WO2023207567A1 - Network service method, master node, sub-node and computer-readable medium - Google Patents

Network service method, master node, sub-node and computer-readable medium Download PDF

Info

Publication number
WO2023207567A1
WO2023207567A1 PCT/CN2023/087346 CN2023087346W WO2023207567A1 WO 2023207567 A1 WO2023207567 A1 WO 2023207567A1 CN 2023087346 W CN2023087346 W CN 2023087346W WO 2023207567 A1 WO2023207567 A1 WO 2023207567A1
Authority
WO
WIPO (PCT)
Prior art keywords
node
sub
network
master node
target
Prior art date
Application number
PCT/CN2023/087346
Other languages
French (fr)
Chinese (zh)
Inventor
司可宁
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2023207567A1 publication Critical patent/WO2023207567A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0813Configuration setting characterised by the conditions triggering a change of settings
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0823Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/12Discovery or management of network topologies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • H04L67/1004Server selection for load balancing
    • H04L67/101Server selection for load balancing based on network conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • H04L67/1029Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers using data related to the state of servers by a load balancer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

Provided in the present disclosure is a network service method. The method is applied to a master node of a mesh network. The method comprises: acquiring performance information of each sub-node in a mesh network (S101); allocating a network resource to at least one sub-node at least according to the performance information (S102); acquiring a resource request of a client, and determining a target sub-node where a target network resource is located (S103), wherein the resource request is used for requesting the target network resource; and acquiring the target network resource from the target sub-node, and sending the target network resource to the client (S104). Further provided in the present disclosure are a master node, a sub-node and a computer-readable medium.

Description

网络服务方法、主节点、子节点、计算机可读介质Network service method, master node, child node, computer readable medium
相关申请的交叉引用Cross-references to related applications
本申请要求2022年4月29日提交给中国专利局的第202210468970.9号专利申请的优先权,其全部内容通过引用合并于此。This application claims priority from Patent Application No. 202210468970.9 submitted to the China Patent Office on April 29, 2022, the entire content of which is incorporated herein by reference.
技术领域Technical field
本公开涉及但不限于网状(mesh)网络技术领域。The present disclosure relates to, but is not limited to, the field of mesh network technology.
背景技术Background technique
在网状(mesh)网络组网后,客户端(Web)经常需要从mesh网络中获取网络资源,而提供网络资源的网络服务(Web Server)功能均由主节点承担,导致mesh网络的响应速度慢,其中设备的能力不能被充分利用。After the mesh network is established, the client (Web) often needs to obtain network resources from the mesh network, and the network service (Web Server) function that provides network resources is assumed by the master node, resulting in the response speed of the mesh network. Slow, where the capabilities of the device are not fully utilized.
发明内容Contents of the invention
本公开提供一种网络服务方法、主节点、子节点、计算机可读介质。The present disclosure provides a network service method, a master node, a sub-node, and a computer-readable medium.
第一方面,本公开提供一种网络服务方法,用于网状mesh网络的主节点,所述方法包括:获取所述mesh网络中的各子节点的性能信息;至少根据所述性能信息,向至少一个所述子节点分配网络资源;获取客户端的资源请求,确定目标网络资源所在的目标子节点;所述资源请求用于请求所述目标网络资源;从所述目标子节点获取所述目标网络资源,将所述目标网络资源发送至所述客户端。In a first aspect, the present disclosure provides a network service method for a master node of a mesh network. The method includes: obtaining performance information of each sub-node in the mesh network; at least based on the performance information, providing At least one of the sub-nodes allocates network resources; obtains the client's resource request and determines the target sub-node where the target network resource is located; the resource request is used to request the target network resource; obtain the target network from the target sub-node resource, sending the target network resource to the client.
第二方面,本公开提供一种网络服务方法,用于网状mesh网络的子节点,所述方法包括:向所述mesh网络的主节点发送自身的性能信息;接收所述主节点分配的网络资源并本地存储;根据所述主节点对目标网络资源的请求,将所述目标网络资源发送至所述主节点; 所述目标网络资源为所述子节点本地存储的所述网络资源。In a second aspect, the present disclosure provides a network service method for sub-nodes of a mesh network. The method includes: sending its own performance information to the master node of the mesh network; receiving the network allocated by the master node. resources and store them locally; send the target network resources to the master node according to the master node's request for the target network resources; The target network resource is the network resource stored locally by the child node.
第三方面,本公开提供一种主节点,用于网状mesh网络中,其中,所述主节点配置为执行本公开的任意一种网络服务方法。In a third aspect, the present disclosure provides a master node for use in a mesh network, wherein the master node is configured to execute any network service method of the present disclosure.
第四方面,本公开提供一种子节点,用于网状mesh网络中,其中,所述子节点配置为执行本公开的任意一种网络服务方法。In a fourth aspect, the present disclosure provides a sub-node for use in a mesh network, wherein the sub-node is configured to execute any network service method of the present disclosure.
第五方面,本公开提供一种计算机可读介质,其上存储有计算机程序,所述计算机程序被处理器执行时能实现本公开的任意一种网络服务方法。In a fifth aspect, the present disclosure provides a computer-readable medium on which a computer program is stored. When executed by a processor, the computer program can implement any network service method of the present disclosure.
附图说明Description of the drawings
图1为本公开提供的一种网络服务方法的流程图;Figure 1 is a flow chart of a network service method provided by the present disclosure;
图2为本公开提供的另一种网络服务方法的流程图;Figure 2 is a flow chart of another network service method provided by the present disclosure;
图3为本公开提供的另一种网络服务方法的流程图;Figure 3 is a flow chart of another network service method provided by the present disclosure;
图4为本公开提供的另一种网络服务方法的流程图;Figure 4 is a flow chart of another network service method provided by the present disclosure;
图5为本公开提供的一种主节点的组成框图;Figure 5 is a block diagram of a master node provided by the present disclosure;
图6为本公开提供的一种子节点的组成框图;Figure 6 is a block diagram of a sub-node provided by the present disclosure;
图7为本公开提供的一种计算机可读介质的组成框图;Figure 7 is a block diagram of a computer-readable medium provided by the present disclosure;
图8为本公开提供的一种实现架构图;Figure 8 is an implementation architecture diagram provided by the present disclosure;
图9为本公开提供的另一种网络服务方法中各设备进行的工作示意图;Figure 9 is a schematic diagram of the work performed by each device in another network service method provided by the present disclosure;
图10为本公开提供的另一种网络服务方法的中mesh网络初始化阶段的流程图;Figure 10 is a flow chart of the mesh network initialization phase of another network service method provided by the present disclosure;
图11为本公开提供的另一种网络服务方法中的客户端请求网络资源阶段的信令交互图。Figure 11 is a signaling interaction diagram of the client requesting network resources phase in another network service method provided by the present disclosure.
具体实施方式Detailed ways
为使本领域的技术人员更好地理解本公开的技术方案,下面结合附图对本公开实施方式提供的网络服务方法、主节点、子节点、计算机可读介质进行详细描述。In order to enable those skilled in the art to better understand the technical solutions of the present disclosure, the network service method, master node, sub-node, and computer-readable medium provided by the embodiments of the present disclosure will be described in detail below in conjunction with the accompanying drawings.
在下文中将参考附图更充分地描述本公开,但是所示的实施方 式可以以不同形式来体现,且本公开不应当被解释为限于以下阐述的实施方式。反之,提供这些实施方式的目的在于使本公开透彻和完整,并将使本领域技术人员充分理解本公开的范围。The present disclosure will be described more fully hereinafter with reference to the accompanying drawings, in which embodiments are shown The formulas may be embodied in different forms, and the present disclosure should not be construed as limited to the embodiments set forth below. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully allow those skilled in the art to fully understand the scope of the disclosure.
本公开实施方式的附图用来提供对本公开实施方式的进一步理解,并且构成说明书的一部分,与详细实施方式一起用于解释本公开,并不构成对本公开的限制。通过参考附图对详细实施方式进行描述,以上和其它特征和优点对本领域技术人员将变得更加显而易见。The drawings of the embodiments of the present disclosure are used to provide a further understanding of the embodiments of the present disclosure, and constitute a part of the specification. They are used to explain the present disclosure together with the detailed embodiments and do not constitute a limitation of the present disclosure. The above and other features and advantages will become more apparent to those skilled in the art by describing the detailed embodiments with reference to the accompanying drawings.
本公开可借助本公开的理想示意图而参考平面图和/或截面图进行描述。因此,可根据制造技术和/或容限来修改示例图示。The present disclosure may be described with reference to plan and/or cross-sectional illustrations, which are schematic illustrations of the disclosure. Accordingly, example illustrations may be modified based on manufacturing techniques and/or tolerances.
在不冲突的情况下,本公开各实施方式及实施方式中的各特征可相互组合。The various embodiments and features in the embodiments of the present disclosure may be combined with each other without conflict.
本公开所使用的术语仅用于描述特定实施方式,且不意欲限制本公开。如本公开所使用的术语“和/或”包括一个或多个相关列举条目的任何和所有组合。如本公开所使用的单数形式“一个”和“该”也意欲包括复数形式,除非上下文另外清楚指出。如本公开所使用的术语“包括”、“由……制成”,指定存在所述特征、整体、步骤、操作、元件和/或组件,但不排除存在或添加一个或多个其它特征、整体、步骤、操作、元件、组件和/或其群组。The terminology used in this disclosure is for describing particular embodiments only and is not intended to limit the disclosure. As used in this disclosure, the term "and/or" includes any and all combinations of one or more of the associated listed items. As used in this disclosure, the singular forms "a," "an" and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. As used in this disclosure, the terms "comprising" and "made of" specify the presence of stated features, integers, steps, operations, elements and/or components but do not exclude the presence or addition of one or more other features, Integers, steps, operations, elements, components and/or groups thereof.
除非另外限定,否则本公开所用的所有术语(包括技术和科学术语)的含义与本领域普通技术人员通常理解的含义相同。还将理解,诸如那些在常用字典中限定的那些术语应当被解释为具有与其在相关技术以及本公开的背景下的含义一致的含义,且将不解释为具有理想化或过度形式上的含义,除非本公开明确如此限定。Unless otherwise defined, all terms (including technical and scientific terms) used in this disclosure have the same meaning as commonly understood by one of ordinary skill in the art. It will also be understood that terms such as those defined in commonly used dictionaries should be construed to have meanings consistent with their meanings in the context of the relevant art and the present disclosure, and will not be construed as having idealized or excessive formal meanings, Unless the disclosure is expressly so limited.
本公开不限于附图中所示的实施方式,而是包括基于制造工艺而形成的配置的修改。因此,附图中例示的区具有示意性属性,并且图中所示区的形状例示了元件的区的具体形状,但并不是旨在限制性的。The present disclosure is not limited to the embodiments shown in the drawings, but includes modifications of configurations based on manufacturing processes. Accordingly, the regions illustrated in the figures are of a schematic nature and the shapes of the regions shown in the figures are illustrative of the specific shapes of regions of the element and are not intended to be limiting.
第一方面,本公开提供一种网络服务方法,用于网状mesh网络的主节点。In a first aspect, the present disclosure provides a network service method for a master node of a mesh network.
Mesh网络也称全网状网络、全互联网络,其由多个节点构成, 且所有的节点间均相互连接,从而所有连接构成“网状”。Mesh网络的节点中有主节点,即起到类似服务器功能、与外界客户端(Web)相连的节点,而Mesh网络中其它的节点称为子节点。Mesh network is also called a fully meshed network and a fully interconnected network, which is composed of multiple nodes. And all nodes are connected to each other, so all connections form a "mesh". Among the nodes of the Mesh network, there is a master node, which is a node that functions like a server and is connected to the external client (Web). The other nodes in the Mesh network are called child nodes.
本公开的方法由mesh网络中的主节点执行,以向客户端提供网络服务(Web Server),例如是提供客户端所需的网络资源。The disclosed method is executed by the master node in the mesh network to provide network services (Web Server) to the client, such as providing network resources required by the client.
参照图1,本公开实施方式的方法可以包括S101至S104。Referring to FIG. 1 , the method of the embodiment of the present disclosure may include S101 to S104.
在S101,获取mesh网络中的各子节点的性能信息。In S101, obtain performance information of each sub-node in the mesh network.
主节点通过一些方式获取mesh网络中的各子节点的性能的相关信息(或者说是自身的可用资源信息),如每个子节点的CPU算力、内存量、硬盘量、负载等。The master node obtains performance-related information (or its own available resource information) of each sub-node in the mesh network through some methods, such as the CPU computing power, memory amount, hard disk amount, load, etc. of each sub-node.
应当理解,主节点当然要“记录”性能信息的情况,如可设置性能表(或称子节点性能表),将每个子节点的性能信息存储在性能表中。It should be understood that the master node must of course "record" performance information. For example, a performance table (or child node performance table) can be set up and the performance information of each child node is stored in the performance table.
其中,由于mesh网络中子节点的情况是不断变化的(如有新增子节点,有子节点掉线,有子节点性能改变等),故这里的性能信息可以是多次获取,如每各一段时间即更新获取性能信息。Among them, since the situation of sub-nodes in the mesh network is constantly changing (such as new sub-nodes, sub-nodes going offline, sub-node performance changes, etc.), the performance information here can be obtained multiple times, such as every Performance information is updated after a period of time.
在S102,至少根据性能信息,向至少一个子节点分配网络资源。In S102, allocate network resources to at least one child node based on at least the performance information.
当获取到各子节点的性能信息后,即可根据性能信息确定各子节点能处理的网络资源,并将原本存储在主节点的网络资源分别分配给相应的子节点,由子节点存储和处理。After obtaining the performance information of each sub-node, the network resources that each sub-node can process can be determined based on the performance information, and the network resources originally stored in the main node are allocated to the corresponding sub-nodes for storage and processing by the sub-nodes.
其中,确定如何向子节点分配网络资源的具体方式是多样的,例如,可设置自学习模型,将性能信息输入自学习模型,而自学习模型计算出应分配给各子节点的网络资源。There are various specific ways to determine how to allocate network resources to child nodes. For example, a self-learning model can be set up, performance information can be input into the self-learning model, and the self-learning model calculates the network resources that should be allocated to each child node.
应当理解,主节点当然要“记录”网络资源的分配情况,如可设置分配表(或称资源分配表),将每个子节点分配了哪些网络资源存储在分配表中。It should be understood that the master node must of course "record" the allocation of network resources. For example, an allocation table (or resource allocation table) can be set up, and which network resources each child node is allocated are stored in the allocation table.
其中,由于网络资源和子节点的情况都是不断变化的,故网络资源的分配情况也可以是不断变化的;相应的,以上分配表中的内容也要不断更新。Among them, since the conditions of network resources and sub-nodes are constantly changing, the allocation of network resources can also be constantly changing; accordingly, the contents in the above allocation table must also be constantly updated.
其中,同样的网络资源除分配给某个子节点外,还可同时分配给 另一个备用子节点,故分配表也可发给子节点,以供子节点在不能及时提供网络资源时从对应的备用子节点获取网络资源。Among them, in addition to being allocated to a child node, the same network resource can also be allocated to Another backup child node, so the allocation table can also be sent to the child node, so that the child node can obtain network resources from the corresponding backup child node when the network resources cannot be provided in time.
在S103,获取客户端的资源请求,确定目标网络资源所在的目标子节点。In S103, obtain the client's resource request and determine the target sub-node where the target network resource is located.
其中,资源请求用于请求目标网络资源。Among them, resource request is used to request target network resources.
当客户端(Web)需要使用网络资源,会向主节点发出资源请求,资源请求中包括客户端所需要的使用的网络资源,即目标网络资源。而主节点接收到资源请求后,即可根据资源请求确定出客户端需要的目标网络资源,并在分配表中查询到目标网络资源在哪个(或哪些)子节点,即目标子节点。When the client (Web) needs to use network resources, it will send a resource request to the master node. The resource request includes the network resources that the client needs to use, that is, the target network resources. After the master node receives the resource request, it can determine the target network resource required by the client based on the resource request, and query in the allocation table which sub-node (or sub-nodes) the target network resource is located, that is, the target sub-node.
在S104,从目标子节点获取目标网络资源,将目标网络资源发送至客户端。In S104, obtain the target network resource from the target sub-node and send the target network resource to the client.
主节点确定目标网络资源所在的目标子节点后,即可向目标子节点发出请求,由目标子节点提供目标网络资源(目标子节点还可对提供的目标网络资源进行相应的处理),即,由目标子节点实际上实现网络服务(Web Server)功能;之后,主节点即可将得到的目标网络资源发送至客户端,以使客户端获取到所需的目标网络资源。After the master node determines the target sub-node where the target network resource is located, it can send a request to the target sub-node, and the target sub-node will provide the target network resource (the target sub-node can also process the provided target network resource accordingly), that is, The target sub-node actually implements the network service (Web Server) function; then, the master node can send the obtained target network resources to the client, so that the client can obtain the required target network resources.
本公开实施方式中,mesh网络的主节点至少根据各子节点的性能将网络资源分配到各子节点,故当客户端(Web)需要网络资源时,实际的网络资源是由各子节点处理和提供的,即各子节点都可分担一部分的网络服务(Web Server)功能,从而充分利用mesh网络中所有集群设备的能力,避免子节点长期空闲,实现负载均衡,且使多个子节点可并发(concurrent)工作,加快mesh网络的响应速度,提高mesh网络的性能。In the disclosed embodiment, the main node of the mesh network allocates network resources to each sub-node at least based on the performance of each sub-node. Therefore, when the client (Web) requires network resources, the actual network resources are processed and processed by each sub-node. Provided, that is, each sub-node can share part of the network service (Web Server) function, thereby making full use of the capabilities of all cluster devices in the mesh network, avoiding long-term idleness of sub-nodes, achieving load balancing, and enabling multiple sub-nodes to be concurrent ( concurrent) work to speed up the response speed of the mesh network and improve the performance of the mesh network.
在一些实施方式中,参照图2,至少根据性能信息,向至少一个子节点分配网络资源(S102)可以包括:S1021,根据网络资源的使用情况以及性能信息,向至少一个子节点分配网络资源。In some embodiments, referring to Figure 2, allocating network resources to at least one child node (S102) based at least on performance information may include: S1021, allocating network resources to at least one child node based on network resource usage and performance information.
作为本公开实施方式的一种方式,分配资源时,除考虑子节点的性能信息外,还可考虑不同网络资源的实际使用情况(如一段时间内的使用频率),以实现更准确有效的分配。 As a way to implement the present disclosure, when allocating resources, in addition to considering the performance information of sub-nodes, the actual usage of different network resources (such as the frequency of use within a period of time) can also be considered to achieve more accurate and effective allocation. .
应当理解,主节点当然要“记录”网络资源的使用情况,如可设置资源表(或称资源使用频率表),记录一定时间内网络资源被使用(如被客户端请求)的次数(频率)。It should be understood that the master node must of course "record" the usage of network resources. For example, a resource table (or resource usage frequency table) can be set up to record the number (frequency) of network resources being used (such as requested by a client) within a certain period of time. .
其中,随着网络资源不断被使用,该资源表也应被不断更新。Among them, as network resources are continuously used, the resource table should also be continuously updated.
在一些实施方式中,参照图2,在获取mesh网络中的各子节点的性能信息(S101)之前,还包括:S1001、对连接的各子节点进行第一认证,确定通过第一认证的子节点为mesh网络中的子节点。In some embodiments, referring to Figure 2, before obtaining the performance information of each sub-node in the mesh network (S101), it also includes: S1001, performing a first authentication on each connected sub-node, and determining the sub-node that passes the first authentication. Nodes are child nodes in the mesh network.
作为本公开实施方式的一种方式,在mesh网络物理组网后,主节点还可先对连接到的各子节点进行认证(验证),以确定是否将其确实加入mesh网络中进行后续工作,保证实际加入mesh网络的子节点都是安全合法的。As a way to implement the present disclosure, after the mesh network is physically networked, the master node can also first authenticate (verify) each connected sub-node to determine whether it is indeed added to the mesh network for subsequent work. Ensure that all child nodes actually joining the mesh network are safe and legal.
在一些实施方式中,第一认证为基于预置的公钥和私钥的认证;私钥预存在主节点中,公钥公开给各子节点。In some implementations, the first authentication is based on a preset public key and a private key; the private key is prestored in the master node, and the public key is disclosed to each child node.
示例性的,可采用公钥、私钥的方式进行主节点与子节点间的认证。For example, public keys and private keys can be used for authentication between the master node and the child nodes.
例如,可以是预置公钥和私钥,而主节点向各子节点广播第一认证消息,子节点接收到后用公钥加密一个随机数,与自身地址等信息一起返给主节点,主节点尝试用私钥解密,若能成功解密则并根据子节点的地址确定拓扑关系并存储在拓扑表中,若无法解密则结束,相应子节点不会被实际加入mesh网络(未被加入拓扑表)。For example, the public key and private key can be preset, and the master node broadcasts the first authentication message to each child node. After receiving it, the child node encrypts a random number with the public key and returns it to the master node together with its own address and other information. The node tries to decrypt with the private key. If it can be decrypted successfully, the topology relationship will be determined based on the address of the child node and stored in the topology table. If it cannot be decrypted, it will end. The corresponding child node will not be actually added to the mesh network (it will not be added to the topology table). ).
同时,主节点还可将随机数作为令牌存储在认证表中,用于后续对子节点的认证。At the same time, the master node can also store random numbers as tokens in the authentication table for subsequent authentication of child nodes.
应当理解,基于公钥和私钥的认证的具体方式不限于以上例子,在此不再详细描述。It should be understood that the specific authentication methods based on public keys and private keys are not limited to the above examples and will not be described in detail here.
在一些实施方式中,参照图2,从目标子节点获取目标网络资源,将目标网络资源发送至客户端(S104)包括:S1041、对目标子节点进行第二认证,在第二认证通过的情况下,从目标子节点获取目标网络资源,将目标网络资源发送至客户端。In some embodiments, referring to Figure 2, obtaining the target network resource from the target sub-node, and sending the target network resource to the client (S104) includes: S1041, performing a second authentication on the target sub-node. If the second authentication is passed, Next, obtain the target network resource from the target child node and send the target network resource to the client.
作为本公开实施方式的一种方式,当要从目标子节点获取目标网络资源时,也可先进行认证,只有认证通过才实际获取目标网络资 源并发送,以保证获取到的目标网络资源的正确性。As a way to implement the present disclosure, when the target network resources are to be obtained from the target sub-node, authentication can also be performed first, and only after the authentication is passed, the target network resources are actually obtained. source and sent to ensure the correctness of the obtained target network resources.
其中,第二认证的具体方式是多样的。Among them, the specific methods of second certification are diverse.
例如,可以是将以上从子节点得到的随机数作为令牌发送给目标子节点;而目标子节点认证该随机数(令牌),若正确则提供目标网络资源,并同时发送新的随机数给主节点,若失败则结束;主节点认证收到的新随机数,若成功则第二认证成功,获取目标网络资源并发给客户端,同时存储新随机数(相当于更新令牌),若失败则结束。For example, the above random number obtained from the child node can be sent to the target child node as a token; the target child node authenticates the random number (token), and if correct, provides the target network resources and sends a new random number at the same time. to the master node, if it fails, it ends; the master node authenticates the new random number received. If it succeeds, the second authentication succeeds, obtains the target network resource and sends it to the client, and stores the new random number (equivalent to the update token). If Failure ends.
在一些实施方式中,参照图2,获取客户端的资源请求,确定目标网络资源所在的目标子节点(S103)包括:S1031、对发出资源请求的客户端进行第三认证,在第三认证通过的情况下,确定目标网络资源所在的目标子节点。In some embodiments, referring to Figure 2, obtaining the client's resource request and determining the target sub-node where the target network resource is located (S103) includes: S1031. Perform a third authentication on the client that issued the resource request. After the third authentication is passed, In this case, determine the target sub-node where the target network resource is located.
作为本公开实施方式的一种方式,当收到客户端的资源请求时,还可先对该客户端进行认证,只有认证通过才向其提供目标网络资源,以保证目标网络资源是被提供给安全的客户端的。As a way to implement the present disclosure, when receiving a resource request from a client, the client can also be authenticated first, and only the target network resource is provided to the client after passing the authentication, so as to ensure that the target network resource is provided to the security of the client.
在一些实施方式中,第三认证为令牌认证。In some implementations, the third authentication is token authentication.
示例性的,客户端与主节点的认证可采用令牌认证的方式。For example, the authentication between the client and the master node may use token authentication.
例如,可以是客户端先向主节点发送第三认证请求,以获取主节点提供的随机值,并用预定的加密算法(如网络服务的加密算法)对其进行加密,而将加密的随机值作为令牌携带在资源请求中发给主节点,主节点则用相同算法解密,若能得到正确的随机值则第三认证通过,继续处理认证请求,若失败则结束。For example, the client may first send a third authentication request to the master node to obtain the random value provided by the master node, encrypt it using a predetermined encryption algorithm (such as the encryption algorithm of the network service), and use the encrypted random value as The token is carried in the resource request and sent to the master node. The master node decrypts it using the same algorithm. If the correct random value can be obtained, the third authentication is passed and the authentication request continues to be processed. If it fails, it ends.
应当理解,令牌认证的具体方式不限于以上例子,在此不再详细描述。It should be understood that the specific method of token authentication is not limited to the above examples and will not be described in detail here.
第二方面,本公开提供一种网络服务方法,用于网状mesh网络的子节点。In a second aspect, the present disclosure provides a network service method for sub-nodes of a mesh network.
本公开的方法由mesh网络(具有以上主节点的mesh网络)中的子节点执行,以向客户端提供网络服务(Web Server),例如是提供客户端所需的网络资源。The disclosed method is executed by the sub-nodes in the mesh network (the mesh network with the above master node) to provide network services (Web Server) to the client, for example, to provide network resources required by the client.
参照图3,本公开实施方式的方法包括S201至S203。Referring to Figure 3, the method of the embodiment of the present disclosure includes S201 to S203.
在S201,向mesh网络的主节点发送自身的性能信息。 In S201, send its own performance information to the master node of the mesh network.
在S202,接收主节点分配的网络资源并本地存储。In S202, network resources allocated by the master node are received and stored locally.
在S203,根据主节点对目标网络资源的请求,将目标网络资源发送至主节点。In S203, the target network resource is sent to the master node according to the master node's request for the target network resource.
其中,目标网络资源为子节点本地存储的网络资源。Among them, the target network resource is the network resource stored locally on the child node.
如前,mesh网络中的子节点,需要将自身的性能信息发送给主节点,以供主节点根据各子节点的性能信息(当然还可有网络资源的使用情况)确定应分配的网络资源;之后,各子节点接收相应网络资源并分别存储在本地;从而,当客户端向主节点请求目标网络资源时,则目标网络资源所在的子节点(目标子节点)会接到主节点的请求,并对自身存储的目标网络资源进行处理,提供给主节点。As before, the sub-nodes in the mesh network need to send their own performance information to the master node, so that the master node can determine the network resources that should be allocated based on the performance information of each sub-node (and of course the usage of network resources); After that, each sub-node receives the corresponding network resources and stores them locally respectively; thus, when the client requests the target network resource from the main node, the sub-node (target sub-node) where the target network resource is located will receive the request from the main node. And process the target network resources stored by itself and provide them to the master node.
在一些实施方式中,参照图4,向mesh网络的主节点发送自身的性能信息(S201)包括:S2011、周期性的主动向mesh网络的主节点发送自身的性能信息。In some embodiments, referring to Figure 4, sending one's own performance information to the master node of the mesh network (S201) includes: S2011, periodically actively sending one's own performance information to the master node of the mesh network.
作为本公开实施方式的一种方式,每个子节点,都可以是周期性的主动向主节点发送的性能信息,从而降低主节点的负载。As an implementation method of the present disclosure, each child node can actively send performance information to the master node periodically, thereby reducing the load of the master node.
应当理解,如果子节点是根据主节点的请求等其它方式发送性能信息,也是可行的。It should be understood that it is also feasible if the child node sends performance information according to the request of the master node or other methods.
在一些实施方式中,参照图4,在向mesh网络的主节点发送自身的性能信息(S201)之前,还包括:S2001、与主节点进行第一认证。In some embodiments, referring to Figure 4, before sending its own performance information to the master node of the mesh network (S201), the method further includes: S2001, performing a first authentication with the master node.
作为本公开实施方式的一种方式,在完成实际的组网前,子节点也可与主节点间进行认证。As an implementation method of the present disclosure, before completing the actual networking, the sub-node may also perform authentication with the master node.
其中,具体的认证方式可与主节点的第一认证对应,在此不再详细描述。The specific authentication method may correspond to the first authentication of the master node, and will not be described in detail here.
在一些实施方式中,参照图4,根据主节点对目标网络资源的请求,将目标网络资源发送至主节点(S203)包括:S2031、与主节点进行第二认证,在第二认证通过的情况下,将目标网络资源发送至主节点。In some embodiments, referring to Figure 4, according to the master node's request for the target network resource, sending the target network resource to the master node (S203) includes: S2031, performing a second authentication with the master node. When the second authentication is passed, Next, send the target network resources to the master node.
作为本公开实施方式的一种方式,在向主节点提供目标网络资源时,子节点也可与主节点间进行认证。 As an implementation method of the present disclosure, when providing target network resources to the master node, the sub-node may also perform authentication with the master node.
其中,具体的认证方式可与主节点的第二认证对应,在此不再详细描述。The specific authentication method may correspond to the second authentication of the master node, and will not be described in detail here.
第三方面,参照图5,本公开提供一种主节点,用于网状mesh网络中,其中,主节点配置为执行本公开实施方式的任意一种网络服务方法。In the third aspect, referring to FIG. 5 , the present disclosure provides a master node for use in a mesh network, wherein the master node is configured to execute any network service method according to the embodiment of the present disclosure.
在一些实施方式中,主节点包括处理器和存储器,存储器上存储有计算机程序,计算机程序被处理器执行时能实现本公开实施方式的任意一种网络服务方法。In some embodiments, the master node includes a processor and a memory, and a computer program is stored on the memory. When the computer program is executed by the processor, it can implement any network service method in the embodiments of the present disclosure.
第四方面,参照图6,本公开提供一种子节点,用于网状mesh网络中,其中,子节点配置为执行本公开实施方式的任意一种网络服务方法。In the fourth aspect, referring to FIG. 6 , the present disclosure provides a sub-node for use in a mesh network, wherein the sub-node is configured to execute any network service method according to the embodiment of the present disclosure.
在一些实施方式中,子节点包括处理器和存储器,存储器上存储有计算机程序,计算机程序被处理器执行时能实现本公开实施方式的任意一种网络服务方法。In some embodiments, the child node includes a processor and a memory, and a computer program is stored on the memory. When the computer program is executed by the processor, it can implement any network service method in the embodiments of the present disclosure.
第五方面,参照图7,本公开提供一种计算机可读介质,其上存储有计算机程序,计算机程序被处理器执行时能实现本公开实施方式的任意一种网络服务方法。In the fifth aspect, referring to FIG. 7 , the present disclosure provides a computer-readable medium on which a computer program is stored. When the computer program is executed by a processor, it can implement any network service method according to the embodiment of the present disclosure.
其中,处理器为具有数据处理能力的器件,其包括但不限于中央处理器(CPU)等;存储器为具有数据存储能力的器件,其包括但不限于随机存取存储器(RAM,更具体如SDRAM、DDR等)、只读存储器(ROM)、带电可擦可编程只读存储器(EEPROM)、闪存(FLASH);I/O接口(读写接口)连接在处理器与存储器间,能实现存储器与处理器的信息交互,其包括但不限于数据总线(Bus)等。Among them, the processor is a device with data processing capabilities, including but not limited to a central processing unit (CPU), etc.; the memory is a device with data storage capabilities, including but not limited to random access memory (RAM, more specifically such as SDRAM). , DDR, etc.), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory (FLASH); the I/O interface (read-write interface) is connected between the processor and the memory, enabling memory and Information exchange of processors, including but not limited to data bus (Bus), etc.
示例性的,对本公开实施方式的实现架构和具体流程进行介绍。By way of example, the implementation architecture and specific processes of the embodiments of the present disclosure are introduced.
例如,参照图8,本公开实施方式可由四个模块实现,即认证模块、采集模块、分配模块、实现模块。For example, referring to Figure 8, the embodiment of the present disclosure can be implemented by four modules, namely, authentication module, collection module, distribution module, and implementation module.
其中,认证模块包括两部分,第一部分用于主节点和子节点间的安全认证(第一认证和第二认证),以在二者间建立起一套安全链接的机制,保障二者间的安全通信,防止被恶意攻击;第二部分则用于主节点和客户端(web)间的安全认证(第三认证),保障数据安全 性。Among them, the authentication module consists of two parts. The first part is used for security authentication (first authentication and second authentication) between the main node and the sub-node to establish a secure link mechanism between the two to ensure the security between the two. communication to prevent malicious attacks; the second part is used for security authentication (third authentication) between the master node and the client (web) to ensure data security sex.
采集模块,其用于使子节点定期主动的向主节点上报自己的性能信息(可用资源信息),而主节点根据预定算法可评估出每个子节点的设备能力值。The collection module is used to enable the sub-nodes to regularly and proactively report their own performance information (available resource information) to the master node, and the master node can evaluate the equipment capability value of each sub-node based on a predetermined algorithm.
分配模块,其用于统计出网络资源的使用频率,并通过学习算法(自学习模型)按照频率高低和子节点的设备能力值高低,给各子节点分配网络资源,而子节点将分配的网络资源存储在本地,当客户端请求对应的网络资源(目标网络资源)时,主节点查询到目标网络资源所在的目标子节点,从中获取目标网络资源并提供给客户端。The allocation module is used to count the usage frequency of network resources, and allocate network resources to each child node according to the frequency and the equipment capability value of the child node through a learning algorithm (self-learning model), and the child node will allocate the network resources Stored locally, when the client requests the corresponding network resource (target network resource), the master node queries the target sub-node where the target network resource is located, obtains the target network resource from it, and provides it to the client.
实现模块,其用于经过以上各模块后,将主节点从资源调度中解脱出来,主要负责安全认证、资源分配、数据更新、转发请求等。The implementation module is used to free the master node from resource scheduling after passing through the above modules. It is mainly responsible for security authentication, resource allocation, data update, forwarding requests, etc.
示例性的,参照图9至图11,本公开实施方式的示例性流程可包括mesh网络初始化、mesh网络更新、客户端请求网络资源三个阶段。For example, referring to Figures 9 to 11, the exemplary process of the embodiment of the present disclosure may include three stages: mesh network initialization, mesh network update, and client requesting network resources.
其中,参照图9、图10,mesh网络的设备出厂时候预制了公钥和私钥(当然使用的是主节点的公钥和私钥),mesh网络初始化阶段可包括A101至A109。Among them, referring to Figure 9 and Figure 10, the mesh network equipment has a pre-prepared public key and private key when it leaves the factory (of course, the public key and private key of the master node are used), and the mesh network initialization phase may include A101 to A109.
在A101,物理mesh组网成功后,主节点向每个子节点广播消息。On A101, after the physical mesh network is successfully established, the master node broadcasts a message to each child node.
在A102,在线的子节点做出响应,用公钥加密随机数和地址信息等拓扑信息,并发送给主节点。At A102, the online child node responds, encrypts topology information such as random numbers and address information with the public key, and sends it to the master node.
在A103,主节点尝试用私钥解密收到的信息,如果成功则继续,如果不成功则认证失败。At A103, the master node attempts to decrypt the received information with the private key and continues if successful, otherwise the authentication fails.
在A104,主节点将解密得到的地址信息等更新到拓扑表(记录mesh网络的拓扑信息);并将解密得到的随机数存储到认证表(记录各子节点对应认证信息,如令牌)中,用于后续过程中作为令牌对相应子节点认证。At A104, the master node updates the decrypted address information to the topology table (recording the topology information of the mesh network); and stores the decrypted random number into the authentication table (records the corresponding authentication information of each sub-node, such as tokens) , used as a token to authenticate the corresponding child node in the subsequent process.
同时,当子节点还可定期更新令牌,主节点也应相应更新认证表。At the same time, when the child node can also update the token regularly, the master node should also update the authentication table accordingly.
例如,拓扑表的表头格式可如下:
For example, the header format of the topology table can be as follows:
例如,认证表的表头格式可如下:
For example, the header format of the certification table can be as follows:
在A105,子节点定期主动向主节点发送自己性能信息,并携带令牌。At A105, the child node actively sends its own performance information to the master node regularly and carries the token.
在A106,主节点认证令牌合法性,若合法继续,若不合法则认证失败。At A106, the master node verifies the validity of the token. If it is valid, continue. If it is not valid, the authentication fails.
在A107,主节点计算各子节点的能力值并更新性能表(记录各子节点的性能信息,例如能力值),再根据资源表(记录网络资源的使用情况,如使用频率)中的网络资源使用频率和能力值,按照资源分配算法生成分配表(记录网络资源分配给子节点的情况)。At A107, the master node calculates the capability value of each child node and updates the performance table (recording the performance information of each child node, such as the capability value), and then based on the network resources in the resource table (recording the usage of network resources, such as frequency of use) Using frequency and capability values, generate an allocation table (recording the allocation of network resources to child nodes) according to the resource allocation algorithm.
同时,主节点还可根据认证表判断令牌是否有更新,若有也更新认证表。At the same time, the master node can also determine whether the token has been updated based on the authentication table, and if so, update the authentication table.
例如,性能表的表头格式可如下:
For example, the header format of the performance table can be as follows:
例如,初始的资源表可根据经验设定,而资源表的表头格式可如下:
For example, the initial resource table can be set based on experience, and the header format of the resource table can be as follows:
例如,分配表的表头格式可如下:
For example, the header format of the allocation table can be as follows:
在A108,如果子节点的系统版本号与主节点相同,则代表网络资源已分配给子节点,如果不同,主节点根据分配表将对应的网络资源存储在子节点中。At A108, if the system version number of the child node is the same as that of the master node, it means that the network resources have been allocated to the child node. If they are different, the master node stores the corresponding network resources in the child node according to the allocation table.
在A109,mesh网络初始化完成。At A109, mesh network initialization is completed.
而mesh网络更新阶段可包括A201和A202。The mesh network update stage can include A201 and A202.
在A201,若主节点在规定的时间内没有收到子节点定期发送的性能信息,则发送确认信息给子节点,若仍未接到子节点的回复,则认为该子节点已掉线,更新拓扑表(删除相应子节点的信息)、性能表(删除相应子节点的信息)、分配表,并重新分配网络资源。In A201, if the master node does not receive the performance information sent regularly by the child node within the specified time, it will send a confirmation message to the child node. If it still does not receive a reply from the child node, it is considered that the child node has been offline. Update Topology table (delete the information of the corresponding sub-node), performance table (delete the information of the corresponding sub-node), allocation table, and reallocate network resources.
其中,重新分配可以是以备用子节点作为主用子节点,也可以是(如备用子节点也掉线)按照重新用资源分配算法算出应将相应网络 资源分配给哪个子节点。Among them, the redistribution can be to use the backup sub-node as the main sub-node, or (for example, the backup sub-node is also offline) to calculate the corresponding network according to the reuse resource allocation algorithm. Which child node the resource is allocated to.
在A202,主节点定期进行广播,以使新加入的子节点按照以上方式加入mesh网络。At A202, the master node broadcasts regularly to allow newly added child nodes to join the mesh network in the above manner.
而参照图9、图11,客户端请求网络资源阶段可包括A301至A306。Referring to Figures 9 and 11, the phase of the client requesting network resources may include A301 to A306.
在A301,客户端通过HTTP协商请求,得到随机值x,按照预定的加密算法对x进行加密,得到x_encode。In A301, the client obtains the random value x through HTTP negotiation request, encrypts x according to the predetermined encryption algorithm, and obtains x_encode.
在A302,客户端向主节点发送携带x_encode作为令牌的资源请求,请求网络资源y(目标网络资源)。In A302, the client sends a resource request carrying x_encode as a token to the master node, requesting network resource y (target network resource).
在A303,主节点按照对应的算法解密,若能得到x则继续,若不行则认证失败。In A303, the master node decrypts according to the corresponding algorithm. If it can obtain x, it will continue. If it cannot, the authentication will fail.
在A304,主节点根据分配表找到网络资源y所在的子节点,向子节点发送携带令牌t(最近更新的随机数)的请求。In A304, the master node finds the child node where the network resource y is located according to the allocation table, and sends a request carrying the token t (the most recently updated random number) to the child node.
在A305,子节点根据令牌t进行认证,若通过则处理网络资源y,并将网络资源y发送给主节点,同时携带新产生的令牌s(再次更新的随机数)。At A305, the child node authenticates based on the token t. If it passes, the network resource y is processed, and the network resource y is sent to the master node, while carrying the newly generated token s (random number updated again).
在A306,主节点解密令牌s进行认证,若通过则将网络资源y发送给客户端,并且更新令牌和网络资源使用频率(因为网络资源y被使用了)。In A306, the master node decrypts the token s for authentication. If it passes, the network resource y is sent to the client, and the token and network resource usage frequency are updated (because the network resource y is used).
本领域普通技术人员可以理解,上文中所公开的全部或某些步骤、系统、装置中的功能模块/单元可以被实施为软件、固件、硬件及其适当的组合。Those of ordinary skill in the art can understand that all or some of the steps, systems, and functional modules/units in the devices disclosed above can be implemented as software, firmware, hardware, and appropriate combinations thereof.
在硬件实施方式中,在以上描述中提及的功能模块/单元之间的划分不一定对应于物理组件的划分;例如,一个物理组件可以具有多个功能,或者一个功能或步骤可以由若干物理组件合作执行。In hardware implementations, the division between functional modules/units mentioned in the above description does not necessarily correspond to the division of physical components; for example, one physical component may have multiple functions, or one function or step may consist of several physical components. Components execute cooperatively.
某些物理组件或所有物理组件可以被实施为由处理器,如中央处理器(CPU)、数字信号处理器或微处理器执行的软件,或者被实施为硬件,或者被实施为集成电路,如专用集成电路。这样的软件可以分布在计算机可读介质上,计算机可读介质可以包括计算机存储介质(或非暂时性介质)和通信介质(或暂时性介质)。如本领域普通 技术人员公知的,术语计算机存储介质包括在用于存储信息(诸如计算机可读指令、数据结构、程序模块或其它数据)的任何方法或技术中实施的易失性和非易失性、可移除和不可移除介质。计算机存储介质包括但不限于随机存取存储器(RAM,更具体如SDRAM、DDR等)、只读存储器(ROM)、带电可擦可编程只读存储器(EEPROM)、闪存(FLASH)或其它磁盘存储器;只读光盘(CD-ROM)、数字多功能盘(DVD)或其它光盘存储器;磁盒、磁带、磁盘存储或其它磁存储器;可以用于存储期望的信息并且可以被计算机访问的任何其它的介质。此外,本领域普通技术人员公知的是,通信介质通常包含计算机可读指令、数据结构、程序模块或者诸如载波或其它传输机制之类的调制数据信号中的其它数据,并且可包括任何信息递送介质。Some or all of the physical components may be implemented as software executed by a processor, such as a central processing unit (CPU), a digital signal processor, or a microprocessor, or as hardware, or as an integrated circuit, such as ASIC. Such software may be distributed on computer-readable media, which may include computer storage media (or non-transitory media) and communication media (or transitory media). As is common in this field As is known to those skilled in the art, the term computer storage media includes volatile and nonvolatile, removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data. and non-removable media. Computer storage media includes but is not limited to random access memory (RAM, more specifically SDRAM, DDR, etc.), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory (FLASH) or other disk storage ; Compact Disk Read-Only (CD-ROM), Digital Versatile Disk (DVD), or other optical disk storage; Magnetic cassette, magnetic tape, disk storage, or other magnetic storage; Any other storage device that can be used to store desired information and can be accessed by a computer medium. Additionally, it is known to those of ordinary skill in the art that communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism, and may include any information delivery media .
本公开已经公开了示例实施方式,并且虽然采用了具体术语,但它们仅用于并仅应当被解释为一般说明性含义,并且不用于限制的目的。在一些实例中,对本领域技术人员显而易见的是,除非另外明确指出,否则可单独使用与特定实施方式相结合描述的特征、特性和/或元素,或可与其它实施方式相结合描述的特征、特性和/或元件组合使用。因此,本领域技术人员将理解,在不脱离由所附的权利要求阐明的本公开的范围的情况下,可进行各种形式和细节上的改变。 This disclosure has disclosed example embodiments, and although specific terms are employed, they are used and should be interpreted in a general illustrative sense only and not for purpose of limitation. In some instances, it will be apparent to those skilled in the art that features, characteristics and/or elements described in connection with a particular embodiment may be used alone, or may be used in conjunction with other embodiments, unless expressly stated otherwise. Features and/or components are used in combination. Accordingly, it will be understood by those skilled in the art that various changes in form and details may be made without departing from the scope of the present disclosure as set forth in the appended claims.

Claims (14)

  1. 一种网络服务方法,用于网状mesh网络的主节点,所述方法包括:A network service method for the master node of a mesh network, the method includes:
    获取所述mesh网络中的各子节点的性能信息;Obtain performance information of each sub-node in the mesh network;
    至少根据所述性能信息,向至少一个所述子节点分配网络资源;allocate network resources to at least one of the child nodes based at least on the performance information;
    获取客户端的资源请求,确定目标网络资源所在的目标子节点;所述资源请求用于请求所述目标网络资源;Obtain the client's resource request and determine the target sub-node where the target network resource is located; the resource request is used to request the target network resource;
    从所述目标子节点获取所述目标网络资源,将所述目标网络资源发送至所述客户端。Obtain the target network resource from the target sub-node, and send the target network resource to the client.
  2. 根据权利要求1所述的方法,其中,所述至少根据所述性能信息,向至少一个所述子节点分配网络资源包括:The method of claim 1, wherein allocating network resources to at least one of the child nodes based on at least the performance information includes:
    根据所述网络资源的使用情况以及所述性能信息,向至少一个所述子节点分配网络资源。Allocate network resources to at least one of the child nodes according to the usage of the network resources and the performance information.
  3. 根据权利要求1所述的方法,其中,The method of claim 1, wherein,
    在所述获取所述mesh网络中的各子节点的性能信息之前,还包括:对连接的各所述子节点进行第一认证,确定通过所述第一认证的子节点为所述mesh网络中的子节点。Before obtaining the performance information of each sub-node in the mesh network, the method further includes: performing a first authentication on each of the connected sub-nodes, and determining that the sub-node that passes the first authentication is one of the sub-nodes in the mesh network. child nodes.
  4. 根据权利要求3所述的方法,其中,The method of claim 3, wherein,
    所述第一认证为基于预置的公钥和私钥的认证;所述私钥预存在所述主节点中,所述公钥公开给各所述子节点。The first authentication is based on a preset public key and a private key; the private key is pre-stored in the master node, and the public key is disclosed to each of the child nodes.
  5. 根据权利要求1所述的方法,其中,所述从所述目标子节点获取所述目标网络资源,将所述目标网络资源发送至所述客户端包括:The method according to claim 1, wherein said obtaining the target network resource from the target sub-node and sending the target network resource to the client includes:
    对所述目标子节点进行第二认证,在所述第二认证通过的情况下,从所述目标子节点获取所述目标网络资源,将所述目标网络资源发送至所述客户端。 Perform a second authentication on the target sub-node, and if the second authentication passes, obtain the target network resource from the target sub-node, and send the target network resource to the client.
  6. 根据权利要求1所述的方法,其中,所述获取客户端的资源请求,确定目标网络资源所在的目标子节点包括:The method according to claim 1, wherein said obtaining the client's resource request and determining the target sub-node where the target network resource is located includes:
    对发出所述资源请求的所述客户端进行第三认证,在所述第三认证通过的情况下,确定目标网络资源所在的目标子节点。A third authentication is performed on the client that issued the resource request. If the third authentication passes, the target sub-node where the target network resource is located is determined.
  7. 根据权利要求6所述的方法,其中,The method of claim 6, wherein
    所述第三认证为令牌认证。The third authentication is token authentication.
  8. 一种网络服务方法,用于网状mesh网络的子节点,所述方法包括:A network service method for sub-nodes of a mesh network, the method includes:
    向所述mesh网络的主节点发送自身的性能信息;Send its own performance information to the master node of the mesh network;
    接收所述主节点分配的网络资源并本地存储;Receive the network resources allocated by the master node and store them locally;
    根据所述主节点对目标网络资源的请求,将所述目标网络资源发送至所述主节点;所述目标网络资源为所述子节点本地存储的所述网络资源。According to the master node's request for the target network resource, the target network resource is sent to the master node; the target network resource is the network resource stored locally by the child node.
  9. 根据权利要求8所述的方法,其中,所述向所述mesh网络的主节点发送自身的性能信息包括:The method according to claim 8, wherein said sending its own performance information to the master node of the mesh network includes:
    周期性的主动向所述mesh网络的主节点发送自身的性能信息。Periodically and proactively send its own performance information to the master node of the mesh network.
  10. 根据权利要求8所述的方法,其中,在所述向所述mesh网络的主节点发送自身的性能信息之前,还包括:The method according to claim 8, wherein before sending its own performance information to the master node of the mesh network, it further includes:
    与所述主节点进行第一认证。Perform first authentication with the master node.
  11. 根据权利要求8所述的方法,其中,所述根据所述主节点对目标网络资源的请求,将所述目标网络资源发送至所述主节点包括:The method according to claim 8, wherein sending the target network resource to the master node according to the master node's request for the target network resource includes:
    与所述主节点进行第二认证,在所述第二认证通过的情况下,将所述目标网络资源发送至所述主节点。 Perform a second authentication with the master node, and if the second authentication passes, send the target network resource to the master node.
  12. 一种主节点,用于网状mesh网络中,其中,A master node used in mesh networks, where,
    所述主节点配置为执行权利要求1至7中任意一项所述的网络服务方法。The master node is configured to execute the network service method according to any one of claims 1 to 7.
  13. 一种子节点,用于网状mesh网络中,其中,A child node used in mesh networks, where,
    所述子节点配置为执行权利要求8至11中任意一项所述的网络服务方法。The child node is configured to execute the network service method described in any one of claims 8 to 11.
  14. 一种计算机可读介质,其上存储有计算机程序,所述计算机程序被处理器执行时能实现权利要求1至11中任意一项所述的网络服务方法。 A computer-readable medium on which a computer program is stored. When the computer program is executed by a processor, the network service method described in any one of claims 1 to 11 can be implemented.
PCT/CN2023/087346 2022-04-29 2023-04-10 Network service method, master node, sub-node and computer-readable medium WO2023207567A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210468970.9 2022-04-29
CN202210468970.9A CN117014419A (en) 2022-04-29 2022-04-29 Network service method, master node, child node, and computer-readable medium

Publications (1)

Publication Number Publication Date
WO2023207567A1 true WO2023207567A1 (en) 2023-11-02

Family

ID=88517335

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/087346 WO2023207567A1 (en) 2022-04-29 2023-04-10 Network service method, master node, sub-node and computer-readable medium

Country Status (2)

Country Link
CN (1) CN117014419A (en)
WO (1) WO2023207567A1 (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107959976A (en) * 2017-11-06 2018-04-24 海能达通信股份有限公司 Resource regulating method and Mesh network node in a kind of Mesh network
CN110795244A (en) * 2019-10-24 2020-02-14 浙江大华技术股份有限公司 Task allocation method, device, equipment and medium
CN111629050A (en) * 2020-05-22 2020-09-04 浙江大华技术股份有限公司 Node scheduling method and device, storage medium and electronic device
CN111858045A (en) * 2020-07-13 2020-10-30 苏州浪潮智能科技有限公司 Multitask GPU resource scheduling method, device, equipment and readable medium
US20210037272A1 (en) * 2019-07-29 2021-02-04 Charter Communications Operating, Llc Content distribution and mobile wireless mesh networks

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107959976A (en) * 2017-11-06 2018-04-24 海能达通信股份有限公司 Resource regulating method and Mesh network node in a kind of Mesh network
US20210037272A1 (en) * 2019-07-29 2021-02-04 Charter Communications Operating, Llc Content distribution and mobile wireless mesh networks
CN110795244A (en) * 2019-10-24 2020-02-14 浙江大华技术股份有限公司 Task allocation method, device, equipment and medium
CN111629050A (en) * 2020-05-22 2020-09-04 浙江大华技术股份有限公司 Node scheduling method and device, storage medium and electronic device
CN111858045A (en) * 2020-07-13 2020-10-30 苏州浪潮智能科技有限公司 Multitask GPU resource scheduling method, device, equipment and readable medium

Also Published As

Publication number Publication date
CN117014419A (en) 2023-11-07

Similar Documents

Publication Publication Date Title
US20230155821A1 (en) Secure shared key establishment for peer to peer communications
CN106209749B (en) Single sign-on method and device, and related equipment and application processing method and device
US9294468B1 (en) Application-level certificates for identity and authorization
US11102013B2 (en) Method and apparatus for providing secure communication among constrained devices
US9237021B2 (en) Certificate grant list at network device
US20170099148A1 (en) Securely authorizing client applications on devices to hosted services
JP5215289B2 (en) Method, apparatus and system for distributed delegation and verification
EP3226506A1 (en) Authorization processing method, device and system
CA3038450A1 (en) Method for oauth service through blockchain network, and device and server using the same
US9325697B2 (en) Provisioning and managing certificates for accessing secure services in network
KR20200123484A (en) Dynamic domain key exchange for authenticated D2D(Device toDevice) communication
US11100209B2 (en) Web client authentication and authorization
US20220123950A1 (en) Multi-party cloud authenticator
US20210167947A1 (en) System and method for processing secret sharing authentication
CN112152778B (en) Node management method and device and electronic equipment
EP3119056B1 (en) Machine to machine virtual private network
WO2022170821A1 (en) Service certificate management method and apparatus, system, and electronic device
CN110771087B (en) Private key update
CN113569210A (en) Distributed identity authentication method, equipment access method and device
CN110868466B (en) Storage method, system and equipment for distributed storage network
WO2023207567A1 (en) Network service method, master node, sub-node and computer-readable medium
CN108769058B (en) Access authentication method and device
CN113395289A (en) Authentication method, authentication device, electronic equipment and storage medium
US20200136835A1 (en) Sharing secure connection context via a trusted proxy
WO2023160632A1 (en) Method for setting cloud service access permissions of enclave instance, and cloud management platform

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23795000

Country of ref document: EP

Kind code of ref document: A1