CN107766645B - Planning BIM pipeline collision detection system storage management device - Google Patents

Planning BIM pipeline collision detection system storage management device Download PDF

Info

Publication number
CN107766645B
CN107766645B CN201710973913.5A CN201710973913A CN107766645B CN 107766645 B CN107766645 B CN 107766645B CN 201710973913 A CN201710973913 A CN 201710973913A CN 107766645 B CN107766645 B CN 107766645B
Authority
CN
China
Prior art keywords
storage
file
files
willing
logic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710973913.5A
Other languages
Chinese (zh)
Other versions
CN107766645A (en
Inventor
黄浩
王一超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Yingyi Urban Planning And Design Co ltd
Original Assignee
Shanghai Yingyi Urban Planning And Design Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Yingyi Urban Planning And Design Co ltd filed Critical Shanghai Yingyi Urban Planning And Design Co ltd
Priority to CN201710973913.5A priority Critical patent/CN107766645B/en
Publication of CN107766645A publication Critical patent/CN107766645A/en
Application granted granted Critical
Publication of CN107766645B publication Critical patent/CN107766645B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F30/00Computer-aided design [CAD]
    • G06F30/10Geometric CAD
    • G06F30/13Architectural design, e.g. computer-aided architectural design [CAAD] related to design of buildings, bridges, landscapes, production plants or roads
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F30/00Computer-aided design [CAD]
    • G06F30/10Geometric CAD
    • G06F30/18Network design, e.g. design based on topological or interconnect aspects of utility systems, piping, heating ventilation air conditioning [HVAC] or cabling
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F30/00Computer-aided design [CAD]
    • G06F30/20Design optimisation, verification or simulation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T17/00Three dimensional [3D] modelling, e.g. data description of 3D objects
    • G06T17/05Geographic models
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2113/00Details relating to the application field
    • G06F2113/14Pipes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2210/00Indexing scheme for image generation or computer graphics
    • G06T2210/04Architectural design, interior design
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2210/00Indexing scheme for image generation or computer graphics
    • G06T2210/21Collision detection, intersection

Abstract

The invention relates to a storage management device for a planning BIM pipeline collision detection system, which comprises functions of implementing full-user multiple copy storage and the like; the system ensures the specification of a collision detection system for storing files, comprehensively ensures reasonable and optimized storage of the files from the storage of the files, the use of the files, the provision of motivation for the files and the interaction between the files and a user, is described in a hierarchical structure, and has the characteristics of structuring and loose coupling.

Description

Planning BIM pipeline collision detection system storage management device
Technical Field
The invention relates to the field of engineering design industry, in particular to a storage management device for a planning BIM pipeline collision detection system.
Background
With the rapid development of domestic construction and engineering design industries, the traditional two-dimensional design mode gradually fades out of the stage and replaces the stage with three-dimensional information modeling (BIM). Because the representation form is more visual and readable, no matter a construction party, a design party or a construction party can quickly and comprehensively master the project information, the difficulty in understanding the project information by all the participants of the project, especially non-professionals is reduced, the project change is reduced, and the project coordination capacity among different specialties and among different participants is improved. However, under the existing objective conditions, each design institute will face a design mode of coexistence of two-dimensional and three-dimensional, and it is a long-term complex process to let engineers who have been engaged in two-dimensional design for many years accept a three-dimensional design mode. How to convert the existing two-dimensional design concept of the design institute into the three-dimensional design, and simultaneously manage and store the concept as much as possible is a problem that the design institute must consider in applying the BIM in the project at present. Therefore, the method aims at the Yingyi design institute to conduct directional research and development, provides a tool which not only keeps the advantages of the traditional two-dimensional design, but also has the advantages of the three-dimensional design, and becomes a feasible scheme for the smooth transition from the two-dimensional design to the three-dimensional design.
Disclosure of Invention
Accordingly, the present invention provides a storage management device for a BIM pipeline crash detection system that solves or partially solves the above-mentioned problems. In order to achieve the effect of the technical scheme, the technical scheme of the invention is as follows: a storage management device for planning a BIM pipeline collision detection system comprises the following contents: the collision detection system is applied to the collision detection system and comprises the following contents: checking collision, checking collision results of all pipelines in the graph according to a three-dimensional planning drawing, generating a report, checking collision positions and pipeline information, and helping a designer to achieve optimal design in a planning result; step 1: opening a graph containing a 3d pipeline meeting the design specification to meet the requirements of a design layer, and performing step 2: the collision check command is entered in the command line: PXCHECKINTERFERENCES, step 3: inputting the name and path of the collision check report in the popup saved dialog box, and the 4 th step: and storing the files as related files by clicking, and the step 5: opening a collision detection file, and 6, step: checking the collision result at the corresponding position in the graph, and carrying out design modification; and 7, step 7: planning the specification of a storage management device of the BIM pipeline collision detection system; and 8, step 8: checking the integrity of files used in a storage collision detection system in a network node computer in the node, and setting the files used in the storage collision detection system in the network node computer to be capable of being stored for an unlimited time; all files used in the collision detection system store a copy in a network node computer; use by a particular authorized user in a network node computer; the server stores important files in the files on a personal storage device of a specific right user by using a reward mechanism, and the user needs to pay a certain fee for downloading and using the files in the collision detection system; and 8, step 8: implementing all-user multiple copy storage, wherein the all-user multiple copy storage is used in a decentralized file system, a decentralized full node is used as a use node of the decentralized storage, and the decentralized full node is an entry point of a user participating in a network; distributing the stored load to a plurality of communication channels, wherein the starting point of each communication channel has a peak load of 10 Gb/s; step 9: implementing system data user storage, wherein each system data user stores overall system data needing overall network storage, including time and cold and hot isolation; the cold and hot isolation is to store important keys or files at an offline end without directly contacting a network; step 10: setting basic points of loading of overall system data to specific right users and users; and 11, step 11: the server checks that the user authority of important files in the files is willing to be accepted and stored in a user with a specific right, the user authority is divided into different users according to the acceptance level, nodes willing to accept storage can be rewarded, the number of the rewarded files is in direct proportion to the number of the stored files, and the more the number of the stored files is, the higher the number of the rewarded files is; receiving and storing important files has a reward mechanism for nodes, users who are willing to accept partial storage in the network are exchanged, a new node is added into the network, the reward mechanism is the same for all the nodes; verifying that nodes willing to accept storage need to ensure that data cannot be tampered; in addition, a distributed hash table is stored in nodes of the whole network, and a global index of each file is stored in the distributed hash table; step 12: each node has a required list and an owned list for users willing to accept storage, and can track the propagation of any node in the network; step 13: planning the structure of a storage management device of the BIM pipeline collision detection system into a general structure and a hierarchical structure; the overall structure comprises an identity subsystem, a network subsystem, a routing subsystem, a block switching subsystem and a subsystem of nodes willing to accept storage; the identity subsystem is used for generating and verifying the management node identifier; a network subsystem for managing the connection with other nodes and using various underlying network protocols; a routing subsystem that maintains information to locate specific objects in response to local and remote queries, the default value being a DHT; the subsystem of the node willing to accept storage can split each node into nodes willing to accept storage, and the nodes willing to accept storage need checksum; a block switching subsystem, a novel packet switching protocol, for governing efficient subscriber distribution willing to accept storage; the hierarchical structure comprises a lowest level, a middle level and a high level, wherein the lowest level comprises a P2P network and a distributed hash table, is responsible for message exchange among nodes, is responsible for integrity detection of nodes willing to accept storage, is responsible for list storage of connection nodes and is responsible for selecting a proper network protocol; the distributed hash table is responsible for storing file indexes, distributing nodes, coordinating and optimizing the quantity of control information, and storing the file indexes to contain all files and paths of the file indexes; step 14: the middle layer stores centralized full-node logic and comprises a file subsystem, a block tracking subsystem, a block switching subsystem and a subsystem; the file subsystem is used for loading file segmentation logic, file assembly logic and file integrity check logic, the file segmentation logic is used for segmenting a file, the file assembly logic is responsible for code compiling of the file, and the file integrity check logic is used for checking the integrity of the file; the block tracking subsystem is used for loading and tracking the propagation logic of the users willing to accept storage, the propagation logic of the users willing to accept storage is used for tracking the propagation of the users willing to accept storage in the network, and the checking existence logic of the users willing to accept storage is used for checking whether the users willing to accept storage exist; step 15: the block switching subsystem is used for loading user use logic, occupation list logic and demand list logic which are willing to accept storage, wherein the user use logic, the occupation list logic and the demand list logic are willing to accept storage and are used for describing application logic used by files, the occupation list logic is used for describing the files which are owned, and the demand list logic is used for describing the files which need to be owned; step 16: the subsystem is loaded with a cost return logic, and the cost return logic is used for describing the cost return; step 17: the high level comprises a system graphical interface, wherein the system graphical interface provides an interface for uploading files, an interface for providing a link for receiving each file, an interface for checking a financial information node, an interface for account deposit and a browser for reading the files from a network, and the financial information node is used for uploading cost, reading cost and storing rewards; step 18: the reward mechanism comprises a basic pricing mode, an incentive storage file and an incentive use file, wherein the basic pricing mode is used for storing unlimited storage files, 1Gb is stored every time, and can be used for limited storage and stored in a monthly period, and 1Gb is stored every 6 months; step 19: the incentive memory file contains the following: the file is added into the network and is bound with the storage transaction; any transaction can only be used once; the transaction and the file are verified by each node in the network; the transaction should contain a sum check of all documents and a check to verify the integrity of the user willing to accept storage; the limited storage file is excited, and two options are available: manually creating transactions each month and creating a management center for each month logging off a certain amount from the account; the incentive usage file contains the following: the cost of using the file is cheap and can be arbitrarily defined; any user should be able to create a link to receive the file, and the user creating the link subsidizes using the file by: the owner of the file creates the link and causes it to be shared on the planning BIM pipeline crash detection system storage management device, the user pays for the use of the file, which may be paid through the management center.
Detailed Description
In order to make the technical problems, technical solutions and advantageous effects to be solved by the present invention more apparent, the present invention is described in detail below with reference to the embodiments. It should be noted that the present invention is only a preferred embodiment, and is not limited to the scope of the claims. While the foregoing description will be understood and appreciated by those skilled in the relevant art, other equivalents may be made thereto without departing from the scope of the claims.
The specific method comprises the following steps: example 1: the collision detection system is applied to the collision detection system and comprises the following contents: checking collision, checking collision results of all pipelines in the graph according to a three-dimensional planning drawing, generating a report, checking collision positions and pipeline information, and helping a designer to achieve optimal design in a planning result; step 1: opening a graph containing a 3d pipeline meeting the design specification to meet the requirements of a design layer, and performing step 2: the collision check command is entered in the command line: PXCHECKINTERFERENCES, step 3: inputting the name and path of the collision check report in the popup saved dialog box, and the 4 th step: and storing the files as related files by clicking, and the step 5: opening a collision detection file, and 6, step: checking the collision result at the corresponding position in the graph, and carrying out design modification; and 7, step 7: planning the specification of a storage management device of the BIM pipeline collision detection system; and 8, step 8: checking the integrity of files used in a storage collision detection system in a network node computer in the node, and setting the files used in the storage collision detection system in the network node computer to be capable of being stored for an unlimited time; now that we propose a reliable file system of their own, files in the system can be stored for an unlimited length of time. This general requirement puts some important limitations on the system: it is ensured that at least one of the persistently existing copies is on our server so that no files are irretrievably lost. We should introduce incentives for participating users to store valuable files on their computers. This is the same as the bit-sharing download protocol. Introducing a fee for downloading the file. We introduce fees for use and file acquisition. We propose a reward mechanism for storing files. All files used in the collision detection system store a copy in a network node computer; use by a particular authorized user in a network node computer; the server stores important files in the files on a personal storage device of a specific right user by using a reward mechanism, and the user needs to pay a certain fee for downloading and using the files in the collision detection system; and 8, step 8: implementing all-user multiple copy storage, wherein the all-user multiple copy storage is used in a decentralized file system, a decentralized full node is used as a use node of the decentralized storage, and the decentralized full node is an entry point of a user participating in a network; distributing the stored load to a plurality of communication channels, wherein the starting point of each communication channel has a peak load of 10 Gb/s; typically, a centralized storage must be established to permanently store all user downloaded files. In a decentralized file system, a centralized full node is a use node of the centralized storage. The centralized full node is the entry point of the users participating in the network. To support large bandwidths, multiple fibre channels are used and the entire load is distributed to the multiple channels, at least 10 Gb/sec at the beginning to support peak loads. There is a very large rebound, at least 99.9% at the start. Step 9: implementing system data user storage, wherein each system data user stores overall system data needing overall network storage, including time and cold and hot isolation; the cold and hot isolation is to store important keys or files at an offline end without directly contacting a network; step 10: setting basic points of loading of overall system data to specific right users and users; and 11, step 11: the server checks that the user authority of important files in the files is willing to be accepted and stored in a user with a specific right, the user authority is divided into different users according to the acceptance level, nodes willing to accept storage can be rewarded, the number of the rewarded files is in direct proportion to the number of the stored files, and the more the number of the stored files is, the higher the number of the rewarded files is; receiving and storing important files has a reward mechanism for nodes, users who are willing to accept partial storage in the network are exchanged, a new node is added into the network, the reward mechanism is the same for all the nodes; verifying that nodes willing to accept storage need to ensure that data cannot be tampered; in addition, a distributed hash table is stored in nodes of the whole network, and a global index of each file is stored in the distributed hash table; in the storage management device of the planning BIM pipeline collision detection system, each person can store some integral data needing to be stored. All nodes are broken down into users willing to accept storage. The node receives the reward if the node stores the user willing to accept the storage, the amount of the reward is related to the storage amount, and the reward is higher if the amount is larger. To prevent loss of important files, nodes have incentive mechanisms for receiving and storing important files. The excitation of the nodes is reliable and fair, otherwise they are kicked out of the network. The same user who proves to be willing to accept storage in the node exchange as the new node joins the network, there is a reward mechanism. New nodes join the network and there is a minimum threshold for network connectivity. The node must maintain the integrity of the stored data and not tamper with it. We will use the sum of the users who check that each is willing to accept storage for this purpose. The ability to have and maintain a DHT in the nodes where there is a global index for each file. There must be a global "trading market" in exchange for users willing to accept storage. Each node has a "wanted list" and an "owned list" for users willing to accept storage, and the nodes must be continually able to exchange with each other. Each node is able to track the propagation of any node in the network. Step 12: each node has a required list and an owned list for users willing to accept storage, and can track the propagation of any node in the network; step 13: planning the structure of a storage management device of the BIM pipeline collision detection system into a general structure and a hierarchical structure; the overall structure comprises an identity subsystem, a network subsystem, a routing subsystem, a block switching subsystem and a subsystem of nodes willing to accept storage; the identity subsystem is used for generating and verifying the management node identifier; a network subsystem for managing the connection with other nodes and using various underlying network protocols; a routing subsystem that maintains information to locate specific objects in response to local and remote queries, the default value being a DHT; the subsystem of the node willing to accept storage can split each node into nodes willing to accept storage, and the nodes willing to accept storage need checksum; a block switching subsystem, a novel packet switching protocol, for governing efficient subscriber distribution willing to accept storage; the hierarchical structure comprises a lowest level, a middle level and a high level, wherein the lowest level comprises a P2P network and a distributed hash table, is responsible for message exchange among nodes, is responsible for integrity detection of nodes willing to accept storage, is responsible for list storage of connection nodes and is responsible for selecting a proper network protocol; the distributed hash table is responsible for storing file indexes, distributing nodes, coordinating and optimizing the quantity of control information, and storing the file indexes to contain all files and paths of the file indexes; where the system should be made up of small modules, which all have their own API, and which should be tested separately. It is proven that full-user multiple copy storage should be deployed to ensure the security of each uploaded file. The network contains nodes for decentralization, better download speed, higher reliability. Each file in the network contains users willing to accept storage. The nodes cannot take care of each other. The node can only be operated in users who are willing to accept storage. The node must provide a portion of the memory for the shared storage and therefore receive a reward. The global file index must be stored in the DHT. Step 14: the middle layer stores centralized full-node logic and comprises a file subsystem, a block tracking subsystem, a block switching subsystem and a subsystem; the file subsystem is used for loading file segmentation logic, file assembly logic and file integrity check logic, the file segmentation logic is used for segmenting a file, the file assembly logic is responsible for code compiling of the file, and the file integrity check logic is used for checking the integrity of the file; the block tracking subsystem is used for loading and tracking the propagation logic of the users willing to accept storage, the propagation logic of the users willing to accept storage is used for tracking the propagation of the users willing to accept storage in the network, and the checking existence logic of the users willing to accept storage is used for checking whether the users willing to accept storage exist; step 15: the block switching subsystem is used for loading user use logic, occupation list logic and demand list logic which are willing to accept storage, wherein the user use logic, the occupation list logic and the demand list logic are willing to accept storage and are used for describing application logic used by files, the occupation list logic is used for describing the files which are owned, and the demand list logic is used for describing the files which need to be owned; step 16: the subsystem is loaded with a cost return logic, and the cost return logic is used for describing the cost return; step 17: the high level comprises a system graphical interface, wherein the system graphical interface provides an interface for uploading files, an interface for providing a link for receiving each file, an interface for checking a financial information node, an interface for account deposit and a browser for reading the files from a network, and the financial information node is used for uploading cost, reading cost and storing rewards; step 18: the reward mechanism comprises a basic pricing mode, an incentive storage file and an incentive use file, wherein the basic pricing mode is used for storing unlimited storage files, 1Gb is stored every time, and can be used for limited storage and stored in a monthly period, and 1Gb is stored every 6 months; step 19: the incentive memory file contains the following: the file is added into the network and is bound with the storage transaction; any transaction can only be used once; the transaction and the file are verified by each node in the network; the transaction should contain a sum check of all documents and a check to verify the integrity of the user willing to accept storage; the limited storage file is excited, and two options are available: manually creating transactions each month and creating a management center for each month logging off a certain amount from the account; the incentive usage file contains the following: the cost of using the file is cheap and can be arbitrarily defined; any user should be able to create a link to receive the file, and the user creating the link subsidizes using the file by: the owner of the file creates the link and causes it to be shared on the planning BIM pipeline crash detection system storage management device, the user pays for the use of the file, which may be paid through the management center. Wherein: 1. identity subsystem-for managing the generation and verification of node identities; 2. network subsystem-manages connections to other nodes and uses various underlying network protocols; 3. routing subsystem-maintains information to locate specific peers and objects. In response to local and remote queries. The default value is a Distributed Hash Table (DHT); 4. the subsystem-file system of files and storage-willing users may split each file into storage-willing users who need checksums; 5. block switching subsystem-a new type of packet switching protocol to govern efficient block distribution.
Lowest level: a P2P network; must be responsible for message exchange between nodes; must be responsible for integrity checking of users willing to accept storage; must be responsible for the list storage of the connecting nodes; must be responsible for selecting the appropriate protocol; lowest level: a distributed hash table containing a file index; it must be responsible for storing the file index. The stored file index contains all the files in the network and the paths to them; must be responsible for the distribution of the nodes; efficient lookup in large-scale networks should be provided; should provide low coordination overhead, should optimize the amount of control information; each defined specification and functional description must be similar to an already existing and proven solution; intermediate level: core full node logic; the file subsystem is used for loading file segmentation logic, file assembly logic and file integrity check logic; block trace subsystem-load trace user's propagation logic willing to accept storage, user's checking presence logic willing to accept storage; for storage files with limited excitation, there are two options: the transaction is created manually each month or a management centre is created which is used to log off a certain amount from the account each month.
The beneficial results of the invention are as follows: the invention provides a storage management device for planning a BIM pipeline collision detection system, which is used for ensuring the specification of a collision detection system for storing files, comprehensively ensuring reasonable and optimized storage of the files from the storage of the files, the use of the files, the provision of excitation of the files and the interaction between the files and a user, describing the files by a hierarchical structure and having the characteristics of structuring and loose coupling.

Claims (1)

1. A storage management device for planning a BIM pipeline collision detection system is applied to the collision detection system and comprises the following contents: checking collision, checking collision results of all pipelines in the graph according to the three-dimensional planning drawing, and generating a report so as to check the collision position and the pipeline information; step 1: opening a graph containing a 3d pipeline meeting the design specification to meet the requirements of a design layer, and performing step 2: the collision check command is entered in the command line: PXCHECKINTERFERENCES, step 3: inputting the name and path of the collision check report in the popup saved dialog box, and the 4 th step: and storing the files as related files by clicking, and the step 5: opening a collision detection file, and 6, step: checking the collision result at the corresponding position in the graph, and carrying out design modification; and 7, step 7: planning the specification of a storage management device of the BIM pipeline collision detection system; and 8, step 8: checking the integrity of files used in the collision detection system for storage in a network node computer in the node, setting the files used in the collision detection system for storage in the network node computer to be storable for an indefinite time; all files used in the collision detection system store a copy in a network node computer; use by a particular authorized user in a network node computer; the server stores important files in the files on a personal storage device of a specific right user by using a reward mechanism, and the user needs to pay a certain fee for downloading and using the files used in the collision detection system; and 8, step 8: implementing full-user multi-copy storage, wherein the full-user multi-copy storage is used in a decentralized file system, a decentralized full node is used as a use node of the decentralized storage, and the decentralized full node is an entry point of a user participating in a network; distributing the stored load to a plurality of communication channels, wherein the starting point of each communication channel has a peak load of 10 Gb/s; step 9: implementing system data user storage, wherein each system data user stores overall system data needing overall network storage, including time and cold and hot isolation; the cold and hot isolation is to store important keys or files at an offline end without directly contacting a network; step 10: setting basic points of loading of the overall system data to the specific right user and the user; and 11, step 11: the server checks that the user authority of important files in the files is willing to be accepted and stored in a user with a specific right, the user authority is divided into different users according to the acceptance level, nodes willing to accept storage can be rewarded, the number of the rewarded files is in direct proportion to the number of the stored files, and the more the number of the stored files is, the higher the number of the rewarded files is; receiving and storing important files has a reward mechanism for nodes, users who are willing to accept partial storage in the network are exchanged, a new node is added into the network, and the reward mechanism is consistent for all nodes; verifying that nodes willing to accept storage need to ensure that data cannot be tampered; in addition, a distributed hash table is stored in nodes of the whole network, and a global index of each file is stored in the distributed hash table; step 12: each node has a required list and an owned list for users willing to accept storage, and can track the propagation of any node in the network; step 13: planning the structure of a storage management device of the BIM pipeline collision detection system into a general structure and a hierarchical structure; the overall structure comprises an identity subsystem, a network subsystem, a routing subsystem, a block switching subsystem and a subsystem of a node willing to accept storage; the identity subsystem is used for generating and verifying the management node identifier; the network subsystem manages the connection with other nodes and uses various underlying network protocols; the routing subsystem maintains information to locate specific objects in response to local and remote queries, with a default value of a DHT; the subsystem of the nodes willing to accept storage can split each node into nodes willing to accept storage, and the nodes willing to accept storage need checksum; the block switching subsystem is a novel packet switching protocol to govern efficient user distribution willing to accept storage; the hierarchical structure comprises a lowest level, a middle level and a high level, wherein the lowest level comprises a P2P network and a distributed hash table, is responsible for message exchange among nodes, is responsible for integrity detection of nodes willing to accept storage, is responsible for list storage of connection nodes and is responsible for selecting a proper network protocol; the distributed hash table is responsible for storing file indexes, distributing nodes and coordinating and optimizing the quantity of control information, and the stored file indexes comprise all files and paths of the file indexes; step 14: the centralized full-node logic is stored in the middle layer and comprises a file subsystem, a block tracking subsystem, a block switching subsystem and a subsystem; the file subsystem is used for loading file segmentation logic, file assembly logic and file integrity check logic, the file segmentation logic is used for segmenting a file, the file assembly logic is responsible for code compiling of the file, and the file integrity check logic is used for checking the integrity of the file; the block tracking subsystem loads and tracks the propagation logic of users willing to accept storage and the checking existence logic of users willing to accept storage, the propagation logic of users willing to accept storage is used for tracking the propagation of the users willing to accept storage in the network, and the checking existence logic of the users willing to accept storage is used for checking whether the users willing to accept storage exist; step 15: the block switching subsystem loads user use logic willing to accept storage, occupation list logic and requirement list logic, wherein the user use logic willing to accept storage is used for describing application logic used by files, the occupation list logic is used for describing owned files, and the requirement list logic is used for describing files needing to be owned; step 16: the subsystem is loaded with a cost return logic, and the cost return logic is used for describing the cost return; step 17: the high level comprises a system graphical interface, the system graphical interface provides an interface for uploading files, an interface for providing a link for receiving each file, an interface for checking financial information nodes, an interface for account deposit, and a browser for reading files from a network, wherein the financial information nodes are used for uploading cost, reading cost and storing rewards; step 18: the reward mechanism comprises a basic pricing mode, an incentive storage file and an incentive use file, wherein the basic pricing mode is used for storing unlimited storage files, 1Gb is stored every time, and can be used for limited storage, the storage is performed in a month period, and 1Gb is stored every 6 months; step 19: the incentive memory file contains the following: the file is added into the network and is bound with the storage transaction; any transaction can only be used once; the transaction and the file are verified by each node in the network; the transaction should contain a checksum verification of all documents, said checksum verification being used to verify the integrity of the user willing to accept storage; the limited storage file is excited, and two options are available: manually creating transactions each month and creating a management center for each month logging off a certain amount from the account; the incentive usage file contains the following: the cost of using the file is cheap and can be arbitrarily defined; any user should be able to create a link to receive the file, and the user creating the link subsidizes using the file by: the owner of the file creates a link and causes it to be shared on the planned BIM pipeline crash detection system storage management device, and the user pays for the use of the file, which can be paid through the management center.
CN201710973913.5A 2017-10-19 2017-10-19 Planning BIM pipeline collision detection system storage management device Active CN107766645B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710973913.5A CN107766645B (en) 2017-10-19 2017-10-19 Planning BIM pipeline collision detection system storage management device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710973913.5A CN107766645B (en) 2017-10-19 2017-10-19 Planning BIM pipeline collision detection system storage management device

Publications (2)

Publication Number Publication Date
CN107766645A CN107766645A (en) 2018-03-06
CN107766645B true CN107766645B (en) 2020-10-16

Family

ID=61268236

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710973913.5A Active CN107766645B (en) 2017-10-19 2017-10-19 Planning BIM pipeline collision detection system storage management device

Country Status (1)

Country Link
CN (1) CN107766645B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108959824B (en) * 2018-08-06 2020-10-02 上海营邑城市规划设计股份有限公司 BIM design section layer layering generation method for Ying Yi planning pipeline
CN111191330B (en) * 2019-12-23 2023-11-03 上海营邑城市规划设计股份有限公司 Method and system for problem discovery in pipeline integrated design
CN111414686B (en) * 2020-03-18 2021-01-05 北京北特圣迪科技发展有限公司 Monitoring and early warning system for operating risks of theater mechanical equipment
CN113283225A (en) * 2021-05-07 2021-08-20 中国电建集团华东勘测设计研究院有限公司 Automatic generation method and device for BIM visual collision inspection report of customizable template, storage medium and equipment
CN113468707B (en) * 2021-07-28 2022-04-22 广州地铁设计研究院股份有限公司 Rapid BIM interaction design method for traction network

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8749588B2 (en) * 2009-09-15 2014-06-10 HNTB Holdings, Ltd. Positioning labels in an engineering drawing
CN103139251A (en) * 2011-11-29 2013-06-05 神州数码信息系统有限公司 Method of city-level data sharing exchange platform technology
CN103198195A (en) * 2013-04-16 2013-07-10 上海上安机电设计事务所有限公司 BIM-based (building information modeling-based) building engineering model collision detection method
CN205563570U (en) * 2016-03-01 2016-09-07 江苏三棱智慧物联发展股份有限公司 High -speed railway station room MEP pipeline collision detection system based on BIM
CN106202831A (en) * 2016-08-10 2016-12-07 中国建筑第八工程局有限公司 A kind of pipeline layout optimization method based on BIM
CN106446126B (en) * 2016-09-19 2021-04-20 哈尔滨航天恒星数据系统科技有限公司 Mass spatial information data storage management method and storage management system
CN107093143A (en) * 2017-03-24 2017-08-25 钱德君 A kind of block chain construction system of Quantum Chain
CN107065801B (en) * 2017-04-27 2019-06-04 中铁六局集团有限公司 Simulative construction method is automatically assembled using the section of track production line of BIM technology
CN107256318B (en) * 2017-07-18 2023-04-18 中国电建集团河南工程有限公司 BIM technology-based boiler small pipeline construction method

Also Published As

Publication number Publication date
CN107766645A (en) 2018-03-06

Similar Documents

Publication Publication Date Title
CN107766645B (en) Planning BIM pipeline collision detection system storage management device
Hunhevicz et al. Do you need a blockchain in construction? Use case categories and decision framework for DLT design options
Angrish et al. A case study for Blockchain in manufacturing:“FabRec”: A prototype for peer-to-peer network of manufacturing nodes
TWI768163B (en) Method and device for generating smart contracts
CN109829718B (en) Block chain multi-level framework based on storage application scene and operation method thereof
CN109003185B (en) Intelligent contract establishing method and device, computing equipment and storage medium
Mika et al. Blockchain-technology in the energy industry: Blockchain as a driver of the energy revolution? With focus on the situation in Germany
KR102313675B1 (en) Block chain-based crytography donation server and donation method without limitation to donation target
CN114445010B (en) Block chain-based multi-mode intermodal system and method
CN104915328A (en) Cooperative writing method for network literary works
CN112200568B (en) Block chain based account creation method and device and electronic equipment
Johnson et al. Analyzing scrip systems
Chen et al. A blockchain based autonomous decentralized online social network
Guo et al. Peer-to-peer energy trading and smart contracting platform of community-based virtual power plant
Ferro et al. Digital assets rights management through smart legal contracts and smart contracts
CN113641759A (en) Data privacy protection method in supply chain finance based on block chain technology
Ciriello et al. Blockchain-based digital rights management systems: Design principles for the music industry
US20220398553A1 (en) Media distribution system using blockchain and operation method thereof
Prinz et al. Blockchain Technology and International Data Spaces.
CN109492847B (en) Multi-resource platform based on block chain and multi-resource allocation method
Schlarb et al. Using blockchain technology to manage membership and legal contracts in a distributed data market
CN114155074A (en) Financial budget data processing method, system, device and storage medium
Miyamae et al. Advanced Ledger: Supply Chain Management with Contribution Trails and Fair Reward Distribution
Franzl et al. Interoperability as a key factor for digitalisation—a success story for cross-sector knowledge transfer
Alm et al. Toward a framework for assessing meaningful differences between blockchain platforms

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: A storage management device for planning BIM pipeline collision detection system

Effective date of registration: 20221213

Granted publication date: 20201016

Pledgee: Industrial Bank Co.,Ltd. Shanghai Huashan sub branch

Pledgor: SHANGHAI YINGYI URBAN PLANNING AND DESIGN CO.,LTD.

Registration number: Y2022310000371

PE01 Entry into force of the registration of the contract for pledge of patent right
CP02 Change in the address of a patent holder
CP02 Change in the address of a patent holder

Address after: 200233 3rd floor, building 19, 810 Yishan Road, Xuhui District, Shanghai

Patentee after: SHANGHAI YINGYI URBAN PLANNING AND DESIGN CO.,LTD.

Address before: Room 1802, Block K, No. 343 Huaihai West Road, Xuhui District, Shanghai, 200030

Patentee before: SHANGHAI YINGYI URBAN PLANNING AND DESIGN CO.,LTD.

PC01 Cancellation of the registration of the contract for pledge of patent right
PC01 Cancellation of the registration of the contract for pledge of patent right

Granted publication date: 20201016

Pledgee: Industrial Bank Co.,Ltd. Shanghai Huashan sub branch

Pledgor: SHANGHAI YINGYI URBAN PLANNING AND DESIGN CO.,LTD.

Registration number: Y2022310000371

PE01 Entry into force of the registration of the contract for pledge of patent right
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: A storage management device for planning BIM pipeline collision detection system

Granted publication date: 20201016

Pledgee: Industrial Bank Co.,Ltd. Shanghai Huashan sub branch

Pledgor: SHANGHAI YINGYI URBAN PLANNING AND DESIGN CO.,LTD.

Registration number: Y2024310000098