CN113225739B - Edge node communication detection method - Google Patents

Edge node communication detection method Download PDF

Info

Publication number
CN113225739B
CN113225739B CN202110502084.9A CN202110502084A CN113225739B CN 113225739 B CN113225739 B CN 113225739B CN 202110502084 A CN202110502084 A CN 202110502084A CN 113225739 B CN113225739 B CN 113225739B
Authority
CN
China
Prior art keywords
edge node
terminal
node
information
central
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110502084.9A
Other languages
Chinese (zh)
Other versions
CN113225739A (en
Inventor
王洋
陈志列
梁召峰
林诗美
杨欧
宁崴
庞观士
和茹
孙煜
沈航
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Polytechnic
EVOC Intelligent Technology Co Ltd
Original Assignee
Shenzhen Polytechnic
EVOC Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Polytechnic, EVOC Intelligent Technology Co Ltd filed Critical Shenzhen Polytechnic
Priority to CN202110502084.9A priority Critical patent/CN113225739B/en
Publication of CN113225739A publication Critical patent/CN113225739A/en
Application granted granted Critical
Publication of CN113225739B publication Critical patent/CN113225739B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/02Arrangements for optimising operational condition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/08Testing, supervising or monitoring using real traffic
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The invention discloses a method for detecting edge node communication.A terminal verifies identification information sent by a second edge node, and when the identification information of the second edge node passes the verification, the second edge node is a second edge node configured by a central node, so that the safety of the terminal accessing the second edge node is ensured, and the terminal and the second edge node can realize safe communication. The central node receives first check information sent by the second edge node and second check information sent by the terminal or second check information forwarded by the first edge node, and when the first check information is the same as the second check information, the central node indicates that the data information sent by the second edge node is correct, so that the data information sent by the terminal is prevented from being tampered by the second edge node, and the terminal and the second edge node can realize safe communication.

Description

Edge node communication detection method
Technical Field
The invention relates to the technical field of wireless communication, in particular to a method for detecting edge node communication.
Background
For the intelligent transportation system, since data sent by vehicles may change with time, for example, there are more vehicles and more data volume during rush hour, there are fewer vehicles and less data volume during non-rush hour, and if there are too many edge nodes configured in the intelligent transportation system, the cost of the intelligent transportation system will be high; if the number of edge nodes configured by the intelligent transportation system is too small, the intelligent transportation system cannot process data sent by vehicles in time. According to the traditional method, temporary edge nodes are usually added, and the intelligent transportation system reasonably adds the temporary edge nodes according to the actual load condition, so that the data sent by vehicles can be timely processed under the condition of the lowest cost of the intelligent transportation system, and the utilization rate of road resources and the safety of the vehicles are improved. However, the temporary edge node has low safety and is easy to cause serious harm to the intelligent transportation system.
Disclosure of Invention
The invention mainly aims to provide an edge node communication detection method, and aims to solve the technical problems that in the prior art, the safety of a temporary edge node is low, and serious harm is easily caused to an intelligent traffic system.
In order to solve the technical problems, the technical scheme provided by the invention is as follows:
an edge node communication detection method is applied to a traffic system, the traffic system comprises a terminal, a center node, a first edge node and a second edge node, and the method comprises the following steps:
when the central node and/or the first edge node meet preset conditions, the terminal and a second edge node communicate;
the terminal receives the identification information sent by the second edge node;
when the identification information of the second edge node passes verification, the terminal sends data information and first check information to the second edge node, and the terminal sends second check information to the first edge node or the central node;
the central node receives the data information and the first check information sent by the second edge node, receives the second check information sent by the terminal or the second check information forwarded by the first edge node, and maintains the connection between the terminal and the second edge node when the first check information and the second check information are the same.
Preferably, the central node and/or the first edge node satisfying a preset condition includes any one of:
the terminal measures a first RSRP value of a downlink synchronization signal sent by the central node and a second RSRP value of the downlink synchronization signal sent by the first edge node, wherein the first RSRP value and the second RSRP value are both smaller than a threshold value;
the terminal measures a second RSRP value of a downlink synchronization signal sent by a first edge node, wherein the second RSRP value is greater than a threshold value and first configuration information of the first edge node does not meet the sending requirement of the terminal;
the first edge node cannot send downlink synchronization signals;
and the central node or the first edge node prohibits the terminal from sending data information.
Preferably, when the second edge node processes the data information, the processed data information is obtained, and the second edge node sends the processed data information and the first verification information to the central node.
Preferably, when the identification information of the second edge node is not verified, the central node prevents the terminal from accessing the second edge node.
Preferably, when the first check information and the second check information are not the same, the central node disconnects the terminal and the second edge node.
Preferably, the central node sends a preset first edge node and/or a preset second edge node to the terminal, so that the terminal accesses the preset first edge node and/or the preset second edge node, and the central node sends the identification information of the terminal to the preset first edge node and/or the preset second edge node, so that the preset first edge node and/or the preset second edge node preferentially completes access of the terminal after receiving an access request of the terminal.
Preferably, the central node sends the deletion information of the second edge node to the terminal.
Preferably, the second edge node receives data information sent by a plurality of terminals, when the data information sent by each terminal is the same, the second edge node configures the plurality of terminals into a terminal group, and sends one piece of data information and identification information of the terminal group to the center node, the center node receives one piece of data information and identification information of the terminal group sent by the second edge node, and when the operation indication of the center node on each terminal is consistent, the center node sends one piece of operation indication information and identification information of the terminal group to the second edge node.
Preferably, when the data information sent by the plurality of terminals is different, the second edge node sends the data information and the identification information corresponding to each terminal to the central node, and the central node receives the data information and the identification information corresponding to each terminal sent by the second edge node and sends the operation instruction information and the identification information corresponding to each terminal to the second edge node.
Preferably, when the operation instruction of the central node to each terminal is inconsistent, the central node sends the operation instruction information and the identification information corresponding to each terminal to the second edge node.
Compared with the prior art, the invention has the following beneficial effects:
according to the edge node communication detection method, when the central node and/or the first edge node meet the preset conditions, the central node and the first edge node are both under the condition of heavy load, and the second edge node can share the load of the central node and the load of the first edge node, so that data information sent by the terminal can be processed in time, and normal operation of a traffic system is guaranteed. The terminal verifies the identification information sent by the second edge node, and when the identification information of the second edge node passes the verification, the second edge node is the second edge node configured by the central node, so that the security of the terminal accessing the second edge node is ensured, and the terminal and the second edge node can realize safe communication. The central node receives first check information sent by the second edge node and second check information sent by the terminal or second check information forwarded by the first edge node, and when the first check information is the same as the second check information, the central node indicates that the data information sent by the second edge node is correct, so that the data information sent by the terminal is prevented from being tampered by the second edge node, and the terminal and the second edge node can realize safe communication.
Drawings
In order to more clearly illustrate the embodiments or technical solutions of the present invention, the drawings used in the embodiments or technical solutions of the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the structures shown in the drawings without creative efforts.
Fig. 1 is a flowchart of an edge node communication detection method according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that all the directional indicators (such as up, down, left, right, front, and rear … …) in the embodiment of the present invention are only used to explain the relative position relationship between the components, the movement situation, etc. in a specific posture (as shown in the drawing), and if the specific posture is changed, the directional indicator is changed accordingly.
In addition, the descriptions related to "first", "second", etc. in the present invention are for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In addition, "and/or" in the whole text includes three schemes, taking a and/or B as an example, including a technical scheme, and a technical scheme that a and B meet simultaneously; in addition, technical solutions between various embodiments may be combined with each other, but must be realized by a person skilled in the art, and when the technical solutions are contradictory or cannot be realized, such a combination should not be considered to exist, and is not within the protection scope of the present invention.
As shown in fig. 1, in this embodiment, a method for detecting edge node communication is provided, where the method is applied to a traffic system, where the traffic system includes a terminal, a center node, a first edge node, and a second edge node, and the method specifically includes the following steps:
and S100, when the central node and/or the first edge node meet preset conditions, the terminal communicates with the second edge node.
In this embodiment, the first edge node is an edge node authenticated by the central node, and the second edge node is an edge node transferred by the terminal.
Specifically, the central node and/or the first edge node satisfying the preset condition includes the following four cases.
(1) The terminal measures a first RSRP value of a downlink synchronization signal sent by the central node and a second RSRP value of the downlink synchronization signal sent by the first edge node, and the first RSRP value and the second RSRP value are both smaller than a threshold value.
The first case represents that the quality of the wireless channel between the terminal and the central node or the first edge node is poor, and when the terminal establishes a wireless connection with the central node or the first edge node, a transmission failure of wireless communication between the terminal and the central node or the first edge node is easily caused, so that data information of the terminal cannot be reliably sent to the central node.
(2) And the terminal measures a second RSRP value of the downlink synchronization signal sent by the first edge node, wherein the second RSRP value is greater than the threshold value and the first configuration information of the first edge node does not meet the sending requirement of the terminal.
Firstly, a terminal receives first configuration information of a first edge node sent by a central node, wherein the first configuration information comprises:
identification information of the first edge node;
synchronization sequence information used by a downlink synchronization signal sent by a first edge node;
the decoding delay information of the first edge node, specifically, the decoding delay information is used to reflect the receiving processing efficiency of the first node.
The block error rate information of the first edge node, specifically, the block error rate information is used to reflect the reception accuracy of the first node.
The terminal achieves the purpose of downlink synchronization with the first edge node by receiving the downlink synchronization signal sent by the first edge node, so that the terminal can receive system information, downlink control information or downlink data information sent by the first edge node.
The decoding delay information and the block error rate information of the first edge node represent the data processing capacity supported by the first edge node. For example, the central node configures four levels of data processing capacity for the first edge node.
A first grade: the specific processing time delay is less than 5us, the data transmission rate is less than 100kbps, and the block error rate is less than 0.1%. That is, the first edge node of the first class can process data information with small data packet, very small time delay and very high success rate of data packet transmission.
A second stage: and processing data information which does not meet the first grade, wherein the specific processing time delay is less than 50us, the data transmission rate is less than 1Mbps, and the block error rate is less than 1%. That is, the first edge node of the second level can process data information with medium size, small processing delay and high requirement for success rate of packet transmission.
Third level: and processing data information which does not meet the second level, wherein the specific processing time delay is less than 200us, the data transmission rate is less than 5Mbps, and the block error rate is less than 10%. That is, the first edge node of the third level can process data information with large data packet, medium processing delay, and high data packet transmission success rate requirement.
Fourth level: and processing data information which does not meet the third level, wherein the specific processing time delay is less than 1000us, the data transmission rate is greater than 50Mbps, and the block error rate is less than 10%. That is, the first edge node of the fourth level can process data traffic with very large data packets, high processing delay, and high data packet transmission success rate requirement.
The central node sends the decoding delay information and the block error rate information of the first edge node to the terminal, and the terminal receives the decoding delay information and the block error rate information of the first edge node sent by the central node, so that the terminal can send the data service to the first edge node with corresponding data processing capacity for processing, the first edge node can reliably process the data service sent by the terminal, and the terminal can obtain the processing information sent by the first edge node in time.
In this embodiment, the specific case that the first configuration information of the first edge node does not satisfy the data transmission requirement of the terminal is as follows: and the decoding delay information and the block error rate information of the first edge node do not meet the sending requirement of the terminal.
The second case represents that the quality of a wireless channel between the terminal and the first edge node meets the requirement of wireless communication, but the first edge node does not meet the requirement of delay level and/or block error rate of data transmission processing of the terminal, and when the terminal and the first edge node establish wireless connection, transmission failure of wireless communication between the terminal and the first edge node is easily caused, so that data information of the terminal cannot be reliably transmitted to the central node.
Receiving, by the terminal, second configuration information of a second edge node sent by the central node, where the second configuration information includes:
identification information of the second edge node;
the synchronization sequence information used by the downlink synchronization signal sent by the second edge node;
decoding delay information of the second edge node;
block error rate information of a second edge node;
start time and duration information of the second edge node operation.
The terminal achieves the purpose of downlink synchronization with the second edge node by receiving the downlink synchronization signal sent by the second edge node, so that the terminal can receive system information, downlink control information or downlink data information sent by the second edge node.
The central node sends the decoding delay information and the block error rate information of the second edge node to the terminal, and the terminal receives the decoding delay information and the block error rate information of the second edge node sent by the central node, so that the terminal can send the data service to the second edge node with corresponding data processing capacity for processing, the second edge node can reliably process the data service sent by the terminal, and the terminal can timely obtain the processing information sent by the second edge node.
The second edge node is an edge node converted from a terminal, and mainly plays a role in sharing data processing and data transmission of the central node and the first edge node under the condition that the central node and the first edge node are heavily loaded, so that the enabling of the second edge node is time-limited, namely, there are a starting time and a duration. And the starting time and the duration time of the second edge node are sent to the terminal through the central node.
(3) The first edge node cannot transmit the downlink synchronization signal.
And the third condition represents that the first edge node has a system fault, and the first edge node cannot send the downlink synchronization signal to the terminal.
(4) The central node or the first edge node prohibits the terminal from sending data information.
The fourth situation represents that the central node and the first edge node explicitly indicate that the terminal is not allowed to access, and the reason why the fourth situation occurs is that the first edge node is heavier in load and has no redundant capacity to process more data information of the terminal.
S200, when the terminal and the second edge node carry out downlink synchronization, the terminal receives the identification information sent by the second edge node. Whether the second edge node is the second edge node configured by the central node can be judged through the identification information of the second edge node, so that the safety of the terminal accessing the second edge node is ensured.
S300, when the identification information of the second edge node passes the verification, the second edge node is the second edge node configured by the central node, so that the security of the terminal accessing the second edge node is ensured, and the terminal and the second edge node can realize secure communication. And the terminal sends the data information and the first check information to the second edge node, and the terminal sends the second check information to the first edge node or the central node.
In this example, the first Check information and the second Check information are both CRC Check information, i.e. Cyclic Redundancy Check (CRC), which is a channel coding technique for generating a short fixed-bit Check code according to data such as a data packet or a computer file, and is mainly used to detect or Check errors that may occur in data transmission.
When the identification information of the second edge node is not verified, the second edge node is a second edge node which is not configured by the central node, the central node prevents the terminal from accessing the second edge node, and the problem that the data sent by the terminal cannot reach the central node or the data sent by the terminal is leaked can be avoided, so that the safety of a traffic system is improved.
S400, the central node receives the data information and the first check information sent by the second edge node, receives the second check information sent by the terminal or the second check information forwarded by the first edge node, and when the first check information and the second check information are the same, the data information sent by the second edge node is correct, so that the data information sent by the terminal can be prevented from being tampered by the second edge node, and the safety of the traffic system is improved.
For example, the following steps are carried out: if the central node receives the first check information sent by the second edge node as "0011110010110010", and meanwhile, the central node receives the second check information sent by the terminal as "0011110010110010", since the first check information and the second check information are completely identical, it indicates that the data information sent by the second edge node is correct.
And the second edge node processes the data information to obtain processed data information, and sends the processed data information and the first check information to the central node. That is to say, at this time, the central node receives the data information processed by the second edge node instead of the original data information, so that the second edge node needs to send the first check information to the central node, so that the central node can confirm the correctness of the data information sent by the second edge node according to the first check information and the second check information.
And the second edge node receives the data information sent by the terminals, configures the terminals into a terminal group when the data information sent by each terminal is the same, and sends the data information and the identification information of the terminal group to the central node. By the arrangement, the second edge node does not need to send a plurality of same data messages to the central node, so that the resource overhead of the central node can be reduced, and the resource utilization rate of the central node is improved. And the central node receives data information and the identification information of the terminal group sent by the second edge node, and sends operation indication information and the identification information of the terminal group to the second edge node when the operation indication of the central node to each terminal is consistent. By the arrangement, the central node does not need to send a plurality of same operation indication information to the second edge node, so that the resource overhead of the central node can be reduced, and the resource utilization rate of the central node is improved.
When the data information sent by the terminals is different, the second edge node sends the data information and the identification information corresponding to each terminal to the central node, and the central node receives the data information and the identification information corresponding to each terminal sent by the second edge node and sends the operation indication information and the identification information corresponding to each terminal to the second edge node.
When the operation instructions of the central node to the terminals are inconsistent, the central node sends the operation instruction information and the identification information corresponding to the terminals to the second edge node.
When the first check information is different from the second check information, the data information sent by the second edge node is wrong, the central node disconnects the terminal from the second edge node, and the second edge node which is malicious can be prevented from harming the central node or the terminal, so that the safety of the traffic system is improved.
The central node sends a preset first edge node and/or a preset second edge node to the terminal so that the terminal can be accessed to the preset first edge node and/or the preset second edge node, and the central node sends identification information of the terminal to the preset first edge node and/or the preset second edge node so that the preset first edge node and/or the preset second edge node preferentially completes access of the terminal after receiving an access request of the terminal. By the arrangement, the terminal with failed connection can send the data information to the first edge node and/or the second edge node in time, so that the preset first edge node and/or second edge node can quickly process the data information sent by the terminal, and the normal operation of a traffic system is ensured.
The central node sends the deletion information of the second edge node to the terminal, so that the terminal can be prevented from sending the data information to the malicious second edge node next time, and the safety of the traffic system is improved.
Specifically, the deletion information includes identification information of the second edge node and synchronization sequence information used by a downlink synchronization signal sent by the second edge node.
In this embodiment, the central node sends the deletion information of the second edge node to each terminal in a broadcast manner, and each terminal that receives the deletion information deletes the malicious second edge node from the list of the second edge node.
In the edge node communication detection method of this embodiment, when the central node and/or the first edge node satisfy the preset condition, it indicates that both the central node and the first edge node are under a heavy load condition, and the second edge node can share the loads of the central node and the first edge node, so that the data information sent by the terminal can be processed in time, thereby ensuring the normal operation of the traffic system. The terminal verifies the identification information sent by the second edge node, and when the identification information of the second edge node passes the verification, the second edge node is the second edge node configured by the central node, so that the security of the terminal accessing the second edge node is ensured, and the terminal and the second edge node can realize safe communication. The central node receives first check information sent by the second edge node and second check information sent by the terminal or second check information forwarded by the first edge node, and when the first check information is the same as the second check information, the central node indicates that the data information sent by the second edge node is correct, so that the data information sent by the terminal is prevented from being tampered by the second edge node, and the terminal and the second edge node can realize safe communication.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the scope of the present invention, and all modifications and equivalents of the present invention, which are made by the contents of the present specification and the accompanying drawings, or directly/indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (10)

1. An edge node communication detection method is applied to a traffic system, the traffic system comprises a terminal, a center node, a first edge node and a second edge node, and the method is characterized by comprising the following steps:
when the central node and/or the first edge node meet preset conditions, the terminal and a second edge node communicate;
the terminal receives the identification information sent by the second edge node;
when the identification information of the second edge node passes verification, the terminal sends data information and first check information to the second edge node, and the terminal sends second check information to the first edge node or the central node;
the central node receives the data information and the first check information sent by the second edge node, receives the second check information sent by the terminal or the second check information forwarded by the first edge node, and maintains the connection between the terminal and the second edge node when the first check information and the second check information are the same.
2. The method according to claim 1, wherein the central node and/or the first edge node satisfying a preset condition comprises any one of:
the terminal measures a first RSRP value of a downlink synchronization signal sent by the central node and a second RSRP value of the downlink synchronization signal sent by the first edge node, wherein the first RSRP value and the second RSRP value are both smaller than a threshold value;
the terminal measures a second RSRP value of a downlink synchronization signal sent by a first edge node, wherein the second RSRP value is greater than a threshold value and first configuration information of the first edge node does not meet the sending requirement of the terminal;
the first edge node cannot send downlink synchronization signals;
and the central node or the first edge node prohibits the terminal from sending data information.
3. The method of claim 1, wherein when the second edge node processes the data information, the processed data information is obtained, and the second edge node sends the processed data information and the first verification information to the central node.
4. The method of claim 1, wherein the central node prevents the terminal from accessing the second edge node when the identification information of the second edge node is not verified.
5. The method according to claim 1, wherein the central node disconnects the terminal and the second edge node when the first check information and the second check information are not identical.
6. The method according to claim 5, wherein the central node sends a preset first edge node and/or second edge node to the terminal, so that the terminal accesses the preset first edge node and/or second edge node, and the central node sends identification information of the terminal to the preset first edge node and/or second edge node, so that the preset first edge node and/or second edge node preferentially completes access of the terminal after receiving an access request of the terminal.
7. The method according to claim 5, wherein the central node sends the deletion information of the second edge node to the terminal.
8. The method of claim 1, wherein the second edge node receives data information sent by a plurality of terminals, and when the data information sent by each of the terminals is the same, the second edge node configures the plurality of terminals into a terminal group and sends the data information and the identification information of the terminal group to the central node, and the central node receives the data information and the identification information of the terminal group sent by the second edge node, and when the operation instruction of each of the terminals by the central node is consistent, the central node sends an operation instruction information and the identification information of the terminal group to the second edge node.
9. The method according to claim 8, wherein when the data information sent by the plurality of terminals is different, the second edge node sends the data information and the identification information corresponding to each terminal to the central node, and the central node receives the data information and the identification information corresponding to each terminal sent by the second edge node and sends the operation indication information and the identification information corresponding to each terminal to the second edge node.
10. The method according to claim 8, wherein when the operation instruction of the central node to each of the terminals is inconsistent, the central node sends operation instruction information and identification information corresponding to each of the terminals to the second edge node.
CN202110502084.9A 2021-05-08 2021-05-08 Edge node communication detection method Active CN113225739B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110502084.9A CN113225739B (en) 2021-05-08 2021-05-08 Edge node communication detection method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110502084.9A CN113225739B (en) 2021-05-08 2021-05-08 Edge node communication detection method

Publications (2)

Publication Number Publication Date
CN113225739A CN113225739A (en) 2021-08-06
CN113225739B true CN113225739B (en) 2022-08-12

Family

ID=77094324

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110502084.9A Active CN113225739B (en) 2021-05-08 2021-05-08 Edge node communication detection method

Country Status (1)

Country Link
CN (1) CN113225739B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107395600A (en) * 2017-07-25 2017-11-24 金在(北京)金融信息服务有限公司 Business datum verification method, service platform and mobile terminal
CN111274031A (en) * 2020-01-16 2020-06-12 国家电网有限公司信息通信分公司 Method and device for dynamic migration authentication of edge service with cooperation of end and cloud
US10771569B1 (en) * 2019-12-13 2020-09-08 Industrial Technology Research Institute Network communication control method of multiple edge clouds and edge computing system
CN112087312A (en) * 2019-06-15 2020-12-15 华为技术有限公司 Method, device and equipment for providing edge service
CN112261003A (en) * 2020-09-27 2021-01-22 紫光云引擎科技(苏州)有限公司 Safety authentication method and system for industrial internet edge computing node

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107395600A (en) * 2017-07-25 2017-11-24 金在(北京)金融信息服务有限公司 Business datum verification method, service platform and mobile terminal
CN112087312A (en) * 2019-06-15 2020-12-15 华为技术有限公司 Method, device and equipment for providing edge service
US10771569B1 (en) * 2019-12-13 2020-09-08 Industrial Technology Research Institute Network communication control method of multiple edge clouds and edge computing system
CN111274031A (en) * 2020-01-16 2020-06-12 国家电网有限公司信息通信分公司 Method and device for dynamic migration authentication of edge service with cooperation of end and cloud
CN112261003A (en) * 2020-09-27 2021-01-22 紫光云引擎科技(苏州)有限公司 Safety authentication method and system for industrial internet edge computing node

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于边缘计算网关的企业用电行为可视化分析;沈颖;《电器与能效管理技术》;20201231;第81-86页 *

Also Published As

Publication number Publication date
CN113225739A (en) 2021-08-06

Similar Documents

Publication Publication Date Title
EP1821461B1 (en) Method for detecting hidden station in a wireless communication network and system therefor
CN110234114B (en) Data transmission method, device, equipment, medium and system
US8078201B2 (en) Method and system for shunting short messages
EP3734881B1 (en) Data transmission method, device and computer storage medium
WO2011097767A1 (en) Network access method and system for machine type communications
US10440684B2 (en) Device-to-device wireless communication method and device
US20230262775A1 (en) Method and apparatus for implementing collision detection in data transmission
US11184344B2 (en) Authorization of user equipment for mobile communications network that has previously been authorized by trusted traffic authority
US20230179903A1 (en) Communication method between earphones and charging box, charging box, earphones and readable storage medium
CN111225414A (en) Multimode communication device, communication method thereof and multimode communication system
CN108111576B (en) Train-ground wireless transmission method and device
CN107580372B (en) Random access method in V2X network
CN113810913A (en) Communication device and operation method thereof
EP3876560A1 (en) Navigation control method and relevant product
CN104038366A (en) Cluster node failure detection method and system
CN111698795A (en) Circuit switched domain response to packet switched domain failure
CN113225739B (en) Edge node communication detection method
CN109328478B (en) Resource processing method and device and terminal
JP4038923B2 (en) Wireless communication system, base station, terminal station
Peng et al. A logically centralized slotted ALOHA‐based scheme for broadcast services in vehicular ad hoc networks
CN110086502B (en) Vehicle-mounted relay device, relay device and method, information processing device and system
CN113133066A (en) Switching method and network equipment
JPS5826582B2 (en) Terminal system failure notification method
CN114422319A (en) Bandwidth adjusting method, device and system, electronic equipment and readable storage medium
US20120016535A1 (en) System and method for providing remote maintenance service for systems on a ship

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant