CN117113310A - Data transmission control method, system, equipment and medium - Google Patents

Data transmission control method, system, equipment and medium Download PDF

Info

Publication number
CN117113310A
CN117113310A CN202311333884.8A CN202311333884A CN117113310A CN 117113310 A CN117113310 A CN 117113310A CN 202311333884 A CN202311333884 A CN 202311333884A CN 117113310 A CN117113310 A CN 117113310A
Authority
CN
China
Prior art keywords
node
data
transmission
emergency
data transmission
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202311333884.8A
Other languages
Chinese (zh)
Other versions
CN117113310B (en
Inventor
周杨
王小杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Huakun Zhenyu Intelligent Technology Co ltd
Beijing Huakun Zhenyu Intelligent Technology Co ltd
Original Assignee
Sichuan Huakun Zhenyu Intelligent Technology Co ltd
Beijing Huakun Zhenyu Intelligent Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Huakun Zhenyu Intelligent Technology Co ltd, Beijing Huakun Zhenyu Intelligent Technology Co ltd filed Critical Sichuan Huakun Zhenyu Intelligent Technology Co ltd
Priority to CN202311333884.8A priority Critical patent/CN117113310B/en
Publication of CN117113310A publication Critical patent/CN117113310A/en
Application granted granted Critical
Publication of CN117113310B publication Critical patent/CN117113310B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Automation & Control Theory (AREA)
  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The application relates to the technical field, in particular to a data transmission control method, a data transmission control system, a data transmission control device, a data transmission control medium, and a single-node device initialization self-test method, wherein the self-test method comprises the steps of self-testing uplink and downlink data such as a single-plate sensor, control information and the like; after the first node accesses the network, reporting the node information of the first node, and announcing the existence of the first node to a plurality of other second nodes; information verification is carried out on a first node, and whether the node is trusted or not is confirmed; if the node is confirmed to be a trusted node, the other second nodes accept the request of the first node; setting a preset requirement of a first node, and detecting whether the first node meets the preset requirement or not by a second node; if the requirements are not met, deleting the first node in the local trusted online connection state table. The method adopts a decentralization structure, has no single control node, and can participate in the management process. This eliminates single point failure and improves the robustness and stability of the system.

Description

Data transmission control method, system, equipment and medium
Technical Field
The present application relates to the technical field, and in particular, to a data transmission control method, system, device, and medium.
Background
Conventional BMC (Baseboard Management Controller ) management techniques typically employ a centralized management architecture, in which a master server or control node is responsible for managing and controlling all nodes. Such a centralized management architecture presents a single point of failure risk and in large-scale distributed systems, management efficiency may be limited.
Most of the traditional BMC management methods depend on a centralized management structure, adopt a mode of single-node information monitoring or fixed one-to-many mode, and have the problems of low safety, low decision monitoring efficiency and the like. The specific disadvantages are as follows:
single point of failure: under the centralized management structure, the master control node is a single point of failure of the whole system. If the master node fails or suffers an attack, the management functions of the whole system may be affected.
Management bottleneck: in large-scale distributed systems, centralized management may lead to management bottlenecks, and the master node needs to process a large number of management requests, which may lead to performance degradation and increased latency.
Safety risk: the centralized management structure is easy to be an attack target, and once the main control node is attacked, the security of the whole system can be threatened.
Dependency: traditional BMC management techniques rely on specific hardware devices and standardized management protocols, which may limit the flexibility and extensibility of management.
Disclosure of Invention
The application aims to provide a data transmission control method, a data transmission control system, data transmission control equipment and a data transmission control medium, so as to solve the problems.
The embodiment of the application is realized by the following technical scheme:
in a first aspect, the present application provides a data transmission control method, including;
the single node equipment initializes self-checking, which comprises a single board sensor, control information and uplink and downlink data;
after the first node accesses the network, reporting the node information of the first node, and announcing the existence of the first node to a plurality of other second nodes;
information verification is carried out on a first node, and whether the node is trusted or not is confirmed;
if the node confirms to be a trusted node, other second nodes accept the request of the first node, the first node is brought into the network, and the local trusted online connection state table is updated;
setting a preset requirement of a first node, and detecting whether the first node meets the preset requirement or not by a second node;
if the requirement is not met, deleting the first node in the local trusted online connection state table, and broadcasting the abnormal information of the first node.
In one embodiment of the present application, further comprising;
judging the bus before the bus is occupied;
if the bus is dead, resetting the bus;
and if the communication data is congested, waiting to send the communication data when the queue is blocked.
In an embodiment of the application, the waiting for transmission includes;
setting a transmission threshold of the communication channel, and detecting the data transmission quantity of the communication channel at the moment;
when the communication data transmitted by the previous node reaches the upper threshold limit of the communication channel;
and closing the data transmission of the rest nodes, and after the transmission of the previous node is completed, carrying out the data transmission of the next node.
In an embodiment of the application, the data types include general data and urgent data;
the method also comprises emergency transmission, and when the data transmitted by the last node reaches the upper threshold limit of the communication channel and the received data is emergency data, the emergency transmission is triggered;
the emergency transmission is that the communication channel transmits the data which is not transmitted by the last node and the emergency data simultaneously.
In an embodiment of the application, the emergency transmission further comprises;
acquiring the current data type, the size of the current data and the data which are not transmitted by the previous node;
if the current data is emergency data, the size of the emergency data is smaller than the size of data which is not transmitted by the previous node, the communication channel transmits the emergency data and the data which is not transmitted by the previous node at the same time, wherein the transmission rates of the emergency data and the data which is not transmitted by the previous node are inversely proportional to the sizes of the emergency data and the data which is not transmitted by the previous node;
if the size of the emergency data is larger than the size of the data which is not transmitted by the previous node, waiting for the transmission of the communication data of the previous node to be completed;
and if the current data is the general data, waiting for the completion of the communication data transmission of the last node.
In one embodiment of the present application, further comprising;
the transmitting node transmits data to the receiving node, and the receiving node transmits acknowledgement information to the transmitting node after receiving the data;
if the sending node does not receive the confirmation information, the sending node sends the same data again;
and if the transmitting node still does not receive the confirmation information of the receiving node after the second transmission, performing error reporting processing.
In one embodiment of the present application, further comprising;
when receiving error data or not receiving data, the receiving node sends a request for retransmitting the data to the sending node until receiving correct data;
after retransmitting for a certain number of times, packet loss processing is carried out to avoid causing bus blocking.
In a second aspect, the present application provides a management system for a decentralized BMC, comprising;
the node self-checking device is configured to be self-checking of single-node equipment initialization, and comprises a single-board sensor, control information and uplink and downlink data;
the node access device is configured to create a decentralised network, after a first node accesses the network, the node access device reports own node information and announces the existence of the first node to a plurality of other second nodes;
node verification means configured to verify information of a first node, confirming whether the node is trusted;
the node incorporating device is configured to create a local trusted online connection state table, if the node confirms that the node is a trusted node, the other second nodes accept the request of the first node, incorporate the first node into the network and update the local trusted online connection state table;
the node checking device is configured to set a preset requirement of the first node, the second node detects whether the first node meets the preset requirement, if not, the first node is deleted from the local trusted online connection state table, and abnormal information of the first node is broadcasted;
the master control device is connected with the node self-checking device, the node access device, the node verification device, the node inclusion device and the node check device, and executes the data transmission control method.
In a third aspect, the present application provides an electronic device, including a memory, a processor, and a computer program stored in the memory and executable on the processor, wherein the processor implements a data transmission control method as described above when executing the computer program.
In a fourth aspect, the present application provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, is a data transmission control method as described above.
The technical scheme of the embodiment of the application has at least the following advantages and beneficial effects:
the application provides a novel decentralized BMC management method, which adopts a decentralized structure, has no single control node and can participate in the management process. This eliminates single point failure and improves the robustness and stability of the system.
The decentralization management method allows the nodes to cooperate and make decisions, so that management tasks are shared, and management efficiency is improved. The nodes can automatically execute management tasks according to preset rules and conditions, and the burden of an administrator is reduced.
The decentralised structure reduces security risks and no single attack targets exist anymore. The trust relationship can be established between the nodes, and the consensus algorithm is adopted to agree on the trust relationship, so that the safety and the credibility of the management process are ensured.
Since the decentralized BMC management method is independent of specific hardware devices and standardized management protocols, it has greater flexibility and customizable. The method is applicable to different types of servers and equipment, and is suitable for different application scenes and requirements.
Enhancing autonomy: the decentralised management method encourages autonomous decision-making and autonomy of nodes. The nodes can automatically execute tasks according to preset rules and conditions, and centralized management control is not needed.
Meanwhile, when some urgent data are required to be sent, the communication channels are divided into flow, and a part of transmission channels are given to the urgent data, so that the urgent transmission of part of data can be performed while the previous data are normally transmitted, and the efficiency of the whole data transmission is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the embodiments will be briefly described below, it being understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and other related drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a schematic flow chart of the present application.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present application more apparent, the technical solutions of the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application, and it is apparent that the described embodiments are some embodiments of the present application, but not all embodiments of the present application. The components of the embodiments of the present application generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations.
The terms first, second and the like in the description and in the claims and in the above-described figures are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. The naming or numbering of the steps in the present application does not mean that the steps in the method flow must be executed according to the time/logic sequence indicated by the naming or numbering, and the execution sequence of the steps in the flow that are named or numbered may be changed according to the technical purpose to be achieved, so long as the same or similar technical effects can be achieved.
The division of the modules in the present application is a logical division, and there may be other manners of division in practical implementation, for example, multiple modules may be combined or integrated in another system, or some features may be omitted or not performed.
The modules or sub-modules described separately may or may not be physically separate, may or may not be implemented in software, and may be implemented in part in software, where the processor invokes the software to implement the functions of the part of the modules or sub-modules, and where other parts of the templates or sub-modules are implemented in hardware, for example in hardware circuits. In addition, some or all of the modules can be selected according to actual needs to achieve the purpose of the scheme of the application.
Referring to fig. 1, the present application provides a data transmission control method, which includes;
the management interface hardware implementation scheme comprises the following steps: the BMC management physical interface comprises a network port and a differential IIC interface, and can cover a conventional or lightweight BMC application scene. The hardware management interface can inherit and use a general network port or a differential IIC RJ45 port. The IIC management port inherits and uses the IPMB protocol, equipment is initialized as a slave, and the IIC differential circuit and the RJ45 port are beneficial to the remote transmission of IIC management signals. The management network port establishes a management local area network through a router, and the IIC manages the networking in a multi-node parallel mode (the maximum networking node number is 255).
The above-mentioned stage mainly completes the network communication physical connection architecture. I.e. a management local area network is established, and all devices to be managed are connected to this local area network. Each device has a physical interface for communication.
S101: the single node equipment initializes self-checking, which comprises a single board sensor, control information and uplink and downlink data;
the stage completes the initial classification of the single node data, so that the single node has self management function.
S102: after the first node accesses the network, reporting the node information of the first node, and announcing the existence of the first node to a plurality of other second nodes;
after receiving this information, the other nodes perform a series of steps to verify the trustworthiness of the device before incorporating it into the network. After the newly powered-on first node connects to the decentralized network, it actively transmits its own node information in a manner similar to broadcasting or direct communication with neighboring nodes. Such information typically includes the identity of the node, a public key, or other necessary information.
S103: information verification is carried out on a first node, and whether the node is trusted or not is confirmed;
the other second nodes that received the first node will verify it. The verification process may include a variety of ways, such as checking whether the node information is legitimate, confirming whether the node has sufficient reputation or contribution, etc. These verification steps help ensure that the new node is authentic and trusted, rather than malicious or counterfeit.
S104: if the node confirms to be a trusted node, other second nodes accept the request of the first node, the first node is brought into the network, and the local trusted online connection state table is updated;
s105: setting a preset requirement of a first node, and detecting whether the first node meets the preset requirement or not by a second node;
s106: if the requirement is not met, deleting the first node in the local trusted online connection state table, and broadcasting the abnormal information of the first node.
Decentralizing consensus and heartbeat detection: in the decentralization network, the nodes agree through a consensus algorithm, and the authenticity and the effectiveness of each node of the local area network are ensured. Each node can participate in the consensus process, and data support is provided for the security and reliability of the local BMC management. If the second node detects that the consensus or heartbeat of the first node does not meet the preset requirement, the second node deletes the first node in the local trusted online connection state table, and simultaneously releases the broadcast first node abnormal information.
Each trusted BMC management unit has the function of managing the full local BMC. The manager user can physically access any trusted BMC unit (A node) management port in the local area network, check the trusted connection state table of the nodes, such as the operable nodes of the local area network, the single-board information of any node, the control information of any single node and the like. And efficient decentralization management is realized.
In one embodiment of the present application, further comprising;
judging the bus before the bus is occupied; if the bus is dead, resetting the bus; and if the communication data is congested, waiting to send the communication data when the queue is blocked.
Specifically, the waiting for transmission includes;
setting a transmission threshold of the communication channel, and detecting the data transmission quantity of the communication channel at the moment; when the communication data transmitted by the previous node reaches the upper threshold limit of the communication channel; and closing the data transmission of the rest nodes, and after the transmission of the previous node is completed, carrying out the data transmission of the next node.
In one exemplary embodiment of the present application, since a part of data may be used more urgently, the data type includes general data and urgent data;
the method also comprises emergency transmission, and when the data transmitted by the last node reaches the upper threshold limit of the communication channel and the received data is emergency data, the emergency transmission is triggered; the emergency transmission is that the communication channel transmits the data which is not transmitted by the last node and the emergency data simultaneously.
More specifically, the emergency transmission includes;
acquiring the current data type, the size of the current data and the data which are not transmitted by the previous node; if the current data is emergency data, the size of the emergency data is smaller than the size of data which is not transmitted by the previous node, the communication channel transmits the emergency data and the data which is not transmitted by the previous node at the same time, wherein the transmission rates of the emergency data and the data which is not transmitted by the previous node are inversely proportional to the sizes of the emergency data and the data which is not transmitted by the previous node; if the size of the emergency data is larger than the size of the data which is not transmitted by the previous node, waiting for the transmission of the communication data of the previous node to be completed; and if the current data is the general data, waiting for the completion of the communication data transmission of the last node.
In connection with the above method, this embodiment provides a specific example for explanation.
When an operator needs to send data from one node to another node, the data is emergency data, at the moment, the communication channel reaches the upper threshold limit of the communication channel, the data of the last node is still being transmitted, the system detects that the sizes of the emergency data and the data which are not uploaded by the last node are equal to 10MB, for example, the size of the emergency data is 30MB, the emergency data is smaller than the size of the data which are not uploaded by the last node, emergency transmission is started, the ratio of the emergency data to the data which are not uploaded by the last node is smaller than 1 to 3, the speed of the emergency data transmission is set to be 3 times the speed of the data which are not uploaded by the last node until the transmission of the emergency data is completed, and after the transmission of the emergency data is completed, the data which are not uploaded by the last node are normally transmitted, so that the transmission of the data of the last node can be not completely stopped, and the emergency data can be rapidly transmitted.
If the size of the data which is not uploaded by the previous node is 5MB, the time is almost the same and the meaning of common transmission is not great under the condition that the data which is not uploaded by the previous node is smaller than the urgent data, the data which is not uploaded by the previous node is continuously waited for uploading, the integrity of data transmission is ensured,
in one embodiment of the present application, further comprising;
the transmitting node transmits data to the receiving node, and the receiving node transmits acknowledgement information to the transmitting node after receiving the data; if the sending node does not receive the confirmation information, the sending node sends the same data again; and if the transmitting node still does not receive the confirmation information of the receiving node after the second transmission, performing error reporting processing.
In the communication process, an automatic retransmission mechanism can be realized, that is, a sending end waits for a period of time after sending data and does not receive an acknowledgement signal of a receiving end, and the same data can be automatically retransmitted. Thus, reliable data transmission can be ensured, and data loss or damage can be avoided.
In one embodiment of the present application, further comprising; when receiving error data or not receiving data, the receiving node sends a request for retransmitting the data to the sending node until receiving correct data, and performs packet loss processing after retransmitting for a certain number of times, so as to avoid causing bus blocking.
In a second aspect, the present application provides a management system for a decentralized BMC, comprising;
the node self-checking device is configured to be self-checking of single-node equipment initialization, and comprises a single-board sensor, control information and uplink and downlink data;
the node access device is configured to create a decentralised network, after a first node accesses the network, the node access device reports own node information and announces the existence of the first node to a plurality of other second nodes;
node verification means configured to verify information of a first node, confirming whether the node is trusted;
the node incorporating device is configured to create a local trusted online connection state table, if the node confirms that the node is a trusted node, the other second nodes accept the request of the first node, incorporate the first node into the network and update the local trusted online connection state table;
the node checking device is configured to set a preset requirement of the first node, the second node detects whether the first node meets the preset requirement, if not, the first node is deleted from the local trusted online connection state table, and abnormal information of the first node is broadcasted;
the master control device is connected with the node self-checking device, the node access device, the node verification device, the node inclusion device and the node check device, and executes the data transmission control method.
In addition, each functional unit in the embodiments of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable storage medium. The computer software product is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the methods of the various embodiments of the application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-only memory (ROM), a random access memory (RAM, random Access Memory), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
The above is only a preferred embodiment of the present application, and is not intended to limit the present application, but various modifications and variations can be made to the present application by those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the protection scope of the present application.

Claims (9)

1. A data transmission control method, characterized by comprising;
after the first node accesses the network, reporting the node information of the first node, and announcing the existence of the first node to a plurality of other second nodes;
the method comprises the steps of performing information verification on a first node, confirming whether the node is trusted or not, creating a local trusted online connection state table, if the node is confirmed to be a trusted node, receiving requests of the first node by a plurality of other second nodes, incorporating the first node into a network, and updating the local trusted online connection state table;
setting a preset requirement of a first node, and detecting whether the first node meets the preset requirement or not by a second node, wherein normal data transmission is carried out between the first node and the second node; if the requirement is not met, deleting the first node in the local trusted online connection state table, and broadcasting the abnormal information of the first node;
the types of data include general data and urgent data; triggering emergency transmission when the data transmitted by the previous node reaches the upper threshold of the communication channel and the received data is emergency data, wherein the emergency transmission is that the communication channel transmits the data which is not transmitted by the previous node and the emergency data at the same time;
and acquiring the current data type, the current data size and the data which are not transmitted by the previous node, setting the transmission proportion of the data which are not transmitted by the previous node and the emergency data, and carrying out emergency transmission.
2. The data transmission control method according to claim 1, wherein the transmission ratio includes;
if the current data is emergency data, the size of the emergency data is smaller than the size of data which is not transmitted by the previous node, the communication channel transmits the emergency data and the data which is not transmitted by the previous node at the same time, wherein the transmission rates of the emergency data and the data which is not transmitted by the previous node are inversely proportional to the sizes of the emergency data and the data which is not transmitted by the previous node;
if the size of the emergency data is larger than the size of the data which is not transmitted by the previous node, waiting for the transmission of the communication data of the previous node to be completed;
and if the current data is the general data, waiting for the completion of the communication data transmission of the last node.
3. The data transmission control method according to claim 1, characterized by further comprising;
judging the bus before the bus is occupied;
if the bus is dead, resetting the bus;
and if the communication data is congested, waiting to send the communication data when the queue is blocked.
4. A data transmission control method according to claim 3, wherein said waiting for transmission includes;
setting a transmission threshold of the communication channel, and detecting the data transmission quantity of the communication channel at the moment;
when the communication data transmitted by the previous node reaches the upper threshold limit of the communication channel;
and closing the data transmission of the rest nodes, and after the transmission of the previous node is completed, carrying out the data transmission of the next node.
5. The data transmission control method according to claim 4, further comprising;
the transmitting node transmits data to the receiving node, and the receiving node transmits acknowledgement information to the transmitting node after receiving the data;
if the sending node does not receive the confirmation information, the sending node sends the same data again;
and if the transmitting node still does not receive the confirmation information of the receiving node after the second transmission, performing error reporting processing.
6. The data transmission control method according to claim 5, characterized by further comprising;
when receiving error data or not receiving data, the receiving node sends a request for retransmitting the data to the sending node until receiving correct data;
after retransmitting for a certain number of times, packet loss processing is carried out to avoid causing bus blocking.
7. A data transmission control system, comprising;
the node self-checking device is configured to be self-checking of single-node equipment initialization, and comprises a single-board sensor, control information and uplink and downlink data;
the node access device is configured to create a decentralised network, after a first node accesses the network, the node access device reports own node information and announces the existence of the first node to a plurality of other second nodes;
node verification means configured to verify information of a first node, confirming whether the node is trusted;
the node incorporating device is configured to create a local trusted online connection state table, if the node confirms that the node is a trusted node, the other second nodes accept the request of the first node, incorporate the first node into the network and update the local trusted online connection state table;
the node checking device is configured to set a preset requirement of the first node, the second node detects whether the first node meets the preset requirement, if not, the first node is deleted from the local trusted online connection state table, and abnormal information of the first node is broadcasted;
a master control device connected to the node self-checking device, the node access device, the node authentication device, the node inclusion device, and the node check device, and performing a data transmission control method according to any one of claims 1 to 6.
8. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements a data transmission control method according to any one of claims 1-6 when executing the computer program.
9. A computer-readable storage medium, on which a computer program is stored, which computer program, when being executed by a processor, implements a data transmission control method as claimed in any one of claims 1 to 6.
CN202311333884.8A 2023-10-16 2023-10-16 Data transmission control method, system, equipment and medium Active CN117113310B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311333884.8A CN117113310B (en) 2023-10-16 2023-10-16 Data transmission control method, system, equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311333884.8A CN117113310B (en) 2023-10-16 2023-10-16 Data transmission control method, system, equipment and medium

Publications (2)

Publication Number Publication Date
CN117113310A true CN117113310A (en) 2023-11-24
CN117113310B CN117113310B (en) 2024-03-08

Family

ID=88805697

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311333884.8A Active CN117113310B (en) 2023-10-16 2023-10-16 Data transmission control method, system, equipment and medium

Country Status (1)

Country Link
CN (1) CN117113310B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108306893A (en) * 2018-03-05 2018-07-20 北京大学深圳研究生院 A kind of Novel Distributed Intrusion Detection Method and system of ad-hoc network
CN108449720A (en) * 2018-03-12 2018-08-24 武汉大学 A kind of city VANET multi-hop broadcasting methods based on competition and finite state machine
CN109104415A (en) * 2018-07-21 2018-12-28 江苏飞搏软件股份有限公司 Construct the system and method for trusted node network
CN110298660A (en) * 2019-06-13 2019-10-01 广东投盟科技有限公司 Node administration method based on block chain
KR102081159B1 (en) * 2018-11-08 2020-02-25 엔에이치엔 주식회사 A Blockchain system and a method for a plurality of nodes in the Blockchain system to verify and propagate messages
CN112165505A (en) * 2020-08-21 2021-01-01 杭州安恒信息技术股份有限公司 Decentralized data processing method, electronic device and storage medium
US20210021477A1 (en) * 2018-03-27 2021-01-21 Xi'an Zhongxing New Software Co. Ltd Communication Device, Node Connection Method, Storage Medium and Electronic Device
CN113949554A (en) * 2021-10-13 2022-01-18 东南大学 High-speed transmission method for distributed network global situation awareness data
CN116405187A (en) * 2023-04-21 2023-07-07 石家庄铁道大学 Distributed node intrusion situation sensing method based on block chain

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108306893A (en) * 2018-03-05 2018-07-20 北京大学深圳研究生院 A kind of Novel Distributed Intrusion Detection Method and system of ad-hoc network
CN108449720A (en) * 2018-03-12 2018-08-24 武汉大学 A kind of city VANET multi-hop broadcasting methods based on competition and finite state machine
US20210021477A1 (en) * 2018-03-27 2021-01-21 Xi'an Zhongxing New Software Co. Ltd Communication Device, Node Connection Method, Storage Medium and Electronic Device
CN109104415A (en) * 2018-07-21 2018-12-28 江苏飞搏软件股份有限公司 Construct the system and method for trusted node network
KR102081159B1 (en) * 2018-11-08 2020-02-25 엔에이치엔 주식회사 A Blockchain system and a method for a plurality of nodes in the Blockchain system to verify and propagate messages
CN110298660A (en) * 2019-06-13 2019-10-01 广东投盟科技有限公司 Node administration method based on block chain
CN112165505A (en) * 2020-08-21 2021-01-01 杭州安恒信息技术股份有限公司 Decentralized data processing method, electronic device and storage medium
CN113949554A (en) * 2021-10-13 2022-01-18 东南大学 High-speed transmission method for distributed network global situation awareness data
CN116405187A (en) * 2023-04-21 2023-07-07 石家庄铁道大学 Distributed node intrusion situation sensing method based on block chain

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
吴黎兵等: "基于类哈夫曼编码的紧急消息广播方法", 《计算机研究与发展》, no. 11 *
郭彦斐等: "区块链技术在运控系统的应用研究", 《无线互联科技》, no. 19 *

Also Published As

Publication number Publication date
CN117113310B (en) 2024-03-08

Similar Documents

Publication Publication Date Title
JP6362119B2 (en) Arbitration processing method, quorum storage device, and system after cluster brain division
CN100490386C (en) Method for providing guaranteed distributed failure notification
CN107612776B (en) Communication connection detection method and device
US11907046B2 (en) Distributed object identification system and method, and edge computing device
US7760695B2 (en) Methods and systems for centralized cluster management in wireless switch architecture
US20120311670A1 (en) System and method for providing source id spoof protection in an infiniband (ib) network
US10127124B1 (en) Performing fencing operations in multi-node distributed storage systems
US20160080033A1 (en) Physical unidirectional communication apparatus and method
CN104205778A (en) System and method for supporting subnet manager (sm) master negotiation in a network environment
US11409734B2 (en) Blockchain system and operation method thereof
CN110855508B (en) Distributed SDN synchronization method based on blockchain technology
US11063957B2 (en) Method and arrangement for decoupled transmission of data between networks
CN105373891A (en) Smart grid data management and transmission system
US8842524B2 (en) Redundant ring automatic recovery
Correia et al. Worm-IT–a wormhole-based intrusion-tolerant group communication system
CN117113310B (en) Data transmission control method, system, equipment and medium
CN117081861B (en) Intelligent contract data management system based on block chain
CN103139219A (en) Attack detection method of spanning tree protocol based on credible switchboard
US20140204804A1 (en) Method For The Exchange Of Data Between Nodes Of A Server Cluster, And Server Cluster Implementing Said Method
Garcia et al. An intrusion-tolerant firewall design for protecting SIEM systems
CN109347810A (en) A kind of method and apparatus handling message
KR101207219B1 (en) Method for protecting DDS network overload
CN112367373B (en) Node determination method and device for distributed system and storage medium
CN111190754B (en) Block chain event notification method and block chain system
Zhao Towards trustworthy integrated clinical environments

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant