CN111934919A - Network convergence and networking method, equipment and storage medium thereof - Google Patents

Network convergence and networking method, equipment and storage medium thereof Download PDF

Info

Publication number
CN111934919A
CN111934919A CN202010737059.4A CN202010737059A CN111934919A CN 111934919 A CN111934919 A CN 111934919A CN 202010737059 A CN202010737059 A CN 202010737059A CN 111934919 A CN111934919 A CN 111934919A
Authority
CN
China
Prior art keywords
network element
element node
operator
operator network
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010737059.4A
Other languages
Chinese (zh)
Other versions
CN111934919B (en
Inventor
何樱
古莹莹
江漫滔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiamen Tanhong Information Technology Co ltd
Original Assignee
Xiamen Tanhong Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiamen Tanhong Information Technology Co ltd filed Critical Xiamen Tanhong Information Technology Co ltd
Priority to CN202010737059.4A priority Critical patent/CN111934919B/en
Publication of CN111934919A publication Critical patent/CN111934919A/en
Priority to PCT/CN2021/093077 priority patent/WO2022021997A1/en
Application granted granted Critical
Publication of CN111934919B publication Critical patent/CN111934919B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0823Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • H04L63/0414Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden during transmission, i.e. party's identity is protected against eavesdropping, e.g. by using temporary identifiers, but is known to the other party or parties involved in the communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates

Abstract

The invention discloses a network convergence and networking method, equipment and a storage medium thereof, belonging to the technical field of block chains. The method comprises the steps of analyzing and verifying more than one first transaction passing through, judging whether the first transaction is a transaction containing a request networking of a first operator network element node, if so, carrying out network fragmentation on the first operator network element node requesting to join based on NFV/SDN technology according to a consensus method at least comprising the request networking request of the first operator network element node and first transaction content including the request networking request first operator network element node identity, and can realize rapid networking, safety isolation, network fusion, resource sharing and access speed and experience improvement.

Description

Network convergence and networking method, equipment and storage medium thereof
Technical Field
The present invention relates to the field of blockchain technologies, and in particular, to a network convergence method, a networking method thereof, a device thereof, and a storage medium.
Background
Once the conventional mobile phone operating system accesses the operator network, a network interface is virtualized, and an IP address allocated by a core network is configured on the network interface. Certainly, a conventional mobile phone may simultaneously activate multiple connections (corresponding to multiple interfaces) in a multiple APN mode or a single APN multiple PDP Context mode, and each interface is assigned with an IP address, but the IP addresses on the interfaces must be different. If the two are the same, the mobile phone refuses to access the network. In a conventional connection mode of multiple APNs of a mobile phone, multiple ip address conflicts are generated.
The block chain network system is introduced under various scenes due to the technical effects of safety, difficult tampering and the like, so that the technical problem that resources, information or data and the like are easy to modify under various scenes is solved, but the common identification process is time-consuming, the speed is low in the actual implementation process, and few technical schemes run well.
In the existing communication service field, several operators are independent of each other, the integration of three networks is always a difficult point in the current domestic communication field, and the problems of high hardware infrastructure transformation cost, difficult software network system realization and the like exist.
If only one network exists in the country, the wider the broadband is, the faster the speed is. However, internet networks in China are not only provided by one family, telecommunication and communication occupy a large part, and movement occupies a small part, and in addition, cable television operators also provide internet access services. At this time, the interconnection and interworking between different network operators is the biggest bottleneck, and the problem cannot be solved only by increasing the bandwidth of one provider alone. How to establish a data sharing scheme and realize invisible data availability includes how to perform data interaction, and the lack of a unified standard on a block chain platform is a bottleneck acknowledged by the industry at present.
There are 400 ten thousand base stations in the world, 300 ten thousand base stations are in china, but people still find that the coverage of some small area networks on expressways and in large cities is insufficient, the delay can reach hundreds of milliseconds or even tens of seconds, and for the internet of things, the problem of transmission synchronization is huge.
Disclosure of Invention
1. Technical problem to be solved by the invention
In order to overcome the technical problems, the invention provides a network convergence and networking method, equipment and a storage medium thereof, which can realize rapid networking, realize safety isolation, network convergence and resource sharing, and improve access speed and experience.
2. Technical scheme
In order to solve the problems, the technical scheme provided by the invention is as follows:
a networking method for network convergence comprises the following steps: analyzing more than one first transaction passing the verification, judging whether the first transaction is a transaction containing a request networking of a first operator network element node, if so, carrying out network fragmentation on the first operator network element node requesting to join based on NFV/SDN technology according to a consensus method at least comprising the request of the first operator network element node requesting to network and first transaction content including the identity of the first operator network element node requesting to network, allocating the first operator network element node requesting to network to a first network, and sending a message for allocating the first operator network element node requesting to network to the first operator network element node; receiving a response message of a first operator network element node requesting networking; judging whether a first operator network element node requesting networking agrees to be distributed to a first network or not; if yes, the first transaction and the transaction package uplink which comprises the step of distributing the first operator network element node requesting networking to the first network; if not, the first transaction and the transaction packaging uplink which comprises the first operator network element node which requests the networking are refused to be distributed to the first network are carried out.
Optionally, the network segment instantiates physical infrastructure or underlying network services and functions according to different requirements to form more than one first operator network element node, and performs networking according to the networking method to form more than one first network.
Optionally, one of the first networks corresponds to one IP protocol stack instance.
A network converged networking method, according to the above-mentioned network converged networking method, comprising: sending a first transaction at least comprising a consensus method required by a first operator network element node requesting networking and an identity of the first operator network element node requesting networking to a root chain; receiving a message sent by a root chain and used for allocating a first operator network element node requesting networking to a first network; a response message is sent to the root chain agreeing or disagreeing with the assignment to the first network.
A network convergence method, according to the above network convergence networking method, comprising: receiving a first request transaction which is sent by a first operator network element node and requests to utilize resources of a second operator different from the first operator, and sending a first conversion contract interface to the first operator network element node after the first operator network element node passes identity verification; receiving messages of a first operator network element node for accessing and quitting a first conversion contract interface; sending basic information of accessing and quitting the first conversion contract interface of the first operator network element node to the first operator network element node; after receiving a confirmation message sent by a first operator network element node, uplink is carried out; the root chain is provided with more than one first conversion contract, and the first conversion contract is used for converting the resource access and utilization interface of the second operator into an interface mode which can be accessed and utilized by the network element node of the first operator; the first operator network element node sending a first request transaction to a root chain requesting utilization of resources of a second operator different from the first operator; if the identity verification of the first operator network element node passes, receiving a first conversion contract interface; accessing a first conversion contract interface and sending a message for accessing the first conversion contract interface to a root chain; quitting the first conversion contract interface and sending a message of quitting the first conversion contract interface to the root chain; receiving basic information for accessing and exiting the first conversion contract interface sent by the root chain; and verifying the basic information for accessing and exiting the first conversion contract interface and feeding back the basic information to the root chain.
Optionally, the process of authenticating the identity of the first operator network element node includes: performing hash operation on an encryption key to be verified of the first operator network element node to obtain a hash value of the encryption key to be verified, comparing the hash value with the hash value of the encryption key on the root chain, if the hash value is consistent with the hash value of the encryption key, decrypting a ciphertext of the identity information of the first operator network element node through the encryption key to obtain a plaintext of the identity information of the first operator network element node through an AES256 algorithm, and passing the identity verification of an access party; if the hash value of the encryption key to be verified is inconsistent with the hash value of the encryption key on the root chain, the identity verification of the network element node of the first operator is not passed; correspondingly, the process of encrypting the identity of the first operator network element node is as follows: obtaining a ciphertext of the identity information of the network element node of the first operator from a plaintext of the identity information of the network element node of the first operator according to an AES256 algorithm through an encryption key; and performing hash operation on the encryption key to obtain an encryption key hash value, and linking the encryption key hash value and the ciphertext of the first operator network element node identity information in the root chain.
Optionally, the uplink includes saving uplink content to a cloud computing or fog computing storage space.
Optionally, the root chain and the copyright registration mechanism perform data interaction through a first conversion contract interface; the data interaction method comprises the following steps: receiving a second request transaction for requesting registration of the digital rights certificate sent by a first operator network element node, wherein after the identity authentication of the first operator network element node is passed, the root chain sends the second request transaction for requesting registration of the digital rights certificate to the digital rights registration mechanism through the first conversion contract interface by the first operator network element node; if the digital copyright certificate conforms to the examination regulation of the digital copyright registration mechanism, the root chain receives the digital copyright certificate which is sent by the digital copyright registration mechanism and contains DCI, and forwards the digital copyright certificate to the first operator network element node; if the digital copyright registration authority does not conform to the examination regulation of the digital copyright registration authority, the root link receives a notice of modifying and registering the digital copyright material or a notice of not granting the digital copyright certificate sent by the digital copyright registration authority and forwards the notice to the network element node of the first operator; or, receiving a third request transaction for requesting to verify the digital rights certificate DCI sent by the first operator network element node, after the identity verification of the first operator network element node passes, sending, by the root chain through the first conversion contract interface, the third request transaction for requesting to verify the digital rights certificate DCI by the first operator network element node to the digital rights registration authority; if the digital copyright registration mechanism passes the verification, the root link receives a notification that the DCI sent by the digital copyright registration mechanism passes the verification and forwards the notification to the first operator network element node; if the authentication of the digital copyright registration mechanism is not passed, the root link receives a notification that the DCI authentication of the digital copyright certificate sent by the digital copyright registration mechanism is not passed, and forwards the notification to the first operator network element node, the copyright protection mechanism and an evidence platform approved by the intellectual property right court for evidence storage.
A network convergence method, a network convergence method according to any of the above, comprising: sending a first request transaction to a root chain requesting utilization of a resource of a second operator different from the first operator; if the identity verification of the first operator network element node passes, receiving a first conversion contract interface; accessing a first conversion contract interface and sending a message for accessing the first conversion contract interface to a root chain; quitting the first conversion contract interface and sending a message of quitting the first conversion contract interface to the root chain; receiving basic information for accessing and exiting the first conversion contract interface sent by the root chain; and verifying the basic information for accessing and exiting the first conversion contract interface and feeding back the basic information to the root chain.
Optionally, the first conversion contract interface is further configured to perform data interaction with a copyright registration mechanism, and the method of performing data interaction with the copyright registration mechanism includes: sending a second request transaction to the root chain requesting for material required to register the digital rights certificate; if the certificate conforms to the examination regulation of the digital copyright registration mechanism, receiving a digital copyright certificate which is forwarded by the root chain and contains DCI and is sent by the digital copyright registration mechanism; if the digital copyright registration authority does not conform to the examination regulation of the digital copyright registration authority, receiving a notice of modifying and registering the digital copyright material sent by the digital copyright registration authority forwarded by the root chain or a notice of not granting the digital copyright certificate.
A network convergence method, a network convergence method according to any of the above, comprising: sending a request to a first operator network element node to utilize resources of a second operator different from the first operator; receiving a first conversion contract interface sent by a first operator network element node; accessing a first conversion contract interface, and sending a message for accessing the first conversion contract interface to a root chain through a first operator network element node; quitting the first conversion contract interface and sending a message of quitting the first conversion contract interface to the root chain through the first operator network element node; receiving basic information for accessing and exiting a first conversion contract interface transmitted by a root chain transmitted by a first operator network element node; verifying the basic information of accessing and quitting the first conversion contract interface, and feeding back the basic information to the root chain through the first operator network element node; after receiving a request sent by a terminal and using resources of a second operator different from a first operator, a first operator network element node sends a first request transaction of the terminal requesting to use the resources of the second operator different from the first operator to a root chain; if the first operator network element node and the terminal identity are verified, receiving a first conversion contract interface and forwarding the terminal; receiving and sending a message that a terminal accesses a first conversion contract interface to a root chain; receiving and sending a message that a terminal exits from a first conversion contract interface to a root chain; receiving basic information of terminal access and exit of a first conversion contract interface sent by a root chain; and receiving and feeding back basic information for the terminal to verify access and exit of the first conversion contract interface to the root chain for uplink.
Optionally, space-based internet, 5G communication or satellite-to-ground communication is adopted between the terminal and the first operator network element node, between the first operator network element node and the root chain, between the first operator network element nodes, and between the terminals.
Optionally, the first operator network element node is a communication base station or a satellite.
Furthermore, the present invention provides an apparatus comprising: one or more processors; memory for storing one or more programs that, when executed by the one or more processors, cause the one or more processors to perform a method as described above.
Accordingly, the present invention provides a storage medium storing a computer program which, when executed by a processor, implements a method as claimed in any one of the above.
3. Advantageous effects
Compared with the prior art, the technical scheme provided by the invention has the following beneficial effects:
(1) the communication mode of the network convergence networking method is MQTT. And when the transaction is packed and linked, adding a timestamp of a national time service center of the Chinese academy to prevent data conflict in later network fusion. Logic isolation is realized through network fragmentation, and the problems of low safety isolation and difficult deployment of NFV/SDN network fragments are solved.
(2) In the network convergence method according to the embodiment of the present application, the basic information of the first operator network element node accessing and exiting the first conversion contract interface includes, but is not limited to, a time when the first operator network element node accesses the first conversion contract interface, and a time when the first operator network element node exits the first conversion contract interface; the flow size, the occupied time of the frequency band, the cost and the like; the processes of settlement, resource sharing and network convergence are realized; communication and data and value exchange are realized.
Drawings
Fig. 1 is a schematic structural diagram of an apparatus according to an embodiment of the present invention.
Fig. 2 is a flowchart of a network convergence networking method according to an embodiment of the present invention.
Fig. 3 is a second flowchart of a networking method for network convergence according to an embodiment of the present invention.
Fig. 4 is a flowchart of a network convergence method according to an embodiment of the present invention.
Fig. 5 is a second flowchart of a network convergence method according to an embodiment of the present invention.
Fig. 6 is a third schematic flowchart of a network convergence method according to an embodiment of the present invention.
Detailed Description
For a further understanding of the present invention, reference will now be made in detail to the embodiments illustrated in the drawings.
The present application will be described in further detail with reference to the following drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the relevant invention and not restrictive of the invention. It should be noted that, for convenience of description, only the portions related to the present invention are shown in the drawings. The terms first, second, and the like in the present invention are provided for convenience of describing the technical solution of the present invention, and have no specific limiting effect, but are all generic terms, and do not limit the technical solution of the present invention. It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
Example 1
A networking method for network convergence, which is suitable for being used as a virtual machine or a cluster node on a root chain of a block chain system for network convergence, as shown in fig. 2, includes:
s101, analyzing more than one first transaction passing verification;
s102, judging whether the first transaction is a transaction containing a request of networking of a first operator network element node; if so, then
S103, according to a first transaction content at least comprising a consensus method required by a first operator network element node requesting networking and a first operator network element node identity requesting networking, network fragmentation is carried out on the first operator network element node requesting joining based on NFV/SDN technology, the first operator network element node requesting networking is distributed to a first network, and a message for distributing the first operator network element node requesting networking to the first network is sent to the first operator network element node;
s104, receiving a response message of a first operator network element node requesting networking;
s105, judging whether a first operator network element node requesting networking agrees to be distributed to a first network; if so, then
S106, distributing the first transaction and the first operator network element node which requests networking to a transaction packaging uplink of a first network; if not, then
S107, the first transaction and the transaction packaging uplink which comprises the refusal of the first operator network element node requesting the networking are distributed to the first network.
Network elements refer to devices in a network, such as for LTE architecture, network elements include base stations, in addition to MMEs, SGWs, PDNs, etc. The granularity of network element division is many, and can be divided into physical network elements, logical network elements, equivalent network element numbers and the like according to the application. The first of the first operators is a generic term, which does not correspond to a specific operator name and can be converted into the same or different operator names according to the actual application needs. The first operator network element node described in this embodiment refers to a network element that can operate as a node of a blockchain system, such as a base station, a server, a cluster, and the like of an operator such as mobile, universal, or telecommunication; such as fog computing nodes, cloud computing center nodes, edge computing nodes, etc. of each operator.
The identity of the first operator network element node includes but is not limited to an operator system, such as mobile, internet or telecommunications, in which the first operator network element node is located; the name of the network element itself, such as a switch, base station, or server; the IP address, the physical address and the like of the first operator network element node are convenient for the root chain to judge and identify according to the network fragmentation rule and carry out network fragmentation. The network fragmentation rules set by the root chain are based on fairness and fairness, the principle that each fragmentation network tends to centralization is prevented, the data safety and the authenticity and the non-falsification of each fragmentation network are ensured, and the network fragmentation rules can be set flexibly according to the actual application requirements, for example, network element nodes of different operators are distributed to different network fragments in a disorderly manner, that is, only nodes from the same operator cannot exist in the same fragmentation network; or, the nodes with strong computing power are separately arranged in different fragmentation networks, so that the computing power difference between the fragmentation networks is prevented from being too great; ensuring that the computational power of each sharded network is balanced, etc.
If the consensus method required by the first operator network element node requesting networking, such as the consensus algorithms of POS, DPOS, POW, and the like, is consistent with the consensus algorithm of the first network, and the identity of the first operator network element node requesting networking meets the requirement of the network fragmentation rule of the root chain of the block chain system serving as network convergence, the first operator network element node requesting to join is subjected to network fragmentation based on the NFV/SDN technology, the first operator network element node is allocated to the first network, the re-networking of network element devices of different operators is completed, and network convergence is facilitated by applying the root chain priority principle.
The communication mode of the networking method with network convergence described in this embodiment is MQTT. And when the transaction is packed and linked, adding a timestamp of a national time service center of the Chinese academy to prevent data conflict in later network fusion. Logic isolation is realized through network fragmentation, and the problems of low safety isolation and difficult deployment of NFV/SDN network fragments are solved.
5G infrastructure sharing, mainly refers to that a seller Mobile Network Operator (MNO) abstracts and divides physical and radio infrastructure resources into different virtual resources to provide the resources through network virtualization. Each virtual resource has a different respective function, service, and goal. The block chain can assist in realizing more efficient and safe 5G resource sharing and service condition tracing. Using smart contracts, decentralized agreement sharing and payment may be automatically implemented.
The root chain sets the principle and method of network slice following, and the NFV technology is adopted in the 5G wireless access network and the core network; currently, the main terminal equipment in the 4G network is a mobile phone, and the radio access network part (including a Digital Unit (DU) and a radio frequency unit (RU)) and the core network part in the network both use dedicated equipment provided by an equipment manufacturer.
To implement Network slicing, Network Function Virtualization (NFV) is a prerequisite. Essentially, NFV is to transfer the software and hardware functions of the dedicated devices in the network (such as MME, S/P-GW and PCRF in the core network, digital unit DU in the radio access network, etc.) to Virtual hosts (VMs). These virtual hosts are industry standard-based commercial servers, which are COTS commercial off-the-shelf products, low cost, and simple to install. Briefly, industry standard based servers, storage and network devices are used to replace dedicated network element devices in a network.
After the network is subjected to function virtualization, a radio access network part is called Edge Cloud (Edge Cloud), and a Core network part is called Core Cloud (Core Cloud), and the Edge Cloud and the Core Cloud can be used as nodes in a networking method to be sliced and distributed by the network. VMs in the edge cloud and VMs in the core cloud are interconnected through an SDN (software defined network), so that after the network adopts NFV and SDN technologies, slicing is very easy to perform, and the network can be 'sliced' into a plurality of virtual sub-networks (slices) like a slice packet.
The network fragments instantiate physical infrastructure or underlying network services and functions according to different requirements to form more than one first operator network element node, and networking is performed according to the networking method to form more than one first network.
According to predefined rules, intelligent contracts on the root chain may be implemented to allow different requesters to autonomously and dynamically negotiate various service contract terms. In addition, the operator may also register and publish network slice functions in the blockchain, such as:
intelligent contracts on the root chain agree on slice selection lD: NSSAI
The intelligent contract slicing agreement aims at opening up a special virtual network on a 5G network of an operator for different industries or enterprises so as to meet the requirements of industry or enterprise specialization. The original pipeline connection of an operator facing to individuals or individuals (such as machines) can be isolated from public users on the network to walk on own special roads; simple network maintenance can also be performed based on the slice network; even by slicing, a more guaranteed SLA can be achieved compared to the average user.
The SLA of the service, including traditional network indexes such as bandwidth, delay, packet loss and jitter, is ensured, and the index advantages are improved;
the 5G network characteristic supports: a UE supports 8 slices at most simultaneously, and the slice id has 32bits at most, wherein the slice types have 256 at most, and each slice type can be subdivided into 24 bits at most.
Time delay: about 4ms from terminal to base station; approximately 5ms from base station to edge; approximately 5ms from the base station to the province core.
Isolation: a logically independent network is obtained, avoiding network risks and avoiding divulgence of secrets.
Self-operation and maintenance: slice tenants can view the network statistics and status related to their slices.
The three large scenarios eMBB, urrllc and mtc defined by the standard are considered as three public networks, not one, because their implementation technologies (especially those of the wireless side) are different. The SLA guarantees provided by the three scenarios themselves, such as low-latency, large-scale mass terminal access, are valuable. However, further subdivision within each scenario, such as eMBB with "high/medium/low" SLA differentiation, is subject to providing SLA guarantees over the public network.
NSSAI is the most innovative one of the 5G slice-related concepts. NSSAI is a set of S-NSSAIs, which is defined by 3GPP as a 32-bit integer and can be further divided into two parts: SD and SST, where SD is 24 bits and SST is 8 bits. On a 32-bit computer, S-NSSAI is an integer and handles very well.
SST defines the type of the slice network, for example, if SST is 1, it indicates that the slice is an eMBB slice; if 2, then the slice is uRLLC; if 3, mMTC is the 5G service type, which is well-known.
When a 5G user opens an account, the intelligent contract appoints to sign one or a plurality of S-NSSAIs on the core network, and can be simply regarded as signing one or a plurality of slices. When the 5G terminal accesses the network, one or more signed S-NSSAIs are carried. In case of multiple network slices, the network device knows the network slice that the terminal wants to access based on the S-NSSAI and accesses the terminal into this slice. It can be seen that in case of a 5G network with multiple slices, the S-NSSAI will direct the network into which slice the terminal is accessed.
At most 8S-NSSAIs can be simultaneously brought to the 5G network by one terminal, that is, 8 slices can be simultaneously accessed. The method not only puts requirements on a baseband chip of the mobile phone (to process S-NSSAI), but also has new requirements on a traditional mobile phone operating system, an application program and the like. The most important requirement is that the terminal operating system supports a "Multiple Instance" IP Stack (Multiple Instance IP Stack).
Once the conventional mobile phone operating system accesses the operator network, a network interface is virtualized, and an IP address allocated by a core network is configured on the network interface. Certainly, a conventional mobile phone may simultaneously activate multiple connections (corresponding to multiple interfaces) in a multiple APN mode or a single APN multiple PDP Context mode, and each interface is assigned with an IP address, but the IP addresses on the interfaces must be different. If the two are the same, the mobile phone refuses to access the network.
The situation will be different for a scene with 5G slices. In many cases, a mobile phone will access multiple slices simultaneously. The IP address for each slice, which may be independently assigned or even not controlled by the operator, is assigned by the enterprise that purchased the slice. Therefore, the situation of IP address conflict can occur to the mobile phone with high probability.
To avoid the above conflict, one of the first networks corresponds to one IP protocol stack instance. And setting IP protocol stack modification of an operating system kernel based on a root chain intelligent contract to realize multi-instantiation protocol stacks, wherein one slice corresponds to one IP protocol stack instance. Similar to the concept of VRF on a router, but more complex because the problem of different APPs accessing different protocol stack instances is also considered. In the embodiment of the invention, a standardized and artificial intelligent API interface is adopted.
NSSAI and S-NSSAI are inclusive, one NSSAI contains multiple S-NSSAIs, and the former S in S-NSSAI is Single meaning. In 5G, network slice refers to physical infrastructure and underlying network services technology core network slice
The combination of shared and dedicated network elements within a core network slice is generally divided into three typical scenarios:
controlling the full isolation of the user plane:
slicing the sharing network element: AUSF, UDM, NSSF.
Slicing special network elements: SMF, PCF, UPF, AMF
1) Scene: scenes with high security isolation requirements/customization requirements. The same terminal multi-slice scene is not supported.
2) The following steps are described: dedicated control and user plane network elements are allocated to the slices as much as possible, and the UDM/AUSF can be considered as dedicated under a completely isolated manufacturer as required.
3) The safety isolation is highest, the cost is highest, and the deployment difficulty is moderate.
Partial control, user plane specific:
slicing the sharing network element: AMF, PCF, NSSF, UDM
Slicing special network elements: SMF, UPF
1) Scene: the safety isolation is moderate, and multiple slices of the same terminal can be supported
2) The following steps are described: part of the control plane is dedicated to the user plane. Generally dedicated to SMF + UPF
3) General safety isolation, general cost, easy deployment and better support of manufacturers
The existing technology has general safety isolation under the conditions of low cost and good manufacturer support, and has good safety and low cost if a root chain-based protection method is adopted. The reason that the existing network convergence is difficult to deploy is that four operator communication base stations are all independently constructed, and the desert plateau island ocean base station in the western remote region is difficult to construct and has extremely high cost. Although the standardization unification and fusion of the 5G core network are formed, the service network cannot be fused and is divided, so that the capacity of the virtual machine is physically limited, and if the cost is reduced, the standardization and unified deployment are required, a root chain is required to be used for protection, and the service network is sliced. The virtual machine of the root chain is free from physical limitation, so that the space of the virtual machine is infinite, theoretically, the stored intelligent contract is also infinite, and the unified fusion of service networks is solved.
The space-based internet integrates a ground 5G core network and a mobile base station end to provide data return, is a Mesh network, and provides data connection by using an inter-satellite network of a small platform routing microwave link. "for example: the global total number of 400 ten thousand base stations, 300 ten thousand base stations are in China, but it still can be found that the coverage of networks in small areas on expressways and in large cities is insufficient, the delay can reach hundreds of milliseconds or even tens of seconds, for the Internet of things, the problem that the transmission synchronism is huge can be caused, the whole Internet of things can be broken down, a satellite is needed for making up the small blind spots of communication to reach uninterrupted full-communication Internet of things, the satellite is interconnected with a 5G network on the ground, the cloud service can adopt a satellite in space, namely, the cloud computing is further expanded into space computing, and the space computing has no physical limitation. Based on a block chain network of layered storage, big data is stored under a chain, a virtual machine can be infinite without physical limitation by cloud computing, and the upper layer of the chain obviously shows that a P2P network architecture of a Mesh network is adopted based on the former two patents, so that a technical scheme that a space-based internet is fused with a ground 5G core network and a mobile base station end to provide data return is provided, the Mesh network is adopted, and a small platform is used for routing an inter-satellite network of a microwave link to provide data connection.
The 5G core network has no problem in slicing, the safety isolation is high, as long as the fusion of the base station level is solved, the microwave link is used for solving the problem that the base station receives satellite signals, the microwave link is an improvement on the base station, the user can be covered by using the spot wave beams of microwaves, and the signal receiving to the service terminal, namely the sensor terminal of the Internet of things, is realized by using the wave speed control technology.
For user plane
Slicing the sharing network element: PCF, SMF, AUSF, UDM, NSSF, AMF;
slicing special network elements: UPF;
1) scene: only the user plane is required to isolate a special scene, and multiple slices of the same terminal are supported;
2) the following steps are described: user plane dedicated, control plane shared;
3) the safety isolation is low, the cost is lowest, the deployment is difficult, and the N4 interfaces of the SMF and the UPF need to be opened.
An access network slicing technology and terminal support;
the access network can sense the slices, realize slice-level resource allocation, isolation and quality guarantee, and realize differentiated processing of flow in different slices; different slices share wireless network resources as much as possible, and the wireless network resources are utilized to the maximum extent.
1) An access network senses slicing;
2) the access network supports the selection of partial functions of the slice core network;
3) the access network supports slice parameters mapped based on slice SLAs, and slice-level resource allocation and scheduling are realized;
4) the slice resources in the access network can be shared or dedicated;
5) the access network supports resource isolation of different slices;
6) the access network supports slice availability;
7) the access network supports single-terminal multi-slice multi-connection;
8) slicing requirements for network access management: supported slice instances, customized configuration of slice functions, slice parameter indices (SLA quantization);
the terminal supports the ability of selecting different network slices for access by different services, and supports the identification (S-NSSAI) carrying the access network slices in the signaling of the access network and the core network;
1) the terminal supports the capability of storing and updating network slice related identification and slice selection strategies;
2) based on the slice selection strategy, the capability of selecting and accessing the corresponding network slice according to the application is supported;
3) the terminal supports that the related slice identification is carried in the signaling of the access network and the core network and is transmitted to the network;
4) the terminal can be simultaneously accessed to one network slice, and can also be simultaneously accessed to a plurality of network slices;
5) the terminal can simultaneously obtain the network slice service through one or more wireless network stations.
Transmission network slicing technology
The transmission network slicing technical scheme is hard isolation and soft isolation, and can adapt to different service requirements, including bandwidth, time delay, jitter, safety and the like.
Wireless network fragmentation mapping
1) Wireless device configuration NSSAI to VLAN address mapping;
2) a sub-interface is established in a wireless mode to serve as a slicing service address, each slicing service is independently distributed with IP + VLAN, and the slicing services enter different transport networks VPN;
3) sessions carrying the same 5QI but belonging to different slices NSSAI will map to different VPNs.
Transport network fragmentation deployment
1) The intra-provincial transmission carries out networking according to SPN: (1) and establishing a VPN pipeline according to an end-to-end SE slice Ethernet channel, configuring end-to-end intersection and supporting hard isolation. (2) Establishing a VPN pipeline according to an end-to-end L2VPN or an L3VPN to support soft isolation;
2) the province trunk is networked according to the SPN + OTN to support the VPN.
Core network fragmentation mapping
1) The core network platform configures mapping from S-NSSAI to IP address;
2) the core network slices enter different VPN slices through routing IP information.
Network slice management
Network slice lifecycle management
1) Slice design
Translating the requirements of the network slicing service to generate a network slicing template; and converting the service requirement into a slicing network requirement, and mapping the slicing network requirement to different management domains.
2) Slice configuration
And generating an end-to-end configuration strategy, interacting with a network management function, and configuring various network functions in the network slice.
3) Slice lifecycle management
And managing service level life cycle, such as online, offline, updating, expanding and contracting capacity and the like. In coordination with NFV, SDN virtualization lifecycle management.
4) Opening of the slice
The slice is opened to the outside in the form of service; management function of open part network slice;
network slice failure, performance management
1) Slice monitoring
Managing/monitoring the self-owned slice by the operator; managing/monitoring third-party slices by an operator; the management/monitoring of its subscription slices by third parties.
2) The slicing quality can be ensured
The network slice management function has a quality index view of an end-to-end network slice; the sub-network slice management function is responsible for quality assurance mechanisms within the domains.
Network slicing operation and maintenance
1) Automatic and intelligent slicing
Automation of operation of each stage of slice management; and (4) carrying out deployment and operation adjustment based on intelligent slices.
Virtualized implementation of slices
1) The network slice core network is realized by virtualization, and the wireless virtualization is to be further confirmed;
2) and the centralized NFVO uniformly manages the network functions of multiple manufacturers.
Operation flow
(1) The customer puts forward the business requirement, signs SLA: latency: 50ms, Reliability: 99.99%, Roaming: NO, Max TP/Site:5Gbps, Meters:50 million.
(2) The operator receives the demand, analyzes the service demand, and generates the network demand (network slicing template): business model, configuration model, resource model.
(3) And if the network slice is newly built, sending a new building requirement to slice management, and starting a slice design and instantiation process.
(4) And issuing running state configuration (service configuration activation and resource application).
For different application scenarios, the network is "cut" into 4 "slices":
high-definition video slicing: after a Digital Unit (DU) and part of core network functions in an original network are virtualized, a storage server is added, and the digital unit and the core network functions are uniformly put into an edge cloud. And the core network functions that are partially virtualized are put into the core cloud.
Slicing the mobile phone: after being virtualized, a Digital Unit (DU) of a wireless access part of an original network is put into an edge cloud. The core network functions of the original network, including the IMS, are virtualized and then put into the core cloud.
Slicing a mass of Internet of things: in this slice, the task of the core cloud is relatively easy and simple, since most sensors are stationary and do not require mobility management.
Mission critical internet of things slicing: due to the high requirement on time delay, in order to minimize the end-to-end time delay, the core network function and the related server of the original network are sunk to the edge cloud.
The network structure is such that: of course, the network slicing technique is not limited to these several types of slices, and it is flexible, and the operator can customize its own virtual network according to the application scenario as desired.
2) Connection of edge cloud to cloud computing: IP/MPLS-SDN
The 5G slice network connects edge clouds and VMs in cloud computing through the SDN. The method comprises the steps that virtualized servers are arranged in cloud computing, built-in vRouter/vSwitch runs in hypervisors of the servers, an SDN controller is responsible for creating SDN tunnels between the virtual servers and DC G/W routers, and then the SDN controller performs mapping between the SDN tunnels and MPLS L3VPN, so that connection between the cloud computing and an edge cloud is established.
3) Network slice of edge cloud and base station radio frequency unit
We now go to the forward pass section. How to complete slicing of the section between the 5G Radio Unit (RU) and the edge cloud (fronthaul)? Firstly, the 5G forward-transmission standard needs to be defined, and no unified standard exists at present. Is International Telecommunications Union (ITU)5G research Group for Mobile communication standards (Focus Group on IMT-2020)
The intelligent contract may also agree to:
firstly, the method comprises the following steps: 5G infrastructure crowdsourcing: social capital is introduced by sharing revenue and bidding is carried out in a manner of resource recruitment.
Secondly, the method comprises the following steps: international roaming: in this scenario, in the future, distributed roaming network access and authentication based on the blockchain may be adopted, user information of different network operators on the blockchain network may be efficiently and safely shared, seamless and convenient access of roaming services may be achieved, and intervention of any central entity may not be required. Authorization authentication, as well as automatic billing and payment may be accomplished based on the smart contract.
Thirdly, the method comprises the following steps: internet of things device management and authentication in 5G, connection delay of millions of Internet of things devices is not expected to be 1 millisecond. The combination of such a large number of internet of things devices opens up the possibility of providing new business models and services for future mobile users. The decentralized management scheme based on the block chain has higher trust, visibility and traceability, and can also realize automatic payment.
The convergence of 5G + blockchain technology is a future trend. The block chains and the 5G are mutually assisted and complement each other. The implementation of the 5G-based everything interconnection can bring infinite possibilities for the development of the application of the Internet of things. But trillions of node deployment, everything interconnection, mutual service providing, data security, data and value transaction.
From the 5G communication application field, the blockchain power-assisted solves these problems. The fusion of blockchains with 5G can redefine the digital economic era. Blockchains can be seen as key drivers to ensure 5G network security.
Solving single point of failure: in the scenes of communication resource sharing and the like, the service architecture without centralization is used, so that the bottleneck problem is eliminated, and the service delivery quality is effectively enhanced.
The problem of number right: the amount of data grows exponentially. The block chain provides infrastructure support for the data authority of the 5G era.
Tracing the source problem: in the scenes of service sharing, settlement and the like, shared data, resource use condition and other information cannot be tampered and traceable after being linked, and service disputes are reduced.
Safety problems are as follows: the combination of blockchain and 5G may enhance privacy mechanisms by providing a distributed trust model.
Multi-party collaboration: in the 5G era, operators need to thoroughly retrofit back-end systems to manage more complex 5G ecosystems consisting of more participants and networks. Today's systems are not at all suited to deal with this problem. As such, blockchains are becoming operators to achieve this through efficient, secure, extensible, and transparent processes and support multiparty collaboration that is critical to the success of the 5G future.
In the resource using process, a terminal user can carry out complaint suggestion on the network service through the APP, and a complaint ID is displayed in resource details through a block chain after being supplemented with relevant network performance parameters; resource alarms and requirements to be optimized generated by the lessees in the use of network resources can be informed to the lessors through the block chains; the evaluation and feedback of the user and the lessee on the service can be taken as a consideration factor of settlement, and the evaluation and feedback are represented in the settlement by charging.
The service evaluation scene establishes a supervision and feedback mechanism for a service provider through a blockchain, improves the network service quality and the terminal customer perception, guarantees the benefits of investors and lessees, and maintains the healthy operation of a co-establishment sharing mechanism.
The point-to-point transmission security problem is solved by utilizing an encryption technology, the problem of account book storage is solved, and the problem of business customization is solved by intelligent contracts. The technical problem of integration of telecommunication network, broadcast network and internet is solved in a breakthrough manner.
A network convergence networking method, adapted to a first operator network element node requesting networking, according to the above-mentioned network convergence networking method, as shown in fig. 3, includes:
s201, sending a first transaction at least comprising a consensus method required by a first operator network element node requesting networking and a first operator network element node identity requesting networking to a root chain;
s202, receiving a message sent by a root chain and used for allocating a first operator network element node requesting networking to a first network;
and S203, sending a response message of agreeing or disagreeing to the first network to the root chain.
Example 2
A network convergence method, which is suitable for being used as a virtual machine or a cluster node on a root chain of a network converged blockchain system, as shown in fig. 4, includes:
s301, receiving a first request transaction which is sent by a first operator network element node and requests to utilize resources of a second operator different from the first operator, and sending a first conversion contract interface to the first operator network element node after the first operator network element node passes identity verification;
s302, receiving messages of a first operator network element node for accessing and quitting a first conversion contract interface;
s303, sending basic information of the first operator network element node for accessing and quitting the first conversion contract interface to the first operator network element node; after receiving a confirmation message sent by a first operator network element node, uplink is carried out;
the root chain is provided with more than one first conversion contract, and the first conversion contract is used for converting the resource access and utilization interface of the second operator into an interface mode which can be accessed and utilized by the network element node of the first operator;
the first operator network element node sending a first request transaction to a root chain requesting utilization of resources of a second operator different from the first operator;
if the identity verification of the first operator network element node passes, receiving a first conversion contract interface;
accessing a first conversion contract interface and sending a message for accessing the first conversion contract interface to a root chain;
quitting the first conversion contract interface and sending a message of quitting the first conversion contract interface to the root chain;
receiving basic information for accessing and exiting the first conversion contract interface sent by the root chain;
and verifying the basic information for accessing and exiting the first conversion contract interface and feeding back the basic information to the root chain.
The resources include, but are not limited to, network resources such as video resources and traffic resources, virtualized hardware resources, and the like. The first operator network element node can easily realize the utilization of the resources of different operators and realize convenient service through the action of the first conversion contract arranged on the root chain. The first conversion contract can be divided into different types, after the hardware resource is virtualized, base stations, servers, computing centers and the like of different operators can be opened to the outside, and correspondingly, the first conversion contract on the root chain can be used for base station utilization and access interface conversion among different operators; or interface transformations for computing center access and utilization between different operators, etc.
Physical and radio infrastructure resources are abstracted and partitioned into different virtual resources to be provided. Each virtual resource has a different respective function, service, and goal. The block chain can assist in realizing more efficient and safe 5G resource sharing and service condition tracing. Using smart contracts, decentralized agreement sharing and payment may be automatically implemented.
Through the first conversion contract on the root chain, the intercommunication interconnection of different network resources is realized, the flexible flow load and seamless switching between different node network interfaces are realized, and the intelligent flow management and distribution are realized by the cluster nodes. And selecting the data center internet interface with the best user experience for the client.
Before a first operator network element node accesses a first conversion contract interface for the first time, identity authentication is required; the identity authentication method comprises the following steps: and comparing whether the hash value of the first operator network element node is consistent with the hash value stored in the root chain, if so, allowing access, preventing attack and ensuring network security.
Basic information of the first operator network element node accessing and exiting the first conversion contract interface includes but is not limited to the time of the first operator network element node accessing the first conversion contract interface and the time of the first operator network element node exiting the first conversion contract interface; the flow size, the occupied time of the frequency band, the cost and the like; the processes of settlement, resource sharing and network convergence are realized; communication and data and value exchange are realized.
As an optional implementation manner of this embodiment, the process of authenticating the first operator network element node includes:
performing hash operation on an encryption key to be verified of the first operator network element node to obtain a hash value of the encryption key to be verified, comparing the hash value with the hash value of the encryption key on the root chain, if the hash value is consistent with the hash value of the encryption key, decrypting a ciphertext of the identity information of the first operator network element node through the encryption key to obtain a plaintext of the identity information of the first operator network element node through an AES256 algorithm, and passing the identity verification of an access party; if the hash value of the encryption key to be verified is inconsistent with the hash value of the encryption key on the root chain, the identity verification of the network element node of the first operator is not passed;
correspondingly, the process of encrypting the identity of the first operator network element node is as follows:
obtaining a ciphertext of the identity information of the network element node of the first operator from a plaintext of the identity information of the network element node of the first operator according to an AES256 algorithm through an encryption key;
and performing hash operation on the encryption key to obtain an encryption key hash value, and linking the encryption key hash value and the ciphertext of the first operator network element node identity information in the root chain.
As an optional implementation manner of this embodiment, the uplink includes saving uplink contents in a cloud computing or fog computing storage space.
The cloud computing or fog computing storage space can be owned by different operators, and can also be owned by a certain big data computing center; but also from different network segments, i.e. different first networks, all without limitation. The data transmission communication mode is MQTT, and when chaining, a timestamp of a national time service center of a Chinese academy is added to prevent data conflict in later network fusion.
As an optional implementation manner of this embodiment, the root chain performs data interaction with the copyright registration mechanism through a first conversion contract interface; the data interaction method comprises the following steps: receiving a second request transaction for requesting registration of the digital rights certificate sent by a first operator network element node, wherein after the identity authentication of the first operator network element node is passed, the root chain sends the second request transaction for requesting registration of the digital rights certificate to the digital rights registration mechanism through the first conversion contract interface by the first operator network element node; if the digital copyright certificate conforms to the examination regulation of the digital copyright registration mechanism, the root chain receives the digital copyright certificate which is sent by the digital copyright registration mechanism and contains DCI, and forwards the digital copyright certificate to the first operator network element node; if the digital copyright registration authority does not conform to the examination regulation of the digital copyright registration authority, the root link receives a notice of modifying and registering the digital copyright material or a notice of not granting the digital copyright certificate sent by the digital copyright registration authority and forwards the notice to the network element node of the first operator; or, receiving a third request transaction for requesting to verify the digital rights certificate DCI sent by the first operator network element node, after the identity verification of the first operator network element node passes, sending, by the root chain through the first conversion contract interface, the third request transaction for requesting to verify the digital rights certificate DCI by the first operator network element node to the digital rights registration authority; if the digital copyright registration mechanism passes the verification, the root link receives a notification that the DCI sent by the digital copyright registration mechanism passes the verification and forwards the notification to the first operator network element node; if the authentication of the digital copyright registration mechanism is not passed, the root link receives a notification that the DCI authentication of the digital copyright certificate sent by the digital copyright registration mechanism is not passed, and forwards the notification to the first operator network element node, the copyright protection mechanism and an evidence platform approved by the intellectual property right court for evidence storage.
The first conversion contract interface is an API interface and comprises digital copyright certificate data information which is sent by a root link receiving copyright registration mechanism and contains DCI; the method comprises the steps that a root chain sends a request for registering material content required by applying a digital copyright certificate to a copyright registration mechanism and applying for digital copyright certificate data information containing DCI; the root chain applies for verifying the digital copyright certificate data information containing the DCI to a copyright registration authority. The data interaction adopts a time stamp of a time center of the Chinese academy to form a transaction data uplink, the DCI is formed, and a copyright registration mechanism also adopts a digital signature of the time stamp of the time center of the Chinese academy.
A network convergence method, adapted to be used as a node (including a cluster node) in a fragmented network of a network converged blockchain system, according to one of the foregoing network convergence methods, as shown in fig. 5, including:
s401, sending a first request transaction which requests to utilize resources of a second operator different from a first operator to a root chain;
s402, if the identity of the first operator network element node passes the verification, receiving a first conversion contract interface;
s403, accessing the first conversion contract interface and sending a message for accessing the first conversion contract interface to the root chain;
s404, quitting the first conversion contract interface and sending a message of quitting the first conversion contract interface to the root chain;
s405, receiving basic information for accessing and quitting the first conversion contract interface sent by the root chain;
and S406, verifying the basic information for accessing and exiting the first conversion contract interface and feeding back the basic information to the root chain.
As an optional implementation manner of this embodiment, the first conversion contract interface is further configured to perform data interaction with a copyright registration authority, and the method of performing data interaction with the copyright registration authority includes: sending a second request transaction to the root chain requesting for material required to register the digital rights certificate; if the certificate conforms to the examination regulation of the digital copyright registration mechanism, receiving a digital copyright certificate which is forwarded by the root chain and contains DCI and is sent by the digital copyright registration mechanism; if the digital copyright registration authority does not conform to the examination regulation of the digital copyright registration authority, receiving a notice of modifying the registered digital copyright material or not granting the digital copyright certificate, which is transmitted by the digital copyright registration authority and forwarded by the root chain.
The root chain supports a multi-chain structure: a federation chain for communication security; the system is a league chain-based cross chain, and the cross chain of a main chain and a side chain constructed by a league gateway can realize a hierarchical channel payment system for the up-chain accounting and down-chain transaction of transaction chains among operators; a professional wallet system based on professional payment chaining; a notarization network system for passing valid legal certificates between nodes; data interaction, flow interconnection and token transaction are realized among all chains, namely the alliance chain, a cross-chain payment wallet system and a notarization network system based on the alliance chain by API, various applications are independently operated by means of a programmable intelligent data package contract, and a mobile phone user can realize automatic transaction without holding sensitive data through a CA (company, company and company) operator.
A network convergence method, which is suitable for a terminal (e.g., a terminal device such as a mobile phone, a pad, a notebook computer, a desktop computer, etc.), according to any one of the foregoing network convergence methods, as shown in fig. 6, includes:
s501, sending a request for utilizing resources of a second operator different from a first operator to a network element node of the first operator;
s502, receiving a first conversion contract interface sent by a first operator network element node;
s503, accessing the first conversion contract interface, and sending a message for accessing the first conversion contract interface to the root chain through the first operator network element node;
s504, quitting the first conversion contract interface, and sending a message of quitting the first conversion contract interface to the root chain through the first operator network element node;
s505, receiving basic information which is transmitted by a root chain and is transmitted by a first operator network element node to access and exit a first conversion contract interface;
s506, verifying the basic information for accessing and quitting the first conversion contract interface, and feeding back the basic information to the root chain through the first operator network element node;
wherein, upon receiving a request from a terminal to utilize resources of a second operator different from the first operator,
the first operator network element node sends a first request transaction to a root chain, wherein the first request transaction requests to utilize resources of a second operator different from the first operator;
if the first operator network element node and the terminal identity are verified, receiving a first conversion contract interface and forwarding the terminal;
receiving and sending a message that a terminal accesses a first conversion contract interface to a root chain;
receiving and sending a message that a terminal exits from a first conversion contract interface to a root chain;
receiving basic information of terminal access and exit of a first conversion contract interface sent by a root chain;
and receiving and feeding back basic information for the terminal to verify access and exit of the first conversion contract interface to the root chain for uplink.
The terminal includes, but is not limited to, a mobile phone, a pad, a notebook computer, a desktop computer, and other terminal devices.
A root chain stores a complete account book, in the resource using process, a terminal user can pass the verification or report a complaint suggestion for the network service in an application program, and a complaint ID is displayed in resource details through a block chain after being supplemented with related network performance parameters; resource alarms and requirements to be optimized generated by different users in the use of network resources can be informed to different operators through the block chain; the evaluation and feedback of the user and the operator to the service can be taken as a consideration factor of settlement, and the evaluation and feedback are reflected in settlement.
The service evaluation scene establishes a supervision and feedback mechanism for a service provider through a blockchain, improves the network service quality and the terminal customer perception, guarantees the benefits of investors and lessees, and maintains the healthy operation of a co-establishment sharing mechanism. The point-to-point transmission security problem is solved by utilizing an encryption technology, the problem of account book storage is solved, and the problem of business customization is solved by intelligent contracts. The technical problem of integration of telecommunication network, broadcast network and internet is solved in a breakthrough manner.
As an optional implementation manner of this embodiment, 5G communication or satellite-to-ground communication is adopted between the terminal and the first operator network element node, between the first operator network element node and the root chain, between the first operator network element nodes, and between the terminals.
The signal full coverage and the resource sharing are ensured, and the technical effect of the whole network integration is realized. The information can be transmitted through a broadcasting network, a telecommunication network and an internet which are fused (three-network fusion), and finally, the user can finish the fusion receiving of the information by various terminals such as a television, a computer, a mobile phone and the like (three screens are integrated), so that anyone, any time, any place and any terminal can obtain any desired information.
In an optional implementation scheme, space-based internet, 5G communication or satellite-to-ground communication is adopted between the terminal and the first operator network element node, between the first operator network element node and the root chain, between the first operator network element nodes, and between the terminals. Optionally, the first operator network element node is a communication base station or a satellite.
The information can be transmitted through a converged broadcast television network, a converged telecommunication network and an internet (three-network convergence), and finally, a user can finish the converged reception of the information by various terminals such as a television, a computer, a mobile phone and the like (three screens are integrated), so that any person, any time, any place and any terminal can obtain any desired information (5W).
And S1, the IP data enters the multiplexer after being packaged by the IP data broadcasting system. The television program and the voice program are respectively broadcasted by a television broadcasting system and a voice broadcasting system, are subjected to MPE-5 coding and statistical multiplexing, are secondarily multiplexed with the IP-packaged signal, are transmitted to a satellite uplink station through modulation and optical cable transmission, and are broadcast signals cover the whole region, so that data exchange with a broadcast television network is realized based on the Internet.
S2, the space-based Internet integrates a ground 5G core network and a mobile base station end to provide data return, is a Mesh network, and provides data connection by using a small platform routing microwave link inter-satellite network.
S3, the original ID and IP address of each operator platform are unchanged, and the communication interaction and interconnection service is provided for each platform network on the basis of unchanged network technology architecture, storage architecture and administration organization. Each platform is a federation chain with a standardized data interface that utilizes the iLAB-x.com consensus mechanism.
S4, the user can receive information by TV, computer, mobile phone and other terminals (three screens into one)
1. IP-based broadcast television signal using DVB-DASH standard DVB-DASH
DVB-DASH defines television content delivery based on the MPEG DASH specification and via HTTP adaptive streaming. MPEG DASH is the first internationally standardized HTTP-based adaptive bit rate streaming solution. To improve interoperability, additional limitations and requirements are defined in DVB-DASH and reference is made to video and audio codecs in the DVB toolkit suitable for use with MPEG DASH. The bluebook includes High Definition Television (HDTV), Ultra High Definition Television (UHDTV), High Dynamic Range (HDR) television, High Frame Rate (HFR) video, and Next Generation Audio (NGA). It also illustrates how low latency delivery and content presentation can be achieved.
Face to the problem
Some delay in Internet delivery is introduced in DASH players due to the segment length and unknown performance of the transport network. The strategy taken by the player is typically to buffer multiple segments to reduce the likelihood of stuttering. Shorter segments may also be used to achieve lower delays. But shorter segments make it more difficult for the encoder to work efficiently and therefore the quality of the video seen by the end user is affected.
Proposed solution
A solution for low latency in DVB-DASH is to divide the segments into smaller blocks. Instead of outputting the entire slice at once, the encoder divides the slice into groups of frames, where all frames in a group do not require frames from the following group for decoding. Then the DASH packetizer puts each group of frames into a CMAF block and passes it into the CDN.
When a DASH client passes through a streaming service, it uses a Media Presentation Description (MPD) file to obtain service parameters. Typically, the MPD will signal that a segment is available after the entire segment is available. But in low-latency mode, when the first chunk is transmitted into the CDN, the MPD signals when the segment is available to begin.
2. NGN non-ground network-space-based internet
An NGN is a packet network that provides a variety of services, including telecommunications services, and is capable of utilizing a variety of bandwidths and QoS-capable transport technologies to achieve separation of service functions from the underlying transport technology.
Is at the core of soft switching and is capable of providing a comprehensive open network architecture based on packet technology including voice, data, video and multimedia services.
Is at the core of soft switching and is capable of providing a comprehensive open network architecture based on packet technology including voice, data, video and multimedia services.
The space-based internet realizes data transmission through a satellite, that is, the satellite plays a role as a base station in the internet, so that the biggest difference is the satellite compared with other communication modes. Microwave chips and components for receiving and transmitting signals via satellite are also needed. The corresponding underlying software also differs. Storage and computation are analogous in hardware and software, and other ways.
(1) The data index is excellent: the delay of the satellite internet is only 10-15 milliseconds, which is better than mobile communication and broadband networks in many places.
(2) The application scene is easy to be expanded and applied: the internet satellite only has a dense orbit of about 400km, so the ground receiving antenna of the internet satellite is very small, the terminal is also very small (a small circular box of a router with the diameter of 15 cm) instead of a very large satellite receiver of a high-orbit satellite, so the application scenes of the satellite internet are very rich, and the satellite internet can be built and penetrated when being placed on an automobile and at home.
(3) Infrastructure costs are much lower than fiber optic communications, especially when considered from a per-capita index.
Based on the above advantages, two application scenarios have been proposed for space-based satellite internet by two major communication standards organizations, namely 3GPP and ITU.
Communication enhancement: the communication enhancement is carried out on 49% of the global population which is not provided with communication ground backbone network facilities, the communication optical fiber construction cost is saved in a satellite internet mode, and the basic ground networks of the areas are directly connected to the global internet backbone line through satellites, so that the first scene aims at the business of 35-40 hundred million people.
Large-scale internet of things: there is also a large market space in high-density population concentrations including new york, london, beijing, shanghai. The 4G network in china is built very rapidly, and 300 of 400 ten thousand base stations in the world are in china, but people still find that the network coverage on intercity expressways and in some small areas of large cities is insufficient, and the time delay may reach hundreds of milliseconds or even tens of seconds. The delay influence is not great for small-scale internet of things, but for huge internet of things accessed by users in tens of thousands of orders and tens of millions of orders, once long delay occurs, huge problem of information transmission synchronism can occur, and further breakdown of the whole internet of things large network can be caused
So how to make up for small communication blind spots and achieve a large-scale internet of things scene with uninterrupted full communication? This can only be done via the satellite internet. Therefore, the satellite internet is an important infrastructure pushing people to enter intellectualization in the future, and two major communication standard organizations of CTPP and ITO are due to the important infrastructure pushing people to come up to push the standard formulation of the satellite internet of things. They manage the satellite internet called NGN (non-terrestrial network) to promote the convergence of satellite internet and terrestrial network, which is also the direction of-6G that may appear later.
The construction progress of China is laggard by one year in the first platoon with the United states at present, the construction of the global satellite Internet is started only in China and America, and a first technical verification star is transmitted before 2018 to realize single-star key technical verification; secondly, 4 service test stars are transmitted to build a small constellation, so that a user can perform preliminary service experience; and thirdly, realizing networking operation of all 156 satellites on an orbit 1000 kilometers away from the ground, constructing a satellite-borne broadband global mobile internet, and realizing network undifferentiated global coverage.
In 12 months in 2018, the first rainbow cloud engineering technology in China verifies that the star is successfully launched into the orbit, and completes the function and performance tests under different weather conditions, different carriers and different service scenes, thereby successfully realizing typical internet services such as web browsing, WeChat sending, video chatting, high-definition video on demand and the like. In 2020, the rainbow cloud engineering will emit 4 service test stars again, and the area coverage is completed through networking. Subsequently, the first application demonstration system of the rainbow cloud engineering will also be put into use. It is expected that after the rainbow cloud engineering is built, the advantages of integration of communication, navigation and remote sensing, global coverage, autonomous system control and the like are integrated, extremely low communication delay, extremely high frequency reuse rate and real global coverage application are realized, and the requirement of accessing to the internet in the less-developed areas of China and the Internet is met. Meanwhile, the system also plays a great promoting role in the application aspects of the industries such as emergency communication, sensor data acquisition, industrial Internet of things, unmanned aerial vehicles and automatic driving.
The NGN non-ground network can be communicated with the existing networks such as PSTN, ISDN and GSM, etc. the existing telecommunication networks have large scale, and the NGN can be interconnected and communicated with the existing networks through the devices such as gateways, etc. to protect the existing investment. Meanwhile, the NGN also supports existing terminals and IP intelligent terminals, including analog phones, fax machines, ISDN terminals, mobile phones, GPRS terminals, SIP terminals, H248 terminals, MGCP terminals, ethernet over PC phones, cable modems, etc.
(1) And multimedia conversion: the fastest-developing characteristic is the multimedia characteristic, and meanwhile, the multimedia characteristic is the most basic and obvious characteristic of the space-based internet.
(2) And openness: non-terrestrial NGN networks are open, standard interfaces that can quickly provide a variety of customized services to subscribers.
(3) And individualizing: the personalized service can provide great profits to future operators.
(4) Virtualization: virtual services will be personal identity, contact, and even residence virtualization. The user can use the personal number, the number can be carried and other virtual services, and the communication mode at any time and any place is realized.
(5) And intelligentization: the non-ground NGN communication terminal has the characteristics of intellectualization and diversification, and the combination of network service and terminal characteristics can provide more intelligent service for users.
3. The space-based internet integrates a ground 5G core network and a mobile base station end to provide data return, is a Mesh network, and provides data connection by using a small platform routing microwave link inter-satellite network. (future 6G)
The rainbow cloud engineering completed the business testing system in 2020. In 2022, the whole constellation is deployed and operated in China, and a space-based broadband internet consisting of 156 satellites is constructed, so that a communication, navigation and remote sensing comprehensive information system which mainly uses low-orbit broadband communication and has the capabilities of navigation enhancement and real-time remote sensing support is formed. At that time, no matter in desert, sea or airplane, people can enjoy the same internet speed and service experience as those in home
The Rainbow cloud engineering becomes a world first set of low-orbit Ka broadband communication system, the technologies of broadband inter-satellite communication, on-satellite broadband routing, multi-channel phase-shifting chips and the like are firstly adopted in the world, and the broadband satellite communication terminal is minimum in size, power consumption and weight
S2.15G + space-based internet, using semiconductor silicon as the electronic phased array technology, also by having a receiving and transmitting array on a wafer of several centimeters in size, covering the user with spot beams.
One common configuration is to use a CMOS data converter with high performance SiGe BiCMOS IF to millimeter wave conversion. Beamforming may be implemented using a variety of techniques, depending on system requirements
(1) Depending on the antenna size and transmit power requirements chosen, a highly integrated silicon approach may be achieved, as well as a combination of silicon beamforming with discrete PAs and LNAs.
(2) The choice of power amplifier technology is based on an analysis performed in the framework and technology "of 5G millimeter wave radios, taking into account the required transmitter power, antenna gain (number of elements) and RF power generation capability of the chosen technology, with the optimum antenna size ranging from 128 to 256 elements, with lower numbers being achieved by GaAs power amplifiers and higher numbers being achievable using all-silicon beam-forming RF IC-based technology.
(3) The mobile user equipment (handset) is well suited for CMOS technology, and the relatively low number of antennas can achieve the required transmitter power. This type of radio would require a high degree of integration and power saving to meet the requirements of portable devices. Local base stations (small cells) and consumer terminal devices (portable power supplies) require similar requirements, involving a range of technologies from CMOS at the low end to SiGe BiCMOS at the higher end of the transmitter power requirements.
(4) The medium range base station is very suitable for SiGe BiCMOS technology, and can realize compact overall dimension. At the high end, for wide area base stations, various techniques may be applied, depending on tradeoffs in antenna size and technology cost. Although SiGe BiCMOS can be applied in the 60dBm EIRP range, GaAs or GaN power amplifiers are more suitable for higher powers.
S2.2, by utilizing the phased array and multi-antenna technology of SI, the 5G standard millimeter wave low earth orbit Internet constellation is realized through beam control, and the combination of NB-ioT (narrowband cellular Internet of things)
NB-iot can solve the abundance requirement in 5G communication, and countless intelligent terminals are connected; if the support of the satellite constellation is wide, many application scenarios can be realized. The low-orbit constellation is located on a near-earth orbit and is only hundreds of kilometers away from the ground, and the delay completely meets the requirement of equipment. The millimeter wave low-orbit constellation based on the 5G standard and NB-ioT are used for network connection among wide domains, and equipment connection for realizing low power consumption among user locals is realized, so that the advantages are complementary.
By adopting a two-dimensional antenna array and an advanced signal processing algorithm, the 3D-MIMO can realize accurate three-dimensional beam forming, realize better interference suppression and space multi-user multiplexing capability, and is an effective means for improving system capacity and transmission efficiency. Therefore, 3D-MIMO is also a core technology of 4G evolution and 5G.
Compared with the traditional base station, the 3D-MIMO adopts more receiving and transmitting channels, and if the architecture of BBU + RRU + antenna is still maintained, two problems exist.
On one hand, the increase of the number of the receiving and transmitting channels enables more feeder lines to be needed to be connected between the antenna and the RRU, which brings great trouble to actual network arrangement, increases the time for installing equipment, and makes more feeder lines more prone to errors. The problem can be well solved by integrating the antenna and the RRU, so that not only a feeder is omitted, but also loss caused by the feeder is eliminated (framework 1). On the other hand, the increase of the number of channels also increases the bandwidth requirement on the CPRI interface between the RRU and the BBU, thereby increasing the cost of the optical fiber. In order to reduce the bandwidth requirement of the CPRI interface, one method is to move up part of the BBU function (architecture 2), and the other method is to further integrate the BBU, the RRU and the antenna together to form an integrated station type (architecture 3).
Architecture 2, while reducing CPRI interface bandwidth requirements, requires redefinition of the interface between the BBU and the RRU. The framework 3 directly cancels a CPRI interface, the future network distribution and station erection are more convenient and faster due to higher integration level, and higher requirements on the design of the size, weight, heat dissipation and the like of equipment are provided. The application of beam steering, a multi-antenna electronic phased array technology, is the key to solving the problem:
it has proven extremely difficult to transmit the massive amounts of data needed to bring effective performance of a mobile internet of things while one or both ends of the system are moving simultaneously. In order to transfer a large amount of data between moving networks with extremely high efficiency, a technique called "beam steering" will play a key role. Beam steering techniques no longer transmit broadband wireless data signals in all directions, but rather transmit the data to the specific user location where the data is needed. Therefore, power can be saved, more users can obtain wireless signals with high bandwidth, and mutual interference among the signals is prevented.
How to implement beam steering:
step 1: identifying and positioning a mobile internet of things sensor module; determining where its endpoints are located.
Step 2: how and where to form the wireless narrow beam pattern is calculated so that only the exact direct signal can be sent to the desired end point antenna.
And 3, step 3: a communication signal to an endpoint is set.
Beam steering has now become possible, which is one of the biggest reasons data intensive mobile internet of things systems have not employed wireless links to exchange information, and 5G communications have addressed this problem.
In the fusion of 5G + space-based internet, a cloud service can adopt an iridescent cloud series satellite, the existing cloud computing is limited by a fixed physical space no matter how the cloud computing is developed, but the space computing is different, and all terminals can realize network access control through the space-ground integrated network.
In the aspect of communication protocols, compatibility is carried out by taking the TCP/IP level standard into consideration firstly, so that seamless switching between the traditional protocol and the satellite protocol is guaranteed, a consumer, an object and an object can conveniently receive signals at any reasonable position, and user experience is improved.
Based on the millimeter wave low-earth orbit Internet constellation of the 5G standard, the combination with NB-ioT (narrowband cellular Internet of things) and the heaven-earth interconnection of the 5G with low time delay, high reliability and space-based low-orbit low-power consumption and large connection.
The system is built into a global seamless coverage space information network infrastructure, can provide internet transmission service for various terminals such as ground fixed terminals, handheld mobile terminals, vehicle-mounted terminals, ship-mounted terminals, airborne terminals and the like, and can realize wide-band and narrow-band combined communication guarantee capability in deep ocean, south-north two-pole areas and other areas. By the aid of the global seamless coverage system, any person or any object at any place on the earth can realize information interconnection at any time.
Application capabilities of 6 aspects are realized:
the method comprises the following steps that firstly, intelligent terminal communication is realized, commercial mobile phones are supported to be directly accessed to a satellite constellation, and high-definition voice service, instant messaging service such as WeChat and the like, electronic mail service and the like are provided;
the Internet is accessed, the data service capacity with low delay is provided, so that users can enjoy the internet surfing experience similar to that of a ground network, the market such as field operation, ocean operation and the like is oriented, and remote education and remote medical service guarantee is realized;
accessing the Internet of things, serving a low-energy-consumption miniature Internet of things terminal, and mainly developing novel industrial requirements on environment monitoring, ocean logistics, hazardous chemical monitoring, traffic management, smart oceans and the like;
hot spot information pushing, which fully utilizes the characteristic of satellite wide area coverage to realize the real-time broadcasting and pushing of hot spot focus information such as culture propaganda, disaster early warning, public safety warning, weather broadcasting, headline news broadcasting, traffic broadcasting and the like;
navigation enhancement is carried out, Beidou differential correction information is forwarded, more accurate and reliable position service is provided for airborne and vehicular positioning terminals, and development requirements of unmanned automobile driving, unmanned aerial vehicle control, accurate agriculture and engineering machinery markets are met;
and the aviation and navigation monitoring can realize the full-period tracking of global airplanes and ships and provide value-added services of statistical data.
The standardized data interface of the consensus mechanism realizes the fusion of 'multi-link-relay link-cross-link', flow transmission, data interaction and mixed storage. And the intelligent contracts are fused by multiple chains of data interaction, flow transmission and asset transfer among different cross-chains and alliance chains. The multi-chain system replaces a single chain, the positions of all chains are completely equal, and the multi-chain system is formed by logically isolating the independent consensus system as much as possible, and the multi-chain system works in parallel, distributes the throughout, calculation and storage pressures of the whole network, and distributes the maintenance work of the state of the whole network.
A telescopic container is created, and on the premise of completely keeping a primary chain technical architecture, a storage architecture and a management organization, circulation interaction and interconnection service are provided for primary chains on the premise of no chemical action. A network value flow resource pool is formed, and assets and flow dispersed in each chain are freely exchanged, flowed and converted in value through a high-speed network.
1. A consensus mechanism:
an iLAB-x.com consensus mechanism is derived from an experimental space-national virtual simulation experiment teaching project sharing platform, is intellectual property owned, and has a national virtual simulation experiment teaching project sharing technical interface specification, wherein the national virtual simulation experiment teaching project sharing technical interface specification is formed by a education department high education department function (2019) No. 33 and a notice of high education department of education department on development of national virtual simulation experiment teaching project identification work of 2019, wherein the notice relates to a public national virtual simulation experiment teaching project declaration material and development of network user use evaluation.
The consensus mechanism is summarized as follows: the method comprises the steps of adopting a double-layer distributed storage structure for storing data hash values on a chain and storing data through cloud computing; the problem of safety verification of API interface callers is solved by a Hash algorithm; performing user identity identification by using an AES256 algorithm and a key related Hash operation message authentication code to avoid secondary login, and automatically transmitting the identified user in the operation state of a related supplier and the generated data back to the shared transaction platform; the data exchange format and the data transmission safety are solved by utilizing the time stamp; network fragmentation and transaction fragmentation are carried out by utilizing a root chain priority consensus mechanism, so that the attachment uploading service outside the chain and inside the chain is realized, the video stream transmission performance of the consensus mechanism is excellent, and the terminal equipment of the Internet of things is a standardized interface.
2. Intelligent contract
The intelligent contract is based on a Docker container level, is the best practice and landing scheme of the current enterprise-level application, supports most of current cloud host mode deployment, and supports personal high-performance host deployment.
The encrypted world provides an intelligent contract development interface to provide services to third parties including, but not limited to, video, VR and AR, games, merchandise transactions, and the like. The project side or the developer can determine the project which can be operated by calling the intelligent contract interface, and can also realize self-operation and agent operation by selecting different intelligent contract combinations and obtain the operational benefits. In summary, the intelligent contract of CWV provides an opportunity for project or user to select autonomously, with corresponding gains through different modes of operation.
3, contract virtual machine:
the cloud computing method deploys a virtual machine, the graph is a complete double-layer framework, one layer is a fragment (namely a sub-chain layer), the other layer is a root chain, and the virtual machine is contracted. The method can provide higher performance guarantee and provide technical guarantee for upper layer Dapps application.
4, cluster nodes:
the cluster node acts as a super node and can store the complete account book
A node may also maintain only a portion of the ledger (e.g., only account records for a single slice). In this case, it must rely on other participants in the network to help determine the validity of the remaining sharded data and/or root chain data. Ensuring decentralization.
Mesh network, dynamic routing
Active health examination: the method comprises the steps of monitoring the network link state, deeply inspecting the application state of the server, and inspecting the diversified health of the intelligent contract, and can accurately judge the available conditions of the double centers on the link level, the server hardware level and the application software level so as to determine whether the double centers need to be switched, and whether the double centers need to be switched integrally or partially.
B flexible load sharing strategy: the resources of the cluster nodes are fully utilized, and the resource utilization rate is improved. According to the service requirement, a load sharing strategy can be formulated based on different factors such as user source regions, delay conditions, used operators, load weights and the like, so that the service distribution among multiple nodes is realized.
And C, based on the fact that the service is in the cluster node, the requirement of dynamic drift is provided for the IP address by frequent possible switching, and the contract can provide one-to-one, one-to-many and many-to-many address conversion and flexibly adapt to the requirement of service switching.
The root chain cluster node mode realizes the function of a super node, avoids centralization, the cluster nodes support complete accounts, are also a mesh network, are completely consistent in function and completely equal in status, work in parallel, share the pressure of throughout the network in handling, calculation and storage, and share the maintenance work of the state of the whole network; e.g., access, www.ilab-x.com initiates an NS request.
Step 1, firstly, www.ilab-x.com domain names are launched to local dns of an operator where the operator is located; step 2, an ENS server of an operator searches an ENS main server and an ENS auxiliary server through recursion; and 3, step 4: and the root chain intelligent contract receiving the request firstly inquires whether Local DNS has a nearby table entry, and if the Local DNS has the nearby table entry, the Local DNS directly returns a server address with the highest speed. If not, the ENS resolver of the root chain intelligent contract is queried for the ecalDNS. And 5, the intelligent contract analysis two nodes respectively conduct Probe on the LocalDNS. For example, the ISP1 side intelligent contract queries the LocalDNS for an RTT of 150 ms. And the RTT of the GTM at ISP2 side querying the same LocalDNS is 300ms, then the proximity table record of the LocalDNS is formed in all nodes at this time. And receiving a LocalDNS request to obtain a root chain intelligent contract, and returning a corresponding WEB server address of the DATACenter according to a proximity table of the system. Step 6, after the user lical DNS obtains the address, returning the address to the user; a user initiates access to a website; the cluster node provides a plurality of internet interfaces for internet services, and the Beijing node A comprises a telecommunication outlet and a communication outlet; the Beijing node B comprises a telecommunication outlet, a communication outlet and a mobile outlet; wuhan node C contains a telecommunications outlet.
When an export is selected by a root chain intelligent contract, the problem of which node is closer to a user needs to be considered, and the problem of cross-operator network limitation needs to be considered, at present, domestic main telecommunication operators comprise three operators, namely telecommunication, internet access and mobile, the cross-operator access is very slow, and the best mode is to direct the client flow to the node of the operator which is the same as the client.
And meanwhile, the southern telecommunication client is oriented to the Wuhan node telecommunication outlet by considering the regional proximity principle. Directing north telecommunications customers to a beijing node telecommunications outlet; the selection basis of the two data centers of the same operator is RTT, reverse detection is carried out on the client side at each node, and selection is carried out according to the detection response result.
D, customizing and compiling the contract custom script, and realizing customized flow traction of different services, such as emergency flow scheduling traction of cluster nodes, optimal control of outgoing flow, dynamic selection of different SNAT/SSL profiles according to service scenes and the like;
e pre-settable take-over sequence: through switching and taking over among the cluster nodes, the traction service flow is redistributed among the data centers, and more importantly, the switching among the cluster nodes can predefine the taking over sequence, so that the operation and maintenance of the multi-activity center are manageable and predictable, and the distribution of the data centers is met, so that the delay and the influence are minimum. This predefined takeover sequence has been verified in practice in the industry.
F, cooperative linkage of switching: often, due to the limitation of practical objective conditions, there are some links that cannot implement complete redundancy backup, for example, it is most common that a network outlet of different operators, such as a telecommunication and a telecommunication line, is equipped with double outlets, but a mobile, radio and television line, etc., is also a single outlet. All links of cluster nodes need to be combed, coordinated switching is specially considered for single-point links in actual construction, and affected factors are bundled and coordinated.
G operation and maintenance automation consideration: including cooperative interaction with systems and applications, including monitoring and response. Because the cluster nodes relate to a plurality of links and processes, a large number of automatic scripts can be adopted for better operation and maintenance, and contract interfaces are fully utilized, so that one-key DC switching, one-key DB switching, automatic configuration acquisition and uploading, configuration compliance inspection, single-number node configuration relevance extraction, multi-node configuration consistency comparison, contract application unified view generation and the like can be realized, and the operation and maintenance level and the operation and maintenance capacity in a multi-node environment can be improved by integrating with a unified operation and maintenance management platform.
Fast sensing and fast failure recovery: when one data center service fails, the perception of health examination and detection on the failure is reduced to a minute level or even a second level, and the minute level or even the second level switching can be realized under most failure scenes.
6, Cross-chain transactions
With intelligent API, cross-chain transaction and confirmation are realized.
First requirement of hybrid chain: and interconnection of the private chain and the public chain. Private chains are private in nature, and authenticated parties limit access to blockchains to be open only to their users. This is usually a network of business partners or is connected by their operation and benefits from a shared tamper-resistant database.
For example, the China Bank Agreement (CBA) has introduced "China trade financing inter-Bank transaction blockchain platform", which is the permit node and member unit of Huifeng, China Bank and agricultural Bank. The user must obtain access before entering the network. Furthermore, access rights can only be granted by rights to manage private blockchains.
Obviously, the private chain has the advantages of high efficiency, high processing speed, capability of adapting to the requirements of complex application scenes, good controllability, capability of meeting the supervision requirements, no occurrence of the situations of bifurcation and the like.
However, the privacy chain is always private, and there are also cases of centralization. The existing public link project forms a huge existence, and in many service scenes, the private link must be combined with the public link to ensure the integrity of the service chain.
In a typical application scenario, such as cross-border payment service, an international trade enterprise establishes its own private chain, provides business services for the uplink of goods, and also performs cross-border payment with public chains such as XRP and other institutions.
First requirement of hybrid chain: a combination of private license chains and public chains.
As the name implies, private blockchains are private in nature, and authenticated parties limit access to blockchains to be open only to their users. This is usually a network of business partners or is connected by their operation and benefits from a shared tamper-resistant database.
For example, the China Bank Agreement (CBA) has introduced "China trade financing inter-Bank transaction blockchain platform", which is the permit node and member unit of Huifeng, China Bank and agricultural Bank. The user must obtain access before entering the network. Furthermore, access rights can only be granted by rights to manage private blockchains.
Obviously, the private license chain has the advantages of high efficiency, high processing speed, capability of adapting to the requirements of complex application scenes, good controllability, capability of meeting the supervision requirements, no occurrence of the situations of bifurcation and the like.
However, the private license chain is ultimately private, small collective, and there are also situations where it is centralized. Currently, public link projects form a huge existence, and in many service scenarios, a private license link must be combined with a public link to ensure the integrity of a service link.
The second requirement is as follows: public link is across chain public link field, and public link data has the originality, can not directly go to receive outside data. Each public chain is like a parallel world and cannot generate rapid interaction, so that the value of each public chain cannot be transferred, and each public chain is like an isolated island, namely a value island. The nature of the cross-chain is to solve the interaction between different block chains, and certainly, the implementation logics of each item are not the same, and it is very simple to reform a new chain under the subsystem protocol, so that when a ecosystem belonging to the wave card is reformed, all the new chains use the bottom subsystem protocol of the wave card. When the existing public chain is docked, the used transit bridge is needed and then the public chain is docked, and of course, a specific protocol needs to be developed when the existing public chain is docked.
It would seem theoretically that a new cross-link system or new cross-link ecology is created, which is somewhat exclusive to existing public links, for example, for public links with a large number of users, such as an etherhouse or bitcoin network, a transit bridge is developed specifically for compatibility, but for public links with a small number of users, the inclusion is not so strong, and the transit bridge may not be developed for compatibility.
Although the above-mentioned chain-crossing ecology can realize chain crossing, most of the blockchains in the ecology are based on the Substrate protocol, and the other star chain-crossing project cosmos also uses a different underlying protocol, and in fact, the two protocols are not compatible, theoretically, another value island problem is also generated between different chain-crossing ecology, and the difference is that the area of the island is larger than that of the public chain island of the public chain.
The intelligent API not only supports the communication of a single chain and a public chain, but also supports the interoperation between cross chains and even on a alliance chain.
The contracts can establish public chains, private chains or alliance chains with different purposes, and based on different requirements on performance, safety and application scenes, the contracts can be grafted to applications in different industries. Such as a communal chain supporting high concurrency, a payment alliance chain focusing on security, and a notarization network system based on legal evidence.
Such as evidence uplink, copyright uplink, etc. to prevent data tampering; when the first transaction or the second transaction belongs to the mixed transaction of assets and non-assets, the first data packet or the second data packet comprises asset value transfer data and data information needing uplink storage, exchange, modification and the like, and uplink storage, exchange, modification and the like of data can be carried out while value transfer is carried out. That is to say, while live broadcast content is uploaded, the transfer of asset value can be accompanied, and the business application scene is expanded
Multi-scenario application
Blockchain technology can provide a complete set of solutions for tracking news sources, thereby achieving media source authentication. The content adopted and written by the block chain technology cannot be modified privately, and even if the data is modified, the history records can be traced; news distributed by using the link news is encrypted and shared on a plurality of personal computers, and a third party organization is difficult to tamper with.
Digital copyright: the block chain technology can accurately track the copyright of news works, movie and television works, internet works and music by using a digital signature of a synchronous timestamp of a national time service center, and completely record the copyright conversion process of the news works from three links of right determination, right use and right maintenance. The artificial intelligence and block chain reinforcement technology are used for providing a series of services such as copyright registration, transfer authorization contract record registration, copyright retrieval, copyright transaction, royalty settlement, infringement reporting, right-keeping complaint and the like.
A transaction platform: by means of the block chain technology, the content can be priced independently by the contributor and the self-media through an intelligent contract, the interaction with the fan is directly avoided by a media platform, and the appreciation and subscription fees are obtained. The user can pay with a DCT (token for the DECENT platform) and get the required content the first time.
And (3) propagation effect statistics: the method solves the problems of opaque and biased advertising marketing effect in the media industry, such as cheating on click rate and the like, and helps advertisers and media to improve the operation efficiency and accuracy.
Quality evaluation mechanisms jointly participated in by governments, industries, enterprises, universities and the like: the data is stored, managed and mined in a big data mode, the data is displayed in a graphical mode, data analysis and state data acquisition condition analysis are integrated, the calculation of the support degree confidence coefficient and the divergence degree and the isolated point analysis of each analysis result are amplified from point to line to the marketing system in the face, the intelligent scene marketing is realized, the service consumers can be met more conveniently, and the reconstruction of the core capability of the entity business is really realized.
And (3) lifelong education: a rural remote education system and digital campuses of various vocational schools are interconnected through data, so that the interactivity of a computer, the communication distributivity and the television are integrated. Realizing 'resource integration, content integration, propaganda integration and benefit integration'.
And (3) hybrid teaching: teaching and research application and the like, and can meet the requirements of different client applications, including terminals such as a PC, a notebook, an IOS mobile terminal, an ANDROID mobile terminal and the like. By adopting the block chain decentralized distributed design, the multistage platform deployment can be realized, and the infinite platform access and separation are supported. That is, a school can be directly deployed singly, integration of a plurality of schools with a district level platform, a city level platform and a provincial level platform can be realized only by simple configuration, and when the combined school wants to be separated from a combined resource platform, a website can be configured to be separated from on-line + off-line teaching combining the advantages of on-line teaching and traditional teaching. The hybrid teaching is to advance the traditional classroom teaching in a micro-video online mode, give students sufficient learning time, and enable each student to walk into the classroom with a better knowledge base as much as possible. Thereby fully guaranteeing the quality of classroom teaching. Activities are available offline, and the activities need to be able to check, consolidate and convert learning of online knowledge; the process has an assessment, both online and offline, and both the process and the results require the assessment to be performed.
Example 3
This embodiment provides an apparatus, the apparatus comprising: one or more processors; memory for storing one or more programs that, when executed by the one or more processors, cause the one or more processors to perform a method as described above.
Furthermore, the present embodiment provides a storage medium storing a computer program that, when executed by a processor, implements the method as described in embodiment 1 above.
Fig. 1 is a schematic structural diagram of an apparatus according to an embodiment of the present invention.
As shown in fig. 1, as another aspect, the present application also provides an apparatus including one or more Central Processing Units (CPUs) 501 that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)502 or a program loaded from a storage section 508 into a Random Access Memory (RAM) 503. In the RAM503, various programs and data necessary for the operation of the apparatus are also stored. The CPU501, ROM502, and RAM503 are connected to each other via a bus 504. An input/output (I/O) interface 505 is also connected to bus 504.
The following components are connected to the I/O interface 505: an input portion 506 including a keyboard, a mouse, and the like; an output portion 507 including a display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage portion 508 including a hard disk and the like; and a communication section 509 including a network interface card such as a LAN card, a modem, or the like. The communication section 509 performs communication processing via a network such as the internet. The driver 510 is also connected to the I/O interface 505 as necessary. A removable medium 511 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 510 as necessary, so that a computer program read out therefrom is mounted into the storage section 508 as necessary.
In particular, according to embodiments disclosed herein, the method described in any of the above embodiments may be implemented as a computer software program. For example, embodiments disclosed herein include a computer program product comprising a computer program tangibly embodied on a machine-readable medium, the computer program comprising program code for performing the method described in any of the embodiments above. In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 509, and/or installed from the removable medium 511.
As yet another aspect, the present application also provides a computer-readable storage medium, which may be the computer-readable storage medium included in the apparatus of the above-described embodiment; or it may be a separate computer readable storage medium not incorporated into the device. The computer readable storage medium stores one or more programs for use by one or more processors in performing the methods described herein.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units or modules described in the embodiments of the present application may be implemented by software or hardware. The described units or modules may also be provided in a processor, for example, each of the described units may be a software program provided in a computer or a mobile intelligent device, or may be a separately configured hardware device. Wherein the designation of a unit or module does not in some way constitute a limitation of the unit or module itself.
The above description is only a preferred embodiment of the application and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the invention herein disclosed is not limited to the particular combination of features described above, but also encompasses other arrangements formed by any combination of the above features or their equivalents without departing from the spirit of the present application. For example, the above features may be replaced with (but not limited to) features having similar functions disclosed in the present application.

Claims (15)

1. A networking method for network convergence is characterized by comprising the following steps:
analyzing more than one first transaction passing the verification, judging whether the first transaction is a transaction containing a request networking of a first operator network element node, if so, carrying out network fragmentation on the first operator network element node requesting to join based on NFV/SDN technology according to a consensus method at least comprising the request of the first operator network element node requesting to network and first transaction content including the identity of the first operator network element node requesting to network, allocating the first operator network element node requesting to network to a first network, and sending a message for allocating the first operator network element node requesting to network to the first operator network element node;
receiving a response message of a first operator network element node requesting networking;
judging whether a first operator network element node requesting networking agrees to be distributed to a first network or not; if yes, the first transaction and the transaction package uplink which comprises the step of distributing the first operator network element node requesting networking to the first network; if not, the first transaction and the transaction packaging uplink which comprises the first operator network element node which requests the networking are refused to be distributed to the first network are carried out.
2. The networking method for network convergence according to claim 1, wherein the network segments instantiate physical infrastructure or underlying network services and functions according to different requirements to form more than one first operator network element node, and perform networking according to the networking method to form more than one first network.
3. The networking method for network convergence according to claim 1, wherein one of the first networks corresponds to one instance of an IP protocol stack.
4. A network converged networking method, according to any one of claims 1 to 3, comprising:
sending a first transaction at least comprising a consensus method required by a first operator network element node requesting networking and an identity of the first operator network element node requesting networking to a root chain;
receiving a message sent by a root chain and used for allocating a first operator network element node requesting networking to a first network;
a response message is sent to the root chain agreeing or disagreeing with the assignment to the first network.
5. A network convergence method according to any one of claims 1 to 4, wherein the network convergence networking method comprises:
receiving a first request transaction which is sent by a first operator network element node and requests to utilize resources of a second operator different from the first operator, and sending a first conversion contract interface to the first operator network element node after the first operator network element node passes identity verification;
receiving messages of a first operator network element node for accessing and quitting a first conversion contract interface;
sending basic information of accessing and quitting the first conversion contract interface of the first operator network element node to the first operator network element node; after receiving a confirmation message sent by a first operator network element node, uplink is carried out;
the root chain is provided with more than one first conversion contract, and the first conversion contract is used for converting the resource access and utilization interface of the second operator into an interface mode which can be accessed and utilized by the network element node of the first operator;
the first operator network element node sending a first request transaction to a root chain requesting utilization of resources of a second operator different from the first operator;
if the identity verification of the first operator network element node passes, receiving a first conversion contract interface;
accessing a first conversion contract interface and sending a message for accessing the first conversion contract interface to a root chain;
quitting the first conversion contract interface and sending a message of quitting the first conversion contract interface to the root chain;
receiving basic information for accessing and exiting the first conversion contract interface sent by the root chain;
and verifying the basic information for accessing and exiting the first conversion contract interface and feeding back the basic information to the root chain.
6. The network convergence method of claim 5, wherein:
the process of the first operator network element node identity verification includes:
performing hash operation on an encryption key to be verified of the first operator network element node to obtain a hash value of the encryption key to be verified, comparing the hash value with the hash value of the encryption key on the root chain, if the hash value is consistent with the hash value of the encryption key, decrypting a ciphertext of the identity information of the first operator network element node through the encryption key to obtain a plaintext of the identity information of the first operator network element node through an AES256 algorithm, and passing the identity verification of an access party; if the hash value of the encryption key to be verified is inconsistent with the hash value of the encryption key on the root chain, the identity verification of the network element node of the first operator is not passed;
correspondingly, the process of encrypting the identity of the first operator network element node is as follows:
obtaining a ciphertext of the identity information of the network element node of the first operator from a plaintext of the identity information of the network element node of the first operator according to an AES256 algorithm through an encryption key;
and performing hash operation on the encryption key to obtain an encryption key hash value, and linking the encryption key hash value and the ciphertext of the first operator network element node identity information in the root chain.
7. The network convergence method of claim 5, wherein:
the uplink includes saving uplink content to a cloud-computing or fog-computing storage space.
8. The network convergence method of claim 5, wherein:
the root chain and the copyright registration mechanism perform data interaction through a first conversion contract interface; the data interaction method comprises the following steps:
receiving a second request transaction for requesting registration of the digital rights certificate sent by a first operator network element node, wherein after the identity authentication of the first operator network element node is passed, the root chain sends the second request transaction for requesting registration of the digital rights certificate to the digital rights registration mechanism through the first conversion contract interface by the first operator network element node;
if the digital copyright certificate conforms to the examination regulation of the digital copyright registration mechanism, the root chain receives the digital copyright certificate which is sent by the digital copyright registration mechanism and contains DCI, and forwards the digital copyright certificate to the first operator network element node;
if the digital copyright registration authority does not conform to the examination regulation of the digital copyright registration authority, the root link receives a notice of modifying and registering the digital copyright material or a notice of not granting the digital copyright certificate sent by the digital copyright registration authority and forwards the notice to the network element node of the first operator;
or the like, or, alternatively,
receiving a third request transaction for requesting to verify the DCI, which is sent by a first operator network element node, wherein the third request transaction for requesting to verify the DCI is sent by the first operator network element node to the digital rights registration mechanism through a first conversion contract interface after the identity verification of the first operator network element node is passed;
if the digital copyright registration mechanism passes the verification, the root link receives a notification that the DCI sent by the digital copyright registration mechanism passes the verification and forwards the notification to the first operator network element node;
if the authentication of the digital copyright registration mechanism is not passed, the root link receives a notification that the DCI authentication of the digital copyright certificate sent by the digital copyright registration mechanism is not passed, and forwards the notification to the first operator network element node, the copyright protection mechanism and an evidence platform approved by the intellectual property right court for evidence storage.
9. A network convergence method according to any one of claims 5 to 8, comprising:
sending a first request transaction to a root chain requesting utilization of a resource of a second operator different from the first operator;
if the identity verification of the first operator network element node passes, receiving a first conversion contract interface;
accessing a first conversion contract interface and sending a message for accessing the first conversion contract interface to a root chain;
quitting the first conversion contract interface and sending a message of quitting the first conversion contract interface to the root chain;
receiving basic information for accessing and exiting the first conversion contract interface sent by the root chain;
and verifying the basic information for accessing and exiting the first conversion contract interface and feeding back the basic information to the root chain.
10. The network convergence method of claim 9,
the first conversion contract interface is also used for data interaction with a copyright registration mechanism, and the method for data interaction with the copyright registration mechanism comprises the following steps:
sending a second request transaction to the root chain requesting for material required to register the digital rights certificate;
if the certificate conforms to the examination regulation of the digital copyright registration mechanism, receiving a digital copyright certificate which is forwarded by the root chain and contains DCI and is sent by the digital copyright registration mechanism;
if the digital copyright registration authority does not conform to the examination regulation of the digital copyright registration authority, receiving a notice of modifying and registering the digital copyright material sent by the digital copyright registration authority forwarded by the root chain or a notice of not granting the digital copyright certificate.
11. A network convergence method according to any one of claims 5 to 10, comprising:
sending a request to a first operator network element node to utilize resources of a second operator different from the first operator;
receiving a first conversion contract interface sent by a first operator network element node;
accessing a first conversion contract interface, and sending a message for accessing the first conversion contract interface to a root chain through a first operator network element node;
quitting the first conversion contract interface and sending a message of quitting the first conversion contract interface to the root chain through the first operator network element node;
receiving basic information for accessing and exiting a first conversion contract interface transmitted by a root chain transmitted by a first operator network element node;
verifying the basic information of accessing and quitting the first conversion contract interface, and feeding back the basic information to the root chain through the first operator network element node;
wherein, upon receiving a request from a terminal to utilize resources of a second operator different from the first operator,
the first operator network element node sends a first request transaction to a root chain, wherein the first request transaction requests to utilize resources of a second operator different from the first operator;
if the first operator network element node and the terminal identity are verified, receiving a first conversion contract interface and forwarding the terminal;
receiving and sending a message that a terminal accesses a first conversion contract interface to a root chain;
receiving and sending a message that a terminal exits from a first conversion contract interface to a root chain;
receiving basic information of terminal access and exit of a first conversion contract interface sent by a root chain;
and receiving and feeding back basic information for the terminal to verify access and exit of the first conversion contract interface to the root chain for uplink.
12. The network convergence method of claim 11, wherein space-based internet, 5G communication or satellite-to-ground communication is adopted between the terminal and the first operator network element node, between the first operator network element node and the root chain, and between the first operator network element nodes.
13. The method of claim 11, wherein the first operator network element node is a communication base station or a satellite.
14. An apparatus, characterized in that the apparatus comprises:
one or more processors;
a memory for storing one or more programs,
the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method recited in any of claims 1-13.
15. A storage medium storing a computer program, characterized in that the program, when executed by a processor, implements the method according to any one of claims 1-13.
CN202010737059.4A 2020-07-28 2020-07-28 Network convergence and networking method, equipment and storage medium thereof Active CN111934919B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202010737059.4A CN111934919B (en) 2020-07-28 2020-07-28 Network convergence and networking method, equipment and storage medium thereof
PCT/CN2021/093077 WO2022021997A1 (en) 2020-07-28 2021-05-11 Network convergence method and networking method for network convergence, and device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010737059.4A CN111934919B (en) 2020-07-28 2020-07-28 Network convergence and networking method, equipment and storage medium thereof

Publications (2)

Publication Number Publication Date
CN111934919A true CN111934919A (en) 2020-11-13
CN111934919B CN111934919B (en) 2022-02-08

Family

ID=73314723

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010737059.4A Active CN111934919B (en) 2020-07-28 2020-07-28 Network convergence and networking method, equipment and storage medium thereof

Country Status (2)

Country Link
CN (1) CN111934919B (en)
WO (1) WO2022021997A1 (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112926059A (en) * 2021-04-07 2021-06-08 恒安嘉新(北京)科技股份公司 Data processing method, device, equipment and storage medium
CN113194523A (en) * 2021-06-04 2021-07-30 中国联合网络通信集团有限公司 Network connection establishing method, device, terminal and storage medium
CN113286340A (en) * 2021-05-17 2021-08-20 中国联合网络通信集团有限公司 Slice selection auxiliary information configuration method, system, node and storage medium
CN113328782A (en) * 2021-05-25 2021-08-31 清华大学 Block chain-based satellite-ground network resource sharing architecture system and operation method thereof
CN113595979A (en) * 2021-06-25 2021-11-02 福建师范大学 Crowdsourcing data privacy protection method based on cross-chain
CN113613205A (en) * 2021-07-11 2021-11-05 西北工业大学 Network access mechanism suitable for wireless avionics internal communication network
CN113965567A (en) * 2021-10-13 2022-01-21 中国人民解放军战略支援部队航天工程大学 Mesh network-based space-based information comprehensive application and information distribution system
WO2022021997A1 (en) * 2020-07-28 2022-02-03 厦门潭宏信息科技有限公司 Network convergence method and networking method for network convergence, and device and storage medium
CN114679450A (en) * 2022-02-11 2022-06-28 锐捷网络股份有限公司 Access control method and device, electronic equipment and storage medium
CN114844895A (en) * 2022-05-05 2022-08-02 中国电信股份有限公司 Edge application processing method, platform, electronic device and storage medium
CN114928617A (en) * 2022-06-15 2022-08-19 中国电信股份有限公司 Private network subscription data management method, device, equipment and medium
CN115022352A (en) * 2022-07-28 2022-09-06 江苏荣泽信息科技股份有限公司 Split side chain data acquisition and storage system based on end edge cloud fusion
CN115242646A (en) * 2022-06-15 2022-10-25 西安电子科技大学 Block chain-based network slice application method and related device
CN115314523A (en) * 2022-08-03 2022-11-08 上海船舶运输科学研究所有限公司 VPN-based marine communication gateway remote management system and method
CN116744261A (en) * 2023-08-16 2023-09-12 深圳市永达电子信息股份有限公司 Millimeter wave communication network and edge calculation fusion method
EP4231751A4 (en) * 2020-12-03 2024-04-03 Huawei Tech Co Ltd Wireless communication method, device, and system

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115426031B (en) * 2022-11-03 2023-01-24 中国电子科技集团公司第五十四研究所 Centralized and distributed combined space-based network routing control system
CN115618429B (en) * 2022-12-20 2023-03-31 北京理工大学 Product full life cycle management system based on parallel block chain
CN117240621B (en) * 2023-11-13 2024-02-02 腾讯科技(深圳)有限公司 Processing method and device of network request, computer readable medium and electronic equipment

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002007377A2 (en) * 2000-07-14 2002-01-24 Equifax, Inc. Systems and methods for secured electronic transactions
CN107637034A (en) * 2015-06-02 2018-01-26 华为技术有限公司 System and method for the Virtual base facilities management between carrier network
CN107852608A (en) * 2016-07-04 2018-03-27 苹果公司 Network burst selects
US20180183687A1 (en) * 2016-12-28 2018-06-28 Acronis International Gmbh System and Method for Managing Services and Licenses Using a Blockchain Network
CN108230109A (en) * 2018-01-02 2018-06-29 罗梅琴 A kind of shared system and method based on block chain technology
CN108701278A (en) * 2015-12-28 2018-10-23 皇家Kpn公司 Method for providing service to the user equipment for being connected to the first carrier network via the second carrier network
CN110311883A (en) * 2018-03-27 2019-10-08 华为技术有限公司 Identity management method, equipment, communication network and storage medium
CN110348830A (en) * 2019-06-20 2019-10-18 国家信息中心 A kind of network system based on block chain, authentication method, equipment and storage medium
CN110535627A (en) * 2019-08-07 2019-12-03 中国联合网络通信集团有限公司 A kind of data query method and block platform chain

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108833081B (en) * 2018-06-22 2021-01-05 中国人民解放军国防科技大学 Block chain-based equipment networking authentication method
WO2020052747A1 (en) * 2018-09-12 2020-03-19 Telefonaktiebolaget Lm Ericsson (Publ) Management of devices joining a network
CN109242467B (en) * 2018-09-17 2021-01-01 金蝶软件(中国)有限公司 Block chain-based networking method and device, computer equipment and storage medium
CN111163182B (en) * 2020-03-20 2021-08-03 杭州海康威视数字技术股份有限公司 Block chain-based device registration method and apparatus, electronic device, and storage medium
CN111383021B (en) * 2020-05-29 2020-09-15 腾讯科技(深圳)有限公司 Node management method, device, equipment and medium based on block chain network
CN111934919B (en) * 2020-07-28 2022-02-08 厦门潭宏信息科技有限公司 Network convergence and networking method, equipment and storage medium thereof

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002007377A2 (en) * 2000-07-14 2002-01-24 Equifax, Inc. Systems and methods for secured electronic transactions
CN107637034A (en) * 2015-06-02 2018-01-26 华为技术有限公司 System and method for the Virtual base facilities management between carrier network
CN108701278A (en) * 2015-12-28 2018-10-23 皇家Kpn公司 Method for providing service to the user equipment for being connected to the first carrier network via the second carrier network
CN107852608A (en) * 2016-07-04 2018-03-27 苹果公司 Network burst selects
US20180183687A1 (en) * 2016-12-28 2018-06-28 Acronis International Gmbh System and Method for Managing Services and Licenses Using a Blockchain Network
CN108230109A (en) * 2018-01-02 2018-06-29 罗梅琴 A kind of shared system and method based on block chain technology
CN110311883A (en) * 2018-03-27 2019-10-08 华为技术有限公司 Identity management method, equipment, communication network and storage medium
CN110348830A (en) * 2019-06-20 2019-10-18 国家信息中心 A kind of network system based on block chain, authentication method, equipment and storage medium
CN110535627A (en) * 2019-08-07 2019-12-03 中国联合网络通信集团有限公司 A kind of data query method and block platform chain

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022021997A1 (en) * 2020-07-28 2022-02-03 厦门潭宏信息科技有限公司 Network convergence method and networking method for network convergence, and device and storage medium
EP4231751A4 (en) * 2020-12-03 2024-04-03 Huawei Tech Co Ltd Wireless communication method, device, and system
CN112926059B (en) * 2021-04-07 2024-04-23 恒安嘉新(北京)科技股份公司 Data processing method, device, equipment and storage medium
CN112926059A (en) * 2021-04-07 2021-06-08 恒安嘉新(北京)科技股份公司 Data processing method, device, equipment and storage medium
CN113286340A (en) * 2021-05-17 2021-08-20 中国联合网络通信集团有限公司 Slice selection auxiliary information configuration method, system, node and storage medium
CN113328782B (en) * 2021-05-25 2022-07-26 清华大学 Block chain-based satellite-ground network resource sharing architecture system and operation method thereof
CN113328782A (en) * 2021-05-25 2021-08-31 清华大学 Block chain-based satellite-ground network resource sharing architecture system and operation method thereof
CN113194523A (en) * 2021-06-04 2021-07-30 中国联合网络通信集团有限公司 Network connection establishing method, device, terminal and storage medium
CN113595979A (en) * 2021-06-25 2021-11-02 福建师范大学 Crowdsourcing data privacy protection method based on cross-chain
CN113613205A (en) * 2021-07-11 2021-11-05 西北工业大学 Network access mechanism suitable for wireless avionics internal communication network
CN113613205B (en) * 2021-07-11 2023-06-13 西北工业大学 Network access mechanism suitable for wireless avionics internal communication network
CN113965567A (en) * 2021-10-13 2022-01-21 中国人民解放军战略支援部队航天工程大学 Mesh network-based space-based information comprehensive application and information distribution system
CN113965567B (en) * 2021-10-13 2023-09-08 中国人民解放军战略支援部队航天工程大学 Space-based information comprehensive application and information distribution system based on Mesh network
CN114679450A (en) * 2022-02-11 2022-06-28 锐捷网络股份有限公司 Access control method and device, electronic equipment and storage medium
CN114844895A (en) * 2022-05-05 2022-08-02 中国电信股份有限公司 Edge application processing method, platform, electronic device and storage medium
CN114928617A (en) * 2022-06-15 2022-08-19 中国电信股份有限公司 Private network subscription data management method, device, equipment and medium
CN115242646A (en) * 2022-06-15 2022-10-25 西安电子科技大学 Block chain-based network slice application method and related device
CN114928617B (en) * 2022-06-15 2023-07-21 中国电信股份有限公司 Private network subscription data management method, device, equipment and medium
CN115242646B (en) * 2022-06-15 2024-02-13 西安电子科技大学 Block chain-based network slice application method and related device
CN115022352A (en) * 2022-07-28 2022-09-06 江苏荣泽信息科技股份有限公司 Split side chain data acquisition and storage system based on end edge cloud fusion
CN115022352B (en) * 2022-07-28 2024-03-08 江苏荣泽信息科技股份有限公司 End edge cloud fusion-based segmented side chain data acquisition and storage system
CN115314523A (en) * 2022-08-03 2022-11-08 上海船舶运输科学研究所有限公司 VPN-based marine communication gateway remote management system and method
CN116744261B (en) * 2023-08-16 2023-11-28 深圳市永达电子信息股份有限公司 Millimeter wave communication network and edge calculation fusion method
CN116744261A (en) * 2023-08-16 2023-09-12 深圳市永达电子信息股份有限公司 Millimeter wave communication network and edge calculation fusion method

Also Published As

Publication number Publication date
CN111934919B (en) 2022-02-08
WO2022021997A1 (en) 2022-02-03

Similar Documents

Publication Publication Date Title
CN111934919B (en) Network convergence and networking method, equipment and storage medium thereof
Taleb et al. Mobile edge computing potential in making cities smarter
US10652624B2 (en) Next generation terrestrial broadcasting platform aligned internet and towards emerging 5G network architectures
Pujolle Software Networks: Virtualization, SDN, 5G, and Security
Fitzek et al. Computing in communication networks: From theory to practice
Cheng et al. 6G service-oriented space-air-ground integrated network: A survey
Prados-Garzon et al. 5G non-public networks: Standardization, architectures and challenges
Reznik et al. Cloud RAN and MEC: A perfect pairing
US11856097B2 (en) Mechanism to provide customer VCN network encryption using customer-managed keys in network virtualization device
CN111612466B (en) Consensus and resource transmission method, device and storage medium
AU2022201580B2 (en) Methods and apparatus for providing traffic forwarder via dynamic overlay network
US20240129280A1 (en) End-to-end network encryption from customer on-premise network to customer virtual cloud network using customer-managed keys
Drif et al. An extensible network slicing framework for satellite integration into 5G
Sabella et al. Edge computing: from standard to actual infrastructure deployment and software development
CA2993349A1 (en) Methodology of a coordinate mapping system
US20190037028A1 (en) Distributed gateways with centralized data center for high throughput satellite (hts) spot beam network
Montalban et al. Broadcast core-network: Converging broadcasting with the connected world
NetWorld2020 5g: Challenges, research priorities, and recommendations
Debbabi et al. 5G network slicing: Fundamental concepts, architectures, algorithmics, projects practices, and open issues
Cabrera et al. ATSC 3.0 broadcast core network for next-generation media delivery
Yarali Public safety networks from LTE to 5G
Li et al. 6G cloud-native system: Vision, challenges, architecture framework and enabling technologies
Verma et al. Techniques for surviving the mobile data explosion
US11626924B1 (en) Satellite transmission module for ground station
Casetti The 5G Ecosystem Forges Ahead as Remote Services Take Center Stage [Mobile Radio]

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB03 Change of inventor or designer information

Inventor after: He Ying

Inventor after: Gu Yingying

Inventor after: Jiang Mantao

Inventor before: He Ying

Inventor before: Gu Yingying

Inventor before: Jiang Mantao

CB03 Change of inventor or designer information
GR01 Patent grant
GR01 Patent grant