Disclosure of Invention
The application aims to overcome the defects of the prior art and provides a method for utilizing idle bandwidth resources of end equipment. The method can prevent the problems caused by central management and scheduling while realizing the utilization of idle bandwidth resources, and provides a safer service evidence generation method.
In order to achieve the above objective, the present application provides a method for utilizing idle bandwidth resources of an end device, which relates to a network node, an analysis system and the end device, wherein the method comprises:
The network node generates a service identifier according to the required resource type, and queries a network address list of the terminal equipment from the analysis system by using the service representation;
The network node selects the terminal equipment from the network address list as a transmission relay node according to the relay node selection method and the network load condition fed back by the terminal equipment;
The network node forwards the data message to the selected relay node, and the relay node forwards the data message to the destination network node.
As an improvement of the above method, the end device is implemented by software or hardware, and has functions including:
identifying, processing and forwarding network messages;
interacting with an analysis system, and registering, inquiring and canceling the service identification;
and counting the local network resource information.
As an improvement of the above method, the parsing system is a distributed system that maintains a mapping relationship between entity identifiers and network addresses and provides a plurality of deterministic latency level parsing services;
The analysis system organizes analysis nodes by using a hierarchical structure, the analysis nodes of the same hierarchy provide analysis services of the same time delay level for users in the analysis domain, and the higher the hierarchy of the analysis nodes is, the larger the corresponding deterministic time delay guarantee value is, and the larger the coverage range of the analysis domain is.
As an improvement of the method, the generation of the service identifier according to the required resource type refers to that the network node generates the service identifier of the corresponding type according to the end equipment classification standard, the required bandwidth resource size and the required operator bandwidth information, the network node starts to inquire from the analysis node of the lowest level covering the current network node and the destination network node, and if no suitable node is inquired in the analysis node of the level, the network node goes to the analysis node of the higher level to inquire.
As an improvement of the method, the network load condition refers to uplink and downlink bandwidth information, disk capacity information and processor computing capacity information acquired by the terminal equipment.
As an improvement of the method, the relay node selection method is to select a proper forwarding node from a group of candidate terminal devices, and comprises the step of selecting the node by combining the real-time network load condition and the historical network load condition of the node.
As an improvement of the above method, the method further comprises:
in the data message forwarding process, the network node, the terminal equipment and the destination network node cooperate to measure and generate a forwarding certificate and record the forwarding certificate to a blockchain system;
the forwarding certification refers to label information attached to a message sent to the terminal equipment by the network node;
The label information is generated based on the network address of the terminal equipment;
The block chain system records the mapping relation between the label information and the network address of the terminal equipment;
when the destination network node receives the message, the destination network node extracts the label in the message, and verifies the label on the blockchain system so as to meter the forwarding workload of the terminal device.
As an improvement of the method, the blockchain system is used for assisting in generating forwarding evidences, completing contribution degree accounting of the opposite-end equipment and completing token reward distribution of the opposite-end side according to a set incentive mechanism.
As an improvement of the above method, the network node has functions including:
Route forwarding;
reading, filling and modifying the header field of the message;
interacting with an analysis system, and registering, inquiring and canceling the service identification;
helping to generate a forwarding certificate for the end device.
Compared with the prior art, the method has the technical advantages that the method for aggregating and utilizing the idle bandwidth resources of the terminal equipment is provided, the node management and the task scheduling are carried out by adopting the centralized management server, when the number of the nodes is increased, the problems of performance bottleneck, poor expansibility and the like exist, the service evidence information reported by a single point is assumed to be reliable in the method, and the risks of information falsification and forging actually exist. The application manages by using a hierarchical analysis system according to different node resource types, avoids the problems caused by centralized scheduling based on the path sensing and scheduling capability of the distributed network nodes, and generates the impersonatable contribution degree proving information by the providing method
Detailed Description
The application provides a method for utilizing idle bandwidth resources of end equipment, which comprises the following steps:
Classifying the devices according to network state information of the terminal devices, generating a service identifier of each type, and registering the service identifier and the network address of the devices to an analysis system, wherein the network state information comprises, but is not limited to, an operator and the available bandwidth.
The terminal equipment comprises, but is not limited to, various software and hardware based methods, but needs to be capable of identifying, processing and forwarding specific network messages, interacting with an analysis system to perform identification registration, inquiry and cancellation service, and needs to be provided with a blockchain program, a resource monitoring module and a resource monitoring module, wherein the resource monitoring module can count local network resource information.
The device is classified into different groups according to preset classification standards, information of an operator to which the terminal device belongs and available bandwidth, different service identifiers are generated for the terminal devices in the different groups, and the service identifiers are registered on an analysis system so that other nodes in the network can inquire resources of a required type.
The analysis system is a distributed system which maintains the mapping relation between entity identifiers and network addresses and can provide a plurality of deterministic time delay grade analysis services, analysis nodes are organized by using a hierarchical structure, the analysis nodes of the same hierarchy provide the analysis services of the same time delay grade for users in the analysis domain, and the higher the hierarchy of the analysis nodes is, the larger the corresponding deterministic time delay guarantee value is, and the larger the coverage area of the analysis domain is.
The network node generates a service identifier according to the required resource type and the state information between the network node and the destination network node, and queries a network address list of the terminal equipment from the analysis system. And the network node selects the terminal equipment as the relay node for transmission according to the relay node selection method and the network resource information fed back by the terminal equipment.
The network node has basic routing forwarding capability, and also has the functions of reading, filling and modifying relevant fields of a message header, interacting with an analysis system to perform identification registration, inquiry and cancellation service, and assisting in completing forwarding certification generation of the terminal equipment.
Generating service identifiers according to the required resource types and state information between the network nodes and the destination network nodes means that the network nodes generate service identifiers of corresponding types according to the required bandwidth resource sizes and the required operator bandwidth information, the service identifiers are queried from the lowest-level analytic node covering the current network node and the destination network node, and if the level analytic node does not query a proper node, the service identifiers go to a higher-level analytic node for query.
The network resource information is operator information, uplink and downlink bandwidth information, disk capacity information and processor computing capacity information acquired by the terminal equipment.
The relay node selection method is to select a proper forwarding node from a group of candidate terminal side forwarding devices, and the selectable strategies include, but are not limited to, node selection by combining the real-time network load condition and the historical network load condition of the node.
The network node transmits the data message to the selected terminal equipment, the terminal equipment transmits the data message to the destination network node, and the network node, the terminal equipment and the destination network node cooperate to measure and generate a transmitting certificate and record the transmitting certificate on the blockchain system.
The forwarding certification refers to that a network node appends tag information in a message sent to the terminal equipment, the tag information is generated based on metadata such as a network address of the terminal equipment, the block chain records a mapping relation between the tag information and the network address of the terminal equipment, when the destination network node receives the message, the destination network node extracts a tag in the message, and verifies the tag on the block chain so as to meter forwarding workload of the terminal equipment.
The blockchain is used for assisting in forwarding certification generation, completing contribution degree accounting of the opposite terminal equipment and completing token reward distribution to the opposite terminal side according to a corresponding incentive mechanism.
In order to make the objects, technical solutions and advantages of the present application more apparent, the technical solutions of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application.
As shown in fig. 1, an embodiment of the present application provides a method for aggregating idle bandwidth resources of an end device, which relates to a network node, an parsing system, an end device, and a blockchain system.
The end device in the embodiment of the application comprises but is not limited to being realized based on various software and hardware methods, but needs to be capable of identifying, processing and forwarding the message, and needs to be provided with a block chain program and a resource monitoring module, wherein the resource monitoring module needs to be capable of counting local network resource information. The network node and the end device have functions including, but not limited to, reading, filling and modifying the relevant fields of the message header, and interacting with the parsing system to perform name registration, query and cancellation services in addition to basic routing forwarding capability.
The service identifier generation in the embodiment of the application refers to classifying the terminal equipment based on the network information of the operator to which the terminal equipment belongs and the size of the available bandwidth, distributing a fixed service identifier to each type of terminal equipment, selecting different levels of analysis systems for registration by different types of service identifiers, for example, dividing a class for each type of operator respectively, taking the terminal equipment with the available bandwidth higher than a certain threshold value as a class of nodes and registering the class of nodes to global and field analysis domains, and taking the node with the smaller available bandwidth as a class of nodes to register to the field analysis domain where the node is located.
The service identifier is used for indicating a group of end-side forwarding devices willing to contribute idle bandwidth to network transmission, the mapping relation between the service identifier and the network address of the corresponding end-side forwarding device is maintained through the analysis system, and different service identifiers are used by different groups of end-side forwarding devices.
In this embodiment, the relay node selection algorithm is used to select an appropriate forwarding node from a set of candidate end-side forwarding devices, and the optional policy includes, but is not limited to, node selection in combination with a real-time network load situation and a historical network load situation of the node, where in this embodiment, the network load situation of the node may be represented by the following formula:
pathstatus(nodei)=(α*Bandwidthi+β/RTTi)*sigmoid(pi-p0)
The calculation method comprehensively considers the influence factors such as available Bandwidth, time delay, packet loss rate and the like, wherein Bandwidth i represents Bandwidth, RTT i represents time delay, alpha represents influence weight of uplink Bandwidth of a node on a path state, beta represents influence weight of round trip time delay on the path state, in an actual system, the values of alpha and beta need to be adjusted according to specific requirements, p i represents the packet loss rate to a node i, the packet loss rate can reflect the congestion condition of a link, and the influence of the packet loss rate on the link state can be described by using a sigmoid function because of long packet loss recovery time, and a definition formula of the sigmoid function is shown as a formula II. p 0 represents the average packet loss rate, and is generally 0.03 according to an empirical value, and the influence degree of p i on the link state can be adjusted by adjusting a gamma factor in a sigmoid function. If the effect of a certain factor on the link state is not considered, the corresponding weight value may be set to 0.
sigmoid(x)=1/(1+eγ*x)(γ>0)
The measurement of the link state is obtained according to the previous calculation formula, if the larger the value is, the better the link state to the corresponding end node is, the link state can be periodically detected, calculated and the result is cached locally, and the link state can be calculated again when the node is selected to reflect the link state more accurately.
The forwarding certification is that the network node and the destination network node respectively count traffic information sent to the end equipment and received from the end equipment, and the process record is uplink to generate the forwarding certification. For example, developing a service proof generation contract on a blockchain, establishing a proof generation session by a network node after identity authentication on the blockchain, generating a corresponding session tag, attaching the session tag to a message scheduled to an end device, and verifying the network node receiving the message on a blockchain platform to finish generation of a forwarding proof
In this embodiment, a blockchain incentive mechanism is used for the distribution of token rewards to the peers, including but not limited to implementations based on cenc, poR, etc. consensus algorithms or smart contracts, and game theory models can be used to optimize cost and benefit issues for both suppliers and consumers.
As shown in fig. 2, the specific steps of the method for aggregating idle bandwidth resources of an end device are summarized as follows:
(1) And the terminal equipment generates an identifier according to the operator of the equipment and the available network bandwidth information and a set rule, and registers the mapping relation between the identifier and the network address of the terminal equipment to analysis systems of different levels.
(2) The network node selects a proper mark according to the state information between the network node and the destination network node, and obtains a network address list of the terminal equipment from a site analysis system covering the current network node and the destination network node according to the mark inquiry, and if the network address list is not found, the network address list is inquired by a higher-level analysis system.
(3) The network node selects part of the end devices from the network address list of the end devices and inquires the network resource information from the end devices. And the network node selects the terminal equipment as a relay node for transmission according to the established rule and the network resource information fed back by the terminal equipment.
(4) The network node forwards the data message to the selected terminal equipment relay node, and the terminal equipment relay node forwards the data message to the destination network node.
(5) The network node and the destination network node calculate the total amount of the data messages forwarded by the relay node of the designated terminal equipment to generate a forwarding certificate, and record the forwarding certificate to the blockchain system.
(6) Metering the network contribution of the opposite terminal and distributing the token rewards based on a blockchain incentive mechanism;
(7) The terminal side forwarding equipment is disconnected and the mapping relation between the IP address and the corresponding ID is logged off to the analysis system.
Finally, it should be noted that the above embodiments are only for illustrating the technical solution of the present application and are not limiting. Although the present application has been described in detail with reference to the embodiments, it should be understood by those skilled in the art that modifications and equivalents may be made thereto without departing from the spirit and scope of the present application, which is intended to be covered by the appended claims.