[go: up one dir, main page]

CN117201504A - Edge node network data flow direction control method, system, equipment and medium - Google Patents

Edge node network data flow direction control method, system, equipment and medium Download PDF

Info

Publication number
CN117201504A
CN117201504A CN202311476338.XA CN202311476338A CN117201504A CN 117201504 A CN117201504 A CN 117201504A CN 202311476338 A CN202311476338 A CN 202311476338A CN 117201504 A CN117201504 A CN 117201504A
Authority
CN
China
Prior art keywords
edge node
node
edge
user
nodes
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202311476338.XA
Other languages
Chinese (zh)
Other versions
CN117201504B (en
Inventor
汪小烽
连寿哲
郭志斌
林瀚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fuzhou Jiansuan Technology Co.,Ltd.
Original Assignee
Fuzhou High Tech Zone Yiyun Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fuzhou High Tech Zone Yiyun Technology Co ltd filed Critical Fuzhou High Tech Zone Yiyun Technology Co ltd
Priority to CN202311476338.XA priority Critical patent/CN117201504B/en
Publication of CN117201504A publication Critical patent/CN117201504A/en
Application granted granted Critical
Publication of CN117201504B publication Critical patent/CN117201504B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The application relates to a method, a system, equipment and a medium for controlling the data flow direction of an edge node network, wherein the method comprises the following steps: the user requests the edge node to support service from the nearby edge node and sends the self characteristic information to the server; the server screens out available node lists from the edge nodes of all access servers according to the characteristic information of the user and the characteristic information of each edge node, and returns the available node lists to the requesting party; the user initiates an access application to the edge node support service, initiates a request to each edge node in the available node list to acquire the delay condition of the corresponding edge node, selects the edge node to connect according to the delay condition and/or the transmission protocol and sends the request; and the edge node receiving the user request analyzes the user request and dispatches the resource to the user according to the analysis content.

Description

一种边缘节点网络数据流向控制方法、系统、设备和介质An edge node network data flow control method, system, device and medium

技术领域Technical field

本发明涉及一种边缘节点网络数据流向控制方法、系统、设备和介质,属于网络数据控制技术领域。The invention relates to an edge node network data flow control method, system, equipment and medium, and belongs to the technical field of network data control.

背景技术Background technique

在不同的地域访问一个区域的边缘节点(设备)会出现明显的延迟差距。而连接的客户需要流畅的连接对应的边缘节点则需要使用代理等方式进行网络的处理。导致一个物理地域所能接待的客户受到地区或者技术限制,连接的用户需要为一个物理区域的用户或者是掌握一定代理技术和资源的用户。There will be a significant delay gap when accessing edge nodes (devices) in a region from different regions. Connected customers who need to smoothly connect to the corresponding edge nodes need to use proxies and other methods for network processing. As a result, the customers that a physical area can receive are subject to regional or technical restrictions. The connected users need to be users in a physical area or users who have certain agency technologies and resources.

并且,边缘节点的真实IP暴露在外,市场遭遇到端口扫描,协议攻击,洪犯攻击等情况,内部的服务的运行环境相对恶劣。需要付出额外的开发资源和安全检测。Moreover, the real IP of edge nodes is exposed to the outside world, and the market encounters port scanning, protocol attacks, flood attacks, etc., and the operating environment of internal services is relatively harsh. Additional development resources and security testing are required.

发明内容Contents of the invention

为了解决上述现有技术中存在的问题,本发明提出了一种边缘节点网络数据流向控制方法、系统、设备和介质。In order to solve the above-mentioned problems existing in the prior art, the present invention proposes an edge node network data flow control method, system, device and medium.

本发明的技术方案如下:The technical solution of the present invention is as follows:

一方面,本发明提供一种边缘节点网络数据流向控制方法,包括以下步骤:On the one hand, the present invention provides an edge node network data flow control method, which includes the following steps:

用户向就近边缘节点请求边缘节点支持服务,并将自身特征信息发送至服务端;Users request edge node support services from nearby edge nodes and send their own characteristic information to the server;

服务端根据用户自身特征信息以及各边缘节点的特征信息在所有接入服务端的边缘节点中筛选出可用的节点列表返回给请求方;The server selects a list of available nodes from all edge nodes connected to the server based on the user's own characteristic information and the characteristic information of each edge node and returns it to the requester;

用户向边缘节点支持服务发起接入申请,向可用的节点列表中各边缘节点发起请求获取对应边缘节点的延时情况,根据延时情况和/或传输协议选择边缘节点进行连接并发起请求;The user initiates an access application to the edge node support service, initiates a request to each edge node in the available node list to obtain the delay situation of the corresponding edge node, selects the edge node to connect and initiates the request based on the delay situation and/or transmission protocol;

接收用户请求的边缘节点对用户请求进行解析,根据解析内容将资源调度给用户。The edge node that receives the user request parses the user request and schedules resources to the user based on the parsed content.

作为优选实施方式,所述服务端根据用户自身特征信息以及各边缘节点的特征信息在所有接入服务端的边缘节点中筛选出可用的节点列表返回给请求方的步骤具体为:As a preferred embodiment, the server selects a list of available nodes from all edge nodes that access the server based on the user's own characteristic information and the characteristic information of each edge node and returns it to the requesting party as follows:

服务端根据用户自身特征信息以及各边缘节点的特征信息进行权重计算,初步筛选出符合预设权重范围内的边缘节点;The server performs weight calculation based on the user's own characteristic information and the characteristic information of each edge node, and initially selects edge nodes that meet the preset weight range;

获取初步筛选出的各边缘节点的负载情况,过滤掉负载在预设比例的边缘节点;Obtain the load status of each edge node initially screened out, and filter out edge nodes whose load is at a preset ratio;

在剩余的边缘节点中随机选择部分边缘节点形成可用节点列表。Randomly select some edge nodes from the remaining edge nodes to form an available node list.

作为优选实施方式,所述用户自身特征信息以及边缘节点的特征信息包括:As a preferred implementation, the user's own characteristic information and the characteristic information of edge nodes include:

出网IP地址、预设的运营商支持权重、预设的不同类别的网络协议支持权重、记录的IP段权重以及预设的各边缘节点的设备自带权重。Outbound IP address, preset weights supported by operators, preset weights supported by different types of network protocols, weights of recorded IP segments, and preset weights of each edge node's device.

作为优选实施方式,所述边缘节点包括一服务支持节点;As a preferred embodiment, the edge node includes a service support node;

所述服务支持节点上设置有边缘节点接入服务;The service support node is provided with an edge node access service;

当出现任一新创建的边缘节点时,新创建的边缘节点向服务支持节点上报自身特征信息;When any newly created edge node appears, the newly created edge node reports its own characteristic information to the service support node;

服务支持节点通过边缘节点接入服务设置新创建的边缘节点接入,并控制新创建的边缘节点进行自检测,完成自检测后启用该新创建的边缘节点。The service support node sets the newly created edge node access through the edge node access service, and controls the newly created edge node to perform self-detection. After completing the self-detection, the newly created edge node is enabled.

作为优选实施方式,所述根据延时情况和/或传输协议选择边缘节点进行连接并发起请求的步骤包括:As a preferred implementation, the step of selecting an edge node for connection and initiating a request based on delay conditions and/or transmission protocols includes:

获取可用的节点列表中各个边缘节点的延时情况,并选取其中延时最快的一个边缘节点;Obtain the delay of each edge node in the available node list, and select the edge node with the fastest delay;

在设定的时段内,将所有要求短延时的交互请求发送至选择的边缘节点。Within a set period, all interaction requests requiring short delays are sent to the selected edge nodes.

作为优选实施方式,所述根据延时情况和/或传输协议选择边缘节点进行连接并发起请求的步骤包括:As a preferred implementation, the step of selecting an edge node for connection and initiating a request based on delay conditions and/or transmission protocols includes:

使用对应的传输协议连接可用的节点列表中的多个边缘节点;Use the corresponding transport protocol to connect multiple edge nodes in the available node list;

获取基于对应传输协议下,选取的多个边缘节点的延时情况,并选取其中延时最快的一个边缘节点作为优选节点;Obtain the latency of multiple edge nodes selected based on the corresponding transmission protocol, and select the edge node with the fastest latency as the preferred node;

在一段时间内有效使用优选节点保持长连,在长连期间对暂时弃置的边缘节点进行ping-pong操作;Effectively use preferred nodes to maintain a long connection for a period of time, and perform ping-pong operations on temporarily abandoned edge nodes during the long connection;

其中,暂时弃置的边缘节点仍旧存在消息的返回,一旦消息返回和ping-pong操作都快于当前优选节点,则将长连转移至该暂时弃置的边缘节点,并将原优选节点转化为暂时弃置的边缘节点。Among them, the temporarily abandoned edge node still has messages returned. Once the message return and ping-pong operation are faster than the current preferred node, the long-term connection will be transferred to the temporarily abandoned edge node, and the original preferred node will be converted into a temporarily abandoned node. edge nodes.

作为优选实施方式,所述接收用户请求的边缘节点对用户请求进行解析,根据解析内容将资源调度给用户的步骤具体为:As a preferred embodiment, the edge node that receives the user request parses the user request and schedules resources to the user based on the parsed content is specifically as follows:

接收用户请求的边缘节点获取用户发起请求的传输协议类型;The edge node that receives the user's request obtains the transmission protocol type of the user's request;

根据传输协议类型使用预设的解析器解析对应的请求信息并进行校验;Use the preset parser to parse the corresponding request information according to the transmission protocol type and verify it;

校验通过后,该边缘节点根据解析内容进行资源信息搜索就近资源池;After passing the verification, the edge node searches the nearest resource pool for resource information based on the parsed content;

将资源池中的资源调度给用户。Schedule resources in the resource pool to users.

另一方面,本发明还提供一种边缘节点网络数据流向控制系统,包括:On the other hand, the present invention also provides an edge node network data flow control system, including:

边缘节点、服务端和客户端;Edge nodes, servers and clients;

用户通过客户端向就近边缘节点请求边缘节点支持服务,并将自身特征信息发送至服务端;Users request edge node support services from nearby edge nodes through the client, and send their own characteristic information to the server;

服务端根据用户自身特征信息以及各边缘节点的特征信息在所有接入服务端的边缘节点中筛选出可用的节点列表返回给发起请求的客户端;The server selects a list of available nodes from all edge nodes that access the server based on the user's own characteristic information and the characteristic information of each edge node and returns it to the client that initiated the request;

用户通过客户端向边缘节点支持服务发起接入申请,向可用的节点列表中各边缘节点发起请求获取对应边缘节点的延时情况,根据延时情况和/或传输协议选择边缘节点进行连接并发起请求;The user initiates an access application to the edge node support service through the client, initiates a request to each edge node in the available node list to obtain the delay situation of the corresponding edge node, selects the edge node to connect and initiates the connection based on the delay situation and/or transmission protocol ask;

接收用户请求的边缘节点对用户请求进行解析,根据解析内容将资源调度给用户发起请求的客户端。The edge node that receives the user request parses the user request and schedules resources to the client that initiated the request based on the parsed content.

再一方面,本发明还提供一种电子设备,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,所述处理器执行所述程序时实现如本发明任一实施例所述的边缘节点网络数据流向控制方法。In another aspect, the present invention also provides an electronic device, including a memory, a processor, and a computer program stored in the memory and executable on the processor. When the processor executes the program, any implementation of the present invention is implemented. The edge node network data flow control method described in the example.

再一方面,本发明还提供一种计算机可读存储介质,其上存储有计算机程序,其特征在于,该程序被处理器执行时实现如本发明任一实施例所述的边缘节点网络数据流向控制方法。On the other hand, the present invention also provides a computer-readable storage medium on which a computer program is stored, characterized in that when the program is executed by a processor, the edge node network data flow as described in any embodiment of the present invention is realized. Control Method.

本发明具有如下有益效果:The invention has the following beneficial effects:

1、本发明可以控制用户可以获取到的具体节点信息。控制的过程中进行了节点的筛选与过滤,通过这种方式使得一个用户在一个地区的一个时间区间中获得的设备节点内容总是相似相近的,保护大多数的节点相对安全。同时通过这种方式消耗攻击者的流量。拉进攻击者的资源消耗与被攻击的资源消耗,增加攻击者的攻击成本。1. This invention can control the specific node information that users can obtain. Nodes are screened and filtered during the control process. In this way, the device node content obtained by a user in a region and a time interval is always similar, protecting most nodes from relative safety. At the same time, the attacker's traffic is consumed in this way. It draws in the attacker's resource consumption and the resource consumption of the attacked, increasing the attacker's attack cost.

2、本发明控制新创建的边缘节点进行自检测,完成自检测后启用该新创建的边缘节点并上报至服务支持节点。自检测可以确认服务的运行状态,保障节点可用。同时自检测可以确定节点是否适应当前的情况,使得服务支持节点可以更加精准的分配。2. The present invention controls the newly created edge node to perform self-detection. After completing the self-detection, the newly created edge node is enabled and reported to the service support node. Self-testing can confirm the running status of the service and ensure that the node is available. At the same time, self-testing can determine whether the node is adapted to the current situation, so that service support nodes can be allocated more accurately.

3、本发明基于提供的边缘节点接入服务,可以不断的调整使用的节点,不仅可以不断通过废弃使用率较低的节点增加新节点的方式优化我们的节点结构,同时使得攻击者攻击到废弃IP上,保护了大多数节点的安全。3. Based on the edge node access service provided by the present invention, the nodes used can be continuously adjusted. It can not only continuously optimize our node structure by adding new nodes by discarding nodes with low usage rates, but also enable attackers to attack discarded nodes. In terms of IP, the security of most nodes is protected.

附图说明Description of the drawings

图1为本发明实施例一的方法流程示意图;Figure 1 is a schematic flow chart of the method according to Embodiment 1 of the present invention;

图2为本发明实施例中边缘节点支持服务的示意图;Figure 2 is a schematic diagram of edge node support services in an embodiment of the present invention;

图3为本发明实施例中边缘节点接入服务的示意图;Figure 3 is a schematic diagram of edge node access services in an embodiment of the present invention;

图4为本发明实施例中用户择优选择连入单一节点的示意图;Figure 4 is a schematic diagram of a user selectively selecting to connect to a single node in an embodiment of the present invention;

图5为本发明实施例中用户择优挑选节点保持长连的示意图;Figure 5 is a schematic diagram of a user selectively selecting nodes to maintain a long connection in an embodiment of the present invention;

图6为本发明实施例中节点将资源调度给用户的示意图。Figure 6 is a schematic diagram of a node scheduling resources to users in an embodiment of the present invention.

具体实施方式Detailed ways

下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without making creative efforts fall within the scope of protection of the present invention.

应当理解,文中所使用的步骤编号仅是为了方便描述,不对作为对步骤执行先后顺序的限定。It should be understood that the step numbers used in the text are only for convenience of description and are not intended to limit the execution order of the steps.

应当理解,在本发明说明书中所使用的术语仅仅是出于描述特定实施例的目的而并不意在限制本发明。如在本发明说明书和所附权利要求书中所使用的那样,除非上下文清楚地指明其它情况,否则单数形式的“一”、“一个”及“该”意在包括复数形式。It should be understood that the terminology used in the description of the present invention is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in this specification and the appended claims, the singular forms "a", "an" and "the" are intended to include the plural forms unless the context clearly dictates otherwise.

术语“包括”和“包含”指示所描述特征、整体、步骤、操作、元素和/或组件的存在,但并不排除一个或多个其它特征、整体、步骤、操作、元素、组件和/或其集合的存在或添加。The terms "comprises" and "comprising" indicate the presence of described features, integers, steps, operations, elements and/or components but do not exclude the presence of one or more other features, integers, steps, operations, elements, components and/or The existence or addition to its collection.

术语“和/或”是指相关联列出的项中的一个或多个的任何组合以及所有可能组合,并且包括这些组合。The term "and/or" refers to any and all possible combinations of one or more of the associated listed items and includes such combinations.

实施例一:Example 1:

参见图1,本实施例提供一种边缘节点网络数据流向控制方法,包括以下步骤:Referring to Figure 1, this embodiment provides an edge node network data flow control method, which includes the following steps:

S100、用户向就近边缘节点请求边缘节点支持服务,并将自身特征信息发送至服务端;本实施例中,边缘节点支持服务是一套宽泛的接口,只要支持对应的接口。即可称为边缘节点支持服务。本套服务的内容主要为支持网络数据流向控制提供支持。具体提供以下内容:S100. The user requests edge node support services from the nearest edge node, and sends its characteristic information to the server; in this embodiment, the edge node support service is a set of broad interfaces, as long as the corresponding interface is supported. It can be called edge node support service. The content of this set of services mainly provides support for network data flow control. Specifically, the following content is provided:

支持区域特征的边缘节点获取、支持区域的自动拓展检测、支持边缘节点的信息记录、当前不同边缘节点的自动化均衡。Supports edge node acquisition of regional characteristics, automatic expansion detection of regions, information recording of edge nodes, and automatic balancing of different current edge nodes.

S200、服务端根据用户自身特征信息以及各边缘节点的特征信息在所有接入服务端的边缘节点中筛选出可用的节点列表返回给请求方。S200: The server selects a list of available nodes from all edge nodes that access the server based on the user's own characteristic information and the characteristic information of each edge node and returns it to the requester.

S300、用户向边缘节点支持服务发起接入申请,向可用的节点列表中各边缘节点发起请求获取对应边缘节点的延时情况,根据延时情况和/或传输协议选择边缘节点进行连接并发起请求。S300. The user initiates an access application to the edge node support service, initiates a request to each edge node in the available node list to obtain the delay situation of the corresponding edge node, selects the edge node to connect according to the delay situation and/or transmission protocol, and initiates the request. .

S400、接收用户请求的边缘节点对用户请求进行解析,根据解析内容将资源调度给用户。S400: The edge node that receives the user request parses the user request and schedules resources to the user according to the parsed content.

具体参见图2,作为本实施例的优选实施方式,在步骤S200中,所述服务端根据用户自身特征信息以及各边缘节点的特征信息在所有接入服务端的边缘节点中筛选出可用的节点列表返回给请求方的步骤具体为:Specifically referring to Figure 2, as a preferred implementation of this embodiment, in step S200, the server selects an available node list from all edge nodes that access the server based on the user's own characteristic information and the characteristic information of each edge node. The specific steps to return to the requester are:

S201、服务端根据用户自身特征信息以及各边缘节点的特征信息进行权重计算,初步筛选出符合要求且在预设权重范围内的边缘节点。S201. The server performs weight calculation based on the user's own characteristic information and the characteristic information of each edge node, and initially selects edge nodes that meet the requirements and are within the preset weight range.

权重值的计算基于用户自身特征信息中所记录的在客户端配置的配置项权重以及边缘节点所记录的的不同特征信息的权重值;例如:The calculation of the weight value is based on the weight of the configuration items configured on the client recorded in the user's own characteristic information and the weight values of different characteristic information recorded by the edge node; for example:

用户在客户端配置了为网段IP地址172.16.0.0/24的分配权重为100,边缘节点1的设备权重分配为50,边缘节点2的设备权重为分配50,服务端记录了边缘节点1的网段IP地址172.16.0.0/24的分配权重为100,边缘节点1的设备权重分配为100,同时边缘节点1的性能压力为125%,特殊状态权重为0.05。则基于上述信息可以初步筛选出边缘节点1的综合权重值为(100*100+100*50)*0.05=750。若在用户在客户端配置的权重范围内,则将边缘节点1纳入初步筛选列表中。The user configures the allocation weight of the network segment IP address 172.16.0.0/24 on the client to be 100, the device weight of edge node 1 is allocated to 50, the device weight of edge node 2 is allocated to 50, and the server records the device weight of edge node 1 The allocation weight of the network segment IP address 172.16.0.0/24 is 100, the device weight of edge node 1 is 100, and the performance pressure of edge node 1 is 125%, and the special status weight is 0.05. Based on the above information, the comprehensive weight value of edge node 1 can be initially screened out as (100*100+100*50)*0.05=750. If it is within the weight range configured by the user on the client, edge node 1 will be included in the preliminary screening list.

初步筛选出的边缘节点代表其在一定程度上是可以接收用户的数据流向控制任务。The initially selected edge nodes represent those that can accept the user's data flow control tasks to a certain extent.

S202、服务端获取初步筛选出的各边缘节点的负载情况,负载情况决定这个边缘节点是否适合接收用户的选择;进行二次筛选过滤掉负载在预设比例的边缘节点,避免部分热门节点被大量用户挤占导致节点宕机。例如筛选过滤掉负载大于80%的边缘节点。S202. The server obtains the load status of each edge node initially screened out. The load status determines whether the edge node is suitable for receiving the user's selection; performs secondary screening to filter out edge nodes whose load is at a preset ratio to prevent some popular nodes from being used in large quantities. User congestion causes node downtime. For example, filter out edge nodes with a load greater than 80%.

S203、在剩余的边缘节点中随机选择部分边缘节点形成可用节点列表。防止一个用户一次性获取到过多的节点,导致资源浪费或者被攻击。并且,随机获取还可以防止由于某个节点较为优秀而瞬时遭遇过多连接进而引发雪崩。S203. Randomly select some edge nodes from the remaining edge nodes to form an available node list. This prevents a user from acquiring too many nodes at once, resulting in a waste of resources or being attacked. Moreover, random acquisition can also prevent an avalanche from encountering too many connections due to a certain node being excellent.

基于上述步骤,本实施例可以控制用户可以获取到的具体节点信息。控制的过程中进行了节点的筛选与过滤,通过这种方式使得一个用户在一个地区的一个时间区间中获得的设备节点内容总是相似相近的,保护大多数的节点相对安全。同时通过这种方式消耗攻击者的流量。拉进攻击者的资源消耗与被攻击者的资源消耗,增加攻击者的攻击成本。Based on the above steps, this embodiment can control the specific node information that the user can obtain. Nodes are screened and filtered during the control process. In this way, the device node content obtained by a user in a region and a time interval is always similar, protecting most nodes from relative safety. At the same time, the attacker's traffic is consumed in this way. It draws in the resource consumption of the attacker and the resource consumption of the attacked, increasing the attack cost of the attacker.

作为本实施例的优选实施方式,所述用户自身特征信息以及边缘节点的特征信息包括:As a preferred implementation of this embodiment, the user's own characteristic information and the characteristic information of the edge node include:

出网IP地址、预设的运营商支持权重、预设的不同类别的网络协议支持权重、记录的IP段权重以及预设的各边缘节点的设备自带权重。上述特征信息边缘节点支持服务和边缘节点接入服务各持一份,并由边缘节点接入服务上报给信息边缘节点支持服务。在权重的计算中是由接入的边缘节点检测所处环境的网络状态计算出所支持的权重值。边缘节点支持服务根据边缘节点与客户端配置计算客户所需的节点内容。用户的客户端通过下发的边缘节点来获取服务。Outbound IP address, preset weights supported by operators, preset weights supported by different types of network protocols, weights of recorded IP segments, and preset weights of each edge node's device. The edge node support service and the edge node access service each hold a copy of the above characteristic information, and the edge node access service reports it to the information edge node support service. In the calculation of the weight, the accessed edge node detects the network status of the environment and calculates the supported weight value. The edge node support service calculates the node content required by the customer based on the edge node and client configuration. The user's client obtains services through the delivered edge node.

除边缘节点支持服务外,本实施例还开发了边缘节点接入服务。边缘节点接入服务为流量控制提供服务。其提供了具体如何进行流量的细节控制,是我们服务支持的边界。边缘节点接入服务具体提供:In addition to edge node support services, this embodiment also develops edge node access services. The edge node access service provides services for traffic control. It provides detailed control on how to conduct traffic and is the boundary of our service support. Edge node access services specifically provide:

用户的接入校验、用户资源的获取、接入信息的反馈、边缘节点接入配置、不同协议的ping-pong接口、不同协议的持久化接口。User access verification, user resource acquisition, access information feedback, edge node access configuration, ping-pong interfaces of different protocols, and persistence interfaces of different protocols.

具体参见图3,作为本实施例的优选实施方式,所述边缘节点包括一服务支持节点;Referring specifically to Figure 3, as a preferred implementation of this embodiment, the edge node includes a service support node;

所述服务支持节点上设置有边缘节点接入服务;The service support node is provided with an edge node access service;

当出现任一新创建的边缘节点时,新创建的边缘节点向服务支持节点上报自身特征信息;边缘节点创建之初设备并不完全了解该节点的特性,所以需要节点自身告知。初次上报的节点并不会直接被应用与服务,而是需要自检测后才可以使用。When any newly created edge node appears, the newly created edge node reports its own characteristic information to the service support node; when the edge node is created, the device does not fully understand the characteristics of the node, so it needs to be informed by the node itself. The nodes reported for the first time will not be directly used and served, but need to be self-tested before they can be used.

服务支持节点通过边缘节点接入服务设置新创建的边缘节点接入,对其进行配置,以便可以迅速支持当前边缘节点接入服务提供给用户中缺失的服务类型,如不同传输协议的边缘节点服务、不同网络环境要求的边缘节点服务。The service support node sets up the newly created edge node access through the edge node access service and configures it so that it can quickly support the missing service types provided by the current edge node access service to users, such as edge node services with different transmission protocols. , Edge node services required by different network environments.

控制新创建的边缘节点进行自检测,完成自检测后启用该新创建的边缘节点并上报至服务支持节点。自检测可以确认服务的运行状态,保障节点可用。同时自检测可以确定节点是否适应当前的情况,使得服务支持节点可以更加精准的分配。Control the newly created edge node to perform self-detection. After completing the self-detection, enable the newly created edge node and report it to the service support node. Self-testing can confirm the running status of the service and ensure that the node is available. At the same time, self-testing can determine whether the node is adapted to the current situation, so that service support nodes can be allocated more accurately.

基于本实施例提供的边缘节点接入服务,可以不断的调整我们使用的节点,不仅可以不断通过废弃使用率较低的节点增加新节点的方式优化我们的节点结构,同时使得攻击者攻击到废弃IP上,保护了大多数节点的安全。Based on the edge node access service provided by this embodiment, we can continuously adjust the nodes we use. Not only can we continuously optimize our node structure by discarding nodes with low utilization rates and adding new nodes, but also allow attackers to attack discarded nodes. In terms of IP, the security of most nodes is protected.

作为一种实施方式,步骤S300具体为:As an implementation manner, step S300 is specifically:

S301、用户向边缘节点支持服务发起接入信息的申请,获取到可用的节点列表。S301. The user initiates an application for access information to the edge node support service and obtains a list of available nodes.

S302、用户向可用的节点列表中的各个边缘节点进行请求获取各个边缘节点的延时情况。S302. The user requests each edge node in the available node list to obtain the delay information of each edge node.

S303、用户根据协议和策略的不同选择较优的边缘节点或者对所有边缘节点进行连接。S303. The user selects a better edge node or connects all edge nodes according to different protocols and policies.

S304、用户综合最优边缘节点进行请求。S304. The user makes a request for the comprehensive optimal edge node.

S305、使用过程中每间隔一段时间就重复上述S301~S304过程。以动态适应用户可能不断变化的网络环境。S305. Repeat the above S301~S304 processes at intervals during use. To dynamically adapt to users' potentially changing network environments.

具体参见图4,作为一种实施方式,在应对需要段延时要求的场景时,用户可以择优选择连入单一边缘节点,此时步骤S300具体包括:Specifically referring to Figure 4, as an implementation manner, when dealing with scenarios requiring segment delay, the user can choose to connect to a single edge node. In this case, step S300 specifically includes:

S311、用户向边缘节点支持服务发起接入信息的申请,获取到可用的节点列表。S311. The user initiates an application for access information to the edge node support service and obtains a list of available nodes.

S312、获取可用的节点列表中各个边缘节点的延时情况,并选取其中延时最快的一个边缘节点。S312. Obtain the delay status of each edge node in the available node list, and select the edge node with the fastest delay.

S313、在设定的时段内,将所有要求短延时的交互请求发送至选择的边缘节点。S313. Within the set period, send all interaction requests requiring short delay to the selected edge node.

S314、重复上述步骤S311~S313。S314. Repeat the above steps S311 to S313.

具体参见图5,作为一种实施方式,在应对需要段延时要求的场景时,用户可以择优挑选其中一边缘节点保持长连,此时步骤S300具体包括:Specifically referring to Figure 5, as an implementation manner, when dealing with a scenario requiring segment delay, the user can select one of the edge nodes to maintain a long connection. In this case, step S300 specifically includes:

S321、用户向边缘节点支持服务发起接入信息的申请,获取到可用的节点列表。S321. The user initiates an application for access information to the edge node support service and obtains a list of available nodes.

S322、使用对应的传输协议连接可用的节点列表中的多个边缘节点。S322. Use the corresponding transmission protocol to connect multiple edge nodes in the available node list.

S323、获取基于对应传输协议下,选取的多个边缘节点的延时情况。S323. Obtain the delay conditions of multiple selected edge nodes based on the corresponding transmission protocol.

S324、选取其中延时最快的一个边缘节点作为优选节点。S324. Select an edge node with the fastest delay as the preferred node.

S325、在一段时间内有效使用优选节点保持长连,在长连期间对暂时弃置的边缘节点进行ping-pong操作。S325. Effectively use the preferred node to maintain a long connection within a period of time, and perform a ping-pong operation on the temporarily abandoned edge node during the long connection period.

S326、对于单一长连重复上述步骤S323~S325操作,对于多次的长连重复上述步骤S321~S323操作。S326. Repeat the above-mentioned steps S323 to S325 for a single long connection, and repeat the above-mentioned steps S321 to S323 for multiple long connections.

S327、其中,暂时弃置的边缘节点仍旧存在消息的返回,一旦消息返回和ping-pong操作都快于当前优选节点,则将长连转移至该暂时弃置的边缘节点,并将原优选节点转化为暂时弃置的边缘节点。S327. Among them, the temporarily abandoned edge node still has messages returned. Once the message return and ping-pong operation are faster than the current preferred node, the long connection will be transferred to the temporarily abandoned edge node, and the original preferred node will be converted into Temporarily abandoned edge nodes.

基于上述步骤S300的不同实施方式,本实施例提供多种连接分流方案,这种方案为用户提供更加快速与低延时的连接方式。并可由用户自行分配是否需要使用流量换时延的方案。Based on the different implementations of the above step S300, this embodiment provides a variety of connection offloading solutions, which provide users with a faster and lower-latency connection method. And users can decide whether they need to use the traffic-for-delay solution.

具体参见图6,作为本实施例的优选实施方式,在步骤S400中,所述接收用户请求的边缘节点对用户请求进行解析,根据解析内容将资源调度给用户的步骤具体为:Referring specifically to Figure 6, as a preferred implementation of this embodiment, in step S400, the edge node that receives the user request parses the user request and schedules resources to the user according to the parsed content is specifically as follows:

S401、用户可能会通过udp,quic,tcp,http,websocket等协议进行请求边缘节点,接收用户请求的边缘节点获取用户发起请求的传输协议类型。S401. Users may request edge nodes through protocols such as udp, quic, tcp, http, websocket, etc., and the edge node that receives the user's request obtains the transmission protocol type of the request initiated by the user.

S402、边缘节点根据传输协议类型使用预设的解析器解析对应的请求信息并按需进行校验;具体地,UDP,QUIC,TCP会快速判别IP协议头等信息是否合法。HTTP,WebSocket会进行头部信息的进一步校验Head等信息是否合法。S402. The edge node uses a preset parser to parse the corresponding request information according to the transmission protocol type and perform verification as needed; specifically, UDP, QUIC, and TCP will quickly determine whether the IP protocol header information is legal. HTTP and WebSocket will further verify whether the header information is legal.

S403、校验通过后,该边缘节点根据解析内容进行资源信息搜索就近资源池;UDP,QUIC,TCP连接请求会复用Socket转发到所在的资源池数据。需要长期连接的webSocket则会进行转发,当用户接入后第一次发起请求后则触发连接并进行转发。否则仅进行可连接性校验。S403. After the verification is passed, the edge node searches the nearest resource pool for resource information based on the parsed content; UDP, QUIC, and TCP connection requests will reuse Socket and forward the data to the resource pool where it is located. WebSockets that require long-term connections will be forwarded. When the user initiates a request for the first time after access, the connection will be triggered and forwarded. Otherwise only a connectability check is performed.

S404、将资源池中的资源调度给用户。S404. Schedule the resources in the resource pool to the user.

基于上述步骤,用户发送的信息经过处理,过滤了无效的信息。防止无效的客户端的数据连入真实服务端,干扰服务的正常运行。Based on the above steps, the information sent by the user is processed and invalid information is filtered out. Prevent invalid client data from connecting to the real server and interfering with the normal operation of the service.

实施例二:Example 2:

本实施例提供一种边缘节点网络数据流向控制系统,包括:This embodiment provides an edge node network data flow control system, including:

边缘节点、服务端和客户端;Edge nodes, servers and clients;

用户通过客户端向就近边缘节点请求边缘节点支持服务,并将自身特征信息发送至服务端;该部分用于实现实施例一中步骤S100的功能,在此不再赘述;The user requests edge node support services from the nearest edge node through the client, and sends its own characteristic information to the server; this part is used to implement the function of step S100 in the first embodiment, and will not be described again here;

服务端根据用户自身特征信息以及各边缘节点的特征信息在所有接入服务端的边缘节点中筛选出可用的节点列表返回给发起请求的客户端;该部分用于实现实施例一中步骤S200的功能,在此不再赘述;The server selects a list of available nodes from all edge nodes that access the server based on the user's own characteristic information and the characteristic information of each edge node and returns it to the client that initiated the request; this part is used to implement the function of step S200 in Embodiment 1. , which will not be described in detail here;

用户通过客户端向边缘节点支持服务发起接入申请,向可用的节点列表中各边缘节点发起请求获取对应边缘节点的延时情况,根据延时情况和/或传输协议选择边缘节点进行连接并发起请求;该部分用于实现实施例一中步骤S300的功能,在此不再赘述;The user initiates an access application to the edge node support service through the client, initiates a request to each edge node in the available node list to obtain the delay situation of the corresponding edge node, selects the edge node to connect and initiates the connection based on the delay situation and/or transmission protocol Request; This part is used to implement the function of step S300 in Embodiment 1, and will not be described again here;

接收用户请求的边缘节点对用户请求进行解析,根据解析内容将资源调度给用户发起请求的客户端;该部分用于实现实施例一中步骤S400的功能,在此不再赘述。The edge node that receives the user's request parses the user's request, and dispatches resources to the client that initiated the request based on the parsed content; this part is used to implement the function of step S400 in Embodiment 1, and will not be described again here.

实施例三:Embodiment three:

本实施例提出一种电子设备,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,所述处理器执行所述程序时实现如本发明任一实施例所述的边缘节点网络数据流向控制方法。This embodiment proposes an electronic device, including a memory, a processor, and a computer program stored in the memory and executable on the processor. When the processor executes the program, it implements the method described in any embodiment of the present invention. Edge node network data flow control method.

实施例四:Embodiment 4:

本实施例提出一种计算机可读存储介质,其上存储有计算机程序,该程序被处理器执行时实现如本发明任一实施例所述的边缘节点网络数据流向控制方法。This embodiment provides a computer-readable storage medium on which a computer program is stored. When the program is executed by a processor, the edge node network data flow control method as described in any embodiment of the present invention is implemented.

本申请实施例中,“至少一个”是指一个或者多个,“多个”是指两个或两个以上。“和/或”,描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示单独存在A、同时存在A和B、单独存在B的情况。其中A,B可以是单数或者复数。字符“/”一般表示前后关联对象是一种“或”的关系。“以下至少一项”及其类似表达,是指的这些项中的任意组合,包括单项或复数项的任意组合。例如,a,b和c中的至少一项可以表示:a,b,c,a和b,a和c,b和c或a和b和c,其中a,b,c可以是单个,也可以是多个。In the embodiments of this application, "at least one" refers to one or more, and "multiple" refers to two or more. "And/or" describes the relationship between associated objects, indicating that there can be three relationships. For example, A and/or B can represent the existence of A alone, the existence of A and B at the same time, or the existence of B alone. Where A and B can be singular or plural. The character "/" generally indicates that the related objects are in an "or" relationship. "At least one of the following" and similar expressions refers to any combination of these items, including any combination of single or plural items. For example, at least one of a, b and c can mean: a, b, c, a and b, a and c, b and c or a and b and c, where a, b, c can be single, also Can be multiple.

本领域普通技术人员可以意识到,本文中公开的实施例中描述的各单元及算法步骤,能够以电子硬件、计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。Those of ordinary skill in the art can realize that each unit and algorithm step described in the embodiments disclosed herein can be implemented by a combination of electronic hardware, computer software, and electronic hardware. Whether these functions are performed in hardware or software depends on the specific application and design constraints of the technical solution. Skilled artisans may implement the described functionality using different methods for each specific application, but such implementations should not be considered beyond the scope of this application.

所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。Those skilled in the art can clearly understand that for the convenience and simplicity of description, the specific working processes of the systems, devices and units described above can be referred to the corresponding processes in the foregoing method embodiments, and will not be described again here.

在本申请所提供的几个实施例中,任一功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(Read-OnlyMemory;以下简称:ROM)、随机存取存储器(RandomAccessMemory;以下简称:RAM)、磁碟或者光盘等各种可以存储程序代码的介质。In the several embodiments provided in this application, if any function is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer-readable storage medium. Based on this understanding, the technical solution of the present application is essentially or the part that contributes to the existing technology or the part of the technical solution can be embodied in the form of a software product. The computer software product is stored in a storage medium, including Several instructions are used to cause a computer device (which may be a personal computer, a server, or a network device, etc.) to execute all or part of the steps of the methods described in various embodiments of this application. The aforementioned storage media include: U disk, mobile hard disk, read-only memory (Read-Only Memory; hereafter referred to as: ROM), random access memory (Random Access Memory; hereafter referred to as: RAM), magnetic disk or optical disk, etc., which can store programs The medium of the code.

以上所述仅为本发明的实施例,并非因此限制本发明的专利范围,凡是利用本发明说明书及附图内容所作的等效结构或等效流程变换,或直接或间接运用在其他相关的技术领域,均同理包括在本发明的专利保护范围内。The above are only examples of the present invention, and do not limit the patent scope of the present invention. Any equivalent structure or equivalent process transformation made by using the description and drawings of the present invention, or directly or indirectly applied to other related technologies fields are equally included in the scope of patent protection of the present invention.

Claims (10)

1.一种边缘节点网络数据流向控制方法,其特征在于,包括以下步骤:1. An edge node network data flow control method, characterized by including the following steps: 用户向就近边缘节点请求边缘节点支持服务,并将自身特征信息发送至服务端;Users request edge node support services from nearby edge nodes and send their own characteristic information to the server; 服务端根据用户自身特征信息以及各边缘节点的特征信息在所有接入服务端的边缘节点中筛选出可用的节点列表返回给请求方;The server selects a list of available nodes from all edge nodes connected to the server based on the user's own characteristic information and the characteristic information of each edge node and returns it to the requester; 用户向边缘节点支持服务发起接入申请,向可用的节点列表中各边缘节点发起请求获取对应边缘节点的延时情况,根据延时情况和/或传输协议选择边缘节点进行连接并发起请求;The user initiates an access application to the edge node support service, initiates a request to each edge node in the available node list to obtain the delay situation of the corresponding edge node, selects the edge node to connect and initiates the request based on the delay situation and/or transmission protocol; 接收用户请求的边缘节点对用户请求进行解析,根据解析内容将资源调度给用户。The edge node that receives the user request parses the user request and schedules resources to the user based on the parsed content. 2.根据权利要求1所述的一种边缘节点网络数据流向控制方法,其特征在于,所述服务端根据用户自身特征信息以及各边缘节点的特征信息在所有接入服务端的边缘节点中筛选出可用的节点列表返回给请求方的步骤具体为:2. An edge node network data flow control method according to claim 1, characterized in that the server selects edge nodes from all edge nodes that access the server based on the user's own characteristic information and the characteristic information of each edge node. The specific steps for returning the available node list to the requester are: 服务端根据用户自身特征信息以及各边缘节点的特征信息进行权重计算,初步筛选出符合预设权重范围内的边缘节点;The server performs weight calculation based on the user's own characteristic information and the characteristic information of each edge node, and initially selects edge nodes that meet the preset weight range; 获取初步筛选出的各边缘节点的负载情况,过滤掉负载在预设比例的边缘节点;Obtain the load status of each edge node initially screened out, and filter out edge nodes whose load is at a preset ratio; 在剩余的边缘节点中随机选择部分边缘节点形成可用节点列表。Randomly select some edge nodes from the remaining edge nodes to form an available node list. 3.根据权利要求1所述的一种边缘节点网络数据流向控制方法,其特征在于,所述用户自身特征信息以及边缘节点的特征信息包括:3. An edge node network data flow control method according to claim 1, characterized in that the user's own characteristic information and the characteristic information of the edge node include: 出网IP地址、预设的运营商支持权重、预设的不同类别的网络协议支持权重、记录的IP段权重以及预设的各边缘节点的设备自带权重。Outbound IP address, preset weights supported by operators, preset weights supported by different types of network protocols, weights of recorded IP segments, and preset weights of each edge node's device. 4.根据权利要求1所述的一种边缘节点网络数据流向控制方法,其特征在于:4. An edge node network data flow control method according to claim 1, characterized in that: 所述边缘节点包括一服务支持节点;The edge node includes a service support node; 所述服务支持节点上设置有边缘节点接入服务;The service support node is provided with an edge node access service; 当出现任一新创建的边缘节点时,新创建的边缘节点向服务支持节点上报自身特征信息;When any newly created edge node appears, the newly created edge node reports its own characteristic information to the service support node; 服务支持节点通过边缘节点接入服务设置新创建的边缘节点接入,并控制新创建的边缘节点进行自检测,完成自检测后启用该新创建的边缘节点。The service support node sets the newly created edge node access through the edge node access service, and controls the newly created edge node to perform self-detection. After completing the self-detection, the newly created edge node is enabled. 5.根据权利要求1所述的一种边缘节点网络数据流向控制方法,其特征在于,所述根据延时情况和/或传输协议选择边缘节点进行连接并发起请求的步骤包括:5. An edge node network data flow control method according to claim 1, characterized in that the step of selecting an edge node for connection and initiating a request according to delay conditions and/or transmission protocols includes: 获取可用的节点列表中各个边缘节点的延时情况,并选取其中延时最快的一个边缘节点;Obtain the delay of each edge node in the available node list, and select the edge node with the fastest delay; 在设定的时段内,将所有要求短延时的交互请求发送至选择的边缘节点。Within a set period, all interaction requests requiring short delays are sent to the selected edge nodes. 6.根据权利要求1所述的一种边缘节点网络数据流向控制方法,其特征在于,所述根据延时情况和/或传输协议选择边缘节点进行连接并发起请求的步骤包括:6. An edge node network data flow control method according to claim 1, characterized in that the step of selecting an edge node for connection and initiating a request according to delay conditions and/or transmission protocols includes: 使用对应的传输协议连接可用的节点列表中的多个边缘节点;Use the corresponding transport protocol to connect multiple edge nodes in the available node list; 获取基于对应传输协议下,选取的多个边缘节点的延时情况,并选取其中延时最快的一个边缘节点作为优选节点;Obtain the latency of multiple edge nodes selected based on the corresponding transmission protocol, and select the edge node with the fastest latency as the preferred node; 在一段时间内有效使用优选节点保持长连,在长连期间对暂时弃置的边缘节点进行ping-pong操作;Effectively use preferred nodes to maintain a long connection for a period of time, and perform ping-pong operations on temporarily abandoned edge nodes during the long connection; 其中,暂时弃置的边缘节点仍旧存在消息的返回,一旦消息返回和ping-pong操作都快于当前优选节点,则将长连转移至该暂时弃置的边缘节点,并将原优选节点转化为暂时弃置的边缘节点。Among them, the temporarily abandoned edge node still has messages returned. Once the message return and ping-pong operation are faster than the current preferred node, the long-term connection will be transferred to the temporarily abandoned edge node, and the original preferred node will be converted into a temporarily abandoned node. edge nodes. 7.根据权利要求1所述的一种边缘节点网络数据流向控制方法,其特征在于,所述接收用户请求的边缘节点对用户请求进行解析,根据解析内容将资源调度给用户的步骤具体为:7. An edge node network data flow control method according to claim 1, characterized in that the edge node that receives the user request parses the user request, and the step of scheduling resources to the user according to the parsed content is specifically: 接收用户请求的边缘节点获取用户发起请求的传输协议类型;The edge node that receives the user's request obtains the transmission protocol type of the user's request; 根据传输协议类型使用预设的解析器解析对应的请求信息并进行校验;Use the preset parser to parse the corresponding request information according to the transmission protocol type and verify it; 校验通过后,该边缘节点根据解析内容进行资源信息搜索就近资源池;After passing the verification, the edge node searches the nearest resource pool for resource information based on the parsed content; 将资源池中的资源调度给用户。Schedule resources in the resource pool to users. 8.一种边缘节点网络数据流向控制系统,其特征在于,包括:8. An edge node network data flow control system, characterized by including: 边缘节点、服务端和客户端;Edge nodes, servers and clients; 用户通过客户端向就近边缘节点请求边缘节点支持服务,并将自身特征信息发送至服务端;Users request edge node support services from nearby edge nodes through the client, and send their own characteristic information to the server; 服务端根据用户自身特征信息以及各边缘节点的特征信息在所有接入服务端的边缘节点中筛选出可用的节点列表返回给发起请求的客户端;The server selects a list of available nodes from all edge nodes that access the server based on the user's own characteristic information and the characteristic information of each edge node and returns it to the client that initiated the request; 用户通过客户端向边缘节点支持服务发起接入申请,向可用的节点列表中各边缘节点发起请求获取对应边缘节点的延时情况,根据延时情况和/或传输协议选择边缘节点进行连接并发起请求;The user initiates an access application to the edge node support service through the client, initiates a request to each edge node in the available node list to obtain the delay situation of the corresponding edge node, selects the edge node to connect and initiates the connection based on the delay situation and/or transmission protocol ask; 接收用户请求的边缘节点对用户请求进行解析,根据解析内容将资源调度给用户发起请求的客户端。The edge node that receives the user request parses the user request and schedules resources to the client that initiated the request based on the parsed content. 9.一种电子设备,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,其特征在于,所述处理器执行所述程序时实现如权利要求1至7任一项所述的边缘节点网络数据流向控制方法。9. An electronic device, including a memory, a processor, and a computer program stored in the memory and executable on the processor, characterized in that when the processor executes the program, it implements any one of claims 1 to 7 The edge node network data flow control method described in the item. 10.一种计算机可读存储介质,其上存储有计算机程序,其特征在于,该程序被处理器执行时实现如权利要求1至7任一项所述的边缘节点网络数据流向控制方法。10. A computer-readable storage medium with a computer program stored thereon, characterized in that when the program is executed by a processor, the edge node network data flow control method according to any one of claims 1 to 7 is implemented.
CN202311476338.XA 2023-11-08 2023-11-08 Edge node network data flow direction control method, system, equipment and medium Active CN117201504B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311476338.XA CN117201504B (en) 2023-11-08 2023-11-08 Edge node network data flow direction control method, system, equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311476338.XA CN117201504B (en) 2023-11-08 2023-11-08 Edge node network data flow direction control method, system, equipment and medium

Publications (2)

Publication Number Publication Date
CN117201504A true CN117201504A (en) 2023-12-08
CN117201504B CN117201504B (en) 2024-02-27

Family

ID=88989160

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311476338.XA Active CN117201504B (en) 2023-11-08 2023-11-08 Edge node network data flow direction control method, system, equipment and medium

Country Status (1)

Country Link
CN (1) CN117201504B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117896384A (en) * 2024-03-18 2024-04-16 深圳市精极工业互联网有限公司 Internet of things communication method, device, equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107277093A (en) * 2016-04-08 2017-10-20 北京优朋普乐科技有限公司 Content distributing network and its load-balancing method
CN112583903A (en) * 2020-11-26 2021-03-30 北京邮电大学 Service self-adaptive access method, device, electronic equipment and storage medium
CN114390060A (en) * 2021-12-13 2022-04-22 杭州网鼎科技有限公司 Method for distributing edge computing network and storage medium
CN115086331A (en) * 2022-07-20 2022-09-20 阿里巴巴(中国)有限公司 Cloud equipment scheduling method, device and system, electronic equipment and storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107277093A (en) * 2016-04-08 2017-10-20 北京优朋普乐科技有限公司 Content distributing network and its load-balancing method
CN112583903A (en) * 2020-11-26 2021-03-30 北京邮电大学 Service self-adaptive access method, device, electronic equipment and storage medium
CN114390060A (en) * 2021-12-13 2022-04-22 杭州网鼎科技有限公司 Method for distributing edge computing network and storage medium
CN115086331A (en) * 2022-07-20 2022-09-20 阿里巴巴(中国)有限公司 Cloud equipment scheduling method, device and system, electronic equipment and storage medium

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
OKAGAWA, T等: "A-proposed mobility management for IP-based IMT network platform", 《IEICE TRANSACTIONS ON COMMUNICATIONS》, vol. 88, no. 7, 1 July 2005 (2005-07-01), pages 2726 - 2734, XP001231852, DOI: 10.1093/ietcom/e88-b.7.2726 *
刘云毅;张蕾;张建敏;彭宁;杨峰义;: "基于MEC的边缘CDN业务调度方案及测试分析", 电子技术应用, no. 06, 6 June 2020 (2020-06-06) *
季忠铭: "边缘分布式场景中多点协同计算的任务时延优化", 《中国博士学位论文全文数据库 信息科技辑》, no. 6, 15 June 2023 (2023-06-15), pages 136 - 17 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117896384A (en) * 2024-03-18 2024-04-16 深圳市精极工业互联网有限公司 Internet of things communication method, device, equipment and storage medium
CN117896384B (en) * 2024-03-18 2024-05-14 深圳市精极工业互联网有限公司 Internet of things communication method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN117201504B (en) 2024-02-27

Similar Documents

Publication Publication Date Title
Scharf et al. Multipath TCP (MPTCP) application interface considerations
US7747662B2 (en) Service aware network caching
US7512705B2 (en) Truncating data units
US9781012B2 (en) Behavior monitoring and compliance for multi-tenant resources
US8625431B2 (en) Notifying network applications of receive overflow conditions
JP2023154044A (en) Flow control for probabilistic relay in blockchain network
RU2666289C1 (en) System and method for access request limits
US20070079367A1 (en) System, Method and Apparatus for Detecting, Identifying and Responding to Fraudulent Requests on a Network
US20070043738A1 (en) Methods and systems for reputation based resource allocation for networking
JP2004364306A (en) System for controlling client-server connection request
US9455947B2 (en) Apparatus and method of enabling to transceive data using a plurality of heterogeneous networks selectively through a fixed host address
JP4503934B2 (en) Server computer protection device, server computer protection method, server computer protection program, and server computer
US20230275924A1 (en) Network security protection method and protection device
CN117201504B (en) Edge node network data flow direction control method, system, equipment and medium
JP2009146005A (en) Information processing apparatus and information processing method
CN1938689A (en) Method to identify transactions and manage the capacity to support the transaction
JP2019152912A (en) Unauthorized communication handling system and method
US20230275874A1 (en) Network security protection method and protection device
JP4602158B2 (en) Server equipment protection system
CN110213399A (en) Dynamic Host Configuration Protocol server detection method, storage medium and terminal based on NETFILTER mechanism
CN111641698B (en) Data statistical method, system, equipment and storage medium
CN101478408A (en) Method, apparatus and system for implementing uploading rate dynamic linkage
CN114553965B (en) Intranet device scheduling method, network device and storage medium
CN111049754B (en) Data communication method, device, equipment and computer readable storage medium
KR101467023B1 (en) System and method to deliver contents using dynamic context in the distributed network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address

Address after: 2nd Floor, Building E, Hongsheng Center, No. 13 Gaoxin Avenue, Shangjie Town, Minhou County, Fuzhou City, Fujian Province 350100

Patentee after: Fuzhou Jiansuan Technology Co.,Ltd.

Country or region after: China

Address before: 2802-V2, 28th Floor, Building E, Phase III, Innovation Park, No. 20 Gaoxin Avenue, Shangjie Town, Minhou County, Fuzhou City, Fujian Province, 350108

Patentee before: Fuzhou High tech Zone Yiyun Technology Co.,Ltd.

Country or region before: China

CP03 Change of name, title or address