CN115766380A - Network hosting processing method based on block chain - Google Patents

Network hosting processing method based on block chain Download PDF

Info

Publication number
CN115766380A
CN115766380A CN202211320503.8A CN202211320503A CN115766380A CN 115766380 A CN115766380 A CN 115766380A CN 202211320503 A CN202211320503 A CN 202211320503A CN 115766380 A CN115766380 A CN 115766380A
Authority
CN
China
Prior art keywords
module
transmission
network
data information
receiving
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211320503.8A
Other languages
Chinese (zh)
Inventor
金森丰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202211320503.8A priority Critical patent/CN115766380A/en
Publication of CN115766380A publication Critical patent/CN115766380A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a network hosting processing method based on a block chain, which is applied to a network hosting processing system, wherein the network hosting processing system comprises an identification management module, a transmission optimization module and a transmission encryption module, the identification management module is electrically connected with the transmission optimization module, the transmission encryption module is respectively connected with the identification management module and the transmission optimization module through networks, the identification management module is used for identifying the transmission of data information and managing a transmission path, the transmission optimization module is used for optimizing the transmission process of the data information, the transmission encryption module is used for encrypting and transmitting the data information, the identification management module comprises a receiving identification module, a network monitoring module and a network transmission determination module, and the receiving identification module is electrically connected with the network monitoring module.

Description

Network hosting processing method based on block chain
Technical Field
The invention relates to the technical field of network hosting processing, in particular to a network hosting processing method based on a block chain.
Background
The network hosting means that the network hosting is entrusted by a user and provides network management, operation and maintenance services for the user, wherein the network management, operation and maintenance services comprise operation and maintenance services for network data transmission, exchange, base stations and other services.
The network delay is one of the common problems in the transmission process of network data information, and is also the key point that management, maintenance and optimization are needed most. The network delay not only affects the transmission of network data information and reduces the use experience of a user on the network, but also measures the service capability of a network hosting mechanism for network management and maintenance optimization. Therefore, it is necessary to design a network hosting method based on block chain, which has high service quality and effectively reduces network delay.
Disclosure of Invention
The present invention is directed to a method for handling network hosting based on a block chain, so as to solve the problems mentioned in the background art.
In order to solve the technical problems, the invention provides the following technical scheme: the network hosting processing method based on the block chain is applied to a network hosting processing system, the network hosting processing system comprises an identification management module, a transmission optimization module and a transmission encryption module, the identification management module is electrically connected with the transmission optimization module, the transmission encryption module is respectively in network connection with the identification management module and the transmission optimization module, the identification management module is used for identifying the transmission of data information and managing a transmission path, the transmission optimization module is used for optimizing the transmission process of the data information, and the transmission encryption module is used for encrypting and transmitting the data information.
According to the technical scheme, the identification management module comprises a receiving identification module, a network monitoring module and a network transmission determination module, the receiving identification module is electrically connected with the network monitoring module, the network transmission determination module is respectively in data connection with the receiving identification module and the network monitoring module, the receiving identification module is used for receiving and identifying data information, the network monitoring module is used for monitoring the working transmission state of a network, and the network transmission determination module is used for determining and managing the transmission path of the data information.
According to the technical scheme, the transmission optimization module comprises a transmission division module, a time slot allocation module, an interference enhancement module and a feedback receiving module, the transmission division module is electrically connected with the time slot allocation module, the interference enhancement module is in data connection with the feedback receiving module, the transmission division module is used for dividing data information to be transmitted, the time slot allocation module is used for allocating and managing transmission time slots, the interference enhancement module is used for enhancing interference signals, and the feedback receiving module is used for receiving and managing feedback information.
According to the technical scheme, the transmission encryption module comprises an encryption processing module and a periodic updating module, the encryption processing module is connected with the periodic updating module through a network, the encryption processing module is used for encrypting data information, and the periodic updating module is used for periodically updating a secret key.
According to the above technical solution, the network hosting processing method mainly includes the steps of:
step S1: accessing a network hosting processing system to a network transmission server, and carrying out optimization management on the transmission of data information;
step S2: receiving and identifying data information sent by a user, and determining a transmission communication mode;
and step S3: further allocating the transmission time slot of the data information, and performing feedback receiving control processing;
and step S4: the data information to be transmitted is encrypted.
According to the above technical solution, the step S2 further includes the steps of:
step S21: after a receiving end of the control server receives data information sent by a user, a receiving identification module identifies the received data information and determines a target terminal to which the data information is sent;
step S22: after the network working transmission state is detected through the network monitoring module according to the identification result, the monitoring result is sent to the network transmission determining module through an electric signal;
step S23: and after receiving a network work transmission state monitoring result, the network transmission determining module determines a transmission communication path of the data information.
According to the above technical solution, the step S3 further includes the steps of:
step S31: after determining a transmission communication path of data information, a transmission dividing module divides the data information which needs to be transmitted through the transmission communication path at the same time to a source node of the transmission communication path, and then allocates each frame of time slot in the network through a time slot allocation module, and controls the data information to be transmitted to transmit in a specified time slot according to the amount of the data information to be transmitted;
step S32: in the process of data transmission, the feedback information sent by the network node is received through the feedback receiving module, when the information result of binary system '0' is received, the current network node is indicated to have no data information transmission, and when the information result of binary system '1' is received, the current network node is indicated to have a packet data information transmission.
According to the above technical solution, the step S32 further includes, after receiving result information that the feedback of the network node is "e", indicating that a plurality of packet data information are transmitted in the current network node, that is, a collision occurs, which results in that a receiving end cannot receive the data correctly, and after stopping sending the data of the network node, further sending a section of interference-enhanced signal through the interference-enhanced module, so as to enhance a collision detection effect.
According to the above technical solution, the step S4 further includes the steps of:
step S41: in the data information transmission process, the data information is subjected to asymmetric encryption processing through the encryption processing module, and after the data information is transmitted to a destination terminal, a receiving terminal can automatically decrypt the data information for a receiving user to check;
step S42: the asymmetric encrypted public key and the asymmetric encrypted private key are periodically updated through the periodic updating module, so that the encryption security is effectively improved.
Compared with the prior art, the invention has the following beneficial effects: according to the invention, through the arrangement of the identification management module, the transmission optimization module and the transmission encryption module, the time delay of the data information transmission process is effectively reduced, the integrity and the accuracy of the data information in the transmission process are greatly ensured, the possibility of being polluted by noise signals is effectively avoided, the use efficiency of network server transmission resources is maximized, the transmission speed of the data information is improved, the network time delay is indirectly reduced, and the satisfaction degree of a user on the network hosting service is effectively improved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention. In the drawings:
FIG. 1 is a schematic diagram of the system module composition of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, the present invention provides a technical solution: the network hosting processing method based on the block chain is applied to a network hosting processing system, the network hosting processing system comprises an identification management module, a transmission optimization module and a transmission encryption module, the identification management module is electrically connected with the transmission optimization module, the transmission encryption module is respectively in network connection with the identification management module and the transmission optimization module, the identification management module is used for identifying the transmission of data information and managing a transmission path, the transmission optimization module is used for optimizing the transmission process of the data information, and the transmission encryption module is used for encrypting and transmitting the data information.
The identification management module comprises a receiving identification module, a network monitoring module and a network transmission determination module, the receiving identification module is electrically connected with the network monitoring module, the network transmission determination module is respectively in data connection with the receiving identification module and the network monitoring module, the receiving identification module is used for receiving and identifying data information, the network monitoring module is used for monitoring the working transmission state of a network, and the network transmission determination module is used for determining and managing the transmission path of the data information.
The transmission optimization module comprises a transmission division module, a time slot allocation module, an interference enhancement module and a feedback receiving module, the transmission division module is electrically connected with the time slot allocation module, the interference enhancement module is in data connection with the feedback receiving module, the transmission division module is used for dividing data information to be transmitted, the time slot allocation module is used for allocating and managing transmission time slots, the interference enhancement module is used for enhancing interference signals, and the feedback receiving module is used for receiving and managing feedback information.
The transmission encryption module comprises an encryption processing module and a periodic updating module, the encryption processing module is connected with the periodic updating module through a network, the encryption processing module is used for encrypting data information, and the periodic updating module is used for periodically updating a secret key.
The network hosting processing method mainly comprises the following steps:
step S1: accessing a network hosting processing system to a network transmission server, and carrying out optimization management on the transmission of data information;
step S2: receiving and identifying data information sent by a user, and determining a transmission communication mode;
and step S3: further allocating the transmission time slot of the data information, and performing feedback receiving control processing;
and step S4: the data information to be transmitted is encrypted.
Step S2 further comprises the steps of:
step S21: after a receiving end of the control server receives data information sent by a user, a receiving identification module identifies the received data information and determines a target terminal to which the data information is sent;
step S22: after the network working transmission state is detected through the network monitoring module according to the identification result, the monitoring result is sent to the network transmission determining module through an electric signal; in the step, after a target terminal to be transmitted of the information is determined, the work transmission state of the network node completing the transmission is monitored, the network node with the full work transmission amount is filtered, and the network node capable of being transmitted is screened out;
step S23: and after receiving a network work transmission state monitoring result, the network transmission determining module determines a transmission communication path of the data information. Because some nodes in the network can not directly transmit communication, the data information can be sent to the target terminal after being relayed for a plurality of times, but the possibility that the data information is polluted by noise signals is increased in the process of carrying out relay processing for a plurality of times, and the time delay of the data information transmission process is greatly increased, so that through the step, the network nodes screened out to be capable of completing the transmission are intelligently analyzed, the nodes with less relay times are preferentially selected to transmit the data information, the time delay of the data information transmission process is effectively reduced, the integrity and the accuracy of the data information in the transmission process are greatly ensured, and the possibility of being polluted by noise signals is effectively avoided.
Step S3 further comprises the steps of:
step S31: after determining a transmission communication path of data information, a transmission dividing module divides the data information which needs to be transmitted through the transmission communication path at the same time to a source node of the transmission communication path, allocates each frame of time slot in a network through a time slot allocation module, and controls the data information to be transmitted to transmit in a specified time slot according to the amount of the data information to be transmitted; in the step, through the allocation of the time slots, the situation that a user can occupy a plurality of time slots randomly in each frame and the time slots are wasted due to no data information transmission in part of the time slots can be avoided, so that through the step, the use efficiency of the transmission resources of the network server can be maximized, the transmission speed of the data information is improved, the network time delay is indirectly reduced, and the satisfaction degree of the user on the network hosting service is effectively improved;
step S32: in the process of data transmission, the feedback information sent by the network node is received through the feedback receiving module, when the information result of binary system 0 is received, the current network node is indicated to have no data information transmission, and when the information result of binary system 1 is received, the current network node is indicated to have a packet data information transmission. Through the step, the working state of the network node can be obtained in real time, the subsequent data information to be transmitted can be immediately sent to the network node for continuous subsequent transmission when the network node has no data information to be transmitted, the working efficiency of the network node is effectively improved, the transmission efficiency of the data information is higher, and the transmission delay of the network information is effectively reduced.
Step S32 further includes, after receiving the result information that the network node feeds back "e", indicating that a plurality of packet data information are transmitted in the current network node, that is, a collision occurs, which results in that the receiving end cannot correctly receive the packet data information, and after stopping sending the data of the network node, further sending a section of interference-enhanced signal through the interference-enhanced module, so as to enhance the collision detection effect. In the step, after the occurrence of the collision is detected, the sending of the data information is immediately stopped, and no matter whether the sending of the currently sent data information is finished or not, the useless sending after the occurrence of the collision can be confirmed as soon as possible and closed as soon as possible through the processing, so that the utilization rate of a channel is improved; meanwhile, the reliability of the nodes in the network on collision detection can be improved by sending a section of 'reinforced interference signal', the consistency of network distributed control is ensured, the data information of the network nodes is retransmitted after waiting for a period of time, the data information transmission can be normally carried out, and the intelligence and the high efficiency of the network hosting service are effectively reflected.
Step S4 further comprises the steps of:
step S41: in the data information transmission process, the data information is subjected to asymmetric encryption processing through the encryption processing module, and after the data information is transmitted to a destination terminal, a receiving end can automatically decrypt the data information for a receiving user to check; through the steps, the safety of the data information is effectively ensured, so that the data information cannot be easily cracked and snooped by lawless persons even if the data information is illegally intercepted in the transmission process;
step S42: the asymmetric encrypted public key and the private key are periodically updated through the periodic updating module, so that the encryption safety is effectively improved.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
Finally, it should be noted that: although the present invention has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that changes may be made in the embodiments and/or equivalents thereof without departing from the spirit and scope of the invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (9)

1. The network hosting processing method based on the block chain is applied to a network hosting processing system, the network hosting processing system comprises an identification management module, a transmission optimization module and a transmission encryption module, the identification management module is electrically connected with the transmission optimization module, the transmission encryption module is respectively in network connection with the identification management module and the transmission optimization module, the identification management module is used for identifying the transmission of data information and managing a transmission path, the transmission optimization module is used for optimizing the transmission process of the data information, and the transmission encryption module is used for encrypting and transmitting the data information.
2. The block chain based network hosting processing method according to claim 1, wherein: the identification management module comprises a receiving identification module, a network monitoring module and a network transmission determination module, wherein the receiving identification module is electrically connected with the network monitoring module, the network transmission determination module is respectively in data connection with the receiving identification module and the network monitoring module, the receiving identification module is used for receiving and identifying data information, the network monitoring module is used for monitoring the working transmission state of a network, and the network transmission determination module is used for determining and managing the transmission path of the data information.
3. The block chain based network hosting processing method according to claim 2, characterized in that: the transmission optimization module comprises a transmission division module, a time slot allocation module, an interference enhancement module and a feedback receiving module, wherein the transmission division module is electrically connected with the time slot allocation module, the interference enhancement module is in data connection with the feedback receiving module, the transmission division module is used for dividing and processing data information to be transmitted, the time slot allocation module is used for allocating and managing transmission time slots, the interference enhancement module is used for enhancing interference signals, and the feedback receiving module is used for receiving and managing feedback information.
4. The block chain based network hosting processing method according to claim 3, wherein: the transmission encryption module comprises an encryption processing module and a periodic updating module, the encryption processing module is in network connection with the periodic updating module, the encryption processing module is used for encrypting data information, and the periodic updating module is used for periodically updating a secret key.
5. The block chain based network hosting processing method according to claim 4, characterized in that: the network hosting processing method mainly comprises the following steps:
step S1: accessing a network hosting processing system to a network transmission server, and carrying out optimization management on the transmission of data information;
step S2: receiving and identifying data information sent by a user, and determining a transmission communication mode;
and step S3: further allocating the transmission time slot of the data information and carrying out feedback receiving control processing;
and step S4: the data information to be transmitted is encrypted.
6. The block chain based network hosting processing method according to claim 5, characterized in that: the step S2 further includes the steps of:
step S21: after a receiving end of the control server receives data information sent by a user, a receiving identification module identifies the received data information and determines a target terminal to which the data information is sent;
step S22: after the network working transmission state is detected through the network monitoring module according to the identification result, the monitoring result is sent to the network transmission determining module through an electric signal;
step S23: and after receiving the monitoring result of the network working transmission state, the network transmission determining module determines the transmission communication path of the data information.
7. The block chain based network hosting processing method according to claim 6, wherein: the step S3 further includes the steps of:
step S31: after determining a transmission communication path of data information, a transmission dividing module divides the data information which needs to be transmitted through the transmission communication path at the same time to a source node of the transmission communication path, and then allocates each frame of time slot in the network through a time slot allocation module, and controls the data information to be transmitted to transmit in a specified time slot according to the amount of the data information to be transmitted;
step S32: in the process of data transmission, the feedback information sent by the network node is received through the feedback receiving module, when the information result of binary system 0 is received, the current network node is indicated to have no data information transmission, and when the information result of binary system 1 is received, the current network node is indicated to have a packet data information transmission.
8. The block chain based network hosting processing method according to claim 7, characterized in that: the step S32 further includes, after receiving result information that the feedback of the network node is "e", indicating that a plurality of packet data information are transmitted in the current network node, that is, a collision occurs, which results in that a receiving end cannot receive the packet data correctly, and after stopping sending the data of the network node, further sending a section of reinforced interference signal through the interference reinforcement module to enhance the collision detection effect.
9. The block chain based network hosting processing method according to claim 8, wherein: the step S4 further includes the steps of:
step S41: in the data information transmission process, the data information is subjected to asymmetric encryption processing through the encryption processing module, and after the data information is transmitted to a destination terminal, a receiving terminal can automatically decrypt the data information for a receiving user to check;
step S42: the asymmetric encrypted public key and the asymmetric encrypted private key are periodically updated through the periodic updating module, so that the encryption security is effectively improved.
CN202211320503.8A 2022-10-26 2022-10-26 Network hosting processing method based on block chain Pending CN115766380A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211320503.8A CN115766380A (en) 2022-10-26 2022-10-26 Network hosting processing method based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211320503.8A CN115766380A (en) 2022-10-26 2022-10-26 Network hosting processing method based on block chain

Publications (1)

Publication Number Publication Date
CN115766380A true CN115766380A (en) 2023-03-07

Family

ID=85353421

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211320503.8A Pending CN115766380A (en) 2022-10-26 2022-10-26 Network hosting processing method based on block chain

Country Status (1)

Country Link
CN (1) CN115766380A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116634386A (en) * 2023-05-09 2023-08-22 三亚宇航科技有限公司 Block chain-based Internet of things communication system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116634386A (en) * 2023-05-09 2023-08-22 三亚宇航科技有限公司 Block chain-based Internet of things communication system

Similar Documents

Publication Publication Date Title
JP6773904B2 (en) Quantum key relay method and equipment based on centralized control control network
RU2280331C2 (en) Method and communication system for controlling data flow in data transmission network
CN110463141B (en) Communication method, device and system
US20090111382A1 (en) Methods for scheduling collection of key performance indicators from elements in a communications network
CN115766380A (en) Network hosting processing method based on block chain
US20120243477A1 (en) Wireless base station, communication system, and method of controlling communication
AP1076A (en) Secure packet radio network.
Kerrache et al. RITA: RIsk‐aware Trust‐based Architecture for collaborative multi‐hop vehicular communications
JP2019522941A (en) How to manage transmission resources in an infrastructure
CN103841553B (en) A kind of hybrid wireless Mesh network routing safety and the method for secret protection
CN114785874B (en) Method for providing high-availability transmission channel based on multi-network protocol
CN101453520A (en) System and method for detecting and blocking disturbance call
EP2863597B1 (en) Computer-implemented method, computer system, computer program product to manage traffic in a network
CN117201417B (en) Multi-user communication management and control method and system based on dynamic priority
US8355366B2 (en) Wireless communications node used in AD HOC network and method thereof
CN109195160B (en) Tamper-proof storage system of network equipment resource detection information and control method thereof
CN114697336B (en) Distributed data switching network system and method based on edge data gateway
CN116800457A (en) Internet of things terminal security access authentication method based on T-NTRU public key cryptography
CN115882925A (en) Cognitive satellite network spectrum sharing method based on block chain intelligent contract verification
CN101764892A (en) System for detection and interception of harassing call
CN108271431A (en) Service disruption is reported
Harikishore et al. RETRACTED ARTICLE: A reliable multi-hop opportunistic routing scheme with bandwidth guarantee for multimedia wireless mesh networks
Chanak et al. Green fault detection scheme for IoT‐enabled wireless sensor networks
CN112399410A (en) Method, apparatus, computer readable medium and device for secure communication
EP3603174A1 (en) Method and system of cooperation among access gateways for bandwidth sharing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination