CN116545907A - Message processing method, node and electronic equipment - Google Patents

Message processing method, node and electronic equipment Download PDF

Info

Publication number
CN116545907A
CN116545907A CN202310238157.7A CN202310238157A CN116545907A CN 116545907 A CN116545907 A CN 116545907A CN 202310238157 A CN202310238157 A CN 202310238157A CN 116545907 A CN116545907 A CN 116545907A
Authority
CN
China
Prior art keywords
node
message
virtual machine
transmission link
type
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310238157.7A
Other languages
Chinese (zh)
Inventor
吉敏
马亮亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN202310238157.7A priority Critical patent/CN116545907A/en
Publication of CN116545907A publication Critical patent/CN116545907A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/70Routing based on monitoring results
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application provides a message processing method which is applied to an ad hoc network formed by three nodes, and the method comprises the following steps: a first node in the ad hoc network determines the type of a message as a first type, and the message is sent to the first node by a third node in the ad hoc network; the first node forwards the message to a second node in the ad hoc network and a first virtual machine corresponding to the first node according to the type of the message and the abnormal state of a first transmission link; the first transmission link is a transmission link between the second node and the third node; the first type of message is a broadcast message, or the first type of message is a unicast message, and a destination media access control address carried by the unicast message does not exist in a media access control table of a first network bridge corresponding to the first node.

Description

Message processing method, node and electronic equipment
Technical Field
The present disclosure relates to edge computing technologies, and in particular, to a message processing method, a node, and an electronic device.
Background
In an edge computing scenario, there are typically multiple clusters of nodes. As in the Multi-access edge computing (Multi-access Edge Computing, MEC) scenario, each node cluster is typically composed of three nodes, and the management network and storage network inside the node cluster are typically composed of three nodes interconnected by two. However, how to efficiently transmit a message in this scenario is a goal that has been pursued in the field of edge computing.
Disclosure of Invention
The embodiment of the application provides a message processing method, a node and electronic equipment.
The technical scheme of the embodiment of the application is realized as follows:
the embodiment of the application provides a message processing method, which comprises the following steps: the method is applied to an ad hoc network formed by three nodes, and comprises the following steps:
a first node in the ad hoc network determines the type of a message as a first type, and the message is sent to the first node by a third node in the ad hoc network;
the first node forwards the message to a second node in the ad hoc network and a first virtual machine corresponding to the first node according to the type of the message and the abnormal state of a first transmission link; the first transmission link is a transmission link between the second node and the third node;
the first type of message is a broadcast message, or the first type of message is a unicast message, and a destination media access control address carried by the unicast message does not exist in a media access control table of a first network bridge corresponding to the first node.
In some embodiments, the method further comprises: and the first node receives a notification that the first transmission link sent by the second node and/or the third node is in an abnormal state.
In some embodiments, the method further comprises: and the first node stores the corresponding relation between the third virtual machine corresponding to the third node and the interface of the first network bridge in a media access control table of the first network bridge.
In some embodiments, the method further comprises: the first node receives a unicast response message sent by the second node under the condition that the target media access control address is matched with a network protocol address of a second virtual machine corresponding to the second node;
and the first node forwards the unicast response message to the third node based on the corresponding relation.
In some embodiments, the abnormal state of the first transmission link includes at least one of:
the network connection between the second node and the third node is interrupted;
the interface corresponding to the second node and/or the interface corresponding to the third node in the first transmission link is in a damaged state;
the interface corresponding to the second node and/or the interface corresponding to the third node in the first transmission link is in a closed state;
the second node and/or the third node is in a system closed state.
In some embodiments, the method further comprises: and responding to the fact that all transmission links in the ad hoc network are in a normal state, and forwarding the message to the first virtual machine by the first node only.
In some embodiments, the method further comprises: the first node receives a unicast response message sent by the first virtual machine under the condition that the target media access control address is matched with the network protocol address of the first virtual machine;
the first node forwards the unicast response message to the third node.
The embodiment of the application provides a node which is a first node in an ad hoc network formed by three nodes; the node comprises:
the determining module is used for determining the type of the message as a first type, and the message is sent to the first node by a third node in the ad hoc network;
the receiving and transmitting module is used for forwarding the message to a second node in the ad hoc network and a first virtual machine corresponding to the first node according to the type of the message and the abnormal state of the first transmission link; the first transmission link is a transmission link between the second node and the third node;
the first type of message is a broadcast message, or the first type of message is a unicast message, and a destination media access control address carried by the unicast message does not exist in a media access control table of a first network bridge corresponding to the first node.
In some embodiments, the transceiver module is further configured to receive a notification that the first transmission link sent by the second node and/or the third node is in an abnormal state.
In some embodiments, the node further comprises:
and the storage module is used for storing the corresponding relation between the third virtual machine corresponding to the third node and the interface of the first network bridge in the medium access control table of the first network bridge.
In some embodiments, the transceiver module is further configured to receive a unicast reply packet sent by the second node when the destination media access control address matches a network protocol address of a second virtual machine corresponding to the second node;
and forwarding the unicast response message to the third node based on the corresponding relation.
In some embodiments, the abnormal state of the first transmission link includes at least one of:
the network connection between the second node and the third node is interrupted;
the interface corresponding to the second node and/or the interface corresponding to the third node in the first transmission link is in a damaged state;
the interface corresponding to the second node and/or the interface corresponding to the third node in the first transmission link is in a closed state;
the second node and/or the third node is in a system closed state.
In some embodiments, the transceiver module is further configured to, in response to all transmission links in the ad hoc network being in a normal state, forward the packet to the first virtual machine only by the first node.
In some embodiments, the transceiver module is further configured to, when the destination media access control address matches a network protocol address of the first virtual machine, receive, by the first node, a unicast reply message sent by the first virtual machine;
the first node forwards the unicast response message to the third node.
An embodiment of the present application provides an electronic device, including:
a memory for storing executable instructions;
and the processor is used for realizing the message processing method provided by the embodiment of the application when executing the executable instructions stored in the memory.
The embodiment of the application provides a computer readable storage medium, which stores executable instructions for implementing the message processing method provided by the embodiment of the application when being executed by a processor.
In the message processing method provided by the embodiment of the application, after a first node in an ad hoc network formed by three nodes receives a message sent by a third node in the ad hoc network, if a first transmission link between a second node and the third node is abnormal, and the message type is a broadcast message; or if the first transmission link is abnormal and the message type is a unicast message, and a destination media access control address carried in the unicast message is not in a media access control table of a first network bridge corresponding to the first node, the first node forwards the message to a second node in the ad hoc network and a first virtual machine corresponding to the first node; the message can be quickly and efficiently transmitted to the node or the equipment corresponding to the target media access control address carried in the message.
Drawings
FIG. 1 is a schematic diagram of an alternative processing flow of a message processing method according to an embodiment of the present application;
fig. 2 is a schematic diagram of an ad hoc network according to an embodiment of the present application;
FIG. 3 is a schematic diagram of another alternative processing flow of the message processing method according to the embodiment of the present application;
FIG. 4 is a schematic diagram of another alternative processing flow of the message processing method according to the embodiment of the present application;
FIG. 5 is a schematic diagram of another alternative processing flow of the message processing method according to the embodiment of the present application;
FIG. 6 is a detailed process flow diagram of a message processing method according to an embodiment of the present disclosure;
fig. 7 is a schematic diagram of a composition structure of a node according to an embodiment of the present application;
fig. 8 is a schematic diagram of a hardware composition structure of an electronic device according to an embodiment of the present application.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the present application more apparent, the present application will be described in further detail with reference to the accompanying drawings, and the described embodiments should not be construed as limiting the present application, and all other embodiments obtained by those skilled in the art without making any inventive effort are within the scope of the present application.
In the following description, reference is made to "some embodiments" which describe a subset of all possible embodiments, but it is to be understood that "some embodiments" can be the same subset or different subsets of all possible embodiments and can be combined with one another without conflict.
In the following description, the terms "first", "second", "third" and the like are merely used to distinguish similar objects and do not represent a specific ordering of the objects, it being understood that the "first", "second", "third" may be interchanged with a specific order or sequence, as permitted, to enable embodiments of the application described herein to be practiced otherwise than as illustrated or described herein. In the following description, the term "plurality" refers to at least two.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs. The terminology used herein is for the purpose of describing embodiments of the present application only and is not intended to be limiting of the present application.
In the related art, for message transmission in a node cluster formed by 3 nodes, one method is to use Spanning-Tree Protocol (STP) to perform message transmission between nodes; however, when a message is transmitted between the first node and the third node using STP protocol, the message needs to pass through the second node, resulting in a decrease in the message transmission efficiency. The other method is to directly send the message between two nodes through a routing protocol; however, the routing protocol is a three-layer protocol, and if some application messages are two-layer messages, the two-layer messages cannot be forwarded through the routing protocol, so that the use of some applications is limited.
An embodiment of the present application provides a message processing method, and an optional processing flow of the message processing method, as shown in fig. 1, includes at least the following steps:
step S101, a first node in the ad hoc network determines the type of the message as a first type.
In some embodiments, a schematic diagram of an ad hoc network, as shown in fig. 2; the ad hoc network is formed by interconnecting physical interfaces corresponding to three nodes in pairs; two physical interfaces (also referred to as interfaces) on each node are added to the node's corresponding ad hoc bridge (also referred to as bridge). The three nodes in the ad hoc network are a first node, a second node and a third node respectively; the two physical interfaces on the first node are respectively used for transmitting messages with the second node and the third node; the two physical interfaces CA and CB on the first node are respectively added into a first network bridge corresponding to the first node, and the first network bridge can monitor the states of the two physical interfaces CA and CB on the first node. Wherein the physical interface may be a portal.
In some embodiments, the message is sent by a third node in the ad hoc network to the first node. The first type of message may include two types. One is a broadcast message, the other is a unicast message, and a destination media access control address (Media Access Control, MAC) carried in the unicast message is not in the media access control table of the first bridge corresponding to the first node.
In some embodiments, the first node, the second node, and the third node may each be a server; accordingly, the node cluster may be a server cluster. The first node may be connected to at least one first virtual machine, the second node may be connected to at least one second virtual machine, and the third node may be connected to at least one third virtual machine.
Step S102, the first node forwards the message to a second node in the ad hoc network and a first virtual machine corresponding to the first node according to the type of the message and the abnormal state of the first transmission link.
In some embodiments, the first transmission link is a transmission link between the second node and the third node, and is a transmission link constructed based on a BA interface of the second node and an AB interface of the third node.
In some embodiments, the abnormal state of the first transmission link may be any one or more of the following: 1) The network connection between the second node and the third node is broken. 2) The BA interface and/or the AB interface are in a damaged state. 3) The BA interface and/or the AB interface are off. 4) The second node and/or the third node is in a system closed state. Wherein, the BA interface and/or AB interface being in a closed state may refer to: the user manually closes one or both of the BA interface and the AB interface. The second node and/or the third node being in a system off state may refer to: the first node and/or the second node is/are in a shutdown state; the second node and/or the third node being in a system off state may also refer to: the first node and/or the second node is in a powered-down state.
In some embodiments, the abnormal state of the first transmission link may be sent by the second node and/or the third node to the first node.
In the implementation, if the BA interface in the second node is damaged or closed, the second node determines that the first transmission link is in an abnormal state, and sends a notification to the first node that the first transmission link is in an abnormal state. If the AB interface in the third node is damaged or closed, the third node judges that the first transmission link is in an abnormal state and sends a notification that the first transmission link is in the abnormal state to the first node. If the network connection between the second node and the third node is interrupted, the second node and the third node can both judge that the first transmission link is in an abnormal state, and the second node and the third node both send a notification to the first node that the first transmission link is in the abnormal state. If the second node is in the system-off state, the second node sends a notification to the first node that the first transmission link is in an abnormal state. If the third node is in the system-off state, the third node sends a notification that the first transmission link is in an abnormal state to the first node.
In the following, a specific implementation procedure of the message processing method provided in the embodiment of the present application is described by taking an example that a first transmission link is abnormal due to a connection interruption between a second node and a third node, and the third virtual machine sends a broadcast message to the second virtual machine. An alternative process flow diagram of the message processing method provided in the embodiment of the present application, as shown in fig. 3, at least includes the following steps:
in step S201, the second node and the third node send notification of the abnormal state of the first transmission link to the first node.
In some embodiments, if the connection between the second node and the third node is broken, the AB interface and the BA interface enter an abnormal state, and both the second node and the third node may send a notification of the abnormal state of the first transmission link to the first node.
Step S202, the third virtual machine sends a broadcast message to the third node.
In some embodiments, the third virtual machine may send the broadcast message to a third bridge corresponding to the third node.
In step S203, the third node forwards the broadcast message to the first node.
In some embodiments, a third bridge corresponding to the third node forwards the broadcast message to the first node.
In some embodiments, after receiving the broadcast packet sent by the third node, the first node stores a correspondence between the third virtual machine corresponding to the third node and an interface of the first bridge.
In some embodiments, the first node stores a correspondence of the third virtual machine to the interface of the first bridge in a MAC table of the first bridge; the interface of the first bridge is an interface (AC interface) for sending a broadcast message in the first bridge.
Step S204, the first node performs flooding forwarding on the broadcast message.
In some embodiments, the first node forwards the broadcast message to all devices and nodes connected to the first node. With respect to fig. 3, a first node forwards a broadcast message to a first virtual machine and a second node.
In step S205, the second node forwards the broadcast message to the second virtual machine.
In some embodiments, after receiving the broadcast message, the second node stores, in a MAC table of a second bridge corresponding to the second node, a correspondence between the first virtual machine and an interface of the second bridge corresponding to the second node; the interface of the second bridge is an interface (BC interface) for receiving the broadcast message in the second bridge.
In some embodiments, the second node performs flooding forwarding on the broadcast message, and because the first transmission link between the second node and the third node is abnormal, the second node forwards the message only to the second virtual machine.
In this embodiment, in step S204, after the first node forwards the broadcast message to the first virtual machine, the first virtual machine parses the broadcast message, determines that the destination MAC address carried in the broadcast message is not matched with the network protocol address of the first virtual machine, and then the first virtual machine ignores the broadcast message.
After the second virtual machine receives the broadcast message according to the message processing method shown in fig. 3, the alternative processing flow of the message processing method provided in the embodiment of the present application is processed, as shown in fig. 4, and at least includes the following steps:
in step S206, the second virtual machine sends a unicast response message to the second node.
In some embodiments, the second virtual machine parses the broadcast message, and determines that the destination MAC address carried in the broadcast message matches the network protocol address of the second virtual machine, and then the second virtual machine sends a unicast response message to the second node.
In step S207, the first node receives the unicast response message sent by the second node.
In some embodiments, after receiving the unicast reply message, the second node sends the unicast reply message to the first node through the BC interface according to the corresponding relationship between the first virtual machine and the BC interface stored in the MAC table of the second bridge.
In step S208, the first node sends the unicast reply message to the third node.
In some embodiments, after receiving the unicast reply message, the first node sends the unicast reply message to the third node through the CA interface according to the corresponding relationship between the third virtual machine stored in the MAC table of the first bridge and the CA interface.
In step S209, the third node forwards the unicast reply message to the third virtual machine.
In the embodiment of the present application, under the condition that a first transmission link between a second node and a third node is abnormal, based on the ad hoc network provided in the embodiment of the present application, the third node sends a broadcast message to a second virtual machine through the first node; the efficient transmission of the message is realized.
The foregoing describes the processing procedure of the further packet processing method provided in the embodiment of the present application, taking an example that there is an abnormality of a transmission link in the ad hoc network. The following describes a message processing method provided in the embodiment of the present application, taking as an example that each transmission link in the ad hoc network shown in fig. 2 is normal. As shown in fig. 5, another optional processing flow of the message processing method provided in the embodiment of the present application at least includes the following steps:
in step S301, the first node receives a message sent by the third node.
In some embodiments, after receiving the message sent by the third node, the first node stores, in a MAC table of the first bridge corresponding to the first node, a correspondence between the first virtual machine corresponding to the first node and the CA interface.
In some embodiments, the message received by the first node is a broadcast message; or the message received by the first node is a unicast message, and the destination MAC carried in the unicast message is not in the MAC table of the first network bridge
In step S302, the first node forwards the message only to the first virtual machine.
In the embodiment of the application, the first node does not perform flooding forwarding on the received message, that is, the first node does not forward the message to the second node connected with the first node, and only forwards the message to the first virtual machine connected with the first node.
In this embodiment of the present application, when all transmission links in an ad hoc network are in a normal state (may also be referred to as a state in which a message can be transmitted between any two nodes), when any node receives a first type of message sent by another node, the message is only forwarded to a virtual machine corresponding to the node, and forwarding between nodes is not performed through a physical interface. As an example, after the first node receives the message sent by the third node, the first node only forwards the message to the first virtual machine, and the first node does not forward the message to the second node. The first type of message is a broadcast message; or the first type message is a unicast message, and the destination MAC carried in the unicast message is not in the MAC table of the network bridge corresponding to the node receiving the message.
In some embodiments, if the destination MAC address carried in the packet matches the network protocol address of the first virtual machine, after step S302, the method further includes:
step S303, the first node receives the unicast response message sent by the first virtual machine.
In step S304, the first node forwards the unicast reply message to the third node.
In some embodiments, the first node forwards the unicast reply message to the third node through the CA interface according to the correspondence between the first virtual machine and the CA interface stored in step S301. And the third node forwards the unicast response message to the third virtual machine.
Taking the example that each transmission link in the ad hoc network shown in fig. 2 is normal, the detailed processing flow of the message processing method provided in the embodiment of the present application, as shown in fig. 6, at least includes the following steps:
in step S401, the third virtual machine sends a broadcast message to the third node.
In some embodiments, the destination MAC address carried in the broadcast packet matches a MAC address corresponding to the second node in the ad hoc network.
In step S402, the third node forwards the broadcast message to the first node and the second node.
In some embodiments, the broadcast message received by the third node is not sent by a node in the ad hoc network, but is sent by a virtual machine, and the third node performs flooding forwarding on the broadcast message.
In step S403, the first node forwards the broadcast message to the first virtual machine.
In some embodiments, after receiving the broadcast message, the first node stores a correspondence between the third virtual machine and the CA interface in the first bridge.
In step S404, the second node forwards the broadcast message to the second virtual machine.
In some embodiments, the second node stores, in the second bridge, a correspondence of the third virtual machine and the BA interface after receiving the broadcast message.
Step S405, the second virtual machine sends a unicast response message to the second node.
In some embodiments, if the second virtual machine determines that the destination MAC address carried in the broadcast packet matches the network protocol address of the second virtual machine, the second virtual machine sends a unicast response packet to the second node.
In step S406, the second node forwards the unicast reply message to the third node.
In some embodiments, the second node stores the corresponding relationship between the third virtual machine and the BA interface in the second bridge, and sends the unicast reply message Wen Zhuaifa to the third node through the BA interface.
In step S407, the third node forwards the unicast reply message to the third virtual machine.
In this embodiment of the present application, after step S403, after the first virtual machine receives the broadcast message, the first virtual machine parses the broadcast message, determines that the destination MAC address carried in the broadcast message is not matched with the network protocol address of the first virtual machine, and then the first virtual machine ignores the broadcast message.
In the embodiment of the application, the message is directly received or sent among the nodes in the ad hoc network, and the message is not forwarded through the intermediate node, so that the efficiency of message transmission is improved. And, the nodes in the ad hoc network can be deployed in a two-layer network, and are suitable for applications using two-layer messages.
In the embodiment of the present application, when any node forwards a message or a unicast response message, the bridge corresponding to the node may forward the message or the unicast response message. The matching of the destination MAC address and the network protocol address of the virtual machine in the packet may mean that the destination MAC address is consistent with the network protocol address of the virtual machine.
Note that, the present invention is not limited to the above-described embodiments. Although the embodiments of the present disclosure provide the method operational steps described in the embodiments or illustrated in the drawings, more or less operational steps may be included in the method based on routine or non-inventive labor. In steps where there is logically no necessary causal relationship, the execution order of the steps is not limited to the execution order provided by the embodiments of the present application. The methods may be performed sequentially or in parallel as shown in the embodiments or the drawings when the actual processing or the control device is executing.
The embodiment of the application also provides a node which is a first node in an ad hoc network formed by three nodes; the composition structure of the node is schematically shown in fig. 7, and includes:
a determining module 501, configured to determine a type of a message is a first type, where the message is sent to the first node by a third node in the ad hoc network;
the transceiver module 502 is configured to forward the packet to a second node in the ad hoc network and a first virtual machine corresponding to the first node according to the type of the packet and an abnormal state of the first transmission link; the first transmission link is a transmission link between the second node and the third node;
the first type of message is a broadcast message, or the first type of message is a unicast message, and a destination media access control address carried by the unicast message does not exist in a media access control table of a first network bridge corresponding to the first node.
In some embodiments, the transceiver module 502 is further configured to receive a notification that the first transmission link sent by the second node and/or the third node is in an abnormal state.
In some embodiments, the node further comprises:
and a storage module 503, configured to store, in a media access control table of the first bridge, a correspondence between a third virtual machine corresponding to the third node and an interface of the first bridge.
In some embodiments, the transceiver module 502 is further configured to receive a unicast reply message sent by the second node when the destination media access control address matches a network protocol address of a second virtual machine corresponding to the second node;
and forwarding the unicast response message to the third node based on the corresponding relation.
In some embodiments, the abnormal state of the first transmission link includes at least one of:
the network connection between the second node and the third node is interrupted;
the interface corresponding to the second node and/or the interface corresponding to the third node in the first transmission link is in a damaged state;
the interface corresponding to the second node and/or the interface corresponding to the third node in the first transmission link is in a closed state;
the second node and/or the third node is in a system closed state.
In some embodiments, the transceiver module 502 is further configured to, in response to all transmission links in the ad hoc network being in a normal state, forward the packet to the first virtual machine only by the first node.
In some embodiments, the transceiver module 502 is further configured to, if the destination media access control address matches a network protocol address of the first virtual machine, receive a unicast reply message sent by the first virtual machine by the first node;
the first node forwards the unicast response message to the third node.
The embodiment of the application also provides electronic equipment, which comprises: a memory for storing executable instructions;
and the processor is used for realizing the message processing method provided by the embodiment of the application when executing the executable instructions stored in the memory.
In some embodiments, the electronic device may be a server, and the server may implement the method for processing a message provided in the embodiments of the present application by running a computer program, for example, the computer program may be a native program or a software module in an operating system; a Native Application (APP), i.e. a program that needs to be installed in an operating system to run; the method can also be an applet, namely a program which can be run only by being downloaded into a browser environment; but also an applet that can be embedded in any APP. In general, the computer programs described above may be any form of application, module or plug-in.
In some embodiments, the server may be an independent physical server, or may be a server cluster or a distributed system formed by a plurality of physical servers, or may be a Cloud server that provides Cloud services, cloud databases, cloud computing, cloud functions, cloud storage, network services, cloud communication, middleware services, domain name services, security services, CDNs, and basic Cloud computing services such as big data and artificial intelligence platforms, where Cloud Technology (Cloud Technology) refers to a hosting Technology that unifies serial resources such as hardware, software, and networks in a wide area network or a local area network to implement computing, storage, processing, and sharing of data.
The hardware composition structure of the electronic device provided in the embodiment of the present application is shown in fig. 8, where the electronic device includes: at least one processor 701, memory 702, and at least one network interface 704. The various components in the electronic device 700 are coupled together by a bus system 705. It is appreciated that the bus system 705 is used to enable connected communications between these components. The bus system 705 includes a power bus, a control bus, and a status signal bus in addition to the data bus. But for clarity of illustration, the various buses are labeled as bus system 705 in fig. 8.
It is to be appreciated that the memory 702 can be either volatile memory or nonvolatile memory, and can include both volatile and nonvolatile memory. Wherein the nonvolatile Memory may be ROM, programmable read-Only Memory (PROM, programmable Read-Only Memory), erasable programmable read-Only Memory (EPROM, erasable Programmable Read-Only Memory), electrically erasable programmable read-Only Memory (EEPROM, electrically Erasable Programmable Read-Only Memory), magnetic random access Memory (FRAM, ferromagnetic random access Memory), flash Memory (Flash Memory), magnetic surface Memory, optical disk, or compact disk read-Only Memory (CD-ROM, compact Disc Read-Only Memory); the magnetic surface memory may be a disk memory or a tape memory. The volatile memory may be random access memory (RAM, random Access Memory), which acts as external cache memory. By way of example, and not limitation, many forms of RAM are available, such as static random access memory (SRAM, static Random Access Memory), synchronous static random access memory (SSRAM, synchronous Static Random Access Memory), dynamic random access memory (DRAM, dynamic Random Access Memory), synchronous dynamic random access memory (SDRAM, synchronous Dynamic Random Access Memory), double data rate synchronous dynamic random access memory (ddr SDRAM, double Data Rate Synchronous Dynamic Random Access Memory), enhanced synchronous dynamic random access memory (ESDRAM, enhanced Synchronous Dynamic Random Access Memory), synchronous link dynamic random access memory (SLDRAM, syncLink Dynamic Random Access Memory), direct memory bus random access memory (DRRAM, direct Rambus Random Access Memory). The memory 702 described in embodiments of the present application is intended to comprise, without being limited to, these and any other suitable types of memory.
The memory 702 in the embodiments of the present application is used to store various types of data to support the operation of the electronic device 700. Examples of such data include: any computer program for operating on the electronic device 700, such as application 7022. A program implementing the method of the embodiment of the present application may be contained in the application program 7022.
The method disclosed in the embodiments of the present application may be applied to the processor 701 or implemented by the processor 701. The processor 701 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware in the processor 701 or by instructions in the form of software. The processor 701 may be a general purpose processor, a digital signal processor (DSP, digital Signal Processor), or other programmable logic device, discrete gate or transistor logic device, discrete hardware components, or the like. The processor 701 may implement or perform the methods, steps, and logic blocks disclosed in embodiments of the present application. The general purpose processor may be a microprocessor or any conventional processor or the like. The steps of the method disclosed in the embodiments of the present application may be directly embodied in a hardware decoding processor or implemented by a combination of hardware and software modules in the decoding processor. The software modules may be located in a storage medium in a memory 702. The processor 701 reads information in the memory 702 and, in combination with its hardware, performs the steps of the method as described above.
In an exemplary embodiment, the electronic device 700 can be implemented by one or more application specific integrated circuits (ASIC, application Specific Integrated Circuit), DSP, programmable logic device (PLD, programmable Logic Device), complex programmable logic device (CPLD, complex Programmable Logic Device), FPGA, general purpose processor, controller, MCU, MPU, or other electronic components for performing the aforementioned message processing methods.
Embodiments of the present application provide a computer program product or computer program comprising computer instructions stored in a computer readable storage medium. The processor of the computer device reads the computer instructions from the computer readable storage medium, and the processor executes the computer instructions, so that the computer device executes the message processing method according to the embodiment of the present application.
The embodiments of the present application provide a computer readable storage medium storing executable instructions, wherein the executable instructions are stored, which when executed by a processor, cause the processor to perform the method for processing a message provided by the embodiments of the present application.
In some embodiments, the computer readable storage medium may be FRAM, ROM, PROM, EPROM, EEPROM, flash memory, magnetic surface memory, optical disk, or CD-ROM; but may be a variety of devices including one or any combination of the above memories.
In some embodiments, the executable instructions may be in the form of programs, software modules, scripts, or code, written in any form of programming language (including compiled or interpreted languages, or declarative or procedural languages), and they may be deployed in any form, including as stand-alone programs or as modules, components, subroutines, or other units suitable for use in a computing environment.
As an example, the executable instructions may, but need not, correspond to files in a file system, may be stored as part of a file that holds other programs or data, for example, in one or more scripts in a hypertext markup language (Hyper Text Markup Language, HTML) document, in a single file dedicated to the program in question, or in multiple coordinated files (e.g., files that store one or more modules, sub-programs, or portions of code).
As an example, executable instructions may be deployed to be executed on one computing device or on multiple computing devices located at one site or, alternatively, distributed across multiple sites and interconnected by a communication network.
The foregoing is merely exemplary embodiments of the present application and is not intended to limit the scope of the present application. Any modifications, equivalent substitutions, improvements, etc. that are within the spirit and scope of the present application are intended to be included within the scope of the present application.

Claims (10)

1. A message processing method applied to an ad hoc network formed by three nodes, the method comprising:
a first node in the ad hoc network determines the type of a message as a first type, and the message is sent to the first node by a third node in the ad hoc network;
the first node forwards the message to a second node in the ad hoc network and a first virtual machine corresponding to the first node according to the type of the message and the abnormal state of a first transmission link; the first transmission link is a transmission link between the second node and the third node;
the first type of message is a broadcast message, or the first type of message is a unicast message, and a destination media access control address carried by the unicast message does not exist in a media access control table of a first network bridge corresponding to the first node.
2. The method of claim 1, the method further comprising:
and the first node receives a notification that the first transmission link sent by the second node and/or the third node is in an abnormal state.
3. The method of claim 1, the method further comprising:
and the first node stores the corresponding relation between the third virtual machine corresponding to the third node and the interface of the first network bridge in a media access control table of the first network bridge.
4. A method according to claim 3, the method further comprising:
the first node receives a unicast response message sent by the second node under the condition that the target media access control address is matched with a network protocol address of a second virtual machine corresponding to the second node;
and the first node forwards the unicast response message to the third node based on the corresponding relation.
5. The method of claim 1, the abnormal state of the first transmission link comprising at least one of:
the network connection between the second node and the third node is interrupted;
the interface corresponding to the second node and/or the interface corresponding to the third node in the first transmission link is in a damaged state;
the interface corresponding to the second node and/or the interface corresponding to the third node in the first transmission link is in a closed state;
the second node and/or the third node is in a system closed state.
6. The method of any one of claims 1 to 5, further comprising:
and responding to the fact that all transmission links in the ad hoc network are in a normal state, and forwarding the message to the first virtual machine by the first node only.
7. The method of claim 6, the method further comprising:
the first node receives a unicast response message sent by the first virtual machine under the condition that the target media access control address is matched with the network protocol address of the first virtual machine;
the first node forwards the unicast response message to the third node.
8. A node, which is a first node in an ad hoc network consisting of three nodes; the node comprises:
the determining module is used for determining the type of the message as a first type, and the message is sent to the first node by a third node in the ad hoc network;
the receiving and transmitting module is used for forwarding the message to a second node in the ad hoc network and a first virtual machine corresponding to the first node according to the type of the message and the abnormal state of the first transmission link; the first transmission link is a transmission link between the second node and the third node;
the first type of message is a broadcast message, or the first type of message is a unicast message, and a destination media access control address carried by the unicast message does not exist in a media access control table of a first network bridge corresponding to the first node.
9. An electronic device, comprising: at least one processor; and a memory communicatively coupled to the at least one processor;
wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of claims 1 to 7.
10. A computer readable storage medium having stored therein computer instructions for causing a computer to perform the method according to any one of claims 1 to 7.
CN202310238157.7A 2023-03-13 2023-03-13 Message processing method, node and electronic equipment Pending CN116545907A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310238157.7A CN116545907A (en) 2023-03-13 2023-03-13 Message processing method, node and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310238157.7A CN116545907A (en) 2023-03-13 2023-03-13 Message processing method, node and electronic equipment

Publications (1)

Publication Number Publication Date
CN116545907A true CN116545907A (en) 2023-08-04

Family

ID=87447864

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310238157.7A Pending CN116545907A (en) 2023-03-13 2023-03-13 Message processing method, node and electronic equipment

Country Status (1)

Country Link
CN (1) CN116545907A (en)

Similar Documents

Publication Publication Date Title
CN102055667B (en) Methods and apparatus for configuring virtual network switch
US10191758B2 (en) Directing data traffic between intra-server virtual machines
CN114363021B (en) Network target range system, virtual network implementation method and device of network target range system
CN109088820B (en) Cross-device link aggregation method and device, computing device and storage medium
US10938667B2 (en) Incremental intent checking for stateful networks
CN102209064B (en) Method of using VRRP to provide backup for access equipment and VRRP gateway equipment
US20180241695A1 (en) Direct replying actions in sdn switches
CN110177010B (en) Link switching method and device
CN112350918B (en) Service traffic scheduling method, device, equipment and storage medium
CN112887229B (en) Session information synchronization method and device
Bakhshi Kiadehi et al. A fault-tolerant architecture for internet-of-things based on software-defined networks
US10812359B2 (en) Service providing device, alternative service providing device, relaying device, service providing system, and service providing method
CN103631652A (en) Method and system for achieving virtual machine migration
US9280426B2 (en) System and method for server redundancy
CN113162779A (en) Multi-cloud interconnection method and equipment
CN113364660B (en) Data packet processing method and device in LVS load balancing
WO2018004931A1 (en) Techniques for virtual ethernet switching of a multi-node fabric
CN112003794B (en) Floating IP current limiting method, system, terminal and storage medium
CN110311861B (en) Method and device for guiding data flow
CN116545907A (en) Message processing method, node and electronic equipment
Gaitan et al. An IoT middleware framework for industrial applications
CN114422427A (en) Flow balancing method and device, electronic equipment and storage medium
CN109981437B (en) Multi-data center intercommunication method based on VPC and related equipment
CN112994942A (en) SDN control method and device
CN106803804A (en) The method and apparatus of transmitting message

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination