Unlock instant, AI-driven research and patent intelligence for your innovation.

Keeping alive method between peer node and client under peer node-client architecture

A peer-to-peer node and client technology, applied in the network field, can solve problems such as heavy burden on peer nodes, discrete topology keep-alive and session connection keep-alive, and bloated total number of keep-alive signaling, so as to reduce burden and reduce keep-alive The effect of the number of signaling

Active Publication Date: 2010-06-23
泰州市海通资产管理有限公司
View PDF3 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] like Figure 4 As shown, under the peer-to-peer node-client architecture, each peer node may have thousands or even tens of thousands of clients, and the topology keep-alive object and session of each client (session refers to before media transmission, A session connection needs to be established between the two peer nodes, and some parameters are negotiated for the transmission of the media) The keep-alive object will overlap on the same peer node, and the topology keep-alive and session connection keep-alive from each client Live is discrete, the total number of keep-alive signaling between the client and the peer node will appear bloated, because each keep-alive signaling needs to be transferred to the protocol stack of the peer node, and the burden on the peer node is also will be heavier

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Keeping alive method between peer node and client under peer node-client architecture
  • Keeping alive method between peer node and client under peer node-client architecture
  • Keeping alive method between peer node and client under peer node-client architecture

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0050] Such as Image 6 As shown, the client carries all existing session connection identifiers (Session ID, abbreviated as Ses ID, such as Ses1 and Ses2) in its own session table in the keep-alive signaling sent periodically (period Tc);

[0051] The peer node periodically receives the keep-alive signaling, and at the same time, matches and checks all the session connection identifiers immediately carried in the keep-alive signaling and all the session connection identifiers saved in the local session table of the peer node, so as to judge the local Check whether the session connection hangs up abnormally. If the peer node does not receive the keep-alive signaling from the client within a given time (Tp, Tp>Tc, the peer node’s maximum tolerance time for keeping the client alive), then it is determined that the client The client is abnormal (all session connections of this client are abnormal).

[0052] For example, if Image 6 Shown:

[0053] 1) At time t0,

[0054] The...

Embodiment 2

[0063] Such as Figure 7 As shown, in addition to carrying its own client identification (Client ID) in the Keepalive signaling sent by the client (Client) periodically (period Tc), it also carries all existing session connections in its own session table Identification (Session ID, abbreviated as Ses ID, such as Ses1, Ses2);

[0064] In addition to judging whether the client is alive by periodically receiving keep-alive signaling, the peer node (Peer) also uses all session connection identifiers carried in the keep-alive signaling and all session connections stored in the local session table of the peer node. The connection identifiers are checked one by one to determine whether there is a local session connection that hangs abnormally. If the peer node does not receive the keep-alive signaling from the client within a given time (Tp, Tp>Tc, the peer node’s maximum tolerance time for keeping the client alive), then it is determined that the client The terminal is abnormal (...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a keeping alive method between a peer node and a client under a peer node-client architecture, relates to the field of peer-to-peer networks, and solves the problems that the number of keep-alive signaling between the peer node and the client under the peer node-client architecture is many and the load of the peer node is heavy. The solution comprises: periodically receiving, by the peer node, the keep-alive signaling sent by the client, wherein the keep-alive signaling carries the session connection identification of each session existing in a session list of the client; and matching, by the peer node, the session connection identification carried in the received keep-alive signaling with the session connection identification of each session stored in a local session list, and checking, if the two are completely matched with each other, determining that the session connection between the client and the peer node is normal, and if the two are not completely matched, determining abnormal session connection according to the session connection identification. The invention is used for keeping alive between the client and the peer node under the peer node-client architecture.

Description

technical field [0001] The invention relates to the field of peer-to-peer networks, in particular to a method for keeping alive between a peer node and a client under a peer node-client architecture. Background technique [0002] P2P is the abbreviation of peer-to-peer (peer node to peer node), also known as peer-to-peer network, which is a mode in which all parties in a communication network are mutual clients / servers. In a peer-to-peer system, two or more PCs or other devices directly communicate or cooperate on the network, and share resources including processing power (CPU), storage space and data with each other. The essential feature of P2P is distributed computing. Its biggest feature is that there is no central server, and the computing power of each computer (especially the client device) on the network can be fully utilized, reducing the expensive expenditure on the central server (including software). , hardware, communication and manpower input, etc.), and avoi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/08
Inventor 殷悦夏晖张锦辉李峰
Owner 泰州市海通资产管理有限公司