CN112003872A - Method and device for detecting and calling secondary node capability of industrial internet identifier - Google Patents

Method and device for detecting and calling secondary node capability of industrial internet identifier Download PDF

Info

Publication number
CN112003872A
CN112003872A CN202010895237.6A CN202010895237A CN112003872A CN 112003872 A CN112003872 A CN 112003872A CN 202010895237 A CN202010895237 A CN 202010895237A CN 112003872 A CN112003872 A CN 112003872A
Authority
CN
China
Prior art keywords
node
identifier
analysis
detected
result
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010895237.6A
Other languages
Chinese (zh)
Other versions
CN112003872B (en
Inventor
谢家贵
王佳慧
李志平
胡翠萍
陈玉英
李悦
王晶
朱斯语
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Academy of Information and Communications Technology CAICT
Original Assignee
China Academy of Information and Communications Technology CAICT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Academy of Information and Communications Technology CAICT filed Critical China Academy of Information and Communications Technology CAICT
Priority to CN202010895237.6A priority Critical patent/CN112003872B/en
Publication of CN112003872A publication Critical patent/CN112003872A/en
Application granted granted Critical
Publication of CN112003872B publication Critical patent/CN112003872B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/22Parsing or analysis of headers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4633Interconnection of networks using encapsulation techniques, e.g. tunneling

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The utility model provides a method and a device for detecting and calling industrial internet identification secondary node capability, the method obtains the information of being detected identification analysis secondary node, and based on the information of being detected identification analysis secondary node, confirm the identification coding format that is supported by being detected identification analysis node, obtain preset detection data, convert preset detection data into the mode of target detection data, support only to set for one set of detection data, detect identification analysis secondary node, compare in developing different detection data, develop one set of detection data in this application, and carry out the mode of conversion to same set of detection data, work load obtains reducing, the length of time of detection is shortened, and then can improve detection efficiency. And only one set of detection data needs to be maintained in the later period, so that the maintenance workload can be reduced.

Description

Method and device for detecting and calling secondary node capability of industrial internet identifier
Technical Field
The application relates to the field of identification analysis, in particular to a method and a device for detecting and calling the capability of an industrial internet identification secondary node.
Background
Analyzing a secondary node by the industrial internet identification: the system is an identification analysis public service node in an industry or region, and can provide identification code registration and identification analysis services for the industry or region, complete relevant identification service management, identification application docking and the like. The system is upwards butted with a national top level node, downwards distributes identification codes for industrial enterprises, provides services such as identification analysis and the like, and simultaneously meets the requirements of safety, stability, expandability and the like.
In view of the above-mentioned important role of the industrial internet identity resolution secondary node, it is necessary to detect the capability of the industrial internet identity resolution secondary node so as to maintain the industrial internet identity resolution secondary node based on the detection result. At present, the mode of detecting the capability of identifying and analyzing the secondary node of the industrial internet generally comprises the following steps: different detection data are formulated for the industrial internet identification analysis secondary nodes of different coding systems respectively, and the industrial internet identification analysis secondary nodes of different coding systems are detected based on the different detection data.
However, the above method requires development of different detection data, which prolongs the overall detection time and results in low detection efficiency. In addition, different detection data need to be maintained, which results in large workload of post-maintenance.
Disclosure of Invention
In order to solve the above technical problems, embodiments of the present application provide a method and an apparatus for detecting and calling an industrial internet identifier secondary node capability, so as to achieve the purposes of improving detection efficiency and reducing maintenance workload, and the technical scheme is as follows:
a method for detecting and calling secondary node capability of industrial Internet identification comprises the following steps:
determining an identifier coding format supported by a detected identifier parsing node, and taking the determined identifier coding format as a target identifier coding format, wherein the detected identifier parsing node is at least: analyzing a secondary node by the detected identifier;
acquiring preset detection data;
converting the preset detection data into target detection data, wherein the identification coding format of the target detection data is the same as that of the target identification coding format;
sending an identifier registration and analysis request carrying the target detection data to the detected identifier analysis node;
and when receiving a result generated by the detected identifier analysis node responding to the identifier registration and analysis request, analyzing the capability of the detected identifier analysis node based on the result.
The result comprises a registration result and a resolving result; and/or, under the condition of hardware performance index data, analyzing the capability of the detected identifier analysis node based on the result, including:
according to the target coding format, the registration result and the analysis result are respectively interpreted to respectively obtain a registration interpretation result and an analysis interpretation result;
respectively analyzing the registration capability and the analysis capability of the analyzed node of the detected identifier by comparing the registration interpretation result with a predetermined reference registration result and comparing the analysis interpretation result with a predetermined reference analysis result;
and/or the presence of a gas in the gas,
and analyzing the hardware performance of the detected identification analysis node by comparing the hardware performance index data with predetermined reference hardware performance index data.
The sending an identifier registration and analysis request carrying the target detection data to the detected identifier analysis node includes:
each communication protocol supported by the detected identifier resolution node is respectively used as an adaptive communication protocol;
packaging the target detection data by using the adaptive communication protocol to obtain an identifier registration and analysis request carrying the target detection data;
sending the identifier registration and analysis request carrying the target detection data to the detected identifier analysis node;
analyzing the capability of the detected identifier resolution node based on the result, further comprising:
judging whether the result is a result encapsulated by the adaptive communication protocol;
and if so, determining that the detected identifier resolution node supports the adaptive communication protocol.
The method further comprises the following steps:
and generating early warning information and sending the early warning information under the condition that the capability of the detected identification analysis node does not meet the requirement as a result of analyzing the capability of the detected identification analysis node.
After the generating the early warning information and sending the early warning information, the method further comprises the following steps:
judging whether the detected identifier analysis node authorizes the calling of the standby service node;
if yes, the standby service node is called, and the standby service node is used for replacing the detected identification analysis node.
The sending an identifier registration and analysis request carrying the target detection data to the detected identifier analysis node includes:
judging whether a preset detection task execution time is reached;
if so, sending an identifier registration and analysis request carrying the target detection data to the detected identifier analysis node.
The sending an identifier registration and analysis request carrying the target detection data to the detected identifier analysis node includes:
and sending different numbers of identifier registration and analysis requests carrying the target detection data to the detected identifier analysis node for multiple times, wherein the number of the requests sent each time is more than that of the requests sent last time.
The detected identifier resolution node further comprises: and analyzing the nodes aiming at the marks customized by the enterprises in advance.
An apparatus for detecting and invoking industrial internet identity secondary node capabilities, comprising:
a determining module, configured to determine an identifier encoding format supported by a detected identifier parsing node, where the determined identifier encoding format is used as a target identifier encoding format, and the detected identifier parsing node is at least: analyzing a secondary node by the detected identifier;
the acquisition module is used for acquiring preset detection data;
the conversion module is used for converting the preset detection data into target detection data, and the identification coding format of the target detection data is the same as that of the target identification coding format;
a sending module, configured to send an identifier registration and analysis request carrying the target detection data to the detected identifier analysis node;
and the detection module is used for analyzing the capability of the analyzed node of the detected identifier based on the result when the result generated by responding to the identifier registration and analysis request by the analyzed node of the detected identifier is received.
The result comprises a registration result and a resolving result; and/or, in the case of hardware performance index data, the detection module is specifically configured to:
according to the target coding format, the registration result and the analysis result are respectively interpreted to respectively obtain a registration interpretation result and an analysis interpretation result;
respectively analyzing the registration capability and the analysis capability of the analyzed node of the detected identifier by comparing the registration interpretation result with a predetermined reference registration result and comparing the analysis interpretation result with a predetermined reference analysis result;
and/or the presence of a gas in the gas,
and analyzing the hardware performance of the detected identification analysis node by comparing the hardware performance index data with predetermined reference hardware performance index data.
The sending module is specifically configured to:
each communication protocol supported by the detected identifier resolution node is respectively used as an adaptive communication protocol;
packaging the target detection data by using the adaptive communication protocol to obtain an identifier registration and analysis request carrying the target detection data;
sending the identifier registration and analysis request carrying the target detection data to the detected identifier analysis node;
the detection module is further configured to:
judging whether the result is a result encapsulated by the adaptive communication protocol;
and if so, determining that the detected identifier resolution node supports the adaptive communication protocol.
The device further comprises:
and the early warning module is used for generating early warning information and sending the early warning information under the condition that the capability of the detected identification analysis node does not meet the requirement as a result of analyzing the capability of the detected identification analysis node.
The device further comprises:
a replacement module to:
judging whether the detected identifier analysis node authorizes the calling of the standby service node;
if yes, the standby service node is called, and the standby service node is used for replacing the detected identification analysis node.
The sending module is specifically configured to:
judging whether a preset detection task execution time is reached;
if so, sending an identifier registration and analysis request carrying the target detection data to the detected identifier analysis node.
The sending module is specifically configured to:
and sending different numbers of identifier registration and analysis requests carrying the target detection data to the detected identifier analysis node for multiple times, wherein the number of the requests sent each time is more than that of the requests sent last time.
The detected identifier resolution node further comprises: and analyzing the nodes aiming at the marks customized by the enterprises in advance.
Compared with the prior art, the beneficial effect of this application is:
in the application, the information of the detected identification analysis secondary node is obtained, the identification coding format supported by the detected identification analysis node is determined based on the information of the detected identification analysis secondary node, the preset detection data is obtained, the preset detection data is converted into the target detection data, only one set of detection data needs to be set, the identification analysis secondary node is detected, and compared with the method for developing different detection data, one set of detection data is developed in the application, the same set of detection data is converted, the workload is reduced, the detection duration is shortened, and the detection efficiency can be improved.
And only one set of detection data needs to be maintained in the later period, so that the maintenance workload can be reduced.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive labor.
Fig. 1 is a flowchart of a method for detecting and invoking an industrial internet capability of identifying a secondary node according to embodiment 1 of the present application;
fig. 2 is a flowchart of a method for detecting and invoking an industrial internet capability of identifying a secondary node according to embodiment 2 of the present application;
fig. 3 is a flowchart of a method for detecting and invoking an industrial internet capability of identifying a secondary node according to embodiment 3 of the present application;
fig. 4 is a flowchart of a method for detecting and invoking the capability of identifying secondary nodes of the industrial internet according to embodiment 4 of the present application;
fig. 5 is a schematic logic structure diagram of an apparatus for detecting and invoking an industrial internet identification secondary node capability provided by the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in further detail below.
Referring to fig. 1, a flowchart of a method for detecting and invoking the capability of identifying a secondary node of an industrial internet is provided in embodiment 1 of the present application, and as shown in fig. 1, the method may include, but is not limited to, the following steps:
and step S11, determining the identification coding format supported by the detected identification parsing node, and taking the determined identification coding format as a target identification coding format.
In this embodiment, the information of the secondary node may be analyzed by obtaining the detected identifier, and the identifier encoding format supported by the detected identifier node may be determined based on the information of the detected identifier analyzing secondary node.
Of course, the identification code format supported by the detected identification parsing node can also be queried from the industrial internet, and the queried identification code format is used as the identification code format of the detected identification parsing node.
In this embodiment, the detected identifier parsing node may be at least: and analyzing the secondary node by the detected identifier. The detected identifier resolution secondary node can be understood as: and analyzing the secondary node by the detected industrial internet identifier.
Of course, the detected identifier resolution node may also be: and analyzing the nodes aiming at the marks customized by the enterprises in advance.
Step S12 is to acquire preset detection data.
In this embodiment, a set of detection data may be preset. Wherein, the detection data can be understood as: and setting registration data and analysis data for identifying the coding format. The identifier resolution node may register the registration data and perform resolution on the resolution data.
The set identifier encoding format may be any one of a plurality of existing identifier encoding formats.
In the case where the identifier resolution node is an identifier resolution secondary node, the detection data is preset for the characteristics of the identifier resolution secondary node. Of course, in the case where the identifier resolution node is a previously customized identifier resolution node for the enterprise, the detection data is set in advance based on the characteristics of the previously customized identifier resolution node for the enterprise.
Step S13, converting the preset detection data into target detection data, where the identifier encoding format of the target detection data is the same as the target identifier encoding format.
Converting the preset detection data into target detection data may include:
s131, judging whether the preset identification code format of the detection data is consistent with the target identification code format;
if yes, go to step S132; if not, step S133 is executed.
S132, taking the preset detection data as target detection data;
and S133, converting the preset detection data into target detection data.
In this embodiment, the identifier encoding format of the target detection data is the same as the target identifier encoding format, so that the detected identifier parsing node can process the target detection data.
Step S14, sending an identifier registration and parsing request carrying the target detection data to the detected identifier parsing node.
In this embodiment, the sending the identifier registration and resolution request carrying the target detection data to the detected identifier resolution node may include:
and S141, judging whether the preset execution time of the detection task is reached.
The preset execution time of the detection task can be set to be a time for the user to visit less, so that the influence of detection on the user experience and the stability of the analysis node of the detected identifier is avoided.
If yes, go to step S142.
S142, sending an identifier registration and analysis request carrying the target detection data to the detected identifier analysis node.
In this embodiment, the detection task may be formulated to form a detection task table, where the detection task table may include the number of identifier registration and analysis requests that need to be sent for each detection task.
Sending an identifier registration and analysis request carrying the target detection data to the detected identifier analysis node based on a detection task table, which may include:
and sending different numbers of identifier registration and analysis requests carrying the target detection data to the detected identifier analysis node for multiple times according to different detection tasks in the detection task table, wherein the number of the requests sent each time is more than that of the requests sent last time.
And sending different numbers of identifier registration and analysis requests carrying the target detection data to the detected identifier analysis node for multiple times, wherein the number of the requests sent each time is more than that of the requests sent last time, and the number of the requests responded each time by the detected identifier analysis node is required to be more than that of the requests responded last time, so that the detection requirements of different detection tasks are met.
Step S15, when receiving a result generated by the detected identifier parsing node responding to the identifier registration and parsing request, analyzing the capability of the detected identifier parsing node based on the result.
In this embodiment, the detected identifier parsing node responds to the identifier registration and parsing request, and a generated result may include: registering results and analyzing results. And the registration result is generated by registering the registration data in the target detection data by the detected identification analysis node. The analysis result is generated by analyzing the analysis data in the target detection data by the detected identification analysis node.
Responding the identification registration and analysis request at the detected identification analysis node, and generating a result comprising: in the case of registering a result and analyzing the result, analyzing the capability of the detected identity analyzing node based on the result may include:
and S151, respectively interpreting the registration result and the analysis result according to the target coding format to respectively obtain a registration interpretation result and an analysis interpretation result.
S152, respectively analyzing the registration capability and the analysis capability of the analysis node of the detected identifier by comparing the registration interpretation result with a predetermined reference registration result and comparing the analysis interpretation result with a predetermined reference analysis result;
the predetermined reference registration result and reference analysis result may be understood as: and in the research and development stage of the registration and analysis project of the analyzed node of the detected identifier, when the pressure test of the registration and analysis capability of the analyzed node of the detected identifier is carried out, the result which accords with the registration and analysis standard is obtained. In addition, it should be noted that, after the capability of the detected identifier parsing node is optimized, the reference registration result and the reference parsing result need to be changed accordingly.
By comparing the registration interpretation result with a predetermined reference registration result and comparing the analysis interpretation result with a predetermined reference analysis result, the registration capability and the analysis capability of the detected identifier analysis node are analyzed respectively, which can be understood as:
s1511, comparing the registered interpretation result with a predetermined reference registration result, determining the difference between the registered interpretation result and the predetermined reference registration result, and taking the determined difference as a first difference;
s1512, judging whether the first difference is within a first difference threshold range;
if the first difference is within the first difference threshold range, go to step S1513; if the first difference is not within the first difference threshold range, step S1514 is performed.
S1513, determining that the registration capability of the detected identifier resolution node meets the requirement.
And S1514, determining that the registration capability of the detected identification resolving node does not meet the requirement.
S1515, by comparing the analytic interpretation result with a predetermined reference analytic result, determining a difference between the analytic interpretation result and the predetermined reference analytic result, and taking the determined difference as a second difference;
s1516, judging whether the second difference is within the second difference threshold range;
if the second difference is within the second difference threshold range, go to step S1517; if the second difference is not within the second difference threshold range, step S1518 is executed.
S1517, determining that the resolving capability of the detected identification resolving node meets the requirement.
S1518, determining that the resolving capability of the detected identification resolving node does not meet the requirement.
It should be noted that steps S1511 to S1518 may be understood as: and under the condition of sending an identification registration and analysis request to the detected identification analysis node, analyzing the detected identification analysis node through a comparison result.
In the case of sending a plurality of identifier registration and parsing requests to a detected identifier parsing node in batch, analyzing the registration capability and parsing capability of the detected identifier parsing node by comparing the registration interpretation result with a predetermined reference registration result and comparing the parsing interpretation result with a predetermined reference parsing result, respectively, may include:
s1521, respectively comparing each registered interpretation result with a predetermined reference registered result, determining the difference between each registered interpretation result and the predetermined reference registered result, and taking the determined difference as the registered result difference;
s1522, respectively judging whether the difference of each registration result is within the threshold range of the registration difference to obtain a judgment result, and counting the number of the results of the difference of the registration results within the threshold range of the registration difference based on the judgment result;
s1523, calculating the ratio of the number of the results of the registration result difference within the registration difference threshold range to the number of the identifier registration and analysis requests sent to the detected identifier analysis node;
s1524, judging whether the ratio is larger than a first set proportion threshold value;
if so, determining that the registration capability of the detected identifier resolution node meets the requirement; if not, determining that the registration capability of the detected identifier analysis node does not meet the requirement.
S1525, respectively comparing each analysis interpretation result with a predetermined reference analysis result, determining the difference between each analysis interpretation result and the predetermined reference analysis result, and taking the determined difference as the analysis result difference;
s1526, respectively judging whether the analysis result difference is within the analysis difference threshold range to obtain a judgment result, and counting the number of the results of the analysis result difference within the analysis difference threshold range based on the judgment result;
s1527, calculating the ratio of the number of the results of the analysis result difference within the analysis difference threshold range to the number of the identification registration and analysis requests sent to the detected identification analysis node;
s1528, judging whether the ratio is larger than a second set proportion threshold value;
if so, determining that the resolving capability of the resolving node of the detected identifier meets the requirement; if not, determining that the resolving capability of the detected identification resolving node does not meet the requirement.
Of course, the detected identifier parsing node responds to the identifier registration and parsing request, and the generated result may also include: hardware performance indicator data, such as CPU usage or latency in responding to the identity registration and resolution requests.
Responding the identifier registration and analysis request at the detected identifier analysis node, and generating a result comprising: in the case of hardware performance index data, analyzing the capability of the detected identity resolution node based on the result may include:
s153, analyzing the hardware performance of the detected identification analysis node by comparing the hardware performance index data with the predetermined reference hardware performance index data.
The predetermined reference hardware performance index data may be understood as: and in the research and development stages of the registration and analysis project of the analyzed node of the detected identifier, when the pressure test of the registration and analysis capability of the analyzed node of the detected identifier is carried out, a result which accords with the hardware performance standard is obtained. In addition, it should be noted that, after the capability of the detected identifier resolution node is optimized, the reference hardware performance index data needs to be changed accordingly.
Analyzing the hardware performance of the detected identifier parsing node by comparing the hardware performance index data with predetermined reference hardware performance index data may include:
s1531, determining the difference between the hardware performance index data and the predetermined reference hardware performance index data by comparing the hardware performance index data with the predetermined reference hardware performance index data, and taking the determined difference as the hardware performance difference;
s1532, judging whether the hardware performance difference is within a third difference threshold range;
if the difference is within the third difference threshold range, go to step S1533; if not, go to step S1534.
S1533, determining that the hardware performance of the detected identification analysis node meets the requirement.
S1534, determining that the hardware performance of the detected identification analysis node does not meet the requirement.
It should be noted that steps S1531 to S1534 may be understood as: and under the condition of sending an identification registration and analysis request to the detected identification analysis node, analyzing the hardware performance of the detected identification analysis node through a comparison result.
Under the condition of sending a plurality of identifier registration and analysis requests to a detected identifier analysis node in batch, analyzing the hardware performance of the detected identifier analysis node by comparing the hardware performance index data with predetermined reference hardware performance index data, which may include:
s1541, comparing each hardware performance index data with predetermined reference hardware performance index data, respectively, determining the difference between each hardware performance index data and the predetermined reference hardware performance index data, and taking the determined difference as the hardware performance difference;
s1542, respectively judging whether the hardware performance difference is within the hardware performance difference threshold range to obtain a judgment result, and counting the number of results of the hardware performance difference within the hardware performance difference threshold range based on the judgment result;
s1543, calculating the ratio of the number of results of the hardware performance difference within the hardware performance difference threshold range to the number of identifier registration and analysis requests sent to the detected identifier analysis node;
s1544, judging whether the ratio is larger than a third set proportion threshold value;
if yes, determining that the hardware performance of the detected identifier analysis node meets the requirement; if not, determining that the hardware performance of the detected identifier analysis node does not meet the requirement.
In the application, the information of the detected identification analysis secondary node is obtained, the identification coding format supported by the detected identification analysis node is determined based on the information of the detected identification analysis secondary node, the preset detection data is obtained, the preset detection data is converted into the target detection data, only one set of detection data needs to be set, the identification analysis secondary node is detected, and compared with the method for developing different detection data, one set of detection data is developed in the application, the same set of detection data is converted, the workload is reduced, the detection duration is shortened, and the detection efficiency can be improved.
And only one set of detection data needs to be maintained in the later period, so that the maintenance workload can be reduced.
And the method supports only one detection tool to be deployed, and the detection tool respectively executes the steps S11-S15 aiming at different detected identification analysis nodes to complete the detection of the different detected identification analysis nodes.
The detection tool supports two modes of online detection and offline detection. When the detection tool can perform on-line detection, the steps S11-S15 are performed. When the detection tool cannot perform online detection, the script which can realize the steps S11-S13 can be sent to the detected identification analysis node, the script is run by the detected identification analysis node to realize the conversion of the detection data, the detected identification analysis node processes the target detection data to generate a corresponding result, the generated result is returned to the detection tool, and the detection tool analyzes the capability of the detected identification analysis node based on the result.
The detection tool supports different detection modes, can meet the requirements under different scenes, reduces the adverse effect of factors such as regions, networks and the like on the accuracy of detection results, can reduce the occurrence of the situation that a specially-assigned person needs to detect on the spot due to the limitation of the regions and the networks, and reduces the maintenance cost of analyzing the secondary node by the detected identifier.
As another optional embodiment of the present application, referring to fig. 2, a flowchart of an embodiment 2 of a method for detecting and invoking the capability of identifying a secondary node of an industrial internet is provided, where this embodiment is mainly a refinement of the method for detecting and invoking the capability of identifying a secondary node of an industrial internet described in the above embodiment 1, as shown in fig. 2, the method may include, but is not limited to, the following steps:
step S21, determining an identifier encoding format supported by the detected identifier parsing node, and taking the determined identifier encoding format as a target identifier encoding format, where the detected identifier parsing node is at least: and analyzing the secondary node by the detected identifier.
Step S22 is to acquire preset detection data.
Step S23, converting the preset detection data into target detection data, where the identifier encoding format of the target detection data is the same as the target identifier encoding format.
The detailed procedures of steps S21-S23 can be found in the related descriptions of steps S11-S13 in embodiment 1, and are not repeated herein.
Step S24, using each communication protocol supported by the detected identifier parsing node as an adaptive communication protocol.
Step S25, using the adaptive communication protocol to encapsulate the target detection data, and obtain an identifier registration and analysis request carrying the target detection data.
Step S26, sending the identifier registration and parsing request carrying the target detection data to the detected identifier parsing node.
Steps S24-S26 are a specific implementation of step S14 in example 1.
Step S27, when receiving a result generated by the detected identifier parsing node responding to the identifier registration and parsing request, analyzing the capability of the detected identifier parsing node based on the result.
The process of analyzing the capability of the detected identity resolution node based on the result may further include, in addition to the detailed process of analyzing the capability of the detected identity resolution node based on the result, which is described in step S15 in embodiment 1:
judging whether the result is a result encapsulated by the adaptive communication protocol;
and if so, determining that the detected identifier resolution node supports the adaptive communication protocol.
In this embodiment, by designating the adaptive communication protocol and using the adaptive communication protocol to package the target detection data, the identifier registration and parsing request is obtained, and the identifier registration and parsing request packaged by using the adaptive communication protocol is sent to the detected identifier parsing node, so as to analyze the communication protocol supported by the detected identifier parsing node.
As another optional embodiment of the present application, referring to fig. 3, a flowchart of embodiment 3 of a method for detecting and invoking an industrial internet identity secondary node capability provided by the present application is provided, and this embodiment is mainly an extension of the method for detecting and invoking an industrial internet identity secondary node capability described in embodiment 1 above, as shown in fig. 3, the method may include, but is not limited to, the following steps:
step S31, determining an identifier encoding format supported by the detected identifier parsing node, and taking the determined identifier encoding format as a target identifier encoding format, where the detected identifier parsing node is at least: and analyzing the secondary node by the detected identifier.
Step S32 is to acquire preset detection data.
Step S33, converting the preset detection data into target detection data, where the identifier encoding format of the target detection data is the same as the target identifier encoding format.
Step S34, sending an identifier registration and parsing request carrying the target detection data to the detected identifier parsing node.
Step S35, when receiving a result generated by the detected identifier parsing node responding to the identifier registration and parsing request, analyzing the capability of the detected identifier parsing node based on the result.
The detailed procedures of steps S31-S35 can be found in the related descriptions of steps S11-S15 in embodiment 1, and are not repeated herein.
And step S36, generating early warning information and sending the early warning information when the capability of the detected identification analysis node is not in accordance with the requirement as a result of analyzing the capability of the detected identification analysis node.
In this embodiment, the early warning information may be: and prompt information of abnormal information contained in the result of analyzing the capability of the detected identification analysis node.
In this embodiment, the early warning information may be sent out by means of mail, short message, WeChat, and the like.
And generating early warning information and sending the early warning information under the condition that the capability of the detected identification analysis node does not meet the requirement as a result of analyzing the capability of the detected identification analysis node, so that the problem of the detected identification analysis secondary node can be timely found, the detected identification analysis node can be timely maintained, the capability of the detected identification analysis node is ensured, and the analysis of the secondary node caused by the detected identification is reduced.
As another optional embodiment of the present application, referring to fig. 4, a flowchart of embodiment 4 of a method for detecting and invoking an industrial internet identity secondary node capability provided by the present application is provided, and this embodiment is mainly an extension of the method for detecting and invoking an industrial internet identity secondary node capability described in embodiment 3 above, as shown in fig. 4, the method may include, but is not limited to, the following steps:
step S41, determining an identifier encoding format supported by the detected identifier parsing node, and taking the determined identifier encoding format as a target identifier encoding format, where the detected identifier parsing node is at least: and analyzing the secondary node by the detected identifier.
Step S42 is to acquire preset detection data.
Step S43, converting the preset detection data into target detection data, where the identifier encoding format of the target detection data is the same as the target identifier encoding format.
Step S44, sending an identifier registration and parsing request carrying the target detection data to the detected identifier parsing node.
Step S45, when receiving a result generated by the detected identifier parsing node responding to the identifier registration and parsing request, analyzing the capability of the detected identifier parsing node based on the result.
And step S46, generating early warning information and sending the early warning information when the capability of the detected identification analysis node is not in accordance with the requirement as a result of analyzing the capability of the detected identification analysis node.
The detailed procedures of steps S41-S46 can be referred to the related descriptions of steps S31-S36 in embodiment 3, and are not described herein again.
And step S47, judging whether the detected identification resolving node authorizes the calling of the standby service node.
If yes, go to step S48.
Step S48, invoking the standby service node, and replacing the detected identifier resolution node with the standby service node.
After the early warning information is sent out, under the condition that the detected identification resolving node authorizes the calling of the standby service node, the standby service node is called, and the standby service node replaces the detected identification resolving node, so that the standby service node replaces the detected identification resolving node to register and resolve, the pressure of the detected identification resolving node is reduced, and the phenomenon that the detected identification resolving node is blocked by a bottleneck to normally register and resolve the enterprise identification is avoided.
The device for detecting and calling the industrial internet identity secondary node capability provided by the application is introduced next, and the device for detecting and calling the industrial internet identity secondary node capability introduced below and the method for detecting and calling the industrial internet identity secondary node capability introduced above can be correspondingly referred to each other.
Referring to fig. 5, the apparatus for detecting and invoking the capability of the industrial internet to identify the secondary node comprises: a determination module 100, an acquisition module 200, a conversion module 300, a sending module 400 and a detection module 500.
A determining module 100, configured to determine an identifier encoding format supported by a detected identifier parsing node, and use the determined identifier encoding format as a target identifier encoding format, where the detected identifier parsing node is at least: analyzing a secondary node by the detected identifier;
an obtaining module 200, configured to obtain preset detection data;
a conversion module 300, configured to convert the preset detection data into target detection data, where an identifier coding format of the target detection data is the same as the target identifier coding format;
a sending module 400, configured to send an identifier registration and analysis request carrying the target detection data to the detected identifier analysis node;
a detection module 500, configured to, when receiving a result generated by the detected identifier parsing node in response to the identifier registration and parsing request, analyze, based on the result, the capability of the detected identifier parsing node.
In this embodiment, the result includes a registration result and a parsing result; and/or, in the case of hardware performance indicator data, the detection module 500 may be specifically configured to:
according to the target coding format, the registration result and the analysis result are respectively interpreted to respectively obtain a registration interpretation result and an analysis interpretation result;
respectively analyzing the registration capability and the analysis capability of the analyzed node of the detected identifier by comparing the registration interpretation result with a predetermined reference registration result and comparing the analysis interpretation result with a predetermined reference analysis result;
and/or the presence of a gas in the gas,
and analyzing the hardware performance of the detected identification analysis node by comparing the hardware performance index data with predetermined reference hardware performance index data.
In this embodiment, the sending module 400 may be specifically configured to:
each communication protocol supported by the detected identifier resolution node is respectively used as an adaptive communication protocol;
packaging the target detection data by using the adaptive communication protocol to obtain an identifier registration and analysis request carrying the target detection data;
and sending the identifier registration and analysis request carrying the target detection data to the detected identifier analysis node.
Accordingly, the detection module 500 may be further configured to:
judging whether the result is a result encapsulated by the adaptive communication protocol;
and if so, determining that the detected identifier resolution node supports the adaptive communication protocol.
In this embodiment, the apparatus for detecting and invoking the secondary node capability of the industrial internet identifier may further include:
and the early warning module is used for generating early warning information and sending the early warning information under the condition that the capability of the detected identification analysis node does not meet the requirement as a result of analyzing the capability of the detected identification analysis node.
In this embodiment, the apparatus for detecting and invoking the secondary node capability of the industrial internet identifier may further include:
a replacement module to:
judging whether the detected identifier analysis node authorizes the calling of the standby service node;
if yes, the standby service node is called, and the standby service node is used for replacing the detected identification analysis node.
In this embodiment, the sending module 400 may be specifically configured to:
judging whether a preset detection task execution time is reached;
if so, sending an identifier registration and analysis request carrying the target detection data to the detected identifier analysis node.
In this embodiment, the sending module 400 may be specifically configured to:
and sending different numbers of identifier registration and analysis requests carrying the target detection data to the detected identifier analysis node for multiple times, wherein the number of the requests sent each time is more than that of the requests sent last time.
In this embodiment, the detected identifier parsing node may further include: and analyzing the nodes aiming at the marks customized by the enterprises in advance.
It should be noted that each embodiment is mainly described as a difference from the other embodiments, and the same and similar parts between the embodiments may be referred to each other. For the device-like embodiment, since it is basically similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
For convenience of description, the above devices are described as being divided into various units by function, and are described separately. Of course, the functionality of the units may be implemented in one or more software and/or hardware when implementing the present application.
From the above description of the embodiments, it is clear to those skilled in the art that the present application can be implemented by software plus necessary general hardware platform. Based on such understanding, the technical solutions of the present application may be essentially or partially implemented in the form of a software product, which may be stored in a storage medium, such as a ROM/RAM, a magnetic disk, an optical disk, etc., and includes several instructions for enabling a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method according to the embodiments or some parts of the embodiments of the present application.
The method and the device for detecting and calling the capability of the industrial internet to identify the secondary node are introduced in detail, a specific example is applied in the method to explain the principle and the implementation mode of the method, and the description of the embodiment is only used for helping to understand the method and the core idea of the method; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (10)

1. A method for detecting and calling secondary node capability of industrial Internet identification is characterized by comprising the following steps:
determining an identifier coding format supported by a detected identifier parsing node, and taking the determined identifier coding format as a target identifier coding format, wherein the detected identifier parsing node is at least: analyzing a secondary node by the detected identifier;
acquiring preset detection data;
converting the preset detection data into target detection data, wherein the identification coding format of the target detection data is the same as that of the target identification coding format;
sending an identifier registration and analysis request carrying the target detection data to the detected identifier analysis node;
and when receiving a result generated by the detected identifier analysis node responding to the identifier registration and analysis request, analyzing the capability of the detected identifier analysis node based on the result.
2. The method of claim 1, wherein the results include a registration result and a parsing result; and/or, under the condition of hardware performance index data, analyzing the capability of the detected identifier analysis node based on the result, including:
according to the target coding format, the registration result and the analysis result are respectively interpreted to respectively obtain a registration interpretation result and an analysis interpretation result;
respectively analyzing the registration capability and the analysis capability of the analyzed node of the detected identifier by comparing the registration interpretation result with a predetermined reference registration result and comparing the analysis interpretation result with a predetermined reference analysis result;
and/or the presence of a gas in the gas,
and analyzing the hardware performance of the detected identification analysis node by comparing the hardware performance index data with predetermined reference hardware performance index data.
3. The method of claim 2, wherein the sending the identifier registration and resolution request carrying the target detection data to the detected identifier resolution node comprises:
each communication protocol supported by the detected identifier resolution node is respectively used as an adaptive communication protocol;
packaging the target detection data by using the adaptive communication protocol to obtain an identifier registration and analysis request carrying the target detection data;
sending the identifier registration and analysis request carrying the target detection data to the detected identifier analysis node;
analyzing the capability of the detected identifier resolution node based on the result, further comprising:
judging whether the result is a result encapsulated by the adaptive communication protocol;
and if so, determining that the detected identifier resolution node supports the adaptive communication protocol.
4. The method of claim 1, further comprising:
and generating early warning information and sending the early warning information under the condition that the capability of the detected identification analysis node does not meet the requirement as a result of analyzing the capability of the detected identification analysis node.
5. The method of claim 4, wherein after generating the warning message and sending the warning message, the method further comprises:
judging whether the detected identifier analysis node authorizes the calling of the standby service node;
if yes, the standby service node is called, and the standby service node is used for replacing the detected identification analysis node.
6. The method of claim 1, wherein the sending the identifier registration and resolution request carrying the target detection data to the detected identifier resolution node comprises:
judging whether a preset detection task execution time is reached;
if so, sending an identifier registration and analysis request carrying the target detection data to the detected identifier analysis node.
7. The method of claim 1, wherein the sending the identifier registration and resolution request carrying the target detection data to the detected identifier resolution node comprises:
and sending different numbers of identifier registration and analysis requests carrying the target detection data to the detected identifier analysis node for multiple times, wherein the number of the requests sent each time is more than that of the requests sent last time.
8. The method according to any of claims 1-7, wherein the detected identity resolution node further comprises: and analyzing the nodes aiming at the marks customized by the enterprises in advance.
9. An apparatus for detecting and invoking secondary node capabilities of an industrial internet identity, comprising:
a determining module, configured to determine an identifier encoding format supported by a detected identifier parsing node, where the determined identifier encoding format is used as a target identifier encoding format, and the detected identifier parsing node is at least: analyzing a secondary node by the detected identifier;
the acquisition module is used for acquiring preset detection data;
the conversion module is used for converting the preset detection data into target detection data, and the identification coding format of the target detection data is the same as that of the target identification coding format;
a sending module, configured to send an identifier registration and analysis request carrying the target detection data to the detected identifier analysis node;
and the detection module is used for analyzing the capability of the analyzed node of the detected identifier based on the result when the result generated by responding to the identifier registration and analysis request by the analyzed node of the detected identifier is received.
10. The apparatus of claim 9, wherein the results comprise a registration result and a parsing result; and/or, in the case of hardware performance index data, the detection module is specifically configured to:
according to the target coding format, the registration result and the analysis result are respectively interpreted to respectively obtain a registration interpretation result and an analysis interpretation result;
respectively analyzing the registration capability and the analysis capability of the analyzed node of the detected identifier by comparing the registration interpretation result with a predetermined reference registration result and comparing the analysis interpretation result with a predetermined reference analysis result;
and/or the presence of a gas in the gas,
and analyzing the hardware performance of the detected identification analysis node by comparing the hardware performance index data with predetermined reference hardware performance index data.
CN202010895237.6A 2020-08-31 2020-08-31 Method and device for detecting and calling secondary node capability of industrial internet identifier Active CN112003872B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010895237.6A CN112003872B (en) 2020-08-31 2020-08-31 Method and device for detecting and calling secondary node capability of industrial internet identifier

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010895237.6A CN112003872B (en) 2020-08-31 2020-08-31 Method and device for detecting and calling secondary node capability of industrial internet identifier

Publications (2)

Publication Number Publication Date
CN112003872A true CN112003872A (en) 2020-11-27
CN112003872B CN112003872B (en) 2022-07-08

Family

ID=73466286

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010895237.6A Active CN112003872B (en) 2020-08-31 2020-08-31 Method and device for detecting and calling secondary node capability of industrial internet identifier

Country Status (1)

Country Link
CN (1) CN112003872B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114124741A (en) * 2021-10-28 2022-03-01 北京中科院软件中心有限公司 Industrial Internet identification resolving capability test method and system
CN116074218A (en) * 2023-04-07 2023-05-05 中国信息通信研究院 Pressure test method, device, equipment and medium for identifying analysis node

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106100955A (en) * 2016-06-23 2016-11-09 北京东土科技股份有限公司 A kind of industry internet field layer wideband bus data depth detection implementation method
WO2016189084A1 (en) * 2015-05-26 2016-12-01 Abb Schweiz Ag Social media and industrial internet of things
US20190041844A1 (en) * 2016-05-09 2019-02-07 Strong Force Iot Portfolio 2016, Llc Methods and systems for detection in an industrial internet of things data collection environment with noise pattern recognition with hierarchical data storage for boiler and pipeline systems
CN109587160A (en) * 2018-12-19 2019-04-05 广州联达信息科技有限公司 A kind of data transfer device, device, readable storage medium storing program for executing and industrial equipment
CN109861975A (en) * 2018-12-26 2019-06-07 中国科学院计算机网络信息中心 Identifier register information query method and system towards industry internet
CN109995790A (en) * 2019-04-11 2019-07-09 广东电网有限责任公司 A kind of node identities authentication method, device and the equipment of industry internet
CN111209596A (en) * 2020-04-21 2020-05-29 国网电子商务有限公司 Block chain-based industrial internet identification analysis access control method
CN111290965A (en) * 2020-03-06 2020-06-16 腾讯科技(深圳)有限公司 Test method, test device, computer equipment and storage medium
CN111510339A (en) * 2020-03-09 2020-08-07 中国信息通信研究院 Industrial Internet data monitoring method and device

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016189084A1 (en) * 2015-05-26 2016-12-01 Abb Schweiz Ag Social media and industrial internet of things
US20190041844A1 (en) * 2016-05-09 2019-02-07 Strong Force Iot Portfolio 2016, Llc Methods and systems for detection in an industrial internet of things data collection environment with noise pattern recognition with hierarchical data storage for boiler and pipeline systems
CN106100955A (en) * 2016-06-23 2016-11-09 北京东土科技股份有限公司 A kind of industry internet field layer wideband bus data depth detection implementation method
CN109587160A (en) * 2018-12-19 2019-04-05 广州联达信息科技有限公司 A kind of data transfer device, device, readable storage medium storing program for executing and industrial equipment
CN109861975A (en) * 2018-12-26 2019-06-07 中国科学院计算机网络信息中心 Identifier register information query method and system towards industry internet
CN109995790A (en) * 2019-04-11 2019-07-09 广东电网有限责任公司 A kind of node identities authentication method, device and the equipment of industry internet
CN111290965A (en) * 2020-03-06 2020-06-16 腾讯科技(深圳)有限公司 Test method, test device, computer equipment and storage medium
CN111510339A (en) * 2020-03-09 2020-08-07 中国信息通信研究院 Industrial Internet data monitoring method and device
CN111209596A (en) * 2020-04-21 2020-05-29 国网电子商务有限公司 Block chain-based industrial internet identification analysis access control method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
SOMNATH PAUL\T.V. SARATH: ""End to End IoT Based Hazard Monitoring System"", 《2018 INTERNATIONAL CONFERENCE ON INVENTIVE RESEARCH IN COMPUTING APPLICATIONS (ICIRCA)》 *
任语铮、谢人超、曾诗钦、赵浩然、喻嘉义: ""工业互联网标识解析体系综述"", 《通信学报》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114124741A (en) * 2021-10-28 2022-03-01 北京中科院软件中心有限公司 Industrial Internet identification resolving capability test method and system
CN116074218A (en) * 2023-04-07 2023-05-05 中国信息通信研究院 Pressure test method, device, equipment and medium for identifying analysis node
CN116074218B (en) * 2023-04-07 2023-06-02 中国信息通信研究院 Pressure test method, device, equipment and medium for identifying analysis node

Also Published As

Publication number Publication date
CN112003872B (en) 2022-07-08

Similar Documents

Publication Publication Date Title
CN108563768B (en) Data conversion method, device, equipment and storage medium for different data models
CN112003872B (en) Method and device for detecting and calling secondary node capability of industrial internet identifier
CN107229566B (en) Method and system for maintaining functional consistency of SOA service conversion language
CN109543891B (en) Method and apparatus for establishing capacity prediction model, and computer-readable storage medium
CN114490268A (en) Full link monitoring method, device, equipment, storage medium and program product
CN110267215B (en) Data detection method, equipment and storage medium
CN115658441B (en) Method, equipment and medium for monitoring abnormality of household service system based on log
CN112016285B (en) Logistics information processing method and processing system
JP2021140430A (en) Database migration method, database migration system, and database migration program
CN115933591A (en) Controller diagnosis method, device, equipment and storage medium
CN110875832A (en) Abnormal service monitoring method, device and system and computer readable storage medium
CN115220992A (en) Interface change monitoring method and device, computer equipment and storage medium
CN113923204A (en) Request forwarding method, device, equipment and readable storage medium
CN112054989B (en) Construction method of detection model and detection method of batch operation abnormity
CN110784559B (en) DNS analysis delay acquisition method and device
CN110362464B (en) Software analysis method and equipment
JP2009181494A (en) Job processing system and job information acquisition method
CN112596974A (en) Full link monitoring method, device, equipment and storage medium
CN111353279A (en) Character code conversion method, device and computer storage medium
CN112084445A (en) Information processing system, method and apparatus, storage medium
CN116170514B (en) Service policy calling implementation method and system for middle-station business
CN109587046B (en) Data processing method and gateway system
CN113282304B (en) System for identifying virtual machine based on app installation list
CN117370052B (en) Microservice fault analysis method, device, equipment and storage medium
CN113285855B (en) Server monitoring method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant