CN108718236B - Data transmission method for internet self-organizing convergence - Google Patents
Data transmission method for internet self-organizing convergence Download PDFInfo
- Publication number
- CN108718236B CN108718236B CN201810489722.6A CN201810489722A CN108718236B CN 108718236 B CN108718236 B CN 108718236B CN 201810489722 A CN201810489722 A CN 201810489722A CN 108718236 B CN108718236 B CN 108718236B
- Authority
- CN
- China
- Prior art keywords
- proxy
- data
- message
- ccn
- program
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/302—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/568—Storing data temporarily at an intermediate stage, e.g. caching
Landscapes
- Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
技术领域technical field
本发明涉及一种通过自组织方式汇聚和优化点对多点/多点对多点的数据流传输的组织和实现方法,具体涉及一种互联网自组织汇流的数据传输方法。The present invention relates to an organization and implementation method for converging and optimizing point-to-multipoint/multipoint-to-multipoint data stream transmission in a self-organizing manner, in particular to a data transmission method for self-organizing confluence of the Internet.
背景技术Background technique
互联网将分布在世界范围内不同区域的各类计算终端链接在一起,通过IP协议实现任意两个终端之间的通信。尽管互联网上终端间的通信主要是以点对点方式进行的,在现实应用中,大部分互联网中的信息传播是以点对面(点对多点)的形式存在的。例如:人们喜爱访问热点网站、观看视频和新闻、购物、以自媒体方式向好友或关注者发布信息,以及广告定向发布等互联网上的商业行为,等等。随着电子信息技术的迅速发展,目前互联网已经几乎连入到所有行业的不同专业设备、以及数量众多的个人电子消费品终端中,每天产生着天文数字的数据流量。The Internet links together various computing terminals distributed in different regions of the world, and realizes the communication between any two terminals through the IP protocol. Although the communication between terminals on the Internet is mainly carried out in a point-to-point manner, in practical applications, most of the information dissemination in the Internet exists in a point-to-point (point-to-multipoint) form. For example, people like to visit popular websites, watch videos and news, go shopping, publish information to friends or followers through self-media, and conduct commercial activities on the Internet such as advertisement targeting, etc. With the rapid development of electronic information technology, the Internet has been connected to different professional equipment in almost all industries, as well as a large number of personal electronic consumer goods terminals, generating astronomical data traffic every day.
在基于IP包传输的点对点通信协议基础上,实现点对面的传输会存在传输效率问题,例如:信息从某一个终端出发,传向多个接收终端时,如果多个接受终端处于相同区域、或者在不同时间接收,都将导致信息传输会重复使用网络资源的浪费现象。因此,研究和开发高效率的点对面传输协议,一直是互联通信技术中的热点问题。On the basis of the point-to-point communication protocol based on IP packet transmission, the realization of point-to-point transmission will have transmission efficiency problems. For example, when information is transmitted from a certain terminal to multiple receiving terminals, if multiple receiving terminals are in the same area, or Receiving at different times will lead to a waste of information transmission and reuse of network resources. Therefore, researching and developing high-efficiency point-to-point transmission protocols has always been a hot issue in interconnected communication technology.
现有的点对面协议传输协议有IP多播、P2P以及CDN等方式。IP多播通过多播路由器对数据包进行复制和转发,保证数据包在每条链路上都只传输一次,可以很好的降低带宽消耗,然而IP多播必须要多播路由器的支持,目前互联网上大多数路由器都不是多播路由器;多播传输不可靠,一旦某个接受端数据包丢失,需要源端重传,其他接收端还会再次收到数据包,导致效率低下;另外多播不支持任何安全验证,不适合用于安全的通信。The existing point-to-point protocol transmission protocols include IP multicast, P2P, and CDN. IP multicast replicates and forwards data packets through multicast routers to ensure that data packets are transmitted only once on each link, which can reduce bandwidth consumption. However, IP multicast must be supported by multicast routers. Most routers on the Internet are not multicast routers; multicast transmission is unreliable. Once a receiver packet is lost, it needs to be retransmitted by the source, and other receivers will receive the packet again, resulting in low efficiency; in addition, multicast Does not support any security authentication and is not suitable for secure communication.
P2P(Peer to Peer)是一种点对点通信协议,所有节点地位平等,协同完成某一传输任务。P2P在节点分布不集中的情况下,传输大量跨越骨干网,易造成骨干网拥塞同时降低传输速率。统计数据显示早在2004年互联网中40%的带宽已被P2P程序占用(ParkerA.The True Picture of Peer-to-Peer File sharing[J].2004,4(5):55-60.),在2006年互联网中70%的带宽已被P2P程序占用(欧阳荣,雷振明.BitTorrent类型P2P系统模型研究与性能分析[J].北京邮电大学学报,2006,29(z2):113-117.),所以P2P程序的广泛使用正逐步吞噬珍贵的骨干网带宽资源,危害互联网其他业务的数据的传输。P2P (Peer to Peer) is a point-to-point communication protocol. All nodes have equal status and cooperate to complete a certain transmission task. In the case of non-centralized distribution of nodes in P2P, a large number of transmissions cross the backbone network, which is easy to cause the backbone network congestion and reduce the transmission rate. Statistics show that as early as 2004, 40% of the Internet bandwidth has been occupied by P2P programs (ParkerA.The True Picture of Peer-to-Peer File sharing[J].2004,4(5):55-60.), in In 2006, 70% of the Internet bandwidth was occupied by P2P programs (Ouyang Rong, Lei Zhenming. Model Research and Performance Analysis of BitTorrent P2P System [J]. Journal of Beijing University of Posts and Telecommunications, 2006, 29(z2): 113-117.) , so the widespread use of P2P programs is gradually eating up the precious backbone network bandwidth resources, jeopardizing the data transmission of other Internet services.
CDN(Content Delivery Network)通过在网络边缘大量部署缓存服务器,将某一区域用户的请求重定向到相同的缓存服务器来减少骨干网的压力。这种传输方式需要在部署大量高性能的CDN缓存服务器,所以需要大量昂贵的硬件资源。同时在一定范围内,CDN带宽越宽,服务性能越好,所以为了提供优质服务,CDN需要大量带宽资源,这进一步增加了CDN的部署成本。另外使用CDN方式传输时,用户直接从CDN缓存服务器获取数据,用户与用户之间不存在任何数据交换,所以CDN方式并没有利用用户的上传带宽,这是对现有资源的浪费。CDN (Content Delivery Network) reduces the pressure on the backbone network by deploying a large number of cache servers at the edge of the network and redirecting requests from users in a certain area to the same cache server. This transmission method requires the deployment of a large number of high-performance CDN cache servers, so it requires a lot of expensive hardware resources. At the same time, within a certain range, the wider the CDN bandwidth, the better the service performance. Therefore, in order to provide high-quality services, the CDN needs a large amount of bandwidth resources, which further increases the deployment cost of the CDN. In addition, when the CDN mode is used for transmission, the user directly obtains data from the CDN cache server, and there is no data exchange between the user and the user, so the CDN mode does not utilize the user's upload bandwidth, which is a waste of existing resources.
除此之外,在现有的互联网点对面的信息传输中,用户的信息安全保护是一个严重问题。首先,信息源终端(网站)往往是众所周知的,用户通过这种已知信息来访问信息源网站,比如用户通过浏览器登陆某个特定的网页,或者用户通过客户端程序访问该网站的资源。无论哪种方式用户的请求总是汇集到一起,并由专门的服务器集群记录和处理。由于IP地址的直连,用户直接将自己的地址信息暴露给服务器集群,服务器集群通过大数据存储海量用户的请求,并通过数据挖掘、社交网络分析等手段分析单个用户的行为,获取单个用户的隐私信息。其次,信息源终端具有强大的信息搜集能力,信息源终端可以通过一些手段掌握大量用户信息,比如用户安装的大量客户端程序,其代码并不公开透明,这些客户端程序可能存在窃听程序,窥探用户隐私并传送给信息源终端,信息源终端可以掌握用户的私密信息。上述两方面都说明了互联网上的信息提供源终端具有强大能力,针对信息接收者有不对称的信息优势,这也就意味着互联网通信中信息接收终端用户的利益容易受损。In addition, in the existing information transmission across the Internet, the user's information security protection is a serious problem. First, the information source terminal (website) is often well known, and the user accesses the information source website through this known information, for example, the user logs in to a specific web page through a browser, or the user accesses the resources of the website through a client program. Either way, user requests are always pooled together and recorded and processed by a dedicated server cluster. Due to the direct connection of IP addresses, users directly expose their address information to the server cluster. The server cluster stores massive user requests through big data, and analyzes the behavior of a single user through data mining, social network analysis and other means to obtain information about a single user. Privacy Information. Secondly, the information source terminal has powerful information collection capabilities, and the information source terminal can grasp a large amount of user information through some means, such as a large number of client programs installed by users, the code of which is not open and transparent, and these client programs may have eavesdropping programs, snooping User privacy is transmitted to the information source terminal, and the information source terminal can master the user's private information. The above two aspects all show that the information providing source terminal on the Internet has powerful capabilities and has asymmetric information advantages for the information receiver, which means that the interests of the information receiving terminal user in Internet communication are easily damaged.
发明内容SUMMARY OF THE INVENTION
针对现有互联网点对面等多方传输协议具有上述诸多问题,本发明的目的是提出一种互联网自组织汇流的数据传输方法。Aiming at the above-mentioned problems of the existing multi-party transmission protocols such as point-to-point Internet, the purpose of the present invention is to propose a data transmission method for self-organizing and converging of the Internet.
为实现上述目的,本发明采用的技术方案如下:For achieving the above object, the technical scheme adopted in the present invention is as follows:
一种互联网自组织汇流的数据传输方法,包括以下步骤:A data transmission method for Internet self-organization and convergence, comprising the following steps:
1)在每个用户终端上运行CA程序,在骨干网上设置多个CCN和至少一个CA&CM服务器;1) Run the CA program on each user terminal, and set up multiple CCNs and at least one CA&CM server on the backbone network;
CA程序用于生成数据请求、进行交互和进行数据传输;CA programs are used to generate data requests, to interact and to transfer data;
CCN用于接收CA程序的数据请求、CCN之间交互和匹配数据请求、合作生成一个数据的传输和存储方案;CCN上运行一个CA程序,在CCN上运行的CA程序对外声明自身代表CCN,CCN接收CA程序的数据请求、CCN之间交互和CCN的数据传输功能均是通过在CCN上运行的CA程序进行;CCN is used to receive data requests from CA programs, interact and match data requests between CCNs, and cooperate to generate a data transmission and storage scheme; a CA program is run on CCN, and the CA program running on CCN declares itself to represent CCN, CCN Receiving data requests from CA programs, interaction between CCNs and data transmission functions of CCNs are all performed through the CA programs running on CCNs;
CA&CM服务器用于验证CCN;CA&CM server is used to verify CCN;
2)对于同类型的数据请求,在同一区域网络范围内提出同类型的数据请求的CA程序之间通过交互选举产生代理CA,所述代理CA利用CA&CM服务器认证CCN合法后,向一个CCN提出其所代理的该类型数据请求;2) For data requests of the same type, proxy CAs are generated through interactive election between CA programs that propose data requests of the same type within the same area network. The type of data request that is proxied;
3)接收到所述该类型数据请求的CCN根据收到的传输请求安排传输和局部数据缓存方案;3) The CCN receiving the data request of this type arranges the transmission and local data buffering scheme according to the transmission request received;
4)如果存在数据传输任务,CCN通过所述代理CA向CA程序进行数据传输。4) If there is a data transmission task, the CCN transmits data to the CA program through the proxy CA.
本发明中进一步的改进在于,数据请求按照固定的报文格式封装成为消息片,并以消息片的形式予以发布和接收;所述消息片的数据属性包括消息代码、传输属性、用户数量、时间戳、描述、热点标志位和代理位;A further improvement in the present invention is that data requests are encapsulated into message pieces according to a fixed message format, and published and received in the form of message pieces; the data attributes of the message pieces include message code, transmission attribute, number of users, time stamp, description, hotspot flags and proxy bits;
所述消息代码为CA&CM服务器产生并可自由下载的对所有数据资源进行详细分类的一系列代码;The message codes are a series of codes that are generated by the CA&CM server and can be freely downloaded to classify all data resources in detail;
传输属性为数据请求所涉及的动作,包括发布、接收和查询;Transport properties are the actions involved in a data request, including publishing, receiving, and querying;
用户数量为互相联系的用户中具有该消息代码的用户数量;The number of users is the number of users who have the message code among the connected users;
时间戳是用户产生该消息片的时刻;The timestamp is the moment when the user generated the message piece;
描述用于补充以代码表示数据请求后遗漏的细节信息;Descriptions are used to supplement details that are missing after a data request is represented by a code;
热点标志位用于对数据请求进行标记,以及优化数据请求的传输和分布式存储方案;The hotspot flag is used to mark the data request, and to optimize the transmission and distributed storage scheme of the data request;
代理位是一个标志位,用于描述该数据请求是否产生了代理。The proxy bit is a flag bit used to describe whether the data request has generated a proxy.
本发明中进一步的改进在于,所述消息片的数据属性还包括偏好属性,用于记录用户的访问偏好。A further improvement in the present invention is that the data attribute of the message piece further includes a preference attribute, which is used to record the user's access preference.
本发明中进一步的改进在于,所述消息片由运行在用户终端上的CA程序采集用户发出的数据请求后封装而成。A further improvement in the present invention is that the message piece is packaged by the CA program running on the user terminal after collecting the data request sent by the user.
本发明中进一步的改进在于,在消息代码产生时,该消息代码所对应的消息片在热点标志位被标记为普通消息片;在消息代码产生后,如果在一定时间内网络数据请求中不再出现该消息代码,则该消息代码所对应的消息片在热点标志位被标记为临时消息片;在消息代码产生后,如果在一定时间内网络数据请求中出现该消息代码的次数超过设定的阈值,则该消息代码所对应的消息片在热点标志位被标记为热点消息片;被标记为临时消息片或热点消息片的消息片所对应的消息代码,如果在一定时间内数据请求中出现该消息代码且出现的次数不大于设定的阈值,则该消息片被标记为普通消息片。A further improvement in the present invention is that when the message code is generated, the message piece corresponding to the message code is marked as a common message piece in the hotspot flag; When the message code appears, the message piece corresponding to the message code is marked as a temporary message piece in the hotspot flag; after the message code is generated, if the number of times the message code appears in the network data request within a certain period of time exceeds the set value threshold, then the message piece corresponding to the message code is marked as a hot message piece in the hotspot flag; the message code corresponding to the message piece marked as a temporary message piece or a hot message piece, if it appears in the data request within a certain period of time The message code and the number of occurrences is not greater than the set threshold, then the message piece is marked as a common message piece.
本发明中进一步的改进在于,所述代理CA代理其他具有相同的数据请求的CA程序,代理CA在独立的数据请求存储列表中记录其所代理的CA程序地址信息及代理的用户数量,并创建CA代理表单。A further improvement in the present invention is that the proxy CA represents other CA programs with the same data request, and the proxy CA records the address information of the CA programs it represents and the number of users it represents in an independent data request storage list, and creates CA proxy form.
本发明中进一步的改进在于,所述代理CA包括局域网代理和多级的路由代理;A further improvement in the present invention is that the agent CA includes a local area network agent and a multi-level routing agent;
局域网代理代表所在局域网中所有请求相同数据请求的CA程序,向上一级网络发出数据请求;The local area network agent sends out data requests to the upper-level network on behalf of all CA programs in the local area network that request the same data request;
路由代理代表某一个路由器连接的所有用户的CA程序或次一级路由器网络的代理CA,向上一级网络发出数据请求;The routing agent sends data requests to the upper-level network on behalf of the CA program of all users connected to a router or the agent CA of the next-level router network;
最高一级的路由代理用于与次一级路由代理CA、CCN和CA&CM服务器之间进行通讯。The top-level routing agent is used to communicate with the next-level routing agents CA, CCN and CA&CM server.
本发明中进一步的改进在于,局域网代理的产生方法为:A further improvement in the present invention is that the generation method of the local area network agent is:
CA程序产生数据请求,并将数据请求广播给同一局域网内的其他CA程序,其他CA程序收到广播的数据请求后将该数据请求存储在自身的数据请求列表中;每个CA程序内部设置的代理CA选举模块实时检查数据请求列表,针对每种数据请求分别统计发出相同的数据请求的用户数量总和;当某种数据请求的用户数量总和大于设定的阈值后,代理CA选举模块选举该数据请求的代理CA;代理CA创建一条子进程,执行代理CA功能。The CA program generates a data request and broadcasts the data request to other CA programs in the same local area network. After other CA programs receive the broadcast data request, they store the data request in their own data request list; each CA program internally sets the data request. The proxy CA election module checks the data request list in real time, and counts the total number of users who have issued the same data request for each data request; when the total number of users for a certain data request is greater than the set threshold, the proxy CA election module elects the data The requested proxy CA; the proxy CA creates a child process to perform the proxy CA function.
本发明中进一步的改进在于,路由代理CA的产生方法为:A further improvement in the present invention is that the generation method of the routing agent CA is:
一个局域网中生成了局域网代理CA后,局域网代理CA通过不同局域网的CA程序的交互功能发现同一路由器下的其他局域网信息,并且交互局域网代理CA查询数据请求,获得其他局域网中的局域网代理CA信息;局域网代理CA分别与其他局域网代理CA建立连接并交互各自代理的数据请求,根据选举出局域网代理CA;After the local area network proxy CA is generated in a local area network, the local area network proxy CA discovers other local area network information under the same router through the interaction function of CA programs of different local area networks, and interacts with the local area network proxy CA to query data requests to obtain the local area network proxy CA information in other local area networks; The local area network proxy CA establishes connections with other local area network proxy CAs and exchanges the data requests of their respective proxies, and elects the local area network proxy CA according to the election;
连接在同一路由器下的次一级路由代理CA之间建立联系并交互各自所代理的数据请求后,选举出该路由器的路由代理CA。After establishing contact between the second-level routing agent CAs connected to the same router and exchanging the data requests they represent, the routing agent CA of the router is elected.
本发明中进一步的改进在于,若网络的路由器树形层次结构类似于树形结构,则对该结构进行剪枝操作,使其成为树形结构。A further improvement in the present invention is that, if the router tree hierarchical structure of the network is similar to a tree structure, the pruning operation is performed on the structure to make it a tree structure.
本发明中进一步的改进在于,CA代理表单被记录在代理CA中,用于记录该代理CA所代理的CA程序的IP地址或者次一级代理CA的主机IP地址及端口;CA代理表单同时记录代理CA的上一级代理CA的IP地址信息。A further improvement in the present invention is that the CA proxy form is recorded in the proxy CA for recording the IP address of the CA program represented by the proxy CA or the host IP address and port of the secondary proxy CA; the CA proxy form simultaneously records IP address information of the upper-level proxy CA of the proxy CA.
本发明中进一步的改进在于,在步骤4)中,CCN通过所述代理CA向CA程序进行数据传输的方法为:A further improvement in the present invention is that, in step 4), the method that CCN carries out data transmission to the CA program through the proxy CA is:
CCN将数据传输给代理CA,代理CA根据CA代理表单查找所代理的CA程序并向CA程序分发数据;The CCN transmits the data to the proxy CA, and the proxy CA finds the proxy CA program according to the CA proxy form and distributes the data to the CA program;
如果存在多级代理CA,则高一级代理CA通过CA代理表单查找所代理的下一级代理CA,并向下一级代理CA分发数据。If there are multi-level proxy CAs, the higher-level proxy CA looks up the proxy next-level proxy CA through the CA proxy form, and distributes data to the next-level proxy CA.
本发明中进一步的改进在于,数据请求被标记为一个特定的标识代码,CA代理表单采用该特定的标识代码标记或命名;在向代理CA传送数据时,在数据报文首部嵌入一个该特定的标识代码;代理CA在收到数据报文时,分析首部获得该特定的标识代码,并根据该特定的标识代码查找对应的CA代理表单。A further improvement in the present invention is that the data request is marked with a specific identification code, and the CA proxy form is marked or named with the specific identification code; when transmitting data to the proxy CA, a specific identification code is embedded in the header of the data message. Identification code: When the proxy CA receives the data message, it analyzes the header to obtain the specific identification code, and searches for the corresponding CA proxy form according to the specific identification code.
本发明中进一步的改进在于,CA程序中有一个健康检查模块,用于定时检查CA程序的代理CA是否存活,如果检测发现代理CA不存活,那么CA程序之间重新选举产生一个新的代理CA;A further improvement in the present invention is that there is a health check module in the CA program, which is used to regularly check whether the proxy CA of the CA program is alive. If the detection finds that the proxy CA is not alive, then the CA programs will re-elect to generate a new proxy CA. ;
代理CA所在的CA程序的健康检查模块定时检查它所代理的CA程序,如果代理CA发现其CA代理表单中的某个CA程序下线,则将这个CA程序从CA代理表单中删除。The health check module of the CA program where the proxy CA is located regularly checks the CA programs it represents. If the proxy CA finds that a CA program in its CA proxy form is offline, it will delete the CA program from the CA proxy form.
本发明中进一步的改进在于,局域网中新增的CA程序首先向局域网发送广播消息探测其发出的数据请求是否已经有代理CA:如果发现已有代理CA,则新增的CA程序自动将已有的代理CA作为自己的代理CA,同时主动向代理CA报告自己的存在,代理CA收到报告后在CA代理表单中添加此CA程序;如果没有发现代理CA,则在局域网中选举产生代理CA。A further improvement in the present invention is that the newly added CA program in the local area network first sends a broadcast message to the local area network to detect whether the data request sent by it already has an agent CA: if an existing agent CA is found, the newly added CA program will automatically The proxy CA acts as its own proxy CA, and at the same time actively reports its existence to the proxy CA. After the proxy CA receives the report, it adds the CA program in the CA proxy form; if no proxy CA is found, the proxy CA is elected in the local area network.
本发明中进一步的改进在于,新的代理CA产生后,新的代理CA利用不同局域网的CA程序的消息交互功能发现与其连在同一路由器下的其他局域网信息,并向这些局域网中的用户终端发起路由代理CA查找请求,找到路由代理CA后,向路由代理CA询问当前路由器下是否已经产生路由代理CA,如果已经产生路由代理CA,新的代理CA向已产生的路由代理CA发送消息,说明自己是新增的代理CA,已产生的路由代理CA在CA代理表单中增加所述新的代理CA的信息;如果没有产生路由代理CA,那么按照同一路由器下路由代理生成的方法产生新的路由代理CA。A further improvement in the present invention is that after a new proxy CA is generated, the new proxy CA uses the message interaction function of the CA programs of different local area networks to discover other local area network information connected to the same router, and initiates user terminals in these local area networks. The routing proxy CA searches the request. After finding the routing proxy CA, it asks the routing proxy CA whether a routing proxy CA has been generated under the current router. If a routing proxy CA has been generated, the new proxy CA sends a message to the generated routing proxy CA, indicating that it has It is a new proxy CA, and the generated routing proxy CA adds the information of the new proxy CA in the CA proxy form; if no routing proxy CA is generated, then generate a new routing proxy according to the method of routing proxy generation under the same router. CA.
本发明中进一步的改进在于,用户能够设置是否开启移动代理CA功能,如果没有开启移动代理CA功能,那么检测当前CA程序处在移动终端时,这个移动终端不会成为代理CA;如果用户主动开启移动代理CA功能,那么检测到当前CA程序处在移动终端时,该移动端也能够成为代理CA。A further improvement in the present invention is that the user can set whether to enable the mobile agent CA function. If the mobile agent CA function is not enabled, when it is detected that the current CA program is in the mobile terminal, the mobile terminal will not become the agent CA; Mobile proxy CA function, when it is detected that the current CA program is in a mobile terminal, the mobile terminal can also become a proxy CA.
本发明中进一步的改进在于,CA&CM服务器验证CCN的方法为:A further improvement in the present invention is that the method for the CA&CM server to verify the CCN is:
CA&CM服务器上预先生成成对的非对称加密公钥和私钥,合法的CCN有权利从CA&CM服务器上获取私钥,代理CA从CA&CM服务器上获取公钥,利用公钥和私钥是否匹配来验证CCN。A pair of asymmetric encryption public keys and private keys are pre-generated on the CA&CM server. A legal CCN has the right to obtain the private key from the CA&CM server. The proxy CA obtains the public key from the CA&CM server, and uses whether the public key and the private key match to verify. CCN.
本发明中进一步的改进在于,如果CCN认证不通过,则代理CA向远程的CA&CM服务器发出警报。A further improvement in the present invention is that if the CCN authentication fails, the proxy CA sends an alarm to the remote CA&CM server.
本发明中进一步的改进在于,若用户终端为资源生产者,则用户终端主动通过CA程序与CCN联系,并向CCN发送资源发布数据请求。A further improvement in the present invention is that, if the user terminal is a resource producer, the user terminal actively contacts the CCN through the CA program, and sends a resource release data request to the CCN.
本发明中进一步的改进在于,在步骤3)中,接收到所述该类型数据请求的CCN根据收到的传输请求安排传输和局部数据缓存方案的方法为:A further improvement in the present invention is that, in step 3), the method that the CCN receiving the data request of this type arranges the transmission and local data buffering scheme according to the received transmission request is:
1)CCN接收到代理CA发出的具有接收属性的数据请求后,该CCN寻找与具有接收属性的数据请求相匹配的具有发布属性的数据请求;1) After the CCN receives the data request with the receiving attribute sent by the agent CA, the CCN searches for the data request with the publishing attribute that matches the data request with the receiving attribute;
2)相匹配的具有发布属性的数据请求所在的CCN向发布具有发布属性的数据请求的CA程序发出请求,接收并缓存相应的资源;2) The CCN where the matching data request with the publishing attribute is located sends a request to the CA program that publishes the data request with the publishing attribute, and receives and caches the corresponding resources;
3)相匹配的具有发布属性的数据请求所在的CCN将缓存的相应的资源传输给步骤1中的CCN,该CCN将所接收的相应的资源缓存;3) the CCN where the matched data request with the release attribute is located transmits the cached corresponding resources to the CCN in
4)所述步骤1中的CCN将所缓存的相应的资源发送给提出具有接收属性的数据请求的代理CA。4) The CCN in the
与现有技术相比,本发明具有的有益效果:Compared with the prior art, the present invention has the following beneficial effects:
本发明是运行在用户端上的CA程序、骨干网上的CCN以及CA&CM服务器互相协作所组成的传输方案。针对每一个特定的消息传输请求,如果是发布类型传输请求,那么互联网中邻近的用户端上的CA程序将直接通过网络拓扑发现方法找到最近的运行在骨干网上的CCN,并将CA程序自身的资源信息封装成发布类型消息片发送给最近的运行在骨干网上的CCN。如果是接收/查询/偏好等类型传输请求,那么CA程序通过交互产生传输代理,同时传输代理之间亦交互产生更大区域范围内的高一级传输代理,此过程可以重复进行,以至于在一个区域网范围内汇聚产生该消息的最高级传输代理;汇聚后的传输代理向一个最近的运行在骨干网上的CCN提出传输请求,并利用CA&CM服务器认证CCN;运行在骨干网上的CCN根据收到的传输请求,向其他CCN发起资源信息查询请求,运行在骨干网上的其他CCN汇总资源信息并发送给汇聚后的传输代理,传输代理逐层将数据转发给次一级代理。通过CCN、传输代理在同一块区域下形成应用层的转发结构,本发明相对于现有传输方法,在以下方面具有显著优势:The present invention is a transmission scheme composed of the CA program running on the client, the CCN on the backbone network and the CA&CM server cooperating with each other. For each specific message transmission request, if it is a release type transmission request, the CA program on the adjacent client in the Internet will directly find the nearest CCN running on the backbone network through the network topology discovery method, and use the CA program's own Resource information is encapsulated into release type message pieces and sent to the nearest CCN running on the backbone network. If it is a type of transmission request such as reception/query/preference, then the CA program generates a transmission agent through interaction, and at the same time, the transmission agents also interact to generate a higher-level transmission agent in a larger area. This process can be repeated, so that in the The highest-level transmission agent that aggregates and generates the message within a local area network; the aggregated transmission agent makes a transmission request to the nearest CCN running on the backbone network, and uses the CA&CM server to authenticate the CCN; the CCN running on the backbone network receives The resource information query request is initiated to other CCNs, and other CCNs running on the backbone network aggregate resource information and send it to the aggregated transmission agent. The transmission agent forwards the data to the next-level agent layer by layer. The forwarding structure of the application layer is formed under the same area by the CCN and the transmission agent. Compared with the existing transmission method, the present invention has significant advantages in the following aspects:
1.由于传输过程只有源服务器与CCN之间少量的报文需要穿过骨干网,所以相比于P2P节点分布散乱,大量数据报文交互需要穿过骨干网的情况,本方法可以显著减少骨干网资源的占用,有利于提升Internet的整体传输质量。1. Since only a small number of packets between the source server and CCN need to pass through the backbone network during the transmission process, compared with the scattered distribution of P2P nodes, the interaction of a large number of data packets needs to pass through the backbone network. This method can significantly reduce the backbone network. The occupation of network resources is conducive to improving the overall transmission quality of the Internet.
2.由于传输过程中需要引入的新设备只有各个区域的CCN,它们是云计算节点,可以直接从云服务厂商租用,并且CCN只需要一般的带宽条件即可,所以相比于CDN传输中CDN缓存服务器需要超高带宽的情况,本方法可以节省大量部署成本。另外,由于本方法在用户之间形成树形结构,并利用树形结构完成数据分发,可以充分利用用户的上传带宽,所以本方法充分利用了现有网络资源。2. Since the new devices that need to be introduced in the transmission process are only CCNs in various regions, they are cloud computing nodes and can be rented directly from cloud service providers, and CCNs only require general bandwidth conditions, so compared to CDN transmission, CDN When the cache server needs ultra-high bandwidth, this method can save a lot of deployment costs. In addition, since the method forms a tree structure among users, and uses the tree structure to complete data distribution, the upload bandwidth of the users can be fully utilized, so the method fully utilizes the existing network resources.
3.本发明中每一个CA程序的IP信息只保留在与之相关的代理CA中,在数据传输中,数据的提供者接收者无法知道数据接收者的IP地址,有效地保护了用户的隐私信息,同时传输过程中所有参与传输的实体处于均势地位,不存在强势的信息体,杜绝了强势信息体搜集并分析用户喜好的行为,极大的保护了用户的隐私,提升了网络安全性能。这种传输协议不会影响广告定向推送等互联网现有的盈利模式。因为虽然没有强势节点可以分析单个用户行为,但是CA程序可以利用消息片中的偏好属性发出自己的信息需求期望,利用本发明的传输方案,同样实现定向推送等互联网现有的盈利模式。由于分析过程不针对任何单个用户,所以本发明并不会对用户的隐私产生危害。另外本方法的CA程序可以采用开源方式公开源码,由用户自主编译安装,杜绝嵌入木马程序的行为,有效保护用户隐私。3. The IP information of each CA program in the present invention is only kept in the agency CA related to it. In the data transmission, the provider receiver of the data cannot know the IP address of the data receiver, effectively protecting the privacy of the user. At the same time, during the transmission process, all entities participating in the transmission are in a balanced position, and there is no strong information body, which prevents the strong information body from collecting and analyzing user preferences, which greatly protects the privacy of users and improves network security performance. This transmission protocol will not affect the existing profit model of the Internet such as advertisement-targeted push. Because although there is no strong node that can analyze the behavior of a single user, the CA program can use the preference attribute in the message piece to send out its own information demand expectation, and the transmission scheme of the present invention can also realize the existing profit model of the Internet such as directional push. Since the analysis process is not directed to any single user, the present invention does not compromise the privacy of the user. In addition, the CA program of the method can use an open source method to open the source code, and the user can compile and install it independently, so as to prevent the behavior of embedding a Trojan program, and effectively protect the user's privacy.
附图说明Description of drawings
图1为本发明的系统结构图——整个系统的工作简图。图中,A、B、C、D、E、F、G、H、I、J、K、L,每个符号代表一个传输代理。CA 1、CA2……CAt,每个符号代表一个CA程序。FIG. 1 is a system structure diagram of the present invention—a working diagram of the entire system. In the figure, A, B, C, D, E, F, G, H, I, J, K, L, each symbol represents a transmission agent.
图2为本发明的系统结构图——同一局域网中的CA程序模型。FIG. 2 is a system structure diagram of the present invention—CA program model in the same local area network.
图3为本发明的系统结构图——同一路由器下的代理CA程序模型。FIG. 3 is a system structure diagram of the present invention—a proxy CA program model under the same router.
图4为本发明的系统结构图——三层网络结构模型。FIG. 4 is a system structure diagram of the present invention—a three-layer network structure model.
图5为本发明的系统结构图——Internet中的CCN和CA&CM服务器分布图。FIG. 5 is a system structure diagram of the present invention—a distribution diagram of CCN and CA&CM servers in the Internet.
图6为本发明的局域网代理产生原理。FIG. 6 is the generation principle of the local area network proxy of the present invention.
图7为本发明的网络拓扑发现原理。FIG. 7 shows the principle of network topology discovery of the present invention.
图8为本发明的路由代理产生原理。FIG. 8 is the generation principle of the routing proxy of the present invention.
图9为本发明的路由代理鉴定CCN身份是否合法的握手协议图。FIG. 9 is a handshake protocol diagram for the routing agent of the present invention to verify whether the CCN identity is legal.
图10为本发明的局域网中各CA程序相互广播的消息报文格式。FIG. 10 is the message message format broadcasted by each CA program in the local area network of the present invention.
图11为本发明的局域网代理声明主权报文。FIG. 11 is a local area network proxy claiming sovereignty message of the present invention.
图12为本发明的局域网代理请求其他局域网代理信息的报文。FIG. 12 is a message for the local area network proxy of the present invention to request information of other local area network proxy.
图13为本发明的其他子网用户响应局域网代理的信息报文。FIG. 13 is an information message of other subnet users responding to the local area network proxy of the present invention.
具体实施方式Detailed ways
下面结合附图对本发明进行详细说明。The present invention will be described in detail below with reference to the accompanying drawings.
本发明中的关键名词解释如下:Key terms in the present invention are explained as follows:
1)消息片(Message)1) Message slice (Message)
消息片由运行在用户终端上的CA程序采集用户发出的数据请求后封装而成。本发明利用一种被称为消息片的数据结构来封装网络用户期望的数据发布/查询/接收等请求。即数据请求按照固定的报文格式封装成为消息片,并以消息片的形式予以发布和接收,它包括的数据属性有但不仅限于:消息代码、传输属性、用户数量、时间戳、描述、热点标志位、代理位以及CRLF,具体描述如下:消息代码是一个统一的编码,它是用于对所有消息资源进行详细分类的一系列代码,由CA&CM服务器产生,并可以自由下载,是对所有数据资源进行详细分类的一系列代码,消息片可以用所属的消息代码来命名;传输属性记录了消息在传输中所涉及的动作,包括:发布/接收/查询/偏好等,可以继续扩充;用户数量是指针对特定的消息代码,互相联系的用户中具有该消息代码的用户数量;时间戳是用户产生该消息片的时刻;描述是对消息片的细节描述,用于补充以代码表示消息后遗漏的细节信息;热点标志位,用于对数据请求进行标记,以及用于优化数据请求的传输和分布式存储方案;代理位是一个标志位,用于描述该数据请求是否产生了代理;CRLF是一个回车换行符,用于表示一条消息片段的结束。The message piece is encapsulated by the CA program running on the user terminal after collecting the data request sent by the user. The present invention utilizes a data structure called a message slice to encapsulate the requests of data publishing/querying/receiving expected by network users. That is, the data request is encapsulated into message pieces according to a fixed message format, and published and received in the form of message pieces. The data attributes include but are not limited to: message code, transmission attribute, number of users, timestamp, description, hotspot The flag bit, agent bit and CRLF are described as follows: The message code is a unified code, which is a series of codes used to classify all message resources in detail. It is generated by the CA&CM server and can be downloaded freely. A series of codes for classifying resources in detail, message pieces can be named with the corresponding message codes; transmission attributes record the actions involved in the transmission of messages, including: publish/receive/query/preference, etc., which can be further expanded; the number of users It refers to the number of users who have the message code among the users who are in contact with each other for a specific message code; the timestamp is the moment when the user generates the message piece; the description is the detailed description of the message piece, which is used to supplement the omission after the message is indicated by the code The details of the data; the hotspot flag bit is used to mark the data request, and the transmission and distributed storage scheme used to optimize the data request; the proxy bit is a flag bit used to describe whether the data request has generated a proxy; CRLF is the A carriage return linefeed character used to indicate the end of a message fragment.
此外,为了继承现有互联网传输模式中,通过收集用户的访问偏好而定向发布数据,以改善用户体验的做法,消息片还可以包括一些反映用户访问偏好的数据属性。In addition, in order to inherit the practice of collecting users' access preferences and releasing data in a targeted manner to improve user experience in the existing Internet transmission mode, the message piece may also include some data attributes that reflect the user's access preferences.
2)CA程序2) CA program
CA(chinwag agent)程序在每一个连接在互联网的用户终端上运行,接受用户发出的消息发布/接收/查询/偏好等请求,将请求的消息封装成消息片。同时,CA程序还依据一定的规则联系网络中的其它具有相同消息代码的CA程序。在找到网络中所有具有相同消息代码的CA程序后,根据本发明中的代理CA选举方法,在这些CA程序间按照传输属性建立信息传输通道,以实现信息传输任务。这里需要特别说明的是,传输属性中的查询任务将由CCN通过分布式查询来完成。The CA (chinwag agent) program runs on each user terminal connected to the Internet, accepts requests from users to publish/receive/query/preference, etc., and encapsulates the requested messages into message pieces. At the same time, the CA program also contacts other CA programs with the same message code in the network according to certain rules. After finding all CA programs with the same message code in the network, according to the proxy CA election method in the present invention, an information transmission channel is established among these CA programs according to the transmission attribute, so as to realize the information transmission task. It should be noted here that the query task in the transmission attribute will be completed by CCN through distributed query.
3)路由拓扑层次结构3) Routing topology hierarchy
Internet由三个层次的网络组成,分别是骨干网、区域网和用户网络组成。骨干网是连接多个区域网的高速网络,区域网络为城市规模级的网络,而用户网络则通过多级路由器接入区域网络。三层结构都采用路由器耦合连接。用户网络处于网络拓扑最底层,大量用户处于私有地址构成的局域网中,通过一个网关与外界网络连接,网关与外网的多级路由连接组成网络路由拓扑结构并最终连接到骨干网,这样的多级网络拓扑组成区域网网络结构。典型的区域网结构包括核心层、汇聚层和接入层。核心层为数据汇聚层提供数据的高速转发,与骨干网互联。数据汇聚层对数据接入层接入的业务进行汇聚。接入层提供各种类型用户的就近接入。用户则通过接入层接入城域网结构。The Internet consists of three levels of networks, namely backbone network, regional network and user network. The backbone network is a high-speed network connecting multiple regional networks. The regional network is a city-scale network, and the user network is connected to the regional network through multi-level routers. The three-layer structure adopts router coupling connection. The user network is at the bottom of the network topology, and a large number of users are in the local area network composed of private addresses. They are connected to the external network through a gateway. The multi-level routing connection between the gateway and the external network forms a network routing topology and finally connects to the backbone network. The hierarchical network topology constitutes the regional network network structure. A typical area network structure includes core layer, aggregation layer and access layer. The core layer provides high-speed data forwarding for the data aggregation layer and interconnects with the backbone network. The data aggregation layer aggregates the services accessed by the data access layer. The access layer provides nearby access for various types of users. Users access the metropolitan area network structure through the access layer.
在这样的结构中,每一级路由器连接着一个或多个被次一级路由器所汇聚的网络、或具有各种用途的用户终端(如计算机、智能手机等)。对于CA程序如果需要在网络中寻找具有相同消息代码的其它CA程序,就必须首先穿透内网,并使用SNMP协议去寻找其它CA程序并建立互联关系,然后在此基础上通过分析各自的消息代码来建立信息传递机制。In such a structure, each level router is connected to one or more networks aggregated by the next level routers, or user terminals (such as computers, smart phones, etc.) with various purposes. If the CA program needs to find other CA programs with the same message code in the network, it must first penetrate the intranet, and use the SNMP protocol to find other CA programs and establish an interconnection, and then analyze the respective messages on this basis. code to establish the information transfer mechanism.
4)代理传输机制4) Proxy transmission mechanism
为了保护用户隐私和提升传输效率,在CA程序通过网关和逐级路由器传递消息的过程中,本发明在每一级网络中针对每一个消息代码,依据代理CA选举方法选举一个代理CA,用于代表该级网络中关于这个消息代码的所有CA程序,我们称之为代理CA,利用SNMP协议在上一级网络中寻找具有相同消息代码的代理CA并建立互联关系。在这个工程中,被代理的CA程序的IP地址不需要被告知到上一级网络通信中,从而保护了用户隐私;数据传输过程中,利用CCN和各级代理CA中的CA代理表单,对数据进行逐层转发,最终交付局域网代理,局域网代理利用局域网广播或局域网多播可以同时服务大量用户。In order to protect user privacy and improve transmission efficiency, in the process of the CA program transmitting messages through gateways and routers, the present invention selects a proxy CA according to the proxy CA election method for each message code in each level of network, which is used for On behalf of all CA programs about this message code in the network at this level, we call it agent CA, and use SNMP protocol to find the agent CA with the same message code in the upper-level network and establish an interconnection relationship. In this project, the IP address of the proxy CA program does not need to be notified to the upper-level network communication, thus protecting user privacy; during data transmission, the CA proxy form in CCN and proxy CAs at all levels is used to The data is forwarded layer by layer, and finally delivered to the LAN agent, which can serve a large number of users at the same time by using LAN broadcast or LAN multicast.
5)代理CA5) Proxy CA
代理CA代理其他(除了自身之外的其他CA)具有相同的数据请求的CA程序,代理CA在独立的数据请求存储列表中记录其所代理的CA程序地址信息及代理的用户数量,并创建CA代理表单。CA程序的另外一个功能是代理一个局域网内部、或者连接到同一个路由器下的其它具有相同代码消息的CA程序或代理CA,向上一级网络提出发布/接收/查询/偏好等请求。当CA程序承担这样的代理工作时,它同时被称为代理CA。代理CA也可以称作传输代理,因为传输数据时它的主要功能是负责数据的代理传输工作。同时代理CA选举方法即为局域网代理选举方法和路由代理选举方法。The proxy CA represents other CA programs with the same data request (other CAs except itself), and the proxy CA records the address information of the CA programs it represents and the number of users it proxy in the independent data request storage list, and creates a CA proxy form. Another function of the CA program is to act as a proxy for other CA programs or proxy CAs with the same code message within a local area network or connected to the same router, and to make requests for publishing/receiving/querying/preferences to the upper-level network. When a CA program undertakes such proxy work, it is also called a proxy CA. The proxy CA can also be called a transmission agent, because its main function is to be responsible for the proxy transmission of data when transmitting data. At the same time, the proxy CA election method is the local area network proxy election method and the routing proxy election method.
代理CA分成局域网代理和路由代理两种类型,简述如下。Proxy CA is divided into two types: LAN proxy and routing proxy, which are briefly described as follows.
局域网代理代表所在局域网中所有请求相同消息代码的CA程序,向上一级网络提出信息传输请求。每一个局域网中的CA程序采用局域网广播协议联系局域网中的其他运行CA程序的终端。CA程序共同分析所有CA程序产生的消息片的内容,当某个代码的消息片满足一定的要求时(例如期望执行接收/查询的CA程序数量达到某个阈值,将另行约定),CA程序之间会采用局域网广播协商选举传输该消息片的局域网代理。The local area network agent, on behalf of all the CA programs in the local area network requesting the same message code, submits a request for information transmission to the upper-level network. The CA program in each local area network uses the local area network broadcast protocol to contact other terminals running the CA program in the local area network. The CA program jointly analyzes the content of the message pieces generated by all CA programs. When the message pieces of a code meet certain requirements (for example, the number of CA programs expected to perform receiving/querying reaches a certain threshold, which will be agreed separately), the CA program will The local area network agent that transmits the message fragment will be elected by LAN broadcast negotiation.
路由代理是某一个路由器连接的所有用户的CA程序、或者代理次一级路由器网络的代理CA中,按照一定的规则选举出来的代理CA,用于代理上述CA程序/代理CA,并使用SNMP协议寻找上一级网络的CA程序/代理CA,建立通信联系,协商产生更高一级的代理CA、或建立代理传输机制。最高一级的路由代理用于与次一级路由代理CA、CCN和CA&CM服务器之间进行通讯。The routing agent is the CA program of all users connected to a router, or the agent CA that is the agent of the second-level router network. The agent CA is elected according to certain rules. It is used to proxy the above CA program/agent CA and uses the SNMP protocol. Find the CA program/agent CA of the upper-level network, establish a communication link, negotiate to generate a higher-level agent CA, or establish an agent transmission mechanism. The top-level routing agent is used to communicate with the next-level routing agents CA, CCN and CA&CM server.
6)CA代理表单6) CA proxy form
CA代理表单被记录在代理CA中,针对某一特定类型的消息,用于记录该代理CA所代理的次一级代理CA的主机IP地址,或者局域网内被代理的CA的IP地址以及该代理CA的上一级代理CA的主机IP地址(目的是使CA代理表单形成双链表结构,便于代理CA信息的查找)。CA代理表单只存储于代理CA中,每一级CA代理将产生一个CA代理表单。CA代理表单不随信息片段向上一级CA代理或CCN提交传输请求而传递给上一级主机,因而保护了用户的隐私信息。The CA proxy form is recorded in the proxy CA. For a specific type of message, it is used to record the host IP address of the secondary proxy CA represented by the proxy CA, or the IP address of the proxy CA in the local area network and the proxy CA. The host IP address of the upper-level proxy CA of the CA (the purpose is to make the CA proxy form form a double-linked list structure, which is convenient for proxy CA information search). The CA proxy form is only stored in the proxy CA, and each level of CA proxy will generate a CA proxy form. The CA proxy form is not transmitted to the upper-level host when the information fragment submits the transmission request to the upper-level CA agent or CCN, thus protecting the user's privacy information.
7)CCN云计算服务器7) CCN cloud computing server
CCN(Confluence Computing Node)云计算汇流节点服务器负责骨干网络上的信息传输和分布式存储任务。具体为CCN用于接收CA程序的数据请求、CCN之间交互和匹配数据请求、合作生成一个数据的传输和存储方案;CCN上运行一个CA程序,在CCN上运行的CA程序对外声明自身代表CCN,CCN接收CA程序的数据请求、CCN之间交互和CCN的数据传输功能均是通过在CCN上运行的CA程序进行。CCN (Confluence Computing Node) cloud computing confluence node server is responsible for information transmission and distributed storage tasks on the backbone network. Specifically, CCN is used to receive data requests from CA programs, interact and match data requests between CCNs, and cooperate to generate a data transmission and storage scheme; a CA program is run on CCN, and the CA program running on CCN declares itself on behalf of CCN. , the CCN receives the data request of the CA program, the interaction between the CCNs and the data transmission function of the CCN are all performed through the CA program running on the CCN.
8)CA&CM服务器8) CA&CM server
CA&CM服务器(Authentication&Coding Message)在本发明中被用于生成和维护消息代码,以及认证CCN服务器的合法性。The CA&CM server (Authentication&Coding Message) is used in the present invention to generate and maintain message codes, and to authenticate the validity of the CCN server.
在生成和维护消息代码方面,该服务器利用人工或大数据分析的方法,将互联网中的消息进行分类和编码。在消息代码产生时,该消息代码所对应的消息片在热点标志位被标记为普通消息片;在消息代码产生后,如果在一定时间内网络数据请求中不再出现该消息代码,则该消息代码所对应的消息片在热点标志位被标记为临时消息片;在消息代码产生后,如果在一定时间内网络数据请求中出现该消息代码的次数超过设定的阈值,则该消息代码所对应的消息片在热点标志位被标记为热点消息片;被标记为临时消息片或热点消息片的消息片所对应的消息代码,如果在一定时间内数据请求中出现该消息代码且出现的次数不大于设定的阈值,则该消息片被标记为普通消息片。In terms of generating and maintaining message codes, the server uses manual or big data analysis methods to classify and code messages in the Internet. When the message code is generated, the message piece corresponding to the message code is marked as a common message piece in the hotspot flag; after the message code is generated, if the message code does not appear in the network data request within a certain period of time, the message The message piece corresponding to the code is marked as a temporary message piece in the hotspot flag; after the message code is generated, if the number of times the message code appears in the network data request within a certain period of time exceeds the set threshold, the message code corresponds to The message piece is marked as a hot message piece in the hot spot flag; the message code corresponding to the message piece marked as a temporary message piece or a hot message piece, if the message code appears in the data request within a certain period of time and the number of occurrences is not equal. If it is greater than the set threshold, the message piece is marked as a normal message piece.
在认证CCN服务器的合法性方面,CA&CM服务器上预先生成成对的非对称加密公钥和私钥,合法的CCN有权利从CA&CM服务器上获取私钥,代理CA从CA&CM服务器上获取公钥,利用公钥和私钥是否匹配来验证CCN。如果CCN认证不通过,则代理CA向远程的CA&CM服务器发出警报。In terms of authenticating the legitimacy of the CCN server, a pair of asymmetric encryption public keys and private keys are pre-generated on the CA&CM server. The legitimate CCN has the right to obtain the private key from the CA&CM server, and the proxy CA obtains the public key from the CA&CM server. Whether the public and private keys match to verify the CCN. If the CCN authentication fails, the proxy CA sends an alarm to the remote CA&CM server.
图2、图3、图4和图5一起组成了本发明的系统结构图,本发明的互联网自组织汇流的数据传输方法的基本步骤如下:局域网的每一个用户端运行一个CA程序,CA程序通过信息采集模块获取用户需要发布/接收/查询/偏好等信息,并将这些信息与CA&CM服务器定义的消息代码封装成消息片并在局域网内广播,发送给局域网其他用户的CA程序;消息片在CA程序中生成然后消息片在CA程序之间交互。局域网中的多个CA程序针对每一种类型的消息片进行汇总,每一种类型的消息片在CA程序之间协商产生一个局域网代理,以负责此类型消息片的发布/接收/查询/偏好请求任务;局域网代理生成主要描述了如何在局域网中选举一个合适的代理CA用于代理局域网内的所有同一消息类型的CA。局域网代理通过SNMP协议分析本地网络拓扑,查找同一路由器下其他子网的局域网代理,局域网代理之间相互协商产生一个路由代理来负责该路由器下所有子网中针对该消息的发布/接收/查询/偏好等请求任务;路由代理生成主要描述了如何在同一路由器下的各个局域网代理中选举一个代理CA用于代理路由器下所有同一消息类型的所有局域网代理,以及路由代理如何按照路由拓扑层次结构逐级向上汇聚和生成。在路由拓扑层次结构下,次一级路由代理通过SNMP协议不断汇聚产生新的路由代理,最终找到一个同样运行CA程序的CCN;任何一个合法的CCN都能够被一个CA&CM服务器认证;当路由代理找到CCN时,CCN运行的CA声明自己是一台CCN服务器,路由代理将通过CA&CM服务器验证该CCN的合法性;验证通过后,路由代理将所代理的消息发布/接收/查询/偏好请求提交给CCN。CCN获取信息描述了CCN如何与路由代理通信完成信息获取。CCN将所采集的所有消息发布/接收/查询/偏好等请求汇聚在一起,在所有CCN间形成优化的消息传输和存储方案。CCN生成资源分布图描述了CCN之间如何进行分布式存储以生成资源分布图。通过各级代理CA和CCN合作,实现消息的发送和接收传输任务。传输方案生成描述了如何利用CCN、路由代理和局域网代理完成数据传输过程。Fig. 2, Fig. 3, Fig. 4 and Fig. 5 form the system structure diagram of the present invention together, and the basic steps of the data transmission method of the Internet self-organization and confluence of the present invention are as follows: each user end of the local area network runs a CA program, the CA program Obtain the information that users need to publish/receive/query/preference through the information collection module, and encapsulate the information and the message code defined by the CA&CM server into message pieces, broadcast them in the local area network, and send them to the CA programs of other users in the local area network; the message pieces are in the The message pieces are generated in CA programs and then exchanged between CA programs. Multiple CA programs in the local area network summarize each type of message piece, and each type of message piece is negotiated between CA programs to generate a local area network agent, which is responsible for publishing/receiving/querying/preference of this type of message piece The request task; Local area network proxy generation mainly describes how to elect a suitable proxy CA in the local area network to proxy all CAs of the same message type in the local area network. The LAN agent analyzes the local network topology through the SNMP protocol, and finds the LAN agents in other subnets under the same router. Request tasks such as preferences; routing agent generation mainly describes how to elect a proxy CA among all LAN agents under the same router to act as a proxy for all LAN agents of the same message type under the router, and how routing agents step by level according to the routing topology hierarchy Converge and generate upwards. Under the routing topology hierarchy, the next-level routing agent continuously aggregates and generates new routing agents through the SNMP protocol, and finally finds a CCN that also runs the CA program; any legal CCN can be authenticated by a CA&CM server; when the routing agent finds During CCN, the CA running on CCN declares itself as a CCN server, and the routing agent will verify the legitimacy of the CCN through the CA&CM server; after the verification is passed, the routing agent will submit the proxy message publishing/receiving/query/preference request to CCN . The CCN acquisition information describes how the CCN communicates with the routing agent to complete the information acquisition. CCN aggregates all the collected requests for message publishing/reception/query/preference to form an optimized message transmission and storage scheme among all CCNs. The resource distribution map generated by CCN describes how distributed storage is performed between CCNs to generate a resource distribution map. Through the cooperation between CAs and CCNs at all levels, the tasks of sending and receiving messages can be realized. Transmission scheme generation describes how to use CCN, routing agent and LAN agent to complete the data transmission process.
参见图1,本发明的互联网自组织汇流的数据传输方法,包括以下步骤:Referring to Fig. 1, the data transmission method of the Internet self-organized confluence of the present invention comprises the following steps:
1)在每个用户终端上运行CA程序,在骨干网上设置多个CCN和至少一个CA&CM服务器;1) Run the CA program on each user terminal, and set up multiple CCNs and at least one CA&CM server on the backbone network;
CA程序用于生成数据请求、进行交互和进行数据传输;CA programs are used to generate data requests, to interact and to transfer data;
CCN用于接收CA程序的数据请求、CCN之间交互和匹配数据请求、合作生成一个数据的传输和存储方案;CCN上运行一个CA程序,在CCN上运行的CA程序对外声明自身代表CCN,CCN接收CA程序的数据请求、CCN之间交互和CCN的数据传输功能均是通过在CCN上运行的CA程序进行;CCN is used to receive data requests from CA programs, interact and match data requests between CCNs, and cooperate to generate a data transmission and storage scheme; a CA program is run on CCN, and the CA program running on CCN declares itself to represent CCN, CCN Receiving data requests from CA programs, interaction between CCNs and data transmission functions of CCNs are all performed through the CA programs running on CCNs;
CA&CM服务器用于验证CCN;CA&CM server is used to verify CCN;
2)对于同类型的数据请求,在同一区域网络范围内提出同类型的数据请求的CA程序之间通过交互选举产生代理CA,所述代理CA利用CA&CM服务器认证CCN合法后,向一个CCN提出其所代理的该类型数据请求;2) For data requests of the same type, proxy CAs are generated through interactive election between CA programs that propose data requests of the same type within the same area network. The type of data request that is proxied;
3)接收到所述该类型数据请求的CCN根据收到的传输请求安排传输和局部数据缓存方案;3) The CCN receiving the data request of this type arranges the transmission and local data buffering scheme according to the transmission request received;
4)如果存在数据传输任务,CCN通过所述代理CA向CA程序进行数据传输。具体的,CCN将数据传输给代理CA,代理CA根据CA代理表单查找所代理的CA程序并向CA程序分发数据;如果存在多级代理CA,则高一级代理CA通过CA代理表单查找所代理的下一级代理CA,并向下一级代理CA分发数据。4) If there is a data transmission task, the CCN transmits data to the CA program through the proxy CA. Specifically, the CCN transmits the data to the proxy CA, and the proxy CA searches the proxy CA program according to the CA proxy form and distributes the data to the CA program; if there are multi-level proxy CAs, the higher-level proxy CA searches the proxy CA through the CA proxy form. The next-level proxy CA, and distribute data to the next-level proxy CA.
数据请求被标记为一个特定的标识代码,CA代理表单采用该特定的标识代码标记或命名;在向代理CA传送数据时,在数据报文首部嵌入一个该特定的标识代码;代理CA在收到数据报文时,分析首部获得该特定的标识代码,并根据该特定的标识代码查找对应的CA代理表单。The data request is marked with a specific identification code, and the CA proxy form is marked or named with the specific identification code; when transmitting data to the proxy CA, a specific identification code is embedded in the header of the data message; the proxy CA receives the specific identification code. In the data message, the specific identification code is obtained by analyzing the header, and the corresponding CA proxy form is searched according to the specific identification code.
本发明由三部分组成,包括:CA程序、CCN云计算汇流节点和CA&CM服务器。The invention consists of three parts, including: CA program, CCN cloud computing confluence node and CA&CM server.
1.CA程序1. CA program
在本发明中,每一个用户端将运行一个CA程序,CA程序功能包括以下几点:1)消息生成;2)消息交互;3)代理CA产生和操作;4)移动端识别。In the present invention, each client will run a CA program, and the functions of the CA program include the following points: 1) message generation; 2) message interaction; 3) proxy CA generation and operation; 4) mobile terminal identification.
1.1消息生成1.1 Message Generation
消息生成主要包括:1)获取任务。运行在客户端上的CA程序接受用户产生的数据传输请求任务,该请求任务包括信息的发布、接收以及查询等等。CA程序通常与浏览器程序关联,搜集用户产生的请求任务。2)信息编码。针对所获得的任务,根据统一的消息编码和消息报文格式(消息编码和消息报文格式这两者都可以从CA&CM服务器上下载)将消息编码后生成消息片。The message generation mainly includes: 1) Acquiring tasks. The CA program running on the client accepts data transmission request tasks generated by users, and the request tasks include information release, reception, and query. The CA program is usually associated with the browser program and collects the requested tasks generated by the user. 2) Information coding. For the obtained task, the message is encoded according to the unified message encoding and the message message format (both of the message encoding and the message message format can be downloaded from the CA&CM server) to generate a message slice.
1.2消息交互1.2 Message interaction
同一局域网内CA程序的消息交互:同一局域网内CA程序利用局域网广播将消息片发送给局域网内其他CA程序。不同局域网的CA程序的消息交互:一个局域网内CA程序通过探测网络拓扑获得直连在同一路由器或者通过多级路由器间接连的其他局域网信息,并利用TCP/IP协议建立连接并进行消息交互。Message interaction between CA programs in the same local area network: CA programs in the same local area network use local area network broadcast to send message pieces to other CA programs in the local area network. Message interaction between CA programs in different local area networks: CA programs in a local area network obtain information on other local area networks directly connected to the same router or indirectly through multi-level routers by detecting network topology, and use TCP/IP protocol to establish connections and perform message interaction.
1.3代理CA产生和操作1.3 Proxy CA generation and operation
代理CA是CA的一个功能模块。代理CA包括局域网代理和路由代理,分别用于代理同一局域网下和同一路由器下相同消息类型的消息片的传输任务。代理CA的各项任务包括:1)创建CA代理表单;2)健康检查与CA程序删除;3)CA程序新增。Proxy CA is a functional module of CA. The proxy CA includes a local area network proxy and a routing proxy, which are respectively used to proxy the transmission tasks of message pieces of the same message type under the same local area network and under the same router. The tasks of proxy CA include: 1) Create CA proxy form; 2) Health check and CA program deletion; 3) CA program addition.
局域网代理生成的方法如下:The method of generating the LAN proxy is as follows:
CA程序产生消息片,并将消息片广播给局域网内的其他CA程序,其他CA程序收到广播消息片后将其存储在自身的消息片列表中。每个CA程序内部有一个代理CA选举模块,代理CA选举模块负责实时检查消息片列表,统计具有相同消息代码的消息片的用户数量总和,当某个消息代码的消息片用户总数到达某个设定的阈值(阈值可在配置文件中动态设置)后,代理CA选举模块选举该类型消息片的代理CA。选举产生代理CA后,代理CA选举模块创建一条子进程执行代理CA功能。代理CA记录了某种类型的消息片的用户请求总数,将其记录在独立的消息片存储列表中。此外代理CA使用CA代理表单记录该局域网内所有产生该类型消息片的CA程序信息。The CA program generates message pieces and broadcasts the message pieces to other CA programs in the local area network. After receiving the broadcast message pieces, other CA programs store them in their own message piece lists. There is a proxy CA election module inside each CA program. The proxy CA election module is responsible for checking the list of message pieces in real time, and counting the total number of users of message pieces with the same message code. When the total number of users of message pieces of a certain message code reaches a certain device After a certain threshold (the threshold can be dynamically set in the configuration file), the proxy CA election module elects the proxy CA for this type of message piece. After the proxy CA is elected, the proxy CA election module creates a subprocess to execute the proxy CA function. The proxy CA keeps track of the total number of user requests for message fragments of a certain type, recording them in a separate message fragment storage list. In addition, the proxy CA uses the CA proxy form to record the information of all CA programs in the local area that generate message pieces of this type.
局域网代理生成原理如下:The generation principle of LAN proxy is as follows:
现在参照图6说明局域网代理产生的原理。第1步,CA程序首先打开UDP 8124端口作为局域网通信端口。第2步,CA程序获取用户请求。第3步,CA程序将用户请求封装成消息片。第4步,CA程序向局域网广播一条局域网代理查询报文。第5步,CA程序根据第4步的查询结果确定是否已经产生局域网代理,如果是,执行第6步,直接使用现有的局域网代理,局域网代理产生过程结束;如果否,执行第7步,各个CA程序定时产生一系列消息片,并将消息片封装成报文向局域网进行广播。第8步,CA程序收到广播的消息片报文后,在本地建立消息片列表。第9步,CA程序定时检查每一条消息片是否超时。如果超时,则进行第10步,CA程序清理过时的消息片。消息片的超时时间需要在配置文件里进行动态配置。清理完成后,如果没有任何消息片超时,则进行第11步,立即检查各消息片的累积数目是否到达某一阈值,如果超过这一阈值(阈值通过配置文件进行设定),则进行第12步。否则,回到第7步。第12步,局域网中一个CA程序检查到自己应该成为某个消息片的代理,接着进行第13步,对局域网广播一条声明主权的报文。第14步,当其他CA程序收到一条声明主权的报文时,检查本地的消息片列表,验证声明主权的CA程序是否合法。如果不合法,则进行第15步,回复一条否认报文,CA程序之间通过少数服从多数原则重新选取CA程序作为该消息片的局域网代理。如果合法,则进行第16步,回复一条确认报文,局域网代理认证成功。CA程序选举局域网代理时,同一局域网下的所有同类型CA中,可以选择消息片的时间戳最早的CA程序,或者带宽最大的CA程序,亦或者处理性能最强的CA程序为局域网代理,选举方法可根据实际网络环境灵活配置,只要同一地区采用一致的选举方法即可。在时间戳相同、或者带宽相同亦或者处理性能相同的情况下,选择IP地址最小的CA程序,作为局域网代理。Referring now to FIG. 6, the principle of local area network proxy generation will be described.
路由代理生成如下:The routing proxy is generated as follows:
如图3,同一路由器下往往会连接许多局域网,这里称每个局域网为一个子网,对于某种类型的消息片(即具有某一消息代码的消息片),都有可能会在子网中生成一个代理CA。路由代理生成就是在同一路由器下的各个代理CA中选择一个CA程序代理这个路由器下的所有代理CA,这样的CA程序称为路由代理。路由代理生成需要以下步骤:1)NAT端口映射:对于采用私有地址的局域网,需要使用NAT端口映射保证内网主机的双向通信。2)同一路由器下各局域网中的代理CA交互产生路由代理。3)下层路由代理按照路由器树形层次结构向上层汇聚:路由代理利用SNMP协议查找高一级路由器的所有子网信息,并按照步骤2生成更高一级的路由代理。路由代理按路由器树形层次结构往上汇聚直到发现最近的CCN。若网络的路由器树形层次结构类似于树形结构,则该结构进行剪枝操作,使其成为树形结构。As shown in Figure 3, many local area networks are often connected to the same router. Each local area network is called a subnet here. For a certain type of message piece (that is, a message piece with a certain message code), it may be in the subnet. Generate a proxy CA. Routing agent generation is to select a CA program to represent all agent CAs under the router from each agent CA under the same router. Such a CA program is called a routing agent. Routing proxy generation requires the following steps: 1) NAT port mapping: For LANs with private addresses, NAT port mapping needs to be used to ensure two-way communication between hosts on the intranet. 2) Agent CAs in each local area network under the same router interact to generate routing agents. 3) The lower-level routing agent converges to the upper layer according to the router tree hierarchy: the routing agent uses the SNMP protocol to find all subnet information of the higher-level router, and generates a higher-level routing agent according to
1)NAT端口映射1) NAT port mapping
对于采用公有地址的局域网,可直接与外网互相通信;而对于采用私有地址通信的局域网,由于私有地址不能直接在公网使用,所以需要采用一定的方式进行NAT内网端口映射。常用的NAT内网穿透方案有UDP打洞,或者STUN协议,但是这些方法都需要另一个已知的部署在公网环境下的服务器。本发明采用UPnP协议。UPnP协议工作原理:For LANs with public addresses, they can communicate with the external network directly; for LANs with private addresses, because private addresses cannot be used directly on the public network, a certain method needs to be used for NAT intranet port mapping. Commonly used NAT intranet penetration schemes include UDP hole punching or STUN protocol, but these methods require another known server deployed in the public network environment. The present invention adopts the UPnP protocol. How the UPnP protocol works:
1.首先控制点和设备都先获取IP地址后才能进行下一步的工作;1. First, both the control point and the device must obtain the IP address before proceeding to the next step;
2.控制点首先要寻找整个网络上的UPnP设备,同时网络上的设备也要宣告自身的存在;2. The control point must first look for UPnP devices on the entire network, and the devices on the network must also announce their own existence;
3.控制点要取得设备的描述,包括这些设备提供什么样的服务;3. The control point needs to obtain a description of the equipment, including what kind of services these equipment provide;
4.控制点发出动作信息给设备;4. The control point sends action information to the device;
5.控制点监听设备的状态,当状态改变时做出相应的处理动作;5. The control point monitors the state of the device, and takes corresponding processing actions when the state changes;
通过UPnP协议可以将本机的端口映射到一个外网端口,通过外网端口+外网IP就可以实现外网的相互访问。对于采用私有地址的局域网,每台主机将端口依次映射到从8124开始往后的端口范围。Through the UPnP protocol, the port of the machine can be mapped to an external network port, and the mutual access of the external network can be realized through the external network port + the external network IP. For LANs with private addresses, each host maps ports to the port range starting from 8124 and onwards.
2)同一路由器下各局域网中的代理CA交互产生路由代理2) Agent CAs in each local area network under the same router interact to generate routing agents
主要包括两部分内容:1)SNMP网络拓扑发现。2)基于网络拓扑发现的路由代理生成。一个局域网中的代理CA利用SNMP网络拓扑发现获得网络拓扑信息,然后基于发现的网络拓扑,代理CA查找同一路由器下其他局域网,并与其中的存活主机进行消息交互,产生路由代理生成。It mainly includes two parts: 1) SNMP network topology discovery. 2) Routing proxy generation based on network topology discovery. The proxy CA in a local area network uses SNMP network topology discovery to obtain network topology information, and then based on the discovered network topology, the proxy CA searches for other local area networks under the same router, and exchanges messages with the surviving hosts in it to generate routing proxy generation.
SNMP网络拓扑发现SNMP network topology discovery
下面结合图7说明SNMP网络拓扑发现过程,本过程基于图论BFS搜索,第1步,代理CA将自身所处的局域网的网关ip加入搜索队列。第2步,判断队列是否为空,如果是,进行第3步,采用图论链接法存储网络拓扑结构,结束。如果否,进行第4步,将队首元素(即路由器的IP地址)出列,对其发起SNMP请求。第5步,获得该路由器各个出口对应的子网信息、接口信息以及直连路由器信息以及MAC地址信息。第6步,与该路由器直连且尚未访问的路由器ip加入BFS搜索队列,然后回到第2步。The following describes the SNMP network topology discovery process with reference to Figure 7. This process is based on graph theory BFS search. In
基于网络拓扑发现的路由代理生成Routing proxy generation based on network topology discovery
下面参照图8说明路由代理产生的流程。第1步,当一个局域网中的CA程序成为消息片的代理CA时,代理CA通过SNMP协议读取该网关所连其他局域网信息;第2步,该代理CA从8124端口开始,探测其他局域网对外的公网地址;第3步,检查探测端口是否存活;如果探测端口不存活,那么进行第4步;第4步,端口号递增1,回到第2步,继续探测;如果探测到端口存活,则进行第5步;第5步,向该端口发送一条查询某种类型消息片的代理CA的请求;第6步,其他局域网中存活主机收到查询报文后,将该需求的代理CA信息返回,代理CA互存彼此信息;第7步,根据第6步返回的信息检查代理CA是否已经产生,如果已经产生代理CA,那么进行第8步,将已有的代理CA作为自己的代理CA;如果没有产生代理CA,那么进行第9步。第9步,检查其他局域网是否全部探测完成;如果没有完成,返回第2步;如果全部探测完成,则进行第10步;第10步,同一路由器下各局域网的代理CA彼此广播选出该路由器下所有子网的总代理,即路由代理;如果该路由器与其他路由器直连,那么通过SNMP协议发现,路由代理对发现的复杂网络拓扑图进行剪枝操作,形成典型的树形结构,接着路由代理按树的层次结构逐层汇聚,即重复第1步到第10步,继续找新的路由代理;经过几次逐层汇聚后到达CCN,最高一级的路由代理与CCN进行通信,完成身份认证、消息传递以及数据传输。Next, referring to FIG. 8 , the flow of generating the routing proxy will be described.
同一路由器下的所有代理CA中,消息片的时间戳最早的代理CA,或者带宽最大的代理CA,亦或者处理性能最强的代理CA选举为路由代理,选举方法可根据实际网络环境灵活配置,只要同一地区采用一致的选举方法即可。在时间戳相同、或者带宽相同亦或者处理性能相同的情况下,选择IP地址最小的代理CA,作为路由代理。Among all proxy CAs under the same router, the proxy CA with the earliest timestamp of the message fragment, or the proxy CA with the largest bandwidth, or the proxy CA with the strongest processing performance is elected as the routing proxy. The election method can be flexibly configured according to the actual network environment. As long as the same region adopts a consistent method of elections. When the time stamp is the same, the bandwidth is the same, or the processing performance is the same, the proxy CA with the smallest IP address is selected as the routing proxy.
3)下层路由代理按照路由器树形层次结构向上层汇聚3) The lower-level routing agent converges to the upper-level according to the router tree hierarchy
如图4,这是区域网络典型的三层网络架构模型,包括核心层、汇聚层和接入层。相邻两层路由之间的层次关系很明显,但是下层路由器往往上联多台路由器,这样在路由代理选举时,下层路由可能被多个路由代理同时代理,这是不希望出现的。为此提出一种剪枝方案,保证一台下层路由器在路由代理选举时只上联一台路由器。假设一台下层路由器上联的路由器IP集合为{ip1,ip2......ipn},对IP集合中的每一个IP求SHA-1的128位信息摘要,选择信息摘要最小的一个作为上联路由器。这样可以保证下层路由器较为均衡地上联到上层路由器。完成剪枝操作后,网络拓扑可以形成典型的树形结构,按照路由器代理选举策略逐层生成路由代理。最终汇聚到最顶层的核心路由器后,最顶层的路由代理与CCN进行交互。其中汇聚是指同一路由器下的代理CA通过选举机制选出新的代理CA,新的代理CA又采用相同选举机制按网络的树形结构向上逐层汇聚。As shown in Figure 4, this is a typical three-layer network architecture model of the regional network, including the core layer, the aggregation layer and the access layer. The hierarchical relationship between the adjacent two-layer routes is obvious, but the lower-layer routers are often connected to multiple routers. In this way, during the routing proxy election, the lower-layer routes may be proxied by multiple routing agents at the same time, which is undesirable. To this end, a pruning scheme is proposed to ensure that a lower-layer router only connects to one router during routing proxy election. Assuming that the set of router IPs connected to a lower-level router is {ip 1 , ip 2 ...... ip n }, calculate the 128-bit information digest of SHA-1 for each IP in the IP set, and select the smallest information digest one as an uplink router. This ensures that the lower-layer routers are connected to the upper-layer routers in a balanced manner. After the pruning operation is completed, the network topology can form a typical tree structure, and routing agents are generated layer by layer according to the router agent election policy. After finally converging to the top-level core router, the top-level routing agent interacts with the CCN. Convergence means that the proxy CA under the same router elects a new proxy CA through the election mechanism, and the new proxy CA uses the same election mechanism to converge layer by layer according to the tree structure of the network.
需要说明的是如果一个路由器A的上一级路由器B连接了多个与路由器A同级的路由器,那么路由器A的路由代理A查找同级路由器的路由代理过程如下:路由代理A利用SNMP协议查找其中一个同级路由器形成的子树的一个局域网,并探测局域网内任何一台存活主机,存活主机返回它的局域网代理,局域网代理又存储着它的上一级代理,因此根据代理表单具有的类似双向链表的特性,采用迭代查询,可以查到与路由器A同级的路由器的路由代理。It should be noted that if the upper-level router B of a router A is connected to multiple routers at the same level as router A, then the routing agent A of router A searches for the routing agent of the router at the same level as follows: The routing agent A uses the SNMP protocol to find A local area network of a subtree formed by one of the routers at the same level, and detects any surviving host in the local area network, the surviving host returns to its local area network proxy, and the local area network proxy stores its upper-level proxy, so according to the proxy form, it has similar Due to the characteristics of the doubly linked list, iterative query can be used to find the routing agents of routers at the same level as router A.
代理CA的各项任务包括:1)创建CA代理表单;2)健康检查与CA程序删除;3)CA程序新增。The tasks of proxy CA include: 1) Create CA proxy form; 2) Health check and CA program deletion; 3) CA program addition.
创建CA代理表单Create CA Proxy Form
CA代理表单被记录在代理CA中,针对某一个特定的消息,用于记录该代理CA所代理的CA程序的IP地址或者次一级代理CA的主机IP地址及端口;CA代理表单同时记录代理CA的上一级代理CA的IP地址信息,这样形成一个双链表结构,便于后续进行代理CA的查找。The CA proxy form is recorded in the proxy CA. For a specific message, it is used to record the IP address of the CA program represented by the proxy CA or the host IP address and port of the secondary proxy CA; the CA proxy form also records the proxy CA. The IP address information of the upper-level proxy CA of the CA, thus forming a double-linked list structure, which is convenient for the subsequent search of the proxy CA.
健康检查与CA程序删除Health Check and CA Program Removal
代理CA所在的CA程序中的健康检查模块定时探测代理CA的上一级代理是否存活,如果上一级代理不存活,那么该代理CA与其同一级代理CA重新协商产生一个新的代理CA。新的代理CA请求与它同一级其他代理CA,获得新的代理CA的上一级代理CA信息,并将新的代理CA信息报告给上一级代理CA,上一级代理CA更新CA代理表单。同时每个代理CA的健康检查模块也会定时检查其代理的所有次一级代理CA/CA程序,如果发现新增或者下线的次一级代理CA/CA程序,那么代理CA在CA代理表单中相应新增或删除次一级代理CA/CA程序的信息。The health check module in the CA program where the proxy CA is located regularly detects whether the upper-level proxy of the proxy CA is alive. If the upper-level proxy does not survive, the proxy CA renegotiates with the same-level proxy CA to generate a new proxy CA. The new proxy CA requests other proxy CAs at the same level as it, obtains the information of the upper-level proxy CA of the new proxy CA, and reports the new proxy CA information to the upper-level proxy CA, and the upper-level proxy CA updates the CA proxy form . At the same time, the health check module of each proxy CA will also regularly check all the secondary proxy CA/CA programs of its proxy. Correspondingly add or delete the information about the CA/CA program of the second-level agent.
CA程序新增CA program added
对于新增的CA程序,它会向局域网发送广播消息探测其代理的消息类型是否已经有代理CA,1)如果发现已有代理CA,那么新增的CA程序自动将已有的代理CA作为自己的代理CA,同时主动向代理CA报告自己的存在,代理CA收到报告后在CA代理表单中添加此CA程序;2)如果没有发现代理CA,那么利用局域网代理选举方法选举产生新的代理CA。然后,代理CA利用不同局域网的CA程序的消息交互功能发现与其连在同一路由器下的其他局域网信息,并向其中的存活主机交互路由代理查找消息,找到路由代理后向其询问当前路由器下是否已经产生路由代理,如果已经产生路由代理,代理CA向已产生的路由代理发送消息,说明自己是新增的代理CA,已产生的路由代理在CA代理表单中增加这个代理CA的信息;如果没有产生路由代理,那么按照同一路由器下不同局域网中产生路由代理的方法产生新的路由代理。For the newly added CA program, it will send a broadcast message to the local area network to detect whether the message type of its agent already has a proxy CA. 1) If an existing proxy CA is found, the newly added CA program will automatically use the existing proxy CA as its own. At the same time, the proxy CA will actively report its existence to the proxy CA. After the proxy CA receives the report, it will add the CA program in the CA proxy form; 2) If no proxy CA is found, use the local area network proxy election method to elect a new proxy CA. . Then, the proxy CA uses the message interaction function of the CA programs of different LANs to discover the information of other LANs connected to the same router, and searches for messages to the surviving hosts in the routing agent. After finding the routing agent, it asks whether the current router has Generate a routing agent. If a routing agent has been generated, the proxy CA sends a message to the generated routing agent, indicating that it is a new proxy CA, and the generated routing agent adds the information of the proxy CA in the CA proxy form; if not generated Routing agent, then generate a new routing agent according to the method of generating routing agents in different LANs under the same router.
1.4移动端识别1.4 Mobile identification
检测当前CA程序所在终端是否为移动终端,如果是,那么移动终端不会成为代理CA;由于移动端流量珍贵且电量偏低,不宜执行数据请求密集、流量消耗大的功能,所以当CA程序中有一个移动端识别模块,用户可在系统中设置是否开启移动代理CA功能,如果没有开启移动代理CA功能,那么检测当前CA程序处在移动终端时,这个移动终端不会成为代理CA。如果用户主动开启移动代理CA功能,那么检测到当前CA程序处在移动终端时,该移动端也可以成为代理CA。Detect whether the terminal where the current CA program is located is a mobile terminal. If so, the mobile terminal will not become a proxy CA; because the mobile terminal has precious traffic and low power, it is not suitable to perform functions with intensive data requests and large traffic consumption. There is a mobile terminal identification module, the user can set whether to enable the mobile agent CA function in the system. If the mobile agent CA function is not enabled, then when the current CA program is detected in the mobile terminal, the mobile terminal will not become the agent CA. If the user actively enables the mobile proxy CA function, when it is detected that the current CA program is in the mobile terminal, the mobile terminal can also become the proxy CA.
2.CCN云计算汇流节点服务器2. CCN Cloud Computing Convergence Node Server
CCN(Confluence Computing Node)云计算汇流节点服务器的负责骨干网络上的信息传输和分布式存储任务。具体为CCN接收CA程序的数据请求,CCN之间交互和匹配数据请求从而生成资源分布图,CCN之间合作生成一个数据的传输和存储方案。如图5,CCN上运行一个CA程序,在CCN上运行的CA程序对外声明自身代表CCN,CCN接收CA程序的数据请求、CCN之间交互和CCN的数据传输功能均是通过在CCN上运行的CA程序进行。CCN被安置在靠近骨干网的网络络上,根据骨干网的结构、地域分布、以及消息传输和分布特性,本发明需要布置一定数量的CCN。CCN (Confluence Computing Node) cloud computing confluence node server is responsible for information transmission and distributed storage tasks on the backbone network. Specifically, the CCN receives the data request of the CA program, interacts and matches the data request between the CCNs to generate a resource distribution map, and cooperates between the CCNs to generate a data transmission and storage scheme. As shown in Figure 5, a CA program runs on the CCN. The CA program running on the CCN declares itself to represent the CCN. The CCN receives the data request of the CA program, the interaction between the CCNs and the data transmission function of the CCN are all run on the CCN. The CA procedure is carried out. The CCN is arranged on the network close to the backbone network. According to the structure, geographical distribution, and message transmission and distribution characteristics of the backbone network, the present invention needs to arrange a certain number of CCNs.
CCN接收CA程序的数据请求CCN receives data requests from CA programs
CCN接收CA程序的数据请求前为了防止恶意节点冒充CCN窃取信息,需要对CCN进行身份认证,如图9,CCN身份认证的过程如下:Before the CCN receives the data request from the CA program, in order to prevent malicious nodes from impersonating the CCN to steal information, the CCN needs to be authenticated. As shown in Figure 9, the process of CCN identity authentication is as follows:
1)CA&CM服务器生成一组用于非对称加密的公钥和私钥;1) The CA&CM server generates a set of public and private keys for asymmetric encryption;
2)CA&CM服务器利用私密连接将私钥发给CCN,路由代理从CA&CM服务器下载对应的公钥;2) The CA&CM server uses the private connection to send the private key to the CCN, and the routing agent downloads the corresponding public key from the CA&CM server;
3)路由代理使用随机算法生成一个128位随机数,使用公钥加密,生成身份认证报文发送给待判定CCN。3) The routing agent uses a random algorithm to generate a 128-bit random number, encrypts it with the public key, generates an identity authentication message and sends it to the CCN to be determined.
4)CCN收到身份认证报文后,提取加密信息串,使用自身的私钥解密。解密后,把解密的信息生成身份认证响应报文发回给路由代理,路由代理对比响应报文中的串是否与自己生成的串一致。4) After CCN receives the identity authentication message, it extracts the encrypted information string and decrypts it with its own private key. After decryption, the decrypted information generates an identity authentication response message and sends it back to the routing agent, and the routing agent compares whether the string in the response message is consistent with the string generated by itself.
5)如果一致,身份验证通过;如果不一致,那么不通过,且向远程的CA&CM服务器发出警报。5) If it is consistent, the authentication is passed; if it is inconsistent, it is not passed, and an alarm is sent to the remote CA&CM server.
生成资源分布图Generate resource distribution map
CCN接受通过消息片汇聚产生的路由代理的请求消息片,每个消息片中的传输属性记录了消息在传输中所涉及的动作,包括:发布/接收/查询/偏好等。另外CCN也会接收来自资源生产者的发布类型消息片。CCN存储就近区域的消息片,所有的CCN一起联合记录了所有区域的消息片,这样在CCN中形成了所有资源生产者和消费者的信息图。The CCN accepts the request message fragments of the routing agent generated by the aggregation of message fragments, and the transmission attribute in each message fragment records the actions involved in the transmission of the message, including: publish/receive/query/preference, etc. In addition, CCN will also receive release type message pieces from resource producers. The CCN stores the message pieces of the nearby area, and all the CCNs jointly record the message pieces of all the areas, so that the information graph of all resource producers and consumers is formed in the CCN.
对于资源生产者,它们会把自身存储的资源封装成发布类型的消息片,并主动与最近的骨干网上的CCN联系,并将发布类型的消息片发送给CCN,CCN可以解析分布类型的消息片。即若用户终端为资源生产者,则用户终端主动通过CA程序与CCN联系,并向CCN发送资源发布数据请求。虽然资源生产者与CCN主动联系,但实际上资源生产者将自身IP信息暴露给CCN并不会有太大影响,因为对发布信息内容进行大数据分析并没有太大商业价值,所以资源生产者无需担心大数据分析带来的隐私泄露问题。For resource producers, they will encapsulate their own stored resources into release-type message pieces, and actively contact the CCN on the nearest backbone network, and send the release-type message pieces to CCN, which can parse distribution-type message pieces. . That is, if the user terminal is a resource producer, the user terminal actively contacts the CCN through the CA program, and sends a resource release data request to the CCN. Although resource producers actively contact CCN, in fact, resource producers exposing their own IP information to CCN will not have much impact, because big data analysis of published information content does not have much commercial value, so resource producers There is no need to worry about privacy leaks caused by big data analysis.
在上述传输过程中,与目前互联网中通过访问用户的偏好进行用户体验优化的信息依然可以以一定的方式封装在上述的消息片段中,但这种信息是:1)完全由用户主导是否添加;2)在多层代理CA传输过程中隐去了用户的终端IP地址,从而避免了用户的私密信息被过度挖掘。In the above-mentioned transmission process, the information that optimizes the user experience by accessing the user's preferences in the current Internet can still be encapsulated in the above-mentioned message fragments in a certain way, but this information is: 1) Whether it is added entirely by the user; 2) In the process of multi-layer proxy CA transmission, the user's terminal IP address is hidden, thereby avoiding excessive mining of the user's private information.
合作生成一个数据的传输和存储方案:Collaborate to generate a data transfer and storage solution:
1)一个特定的CCN接收到代理CA发出的具有接收属性的数据请求后,该特定的CCN通过CCN之间形成的分布式系统寻找与具有接收属性的数据请求相匹配的具有发布属性的数据请求;1) After a specific CCN receives the data request with the receiving attribute sent by the proxy CA, the specific CCN searches for the data request with the publishing attribute that matches the data request with the receiving attribute through the distributed system formed between the CCNs. ;
2)相匹配的具有发布属性的数据请求所在的CCN向发布具有发布属性的数据请求的CA程序发出请求,接收并缓存相应的资源;2) The CCN where the matching data request with the publishing attribute is located sends a request to the CA program that publishes the data request with the publishing attribute, and receives and caches the corresponding resources;
3)相匹配的具有发布属性的数据请求所在的CCN将缓存的相应的资源传输给所述特定的CCN,所述特定的CCN将所接收的相应的资源缓存;3) The CCN where the matched data request with the publishing attribute is located transmits the cached corresponding resources to the specific CCN, and the specific CCN caches the received corresponding resources;
4)该特定的CCN将所缓存的相应的资源发送给提出具有接收属性的数据请求的代理CA。4) The specific CCN sends the cached corresponding resource to the proxy CA that made the data request with the receive attribute.
3.CA&CM服务器3. CA&CM server
CA&CM服务器(Authentication&Coding Message)在本文中被用于生成和维护消息代码,以及认证CCN的合法性。The CA&CM server (Authentication&Coding Message) is used in this paper to generate and maintain message codes, and to authenticate the validity of CCN.
在生成和维护消息代码方面,该服务器利用人工或大数据分析的方法,将互联网中的消息进行分类和编码。编码的消息分成2类:1)基本消息,该类消息代码将永久有效,代表互联网中最常用的消息;2)临时消息,临时消息代码是为应对特殊情况而临时产生的,如果在一段时间后,网络数据传输中不再出现某种代码的临时消息,该临时消息将被标记,该标记将用于优化信息传输和分布式存储方案。这是通过消息编码的热点标志位实现的,根据网络中信息传输情况统计分析得到的结果,对当前信息传输流量大的消息代码进行标记,用于优化消息的传输和分布式存储方案。In terms of generating and maintaining message codes, the server uses manual or big data analysis methods to classify and code messages in the Internet. The encoded messages are divided into 2 categories: 1) Basic messages, which will be permanently valid and represent the most commonly used messages in the Internet; 2) Temporary messages, temporary message codes are temporarily generated in response to special circumstances, if the message code is temporarily valid for a period of time After that, the temporary message of some kind of code no longer appears in the network data transmission, the temporary message will be marked, and the marking will be used to optimize the information transmission and distributed storage scheme. This is realized by the hot spot flag bit of message encoding. According to the results of statistical analysis of information transmission in the network, the message codes with large current information transmission traffic are marked to optimize message transmission and distributed storage scheme.
在认证CCN的合法性方面,CA&CM服务器上可以生成成对的非对称加密秘钥,CCN有权通过私密链接登陆CA&CM服务器获取私钥,当路由代理需要对CCN进行合法性认证时,路由代理可以请求CA&CM服务器获取该CCN对应的公钥,如果公钥与私钥可以匹配,那么CCN认证通过;否则,CCN认证失败。In terms of verifying the legitimacy of CCN, the CA&CM server can generate paired asymmetric encryption keys. CCN has the right to log in to the CA&CM server through a private link to obtain the private key. When the routing agent needs to verify the validity of the CCN, the routing agent can Request the CA&CM server to obtain the public key corresponding to the CCN. If the public key and the private key can match, the CCN authentication passes; otherwise, the CCN authentication fails.
代理传输机制proxy transport mechanism
资源数据可能直接由CA程序直接传输,也可能由CCN+代理CA辅助传输。基本原则是如果请求数量较小时由CA程序直接传输,请求数量很大时由CCN+代理CA辅助传输。通过构建一个代价模型,综合考虑传输成本、CCN成本以及收益,以选取最优的传输方式。当收益/(传输成本+CCN成本)的值高于某一阈值(在配置文件中动态设置)时采用CCN+代理CA辅助分发;当其值小于阈值时采用CA程序直接传输。其中收益是指数据传输带来的经济价值,传输成本是指代理CA树形分发的资源消耗成本,CCN成本是指配置CCN的硬件以及带宽成本。1)当采用CA程序直接传输时,资源消费者规模较小,资源消费者直接向资源生产者的CA程序发起请求获取资源;2)当采用CCN+代理CA辅助传输时,即采用代理传输机制:资源消费者产生传输属性为接收的消息报文,并通过产生局域网代理和路由代理逐步汇聚到CCN 1处。如果CCN1上缓存了该资源数据,那么CCN1直接将资源数据转发给路由代理;如果CCN1没有缓存该资源数据,那么CCN 1请求所有CCN,查找相关消息片的资源生产者信息,如果发现资源信息在CCN2处,那么CCN1向CCN2发起传输请求,CCN2如果本身存储了资源,那么直接将资源转发给CCN1;否则,CCN2向资源生产者发起请求,并在CCN2本地缓存,同时转发给CCN1。CCN1缓存收到的资源数据,同时CCN1将资源数据转发给路由代理,路由代理收到来自资源生产者的资源数据后,路由代理根据代理表单将资源往下层代理CA发送,具体为发送数据时在数据报文首部嵌入一个消息代码,每一级代理CA收到数据时,分析首部获得消息代码,代理CA根据消息代码查找对应的CA代理表单,并向次一级代理CA/CA程序交付数据,直至到达局域网代理,最终局域网代理负责将消息分发给资源消费者。需要说明的是资源的分发过程是可以使用一定的算法进行优化的。Resource data may be directly transmitted by the CA program, or may be assisted by the CCN+ proxy CA. The basic principle is that if the number of requests is small, the CA program will transmit them directly, and when the number of requests is large, the CCN+ proxy CA will assist in the transmission. By constructing a cost model, the transmission cost, CCN cost and benefit are comprehensively considered to select the optimal transmission method. When the value of revenue/(transmission cost + CCN cost) is higher than a certain threshold (set dynamically in the configuration file), CCN+ proxy CA is used for auxiliary distribution; when its value is less than the threshold, CA program is used for direct transmission. The benefit refers to the economic value brought by data transmission, the transmission cost refers to the resource consumption cost of proxy CA tree distribution, and the CCN cost refers to the hardware and bandwidth cost of configuring the CCN. 1) When the CA program is used for direct transmission, the scale of resource consumers is small, and the resource consumer directly initiates a request to obtain resources from the CA program of the resource producer; 2) When the CCN + proxy CA assisted transmission is used, the proxy transmission mechanism is used: The resource consumer generates a message packet whose transmission attribute is received, and gradually aggregates it to the
通信系统报文格式Communication system message format
下面说明本发明中使用的主要通信报文格式,包括局域网CA程序通信报文格式和中间路由层通信报文格式。The main communication message formats used in the present invention are described below, including the local area network CA program communication message format and the intermediate routing layer communication message format.
局域网代理生成通信报文格式:The format of the communication message generated by the LAN agent:
图10为本发明的局域网中CA程序相互广播的消息报文格式。这是CA程序获得用户产生的消息之后将其封装成消息片,并定时广播发送给周围CA程序的报文。FIG. 10 is the message message format of the mutual broadcast of CA programs in the local area network of the present invention. This is a message that the CA program obtains and then encapsulates the message generated by the user into message pieces, and periodically broadcasts the message to the surrounding CA programs.
图11为本发明的局域网代理广播报文。这是某CA程序发现自己成为备选代理CA时,向局域网其他CA程序声明消息片主权的报文。FIG. 11 is a local area network proxy broadcast message of the present invention. This is a message that declares the sovereignty of message slices to other CA programs in the local area network when a CA program finds itself as an alternate proxy CA.
路由代理生成通信报文格式:The routing agent generates the communication packet format:
图12为本发明的一个代理CA请求其他代理CA的报文。这是一个代理CA寻找同一路由器下其他代理CA时对其他子网CA发起的请求报文。FIG. 12 is a message of a proxy CA requesting other proxy CAs according to the present invention. This is a request message sent by a proxy CA to other subnet CAs when it searches for other proxy CAs under the same router.
图13为本发明的其他子网主机响应代理CA信息报文。FIG. 13 shows other subnet hosts responding to the proxy CA information message according to the present invention.
本发明为运行在用户端上的CA程序、CCN以及CA&CM服务器互相协作所组成的传输方案。针对每一个特定的消息传输请求,互联网中邻近的用户端上的CA程序将通过交互产生其传输代理,同时传输代理之间亦交互产生更大区域范围内的高一级传输代理,此过程可以重复进行,以至于在一个骨干网区域范围内汇聚产生该消息的最高级传输代理;汇聚后的传输代理向一个运行在骨干网上的CCN提出传输请求,并利用CA&CM服务器认证CCN;运行在骨干网中的所有CCN根据收到的传输请求自适应地安排传输和局部数据缓存方案,以优化数据传输效率;本发明可以在不改变现有网络架构的前提下,以较低的骨干网带宽占用和较低的部署成本下实现不错的传输性能,并且参与传输的所有节点保持均势地位,极大的保护了用户的隐私。The present invention is a transmission scheme formed by mutual cooperation between CA program, CCN and CA&CM server running on the client. For each specific message transmission request, the CA program on the adjacent client in the Internet will generate its transmission agent through interaction, and at the same time, the transmission agents will also interact to generate a higher-level transmission agent in a larger area. This process can Repeat, so that the highest-level transport agent that generates the message is aggregated within a backbone network area; the converged transport agent makes a transmission request to a CCN running on the backbone network, and uses the CA&CM server to authenticate the CCN; running on the backbone network All CCNs in the network adaptively arrange transmission and local data buffering schemes according to the received transmission requests to optimize data transmission efficiency; the present invention can use lower backbone network bandwidth occupation and lower bandwidth on the premise of not changing the existing network architecture. It achieves good transmission performance at a low deployment cost, and all nodes participating in the transmission maintain a balanced position, which greatly protects the privacy of users.
本发明使用CA程序、CCN和CA&CM服务器连接互联网中的信息发布者和信息接收者,同时利用代理传输机制减少了骨干网带宽的占用,另外CCN只需要从云服务厂商租用,且无需高带宽的云服务器,因此本发明的部署成本较低。因此本发明可以在较低的骨干网带宽占用和较低的部署成本下实现点对面/面对面传输。与此同时,本发明将信息传输过程中的所有参与实体处于均势地位,杜绝了目前互联网络信息传输中强势个体过度分析和利用用户私密信息的行为,极大的保护了用户的隐私,提升了网络安全性能。The invention uses the CA program, CCN and CA&CM server to connect the information publishers and information receivers in the Internet, and at the same time uses the proxy transmission mechanism to reduce the occupation of the backbone network bandwidth. Cloud server, so the deployment cost of the present invention is lower. Therefore, the present invention can realize point-to-face/face-to-face transmission with lower backbone network bandwidth occupation and lower deployment cost. At the same time, the present invention puts all participating entities in a balanced position in the process of information transmission, eliminates the excessive analysis and use of users' private information by powerful individuals in the current Internet information transmission, greatly protects users' privacy, and improves network security performance.
Claims (21)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201810489722.6A CN108718236B (en) | 2018-05-21 | 2018-05-21 | Data transmission method for internet self-organizing convergence |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201810489722.6A CN108718236B (en) | 2018-05-21 | 2018-05-21 | Data transmission method for internet self-organizing convergence |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN108718236A CN108718236A (en) | 2018-10-30 |
| CN108718236B true CN108718236B (en) | 2020-08-18 |
Family
ID=63900170
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201810489722.6A Active CN108718236B (en) | 2018-05-21 | 2018-05-21 | Data transmission method for internet self-organizing convergence |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN108718236B (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US12192304B2 (en) | 2023-02-27 | 2025-01-07 | Insight Direct Usa, Inc. | Systems and methods for edge caching |
Families Citing this family (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN110213063B (en) * | 2019-06-10 | 2020-09-18 | 南京大学 | An application layer multicast system and method suitable for data center network |
| CN114020207B (en) * | 2021-09-06 | 2024-08-02 | 西安电子科技大学 | Tree structure data insertion method for distributed storage network |
| CN116233247B (en) * | 2023-04-25 | 2023-07-21 | 合肥智鼎科技服务有限公司 | A data transmission processing system with preprocessing performance |
| CN116319111B (en) * | 2023-05-24 | 2023-08-01 | 北京中超伟业信息安全技术股份有限公司 | A data chain transmission method and system based on evolutionary algorithm |
Family Cites Families (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2010133035A1 (en) * | 2009-05-21 | 2010-11-25 | 华为终端有限公司 | Method, system and server for processing point to multipoint push message |
| CN102647335B (en) * | 2011-02-22 | 2015-03-11 | 中国移动通信集团公司 | Data routing method, device and system |
| CN102075444B (en) * | 2011-02-28 | 2013-10-02 | 北京邮电大学 | Network system and method for guaranteeing multi-type service quality |
| US9112790B2 (en) * | 2013-06-25 | 2015-08-18 | Google Inc. | Fabric network |
| KR20160110913A (en) * | 2013-11-11 | 2016-09-22 | 아달롬 인코포레이티드 | Cloud service security broker and proxy |
| CN104158891B (en) * | 2014-08-21 | 2016-02-03 | 腾讯科技(深圳)有限公司 | A kind of trans-regional data transmission method, device, system and server |
| CN106101055A (en) * | 2016-04-29 | 2016-11-09 | 乐视控股(北京)有限公司 | The data access method of a kind of multiple database and system thereof and proxy server |
| CN106331175B (en) * | 2016-10-27 | 2019-12-27 | 苏州云融信息技术有限公司 | Cloud AP-oriented multi-control-agent unified management system and method |
-
2018
- 2018-05-21 CN CN201810489722.6A patent/CN108718236B/en active Active
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US12192304B2 (en) | 2023-02-27 | 2025-01-07 | Insight Direct Usa, Inc. | Systems and methods for edge caching |
Also Published As
| Publication number | Publication date |
|---|---|
| CN108718236A (en) | 2018-10-30 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN108718236B (en) | Data transmission method for internet self-organizing convergence | |
| Chai et al. | Cache “less for more” in information-centric networks | |
| Jacobson et al. | Networking named content | |
| Yu et al. | A key management scheme for secure communications of information centric advanced metering infrastructure in smart grid | |
| Carofiglio et al. | From content delivery today to information centric networking | |
| Koponen et al. | A data-oriented (and beyond) network architecture | |
| Conrad et al. | A Survey on Tor and I2P | |
| Ding et al. | A survey on future Internet security architectures | |
| JP5536362B2 (en) | Method for facilitating communication in a content-centric network | |
| US8504718B2 (en) | System and method for a context layer switch | |
| Jia et al. | The collaboration for content delivery and network infrastructures: A survey | |
| Mori | Secure caching scheme by using blockchain for information-centric network-based wireless sensor networks | |
| Barakabitze et al. | A survey on naming, name resolution and data routing in information centric networking (ICN) | |
| Nour et al. | Nncp: A named data network control protocol for iot applications | |
| Guo et al. | Enabling blockchain applications over named data networking | |
| CN115669075A (en) | Private network device and private local area network connection, content discovery, data transmission and control method | |
| Xu et al. | Powering smart homes with information-centric networking | |
| Dutta et al. | Information Centric Networks (ICN) | |
| Yu et al. | CCN-AMI: Performance evaluation of content-centric networking approach for advanced metering infrastructure in smart grid | |
| Roos | Identity management on the blockchain | |
| Song et al. | Smart collaborative connection management for identifier-based network | |
| Jeet et al. | A survey on interest packet flooding attacks and its countermeasures in named data networking | |
| CN111541710B (en) | A kind of authentication and authorization method of data content in network and computer-readable storage medium | |
| Chen et al. | Optimizing content routers deployment in large‐scale information centric core‐edge separation Internet | |
| Srinivasan et al. | XTRA—eXtended bit-Torrent pRotocol for Authenticated covert peer communication: Authenticated covert P2P communication |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |