Edge node management and control method and system
An edge node, control technology, applied in the Internet field, can solve the problem of edge node control and other problems that cannot be multi-network plane, and achieve the effect of high security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0066] Example 1, an edge node control method for controlling the edge node 200 in several edge clusters, and the edge cluster is deployed in the physical room, including the following steps:
[0067] S100, node registration:
[0068] The registration information sent by each edge node 200 is received, and the node registration is performed based on the registration information, and the registered edge node 200 is used as the registration node;
[0069] The registration information includes cluster information of the edge cluster of the edge node 200, further comprising node information corresponding to the edge node 200.
[0070] S200, get the encryption certificate corresponding to each registration node:
[0071] Remit to each registration node and receive certificate information for each registered node feedback;
[0072] When the certificate information contains an encryption certificate, the encryption certificate is saved;
[0073] When the certificate information does not ...
Embodiment 2
[0131] Example 2, an edge node control system, such as figure 2 As shown, a control platform 100 is included, and the tube control platform 100 communicates with several edge clusters, each of which includes several edge node 200;
[0132] The tube control platform 100 includes a processing module 110 and a forwarding module 120 that is connected to the signal;
[0133] The processing module 110 is configured to obtain control data and is also used to generate a corresponding control request based on the control data;
[0134] The forwarding module 120 is configured to establish an encrypted tunnel based on the target certificate, and the management request is issued to the target node through the encrypted tunnel and receives the target node to respond to the control results feedback from the management request, where the target is The node is the edge node 200 to be tube, and the target certificate is an encryption certificate corresponding to the target node.
[0135] Further, ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


