CN113905010A - Message scheduling method and device, computer equipment and storage medium - Google Patents

Message scheduling method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN113905010A
CN113905010A CN202111030497.8A CN202111030497A CN113905010A CN 113905010 A CN113905010 A CN 113905010A CN 202111030497 A CN202111030497 A CN 202111030497A CN 113905010 A CN113905010 A CN 113905010A
Authority
CN
China
Prior art keywords
network terminal
message
mask
target network
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111030497.8A
Other languages
Chinese (zh)
Inventor
范大勇
马巍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Avic Avionics Corp ltd
China Avionics Systems Co Ltd
Original Assignee
Avic Avionics Corp ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Avic Avionics Corp ltd filed Critical Avic Avionics Corp ltd
Priority to CN202111030497.8A priority Critical patent/CN113905010A/en
Publication of CN113905010A publication Critical patent/CN113905010A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4604LAN interconnection over a backbone network, e.g. Internet, Frame Relay

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention is applicable to the field of aviation bus systems, and provides a message scheduling method, a message scheduling device, computer equipment and a storage medium, wherein the method comprises the following steps: sending a mask inquiry message to a target network terminal, wherein the target network terminal is a network terminal of data to be uploaded; receiving and analyzing a mask returned by the target network terminal, wherein the mask is used for identifying a sub-address of data needing to be read back in the target network terminal; and sending a message read-back instruction to a target network terminal, wherein the message read-back instruction is used for enabling the data in the sub-address needing to read back the data to be sent to a network controller through the target network terminal. According to the invention, the data storage state of each sub-address is obtained by obtaining the mask code, so that the sub-address which needs to be subjected to data read-back in the target network terminal is obtained, and then data is obtained only from the sub-address which needs to be subjected to data read-back, so that the data processing efficiency is greatly improved, and the real-time performance of data uploading in the network terminal can also be ensured.

Description

Message scheduling method and device, computer equipment and storage medium
Technical Field
The present invention relates to the field of aviation bus systems, and in particular, to a message scheduling method, apparatus, computer device, and storage medium.
Background
The FC-AE-1553 bus is an emerging high-reliability and high-speed optical fiber bus, the protocol of which is formulated by the American National Standards Institute (ANSI), defines the mapping from the MIL-STD-1553B protocol to the Fibre Channel (FC) high-level protocol, and provides protocol support for the development of an optical fiber 1553 bus controller. Like the conventional 1553B bus, FC-AE-1553 defines a command/response type bus standard, but has great improvements in bus capacity, transmission rate, reliability and the like. Meanwhile, the FC-AE-1553 bus adopts an optical fiber transmission medium and a network topology structure, has strong anti-interference capability and expansion capability, and is very suitable for electronic system networking and multi-terminal communication of a complex spacecraft. In addition, a very important characteristic of the FC-AE-1553 bus is that the existing 1553B bus is accessed into the optical fiber 1553 network in a bridging mode, so that the existing 1553B equipment is reserved to the maximum extent, resources are saved, and the smooth upgrading of the traditional 1553B bus is realized. Therefore, the FC-AE-1553 bus is the development direction of a high-speed and high-reliability data bus in the aerospace field.
In an FC-AE-1553 bus, communication is performed between NC (Network Controller) nodes and NT (Network Terminal) nodes, the NT nodes can send messages to the NC nodes passively after receiving and executing message query instructions of the NC nodes, and in the prior art, each sub-address in the NC nodes is queried one by one to determine whether there is data to be uploaded, and then data in the sub-address of the data to be uploaded is received.
In the prior art, the message sending from the NT node to the NC node is triggered by user plane (software), the software and hardware interaction time is more, the efficiency of uploading data is slower, and the method is not suitable for a bus system which has higher real-time requirement when the FC-AE-1553 bus NT node carries more sub-addresses.
Disclosure of Invention
In view of the foregoing, it is desirable to provide a message scheduling method, apparatus, computer device and storage medium.
In one embodiment, the method comprises:
sending a mask inquiry message to a target network terminal, wherein the target network terminal is a network terminal of data to be uploaded;
receiving and analyzing a mask returned by the target network terminal, wherein the mask is used for identifying a sub-address of data needing to be read back in the target network terminal;
and sending a message read-back instruction to a target network terminal, wherein the message read-back instruction is used for enabling the data in the sub-address needing to read back the data to be sent to a network controller through the target network terminal.
In one embodiment, a message scheduling apparatus is provided, which includes:
the mask inquiry unit is used for sending a mask inquiry message to the target network terminal;
the mask processing unit is used for receiving and analyzing a mask from the target network terminal; and the message processing unit is used for sending a message read-back instruction to the target network terminal.
A computer device comprising a memory and a processor, the memory having stored therein a computer program which, when executed by the processor, causes the processor to carry out the steps of the above message scheduling method.
A computer-readable storage medium, having stored thereon a computer program which, when executed by a processor, causes the processor to perform the steps of the above-mentioned message scheduling method.
According to the message scheduling method, the message scheduling device, the computer equipment and the storage medium, the data storage state of each sub-address is obtained through the obtained mask, so that the sub-address needing data read-back in the target network terminal is obtained, and then data is obtained only from the sub-address needing data read-back, so that the data processing efficiency is greatly improved, and the real-time performance of data uploading in the network terminal can be ensured.
Drawings
FIG. 1 is a diagram of an application environment for a message scheduling method provided in one embodiment;
FIG. 2 is a flow diagram of a method for scheduling messages in one embodiment;
FIG. 3 is a flow diagram of a method for scheduling messages in another embodiment;
FIG. 4 is a flow diagram of a method for scheduling messages in another embodiment;
FIG. 5 is a flow diagram of a method for scheduling messages in another embodiment;
FIG. 6 is a block diagram of an apparatus for message scheduling in one embodiment;
FIG. 7 is a block diagram showing an internal configuration of a computer device according to an embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
It will be understood that, as used herein, the terms "first," "second," and the like may be used herein to describe various elements, but these elements are not limited by these terms unless otherwise specified. These terms are only used to distinguish one element from another. For example, a first xx script may be referred to as a second xx script, and similarly, a second xx script may be referred to as a first xx script, without departing from the scope of the present application.
Fig. 1 is a diagram of an application environment of a message scheduling method provided in an embodiment, as shown in fig. 1, in the application environment, including a network controller 110 and a network terminal 120.
The network controller 110 may be an independent physical server or terminal, or may be a server cluster composed of a plurality of physical servers.
The network terminal 120 is a device capable of processing and uploading data collected by the sensor, and mainly receives a command sent by the network controller and passively sends data to the network controller 110.
The network controller 110 and the network terminals 120 may be connected through an optical fiber network, the network controller 110 may be an NC node in an FC-AE-1553 bus, and the network terminals may be NT nodes in the FC-AE-1553 bus, and generally, one network controller 110 is connected to and communicates with 20 network terminals 120, which is not limited herein.
For example, the network controller is a bus network control node on board, the network terminal may be a bus network terminal node located on a wing or a fuselage, and the network terminal node may upload various sensor data on board.
As shown in fig. 2, in an embodiment, a message scheduling method is proposed, and this embodiment is mainly illustrated by applying the method to the network controller 110 in fig. 1. The method specifically comprises the following steps:
step S202, a mask inquiry message is sent to a target network terminal, and the target network terminal is a network terminal of data to be uploaded;
step S204, receiving and analyzing a mask returned by the target network terminal, wherein the mask is used for identifying a sub-address of data needing to be read back in the target network terminal;
step S206, sending a message read-back instruction to a target network terminal, wherein the message read-back instruction is used for enabling the data in the sub-address of the data to be read back to be sent to a network controller through the target network terminal.
In one embodiment, the network terminal cannot actively send message data to the network controller, and usually the network controller sends a query command to the network terminal to query whether the network terminal uploads data; specifically, the network controller can send the command to the network terminal through the address information of the network terminal itself, and then send the command to the corresponding sub-address through the sub-address value of the sub-address carried under the network terminal. Among the network terminals, there are some network terminals for periodically sending data to the network controller, the network terminals are preset and known by the network controller, the network controller communicates with the network terminals one by one in a period to upload data, and the network terminal to be uploaded may be a target network terminal. Therefore, after the network controller sends the mask query message to the target network terminal, the target network terminal can receive the mask query message and send the mask to the network controller.
In one embodiment, one sub-address may be set among several sub-addresses of the network terminal to store the mask.
In one embodiment, a network terminal may carry several sub-addresses, such as 256, 128, etc., without specific limitation. Each subaddress may represent the subaddress by a subaddress value, and each subaddress may map a block of memory in hardware for storing specific data.
In one embodiment, a network controller receives and analyzes a mask, the mask is used for identifying states of sub-addresses under a target network terminal, some sub-address states exist and no data are uploaded to the network controller, some sub-address states exist and data are uploaded to the network controller, the mask can correspondingly identify the states of the sub-addresses, the sub-addresses with data uploaded are sub-addresses needing to read back data, and the network controller can know the sub-addresses needing to read back data under the current target network terminal after analyzing the mask. The network controller knows the sub-addresses where data needs to be read back, i.e. can communicate with these sub-addresses only in one cycle, without communicating with all sub-addresses.
In one embodiment, a network controller sends message read-back instructions to a target terminal, each message read-back instruction is only communicated with one sub-address under the target network terminal, the message read-back instruction can instruct the network terminal to upload data in the sub-address, and since the network controller knows which sub-addresses have data, the network controller can send the data read-back instruction only to the sub-address needing data read-back, and the data in the sub-address needing data read-back can be sent to the network controller through the target network terminal.
In this embodiment, the network controller obtains the data in the sub-address no longer in a polling manner for the sub-address of the network terminal, but obtains the data storage state of each sub-address by obtaining the mask, and then obtains the sub-address that needs to read back the data in the target network terminal, and then obtains the data only for the sub-address that needs to read back the data, so that the efficiency of data processing is greatly improved, and the real-time performance of data uploading in the network terminal can also be ensured.
In one embodiment, the mask word size is configured to correspond to the number of subaddresses of the target network terminal. In some large systems, a network terminal may be connected to more components, such as different sensors, or may need to upload more different types of data, so that a network terminal needs to set more sub-addresses and send different data to a network controller respectively; the mask itself can be corresponded to the sub-address by setting the word length; for example, if a bit corresponds to the state of a sub-address, if a certain sub-address needs to be read back, i.e. the bit at the position corresponding to the sub-address in the mask is "1", then by setting a sub-address separately to store the mask, the state of the sub-address storing the mask may not necessarily be identified. Therefore, the present embodiment can identify the state of the sub-address by using the mask in a large bus system, so as to facilitate the efficiency of uploading data from the network terminal to the network controller.
Referring to fig. 3, in an embodiment, step S206, the step of sending a message read-back instruction to the target network terminal includes:
step S302, a plurality of message read-back instructions are generated according to the mask;
step S304, writing the message read-back instruction into a message queue;
step S306, sequentially sending the message read-back commands in the message queue to the target network terminal.
In one embodiment, after the mask is analyzed, it may be determined which sub-addresses in the target network terminal have message data to be read back, and then a plurality of message read-back instructions are generated for the sub-addresses requiring the read-back message, where each message read-back instruction may excite one sub-address in the target network terminal to send the message data to the network controller, and after the network terminal receives the message read-back instruction, the corresponding sub-address may send the cached data to the network controller.
In one embodiment, the message read-back instructions are generated and then written into a message queue, i.e. arranged in sequence, so as to facilitate the ordered sending of the message read-back instructions and the sending of the message read-back instructions one by one. When different network terminals are target network terminals, the message read-back instructions for each target network terminal can be written into a message queue in a sequential arrangement mode and then executed.
In one embodiment, the message read-back commands in the message queue are sequentially sent, specifically to the target network side, to communicate with the corresponding sub-addresses in the target network terminal.
In one embodiment, the network controller stores preset configuration information, and the network controller may accurately send a mask query message to the target network terminal according to the configuration information, such as the current number of network terminals, address information of each network terminal, sub-address information of a mask stored in the network terminal, word length information of the mask, and a total network terminal lookup table, and then send a message read-back instruction to the target network terminal. Specifically, the network controller may query the address value of the corresponding target network terminal according to the network terminal query table, and specify the sub-address value in the target network terminal corresponding to the mask query instruction and the sub-address value in the target network terminal corresponding to the message read-back instruction; the network controller can send the mask inquiry message or the message read-back instruction to the bus in the form of a command frame, then the mask inquiry message or the message read-back instruction is received by the target network on the bus, and then the target network terminal executes the corresponding instruction to enable the corresponding sub-address to upload the corresponding data.
As shown in fig. 4, in an embodiment, the step after the step S304 writes the message read-back instruction into the message queue further includes:
step 402, sequentially sending mask inquiry messages to target network terminals;
step 404, if the masks of all the target network terminals are obtained, determining whether a preset protection time is reached;
in step 406, if the preset guard time is reached, the message queue is emptied.
In one embodiment, the network controller schedules the messages periodically, that is, the communication with the network terminals is periodic, and in one message scheduling period, the network controller sends mask query messages to all the network terminals in a polling manner, so that whether the mask query messages are sent to all the network terminals needs to be confirmed, and if not, the network terminals which do not receive the masks send the mask query messages, so that the current network terminals can conveniently send data to the network controller;
if all network terminals have sent the mask inquiry message and received the corresponding mask, then further confirming whether the protection time is reached, and if the protection time is reached, emptying the message queue. The protection time is a preset parameter, and the duration of the protection time is less than the duration of the message scheduling period. And emptying the message queue after the protection time length is reached, wherein the execution time length of the message read-back instruction is mainly limited, and the message queue is used for preventing the network terminal from overflowing due to excessive data uploaded according to the message read-back instruction, so that the message scheduling cycle is jittered and the accuracy of the message scheduling cycle is influenced.
In an embodiment, after the sub-address storing data in the network terminal uploads the data according to the message read-back instruction, a corresponding bit of the sub-address in the mask may be set to "0", which indicates that no data of the sub-address needs to be uploaded in the current message scheduling period. And when the protection time is up, the message queue is emptied, and if data in some sub-addresses in a certain target network terminal are not uploaded, the data can be uploaded in the next message scheduling period. And the message is prevented from being lost, the message scheduling period is ensured not to be jittered, and the reliability is improved.
In an embodiment, the message scheduling period is used to control the target network terminal data uploading period, a message scheduling period duration may be preset to 100ms, and a message protection time duration may be preset to 80 ms.
Referring to fig. 5, in an embodiment, in step S202, before sending the mask query message to the target network terminal, the steps are:
step S502, obtaining configuration information, wherein the configuration information comprises the number of target network terminals, a target network terminal query table, a mask query address value and a mask word length.
In one embodiment, the configuration information includes the number of target network terminals, a target network terminal look-up table, a mask look-up address value, and a mask word size. The number of the target network terminals can be specifically configured according to different buses, and generally, the number of the target network terminals can be configured to be 4; the target network terminal query table is used for querying the address value of the target network terminal, so that messages can be conveniently sent to the target network terminal; the mask inquires the address value, the mask in the target network terminal is stored in the sub-address below it, a certain sub-address is configured to store the mask and send the mask to the network controller, the network controller can determine the sub-address of the target network terminal for storing the mask according to the mask inquired address value, so as to obtain the sub-address conveniently; the mask word length is configured correspondingly according to the number of the sub-addresses used by the target network terminal for uploading data, and if a target network terminal configures 256 sub-addresses for uploading data to the network controller, the mask word length can be configured to 256 bits.
In one embodiment, the configuration information can be configured by a user and stored in the network terminal, so that message scheduling is facilitated.
As shown in fig. 6, in an embodiment, there is provided a message scheduling apparatus, including:
the mask inquiry unit is used for sending a mask inquiry message to the target network terminal;
the mask processing unit is used for receiving and analyzing a mask from the target network terminal; and the message processing unit is used for sending a message read-back instruction to the target network terminal.
In one embodiment, the mask query unit is configured to send a mask query message to the target network terminal. The network terminal cannot actively send message data to the network controller, and usually the network controller sends a query command to the network terminal to inquire whether the network terminal uploads the data or not; specifically, the network controller can send the command to the network terminal through the address information of the network terminal itself, and then send the command to the corresponding sub-address through the sub-address value of the sub-address carried under the network terminal. Among the network terminals, there are some network terminals for periodically sending data to the network controller, the network terminals are preset and known by the network controller, the network controller communicates with the network terminals one by one in a period to upload data, and the network terminal to be uploaded may be a target network terminal. Therefore, after the network controller sends the mask query message to the target network terminal, the target network terminal can receive the mask query message and send the mask to the network controller.
In one embodiment, the mask processing unit is configured to receive and parse a mask from the target network terminal. The network controller receives and analyzes the mask code, the mask code is used for identifying the state of the sub-address under the target network terminal, some sub-address states exist and do not upload data to the network controller, some sub-address states exist and do upload data to the network controller, the mask code can correspondingly identify the states of the sub-addresses, the sub-address with the uploaded data is the sub-address needing to read back the data, and the network controller can know the sub-address needing to read back the data under the current target network terminal after analyzing the mask code. The network controller knows the sub-addresses where data needs to be read back, i.e. can communicate with these sub-addresses only in one cycle, without communicating with all sub-addresses.
In one embodiment, the mask processing unit generates a message read-back instruction for a sub-address which needs to be read back according to the identification condition of the mask to the sub-address of the target network terminal.
In one embodiment, the message processing unit is configured to send a message read-back instruction to the target network terminal. The network controller sends message read-back instructions to the target terminal, each message read-back instruction is only communicated with one sub-address under the target network terminal, the message read-back instructions can instruct the network terminal to upload data in the sub-address, and the network controller knows which sub-addresses have data, so that the network controller can only send the data read-back instructions to the sub-addresses needing data read-back, and the data in the sub-addresses needing data read-back can be sent to the network controller through the target network terminal.
In one embodiment, the message processing unit may include a message queue unit and a message execution unit, the message queue unit is configured to sequentially arrange the message read-back instructions, and the message queue unit may be mapped with a buffer area to buffer a plurality of message read-back instructions; then the message execution unit executes the message read-back instruction in sequence, namely, the message read-back instruction is sent to the bus and received and processed by the target network terminal; and after executing a message read-back instruction in the message queue, the message execution unit checks whether the message read-back instruction exists in the message queue, and if so, continues to execute the message read-back instruction.
In one embodiment, the apparatus further comprises:
the user configuration unit is used for receiving configuration information of a user, wherein the configuration information comprises the number of network terminals, a network terminal query table, a mask query address value and a mask length.
In this embodiment, the configuration information includes the number of target network terminals, a target network terminal lookup table, a mask lookup address value, and a mask word size. The number of the target network terminals can be specifically configured according to different buses, and generally, the number of the target network terminals can be configured to be 4; the target network terminal query table is used for querying the address value of the target network terminal, so that messages can be conveniently sent to the target network terminal; the mask inquires the address value, the mask in the target network terminal is stored in the sub-address below it, a certain sub-address is configured to store the mask and send the mask to the network controller, the network controller can determine the sub-address of the target network terminal for storing the mask according to the mask inquired address value, so as to obtain the sub-address conveniently; the mask word length is configured correspondingly according to the number of the sub-addresses used by the target network terminal for uploading data, and if a target network terminal configures 256 sub-addresses for uploading data to the network controller, the mask word length can be configured to 256 bits.
Furthermore, the mask inquiry unit sends the mask inquiry command to the target network terminal through the configuration information, and when the message execution unit sends the message read-back command, the mask inquiry unit can directly obtain the configuration information so as to accurately send the message read-back command to the target network terminal and be executed by the target network terminal.
As shown in FIG. 7, an internal block diagram of a computer device in one embodiment is shown in one embodiment. The computer device may specifically be the network controller 110 in fig. 1. As shown in fig. 7, the computer apparatus may include a processor, a memory, a network interface, an input device, and a display screen connected through a system bus. Wherein the memory includes a non-volatile storage medium and an internal memory. The non-volatile storage medium of the computer device stores an operating system and may also store a computer program that, when executed by the processor, causes the processor to implement a message scheduling method. The internal memory may also have stored therein a computer program that, when executed by the processor, causes the processor to perform a message scheduling method. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, a key, a track ball or a touch pad arranged on the shell of the computer equipment, an external keyboard, a touch pad or a mouse and the like.
Those skilled in the art will appreciate that the architecture shown in fig. 7 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, the message scheduling apparatus provided in the present application may be implemented in the form of a computer program, and the computer program may be run on a computer device as shown in fig. 7. The memory of the computer device may store therein various program modules constituting the message scheduling apparatus, such as a user configuration unit, a mask inquiry unit, a mask processing unit, a message queue, and a message execution unit shown in fig. 6. The computer program formed by the program unit modules enables the processor to execute the steps of the message scheduling method of the embodiment of the application described in the specification.
For example, the computer device shown in fig. 7 may execute step S502 via the user configuration unit in the message scheduling apparatus shown in fig. 6, and obtain configuration information, where the configuration information includes the number of target network terminals, the target network terminal lookup table, the mask lookup address value, and the mask word size. The computer device may execute step S202 through the mask query unit, and send a mask query message to a target network terminal, where the target network terminal is a network terminal that is to upload data. The computer device may execute step S204 through the mask processing unit, and receive and parse a mask returned by the target network terminal, where the mask is used to identify a sub-address of the target network terminal where the data needs to be read back. The computer equipment can send a message read-back instruction to a target network terminal through a message queue and a message execution unit, wherein the message read-back instruction is used for enabling data in the sub-address of the data to be read back to be sent to a network controller through the target network terminal.
In one embodiment, a computer device is proposed, the computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the following steps when executing the computer program:
step S202, a mask inquiry message is sent to a target network terminal, and the target network terminal is a network terminal of data to be uploaded;
step S204, receiving and analyzing a mask returned by the target network terminal, wherein the mask is used for identifying a sub-address of data needing to be read back in the target network terminal;
step S206, sending a message read-back instruction to a target network terminal, wherein the message read-back instruction is used for enabling the data in the sub-address of the data to be read back to be sent to a network controller through the target network terminal.
In one embodiment, a computer readable storage medium is provided, having a computer program stored thereon, which, when executed by a processor, causes the processor to perform the steps of:
step S202, a mask inquiry message is sent to a target network terminal, and the target network terminal is a network terminal of data to be uploaded;
step S204, receiving and analyzing a mask returned by the target network terminal, wherein the mask is used for identifying a sub-address of data needing to be read back in the target network terminal;
step S206, sending a message read-back instruction to a target network terminal, wherein the message read-back instruction is used for enabling the data in the sub-address of the data to be read back to be sent to a network controller through the target network terminal.
It should be understood that, although the steps in the flowcharts of the embodiments of the present invention are shown in sequence as indicated by the arrows, the steps are not necessarily performed in sequence as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least a portion of the steps in various embodiments may include multiple sub-steps or multiple stages that are not necessarily performed at the same time, but may be performed at different times, and the order of performance of the sub-steps or stages is not necessarily sequential, but may be performed in turn or alternately with other steps or at least a portion of the sub-steps or stages of other steps.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a non-volatile computer-readable storage medium, and can include the processes of the embodiments of the methods described above when the program is executed. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
The technical features of the embodiments described above may be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the embodiments described above are not described, but should be considered as being within the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present invention, and the description thereof is more specific and detailed, but not construed as limiting the scope of the present invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the inventive concept, which falls within the scope of the present invention. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. A method of message scheduling, the method comprising:
sending a mask inquiry message to a target network terminal, wherein the target network terminal is a network terminal of data to be uploaded;
receiving and analyzing a mask returned by the target network terminal, wherein the mask is used for identifying a sub-address of data needing to be read back in the target network terminal;
and sending a message read-back instruction to a target network terminal, wherein the message read-back instruction is used for enabling the data in the sub-address needing to read back the data to be sent to a network controller through the target network terminal.
2. The method of claim 1, wherein the mask word size is configured to correspond to the number of subaddresses of the target network terminal.
3. The method of claim 1, wherein the step of sending a message read-back instruction to the target network terminal comprises:
generating a plurality of message read-back instructions according to the mask;
writing the message read-back instruction into a message queue;
and sequentially sending the message read-back instructions in the message queue to the target network terminal.
4. The method of claim 3, wherein the step after writing the message read-back instruction to the message queue further comprises:
sequentially sending mask inquiry messages to a target network terminal;
if the masks of all the target network terminals are obtained, whether preset protection time is reached is determined;
and if the preset protection time is reached, emptying the message queue.
5. The method according to claim 4, wherein the guard time duration is less than a preset message scheduling period duration, and the message scheduling period is used for controlling the target network terminal data uploading period.
6. The method of claim 1, wherein the step of sending the mask inquiry message to the target network terminal is preceded by the steps of:
and acquiring configuration information, wherein the configuration information comprises the number of target network terminals, a target network terminal query table, a mask query address value and a mask word length.
7. A message scheduling apparatus, comprising:
the mask inquiry unit is used for sending a mask inquiry message to the target network terminal;
the mask processing unit is used for receiving and analyzing a mask from the target network terminal; and
and the message processing unit is used for sending a message read-back instruction to the target network terminal according to the mask.
8. The message scheduling apparatus of claim 7, wherein the apparatus further comprises:
the user configuration unit is used for receiving configuration information of a user, wherein the configuration information comprises the number of network terminals, a network terminal query table, a mask query address value and a mask length.
9. A computer arrangement, comprising a memory and a processor, the memory having stored therein a computer program which, when executed by the processor, causes the processor to carry out the steps of the message scheduling method according to any one of claims 1 to 6.
10. A computer-readable storage medium, having stored thereon a computer program which, when executed by a processor, causes the processor to carry out the steps of the message scheduling method according to any one of claims 1 to 6.
CN202111030497.8A 2021-09-03 2021-09-03 Message scheduling method and device, computer equipment and storage medium Pending CN113905010A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111030497.8A CN113905010A (en) 2021-09-03 2021-09-03 Message scheduling method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111030497.8A CN113905010A (en) 2021-09-03 2021-09-03 Message scheduling method and device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN113905010A true CN113905010A (en) 2022-01-07

Family

ID=79188349

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111030497.8A Pending CN113905010A (en) 2021-09-03 2021-09-03 Message scheduling method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113905010A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102546332A (en) * 2010-12-14 2012-07-04 黄越杰 Networking communication method for upper computers and lower computers
US20140025770A1 (en) * 2012-07-17 2014-01-23 Convergent.Io Technologies Inc. Systems, methods and devices for integrating end-host and network resources in distributed memory
CN112714078A (en) * 2019-10-24 2021-04-27 中兴通讯股份有限公司 Network traffic identification method and device, storage medium and server

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102546332A (en) * 2010-12-14 2012-07-04 黄越杰 Networking communication method for upper computers and lower computers
US20140025770A1 (en) * 2012-07-17 2014-01-23 Convergent.Io Technologies Inc. Systems, methods and devices for integrating end-host and network resources in distributed memory
CN112714078A (en) * 2019-10-24 2021-04-27 中兴通讯股份有限公司 Network traffic identification method and device, storage medium and server

Similar Documents

Publication Publication Date Title
CN110719318B (en) Message processing method and system
CN108897658B (en) Method and device for monitoring master database, computer equipment and storage medium
KR20120102664A (en) Allocating storage memory based on future use estimates
CN108141471B (en) Method, device and equipment for compressing data
CN111159233B (en) Distributed caching method, system, computer equipment and storage medium
US20210321358A1 (en) Sim card registration method and apparatus, computer device, and storage medium
CN113422707B (en) In-band network remote measuring method and equipment
CN107947906B (en) Slave device
CN109218131B (en) Network monitoring method and device, computer equipment and storage medium
CN113438184B (en) Network card queue management method and device and electronic equipment
CN112069239B (en) Method, system, device and storage medium for using database based on HTTP request
CN113905010A (en) Message scheduling method and device, computer equipment and storage medium
CN113328927A (en) Industrial Internet of things gateway with calculation, storage and network exchange functions
CN111147586B (en) Equipment end control method and device and conference system
CN115277644A (en) Bus data transmission system, method, device and storage medium
CN115495406A (en) Message transmission method, device, equipment and storage medium based on PCIe
CN113840313B (en) Network mode control method and device of mobile terminal and computer equipment
CN109254997B (en) Data synchronization method, system, computer device and readable storage medium
CN113676353A (en) Control method and device for equipment, storage medium and electronic device
CN112564999A (en) Network measurement method, measurement management server, system and storage medium
CN112291212A (en) Static rule management method and device, electronic equipment and storage medium
CN112711606A (en) Database access method and device, computer equipment and storage medium
CN112764673A (en) Storage rate optimization method and device, computer equipment and storage medium
CN111552612A (en) MSSQL monitoring management method, management device, system and computer equipment
CN112765056B (en) Method, system, equipment and medium for reserving storage cluster LUN

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination