CN113055457B - Access control and data forwarding method and device, electronic equipment and storage medium - Google Patents

Access control and data forwarding method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN113055457B
CN113055457B CN202110255660.4A CN202110255660A CN113055457B CN 113055457 B CN113055457 B CN 113055457B CN 202110255660 A CN202110255660 A CN 202110255660A CN 113055457 B CN113055457 B CN 113055457B
Authority
CN
China
Prior art keywords
node
access
client
identifier
accessed
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110255660.4A
Other languages
Chinese (zh)
Other versions
CN113055457A (en
Inventor
王光
姜焰
朱敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bigo Technology Pte Ltd
Original Assignee
Bigo Technology Pte Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bigo Technology Pte Ltd filed Critical Bigo Technology Pte Ltd
Priority to CN202110255660.4A priority Critical patent/CN113055457B/en
Publication of CN113055457A publication Critical patent/CN113055457A/en
Priority to PCT/CN2022/076230 priority patent/WO2022188596A1/en
Application granted granted Critical
Publication of CN113055457B publication Critical patent/CN113055457B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • H04L67/1004Server selection for load balancing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/44Star or tree networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses an access control and data forwarding method, a device, electronic equipment and a storage medium, wherein the access control method comprises the following steps: receiving an access request sent by a client; selecting a target access subsystem to be accessed by a client to be accessed from an access system; when the node containing available resources in the tree network node structure in the target access subsystem is determined, selecting a corresponding access node for a client to be accessed from the current tree network node structure, and establishing communication connection by each node in the network node structure through the tree structure; when determining that all nodes in the tree network node structure in the target access subsystem have no available resources, designating an access point as a new node in the tree network node structure, and selecting the new node as an access node corresponding to a client to be accessed; and sending an access control instruction to the client to be accessed to control the client to be accessed to access the access node, and storing the corresponding relation between the identifier of the client to be accessed and the identifier of the access node.

Description

Access control and data forwarding method and device, electronic equipment and storage medium
Technical Field
The present invention relates to the field of network information technologies, and in particular, to an access control and data forwarding method, an apparatus, an electronic device, and a storage medium.
Background
In a mobile internet environment, applications based on audio and video real-time communication are increasingly widely used, such as application scenes of network live broadcast, video conference, group chat and the like. The application scenes are all established on the network connection between the mobile client and the rear access point (namely the server), the client forwards the audio and video data to the target client through the access point, the network quality from end to end directly influences the user experience, and the requirements on the packet loss rate and the delay of the network are high. In order to meet richer social and office attributes, the real-time communication requirements among multiple people are higher and higher, and the end-to-end links are expanded into a net shape from point to point in a real-time communication scene among the multiple people, so that higher requirements are put on the service capability, load balancing and expansibility of an access point (server) for the selection of the access point.
In the current multi-user real-time communication scene, the modes of client access points and data forwarding are as follows: the clients in a multi-user call are connected to the same access point, audio and video data among the clients are all forwarded through the unique access point, however, the method is only suitable for a scene that call members are single, physical distances among the call members are relatively close, the international call quality is poor in a far-distance like a cross country, expansibility is not achieved, and the upper limit of the number of people connected to the access point is limited by the service capability of the access point.
Disclosure of Invention
In order to solve the problem that in the existing multi-user real-time communication scene, the call quality is limited by the physical distance and the number of call members by the way of accessing an access point and data forwarding by a client, the embodiment of the invention provides an access control and data forwarding method, an access control and data forwarding device, electronic equipment and a storage medium.
In a first aspect, an embodiment of the present invention provides an access control method, including:
receiving an access request sent by a client, wherein the access request carries a client identifier to be accessed;
selecting a corresponding access node for the client to be accessed according to the following steps:
selecting a target access subsystem to be accessed by a client to be accessed from an access system, wherein the access system comprises at least one access subsystem;
when the tree network node structure in the target access subsystem comprises nodes with available resources, selecting corresponding access nodes for the client to be accessed from the current tree network node structure, wherein the tree network node structure at least comprises one layer, each node in the tree network node structure is an access point contained in the target access subsystem, and each node in the tree network node structure establishes communication connection through the tree structure;
When determining that all nodes in a tree network node structure in the target access subsystem do not have available resources, designating an access point as a new node in the tree network node structure, and selecting the new node as an access node corresponding to the client to be accessed;
and sending an access control instruction to the client to be accessed to control the client to be accessed to access the access node, and storing the corresponding relation between the identifier of the client to be accessed and the identifier of the access node.
In a second aspect, an embodiment of the present invention provides an access control apparatus, including:
the receiving unit is used for receiving an access request sent by a client, wherein the access request carries a client identifier to be accessed;
a selecting unit, configured to select a corresponding access node for the client to be accessed according to the following steps: selecting a target access subsystem to be accessed by a client to be accessed from an access system, wherein the access system comprises at least one access subsystem; when the tree network node structure in the target access subsystem comprises nodes with available resources, selecting corresponding access nodes for the client to be accessed from the current tree network node structure, wherein the tree network node structure at least comprises one layer, each node in the tree network node structure is an access point contained in the target access subsystem, and each node in the network node structure establishes communication connection through the tree structure; when determining that all nodes in a tree network node structure in the target access subsystem do not have available resources, designating an access point as a new node in the tree network node structure, and selecting the new node as an access node corresponding to the client to be accessed;
And the control unit is used for sending an access control instruction to the client to control the client to access the access node corresponding to the client, and storing the corresponding relation between the client identifier and the access node identifier.
In a third aspect, an embodiment of the present invention provides a data forwarding method, which is applied to a tree network node structure established in the above access control method, including:
a root node in the tree network node structure receives a data forwarding request, wherein the data forwarding request comprises data to be forwarded and a destination client identifier;
acquiring a corresponding relation between a client identifier and an access point identifier, and searching an access node identifier corresponding to the target client identifier from the corresponding relation between the client identifier and the access node identifier;
when the node corresponding to the access node identifier corresponding to the destination client identifier is determined to be a root node, the data to be forwarded is sent to the node corresponding to the node identifier accessed by the destination client, and the node corresponding to the node identifier accessed by the destination client sends the data to be forwarded to the client corresponding to the destination client identifier;
When the node corresponding to the access node identifier corresponding to the destination client identifier is determined to be a child node, forwarding the data to be forwarded to a first root node connected with the node corresponding to the access node identifier of the destination client, sending the data to be forwarded to the node corresponding to the access node identifier of the destination client by the first root node, and sending the data to be forwarded to the client corresponding to the destination client by the node corresponding to the access node identifier of the destination client.
In a fourth aspect, an embodiment of the present invention provides a data forwarding device, which is applied to a root node of a tree network node structure established in the above access control method, including:
the receiving unit is used for receiving a data forwarding request, wherein the data forwarding request comprises data to be forwarded and a destination client identifier;
the acquisition unit is used for acquiring the corresponding relation between the client identifier and the access point identifier, and searching the access node identifier corresponding to the target client identifier from the corresponding relation between the client identifier and the access node identifier;
a first sending unit, configured to send the data to be forwarded to a node corresponding to a node identifier accessed by the destination client when it is determined that the node corresponding to the access node identifier corresponding to the destination client is a root node, where the node corresponding to the node identifier accessed by the destination client sends the data to be forwarded to a client corresponding to the destination client identifier;
And the second sending unit is used for sending the data to be forwarded to a first root node connected with a node corresponding to the node identifier accessed by the destination client when the node corresponding to the access node identifier corresponding to the destination client is determined to be a child node, sending the data to be forwarded to the node corresponding to the node identifier accessed by the destination client by the first root node, and sending the data to be forwarded to a client corresponding to the destination client by the node corresponding to the node identifier accessed by the destination client.
In a fifth aspect, an embodiment of the present invention provides an electronic device, including a memory, a processor, and a computer program stored in the memory and capable of running on the processor, where the processor implements an access control method or a data forwarding method according to the present invention when executing the program.
In a sixth aspect, an embodiment of the present invention provides a computer readable storage medium having stored thereon a computer program which when executed by a processor implements the steps of the access control method or the data forwarding method according to the present invention.
The embodiment of the invention has the following beneficial effects:
In the embodiment of the invention, after receiving an access request carrying a to-be-accessed client identifier sent by a client, a receiving control end selects a corresponding access node for the to-be-accessed client by the following method: selecting a target access subsystem to be accessed by a client to be accessed from an access system, wherein the access system comprises at least one access subsystem, when determining that available resources exist in a tree network node structure in the target access subsystem, selecting a corresponding access node for the client to be accessed from a current tree network node structure, wherein each node in the tree network node structure at least comprises a layer, the nodes in the tree network node structure are access points contained in the target access subsystem, communication connection is established through the tree structure, when determining that available resources do not exist in each node in the tree network node structure in the target access system, one access point is designated as a new node in the tree network node structure, the new node is selected as an access node corresponding to the client to be accessed, and then an access control instruction is sent to the client to be accessed to control the access of the client to be accessed as the access node selected by the client to be accessed, and the corresponding relation between the client to be accessed and the access node identifier is stored, compared with the prior art, in a multi-person real-time communication scene, the access point contained in the tree network node structure can not be limited by the nodes, the new node can be provided with the current tree network node structure, the service quality can be satisfied when the tree network structure is limited by the current network node, the number of the tree network node can be provided, the current network quality can be limited by the current network node, the service quality can be satisfied, the requirements can be satisfied, and the service quality can be satisfied by the network node has the limit by the current network quality and the network node has the requirements, communication efficiency and user experience are improved.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims thereof as well as the appended drawings.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the invention and do not constitute a limitation on the invention. In the drawings:
fig. 1 is a schematic structural diagram of an access control system according to an embodiment of the present invention;
fig. 2 is a schematic flow chart of an implementation of an access control method according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of an access control device according to an embodiment of the present invention;
fig. 4 is a schematic flow chart of an implementation of a data forwarding method according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of a data forwarding device according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
In order to solve the problem that in the existing multi-user real-time communication scene, the call quality is limited by the physical distance and the number of call members by the way of accessing an access point and data forwarding by a client, the embodiment of the invention provides an access control and data forwarding method, an access control and data forwarding device, electronic equipment and a storage medium.
The preferred embodiments of the present invention will be described below with reference to the accompanying drawings of the specification, it being understood that the preferred embodiments described herein are for illustration and explanation only, and not for limitation of the present invention, and embodiments of the present invention and features of the embodiments may be combined with each other without conflict.
As shown in fig. 1, which is a schematic structural diagram of an access control system provided by an embodiment of the present invention, the access control system may include an access control end and an access system, where the access system includes at least one access subsystem, and in fig. 1, an example is given by using 3 access subsystems, each access subsystem included in the access system may be an independent machine room, and the geographic location of each access subsystem may be located in a different country on the earth, or may be located in a different region of the same country, which is not limited by the embodiment of the present invention. Each access subsystem contains a plurality of access points, which may be servers, for forwarding data, such as communication data between clients in a multi-person audio-video conference, where the communication data between clients may include, but is not limited to, audio data, video data, and the like. In the embodiment of the invention, the access control end can be a quality detection system, the quality detection system can be implemented on a server, and when the quality detection system receives an access request sent by a client, the quality detection system can detect the network quality between the client and an access point of the access subsystem, and an optimal access subsystem is selected for the client. The quality detection system indicates each access subsystem to establish an access network according to the number of the request access clients, the access network structure in each access subsystem is a tree-shaped network node structure, each node in the network node structure establishes two-way communication connection through the tree-shaped structure, each newly added node in the tree-shaped network node structure is added when the number of the clients accessed by each node in the existing tree-shaped network node structure reaches the online (namely, each node has no available resource), and two-way communication connection is established between a root node in the tree-shaped network node structure in each access subsystem and root nodes in the tree-shaped network node structures in other access subsystems, so that data can be transmitted between each access subsystem through each root node.
The server may be an independent physical server, or may be a cloud server that provides basic cloud computing services such as a cloud server, a cloud database, and cloud storage. The client may be, but is not limited to being: smart phones, tablet computers, notebook computers, desktop computers, etc., to which embodiments of the present invention are not limited.
Fig. 2 is a schematic implementation flow chart of an access control method according to an embodiment of the present invention, where the access control method may be applied to the above-mentioned access control end, and in the embodiment of the present invention, the access control end uses a quality control system as an example to illustrate, and may specifically include the following steps:
s11, receiving an access request sent by a client, wherein the access request carries a client identifier to be accessed.
In implementation, the quality control system receives an access request sent by a client, wherein the access request carries a to-be-accessed client identifier, the to-be-accessed client comprises a client for sending the access request, and the to-be-accessed client is marked as a source client, and can also comprise a destination client for requesting communication by the source client. If the client to be accessed further comprises a destination client, the quality control system queries the access node identifier corresponding to the destination client identifier from the corresponding relation between the locally stored client identifier and the access node identifier, if the access node identifier corresponding to the destination client identifier is queried, the destination client is indicated to have accessed to the target access node, if the access node corresponding to the destination client identifier is not queried, the corresponding access node is selected for the client to be accessed according to steps S12-S14 no matter the client to be accessed is the source client or the destination client:
S12, selecting a target access subsystem to be accessed by a client to be accessed from an access system, wherein the access system comprises at least one access subsystem.
In specific implementation, the quality control system selects a target access subsystem to be accessed by a client to be accessed from the access systems, wherein the access systems comprise at least one access subsystem.
Specifically, the quality control system stores access point (i.e. server) identifiers and IP (Internet Protocol ) address information contained in each access subsystem in the access system, the quality control system returns the assigned access point identifiers and IP address information in each access subsystem to the client to be accessed, the client sends detection packets to the assigned access point in each access subsystem according to the assigned access point identifiers and IP address information in each access subsystem, a corresponding detection result is obtained, and each detection result is sent to the quality control system, the quality control system selects a target access subsystem to be accessed for the client to be accessed according to the detection result, wherein the detection result comprises information such as delay, packet loss rate and the like of the detection packets sent to the assigned access point by the client to be accessed, and the target access subsystem is the access subsystem to which the network quality between the client to be accessed and the assigned access point is optimal, which is determined by the quality control system according to the delay and the packet loss rate of the detection packets.
S13, when the fact that the tree network node structure in the target access subsystem comprises the node with the available resource is determined, selecting a corresponding access node for the client to be accessed from the current tree network node structure.
When the quality detection system determines that the tree network node structure in the target access subsystem comprises nodes with available resources, selecting corresponding access nodes for the client to be accessed from the current tree network node structure, wherein the tree network node structure at least comprises one layer, each node in the tree network node structure is an access point contained in the target access subsystem, and each node in the network node structure establishes bidirectional communication connection through the tree structure.
Specifically, when determining that available resources exist in the highest-level node of the current tree network node structure, selecting the highest-level node as an access node corresponding to a client to be accessed, wherein the highest-level node is a root node, and other level nodes are child nodes of the root node; when the highest-level node is determined to have no available resources, selecting one node with the available resources from the sub-nodes of the root node according to the order from high to low of the level as an access node corresponding to the client to be accessed.
In the embodiment of the invention, the tree network node structure in the target access subsystem is built node by node according to the number of the client accesses. When the target access subsystem is determined to not establish the tree network structure, designating an access point as a root node of the tree network structure, wherein the root node is the highest level node of the tree network structure, designating an access point as a first sub-node of the next level of the root node when the number of clients accessed by the root node is equal to a first preset threshold value, designating an access point as a second sub-node of the level when the number of clients accessed by the sub-node is equal to a second preset threshold value, and so on until the number of sub-nodes contained in the current level is equal to a set value and the number of clients accessed by the root node and the sub-node of the current level reaches an accessible upper limit, designating an access point as the sub-node of the next level of the current level, and not continuing to establish the sub-node of the next level until the number of the levels of the established tree network node structure is equal to a third preset threshold value. The first preset threshold, the second preset threshold and the third preset threshold may be set by themselves according to actual conditions, and the first preset threshold and the second preset threshold may be set to the same value, for example, the first preset threshold and the second preset threshold may be set to 10, and the third preset threshold is set to 3.
When the number of the clients currently accessed by the root node of the tree network structure in the target access subsystem is smaller than a first preset threshold, and the root node is determined to have available resources, the root node is selected as the access node corresponding to the client to be accessed. When the number of the clients currently accessed by the root node is determined to be equal to a first preset threshold value, determining that the root node does not have available resources, and selecting a node with the number of the accessed clients smaller than a second preset threshold value from the sub-nodes of the root node according to the sequence from high to low of the hierarchy as an access node corresponding to the client to be accessed. Taking the access subsystem 1 in fig. 1 as an example, assuming that the current tree network structure in the access subsystem 1 has two layers established, each node is connected with 10 sub-nodes, i.e., n=10, and the highest level can be marked as the 0 th level, the 0 th level includes the root node 1, the next level of the highest level is marked as the 1 st level, and the 1 st level includes 10 sub-nodes: 1_1-1_10, assuming that the first preset threshold value and the second preset threshold value are both 10, if the root node 1 has withdrawn clients, that is, the number of clients accessed on the root node 1 is less than 10, selecting the root node 1 as an access node corresponding to the client to be accessed, and if the number of clients accessed on the root node 1 is 10, selecting a node with the number of accessed clients less than 10 from the nodes 1_1-1_10 of the 1 st hierarchy as an access node corresponding to the client to be accessed.
And S14, when determining that all nodes in the tree network node structure in the target access subsystem do not have available resources, designating an access point as a new node in the tree network node structure, and selecting the new node as an access node corresponding to the client to be accessed.
When the quality detection system determines that the current tree network node structure in the target access subsystem only comprises a root node and the root node does not have available resources, designating an access point as a child node of the next level of the root node; when the current tree network node structure comprises root nodes and child nodes, and the number of the child nodes of the current level is smaller than the set upper limit value corresponding to the current level and no available resources exist in the root nodes and the child nodes, designating an access point as the child node of the current level; when the number of the child nodes of the current level is equal to the set upper limit value corresponding to the current level and no available resource exists in the root node and each child node, designating an access point as the child node of the next level of the child nodes of the current level.
Specifically, when it is determined that the current tree network structure in the target access subsystem includes only the root node and the number of clients currently accessed by the root node is equal to the first preset threshold, the quality detection system determines that the root node does not have available resources, and designates a new access point as a child node of the next level of the root node, for example, a first child node 1_1 of the next level of the root node 1 in the access subsystem 1 in fig. 1.
The quality detection system may preset an upper limit value of the number of the sub-nodes connectable to each level, count the total number of the sub-nodes connectable to each level at most according to the number of the sub-nodes connectable to each node, and store the counted total number, for example, set the upper limit value of the number of the sub-nodes connectable to 1 node as N, then the next level of the 0 th level (i.e., the highest level), i.e., the 1 st level is connectableWith the upper limit value of the number of connected sub-nodes being N, since the 1 st level contains N sub-nodes, the number of sub-nodes of the next level to which each sub-node can be connected is N, and the upper limit value of the number of sub-nodes of the next level, i.e., the 2 nd level, is n×n=n 2 And each. When the quality detection system determines that the current tree network node structure in the target access subsystem comprises root nodes and sub-nodes, the number of the sub-nodes of the current level is smaller than a set upper limit value corresponding to the current level, the number of clients currently accessed by the root nodes is equal to a first preset threshold value, and the number of the clients currently accessed by each sub-node is equal to a second preset threshold value, a new access point is designated as the sub-node of the current level. For example, taking the case where the first preset threshold and the second preset threshold are both set to 10 as an example, it is assumed that in fig. 1, the access subsystem 1 currently includes two levels, the set upper limit value of the number of corresponding sub-nodes of the 1 st level is 10, the number of the root node 1 currently accesses to the client is 10, and the sub-nodes of the current level include: 1_1 and 1_2, the number of clients currently accessed by the child nodes 1_1 and 1_2 is 10, that is, the root node 1 and the child nodes 1_1 and 1_2 have no available resources, the number of child nodes at the 1 st level is 2, and if the number of child nodes is smaller than the set upper limit value 10, a new access point is designated as the child node at the 1 st level: 1_3.
When the quality detection system determines that the number of the sub-nodes of the current level is equal to a set upper limit value corresponding to the current level and the number of the clients currently accessed by the root node is equal to a first preset threshold value, the number of the clients currently accessed by each sub-node is equal to a second preset threshold value, a new access point is designated as a sub-node of the next level of the sub-nodes of the current level. Continuing the example above, when the number of current access clients of root node 1 is 10, the child nodes of the current hierarchy include 10: 1_1 to 1_10, the number of clients currently accessed by the child nodes 1_1 to 1_10 is 10, that is, the root node 1 and the child nodes 1_1 to 1_10 have no available resources, and the number of child nodes in the 1 st level reaches a set upper limit value 10, a new access point is designated as a child node in the 2 nd level: 1_1_1.
Further, in the embodiment of the present invention, it is considered that when the number of layers of the tree network node structure increases gradually, the link paths between the clients connected to the sub-nodes may cause an increase in processing delay of the server due to an increase in the number of transit nodes (i.e., transit servers), and may affect the experience of the corresponding user, so that an upper limit is performed on the number of levels of the tree network node structure, and when the number of layers of the current tree network node structure in the access subsystem reaches a preset upper limit value and the client accessed by each current node is full, if the access subsystem is allocated to a new client again, an access point may be reassigned as a new root node in the access subsystem, that is, a plurality of tree network node structures may be set in the same access subsystem, so that the same access subsystem has a certain lateral expansion capability.
Specifically, when the quality detection system determines that the number of levels of the tree network node structure is equal to a third preset threshold and the number of child nodes of the lowest level is equal to a set upper limit corresponding to the lowest level, an access point is designated as a new root node to establish a new tree network node structure. The third preset threshold may be set as needed, for example, may be set to 3, which is not limited in the embodiment of the present invention.
It should be noted that, in the embodiment of the present invention, when one root node is designated in one access subsystem, the quality detection system indicates that the newly established root node establishes a bidirectional communication connection with the root nodes in the access subsystems of other established root nodes in the access system. For example, in fig. 1, assuming that the access subsystem 1 is the access subsystem of the first root node to be established, the access subsystem 2 is the access subsystem of the second root node to be established, and the access subsystem 3 is the access subsystem of the last root node to be established, the tree network node structures in different access subsystems may be recorded according to the sequence of the root node to be added, the root node 1 in the access subsystem 1 may be denoted as LEVEL0, the root node 2 in the access subsystem 2 may be denoted as LEVEL1, the root node 3 in the access subsystem 3 may be denoted as LEVEL2, wherein LEVEL0, LEVEL1, LEVEL2 respectively represent the sequence of the root node 1, the root node 2 and the root node 3 to be added, after the quality detection system designates the root node 2 of the access subsystem 2, the root node 2 is instructed to establish communication connection with the root node 1, after the quality detection system designates the root node 3 of the access subsystem 3, the root node 3 is instructed to establish communication connection with the root node 2, the root node 1 is respectively, and the root node 3 in the quality detection system is sequentially denoted as LEVEL2, and the M is instructed to be connected with the root node M before the access subsystem is designated to the root node 1, if the M is designated to be connected with the root node M respectively, and the root node M is sequentially established.
Furthermore, after the communication connection is established between the root nodes in the different access subsystems, the continuity of communication can be maintained between the root nodes in the different access subsystems by sending heartbeat packets.
Further, for convenience of management, when the multi-person audio-video conference ends, each node may exit the network as follows:
when the root nodes in the access subsystem of which the access system establishes the tree network node structure are determined to need to exit the current network, the root nodes are controlled to exit the current network one by one according to the sequence reverse to the establishment sequence.
And S15, sending an access control instruction to the client to be accessed so as to control the client to be accessed to access the access node, and storing the corresponding relation between the identifier of the client to be accessed and the identifier of the access node.
In specific implementation, the quality detection system sends an access control instruction to the client to be accessed, wherein the access control instruction comprises a node identifier to be accessed and IP address information, after the client to be accessed receives the access control instruction sent by the quality detection system, the client to be accessed accesses the access node selected by the quality detection system according to the node identifier to be accessed and the IP address, returns an access success response message to the quality detection system, and stores the corresponding relation between the client identifier and the access node identifier.
In the embodiment of the invention, as the nodes are in bidirectional communication connection, and each node can be connected with the client, namely each client has the capability of uploading, the invention is not only suitable for a live broadcast mode, but also suitable for a conference or group chat mode in which a plurality of people upload wheat at the same time, and has wider application range.
In a specific implementation process, the access control method provided by the embodiment of the invention can organize access points of machine rooms in different areas worldwide in a tree-shaped and mesh-shaped combined form, has strong horizontal and vertical expansion capability, wherein the horizontal expansion has the global expansion capability, for example, in a scenario that a multi-person audio-video conference is conducted among users in europe, asia and america, the access point in one machine room can be selected as a root node in each of europe, asia and america, communication connection can be established among the various asias through the root nodes selected respectively, longitudinal expansion can be conducted in each of the various asias in each of the selected machine rooms through establishing a tree-shaped network node structure, the upper limit of the longitudinal expansion is only dependent on the number of access points (i.e. servers) in the machine rooms, the number of the access points can be dynamically increased or deleted according to the online number of clients in the conference process, and in addition, in the embodiment of the invention, the number of the clients accessible by each node and the number of the next-stage subnodes connectable to each node are limited, when the upper limit is reached, a new access point can be expanded, so that a single access point cannot become a bottleneck expansion.
In the access control method provided by the embodiment of the invention, after the receiving control end receives the access request carrying the identification of the client to be accessed sent by the client, the corresponding access node is selected for the client to be accessed by the following modes: selecting a target access subsystem to be accessed by a client to be accessed from an access system, wherein the access system comprises at least one access subsystem, when determining that available resources exist in a tree network node structure in the target access subsystem, selecting a corresponding access node for the client to be accessed from a current tree network node structure, wherein each node in the tree network node structure at least comprises a layer, the nodes in the tree network node structure are access points contained in the target access subsystem, communication connection is established through the tree structure, when determining that available resources do not exist in each node in the tree network node structure in the target access system, one access point is designated as a new node in the tree network node structure, the new node is selected as an access node corresponding to the client to be accessed, and then an access control instruction is sent to the client to be accessed to control the access of the client to be accessed as the access node selected by the client to be accessed, and the corresponding relation between the client to be accessed and the access node identifier is stored, compared with the prior art, in a multi-person real-time communication scene, the access point contained in the tree network node structure can not be limited by the nodes, the new node can be provided with the current tree network node structure, the service quality can be satisfied when the tree network structure is limited by the current network node, the number of the tree network node can be provided, the current network quality can be limited by the current network node, the service quality can be satisfied, the requirements can be satisfied, and the service quality can be satisfied by the network node has the limit by the current network quality and the network node has the requirements, communication efficiency and user experience are improved.
Based on the same inventive concept, the embodiment of the present invention further provides an access control device, and since the principle of the access control device for solving the problem is similar to that of the access control method, the implementation of the device can refer to the implementation of the method, and the repetition is omitted.
As shown in fig. 3, which is a schematic structural diagram of an access control device according to an embodiment of the present invention, the access control device may include:
a receiving unit 21, configured to receive an access request sent by a client, where the access request carries a to-be-accessed client identifier;
a selecting unit 22, configured to select a corresponding access node for the client to be accessed according to the following steps: selecting a target access subsystem to be accessed by a client to be accessed from an access system, wherein the access system comprises at least one access subsystem; when the tree network node structure in the target access subsystem comprises nodes with available resources, selecting corresponding access nodes for the client to be accessed from the current tree network node structure, wherein the tree network node structure at least comprises one layer, each node in the tree network node structure is an access point contained in the target access subsystem, and each node in the network node structure establishes communication connection through the tree structure; when determining that all nodes in a tree network node structure in the target access subsystem do not have available resources, designating an access point as a new node in the tree network node structure, and selecting the new node as an access node corresponding to the client to be accessed;
And the control unit 23 is configured to send an access control instruction to the client, so as to control the client to access to an access node corresponding to the client, and store a correspondence between the client identifier and an access node identifier.
Preferably, the selecting unit 22 is specifically configured to select, when it is determined that there is an available resource in a highest level node of the tree network node structure, the highest level node as an access node corresponding to the client to be accessed, where the highest level node is a root node, and other level nodes are child nodes of the root node; and when the highest-level node is determined to have no available resources, selecting one node with the available resources from the sub-nodes of the root node according to the order from high to low of the level as an access node corresponding to the client to be accessed.
Optionally, the apparatus further comprises:
a designating unit, configured to designate an access point as a root node of a tree network structure when it is determined that the tree network structure has not been established in the target access subsystem before selecting a corresponding access node for the client to be accessed; and
the selecting unit 22 is specifically configured to designate an access point as a child node of a next level of the root node when it is determined that the tree network node structure includes only the root node and that the root node does not have available resources; when the tree network node structure comprises root nodes and child nodes, and the number of the child nodes of the current level is smaller than the set upper limit value corresponding to the current level and no available resources exist in the root nodes and the child nodes, designating an access point as the child node of the current level; when the number of the child nodes of the current level is equal to the set upper limit value corresponding to the current level and no available resource exists in the root node and each child node, designating an access point as the child node of the next level of the child nodes of the current level.
Preferably, the selection unit 22 is specifically configured to determine that there are no available resources at the root node by: when the number of the clients currently accessed by the root node is determined to be equal to a first preset threshold value, determining that the root node does not have available resources; determining that no resources are available for any child node by: and when the number of the clients currently accessed by any child node is determined to be equal to a second preset threshold value, determining that any child node does not have available resources.
Optionally, the specifying unit is further configured to specify an access point as a new root node when it is determined that the number of levels of the tree network node structure is equal to a third preset threshold and the number of child nodes of a lowest level is equal to a set upper limit corresponding to the lowest level, so as to establish a new tree network node structure.
Preferably, each node in the tree network node structure is in bidirectional communication connection; the access system establishes two-way communication connection between the access subsystems of the tree network node structure through respective root nodes.
Optionally, the control unit 23 is further configured to control each root node to exit the current network one by one in an order opposite to the establishment order when it is determined that the root node in the access subsystem in which the access system establishes the tree network node structure needs to exit the current network.
Fig. 4 is a schematic implementation flow chart of a data forwarding method according to an embodiment of the present invention, which is applied to a tree network node structure established in the above access control method according to an embodiment of the present invention, where the data forwarding method may include the following steps:
s31, a root node in the tree network node structure receives a data forwarding request, wherein the data forwarding request comprises data to be forwarded and a destination client identifier.
In the implementation, a root node of a tree network node structure in any access subsystem in the access control system receives a data forwarding request, wherein the data forwarding request is sent by a client accessed to the root node or is forwarded to the root node after the client accessed to any child node of the root node sends to the any child node.
S32, obtaining the corresponding relation between the client side identifier and the access point identifier, and searching the access node identifier corresponding to the target client side identifier from the corresponding relation between the client side identifier and the access node identifier.
In the implementation, the root node obtains the corresponding relation between the client identifier and the access node identifier from the access control end (quality detection system), and searches the access node identifier corresponding to the target client identifier from the corresponding relation between the client identifier and the access node identifier, namely the node identifier accessed by the target client.
And S33, when the node corresponding to the access node identifier corresponding to the destination client identifier is determined to be the root node, the data to be forwarded is sent to the node corresponding to the node identifier accessed by the destination client, and the node corresponding to the node identifier accessed by the destination client sends the data to be forwarded to the client corresponding to the destination client identifier.
In the implementation, if the node corresponding to the node identifier accessed by the destination client is the root node, the root node receiving the data forwarding request sends the data to be forwarded to the root node accessed by the destination client, and the root node accessed by the client directly forwards the data to be forwarded to the destination client. If the root node accessed by the destination client is the root node receiving the data forwarding request, the root node receiving the data forwarding request directly sends the data to be forwarded to the destination client.
And S34, when the node corresponding to the access node identifier corresponding to the destination client identifier is determined to be a child node, forwarding the data to be forwarded to a first root node connected with the node corresponding to the access node identifier of the destination client, sending the data to be forwarded to the node corresponding to the access node identifier of the destination client by the first root node, and sending the data to be forwarded to the client corresponding to the destination client by the node corresponding to the access node identifier of the destination client.
In the implementation, if the node corresponding to the node identifier accessed by the destination client is a child node, the root node receiving the data forwarding request sends the data to be forwarded to the root node connected with the child node accessed by the destination client, which is marked as a first root node, the first root node forwards the data to be forwarded to the child node accessed by the destination client, and the child node accessed by the destination client sends the data to be forwarded to the destination client.
In order to avoid forming a closed loop in the data forwarding process, the root nodes in different access subsystems only send the data to be forwarded to the lower-level child nodes connected with the root node, and do not directly send the data to the lower-level child nodes of other root nodes, but forward the data through the connected root node.
Taking fig. 1 as an example, assuming that a node to which a client initiating a data forwarding request accesses is a child node 1_1_1 in a tree network node structure in an access subsystem 1, a node to which a destination client accesses is a child node 3_1_1 in a tree network node structure in an access subsystem 3, a data forwarding path may be as follows: the client initiates a data forwarding request to the accessed child node 1_1, the child node 1_1 forwards the data forwarding request to the connected superior child node 1_1, the child node 1_1 extracts data to be forwarded from the data forwarding request, forwards the data to be forwarded to the root node 3 in the access subsystem 3, the root node 3 sends the data to be forwarded to the subordinate child node 3_1, the child node 3_1 sends the data to be forwarded to the subordinate child node 3_1, and the child node 3_1 sends the data to be forwarded to the destination client.
It should be noted that, although the root nodes of the cross access subsystem can logically send data directly, the data can be transferred through the root nodes of the third or even more access subsystems at the bottom layer, and the specific forwarding path can be set by setting the routing policy. In the above example, in the process of sending the data to be forwarded from the root node 1 in the access subsystem 1 to the root node 3 in the access system 3, the root node 1 may send the data to be forwarded to the root node 2, and then the root node 2 may send the data to be forwarded to the root node 3.
Based on the same inventive concept, the embodiment of the present invention further provides a data forwarding device, and since the principle of the data forwarding device for solving the problem is similar to that of the data forwarding method, implementation of the device can refer to implementation of the method, and repeated parts are not repeated.
Fig. 5 is a schematic structural diagram of a data forwarding device according to an embodiment of the present invention, where the data forwarding device is applied to a root node of a tree network node structure established in the above access control method, and may include:
a receiving unit 41, configured to receive a data forwarding request, where the data forwarding request includes data to be forwarded and a destination client identifier;
An obtaining unit 42, configured to obtain a correspondence between a client identifier and an access point identifier, and find an access node identifier corresponding to the destination client identifier from the correspondence between the client identifier and the access node identifier;
a first sending unit 43, configured to send the data to be forwarded to a node corresponding to the node identifier accessed by the destination client when it is determined that the node corresponding to the access node identifier corresponding to the destination client is a root node, where the node corresponding to the node identifier accessed by the destination client sends the data to be forwarded to a client corresponding to the destination client identifier;
and the second sending unit 44 is configured to send the data to be forwarded to a first root node connected to a node corresponding to the node identifier accessed by the destination client when it is determined that the node corresponding to the access node identifier corresponding to the destination client is a child node, where the first root node sends the data to be forwarded to the node corresponding to the node identifier accessed by the destination client, and the node corresponding to the node identifier accessed by the destination client sends the data to be forwarded to the client corresponding to the destination client identifier.
Preferably, the data forwarding request is sent by a client accessing to the root node, or is sent by a client accessing to any child node of the root node to the child node and then forwarded to the root node.
Based on the same technical concept, the embodiment of the present invention further provides an electronic device 500, referring to fig. 6, where the electronic device 500 is configured to implement the access control method described in the above method embodiment, and the electronic device 500 of this embodiment may include: memory 501, processor 502, and a computer program, such as an access control program, stored in the memory and executable on the processor. The steps in the embodiments of the above-mentioned respective access control methods or data forwarding methods are implemented when the processor executes the computer program, for example, step S11 shown in fig. 2. Alternatively, the processor, when executing the computer program, performs the functions of the modules/units of the apparatus embodiments described above, e.g. 21.
The specific connection medium between the memory 501 and the processor 502 is not limited in the embodiment of the present invention. In the embodiment of the present application, the memory 501 and the processor 502 are connected by a bus 503 in fig. 6, the bus 503 is shown by a thick line in fig. 6, and the connection manner between other components is only schematically illustrated, but not limited to. The bus 503 may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown in fig. 6, but not only one bus or one type of bus.
The memory 501 may be a volatile memory (RAM), such as a random-access memory (RAM); the memory 501 may also be a non-volatile memory (non-volatile memory), such as a read-only memory, a flash memory (flash memory), a Hard Disk Drive (HDD) or a Solid State Drive (SSD), or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer, but is not limited thereto. Memory 501 may be a combination of the above.
A processor 502, configured to implement an access control method as shown in fig. 2, including:
the processor 502 is configured to invoke the computer program stored in the memory 501 to execute the step S11 shown in fig. 2, receive an access request sent by a client, where the access request carries an identifier of the client to be accessed, step S12 is configured to select a target access subsystem to be accessed by the client to be accessed from an access system, where the access system includes at least one access subsystem, step S13 is configured to select, when it is determined that a node in a tree network node structure in the target access subsystem includes a node in which an available resource exists, a corresponding access node for the client to be accessed from the current tree network node structure, step S14 is configured to designate an access point as a new node in the tree network node structure when it is determined that no available resource exists in each node in the tree network node structure in the target access subsystem, and select the new node as an access node corresponding to the client to be accessed, and send an access control instruction to the client to be accessed, so as to control the client to be accessed, and store the access node corresponding to the identifier of the client to be accessed.
Alternatively, the processor 502 is configured to implement a data forwarding method as shown in fig. 4, including:
the processor 502 is configured to invoke a computer program stored in the memory 501 to execute the step S31 shown in fig. 4, where a root node in a tree network node structure receives a data forwarding request, where the data forwarding request includes data to be forwarded and a destination client identifier, step S32 is configured to obtain a correspondence between a client identifier and an access point identifier, and search for an access node identifier corresponding to the destination client identifier from the correspondence between the client identifier and the access node identifier, step S33 is configured to send the data to be forwarded to a node corresponding to a node identifier of the destination client access when it is determined that the node corresponding to the access node identifier corresponding to the destination client identifier is a root node, send the data to be forwarded to a client corresponding to the destination client identifier by the node identifier corresponding to the node identifier of the destination client access, and step S34 is configured to forward the data to the first root node of the node corresponding to the node identifier corresponding to the destination client identifier when it is determined that the node corresponding to the access node identifier of the destination client identifier is a child node, where the data to be forwarded is sent by the first root node corresponding to the destination client identifier.
The embodiment of the application also provides a computer readable storage medium which stores computer executable instructions required to be executed by the processor, and the computer readable storage medium contains a program for executing the processor.
In some possible embodiments, each aspect of the access control method provided by the present invention may be further implemented in a form of a program product, where the access control method includes a program code, when the program product runs on an electronic device, the program code is configured to cause the electronic device to execute steps in the access control method described in the present specification according to various exemplary embodiments of the present invention, for example, the electronic device may execute step S11 shown in fig. 2, receive an access request sent by a client, where the access request carries an identifier of the client to be accessed, step S12 selects a target access subsystem to be accessed by the client from an access system, where the access system includes at least one access subsystem, step S13, when it is determined that a node in a tree network node structure in the target access subsystem includes a node with an available resource, selects a corresponding access node for the client to be accessed, step S14, when it is determined that each node in the tree network node structure in the target access subsystem does not include a new node as a node in the tree network node structure, and when it is determined that each node in the tree network node structure in the target access subsystem does not include a new node, specifies a new node as a new node to be accessed node, and the node is to be accessed as the new node to be accessed node, and the node is stored in the new node to be controlled node.
In some possible embodiments, aspects of the data forwarding method provided by the present invention may also be implemented in a form of a program product, where the program product includes program code, when the program product runs on an electronic device, the program code is configured to cause the electronic device to execute the steps in the data forwarding method according to the various exemplary embodiments of the present invention described above, for example, the electronic device may execute the step S31 shown in fig. 4, a root node in a tree network node structure receives a data forwarding request, where the data forwarding request includes data to be forwarded and a destination client identifier, the step S32 is configured to obtain a correspondence between a client identifier and an access point identifier, and find an access node identifier corresponding to the destination client identifier from the correspondence between the client identifier and the access node identifier, and when it is determined that a node corresponding to the access node identifier corresponding to the destination client identifier is a root node, send the data to be forwarded to the node corresponding to the client identifier, and when it is determined that the node corresponding to the access node identifier corresponding to the destination client identifier is a root node, the first step S33 is configured to determine that the data to be forwarded to the root node corresponding to the root node is a root node, and the node corresponding to the node identifier accessed by the destination client sends the data to be forwarded to the client corresponding to the destination client identifier.
It will be apparent to those skilled in the art that embodiments of the present invention may be provided as a method, apparatus, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (devices), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. It is therefore intended that the following claims be interpreted as including the preferred embodiments and all such alterations and modifications as fall within the scope of the invention.
It will be apparent to those skilled in the art that various modifications and variations can be made to the present invention without departing from the spirit or scope of the invention. Thus, it is intended that the present invention also include such modifications and alterations insofar as they come within the scope of the appended claims or the equivalents thereof.

Claims (13)

1. An access control method, applied to a quality control system, comprising:
receiving an access request sent by a client, wherein the access request carries a client identifier to be accessed;
selecting a corresponding access node for the client to be accessed according to the following steps:
selecting a target access subsystem to be accessed by a client to be accessed from an access system, wherein the access system comprises at least one access subsystem;
when the tree network node structure in the target access subsystem comprises nodes with available resources, selecting corresponding access nodes for the client to be accessed from the current tree network node structure, wherein the tree network node structure at least comprises one layer, each node in the tree network node structure is an access point contained in the target access subsystem, and each node in the network node structure establishes communication connection through the tree structure;
When determining that all nodes in a tree network node structure in the target access subsystem do not have available resources, designating an access point as a new node in the tree network node structure, and selecting the new node as an access node corresponding to the client to be accessed; each newly added node in the tree network node structure is added when all nodes in the existing tree network node structure have no available resources;
and sending an access control instruction to the client to be accessed to control the client to be accessed to access the access node, and storing the corresponding relation between the identifier of the client to be accessed and the identifier of the access node.
2. The method according to claim 1, wherein when it is determined that a node in a tree network node structure in the target access subsystem includes available resources, selecting a corresponding access node for the client to be accessed from the current tree network node structure, comprises:
when the fact that available resources exist in the highest-level node of the tree network node structure is determined, the highest-level node is selected to be an access node corresponding to the client to be accessed, the highest-level node is a root node, and other level nodes are child nodes of the root node;
And when the highest-level node is determined to have no available resources, selecting one node with the available resources from the sub-nodes of the root node according to the order from high to low of the level as an access node corresponding to the client to be accessed.
3. The method of claim 1, further comprising, prior to selecting a corresponding access node for the client to be accessed:
when the target access subsystem is determined to not establish a tree network structure, designating an access point as a root node of the tree network structure; and
when determining that available resources do not exist in all nodes in a tree network node structure in the target access subsystem, designating an access point as a new node in the tree network node structure, wherein the method specifically comprises the following steps of:
when the tree network node structure is determined to only contain a root node and the root node does not have available resources, designating an access point as a child node of the next level of the root node;
when the tree network node structure comprises root nodes and child nodes, and the number of the child nodes of the current level is smaller than the set upper limit value corresponding to the current level and no available resources exist in the root nodes and the child nodes, designating an access point as the child node of the current level;
When the number of the child nodes of the current level is equal to the set upper limit value corresponding to the current level and no available resource exists in the root node and each child node, designating an access point as the child node of the next level of the child nodes of the current level.
4. The method of claim 3, wherein,
determining that there are no available resources for the root node by:
when the number of the clients currently accessed by the root node is determined to be equal to a first preset threshold value, determining that the root node does not have available resources;
determining that no resources are available for any child node by:
and when the number of the clients currently accessed by any child node is determined to be equal to a second preset threshold value, determining that any child node does not have available resources.
5. A method as recited in claim 3, further comprising:
when the number of the levels of the tree network node structure is determined to be equal to a third preset threshold value, and the number of the child nodes of the lowest level is determined to be equal to a set upper limit value corresponding to the lowest level, an access point is designated as a new root node so as to establish a new tree network node structure.
6. The method of claim 5, wherein a bi-directional communication connection is made between each node in the tree network node structure; the access system establishes two-way communication connection between the access subsystems of the tree network node structure through respective root nodes.
7. The method as recited in claim 6, further comprising:
when the root nodes in the access subsystem of which the access system establishes the tree network node structure are determined to need to exit the current network, controlling the root nodes to exit the current network one by one according to the sequence reverse to the establishment sequence.
8. An access control apparatus for use in a quality control system, the apparatus comprising:
the receiving unit is used for receiving an access request sent by a client, wherein the access request carries a client identifier to be accessed;
a selecting unit, configured to select a corresponding access node for the client to be accessed according to the following steps: selecting a target access subsystem to be accessed by a client to be accessed from an access system, wherein the access system comprises at least one access subsystem; when the tree network node structure in the target access subsystem comprises nodes with available resources, selecting corresponding access nodes for the client to be accessed from the current tree network node structure, wherein the tree network node structure at least comprises one layer, each node in the tree network node structure is an access point contained in the target access subsystem, and each node in the network node structure establishes communication connection through the tree structure; when determining that all nodes in a tree network node structure in the target access subsystem do not have available resources, designating an access point as a new node in the tree network node structure, and selecting the new node as an access node corresponding to the client to be accessed; each newly added node in the tree network node structure is added when all nodes in the existing tree network node structure have no available resources;
And the control unit is used for sending an access control instruction to the client to control the client to access the access node corresponding to the client, and storing the corresponding relation between the client identifier and the access node identifier.
9. A data forwarding method, applied to a tree network node structure established in the access control method according to any one of claims 1 to 7, comprising:
a root node in the tree network node structure receives a data forwarding request, wherein the data forwarding request comprises data to be forwarded and a destination client identifier;
acquiring a corresponding relation between a client identifier and an access point identifier, and searching an access node identifier corresponding to the target client identifier from the corresponding relation between the client identifier and the access node identifier;
when the node corresponding to the access node identifier corresponding to the destination client identifier is determined to be a root node, the data to be forwarded is sent to the node corresponding to the node identifier accessed by the destination client, and the node corresponding to the node identifier accessed by the destination client sends the data to be forwarded to the client corresponding to the destination client identifier;
When the node corresponding to the access node identifier corresponding to the destination client identifier is determined to be a child node, forwarding the data to be forwarded to a first root node connected with the node corresponding to the access node identifier of the destination client, sending the data to be forwarded to the node corresponding to the access node identifier of the destination client by the first root node, and sending the data to be forwarded to a client corresponding to the destination client identifier by the node corresponding to the access node identifier of the destination client; each newly added node in the tree network node structure is added when all nodes in the existing tree network node structure have no available resources.
10. The method of claim 9, wherein the data forwarding request is sent by a client accessing the root node or is forwarded to the root node after a client accessing any child node of the root node sends to the any child node.
11. A data forwarding device, applied to a root node of a tree network node structure established in the access control method of any one of claims 1 to 7, comprising:
The receiving unit is used for receiving a data forwarding request, wherein the data forwarding request comprises data to be forwarded and a destination client identifier;
the acquisition unit is used for acquiring the corresponding relation between the client identifier and the access point identifier, and searching the access node identifier corresponding to the target client identifier from the corresponding relation between the client identifier and the access node identifier;
a first sending unit, configured to send the data to be forwarded to a node corresponding to a node identifier accessed by the destination client when it is determined that the node corresponding to the access node identifier corresponding to the destination client is a root node, where the node corresponding to the node identifier accessed by the destination client sends the data to be forwarded to a client corresponding to the destination client identifier;
the second sending unit is configured to send the data to be forwarded to a first root node connected to a node corresponding to the node identifier accessed by the destination client when it is determined that the node corresponding to the access node identifier corresponding to the destination client is a child node, where the first root node sends the data to be forwarded to the node corresponding to the node identifier accessed by the destination client, and the node corresponding to the node identifier accessed by the destination client sends the data to be forwarded to the client corresponding to the destination client identifier; each newly added node in the tree network node structure is added when all nodes in the existing tree network node structure have no available resources.
12. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the access control method according to any one of claims 1-7 or the data forwarding method according to any one of claims 9-10 when executing the program.
13. A computer-readable storage medium, on which a computer program is stored, characterized in that the program, when being executed by a processor, implements an access control method according to any one of claims 1 to 7 or a data forwarding method according to any one of claims 9 to 10.
CN202110255660.4A 2021-03-09 2021-03-09 Access control and data forwarding method and device, electronic equipment and storage medium Active CN113055457B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202110255660.4A CN113055457B (en) 2021-03-09 2021-03-09 Access control and data forwarding method and device, electronic equipment and storage medium
PCT/CN2022/076230 WO2022188596A1 (en) 2021-03-09 2022-02-14 Access control method and apparatus, data forwarding method and apparatus, and electronic device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110255660.4A CN113055457B (en) 2021-03-09 2021-03-09 Access control and data forwarding method and device, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN113055457A CN113055457A (en) 2021-06-29
CN113055457B true CN113055457B (en) 2024-01-09

Family

ID=76510869

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110255660.4A Active CN113055457B (en) 2021-03-09 2021-03-09 Access control and data forwarding method and device, electronic equipment and storage medium

Country Status (2)

Country Link
CN (1) CN113055457B (en)
WO (1) WO2022188596A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113055457B (en) * 2021-03-09 2024-01-09 百果园技术(新加坡)有限公司 Access control and data forwarding method and device, electronic equipment and storage medium
CN114727338B (en) * 2022-06-09 2022-09-13 杭州纵横通信股份有限公司 Link establishment method for wireless communication system

Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1588884A (en) * 2004-07-06 2005-03-02 北京航空航天大学 Automatic discovering method for IPV6 internet network topology
CN101102283A (en) * 2007-08-17 2008-01-09 杭州华三通信技术有限公司 A method and device for optimizing unknown unicast forward at wireless access point
CN101114928A (en) * 2006-07-24 2008-01-30 华为技术有限公司 System and method for implementing load balancing
CN101119252A (en) * 2006-08-01 2008-02-06 华为技术有限公司 Access network system, access device, ARP proxy and IP bridging connection forwarding method
WO2008148335A1 (en) * 2007-06-05 2008-12-11 Huawei Technologies Co., Ltd. A method for client node network topology construction and a system for stream media delivery
CN101389128A (en) * 2007-09-10 2009-03-18 中兴通讯股份有限公司 Method for network access of customer terminal through radio relay
CN101523793A (en) * 2006-10-10 2009-09-02 高通股份有限公司 Space division multiple access channelization in wireless communication systems
CN102823205A (en) * 2010-03-26 2012-12-12 思科技术公司 Aggregating data traffic from access domains
CN103036935A (en) * 2011-10-08 2013-04-10 美国博通公司 Social network device communication resource allocation
CN103974310A (en) * 2014-05-08 2014-08-06 江苏物联网研究发展中心 Method, device and system for establishing tree topology of wireless communication multi-hop network device
WO2014127433A1 (en) * 2013-02-25 2014-08-28 Stubbs Margot A control system
CN104540185A (en) * 2014-12-15 2015-04-22 上海华为技术有限公司 Network access method, access gateway and access control device
EP3355522A1 (en) * 2017-01-26 2018-08-01 Deutsche Telekom AG Access aggregation system and bonding client
CN208400296U (en) * 2018-05-24 2019-01-18 榆林学院 A kind of aquarium WIFI control device
CN109495889A (en) * 2018-12-20 2019-03-19 中山大学新华学院 Heterogeneous mobile network access control method based on mutual confidence-building mechanism
CN110166268A (en) * 2018-02-13 2019-08-23 电信科学技术研究院有限公司 A kind of wireless backhaul network, communication means and device

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103813288A (en) * 2012-11-06 2014-05-21 中兴通讯股份有限公司 Method, system, and network element for achieving network as a service (NaaS) based on mobile network
CN110620896B (en) * 2019-08-28 2021-08-20 视联动力信息技术股份有限公司 Conference establishing method, system and device
CN113055457B (en) * 2021-03-09 2024-01-09 百果园技术(新加坡)有限公司 Access control and data forwarding method and device, electronic equipment and storage medium

Patent Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1588884A (en) * 2004-07-06 2005-03-02 北京航空航天大学 Automatic discovering method for IPV6 internet network topology
CN101114928A (en) * 2006-07-24 2008-01-30 华为技术有限公司 System and method for implementing load balancing
CN101119252A (en) * 2006-08-01 2008-02-06 华为技术有限公司 Access network system, access device, ARP proxy and IP bridging connection forwarding method
CN101523793A (en) * 2006-10-10 2009-09-02 高通股份有限公司 Space division multiple access channelization in wireless communication systems
WO2008148335A1 (en) * 2007-06-05 2008-12-11 Huawei Technologies Co., Ltd. A method for client node network topology construction and a system for stream media delivery
CN101102283A (en) * 2007-08-17 2008-01-09 杭州华三通信技术有限公司 A method and device for optimizing unknown unicast forward at wireless access point
CN101389128A (en) * 2007-09-10 2009-03-18 中兴通讯股份有限公司 Method for network access of customer terminal through radio relay
CN102823205A (en) * 2010-03-26 2012-12-12 思科技术公司 Aggregating data traffic from access domains
CN103036935A (en) * 2011-10-08 2013-04-10 美国博通公司 Social network device communication resource allocation
WO2014127433A1 (en) * 2013-02-25 2014-08-28 Stubbs Margot A control system
CN103974310A (en) * 2014-05-08 2014-08-06 江苏物联网研究发展中心 Method, device and system for establishing tree topology of wireless communication multi-hop network device
CN104540185A (en) * 2014-12-15 2015-04-22 上海华为技术有限公司 Network access method, access gateway and access control device
EP3355522A1 (en) * 2017-01-26 2018-08-01 Deutsche Telekom AG Access aggregation system and bonding client
CN110166268A (en) * 2018-02-13 2019-08-23 电信科学技术研究院有限公司 A kind of wireless backhaul network, communication means and device
CN208400296U (en) * 2018-05-24 2019-01-18 榆林学院 A kind of aquarium WIFI control device
CN109495889A (en) * 2018-12-20 2019-03-19 中山大学新华学院 Heterogeneous mobile network access control method based on mutual confidence-building mechanism

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
A Multicast Tree Reconstruction Method for Many-to-Many Mobile Communications with Delay Constraint;Tsuyoshi Yamada;《Proceedings. 2006 31st IEEE Conference on Local Computer Networks》;全文 *
GPON技术与三网融合;郭金生;有线电视技术(第10期);全文 *
多功能视频会议系统设计与实现;罗进;《中国优秀硕士论文全文数据库》;全文 *

Also Published As

Publication number Publication date
WO2022188596A1 (en) 2022-09-15
CN113055457A (en) 2021-06-29

Similar Documents

Publication Publication Date Title
RU2321885C2 (en) System, methods and software for routing and indexing globally addressed objects and related business models
Meddeb et al. AFIRM: Adaptive forwarding based link recovery for mobility support in NDN/IoT networks
CN113055457B (en) Access control and data forwarding method and device, electronic equipment and storage medium
CN106330718B (en) Method for forwarding multicast message and device
CN103797463A (en) Method and apparatus for assignment of virtual resources within a cloud environment
CN107040605B (en) Cloud platform resource scheduling and management system based on SDN and application method thereof
CN101841553A (en) Method, user node and server for requesting location information of resources on network
CN104967651A (en) Data push, storage and downloading methods and devices based on CDN architecture
US9407687B2 (en) Method, apparatus, and network system for acquiring content
US20150088995A1 (en) Method and apparatus for sharing contents using information of group change in content oriented network environment
CN111200622B (en) Resource transmission method and device and storage medium
US20180013610A1 (en) File delivery method, apparatus and system
CN111866438B (en) User experience driven transcoding and multicast routing method and device for multi-party video conference
CN106357539A (en) Data acquisition method and equipment
US10469348B2 (en) Centrality-based caching in information-centric networks
CN104065914A (en) Wireless terminal video conference system, realizing method and device
JP2023547256A (en) Data download methods, devices, and computer equipment
CN103763206A (en) Network scheduling method and gateway
CN105681249B (en) A kind of Network Access Method and link switch equipment
CN112087382B (en) Service routing method and device
CN105207909A (en) Method for transmitting information and network apparatus
US8601151B2 (en) Apparatus and method for receiving data
CN114911602A (en) Load balancing method, device, equipment and storage medium for server cluster
CN108900579A (en) Communication system, communication method, device, equipment and medium
CN109981476A (en) A kind of load-balancing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant