WO2022188596A1 - Procédé et appareil de commande d'accès, procédé et appareil de transfert de données, et dispositif électronique et support de stockage - Google Patents

Procédé et appareil de commande d'accès, procédé et appareil de transfert de données, et dispositif électronique et support de stockage Download PDF

Info

Publication number
WO2022188596A1
WO2022188596A1 PCT/CN2022/076230 CN2022076230W WO2022188596A1 WO 2022188596 A1 WO2022188596 A1 WO 2022188596A1 CN 2022076230 W CN2022076230 W CN 2022076230W WO 2022188596 A1 WO2022188596 A1 WO 2022188596A1
Authority
WO
WIPO (PCT)
Prior art keywords
node
access
client
identifier
accessed
Prior art date
Application number
PCT/CN2022/076230
Other languages
English (en)
Chinese (zh)
Inventor
王光
姜焰
朱敏
Original Assignee
百果园技术(新加坡)有限公司
王光
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 百果园技术(新加坡)有限公司, 王光 filed Critical 百果园技术(新加坡)有限公司
Publication of WO2022188596A1 publication Critical patent/WO2022188596A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • H04L67/1004Server selection for load balancing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/44Star or tree networks

Definitions

  • the present application relates to the field of network information technology, and in particular, to a method, apparatus, electronic device and storage medium for access control and data forwarding.
  • applications based on audio and video real-time communication are more and more widely used, such as webcasting, video conferencing, group chat and other application scenarios.
  • the above application scenarios are all based on the network connection between the mobile client and the back-end access point (ie the server).
  • the quality of the network at the end directly affects the user experience, and has higher requirements on the packet loss rate and delay of the network.
  • the demand for real-time communication between multiple people is getting higher and higher.
  • the real-time communication scenario between multiple people expands the end-to-end link into a mesh from point to point.
  • the choice of the access point (server), the service capacity, load balancing and scalability of the access point (server) all put forward higher requirements.
  • the way for clients to access the access point and data forwarding is as follows: multiple clients in a multi-person call access the same access point, and the audio and video data between the clients are all Forwarding is performed through the only access point.
  • the above method is only suitable for the scenario where the call members are relatively single and the physical distance between the call members is relatively close.
  • the quality is poor and it is not scalable.
  • the upper limit of the number of people connected to the access point is limited by the service capability of the access point.
  • the embodiment of the present application provides an access control and Data forwarding method, device, electronic device and storage medium.
  • an embodiment of the present application provides an access control method, including:
  • the tree-like network node structure in the target access subsystem includes nodes with available resources, select a corresponding access node for the client to be accessed from the current tree-like network node structure , the tree-like network node structure includes at least one layer, each node in the tree-like network node structure is an access point included in the target access subsystem, and each node in the tree-like network node structure Establish a communication connection through a tree structure;
  • each node in the tree-like network node structure in the target access subsystem When it is determined that each node in the tree-like network node structure in the target access subsystem does not have available resources, designate an access point as a new node in the tree-like network node structure, and select the The new node is used as the access node corresponding to the client to be accessed;
  • An access control instruction is sent to the to-be-accessed client to control the to-be-accessed client to access the access node, and the corresponding relationship between the to-be-accessed client identifier and the access node identifier is stored.
  • an access control apparatus including:
  • a receiving unit configured to receive an access request sent by a client, where the access request carries an identifier of the client to be accessed;
  • a selection unit configured to select a corresponding access node for the client to be accessed according to the following steps: selecting a target access subsystem to be accessed by the client to be accessed from the access system, where the access system includes at least one access subsystem; when it is determined that the tree-like network node structure in the target access subsystem includes a node with available resources, select the client to be accessed from the current tree-like network node structure
  • the terminal selects a corresponding access node, the tree-like network node structure includes at least one layer, each node in the tree-like network node structure is an access point included in the target access subsystem, and the network node
  • Each node in the structure establishes a communication connection through a tree-like structure; when it is determined that each node in the tree-like network node structure in the target access subsystem does not have available resources, an access point is designated as the tree a new node in the network node structure, and select the new node as the access node corresponding to the client to be
  • a control unit configured to send an access control instruction to the client to control the client to access the access node corresponding to the client, and store the correspondence between the client identifier and the access node identifier.
  • an embodiment of the present application provides a data forwarding method, which is applied to the tree-like network node structure established in the above access control method, including:
  • the root node in the tree-like network node structure receives a data forwarding request, and the data forwarding request includes the data to be forwarded and a destination client identifier;
  • the data to be forwarded is sent to the node corresponding to the node identifier accessed by the destination client, and the destination client The node corresponding to the node identifier accessed by the destination client sends the to-be-forwarded data to the client corresponding to the destination client identifier;
  • the data to be forwarded is forwarded to the first root node connected to the node identifier corresponding to the node identifier accessed by the destination client , the first root node sends the data to be forwarded to the node corresponding to the node identifier accessed by the destination client, and the node corresponding to the node identifier accessed by the destination client sends the data to be forwarded It is sent to the client corresponding to the destination client identifier.
  • an embodiment of the present application provides a data forwarding device, which is applied to the root node of the tree-like network node structure established in the above access control method, including:
  • a receiving unit configured to receive a data forwarding request, where the data forwarding request includes the data to be forwarded and a destination client identifier;
  • an acquiring unit configured to acquire the correspondence between the client identifier and the access point identifier, and search for the access node identifier corresponding to the destination client identifier from the correspondence between the client identifier and the access node identifier;
  • the first sending unit is configured to send the data to be forwarded to the node corresponding to the node identifier accessed by the destination client when it is determined that the node corresponding to the access node identifier corresponding to the destination client identifier is the root node.
  • the second sending unit is configured to send the data to be forwarded to the node corresponding to the node identifier accessed by the destination client when it is determined that the node corresponding to the access node identifier corresponding to the destination client identifier is a child node.
  • the first root node connected to the node the first root node sends the data to be forwarded to the node corresponding to the node identifier accessed by the destination client, and the node identifier corresponding to the destination client access node
  • the node sends the data to be forwarded to the client corresponding to the destination client identifier.
  • an embodiment of the present application provides an electronic device, including a memory, a processor, and a computer program stored on the memory and executable on the processor, and the processor implements the program when the processor executes the program.
  • the access control method or the data forwarding method described in this application is not limited to this application.
  • an embodiment of the present application provides a computer-readable storage medium on which a computer program is stored, and when the program is executed by a processor, implements the steps in the access control method or the data forwarding method described in the present application.
  • the receiving control terminal selects a corresponding access node for the client to be accessed in the following manner: selecting the access node from the access system
  • the target access subsystem to be accessed by the access client the access system includes at least one access subsystem, when it is determined that there is a node with available resources in the tree-like network node structure in the target access subsystem, from the current In the tree-like network node structure, the corresponding access node is selected for the client to be accessed, wherein the tree-like network node structure includes at least one layer, and each node in the tree-like network node structure includes the target access subsystem Access point, each node in the tree-like network node structure establishes a communication connection through the tree-like structure.
  • an access point is designated. point as a new node in the tree-like network node structure, and select the new node as the access node corresponding to the client to be accessed, and then send an access control instruction to the client to be accessed to control the access to be accessed.
  • the client accesses the access node selected for it, and stores the correspondence between the identifier of the client to be accessed and the identifier of the access node.
  • the access system includes the access node.
  • the access subsystem is not limited by geographical location.
  • the access point is dynamically selected to establish a tree-like network node structure.
  • a new one is added.
  • the access point ensures enough accessible nodes for clients to access, and the tree-like network node structure provides service capabilities that meet the needs, so that the quality of multi-person calls is not good. Limited by physical distance and the number of call members, communication efficiency and user experience are improved.
  • FIG. 1 is a schematic structural diagram of an access control system provided by an embodiment of the present application.
  • FIG. 2 is a schematic diagram of an implementation flow of an access control method provided by an embodiment of the present application
  • FIG. 3 is a schematic structural diagram of an access control apparatus provided by an embodiment of the present application.
  • FIG. 4 is a schematic flowchart of the implementation of the data forwarding method provided by the embodiment of the present application.
  • FIG. 5 is a schematic structural diagram of a data forwarding apparatus provided by an embodiment of the present application.
  • FIG. 6 is a schematic structural diagram of an electronic device provided by an embodiment of the present application.
  • the embodiment of the present application provides an access control and Data forwarding method, device, electronic device and storage medium.
  • FIG. 1 is a schematic structural diagram of an access control system provided by an embodiment of the present application, which may include an access control terminal and an access system, and the access system includes at least one access subsystem.
  • Each access subsystem included in the access system can be an independent computer room, and the geographic location of each access subsystem can be located in different countries on the earth, or can be located in the same Different regions of a country are not limited in this embodiment of the present application.
  • Each access subsystem includes multiple access points, and the access points can be servers for forwarding data, such as communication data between clients during a multi-person audio and video conference. The data may include, but is not limited to, audio data, video data, and the like.
  • the access control terminal may be a quality detection system, and the instruction detection system may be implemented on a server.
  • the quality detection system may detect that the client has The network quality between the access points of the access subsystem selects an optimal access subsystem for the client.
  • the quality detection system instructs each access subsystem to create an access network according to the number of requesting access clients, and the access network structure in each access subsystem is a tree-like network node structure. The nodes establish a two-way communication connection through the tree structure.
  • Each new node added to the tree network node structure means that the number of clients connected to each node in the existing tree network node structure reaches the online level (that is, each node has no available resources), a two-way communication connection is established between the root node in the tree-like network node structure in each access subsystem and the root node in the tree-like network node structure in other access subsystems, to Data can be transmitted between each access subsystem through their respective root nodes.
  • the server may be an independent physical server, or a cloud server that provides basic cloud computing services such as cloud servers, cloud databases, and cloud storage.
  • the client can be, but is not limited to, a smart phone, a tablet computer, a notebook computer, a desktop computer, etc., which is not limited in this embodiment of the present application.
  • FIG. 2 it is a schematic diagram of the implementation flow of the access control method provided by the embodiment of the present application.
  • the access control method can be applied to the above-mentioned access control terminal.
  • the access control terminal uses the quality
  • the control system is used as an example to illustrate, which may include the following steps:
  • S11 Receive an access request sent by a client, where the access request carries an identifier of the client to be accessed.
  • the quality control system receives an access request sent by a client, where the access request carries the identifier of the client to be accessed, and the client to be accessed includes the client that sent the access request, which is recorded as the source client , the client to be accessed may also include the destination client that the source client requests for communication. If the client to be accessed also includes the destination client, the quality control system queries the access node identifier corresponding to the destination client identifier from the locally stored correspondence between the client identifier and the access node identifier. The corresponding access node identifier indicates that the destination client has accessed the target access node. If the access node corresponding to the destination client identifier is not queried, no matter whether the client to be accessed is the source client or the destination client, Select the corresponding access node for the client to be accessed according to steps S12 to S14:
  • the quality control system selects a target access subsystem to be accessed by the client to be accessed from the access system, and the access system includes at least one access subsystem.
  • the quality control system stores the access point (that is, the server) identifier and IP (Internet Protocol, Internet Protocol) address information contained in each access subsystem in the access system, and the quality control system returns each access point to the client to be accessed.
  • the access point identifier and IP address information are specified in the access subsystem, and the client sends a detection packet to the designated access point in each access subsystem according to the access point identifier and IP address information specified in each access subsystem, and obtains corresponding detection results, and send each detection result to the quality control system, and the quality control system selects a target access subsystem to be accessed for the client to be accessed according to the detection result, wherein the detection result includes the client to be accessed.
  • the terminal sends information such as the delay and packet loss rate of the probe packet to the designated access point.
  • the target access subsystem is the client to be accessed and the designated access client determined by the quality control system according to the delay and packet loss rate of the probe packet sent.
  • the quality detection system selects the client to be accessed from the current tree-like network node structure
  • the terminal selects a corresponding access node
  • the tree-like network node structure includes at least one layer
  • each node in the tree-like network node structure is an access point included in the target access subsystem
  • the network node Each node in the structure establishes a bidirectional communication connection through the tree structure.
  • the highest level node of the current tree network node structure when it is determined that the highest level node of the current tree network node structure has available resources, the highest level node is selected as the access node corresponding to the client to be accessed, the highest level node is the root node, and other level nodes are the root The child node of the node; when it is determined that the highest-level node does not have available resources, select a node with available resources from the child nodes of the root node in the order from high to low as the access node corresponding to the client to be accessed. .
  • the tree-like network node structure in the target access subsystem is established node by node according to the number of client accesses. Initially, when it is determined that the tree-like network structure has not been established in the target access subsystem, an access point is designated as the root node of the tree-like network structure, and the root node is the highest level node of the tree-like network structure.
  • the number of accessed clients When the number of accessed clients is equal to the first preset threshold, specify an access point as the first child node of the next level of the root node, until the number of clients accessed by the child node is equal to the second preset threshold , designate an access point as the second child node of the level, and so on, until the number of child nodes contained in the current level is equal to the set value, and the clients connected to the root node and the child nodes of the current level are all available.
  • the upper limit is accessed, another access point is designated as the child node of the next level of the current level, and when the number of levels of the tree-like network node structure established is equal to the third preset threshold, the establishment of the next level is not continued. child node.
  • the first preset threshold, the second preset threshold, and the third preset threshold can be set according to the actual situation, and the first preset threshold can be set to the same value as the second preset threshold.
  • the first preset threshold can be set to the same value as the second preset threshold.
  • the preset threshold and the second preset threshold are both 10, and the third preset threshold is set to 3, which is not limited in this embodiment of the present application.
  • the root node of the tree-like network structure in the target access subsystem when it is determined that the number of clients currently accessed by the root node of the tree-like network structure in the target access subsystem is less than the first preset threshold, it is determined that the root node has available resources, and the root node is selected as the to-be-connected The access node corresponding to the client.
  • the root node When it is determined that the number of clients currently accessed by the root node is equal to the first preset threshold, and it is determined that there are no available resources at the root node, select a client that is accessed from the child nodes of the root node in descending order of hierarchy. Nodes whose number is less than the second preset threshold are used as access nodes corresponding to the client to be accessed.
  • each node in the tree-like network node structure in the target access subsystem does not have available resources, designate an access point as a new node in the tree-like network node structure, and The new node is selected as the access node corresponding to the client to be accessed.
  • the quality detection system designates an access point as the next level of the root node.
  • the number of child nodes of the current level is less than the set upper limit value corresponding to the current level, and there are no available resources in the root node and each child node.
  • an access point When it is determined that an access point is used as a child node of the current level; when it is determined that the number of child nodes of the current level is equal to the set upper limit value corresponding to the current level, and there are no available resources in the root node and each child node is specified, an access point is designated as the child node of the next level of the child node of the current level.
  • the quality detection system determines that the root node does not exist resource, a new access point is designated as a child node of the next level of the root node, for example, the first child node 1_1 of the next level of the root node 1 in the access subsystem 1 of FIG. 1 .
  • the quality detection system presets the upper limit of the number of sub-nodes that can be connected at each level, and can count and store the total number of sub-nodes that can be connected at most at each level according to the number of sub-nodes that can be connected to each node.
  • the upper limit of the number of child nodes that can be connected to a node is set to N
  • the upper limit of the number of child nodes that can be connected to the next level of the 0th level (ie the highest level), that is, the first level is N
  • the first level contains N child nodes
  • the number of child nodes of the next level that can be connected to each child node is N
  • the next level is the upper limit of the number of child nodes that can be connected to the second level
  • the quality detection system determines that the current tree-like network node structure in the target access subsystem includes a root node and child nodes, and the number of child nodes of the current level is less than the set upper limit value corresponding to the current level, and the root node is currently connected
  • the number of clients connected to the node is equal to the first preset threshold
  • the number of clients currently accessed by each child node is equal to the second preset threshold
  • a new access point is designated as a child node of the current level.
  • the first preset threshold and the second preset threshold are both set to 10 as an example for description.
  • Root node 1 currently includes two levels, and the number of corresponding child nodes of the first level is equal to The upper limit is set to 10, the number of clients currently connected to root node 1 is 10, the sub-nodes of the current level include: 1_1 and 1_2, and the number of clients currently connected to sub-nodes 1_1 and 1_2 are both 10. That is to say, root node 1 and child nodes 1_1 and 1_2 have no available resources, and the number of child nodes of the first level is 2, which is less than the set upper limit of 10, then a new access point is designated as the child node of the first level : 1_3.
  • the quality detection system determines that the number of child nodes at the current level is equal to the set upper limit value corresponding to the current level, and the number of clients currently accessed by the root node is equal to the first preset threshold, the number of clients currently accessed by each child node is When both are equal to the second preset threshold, a new access point is designated as the child node of the next level of the child node of the current level.
  • the current level of child nodes includes 10: 1_1 to 1_10, and the number of clients currently connected to child nodes 1_1 to 1_10 is 10.
  • the root node 1 and the child nodes 1_1 to 1_10 have no available resources, and the number of the child nodes of the first level reaches the set upper limit of 10, then a new access point is designated as the child node of the second level: 1_1_1.
  • the link paths between the clients connecting the sub-nodes will cause the server to process the link paths due to the increase in the number of transit nodes (ie, transit servers).
  • the increase of the delay may affect the experience of the corresponding user. Therefore, an upper limit is imposed on the number of layers of the tree-like network node structure.
  • the quality detection system specifies an access point As a new root node to establish a new tree-like network node structure.
  • the third preset threshold may be set by itself as required, for example, may be set to 3, which is not limited in this embodiment of the present application.
  • the quality detection system indicates that the newly established root node is in the access subsystem of other established root nodes in the access system.
  • the root node establishes a two-way communication connection.
  • access subsystem 1 is the first access subsystem to establish a root node
  • access subsystem 2 is the second access subsystem to establish a root node
  • access subsystem 3 is the last to establish a root node.
  • the access subsystem of the root node can record the tree-like network node structure in different access subsystems according to the order in which the root node is added.
  • the root node 1 in the access subsystem 1 can be recorded as LEVEL0, and the The root node 2 in the access subsystem 2 is denoted as LEVEL1, and the root node 3 in the access subsystem 3 is denoted as LEVEL2, wherein LEVEL0, LEVEL1, and LEVEL2 represent that the root node 1, the root node 2, and the root node 3 join
  • the quality detection system designates the root node 2 of the access subsystem 2
  • it instructs the root node 2 to establish a communication connection with the root node 1
  • the quality detection system designates the root node 3 of the access system 3
  • the quality detection system designates the root node M of the Mth access subsystem, it indicates the root node M and the first M-1 access subsystems.
  • the root nodes establish communication connections respectively. If an access subsystem includes multiple root nodes, communication connections can be established between the root nodes.
  • each root node in different access subsystems can maintain communication continuity by sending heartbeat packets.
  • each root node can exit the network as follows:
  • each root node is controlled to exit the current network one by one in the reverse order of establishment.
  • S15 Send an access control instruction to the to-be-accessed client to control the to-be-accessed client to access the access node, and store the correspondence between the to-be-accessed client identifier and the access node identifier relation.
  • the quality detection system sends an access control instruction to the client to be accessed, and the access control instruction includes the identifier of the node to be accessed and IP address information, and the client to access receives the access sent by the quality detection system.
  • the access control instruction After entering the control instruction, access the access node selected by the quality detection system according to the identity and IP address of the node to be accessed, and return an access success response message to the quality detection system, and the quality detection system stores the client identity and the access node. Correspondence of node IDs.
  • the present application since two-way communication connection is performed between nodes, and each node can access the client, that is, each client has the ability to connect to the microphone, therefore, the present application is not only applicable to the live broadcast mode, but also It is suitable for conference or group chat mode where many people are on the microphone at the same time, and the scope of application is wider.
  • the access points of the computer rooms in different regions of the world can be organized in the form of a combination of tree and mesh, which has strong horizontal and vertical expansion capabilities.
  • horizontal expansion has global expansion capability.
  • each continent establishes a communication connection through the root node selected by each continent, and each continent can expand vertically by establishing a tree-like network node structure in the computer room selected by each continent.
  • the upper limit of vertical expansion only depends on the access point in the computer room (ie During the conference, access points can be dynamically added or deleted according to the number of online clients, and in the embodiment of the present application, the number of clients that can be accessed by each node and the number of clients that can be connected to each node The number of sub-nodes at the next level is limited. When the upper limit is reached, new access points will be expanded, so that a single access point will not become a bottleneck for expansion.
  • the receiving control terminal selects the corresponding access node for the client to be accessed in the following manner:
  • the target access subsystem to be accessed by the client to be accessed is selected, and the access system includes at least one access subsystem.
  • each node in the tree-like network node structure When it is determined that there are available resources in the tree-like network node structure in the target access subsystem When the node is connected, select the corresponding access node for the client to be accessed from the current tree-like network node structure, wherein the tree-like network node structure includes at least one layer, and each node in the tree-like network node structure is targeted to connect Access points included in the sub-system, each node in the tree-like network node structure establishes a communication connection through the tree-like structure, when it is determined that each node in the tree-like network node structure in the target access system does not have available resources , then designate an access point as a new node in the tree-like network node structure, and select the new node as the access node corresponding to the client to be accessed, and then send an access control instruction to the client to be accessed , to control the access node to be accessed by the client to be accessed, and store the corresponding relationship between the identifier of
  • the access subsystem included in the access system is not limited by geographical location.
  • the access point is dynamically selected to establish a tree-like network node structure.
  • a new access point is added as a new node in the current tree-like network node structure to ensure enough accessible nodes for client access, and the tree-like network node structure provides service capabilities that meet the needs.
  • the quality of multi-person calls is not limited by physical distance and the number of call members, which improves communication efficiency and user experience.
  • an embodiment of the present application also provides an access control apparatus. Since the above-mentioned access control apparatus solves the problem in a similar manner to the access control method, the implementation of the above-mentioned apparatus can refer to the implementation of the method, and the repetitions are repeated. No longer.
  • FIG. 3 is a schematic structural diagram of an access control apparatus provided by an embodiment of the present application, which may include:
  • a receiving unit 21 configured to receive an access request sent by a client, where the access request carries an identifier of the client to be accessed;
  • the selection unit 22 is configured to select a corresponding access node for the client to be accessed according to the following steps: selecting a target access subsystem to be accessed by the client to be accessed from the access system, the access system At least one access subsystem is included; when it is determined that the tree-like network node structure in the target access subsystem includes nodes with available resources, the to-be-accessed node is selected from the current tree-like network node structure
  • the client selects a corresponding access node, the tree-like network node structure includes at least one layer, each node in the tree-like network node structure is an access point included in the target access subsystem, and the network Each node in the node structure establishes a communication connection through a tree structure; when it is determined that each node in the tree network node structure in the target access subsystem does not have available resources, an access point is designated as the a new node in the tree-like network node structure, and selecting the new node as the access node corresponding to the client to be accessed
  • a control unit 23 configured to send an access control instruction to the client to control the client to access the access node corresponding to the client, and store the correspondence between the client identifier and the access node identifier .
  • the selection unit 22 is specifically configured to select the highest-level node as the access corresponding to the client to be accessed when it is determined that the highest-level node of the tree-like network node structure has available resources.
  • node the highest-level node is the root node, and other hierarchical nodes are child nodes of the root node; when it is determined that the highest-level node does not have available resources, the order from high to low levels is from the root node.
  • a node with available resources is selected from among the child nodes of the node as the access node corresponding to the client to be accessed.
  • the device further includes:
  • a designating unit configured to designate an access point as the access point when it is determined that the tree-like network structure has not been established in the target access subsystem before selecting the corresponding access node for the to-be-accessed client the root node of the tree-like network structure;
  • the selection unit 22 is specifically configured to designate an access point as the next level of the root node when it is determined that the tree-like network node structure only includes the root node and the root node does not have available resources child nodes; when it is determined that the tree network node structure includes a root node and child nodes, the number of child nodes of the current level is less than the set upper limit value corresponding to the current level, and the root node and each child node are in the When there are no available resources, an access point is designated as a child node of the current level; when it is determined that the number of child nodes of the current level is equal to the set upper limit value corresponding to the current level, and the root node and each child node are When there is no available resource in the nodes, an access point is designated as the child node of the next level of the child node of the current level.
  • the selection unit 22 is specifically configured to determine that the root node does not have available resources in the following manner: when it is determined that the number of clients currently accessed by the root node is equal to a first preset threshold, determine the The root node does not have available resources; determine that any child node has no available resources in the following manner: when it is determined that the number of clients currently accessed by any child node is equal to the second preset threshold, determine that any child node does not have available resources. Available resources exist.
  • the specifying unit is further configured to determine that the number of levels of the tree-like network node structure is equal to a third preset threshold, and the number of child nodes of the lowest level is equal to the setting corresponding to the lowest level.
  • a third preset threshold When the limit is exceeded, an access point is designated as a new root node to establish a new tree-like network node structure.
  • two-way communication connection is performed between each node in the tree-like network node structure; two-way communication is established between the access subsystems in the tree-like network node structure established by the access system through their respective root nodes. connect.
  • control unit 23 is further configured to, when it is determined that the root node in the access subsystem in which the access system has established a tree-like network node structure needs to exit the current network, control each root node to follow the establishment sequence.
  • the reverse order exits the current network one by one.
  • FIG. 4 is a schematic flowchart of the implementation of the data forwarding method provided by the embodiment of the present application, which is applied to the tree-like network node structure established in the above-mentioned access control method provided by the embodiment of the present application.
  • the data forwarding method The following steps can be included:
  • the root node in the tree-like network node structure receives a data forwarding request, where the data forwarding request includes the data to be forwarded and a destination client identifier.
  • the root node of the tree-like network node structure in any access subsystem in the access control system receives a data forwarding request, where the data forwarding request is sent by a client accessing the root node, or is The client that accesses any child node of the root node sends the message to any child node and forwards it to the root node.
  • S32 Acquire the correspondence between the client identifier and the access point identifier, and search for the access node identifier corresponding to the target client identifier from the correspondence between the client identifier and the access node identifier.
  • the root node obtains the correspondence between the client identifier and the access node identifier from the access control terminal (quality detection system), and searches for the destination client identifier from the correspondence between the client identifier and the access node identifier.
  • the corresponding access node identifier that is, the node identifier accessed by the destination client.
  • the root node that receives the data forwarding request sends the data to be forwarded to the root node accessed by the destination client, and the client receives the data to be forwarded.
  • the incoming root node directly forwards the data to be forwarded to the destination client.
  • the root node that receives the data forwarding request directly sends the data to be forwarded to the destination client.
  • the root node that receives the data forwarding request sends the data to be forwarded to the root node connected to the child node accessed by the destination client.
  • the first root node forwards the data to be forwarded to the child node accessed by the destination client, and then the child node accessed by the destination client sends the data to be forwarded to the destination client.
  • the root nodes in different access subsystems will only send the data to be forwarded to the lower-level child nodes connected to the root node, and will not directly send it to other nodes.
  • the subordinate child nodes of the root node are forwarded through the connected root node.
  • the node accessed by the client that initiates the data forwarding request is the child node 1_1_1 in the tree-like network node structure in the access subsystem 1, and the node accessed by the destination client is the access subsystem 3.
  • the data forwarding path may be as follows: the client initiates a data forwarding request to the child node 1_1_1 to which it is connected, and the child node 1_1_1 forwards the data forwarding request to the upper-level child node 1_1 to which it is connected , the child node 1_1 sends the data forwarding request to the connected root node 1, the root node 1 extracts the data to be forwarded from the data forwarding request, and forwards the to-be-forwarded data to the root node 3 in the access subsystem 3, and the root node 3
  • the data to be forwarded is sent to its next-level child node 3_1, the child node 3_1 sends the to-be-forwarded data to its next-level child node 3_1_1, and the child node 3_1_1 sends the to-be-forwarded data to the destination client.
  • the root nodes of the cross-access subsystem can logically send data directly, they can also be transferred at the bottom layer through the third or more root nodes of the access subsystem.
  • Set the routing policy to set the specific path for forwarding.
  • the root node 1 in the process of sending the data to be forwarded from the root node 1 in the access subsystem 1 to the root node 3 in the access system 3, the root node 1 can also send the data to be forwarded to the root node 2, and then the root node 1 sends the data to be forwarded to the root node 2.
  • the root node 2 sends the data to be forwarded to the root node 3.
  • an embodiment of the present application also provides a data forwarding device. Since the principle of solving the problem of the above-mentioned data forwarding device is similar to that of the data forwarding method, the implementation of the above-mentioned device can refer to the implementation of the method, and the repetition will not be repeated. .
  • the data forwarding apparatus is applied to the root node of the tree-like network node structure established in the above access control method, and may include:
  • a receiving unit 41 configured to receive a data forwarding request, where the data forwarding request includes the data to be forwarded and a destination client identifier;
  • an obtaining unit 42 configured to obtain the correspondence between the client identifier and the access point identifier, and search for the access node identifier corresponding to the destination client identifier from the correspondence between the client identifier and the access node identifier;
  • the first sending unit 43 is configured to, when it is determined that the node corresponding to the access node identifier corresponding to the destination client identifier is the root node, send the data to be forwarded to the node identifier corresponding to the destination client access.
  • the node the node corresponding to the node identifier accessed by the destination client sends the data to be forwarded to the client corresponding to the destination client identifier;
  • the second sending unit 44 is configured to, when it is determined that the node corresponding to the access node identifier corresponding to the destination client identifier is a child node, send the to-be-forwarded data to the node identifier corresponding to the destination client access.
  • the first root node connected to the node the first root node sends the data to be forwarded to the node corresponding to the node identifier accessed by the destination client, and the node identifier accessed by the destination client corresponds to The node sends the data to be forwarded to the client corresponding to the destination client identifier.
  • the data forwarding request is sent by a client accessing the root node, or sent by a client accessing any sub-node of the root node to any sub-node and then forwarded to any sub-node. of the root node.
  • an embodiment of the present application further provides an electronic device 500.
  • the electronic device 500 is configured to implement the access control method described in the foregoing method embodiments.
  • the electronic device 500 in this embodiment may include : a memory 501, a processor 502, and a computer program stored in the memory and executable on the processor, such as an access control program.
  • the steps in each of the foregoing embodiments of the access control method or the data forwarding method are implemented, for example, step S11 shown in FIG. 2 .
  • the processor executes the computer program
  • the functions of the modules/units in the foregoing device embodiments are implemented, for example, 21.
  • the specific connection medium between the above-mentioned memory 501 and the processor 502 is not limited in this embodiment of the present application.
  • the memory 501 and the processor 502 are connected by a bus 503 in FIG. 6 , and the bus 503 is represented by a thick line in FIG. 6 .
  • the bus 503 can be divided into an address bus, a data bus, a control bus, and the like. For ease of presentation, only one thick line is used in FIG. 6, but it does not mean that there is only one bus or one type of bus.
  • the memory 501 may be a volatile memory (volatile memory), such as random-access memory (RAM); the memory 501 may also be a non-volatile memory (non-volatile memory), such as read-only memory, flash memory A flash memory, hard disk drive (HDD) or solid-state drive (SSD), or memory 501 is a device that can be used to carry or store desired program code in the form of instructions or data structures and can be accessed by Any other medium accessed by the computer, but not limited to this.
  • the memory 501 may be a combination of the above-mentioned memories.
  • the processor 502 is configured to implement an access control method as shown in FIG. 2, including:
  • the processor 502 is configured to call the computer program stored in the memory 501 to perform step S11 as shown in FIG. 2 , and receive an access request sent by the client, where the access request carries the client to be accessed
  • the target access subsystem to be accessed by the client to be accessed is selected from the access system, the access system includes at least one access subsystem, and step S13, when the target access subsystem is determined
  • the tree-like network node structure in the system includes a node with available resources, select a corresponding access node for the client to be accessed from the current tree-like network node structure, step S14, when it is determined that the
  • step S15 sending an access control instruction to the client to be accessed to control the client to access the access node
  • the processor 502 is configured to implement a data forwarding method as shown in FIG. 4 , including:
  • the processor 502 is configured to invoke the computer program stored in the memory 501 to execute step S31 as shown in FIG. 4 , the root node in the tree-like network node structure receives a data forwarding request, and the data forwarding request includes: The data to be forwarded and the destination client identifier, step S32, obtain the corresponding relationship between the client identifier and the access point identifier, and search for the destination client identifier corresponding to the corresponding relationship between the client identifier and the access node identifier.
  • the access node identifier when it is determined that the node corresponding to the access node identifier corresponding to the destination client identifier is the root node, then the data to be forwarded is sent to the node identifier corresponding to the destination client access.
  • the node corresponding to the node identifier accessed by the destination client sends the data to be forwarded to the client corresponding to the destination client identifier, and in step S34, when determining the destination client identifier
  • the data to be forwarded is forwarded to the first root node connected to the node corresponding to the node identifier accessed by the destination client, and the first root node is connected by the first root node.
  • Embodiments of the present application further provide a computer-readable storage medium, which stores computer-executable instructions to be executed by the above-mentioned processor, and includes a program to be executed by the above-mentioned processor.
  • various aspects of the access control method provided by the present application can also be implemented in the form of a program product, which includes program codes, and when the program product runs on an electronic device, the program The code is used to cause the electronic device to execute the steps in the access control method according to various exemplary embodiments of the present application described above in this specification.
  • the electronic device may execute steps S11, Receive an access request sent by the client, where the access request carries the identifier of the client to be accessed, step S12, select a target access subsystem to be accessed by the client to be accessed from the access system, and the access
  • the access system includes at least one access subsystem, and in step S13, when it is determined that the tree-like network node structure in the target access subsystem includes nodes with available resources, from the current tree-like network node structure as The to-be-accessed client selects a corresponding access node, and in step S14, when it is determined that each node in the tree-like network node structure in the target access subsystem does not have available resources, specify an access point as a new node in the tree-like network node structure, and select the new node as the access node corresponding to the client to be accessed, and step S15: send access to the client to be accessed
  • a control instruction is used to control the client to be accessed to access the access node, and to store
  • various aspects of the data forwarding method provided by this application can also be implemented in the form of a program product, which includes program code, and when the program product runs on an electronic device, the program code For causing the electronic device to perform the steps in the data forwarding method according to various exemplary embodiments of the present application described above in this specification, for example, the electronic device may perform step S31 as shown in FIG.
  • the root node in the network node structure receives the data forwarding request, and the data forwarding request includes the data to be forwarded and the destination client identifier.
  • Step S32 Obtain the correspondence between the client identifier and the access point identifier, and send the request from the client Searching for the access node identifier corresponding to the target client identifier in the corresponding relationship between the identifier and the access node identifier, step S33, when it is determined that the node corresponding to the access node identifier corresponding to the destination client identifier is the root node, then Send the data to be forwarded to the node corresponding to the node identifier accessed by the destination client, and send the data to be forwarded to the destination client by the node corresponding to the node identifier accessed by the destination client and step S34, when it is determined that the node corresponding to the access node identifier corresponding to the destination client identifier is a child node, then forward the data to be forwarded to the destination client access point.
  • the first root node to which the node corresponding to the node identifier is connected the first root node sends the to-be-forwarded data to the node corresponding to the node identifier accessed by the destination client, and the node identified by the destination client accesses the node.
  • the node corresponding to the node identifier sends the data to be forwarded to the client corresponding to the destination client identifier.
  • the embodiments of the present application may be provided as a method, an apparatus, or a computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.
  • computer-usable storage media including, but not limited to, disk storage, CD-ROM, optical storage, etc.
  • These computer program instructions may also be stored in a computer-readable memory capable of directing a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory result in an article of manufacture comprising instruction means, the instructions
  • the apparatus implements the functions specified in the flow or flow of the flowcharts and/or the block or blocks of the block diagrams.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

La présente invention concerne un procédé et un appareil de commande d'accès, un procédé et un appareil de transfert de données, et un dispositif électronique et un support de stockage. Le procédé de commande d'accès comprend les étapes consistant à : recevoir une demande d'accès envoyée par un client ; sélectionner, dans un système d'accès, un sous-système d'accès cible auquel un client accédant doit accéder ; lorsqu'il est déterminé qu'une structure arborescente de nœuds de réseau dans le sous-système d'accès cible comprend un nœud ayant une ressource disponible, sélectionner, dans la structure arborescente de nœuds de réseau actuelle, un nœud d'accès correspondant pour le client accédant, chaque nœud dans la structure de nœuds de réseau établissant une connexion de communication au moyen d'une structure arborescente ; lorsqu'il est déterminé que chaque nœud dans la structure arborescente de nœuds de réseau dans le sous-système d'accès cible n'a aucune ressource disponible, spécifier un point d'accès comme nouveau nœud dans la structure arborescente de nœuds de réseau, et sélectionner le nouveau nœud comme nœud d'accès correspondant au client accédant ; et envoyer une instruction de commande d'accès au client accédant, de façon à commander l'accès du client accédant au nœud d'accès, et stocker la corrélation entre un identifiant du client accédant et un identifiant du nœud d'accès.
PCT/CN2022/076230 2021-03-09 2022-02-14 Procédé et appareil de commande d'accès, procédé et appareil de transfert de données, et dispositif électronique et support de stockage WO2022188596A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110255660.4 2021-03-09
CN202110255660.4A CN113055457B (zh) 2021-03-09 2021-03-09 接入控制与数据转发方法、装置、电子设备及存储介质

Publications (1)

Publication Number Publication Date
WO2022188596A1 true WO2022188596A1 (fr) 2022-09-15

Family

ID=76510869

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/076230 WO2022188596A1 (fr) 2021-03-09 2022-02-14 Procédé et appareil de commande d'accès, procédé et appareil de transfert de données, et dispositif électronique et support de stockage

Country Status (2)

Country Link
CN (1) CN113055457B (fr)
WO (1) WO2022188596A1 (fr)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113055457B (zh) * 2021-03-09 2024-01-09 百果园技术(新加坡)有限公司 接入控制与数据转发方法、装置、电子设备及存储介质
CN114727338B (zh) * 2022-06-09 2022-09-13 杭州纵横通信股份有限公司 无线通信系统的链路建立方法

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101102283A (zh) * 2007-08-17 2008-01-09 杭州华三通信技术有限公司 一种在无线接入点上优化未知单播转发的方法及设备
CN103813288A (zh) * 2012-11-06 2014-05-21 中兴通讯股份有限公司 基于移动网络的租户网络业务实现方法、系统及网元
CN110620896A (zh) * 2019-08-28 2019-12-27 视联动力信息技术股份有限公司 一种会议建立方法、系统及装置
CN113055457A (zh) * 2021-03-09 2021-06-29 百果园技术(新加坡)有限公司 接入控制与数据转发方法、装置、电子设备及存储介质

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100425024C (zh) * 2004-07-06 2008-10-08 北京航空航天大学 IPv6因特网网络拓扑自动发现方法
CN101114928B (zh) * 2006-07-24 2011-04-20 华为技术有限公司 一种实现负载均衡的系统及方法
CN101119252B (zh) * 2006-08-01 2010-05-19 华为技术有限公司 接入网络系统、接入装置、arp代理方法和ip桥接转发方法
US7903615B2 (en) * 2006-10-10 2011-03-08 Qualcomm Incorporated Space division multiple access channelization in wireless communication systems
CN100461740C (zh) * 2007-06-05 2009-02-11 华为技术有限公司 一种客户端节点网络拓扑构造方法及流媒体分发系统
CN101389128B (zh) * 2007-09-10 2012-02-29 中兴通讯股份有限公司 一种用户终端通过无线中继接入网络的方法
US8537720B2 (en) * 2010-03-26 2013-09-17 Cisco Technology, Inc. Aggregating data traffic from access domains
US20130091212A1 (en) * 2011-10-08 2013-04-11 Broadcom Corporation Social network device communication resource allocation
WO2014127433A1 (fr) * 2013-02-25 2014-08-28 Stubbs Margot Système de commande
CN103974310B (zh) * 2014-05-08 2017-06-06 江苏中科羿链通信技术有限公司 无线通信多跳网络设备的树状拓扑构建方法、装置和系统
CN104540185B (zh) * 2014-12-15 2019-02-05 上海华为技术有限公司 一种接入网络的方法、接入网关及接入控制设备
EP3355522B1 (fr) * 2017-01-26 2019-04-03 Deutsche Telekom AG Système d'agrégation d'accès et client de liaison
CN110166268B (zh) * 2018-02-13 2021-04-06 电信科学技术研究院有限公司 一种无线回程网络的通信方法及装置
CN208400296U (zh) * 2018-05-24 2019-01-18 榆林学院 一种水族箱wifi控制装置
CN109495889B (zh) * 2018-12-20 2022-01-04 中山大学新华学院 基于互信机制的异构移动网络访问控制方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101102283A (zh) * 2007-08-17 2008-01-09 杭州华三通信技术有限公司 一种在无线接入点上优化未知单播转发的方法及设备
CN103813288A (zh) * 2012-11-06 2014-05-21 中兴通讯股份有限公司 基于移动网络的租户网络业务实现方法、系统及网元
CN110620896A (zh) * 2019-08-28 2019-12-27 视联动力信息技术股份有限公司 一种会议建立方法、系统及装置
CN113055457A (zh) * 2021-03-09 2021-06-29 百果园技术(新加坡)有限公司 接入控制与数据转发方法、装置、电子设备及存储介质

Also Published As

Publication number Publication date
CN113055457A (zh) 2021-06-29
CN113055457B (zh) 2024-01-09

Similar Documents

Publication Publication Date Title
WO2022188596A1 (fr) Procédé et appareil de commande d'accès, procédé et appareil de transfert de données, et dispositif électronique et support de stockage
US9838333B2 (en) Software-defined information centric network (ICN)
US8756296B2 (en) Method, device and system for distributing file data
US7552233B2 (en) System and method for information object routing in computer networks
US8612621B2 (en) Method for constructing network topology, and streaming delivery system
WO2008034353A1 (fr) Procédé, système et dispositif permettant d'établir une connexion entre homologues dans un réseau d'homologues
US9407687B2 (en) Method, apparatus, and network system for acquiring content
WO2011113289A1 (fr) Procédé de routage de services et réseau de services
WO2009155802A1 (fr) Procédé, système, entité de sélection de service et entité de gestion de service pour sélectionner une entité de fourniture de service
CN104509073A (zh) 在软件定义的网络中发现ip多播组成员
WO2010105505A1 (fr) Procédé, noeud utilisateur et serveur permettant de demander des informations de position sur un réseau
WO2006131037A1 (fr) Systeme et procede de communication de donnees
WO2010127618A1 (fr) Système et procédé de mise en oeuvre de service de diffusion en continu de contenu multimédia
US20220131935A1 (en) Service Unit Switching Method, System, and Device
WO2023155617A1 (fr) Procédé et appareil d'extraction d'origine de flux continu en direct
US20140019549A1 (en) Control System for Conferencing Applications in Named-Data Networks
WO2009127132A1 (fr) Procédé, dispositif et système de distribution de messages
WO2011069387A1 (fr) Nœud de réseau, procédé permettant une requête de données et procédé permettant une mise à jour d'index de ce dernier
CN103401953B (zh) 一种基于双层结构的端到端的语音通信节点寻址方法
WO2014161460A1 (fr) Procédé de session, nœud de réseau, serveur, système et support de stockage d'ordinateur
CN106357539A (zh) 一种数据获取方法和设备
CN112398902A (zh) 高可用负载均衡方法、系统及计算机可读存储介质
CN104065914A (zh) 一种无线终端视频会议系统、实现方法和装置
WO2013091343A1 (fr) Procédé d'acquisition de contenu, dispositif et système de réseau
CN111866438B (zh) 用户体验驱动的多方视频会议的转码和组播路由方法及装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22766122

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 22766122

Country of ref document: EP

Kind code of ref document: A1