CN114374644B - Industrial Internet identification analysis method and system based on infrastructure logic architecture - Google Patents

Industrial Internet identification analysis method and system based on infrastructure logic architecture Download PDF

Info

Publication number
CN114374644B
CN114374644B CN202111583418.6A CN202111583418A CN114374644B CN 114374644 B CN114374644 B CN 114374644B CN 202111583418 A CN202111583418 A CN 202111583418A CN 114374644 B CN114374644 B CN 114374644B
Authority
CN
China
Prior art keywords
data transmission
address
control node
node information
transmission line
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111583418.6A
Other languages
Chinese (zh)
Other versions
CN114374644A (en
Inventor
刘小峰
仲伟
陈浩
孙晓宇
陈金润
陈佳慧
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yantai Dongfang Ruichuangda Electronic Technology Co ltd
Original Assignee
Yantai Dongfang Ruichuangda Electronic Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yantai Dongfang Ruichuangda Electronic Technology Co ltd filed Critical Yantai Dongfang Ruichuangda Electronic Technology Co ltd
Priority to CN202111583418.6A priority Critical patent/CN114374644B/en
Publication of CN114374644A publication Critical patent/CN114374644A/en
Application granted granted Critical
Publication of CN114374644B publication Critical patent/CN114374644B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/24Multipath
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/22Alternate routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/28Routing or path finding of packets in data switching networks using route fault recovery

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The application relates to an industrial Internet identification analysis method and system based on infrastructure logic architecture, and relates to the technical field of industrial Internet identification analysis; determining a first start address and a first end address according to the first control node information; generating a first data transmission line according to the determined first start address and first end address; if the first data transmission line is in a fault state, acquiring second control node information corresponding to the first control node information; determining a second destination address corresponding to the access destination address according to the second control node information; generating a second data transmission line according to the determined first endpoint address and the second endpoint address; and executing the steps of generating the data transmission instruction and executing according to the second data transmission line. The application has the effect of reducing the single point fault possibility of the control node.

Description

Industrial Internet identification analysis method and system based on infrastructure logic architecture
Technical Field
The application relates to the technical field of industrial Internet identification analysis, in particular to an industrial Internet identification analysis method and system based on an infrastructure logic architecture.
Background
With the rapid development of services in the internet age, the service modes of various industries are being changed significantly, and IT infrastructure is becoming more and more important as a bottom layer architecture of a bearing service system, so that resources are fully utilized, deployed rapidly and expanded flexibly.
The related art can refer to Chinese patent with publication number of CN112769862A, which discloses an industrial Internet identification analysis method comprising the following steps: inputting the identification code to be analyzed into a secondary node; starting from the second-level node, each-level node decomposes the input identification code into an identification field managed by the node and an identification field managed by the next-level node, and issues the identification field managed by the next-level node to the next-level node until the input identification code only contains the identification field managed by the node; each level of node analyzes the self-managed identification field to obtain an analysis result; starting from a final stage node, each stage node uploads an analysis result corresponding to the input identification code to a previous stage node until a second stage node receives the analysis result uploaded by a next stage node; and integrating the analysis result obtained by analysis and the received analysis result into a final analysis result by the secondary node.
With respect to the related art in the above, the inventors consider that there are the following drawbacks: in the operation process of the infrastructure platform, a data transmission mode controlled by a single node is adopted, data can be transmitted only through one transmission path in the transmission process, when a single control node fails, the control node is difficult to perform normal data transmission work, and the defect that the control node is easy to have single-point transmission failure exists.
Disclosure of Invention
In order to reduce the possibility of single-point faults of the control node, the application provides an industrial Internet identification analysis method and system based on an infrastructure logic architecture.
In a first aspect, the present application provides an industrial internet identifier parsing method based on an infrastructure logic architecture, which adopts the following technical scheme:
an industrial Internet identification analysis method based on an infrastructure logic architecture comprises the following steps:
receiving a data control request sent by a user, wherein the data control request carries data control information for accessing a user interface, the data control information comprises a user ID and access path sub-information corresponding to the user ID, and the access path sub-information comprises an access starting point address and an access end point address corresponding to the access starting point;
Acquiring first control node information according to the access path sub-information, wherein the first control node information comprises a first start point address corresponding to the access start point address and a first end point address corresponding to the access end point address;
determining the first start point address and the first end point address according to the first control node information;
generating a first data transmission line according to the determined first start point address and first end point address, wherein the first data transmission line is a data transmission path between the first start point address and the first end point address;
if the first data transmission line is in a normal state, generating a data transmission instruction according to the first data transmission line and executing the data transmission instruction;
if the first data transmission line is in a fault state, acquiring second control node information corresponding to the first control node information;
determining a second destination address corresponding to the access destination address according to the second control node information;
generating a second data transmission line according to the determined first endpoint address and the second endpoint address;
and executing the steps of generating the data transmission instruction and executing according to the second data transmission line.
By adopting the technical scheme, in the process of data access, if the first data transmission line has transmission faults, the control system automatically determines to generate the second data transmission line and performs data transmission work along the second data transmission line, so that line backup operation of data transmission is realized, and when the first data transmission line has transmission faults, normal operation of the data transmission work can still be ensured, thereby reducing the possibility of single-point faults of the control node.
Optionally, before the step of generating the data transmission instruction and executing the data transmission instruction according to the second data transmission line, the method further includes:
acquiring a line transmission state corresponding to the second data transmission line according to the second data transmission line;
if the line transmission state is a normal state, executing the step of generating the data transmission instruction and executing the data transmission instruction according to the second data transmission line;
if the line transmission state is a fault state, acquiring third control node information corresponding to the first control node information;
determining a third destination address corresponding to the access destination address according to the third control node information;
Generating a third data transmission line according to the determined first endpoint address and third endpoint address;
and executing the steps of generating the data transmission instruction and executing according to the third data transmission line.
Through adopting above-mentioned technical scheme, when transmission failure appears in second data transmission line, control system still can guarantee the normal transportation process of data through generating third data transmission line, makes dual guarantee for the transmission work of data, and then improves the reliability of data transmission process.
Optionally, before the step of generating and executing the data transmission instruction according to the first data transmission line, the method further includes:
acquiring a first data transmission amount corresponding to the first data transmission line according to the first data transmission line;
inquiring a first data transmission threshold value corresponding to the first data transmission quantity from a preset database;
and if the first data transmission quantity exceeds the first data transmission threshold value, executing the step of acquiring second control node information corresponding to the first control node information.
Through adopting above-mentioned technical scheme, when the data transmission pressure of first data transmission line is too big, control system acquires second data transmission line, makes unnecessary data can carry out transmission work through second data transmission line, and then realizes the transmission reposition of redundant personnel process of a large amount of data, reduces the data transmission pressure of first data transmission line.
Optionally, before the step of generating the data transmission instruction and executing the data transmission instruction according to the second data transmission line, the method further includes:
acquiring a second data transmission amount corresponding to the second data transmission line according to the second data transmission line;
inquiring a second data transmission threshold value corresponding to the second data transmission quantity from a preset database;
and if the second data transmission quantity exceeds the second data transmission threshold value, executing the step of acquiring third control node information corresponding to the first control node information.
By adopting the technical scheme, when the data transmission pressure of the second data transmission line is too high, the control system automatically acquires the third data transmission line, partial data is transmitted through the third data transmission line, the third data transmission line bears partial data transmission work, and the data transmission pressure of the first data transmission line and the second data transmission line is reduced.
Optionally, before the step of generating the data transmission instruction and executing the data transmission instruction according to the third data transmission line, the method further includes:
acquiring a third data transmission amount corresponding to the third data transmission line according to the third data transmission line;
Inquiring a third data transmission threshold value corresponding to the third data transmission quantity from a preset database;
if the third data transmission quantity exceeds the third data transmission threshold value, calling a line transmission state corresponding to the second data transmission line;
and if the line transmission state is a normal state, executing the step of generating the data transmission instruction and executing the step according to the second data transmission line.
By adopting the technical scheme, when the third data transmission quantity of the third data transmission line exceeds the third data transmission threshold value, the data transmission pressure of the third data transmission line is larger, the transmission process of the first data transmission line and the second data transmission line is also in an abnormal state, and the control system acquires the second data transmission line, so that the second data transmission line and the third data transmission line can share partial redundant data quantity, and the redundant data transmission quantity is not easy to accumulate on one transmission path.
Optionally, before the step of retrieving the line transmission status corresponding to the second data transmission line, the method further includes:
acquiring user rights corresponding to the user ID according to the user ID, wherein the user rights comprise common rights and advanced rights;
If the user authority corresponding to the user ID is the advanced authority, determining a second starting address corresponding to the access starting address according to the second control node information;
generating a second data transmission standby line according to the determined second starting address and second ending address;
and executing the steps of generating the data transmission instruction and executing according to the second data transmission standby line.
By adopting the technical scheme, when the user has the advanced rights, the control system automatically determines the second data transmission standby line for the current user, so that the advanced user can automatically transmit data through the second data transmission standby line, and the data transmission rate of the advanced user is further ensured.
Optionally, before the step of generating the data transmission instruction and executing the step according to the second data transmission standby line, the method further includes:
acquiring a second data transmission reserve quantity corresponding to the second data transmission reserve line according to the second data transmission reserve line;
inquiring a second data transmission reserve threshold corresponding to the second data transmission reserve amount from a preset database;
If the second data transmission reserve amount exceeds the second data transmission reserve threshold, determining a third starting address corresponding to the access starting address according to the third control node information;
generating a third data transmission standby line according to the determined third starting address and third ending address;
and executing the steps of generating the data transmission instruction and executing according to the third data transmission standby line.
By adopting the technical scheme, when the second data transmission standby line is also in a saturated state, the control system automatically determines the third data transmission standby line for the advanced user, so that the third data transmission standby line can provide a standby transmission scheme for the data transmission process of the advanced user, and the advanced user can transmit data in multiple ways.
In a second aspect, the present application provides an industrial internet identifier analysis system based on an infrastructure logic architecture, which adopts the following technical scheme:
an industrial internet identification resolution system based on infrastructure logic architecture, comprising:
the data control request receiving module is used for receiving a data control request sent by a user, wherein the data control request carries data control information for accessing a user interface, the data control information comprises a user ID and access path sub-information corresponding to the user ID, and the access path sub-information comprises an access starting point address and an access end point address corresponding to the access starting point;
The first control node information acquisition module is used for acquiring first control node information according to the access path sub-information, wherein the first control node information comprises a first start point address corresponding to the access start point address and a first end point address corresponding to the access end point address;
the first control node information determining module is used for determining the first start point address and the first end point address according to the first control node information;
the first data transmission line generation module is used for generating a first data transmission line according to the determined first start point address and the first end point address, wherein the first data transmission line is a data transmission path between the first start point address and the first end point address;
the data transmission instruction generation module is used for generating and executing a data transmission instruction according to the first data transmission line if the first data transmission line is in a normal state;
the second control node information acquisition module is used for acquiring second control node information corresponding to the first control node information if the first data transmission line is in a fault state;
The second control node information determining module is used for determining a second destination address corresponding to the access destination address according to the second control node information;
the second data transmission line generation module is used for generating a second data transmission line according to the determined first start point address and the second end point address;
and the data transmission instruction standby generation module is used for executing the steps of generating the data transmission instruction and executing according to the second data transmission line.
In a third aspect, the present application provides an intelligent terminal, which adopts the following technical scheme:
an intelligent terminal comprising a memory and a processor, the memory having stored thereon a computer program capable of being loaded by the processor and performing any of the infrastructure-based logical architecture industrial internet identification resolution methods described above.
In a fourth aspect, the present application provides a computer readable storage medium, which adopts the following technical scheme:
a computer readable storage medium storing a computer program capable of being loaded by a processor and executing any of the infrastructure-based industrial internet identification resolution methods described above.
In summary, the present application includes at least one of the following beneficial technical effects:
In the process of data access, if a first data transmission line has transmission faults, the control system automatically determines to generate a second data transmission line, and performs data transmission work along the second data transmission line, so that line backup operation of data transmission is realized, and when the first data transmission line has transmission faults, normal operation of the data transmission work can still be ensured, thereby reducing the possibility of single-point faults of the control node.
When the data transmission pressure of the first data transmission line is overlarge, the control system acquires the second data transmission line, so that redundant data can be transmitted through the second data transmission line, a transmission diversion process of a large amount of data is further realized, and the data transmission pressure of the first data transmission line is reduced.
When the third data transmission quantity of the third data transmission line exceeds the third data transmission threshold, the data transmission pressure of the third data transmission line is larger, the transmission process of the first data transmission line and the second data transmission line is in an abnormal state, and the control system acquires the second data transmission line, so that the second data transmission line and the third data transmission line can share partial redundant data quantity, and redundant data transmission quantity is not easy to accumulate on one transmission path.
Drawings
Fig. 1 is a flow chart of an industrial internet identification parsing method based on an infrastructure logic architecture according to an embodiment of the present application.
Fig. 2 is a flowchart of acquiring a first data transmission amount corresponding to a first data transmission line according to an embodiment of the present application.
FIG. 3 is a flow chart of determining a third destination address corresponding to an access destination address according to an embodiment of the present application.
Fig. 4 is a flowchart of acquiring a second data transmission amount corresponding to a second data transmission line according to an embodiment of the present application.
Fig. 5 is a flowchart of querying a preset database for a third data transmission threshold corresponding to a third data transmission amount according to an embodiment of the present application.
Fig. 6 is a schematic flow chart of generating a second data transmission standby line in an embodiment of the application.
Fig. 7 is a schematic flow chart of a third data transmission backup line according to an embodiment of the present application.
FIG. 8 is a block diagram of an industrial Internet identification resolution system based on an infrastructure logic architecture in accordance with an embodiment of the application.
Reference numerals illustrate: 1. a data control request receiving module; 2. the first control node information acquisition module; 3. a first control node information determination module; 4. a first data transmission line generation module; 5. a data transmission instruction generation module; 6. the second control node information acquisition module; 7. a second control node information determination module; 8. a second data transmission line generation module; 9. and the data transmission instruction standby generation module.
Detailed Description
The application is described in further detail below with reference to fig. 1-8.
The embodiment of the application discloses an industrial Internet identification analysis method and system based on an infrastructure logic architecture.
Referring to fig. 1, an industrial internet identification parsing method based on an infrastructure logic architecture includes:
s101, receiving a data control request sent by a user.
Specifically, when a user performs data access operation on the cloud platform through the infrastructure architecture, the user operates the own intelligent terminal, for example: and the intelligent mobile phone, the notebook computer and the like send a data control request to the control system.
The data control request carries data control information for accessing the user interface, the data control information comprises a user ID and access path sub-information corresponding to the user ID, and the access path sub-information comprises an access starting point address and an access end point address corresponding to the access starting point.
S102, acquiring first control node information.
Specifically, the control system acquires first control node information according to access path sub-information sent by a current user. The first control node information comprises a plurality of different data addresses, and the first control node information comprises a first start point address corresponding to an access start point address and a first end point address corresponding to an access end point address.
S103, determining a first endpoint address and a first endpoint address.
Specifically, after the control system acquires the first control node information, the control system searches a first start point address corresponding to the access start point address and a first end point address corresponding to the access end point address according to a plurality of data access addresses preset in the first control node information, and further determines the first start point address and the first end point address.
S104, generating a first data transmission line.
Specifically, the control system generates a first data transmission line according to the determined first start address and the first end address, wherein the first data transmission line is a data transmission path between the first start address and the first end address.
S105, if the first data transmission line is in a normal state, generating a data transmission instruction and executing the data transmission instruction.
Specifically, the control system judges whether the first data transmission line can normally perform data transmission work at the moment according to the current transmission state of the first data transmission line, and if the first data transmission line is in a normal state, the control system generates a data transmission instruction according to the first data transmission line and executes the data transmission instruction. The data transmission instruction is used for controlling user data to carry out transmission operation along the first data transmission line.
S106, if the first data transmission line is in a fault state, acquiring second control node information corresponding to the first control node information.
Specifically, if the control system determines that the first data transmission line cannot normally perform the data transmission operation at this time, it indicates that the first data transmission line is in a fault state at this time. The control system acquires second control node information corresponding to the first control node information. The second control node information comprises transmission address data which corresponds to the first control node information and is the same as the first control node information.
S107, determining a second destination address corresponding to the access destination address.
Specifically, the control system compares the access destination address with each transmission address data in the second control node information one by one, so as to determine a second destination address corresponding to the access destination address.
S108, generating a second data transmission line.
Specifically, the control system generates a second data transmission line according to the determined first endpoint address and the determined second endpoint address. The second data transmission line is a data transmission path between the first endpoint address and the second endpoint address. The second data transmission line implements a path setup function between the first control node information and the second control node information.
S109, executing the step of generating and executing the data transmission instruction.
Specifically, the control system executes the steps of generating the data transmission instruction and executing the data transmission instruction according to the second data transmission line. In the process of data access, if a first data transmission line has transmission faults, the control system can automatically determine to generate a second data transmission line, and perform subsequent data transmission work along the second data transmission line, so as to realize line backup operation of data transmission.
Referring to fig. 2, the step of acquiring the second control node information according to the first data transmission amount before S105 specifically includes the following steps:
s201, a first data transmission amount corresponding to the first data transmission line is acquired.
Specifically, the control system obtains a first data transmission amount corresponding to the first data transmission line according to the first data transmission line. When the first data transmission line is in a normal working state, the control system detects the data transmission quantity of the first data transmission line at the moment, and further obtains the first data transmission quantity corresponding to the first data transmission line.
S202, inquiring a first data transmission threshold corresponding to the first data transmission amount from a preset database.
Specifically, after the control system obtains the first data transmission amount corresponding to the first data transmission line, the control system needs to analyze and judge the specific operation degree of the first data transmission amount, and queries a first data transmission threshold corresponding to the first data transmission amount from a preset database. The first data transmission threshold is the maximum data transmission amount which can be accommodated when the first data transmission line is in the optimal operation state.
S203, if the first data transmission amount exceeds the first data transmission threshold, executing the step of acquiring the second control node information corresponding to the first control node information.
Specifically, when the data transmission pressure of the first data transmission line is too high, the control system acquires second control node information corresponding to the first control node information, and further acquires the second data transmission line through subsequent operation, so that redundant data can be transmitted through the second data transmission line, and further the data transmission pressure of the first data transmission line is reduced.
Referring to fig. 3, a third data transmission line is further generated according to the line transmission state before S109, and specifically includes the following steps:
S301, acquiring a line transmission state corresponding to the second data transmission line.
Specifically, the control system acquires a line transmission state corresponding to the second data transmission line according to the second data transmission line. Before the control system performs a signal transmission process through the second data transmission line, it is first determined whether the data in the second data transmission line can perform a normal transmission operation.
S302, if the line transmission state is a normal state, executing the steps of generating a data transmission instruction and executing the data transmission instruction.
Specifically, if the control system determines that the line transmission state is a normal state, it indicates that the second data transmission line can transmit data at this time, and the control system executes a step of generating a data transmission instruction and executing the data transmission instruction according to the second data transmission line, and performs a transmission operation on the data through the second data transmission line.
S303, if the line transmission state is a fault state, acquiring third control node information corresponding to the first control node information.
Specifically, if the control system determines that the line transmission state is a fault state, it indicates that the second data transmission line cannot perform normal transmission operation on the data at this time, and the control system acquires the third control node information corresponding to the first control node information at this time, so as to enable the second standby path.
S304, determining a third destination address corresponding to the access destination address.
Specifically, the control system determines a third destination address corresponding to the access destination address according to the third control node information.
S305, a third data transmission line is generated.
Specifically, the control system generates a third data transmission line according to the determined first endpoint address and the determined third endpoint address. The control system generates a third data transmission line by establishing a communication connection relationship between the first endpoint address and the third endpoint address, thereby forming a second standby path required by data transmission.
S306, executing the steps of generating the data transmission instruction and executing the data transmission instruction.
Specifically, the control system executes the steps of generating the data transmission instruction and executing the data transmission instruction according to the third data transmission line. When the second data transmission line has transmission faults, the control system can still ensure the normal transmission process of the data by generating the third data transmission line, double guarantees are made for the transmission work of the data, and the reliability of the data transmission process is further improved.
Referring to fig. 4, the second data transmission amount further obtains the third control node information before S109, specifically including the following steps:
S401, acquiring a second data transmission quantity corresponding to the second data transmission line.
Specifically, the control system acquires a second data transmission amount corresponding to the second data transmission line according to the second data transmission line. And before the control system performs data transmission through the second data transmission line, acquiring a second data transmission amount corresponding to the second data transmission line in advance, and analyzing the data transmission state of the second data transmission line at the moment according to the second data transmission amount.
S402, inquiring a second data transmission threshold corresponding to the second data transmission amount from a preset database.
Specifically, after the control system acquires the second data transmission amount corresponding to the second data transmission line, a second data transmission threshold corresponding to the second data transmission amount is queried from a preset database, wherein the second data transmission threshold is the maximum data amount which can be transmitted when the second data transmission line is in an optimal transmission state.
S403, if the second data transmission quantity exceeds the second data transmission threshold value, executing the step of acquiring the third control node information corresponding to the first control node information.
Specifically, when the data transmission pressure of the second data transmission line is too high, the control system acquires the third control node information corresponding to the first control node information, further automatically acquires the third data transmission line, transmits partial data through the third data transmission line, and the third data transmission line bears partial data transmission work to reduce the data transmission pressure of the first data transmission line and the second data transmission line.
Referring to fig. 5, the line transmission status is also retrieved according to the third data transmission amount before S306, which specifically includes the following steps:
s501, a third data transmission amount corresponding to the third data transmission line is acquired.
Specifically, the control system obtains a third data transmission amount corresponding to the third data transmission line according to the third data transmission line.
S502, inquiring a third data transmission threshold corresponding to the third data transmission amount from a preset database.
Specifically, after the control system obtains the third data transmission amount corresponding to the third data transmission line, a third data transmission threshold corresponding to the third data transmission amount is queried from a preset database, wherein the third data transmission threshold is the maximum data amount which can be transmitted when the third data transmission line is in an optimal transmission state.
S503, if the third data transmission amount exceeds the third data transmission threshold, the line transmission state corresponding to the second data transmission line is called.
Specifically, when the third data transmission amount of the third data transmission line exceeds the third data transmission threshold, it is indicated that the data transmission pressure of the third data transmission line is large at this time. Since the third data transmission line is in the enabled state, it is explained that the transmission process of the first data transmission line and the second data transmission line is also in an abnormal state at this time, and there is a problem of transmission failure or an excessive data transmission amount.
In the actual use process, when the manager finds that the first data transmission line has a data transmission fault, the manager needs to perform timely maintenance and inspection processing on all the data transmission lines, so that in the transmission process, the first data transmission line has a transmission fault and the situation that the manager needs to rely on the second data transmission line and the third data transmission line to perform data transmission occurs sometimes.
When the third data transmission quantity of the third data transmission line exceeds a third data transmission threshold, the control system invokes the line transmission state corresponding to the second data transmission line, so as to identify and judge whether the second data transmission line is in a fault state at the moment. If the second data transmission line is in a fault state, it is stated that it is likely that only the third data transmission line is able to perform normal data transmission operation at this time.
S504, if the line transmission state is a normal state, executing the steps of generating a data transmission instruction and executing.
Specifically, if the line transmission state is a normal state, executing the step of generating a data transmission instruction and executing the data transmission instruction according to the second data transmission line. At this time, the control system can make the second data transmission line and the third data transmission line share the partial redundant data amount by acquiring the second data transmission line, so that the redundant data transmission amount is not easy to be accumulated on one transmission path.
Referring to fig. 6, a second data transmission standby line is also generated according to the user authority before S503, which specifically includes the following steps:
s601, acquiring user rights corresponding to the user ID.
Specifically, the control system obtains the user authority corresponding to the user ID according to the user ID, wherein the user authority comprises the common authority and the advanced authority. When the pressure of the third data transmission line for transmitting data is high, the control system acquires the user authority corresponding to the current user ID, and further identifies and judges whether the current user has the advanced authority.
S602, if the user authority corresponding to the user ID is the advanced authority, determining a second starting address corresponding to the access starting address.
Specifically, if the user authority corresponding to the current user ID is the advanced authority, the control system redetermines the second start address corresponding to the access start address according to the second control node information.
S603, generating a second data transmission standby line.
Specifically, the control system generates a second data transmission standby line according to the determined second starting address and the determined second ending address. The second data transmission standby line is a data transmission path between the second start address and the second end address.
S604, executing the step of generating and executing the data transmission instruction.
Specifically, the control system executes the steps of generating the data transmission instruction and executing the data transmission instruction according to the second data transmission standby line. When the user has the advanced rights, the control system automatically determines a second data transmission standby line for the current user, so that the advanced user can automatically transmit data through the second data transmission standby line, and the data transmission rate of the advanced user is further ensured.
Referring to fig. 7, a third data transmission backup line is further generated according to the second data transmission backup amount before S604, and specifically includes the following steps:
s701, obtaining a second data transmission reserve amount corresponding to the second data transmission reserve line.
Specifically, the control system acquires a second data transmission reserve amount corresponding to the second data transmission reserve line according to the second data transmission reserve line. The control system pre-acquires a second data transmission reserve corresponding to the second data transmission reserve line before the step of transmitting data, and further identifies a transmission state of data in the second data transmission reserve line.
S702, inquiring a second data transmission reserve threshold corresponding to the second data transmission reserve amount from a preset database.
Specifically, after the control system obtains the second data transmission reserve amount corresponding to the second data transmission reserve line, a second data transmission reserve threshold corresponding to the second data transmission reserve amount is queried from a preset database, wherein the second data transmission reserve threshold is used for reflecting the maximum value which can be reached by the second data transmission reserve amount when the second data transmission reserve line is in an optimal transmission state.
S703, if the second data transmission reserve exceeds the second data transmission reserve threshold, determining a third start address corresponding to the access start address.
Specifically, if the second data transmission reserve exceeds the second data transmission reserve threshold, it indicates that the transmission state of the second data transmission reserve line is not good at this time, and the control system determines, according to the third control node information, a third start address corresponding to the access start address.
S704, a third data transmission backup line is generated.
Specifically, the control system generates a third data transmission standby line according to the determined third starting address and the determined third ending address.
S705, the step of generating a data transfer instruction and executing is performed.
Specifically, the control system executes the steps of generating the data transmission instruction and executing the data transmission instruction according to the third data transmission standby line. When the second data transmission standby line is also in a saturated state, the control system automatically determines a third data transmission standby line for the advanced user, so that the third data transmission standby line can provide a standby transmission scheme for the data transmission process of the advanced user, and the multi-path data transmission process of the advanced user is realized.
The implementation principle of the industrial Internet identification analysis method based on the infrastructure logic architecture in the embodiment of the application is as follows: in the process of data access, if a first data transmission line has transmission faults, the control system automatically determines to generate a second data transmission line and performs data transmission work along the second data transmission line so as to realize line backup operation of data transmission. When the second data transmission line has transmission faults, the control system can still ensure the normal transmission process of the data by generating the third data transmission line, double guarantees are made for the transmission work of the data, and the reliability of the data transmission process is further improved.
Based on the method, the embodiment of the application also discloses an industrial Internet identification analysis system based on the infrastructure logic architecture. Referring to fig. 8, an industrial internet identification resolution system based on infrastructure logic architecture, comprising:
the data control request receiving module 1 is configured to receive a data control request sent by a user, where the data control request carries data control information for accessing a user interface, the data control information includes a user ID and access path sub-information corresponding to the user ID, and the access path sub-information includes an access start address and an access end address corresponding to the access start address.
The first control node information acquisition module 2 is configured to acquire first control node information according to the access path sub-information, where the first control node information includes a first start address corresponding to an access start address and a first end address corresponding to an access end address.
The first control node information determining module 3, the first control node information determining module 3 is configured to determine a first start address and a first end address according to the first control node information.
The first data transmission line generating module 4, the first data transmission line generating module 4 is configured to generate a first data transmission line according to the determined first start address and the first end address, where the first data transmission line is a data transmission path between the first start address and the first end address.
The data transmission instruction generating module 5, the data transmission instruction generating module 5 is configured to generate and execute a data transmission instruction according to the first data transmission line if the first data transmission line is in a normal state.
The second control node information obtaining module 6, the second control node information obtaining module 6 is configured to obtain second control node information corresponding to the first control node information if the first data transmission line is in a fault state.
The second control node information determining module 7, the second control node information determining module 7 is configured to determine a second destination address corresponding to the access destination address according to the second control node information.
The second data transmission line generating module 8, the second data transmission line generating module 8 is configured to generate a second data transmission line according to the determined first endpoint address and the determined second endpoint address.
The data transmission instruction standby generation module 9, the data transmission instruction standby generation module 9 is configured to execute the steps of generating and executing the data transmission instruction according to the second data transmission line.
The embodiment of the application also discloses an intelligent terminal which comprises a memory and a processor, wherein the memory stores a computer program which can be loaded by the processor and execute the industrial Internet identification analysis method based on the infrastructure logic architecture.
The embodiment of the application also discloses a computer readable storage medium. A computer-readable storage medium has stored thereon a computer program that can be loaded by a processor and that performs the industrial internet identification resolution method based on the infrastructure logic architecture as described above, the computer-readable storage medium comprising, for example: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
The above embodiments are only for illustrating the technical solution of the present invention, and not for limiting the scope of the present invention. It will be apparent that the described embodiments are merely some, but not all, embodiments of the invention. Based on these embodiments, all other embodiments that may be obtained by one of ordinary skill in the art without inventive effort are within the scope of the invention. Although the present invention has been described in detail with reference to the above embodiments, those skilled in the art may still combine, add or delete features of the embodiments of the present invention or make other adjustments according to circumstances without any conflict, so as to obtain different technical solutions without substantially departing from the spirit of the present invention, which also falls within the scope of the present invention.

Claims (10)

1. The industrial Internet identification analysis method based on the infrastructure logic architecture is characterized by comprising the following steps of:
receiving a data control request sent by a user, wherein the data control request carries data control information for accessing a user interface, the data control information comprises a user ID and access path sub-information corresponding to the user ID, and the access path sub-information comprises an access starting point address and an access end point address corresponding to the access starting point;
Acquiring first control node information according to the access path sub-information, wherein the first control node information comprises a first start point address corresponding to the access start point address and a first end point address corresponding to the access end point address;
determining the first start point address and the first end point address according to the first control node information;
the first control node information includes a plurality of different data addresses;
after the control system acquires the first control node information, the control system searches a first start point address corresponding to the access start point address and a first end point address corresponding to the access end point address respectively according to a plurality of data access addresses preset in the first control node information, and further determines the first start point address and the first end point address;
generating a first data transmission line according to the determined first start point address and first end point address, wherein the first data transmission line is a data transmission path between the first start point address and the first end point address;
if the first data transmission line is in a normal state, generating a data transmission instruction according to the first data transmission line and executing the data transmission instruction;
If the first data transmission line is in a fault state, acquiring second control node information corresponding to the first control node information;
determining a second destination address corresponding to the access destination address according to the second control node information;
the second control node information comprises transmission address data which corresponds to the first control node information and is the same as the first control node information;
the control system compares the access terminal address with each transmission address data in the second control node information one by one, and further determines a second terminal address corresponding to the access terminal address;
generating a second data transmission line according to the determined first endpoint address and the second endpoint address;
and executing the steps of generating the data transmission instruction and executing according to the second data transmission line.
2. The infrastructure-based logical architecture industrial internet identification resolution method of claim 1, further comprising, prior to the step of generating and executing the data transmission instructions according to the second data transmission line:
acquiring a line transmission state corresponding to the second data transmission line according to the second data transmission line;
If the line transmission state is a normal state, executing the step of generating the data transmission instruction and executing the data transmission instruction according to the second data transmission line;
if the line transmission state is a fault state, acquiring third control node information corresponding to the first control node information;
determining a third destination address corresponding to the access destination address according to the third control node information;
generating a third data transmission line according to the determined first endpoint address and third endpoint address;
and executing the steps of generating the data transmission instruction and executing according to the third data transmission line.
3. The infrastructure-based logic architecture industrial internet identification resolution method of claim 1, further comprising, prior to the step of generating and executing data transmission instructions from the first data transmission line:
acquiring a first data transmission amount corresponding to the first data transmission line according to the first data transmission line;
inquiring a first data transmission threshold value corresponding to the first data transmission quantity from a preset database;
and if the first data transmission quantity exceeds the first data transmission threshold value, executing the step of acquiring second control node information corresponding to the first control node information.
4. The infrastructure-based logic architecture industrial internet identification resolution method of claim 2, further comprising, prior to the step of generating and executing the data transmission instructions according to the second data transmission line:
acquiring a second data transmission amount corresponding to the second data transmission line according to the second data transmission line;
inquiring a second data transmission threshold value corresponding to the second data transmission quantity from a preset database;
and if the second data transmission quantity exceeds the second data transmission threshold value, executing the step of acquiring third control node information corresponding to the first control node information.
5. The infrastructure-based logic architecture industrial internet identification resolution method of claim 4, further comprising, prior to the step of generating and executing the data transmission instructions according to the third data transmission line:
acquiring a third data transmission amount corresponding to the third data transmission line according to the third data transmission line;
inquiring a third data transmission threshold value corresponding to the third data transmission quantity from a preset database;
If the third data transmission quantity exceeds the third data transmission threshold value, calling a line transmission state corresponding to the second data transmission line;
and if the line transmission state is a normal state, executing the step of generating the data transmission instruction and executing the step according to the second data transmission line.
6. The infrastructure-based logic architecture industrial internet identification resolution method of claim 5, further comprising, prior to the step of invoking the line transmission status corresponding to the second data transmission line:
acquiring user rights corresponding to the user ID according to the user ID, wherein the user rights comprise common rights and advanced rights;
if the user authority corresponding to the user ID is the advanced authority, determining a second starting address corresponding to the access starting address according to the second control node information;
generating a second data transmission standby line according to the determined second starting address and second ending address;
and executing the steps of generating the data transmission instruction and executing according to the second data transmission standby line.
7. The infrastructure-based logic architecture industrial internet identification resolution method of claim 6, further comprising, prior to said executing said generating and executing data transmission instructions according to said second data transmission backup line:
Acquiring a second data transmission reserve quantity corresponding to the second data transmission reserve line according to the second data transmission reserve line;
inquiring a second data transmission reserve threshold corresponding to the second data transmission reserve amount from a preset database;
if the second data transmission reserve amount exceeds the second data transmission reserve threshold, determining a third starting address corresponding to the access starting address according to the third control node information;
generating a third data transmission standby line according to the determined third starting address and third ending address;
and executing the steps of generating the data transmission instruction and executing according to the third data transmission standby line.
8. An industrial internet identification analysis system based on an infrastructure logic architecture, which is characterized by comprising:
a data control request receiving module (1) for receiving a data control request sent by a user, wherein the data control request carries data control information for accessing a user interface, the data control information comprises a user ID and access path sub-information corresponding to the user ID, and the access path sub-information comprises an access start address and an access end address corresponding to the access start address;
A first control node information acquisition module (2) for acquiring first control node information according to the access path sub-information, wherein the first control node information comprises a first start point address corresponding to the access start point address and a first end point address corresponding to the access end point address;
the first control node information determining module (3) is used for determining a first start point address and a first end point address corresponding to an access end point address according to a plurality of data access addresses preset in the first control node information after the control system acquires the first control node information according to the first control node information;
a first data transmission line generating module (4) configured to generate a first data transmission line according to the determined first start point address and first end point address, where the first data transmission line is a data transmission path between the first start point address and the first end point address;
a data transmission instruction generating module (5) configured to generate and execute a data transmission instruction according to the first data transmission line if the first data transmission line is in a normal state;
A second control node information acquisition module (6) configured to acquire second control node information corresponding to the first control node information if the first data transmission line is in a failure state;
the second control node information determining module (7) is used for determining a second destination address corresponding to the access destination address by comparing the access destination address with each transmission address data in the second control node information one by one according to the second control node information, wherein the second control node information contains the same transmission address data corresponding to the first control node information;
a second data transmission line generation module (8) for generating a second data transmission line according to the determined first start address and second end address;
and the data transmission instruction standby generation module (9) is used for executing the steps of generating the data transmission instruction and executing according to the second data transmission line.
9. An intelligent terminal, its characterized in that: comprising a memory and a processor, said memory having stored thereon a computer program capable of being loaded by the processor and performing the method according to any of claims 1 to 7.
10. A computer-readable storage medium, characterized by: a computer program being stored which can be loaded by a processor and which performs the method according to any one of claims 1 to 7.
CN202111583418.6A 2021-12-22 2021-12-22 Industrial Internet identification analysis method and system based on infrastructure logic architecture Active CN114374644B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111583418.6A CN114374644B (en) 2021-12-22 2021-12-22 Industrial Internet identification analysis method and system based on infrastructure logic architecture

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111583418.6A CN114374644B (en) 2021-12-22 2021-12-22 Industrial Internet identification analysis method and system based on infrastructure logic architecture

Publications (2)

Publication Number Publication Date
CN114374644A CN114374644A (en) 2022-04-19
CN114374644B true CN114374644B (en) 2023-09-19

Family

ID=81140571

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111583418.6A Active CN114374644B (en) 2021-12-22 2021-12-22 Industrial Internet identification analysis method and system based on infrastructure logic architecture

Country Status (1)

Country Link
CN (1) CN114374644B (en)

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1934548A (en) * 2004-03-25 2007-03-21 索福帮Bb股份有限公司 Access system and access method
WO2011030498A1 (en) * 2009-09-10 2011-03-17 株式会社日立製作所 Data processing device and data processing method
CN103973638A (en) * 2013-01-28 2014-08-06 联想(北京)有限公司 Access control method, electronic equipment and server
CN104239222A (en) * 2013-06-20 2014-12-24 华为技术有限公司 Memory access method, device and system
CN106487768A (en) * 2015-08-31 2017-03-08 北京国双科技有限公司 A kind of file sharing method and device
CN108540816A (en) * 2018-03-28 2018-09-14 腾讯科技(深圳)有限公司 A kind of live video acquisition methods, device and storage medium
CN108880840A (en) * 2017-05-10 2018-11-23 中兴通讯股份有限公司 The method and apparatus for obtaining access path
US10516645B1 (en) * 2017-04-27 2019-12-24 Pure Storage, Inc. Address resolution broadcasting in a networked device
CN111177281A (en) * 2019-12-27 2020-05-19 山东英信计算机技术有限公司 Access control method, device, equipment and storage medium
CN111447282A (en) * 2020-03-31 2020-07-24 北京百度网讯科技有限公司 Method and apparatus for determining transmission path
CN111866211A (en) * 2020-07-13 2020-10-30 中国工商银行股份有限公司 Network access method, device, terminal and medium applied to terminal
CN112579931A (en) * 2020-12-11 2021-03-30 腾讯科技(深圳)有限公司 Network access analysis method and device, computer equipment and storage medium
CN113127477A (en) * 2019-12-30 2021-07-16 华为技术有限公司 Method and device for accessing database, computer equipment and storage medium
CN113676563A (en) * 2021-08-19 2021-11-19 平安普惠企业管理有限公司 Scheduling method, device, equipment and storage medium of content distribution network service

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112995028A (en) * 2018-06-30 2021-06-18 华为技术有限公司 Method, device and system for processing transmission path fault
US11736473B2 (en) * 2020-04-01 2023-08-22 Saurabh Shriniwas KALANTRI Identifiers and access tokens for privacy in centralized address management

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1934548A (en) * 2004-03-25 2007-03-21 索福帮Bb股份有限公司 Access system and access method
WO2011030498A1 (en) * 2009-09-10 2011-03-17 株式会社日立製作所 Data processing device and data processing method
CN103973638A (en) * 2013-01-28 2014-08-06 联想(北京)有限公司 Access control method, electronic equipment and server
CN104239222A (en) * 2013-06-20 2014-12-24 华为技术有限公司 Memory access method, device and system
CN106487768A (en) * 2015-08-31 2017-03-08 北京国双科技有限公司 A kind of file sharing method and device
US10516645B1 (en) * 2017-04-27 2019-12-24 Pure Storage, Inc. Address resolution broadcasting in a networked device
CN108880840A (en) * 2017-05-10 2018-11-23 中兴通讯股份有限公司 The method and apparatus for obtaining access path
CN108540816A (en) * 2018-03-28 2018-09-14 腾讯科技(深圳)有限公司 A kind of live video acquisition methods, device and storage medium
CN111177281A (en) * 2019-12-27 2020-05-19 山东英信计算机技术有限公司 Access control method, device, equipment and storage medium
CN113127477A (en) * 2019-12-30 2021-07-16 华为技术有限公司 Method and device for accessing database, computer equipment and storage medium
CN111447282A (en) * 2020-03-31 2020-07-24 北京百度网讯科技有限公司 Method and apparatus for determining transmission path
CN111866211A (en) * 2020-07-13 2020-10-30 中国工商银行股份有限公司 Network access method, device, terminal and medium applied to terminal
CN112579931A (en) * 2020-12-11 2021-03-30 腾讯科技(深圳)有限公司 Network access analysis method and device, computer equipment and storage medium
CN113676563A (en) * 2021-08-19 2021-11-19 平安普惠企业管理有限公司 Scheduling method, device, equipment and storage medium of content distribution network service

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于Google Maps API的基础数据属性空间化研究与实现;何琳;马李亚龙;张洁;李英杰;;电脑知识与技术(第30期);全文 *

Also Published As

Publication number Publication date
CN114374644A (en) 2022-04-19

Similar Documents

Publication Publication Date Title
US8559322B2 (en) Link state detection method and system
CN109495383B (en) Data processing method, device, communication system and network equipment
US11922059B2 (en) Method and device for distributed data storage
EP3364310A1 (en) Data processing method and device
CN110737668A (en) Data storage method, data reading method, related device and medium
CN112130758B (en) Data reading request processing method and system, electronic equipment and storage medium
CN101262479B (en) A network file share method, server and network file share system
CN111901421A (en) Data processing method and related equipment
CN101146130B (en) A method and system for transmitting data between clients
CN114374644B (en) Industrial Internet identification analysis method and system based on infrastructure logic architecture
CN107547605B (en) message reading and writing method based on node queue and node equipment
CN106202084A (en) Date storage method and data storage device
US7788379B2 (en) Network system and information processing method
CN113595894A (en) Communication method, device, equipment and medium between service nodes and client nodes
CN103841185A (en) Load balancing method and device
CN114666302B (en) Domain name resolution method, system, electronic device and storage medium
KR101213785B1 (en) Fault tolerance RFID Reader's dual connection method to RFID middleware
CN115987826B (en) Keyword blocking method for multiple data transmission links and related equipment
CN102055602B (en) Method, device and system for acquiring execution result
CN112737812A (en) Data transmission method and device
CN117319507A (en) Route connection method, device, electronic equipment and storage medium
CN108093002B (en) Synchronization method and device of information to be synchronized based on data state determination
CN114327295A (en) Distributed data access method and system
CN111092948A (en) Guiding method, guiding server, server and storage medium
CN118158022A (en) Multi-bus communication method, port machine edge computing equipment and related equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant