning module, and further forwarding the data to the next node when forwarding of others is received until the target node receives the data.
CN201910768314.9A 2019-08-20 2019-08-20 Cross-network penetration method and system for P2P network Active CN112492053B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910768314.9A CN112492053B (en) 2019-08-20 2019-08-20 Cross-network penetration method and system for P2P network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910768314.9A CN112492053B (en) 2019-08-20 2019-08-20 Cross-network penetration method and system for P2P network

Publications (2)

Publication Number Publication Date
CN112492053A CN112492053A (en) 2021-03-12
CN112492053B true CN112492053B (en) 2023-04-07

Family

ID=74919790

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910768314.9A Active CN112492053B (en) 2019-08-20 2019-08-20 Cross-network penetration method and system for P2P network

Country Status (1)

Country Link
CN (1) CN112492053B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115442416A (en) * 2022-08-31 2022-12-06 上海奇夜语网络科技有限公司 Cross-network communication method, device and communication network

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1878118A (en) * 2005-06-06 2006-12-13 腾讯科技(深圳)有限公司 System for realizing data communication and its method
CN101079783A (en) * 2006-05-27 2007-11-28 腾讯科技(深圳)有限公司 A method for establishing P2P channel in P2P network
CN103957287A (en) * 2014-04-25 2014-07-30 浙江大学城市学院 Internet of things device P2P connection method based on NAT penetration adapter
WO2017166808A1 (en) * 2016-03-30 2017-10-05 上海斐讯数据通信技术有限公司 Method, device, server, and system for implementing p2p communication by going through nat
CN109274735A (en) * 2018-09-11 2019-01-25 腾讯科技(深圳)有限公司 A kind of peer-to-peer network connection method and relevant device
CN109922156A (en) * 2019-03-20 2019-06-21 深圳市网心科技有限公司 A kind of data communications method and its relevant device
CN109936603A (en) * 2017-12-18 2019-06-25 厦门本能管家科技有限公司 One kind being based on the non-associated network network communication means of HTTP

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1878118A (en) * 2005-06-06 2006-12-13 腾讯科技(深圳)有限公司 System for realizing data communication and its method
CN101079783A (en) * 2006-05-27 2007-11-28 腾讯科技(深圳)有限公司 A method for establishing P2P channel in P2P network
CN103957287A (en) * 2014-04-25 2014-07-30 浙江大学城市学院 Internet of things device P2P connection method based on NAT penetration adapter
WO2017166808A1 (en) * 2016-03-30 2017-10-05 上海斐讯数据通信技术有限公司 Method, device, server, and system for implementing p2p communication by going through nat
CN109936603A (en) * 2017-12-18 2019-06-25 厦门本能管家科技有限公司 One kind being based on the non-associated network network communication means of HTTP
CN109274735A (en) * 2018-09-11 2019-01-25 腾讯科技(深圳)有限公司 A kind of peer-to-peer network connection method and relevant device
CN109922156A (en) * 2019-03-20 2019-06-21 深圳市网心科技有限公司 A kind of data communications method and its relevant device

Also Published As

Publication number Publication date
CN112492053A (en) 2021-03-12

Similar Documents

Publication Publication Date Title
US7860019B2 (en) Peer-to-peer network and user information discovery and sharing for mobile users and devices
EP1925123B1 (en) Controlled temporary mobile network
US9077637B2 (en) Determining a physical location of a wireless mobile device
Delmastro From Pastry to CrossROAD: CROSS-layer Ring Overlay for AD hoc networks
US20080071900A1 (en) Device and a method for communicating in a network
JP2010527561A (en) Peer-to-peer collaboration system using edge routing
CN101321128B (en) Communication equipment, communication network system and communication method
CN100452734C (en) Global Internet topology knowledge-based P2P application construction method
JP4607764B2 (en) Mobile peer-to-peer network construction
Ippisch et al. Infrastructure mode based opportunistic networks on android devices
CN112492053B (en) Cross-network penetration method and system for P2P network
JP5726302B2 (en) Secret or protected access to a network of nodes distributed across a communication architecture using a topology server
CN112491935A (en) Water wave type broadcasting method and system for block chain
D'Angelo et al. Mobile computing in digital ecosystems: Design issues and challenges
Seada et al. Social networks: the killer app for wireless ad hoc networks?
WO2011150710A1 (en) Service data transmission method and system based on personal network
Al Ogaili et al. A critical review of Optimization MANET routing protocols
US11902099B2 (en) Methods and systems for automatically building an internet protocol (IP) network
Safa et al. An interoperability model for supporting reliability and power-efficient routing in MANETs
WO2024038606A1 (en) Communication control system, communication control method, and communication control program
Singh The Grid-Based Service Discovery in Mobile Ad Hoc Networks
Yamamoto et al. Evaluation of Dynamic Routing in Information-Centric based Wireless Sensor Networks
CN116669149A (en) Cross-operator service discovery method, device, computer equipment and storage medium
CN116744409A (en) Cross-operator service discovery method, device, computer equipment and storage medium
Saravanan et al. Secure and Efficient Data Search using Continuous Neighbor Discovery Algorithm in MANET

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20210402

Address after: Room 2201, 703c, Desai science and technology building, 9789 Shennan Avenue, high tech Zone community, Yuehai street, Nanshan District, Shenzhen, Guangdong 518000

Applicant after: Benchainless Technology (Shenzhen) Co.,Ltd.

Address before: 361006 unit 202, No.50, anling 2nd Road, Huli District, Xiamen City, Fujian Province

Applicant before: XIAMEN INSTINCT BLOCKCHAIN TECHNOLOGY Co.,Ltd.

GR01 Patent grant
GR01 Patent grant