CN106372026B - link detection method and receiving equipment - Google Patents

link detection method and receiving equipment Download PDF

Info

Publication number
CN106372026B
CN106372026B CN201510435546.4A CN201510435546A CN106372026B CN 106372026 B CN106372026 B CN 106372026B CN 201510435546 A CN201510435546 A CN 201510435546A CN 106372026 B CN106372026 B CN 106372026B
Authority
CN
China
Prior art keywords
link
new
serial data
data information
error
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510435546.4A
Other languages
Chinese (zh)
Other versions
CN106372026A (en
Inventor
张自渊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen ZTE Microelectronics Technology Co Ltd
Original Assignee
Shenzhen ZTE Microelectronics Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen ZTE Microelectronics Technology Co Ltd filed Critical Shenzhen ZTE Microelectronics Technology Co Ltd
Priority to CN201510435546.4A priority Critical patent/CN106372026B/en
Priority to PCT/CN2016/081122 priority patent/WO2017012389A1/en
Publication of CN106372026A publication Critical patent/CN106372026A/en
Application granted granted Critical
Publication of CN106372026B publication Critical patent/CN106372026B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F13/00Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
    • G06F13/38Information transfer, e.g. on bus
    • G06F13/42Bus transfer protocol, e.g. handshake; Synchronisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F13/00Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
    • G06F13/38Information transfer, e.g. on bus
    • G06F13/42Bus transfer protocol, e.g. handshake; Synchronisation
    • G06F13/4282Bus transfer protocol, e.g. handshake; Synchronisation on a serial bus, e.g. I2C bus, SPI bus

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Detection And Prevention Of Errors In Transmission (AREA)
  • Communication Control (AREA)

Abstract

The embodiment of the invention discloses link detection methods, which comprise the steps of receiving serial data information sent by a sending device through a link, wherein the serial data information comprises information to be transmitted and corresponding check information, checking the serial data information according to the check information to obtain a check result, determining that the link state of the link is an effective state if the check result shows that the received serial data information is not tampered, and determining that the link state of the link is an invalid state if the check result shows that the received serial data information is tampered.

Description

link detection method and receiving equipment
Technical Field
The invention relates to a high-speed serial link state detection technology, in particular to link detection methods and receiving equipment.
Background
Serial communication means that data lines are used to transmit bits and bits of data in sequence, and each bit of data occupies fixed time lengths, the serial communication only needs a few lines to exchange information between systems, and therefore, the serial communication is particularly suitable for long-distance communication between a computer and the computer and between the computer and an external device, but channel noise and intersymbol crosstalk are necessarily present in the serial communication transmission process, and error codes caused by serial transmission cannot be avoided.
In order to avoid the above problem, the error rate of the link needs to be detected, and the current link state detection method is as follows: the device A sends a special control word to the device B, the device B detects whether the received control word is the same as the control word sent by the device A, if so, the link is considered to be valid, and if not, the link is invalid. However, when the detection method is used for detection, the information to be transmitted really needs to be stopped from being transmitted until the detection is finished, so that the detection method only can reflect the link transmission condition during detection and cannot reflect the link state of a link in the actual transmission process.
Disclosure of Invention
In order to solve the above technical problem, it is desirable to provide link detection methods and receiving devices according to embodiments of the present invention, which can reflect link states of links in an actual transmission process.
The technical scheme of the invention is realized as follows:
, there are provided link detection methods, the method comprising:
receiving serial data information sent by sending equipment through a link, wherein the serial data information comprises information needing to be transmitted and corresponding verification information;
verifying the serial data information according to the verification information to obtain a verification result;
if the verification result indicates that the received serial data information is not tampered, determining that the link state of the link is a valid state;
and if the verification result indicates that the received serial data information is tampered, determining that the link state of the link is an invalid state.
With reference to the , in implementable forms, after the verifying the serial data information, the method further includes:
if the verification result shows that the received serial data information is not tampered, adding 1 to the number of error-free transmission to serve as a new number of error-free transmission;
if the verification result shows that the received serial data information is tampered, adding 1 to the number of the error transmissions to serve as a new number of the error transmissions;
and determining the link state of the link according to the new error-free transmission number and the new error transmission number.
With reference to the aspect, in a second implementable manner, the method further includes:
and adding 1 to the number of the error transmissions as a new number of the error transmissions when no new serial data information is received in a preset time period after the serial data information is received.
With reference to and the second implementation manners, in a third implementation manner, the determining a link state of the link according to the new error-free transmission number and the new error-free transmission number includes:
acquiring a stored leaky bucket value;
if the new error-free transmission number is equal to the th limit, taking the result of subtracting m from the leaky bucket value as a new leaky bucket value, and resetting the new error-free transmission number;
if the new number of the error transmissions is equal to a second limit, taking the result of adding n to the leaky bucket value as a new leaky bucket value, and resetting the new number of the error transmissions;
if the new leaky bucket value is less than the low limit, generating a link valid indication, wherein the link valid indication indicates that the link state of the link is valid;
if the new leaky bucket value is greater than the high limit, a link invalid indication is generated, the link invalid indication indicating that the link state of the link is invalid.
With reference to the third implementable manner, in a fourth implementable manner, the method further includes:
generating the link invalid indication when the new leaky bucket value is greater than the high limit and the new leaky bucket value is the result of adding n to the leaky bucket value;
and setting the new leaky bucket value as a maximum leaky bucket value.
With reference to the aspect, in a fifth implementable manner, the verifying the serial data information according to the verification information includes:
and checking the serial data information according to a cyclic redundancy check method, wherein the serial data information comprises information to be transmitted and cyclic redundancy check codes, and the cyclic redundancy check codes are positioned in invalid information sections in the serial data information.
In a second aspect, there are provided kinds of receiving apparatuses, including:
the receiving unit is used for receiving serial data information sent by sending equipment through a link, and the serial data information comprises information needing to be transmitted and corresponding verification information;
the verification unit is used for verifying the serial data information according to the verification information to obtain a verification result;
the link state generating unit is used for determining that the link state of the link is a valid state when the verification result indicates that the received serial data information is not tampered; and when the verification result indicates that the received serial data information is tampered, determining that the link state of the link is an invalid state.
With reference to the second aspect, in an th implementation manner, the receiving apparatus further includes:
the statistical unit is used for adding 1 to the number of error-free transmissions as a new number of error-free transmissions when the verification result indicates that the received serial data information is not tampered;
the statistical unit is further configured to add 1 to the number of faulty transmissions as a new number of faulty transmissions when the verification result indicates that the received serial data information is tampered;
and the link state generating unit is further configured to determine the link state of the link according to the new error-free transmission number and the new error transmission number.
With reference to the second aspect, in a second implementation manner, the counting unit is further configured to add 1 to the number of faulty transmissions as a new number of faulty transmissions when no new serial data information is received within a preset time period after the serial data information is received.
With reference to the th implementation manner and the second implementation manner, in a third implementation manner, the link state generating unit is specifically configured to:
acquiring a stored leaky bucket value;
if the new error-free transmission number is equal to the th limit, taking the result of subtracting m from the leaky bucket value as a new leaky bucket value, and resetting the new error-free transmission number;
if the new number of the error transmissions is equal to a second limit, taking the result of adding n to the leaky bucket value as a new leaky bucket value, and resetting the new number of the error transmissions;
if the new leaky bucket value is less than the low limit, generating a link valid indication, wherein the link valid indication indicates that the link state of the link is valid;
if the new leaky bucket value is greater than the high limit, a link invalid indication is generated, the link invalid indication indicating that the link state of the link is invalid.
With reference to the third implementable manner, in a fourth implementable manner, the link state generation unit is further configured to:
generating the link invalid indication when the new leaky bucket value is greater than the high limit and the new leaky bucket value is the result of adding n to the leaky bucket value;
and setting the new leaky bucket value as a maximum leaky bucket value.
With reference to the second aspect, in a fifth implementation manner, the verification unit is specifically configured to:
and checking the serial data information according to a cyclic redundancy check method, wherein the serial data information comprises information to be transmitted and cyclic redundancy check codes, and the cyclic redundancy check codes are positioned in invalid information sections in the serial data information.
The embodiment of the invention provides link detection methods and receiving equipment, wherein serial data information sent by the sending equipment through a link is received firstly, the serial data information comprises information needing to be transmitted and corresponding check information, then the serial data information is checked according to the check information to obtain a check result, when the check result shows that the received serial data information is not tampered, the link state of the link is determined to be an effective state, and when the check result shows that the received serial data information is tampered, the link state of the link is determined to be an invalid state.
Drawings
FIG. 1 is a diagram illustrating prior art devices communicating with each other via a link;
fig. 2 is a flowchart of link detection methods according to an embodiment of the present invention;
fig. 3 is a flowchart of another link detection methods according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of kinds of receiving devices according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of another kinds of receiving devices according to an embodiment of the present invention.
Detailed Description
The technical solution in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention.
Example
The embodiment of the invention provides link detection methods, as shown in fig. 2, applied to a receiving device, the method may include:
step 101, receiving serial data information sent by a sending device through a link.
Here, the serial data information includes information to be transmitted and corresponding check information, and the check information is a result of the transmitting device encoding the information to be transmitted according to a rule .
And 102, verifying the serial data information according to the verification information to obtain a verification result.
The checking method of this embodiment may include many kinds, such as a Message digest algorithm (MD), a Cyclic Redundancy Check (CRC) checking method, and the like, and this embodiment does not limit the specific checking method.
The CRC check code is error check code which is most commonly used in the field of data communication, and is characterized in that the length of an information field and a check field can be selected arbitrarily, the CRC check method is data transmission error detection functions, carries out polynomial calculation on the information to be transmitted, attaches the obtained result to the back of a frame, and a receiving device also executes a similar algorithm to ensure the correctness and the integrity of data transmission.
And 103, if the verification result shows that the received serial data information is not tampered, determining that the link state of the link is an effective state, and ending the current processing flow.
For the CRC check method, when the check result is 0, it indicates that the received serial data information has not been tampered.
And step 104, if the verification result indicates that the received serial data information is tampered, determining that the link state of the link is an invalid state.
For the CRC check method, when the check result is not 0, it indicates that the received serial data information is falsified.
Accordingly, , since the serial data information received by the receiving device includes the information to be transmitted and the corresponding check information, the receiving device can check the serial data information according to the check information to determine the link status of the link, so that the receiving device does not need to receive the information for detecting the link status to detect the link status exclusively , but checks the serial data information for actual communication according to the received check code to determine the link status of the link, thereby reflecting the actual link status of the link actually and improving the detection efficiency.
, after step 102, the method further includes adding 1 to the number of error-free transmissions as a new number of error-free transmissions if the check result indicates that the received serial data message has not been tampered with, adding 1 to the number of error-free transmissions as a new number of error-free transmissions if the check result indicates that the received serial data message has been tampered with, and determining a link status of the link based on the new number of error-free transmissions and the new number of error-free transmissions.
Further , the method includes adding 1 to the number of misfeeds as the new number of misfeeds when no new serial data message is received within a predetermined time period after receiving the serial data message.
, determining the link state of the link according to the new error-free transmission number and the new error transmission number, specifically including obtaining a stored leaky bucket value, if the new error-free transmission number is equal to the th limit, taking the result of subtracting the leaky bucket value by m as a new leaky bucket value, clearing the new error-free transmission number, if the new error transmission number is equal to the second limit, taking the result of adding the leaky bucket value by n as a new leaky bucket value, clearing the new error transmission number, if the new leaky bucket value is less than the lower limit, generating a link valid indication, wherein the link valid indication indicates that the link state of the link is valid, and if the new leaky bucket value is greater than the upper limit, generating a link invalid indication, wherein the link invalid indication indicates that the link state of the link is invalid.
Here, most of the information transmitted on the link is not tampered, only a small part of the information is tampered, the number of the information which is not tampered is large, and the corresponding error-free transmission number is a relatively large value, so that the th limit is 1000, the calculation amount of the receiving device is reduced, the number of the erroneous transmission is small, the second limit is 1, in the embodiment, the high limit is 1, the low limit is 0, and it is worth mentioning that the limit can be adjusted according to the scene.
, the method further includes generating a link invalid indication when the new leaky bucket value is greater than the high limit and the new leaky bucket value is the result of adding n to the leaky bucket value, and setting the new leaky bucket value as the maximum leaky bucket value, specifically, when the new leaky bucket value is greater than the high limit, generating the link invalid indication, determining whether the new leaky bucket value is the result of adding n to the stored leaky bucket value, and if so, setting the new leaky bucket value as the maximum leaky bucket value, preferably 63.
Example two
An embodiment of the present invention provides link detection methods, where the method is applied to a serial communication system, where the system includes a device a as a sending device, a device B as a receiving device, and a link 0, where sending information from the device a to the device B is completed through the link 0, as shown in fig. 3, the method may include:
step 201, the device a performs CRC coding on the information to be transmitted to obtain a CRC check code.
Assuming that a binary field of information to be transmitted is K bits, and a check field is R bits, the codeword length is N, where N is K + R, R-degree polynomials g (x) are agreed in advance for the device a and the device B, R0 s are added behind the K-bit information field, and then divided by g (x) a corresponding code sequence, and the obtained remainder is the check information.
In step 202, device B receives serial data information sent by device a via link 0.
Here, the serial data information includes information to be transmitted and a CRC check code, wherein the CRC check code is attached to the information to be transmitted and is stored in an invalid information field of the serial data information.
Step 203, the device B performs CRC check on the serial data information to obtain a check result.
When the equipment B receives the serial data information, dividing the binary code of the received serial data information by the code sequence corresponding to g (x), and if the remainder is 0, determining that the serial data information is not tampered and transmitting the serial data information without errors; if the remainder is not 0, the serial data information is considered to be tampered, and an error occurs in transmission.
Step 204, the device B determines whether the check result is 0. If yes, go to step 205; if not, go to step 209.
Step 205, device B adds 1 to the number of error-free transmissions.
Specifically, if the check result is 0, an error-free transmission indicator is generated, which may be a high level, and the number of error-free transmissions is increased by 1 according to the error-free transmission indicator.
Here, the receiving device may include two counters, error-free counters for counting the number of error-free transmissions, the error-free counters being capable of counting by high-level triggering, a maximum limit of of the error-free counters being 1000 and being automatically cleared when the count of the error-free counters reaches 1000 to restart counting, and error-free counters for counting the number of error-free transmissions, the error-free counters being capable of counting by low-level triggering, a maximum limit of of the error-free counters being 1 and being automatically cleared when the count of the error-free counters reaches 1 to restart counting.
In step 206, device B determines whether the number of error-free transmissions is equal to 1000. If yes, go to step 207; if not, go to step 217.
Step 207, the device B obtains the leaky bucket value, subtracts 1 from the leaky bucket value as a new leaky bucket value, clears the error-free transmission number, and then executes step 212.
Specifically, if the number of error-free transmissions is equal to 1000, a reduction instruction is generated for reducing the leaky bucket value by 1, and the leaky bucket value is reduced by 1 according to the reduction instruction to serve as a new leaky bucket value.
The decrement instruction is used to instruct the link state generation unit to decrement the current leaky bucket value by 1.
In step 208, device B determines whether new serial data information is received within a predetermined time period after receiving the serial data information. If not, go to step 209; if yes, go to step 217.
If the device B receives new serial data information, the serial communication is not overtime; if no new serial data information is received, the serial communication is overtime.
Step 209, device B adds 1 to the number of erroneous transmissions.
Specifically, if the check result is not 0, a transmission error indication is generated, and the transmission error indication may be a low level; and adding 1 to the number of the error transmissions according to the indication of the error transmissions to obtain a new number of the error transmissions.
Step 210, device B determines whether the number of faulty transmissions is equal to 1. If yes, go to step 211; if not, go to step 217.
Step 211, the device B obtains the leaky bucket value, adds 1 to the leaky bucket value to obtain a new leaky bucket value, and clears the number of the erroneous transmissions.
Here, the initial leaky bucket value is set in advance.
In step 212, device B determines whether the new leaky bucket value is greater than 1 or less than 0.
Here, 1 is the high limit and 0 is the low limit.
Step 213, if the new leaky bucket value is smaller than 0, the device B generates a link valid indication, and ends the current processing flow.
The link valid indication indicates that the link state of link 0 is valid and link 0 is a valid link.
Step 214, if the new leaky bucket value is greater than 1, device B generates a link invalid indication.
The link invalid indication indicates that the link state of link 0 is invalid and link 0 is an invalid link.
In step 215, device B determines whether the new leaky bucket value is the result of the leaky bucket value plus 1. If yes, go to step 216; otherwise, step 217 is performed.
Step 216, the device B sets the new leaky bucket value to 63, and ends the current processing flow.
Here, 63 is the maximum value of the leaky bucket value.
Step 217, device B waits to receive new serial data information.
EXAMPLE III
An embodiment of the present invention provides kinds of receiving devices 30, and as shown in fig. 4, the receiving device 30 may include:
the receiving unit 301 is configured to receive serial data information sent by a sending device through a link, where the serial data information includes information to be transmitted and corresponding verification information.
A checking unit 302, configured to check the serial data information according to the checking information, so as to obtain a checking result.
A link state generating unit 303, configured to determine that the link state of the link is a valid state when the check result indicates that the received serial data information is not tampered; and when the verification result indicates that the received serial data information is tampered, determining that the link state of the link is an invalid state.
Accordingly, , since the serial data information received by the receiving device includes the information to be transmitted and the corresponding check information, the receiving device can check the serial data information according to the check information to determine the link status of the link, so that the receiving device does not need to receive the information for detecting the link status to detect the link status exclusively , but checks the serial data information for actual communication according to the received check code to determine the link status of the link, thereby reflecting the actual link status of the link actually and improving the detection efficiency.
Further , as shown in fig. 5, the receiving device 30 further includes:
and the counting unit 304 is configured to add 1 to the number of error-free transmissions as a new number of error-free transmissions when the check result indicates that the received serial data information is not tampered.
The counting unit 304 is further configured to add 1 to the number of faulty transmissions as a new number of faulty transmissions when the check result indicates that the received serial data information is tampered.
The link state generating unit 303 is further configured to determine the link state of the link according to the new error-free transmission number and the new error transmission number.
Further , the statistic unit 304 is further configured to add 1 to the number of faulty transmissions as a new number of faulty transmissions when no new serial data information is received within a preset time period after the serial data information is received.
Further , the link status generating unit 303 is specifically configured to:
acquiring a stored leaky bucket value;
if the new error-free transmission number is equal to the th limit, taking the result of subtracting m from the leaky bucket value as a new leaky bucket value, and resetting the new error-free transmission number;
if the new number of the error transmissions is equal to a second limit, taking the result of adding n to the leaky bucket value as a new leaky bucket value, and resetting the new number of the error transmissions;
if the new leaky bucket value is less than the low limit, generating a link valid indication, wherein the link valid indication indicates that the link state of the link is valid;
if the new leaky bucket value is greater than the high limit, a link invalid indication is generated, the link invalid indication indicating that the link state of the link is invalid.
, the link status generating unit 303 is further configured to:
generating the link invalid indication when the new leaky bucket value is greater than the high limit and the new leaky bucket value is the result of adding n to the leaky bucket value;
and setting the new leaky bucket value as a maximum leaky bucket value.
Further , the check unit 302 is specifically configured to:
and checking the serial data information according to a CRC (cyclic redundancy check) method, wherein the serial data information comprises information to be transmitted and a CRC check code, and the CRC check code is positioned in an invalid information section in the serial data information.
In practical applications, the receiving Unit 301, the verifying Unit 302, the link state generating Unit 303 and the statistical Unit 304 may be implemented by a Central Processing Unit (CPU), a microprocessor Unit (MPU), a Digital Signal Processor (DSP), a Field Programmable Array (FPGA), or the like, which are located in the receiving device 30.
Furthermore, the present invention may take the form of a computer program product embodied on or more computer-usable storage media (including, but not limited to, disk storage, optical storage, and the like) having computer-usable program code embodied therein.
It is to be understood that each flow and/or block in the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions which can be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create receiving apparatus for implementing the functions specified in the flow diagram flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including an instruction receiving apparatus which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the scope of the present invention.

Claims (10)

1, Link detection method, characterized in that, the method comprises:
receiving serial data information sent by sending equipment through a link, wherein the serial data information comprises information needing to be transmitted and corresponding verification information;
verifying the serial data information according to the verification information to obtain a verification result;
if the verification result indicates that the received serial data information is not tampered, determining that the link state of the link is a valid state;
if the verification result indicates that the received serial data information is tampered, determining that the link state of the link is an invalid state;
after the verifying the serial data information, the method further comprises:
if the verification result shows that the received serial data information is not tampered, adding 1 to the number of error-free transmission to serve as a new number of error-free transmission;
if the verification result shows that the received serial data information is tampered, adding 1 to the number of the error transmissions to serve as a new number of the error transmissions;
and determining the link state of the link according to the new error-free transmission number and the new error transmission number.
2. The method of claim 1, further comprising:
and adding 1 to the number of the error transmissions as a new number of the error transmissions when no new serial data information is received in a preset time period after the serial data information is received.
3. The method according to claim 1 or 2, wherein said determining the link status of the link based on the new error-free transmission number and the new error-free transmission number comprises:
acquiring a stored leaky bucket value;
if the new error-free transmission number is equal to the th limit, taking the result of subtracting m from the leaky bucket value as a new leaky bucket value, and resetting the new error-free transmission number;
if the new number of the error transmissions is equal to a second limit, taking the result of adding n to the leaky bucket value as a new leaky bucket value, and resetting the new number of the error transmissions;
if the new leaky bucket value is less than the low limit, generating a link valid indication, wherein the link valid indication indicates that the link state of the link is valid;
if the new leaky bucket value is greater than the high limit, a link invalid indication is generated, the link invalid indication indicating that the link state of the link is invalid.
4. The method of claim 3, further comprising:
generating the link invalid indication when the new leaky bucket value is greater than the high limit and the new leaky bucket value is the result of adding n to the leaky bucket value;
and setting the new leaky bucket value as a maximum leaky bucket value.
5. The method of claim 1, wherein said verifying the serial data information based on the verification information comprises:
and checking the serial data information according to a cyclic redundancy check method, wherein the serial data information comprises information to be transmitted and cyclic redundancy check codes, and the cyclic redundancy check codes are positioned in invalid information sections in the serial data information.
A receiving apparatus of , wherein the receiving apparatus comprises:
the receiving unit is used for receiving serial data information sent by sending equipment through a link, and the serial data information comprises information needing to be transmitted and corresponding verification information;
the verification unit is used for verifying the serial data information according to the verification information to obtain a verification result;
the link state generating unit is used for determining that the link state of the link is a valid state when the verification result indicates that the received serial data information is not tampered; when the verification result indicates that the received serial data information is tampered, determining that the link state of the link is an invalid state;
the receiving unit further includes:
the statistical unit is used for adding 1 to the number of error-free transmissions as a new number of error-free transmissions when the verification result indicates that the received serial data information is not tampered;
the statistical unit is further configured to add 1 to the number of faulty transmissions as a new number of faulty transmissions when the verification result indicates that the received serial data information is tampered;
and the link state generating unit is further configured to determine the link state of the link according to the new error-free transmission number and the new error transmission number.
7. The receiving device of claim 6,
and the counting unit is also used for adding 1 to the number of the error transmissions as the new number of the error transmissions when the new serial data information is not received in a preset time period after the serial data information is received.
8. The receiving device according to claim 6 or 7, wherein the link state generating unit is specifically configured to:
acquiring a stored leaky bucket value;
if the new error-free transmission number is equal to the th limit, taking the result of subtracting m from the leaky bucket value as a new leaky bucket value, and resetting the new error-free transmission number;
if the new number of the error transmissions is equal to a second limit, taking the result of adding n to the leaky bucket value as a new leaky bucket value, and resetting the new number of the error transmissions;
if the new leaky bucket value is less than the low limit, generating a link valid indication, wherein the link valid indication indicates that the link state of the link is valid;
if the new leaky bucket value is greater than the high limit, a link invalid indication is generated, the link invalid indication indicating that the link state of the link is invalid.
9. The receiving device of claim 8, wherein the link state generating unit is further configured to:
generating the link invalid indication when the new leaky bucket value is greater than the high limit and the new leaky bucket value is the result of adding n to the leaky bucket value;
and setting the new leaky bucket value as a maximum leaky bucket value.
10. The receiving device according to claim 6, wherein the verification unit is specifically configured to:
and checking the serial data information according to a cyclic redundancy check method, wherein the serial data information comprises information to be transmitted and cyclic redundancy check codes, and the cyclic redundancy check codes are positioned in invalid information sections in the serial data information.
CN201510435546.4A 2015-07-22 2015-07-22 link detection method and receiving equipment Active CN106372026B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201510435546.4A CN106372026B (en) 2015-07-22 2015-07-22 link detection method and receiving equipment
PCT/CN2016/081122 WO2017012389A1 (en) 2015-07-22 2016-05-05 Link detection method, receiving device and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510435546.4A CN106372026B (en) 2015-07-22 2015-07-22 link detection method and receiving equipment

Publications (2)

Publication Number Publication Date
CN106372026A CN106372026A (en) 2017-02-01
CN106372026B true CN106372026B (en) 2020-01-31

Family

ID=57833613

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510435546.4A Active CN106372026B (en) 2015-07-22 2015-07-22 link detection method and receiving equipment

Country Status (2)

Country Link
CN (1) CN106372026B (en)
WO (1) WO2017012389A1 (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112825505A (en) * 2019-11-20 2021-05-21 西安诺瓦星云科技股份有限公司 Communication state detection method, display controller and module controller
CN111522757B (en) * 2020-04-23 2023-08-22 上海琪云工业科技有限公司 Interrupt reading and clearing control method based on I2C bus
CN111767177B (en) * 2020-05-15 2024-03-26 西安青松光电技术有限公司 Test method, device and equipment of LED display screen control card and storage medium
CN111857302A (en) * 2020-06-19 2020-10-30 浪潮电子信息产业股份有限公司 Reset method, device and equipment of system management bus
CN115134867A (en) * 2022-07-01 2022-09-30 白盒子(上海)微电子科技有限公司 Self-adaptive precision information transmission method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101123483A (en) * 2007-09-11 2008-02-13 华为技术有限公司 Detection method and device for service link
CN102439888A (en) * 2011-09-05 2012-05-02 华为技术有限公司 Rapid channel interconnection link monitoring method, device and system
CN102932820A (en) * 2011-08-09 2013-02-13 中兴通讯股份有限公司 Link processing method, device and system

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4096183B2 (en) * 2003-02-27 2008-06-04 日本電気株式会社 Alarm transfer method and wide area Ethernet network
CN1889409B (en) * 2006-07-26 2010-08-18 华为技术有限公司 Chain circuit state detecting method and system
US8261156B2 (en) * 2008-09-11 2012-09-04 Lsi Corporation Methods and apparatuses for correcting errors in data streams
CN102571259B (en) * 2010-12-09 2014-05-07 中国科学院沈阳计算技术研究所有限公司 Safe and controllable communication method used for numerical control bus
CN104184543B (en) * 2013-05-24 2018-10-30 华为技术有限公司 A kind of methods, devices and systems of data transmission
CN103427846B (en) * 2013-07-16 2016-04-27 首都师范大学 Error control method in dynamic reconfigurable high-speed serial bus

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101123483A (en) * 2007-09-11 2008-02-13 华为技术有限公司 Detection method and device for service link
CN102932820A (en) * 2011-08-09 2013-02-13 中兴通讯股份有限公司 Link processing method, device and system
CN102439888A (en) * 2011-09-05 2012-05-02 华为技术有限公司 Rapid channel interconnection link monitoring method, device and system

Also Published As

Publication number Publication date
CN106372026A (en) 2017-02-01
WO2017012389A1 (en) 2017-01-26

Similar Documents

Publication Publication Date Title
CN106372026B (en) link detection method and receiving equipment
CN109347598B (en) Check code processing method, electronic device and storage medium
CN104539739A (en) System, method and device for uploading files
CN105991252B (en) Method and apparatus for protecting data transfer blocks from memory errors and transfer errors
JP5316411B2 (en) Transmitter and receiver
CN108599896B (en) CRC (Cyclic redundancy check) system and method based on redundant coding system
CN101083513B (en) Apparatus,method and system of communication signal decoding
CN107483157A (en) A kind of CRC check method and system based on FPGA
CN109981382B (en) Method and device for detecting error code
CN105528325A (en) Protection method and system for high-speed transmission through standard SPI protocol
CN108337069B (en) Improved error rate reducing end parallel grouping CRC (Cyclic redundancy check) system
US7808917B2 (en) Method and system for transmitting telegrams
US20170077952A1 (en) Sensor interface that provides a long package crc to improve functional safety
KR102535563B1 (en) Method for multiple uart communications using can bus, recording medium and device for performing the method
WO2016086638A1 (en) Link detection method, device, and computer storage medium
US10860415B2 (en) Memory architecture including response manager for error correction circuit
CN104253667A (en) System and method for check and feedback of serial synchronous bus for mobile phone platform
CN103138881B (en) Decoding method and equipment
CN102655441A (en) Communication automatic error correction coding method and system
US11146352B2 (en) Message correction and dynamic correction adjustment for communication systems
JP5589995B2 (en) Information processing device
Lechner et al. Methods for analysing and improving the fault resilience of delay-insensitive codes
Juan et al. FPGA implementation of hamming code for increasing the frame rate of CAN communication
CN109412748B (en) Method and device for encoding and decoding polarization code
CN101477507B (en) USB error correction encoding/decoding device and method, USB transmission system and method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant