CN114500235B - Communication equipment safety management system based on Internet of things - Google Patents

Communication equipment safety management system based on Internet of things Download PDF

Info

Publication number
CN114500235B
CN114500235B CN202210356082.8A CN202210356082A CN114500235B CN 114500235 B CN114500235 B CN 114500235B CN 202210356082 A CN202210356082 A CN 202210356082A CN 114500235 B CN114500235 B CN 114500235B
Authority
CN
China
Prior art keywords
data
transmission
communication
transmitted
key characteristic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210356082.8A
Other languages
Chinese (zh)
Other versions
CN114500235A (en
Inventor
张欢
黄年宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Yuexun Communication Technology Co ltd
Original Assignee
Shenzhen Yuexun Communication Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Yuexun Communication Technology Co ltd filed Critical Shenzhen Yuexun Communication Technology Co ltd
Priority to CN202210356082.8A priority Critical patent/CN114500235B/en
Publication of CN114500235A publication Critical patent/CN114500235A/en
Application granted granted Critical
Publication of CN114500235B publication Critical patent/CN114500235B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0631Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Abstract

The invention discloses a communication equipment safety management system based on the Internet of things, which comprises a transmission data acquisition module, a data transmission analysis module, a data recovery verification module, a transmission quality evaluation module, a fault tracing simulation module and a data safety management module. The invention can know the transmission quality in the data communication transmission process by analyzing the communication transmission evaluation coefficient, screens the fault types of the wireless network bridges in the communication transmission process, tracks and eliminates the fault types, reduces the interference degree of interference factors on the communication transmission quality, improves the communication transmission quality, and performs encryption transmission scheduling control on the data to be transmitted, so as to improve the safety in the data transmission process, realize the self-adaptive and diversified encryption of the data to be transmitted, meet the requirements of different encryption degrees, and effectively protect the safety in the data transmission process.

Description

Communication equipment safety management system based on Internet of things
Technical Field
The invention belongs to the technical field of communication equipment management, and relates to a communication equipment safety management system based on the Internet of things.
Background
The wireless bridge, as the name implies, is a bridge of a wireless network, which can bridge communications between two or more networks, and besides the basic characteristics of a wired bridge, the wireless bridge operates in a frequency band of 2.4G or 5.8G, which is free from an application for a wireless license, so that the wireless bridge is more convenient to deploy than other wired network devices, and the transmission standard of the wireless bridge usually adopts the 802.11b or 802.11G, 802.11a and 802.11n standards.
The existing wireless network bridge has the following problems in the process of being used as a bridge for data transmission between two devices: the data loss of the wireless network bridge is serious in the transmission process, and the communication transmission quality is seriously influenced; under the condition of serious data loss, the wireless network bridge cannot detect the fault type in the transmission process of the wireless network bridge and cannot effectively check the fault type; the wireless network bridge has low safety factor in the data transmission process, has the risk of data theft, and cannot carry out encryption of different levels according to the safety required by the data; and the wireless network bridge cannot sequence the data transmission sequence when a plurality of front-end devices simultaneously transmit data to the same back-end device in the transmission process, so that the problems of data disorder, poor timeliness of data transmission and the like exist in the data receiving and transmitting process of the back-end device.
Disclosure of Invention
The invention aims to provide a communication equipment safety management system based on the Internet of things, which solves the problems in the background technology.
The purpose of the invention can be realized by the following technical scheme:
a communication equipment safety management system based on the Internet of things comprises a transmission data acquisition module, a data transmission analysis module, a data recovery verification module, a transmission quality evaluation module and a fault tracing simulation module;
the transmission data acquisition module is used for acquiring data transmitted by front-end equipment connected with the wireless network bridge and data received by back-end equipment; the data transmission analysis module is used for comparing the data sent by the front-end equipment with the data received by the back-end equipment, judging the quantity a of the lost communication character segments in the data transmission process and analyzing the data loss rate;
the data recovery and verification module is used for extracting the serial number of the lost communication character segment, feeding the serial number back to the wireless bridge, extracting the communication character segment corresponding to the serial number in the data sent by the front-end equipment, retransmitting the communication character segment to the back-end equipment, and detecting whether the retransmitted communication character segment is lost or not;
the transmission quality evaluation module is used for acquiring the time of the front-end equipment for transmitting data and the initial time and the final time of the back-end equipment for receiving the data, analyzing the transmission delay rate corresponding to the wireless network bridge for completely transmitting the data transmitted by the front-end equipment to the back-end equipment, extracting the times of repeated transmission, the number of communication character segments transmitted each time and the number of lost communication character segments in the same data transmission process, and analyzing a communication transmission evaluation coefficient by adopting a transmission quality evaluation model;
the fault tracing simulation module is used for simulating and inputting various fault types of the wireless network bridge in the using process, judging communication transmission evaluation coefficients corresponding to data transmitted by the wireless network bridge under various fault types, comparing the actually analyzed communication transmission evaluation coefficients with the communication transmission evaluation coefficients corresponding to various fault types input in a simulation mode, and screening out the fault type corresponding to the communication transmission evaluation coefficient under various fault types input in the simulation mode, which is closest to the actually analyzed communication transmission evaluation coefficient.
Further, the transmission delay rate
Figure 168187DEST_PATH_IMAGE001
The calculation formula of (c):
Figure 297817DEST_PATH_IMAGE002
Figure 846610DEST_PATH_IMAGE003
for the duration of the initial transmission,
Figure 403494DEST_PATH_IMAGE005
for the length of the final transmission time,
Figure 404948DEST_PATH_IMAGE006
and the transmission standard time length corresponding to the transmission distance between the front end equipment and the back end equipment.
Further, the transmission quality evaluation model is:
Figure 338269DEST_PATH_IMAGE007
Figure 903022DEST_PATH_IMAGE008
for the number of communication segments not lost during the transmission of the kth communication segment,
Figure 614494DEST_PATH_IMAGE009
the number of the communication character segments transmitted at the kth time is K, the number of times of repeated transmission in the same data transmission process is K, and E is more than or equal to 1.
Further, the fault tracing simulation module performs troubleshooting analysis on the transmission fault types of the wireless network bridge in the communication process of the front-end device and the back-end device, and adopts the following method:
step H1, extracting the communication transmission evaluation coefficient in the data transmission process, and screening out the fault type corresponding to the communication transmission evaluation coefficient under each fault type of the simulation input closest to the communication transmission evaluation coefficient;
step H2, checking and eliminating the fault types screened in the step H1;
step H3, detecting the communication transmission evaluation coefficient in the data transmission process again, comparing the communication transmission evaluation coefficient with the communication transmission evaluation coefficient in the step H1, if the communication transmission evaluation coefficient is larger than the communication transmission evaluation coefficient in the step H1, indicating that the fault type checked in the step H2 is wrong, and performing simulation detection again, otherwise, executing the step H4;
step H4, judging whether the transmission allowable error coefficient corresponding to the communication transmission evaluation coefficient in the step H3 is larger than a set numerical value, if so, screening the fault type corresponding to the communication transmission evaluation coefficient under each fault type of the analog input closest to the communication transmission evaluation coefficient, wherein the transmission allowable error coefficient is equal to the ratio of the difference between the communication transmission evaluation coefficient and the numerical value 1 to the numerical value 1;
and H5, repeating the steps H3-H4 until the transmission allowable error coefficient corresponding to the communication transmission evaluation coefficient is smaller than the set value.
The wireless network bridge fault detection system further comprises a data safety management module, wherein the data safety management module is used for receiving an abnormal transmission instruction sent by the data recovery verification module, extracting fault types existing in the wireless network bridge analyzed by the fault tracing simulation module according to the abnormal transmission instruction, and performing repair test on the existing fault types to test whether the detected fault types are eliminated or not, eliminate abnormal conditions in the data transmission process, and after the faults are eliminated, perform transmission scheduling control on data to be transmitted.
Further, the data security management module performs transmission scheduling control on data to be transmitted, specifically adopting the following method:
s1, obtaining key characteristic values in the data to be transmitted, and establishing a key characteristic value set A;
s2, extracting the occurrence frequency of each key characteristic value in the key characteristic value set A, and establishing a characteristic value frequency set B;
step S3, comparing the key characteristic value in the key characteristic value set A with the key characteristic value in the key characteristic value set Cj corresponding to the maximum encryption level to obtain a key characteristic value comparison set, and obtaining a key characteristic value comparison set under the same encryption levelThe weight coefficient corresponding to the key characteristic value under the key characteristic value set Cj is
Figure 40928DEST_PATH_IMAGE010
J is the encryption level, the value is 0, 1, 2 and 3, when j is equal to 3, the encryption level required by the data to be transmitted is the maximum, when j is equal to 0, the data to be transmitted does not need to be encrypted,
Figure 498978DEST_PATH_IMAGE011
the number of key characteristic values under the jth encryption level is;
s4, according to the key characteristic value comparison set in the step S3 and the occurrence frequency of the key characteristic values, counting the relevant matching coefficients to be encrypted between the data to be transmitted and the key characteristic value set with the maximum encryption level;
step S5, judging whether the relevant matching coefficient to be encrypted between the data to be transmitted and the key characteristic value set with the maximum encryption level is larger than a set threshold value, if so, encrypting the data to be transmitted according to the encryption level, and if not, executing step S6;
and S6, sequentially reducing the levels to be encrypted, sequentially comparing the key characteristic values in the key characteristic value set A with the key characteristic values in the key characteristic value set Cj for reducing the encryption level to count the related matching coefficients to be encrypted between the data set to be transmitted and the key characteristic value set for reducing the encryption level step by step, and repeating the step S5 and the step S6 until the related matching coefficients to be encrypted between the data to be transmitted and the key characteristic value set corresponding to the encryption level reduced step by step are greater than a set threshold value, and encrypting the data to be transmitted by the wireless bridge according to the encryption level corresponding to the related matching coefficients to be encrypted which are greater than the set threshold value.
Further, the calculation of the correlation matching coefficient to be encrypted
Figure DEST_PATH_IMAGE012
Figure 491205DEST_PATH_IMAGE013
Whether the f-th key characteristic value in the data to be transmitted exists in the key characteristic value set Cj under the j-th encryption level or not is judged, if so,
Figure 389891DEST_PATH_IMAGE013
a value of 1, if not present, then
Figure 365937DEST_PATH_IMAGE013
The value of the oxygen-containing gas is 0,
Figure DEST_PATH_IMAGE014
the number of times that the f-th key characteristic value in the key characteristic value set A appears in the data to be transmitted is used as the number of times.
Further, in the case where a plurality of front-end devices transmit data to the same back-end device, a data transmission scheduling and distributing module is needed to be added, the data transmission scheduling and distributing module is used for obtaining a plurality of front-end devices which send data to-be-transmitted instructions to the rear-end devices and time points corresponding to the data to-be-transmitted instructions sent by the front-end devices to the rear-end devices, sequencing the time points corresponding to the data to-be-transmitted instructions sent by the front-end devices to the rear-end devices, and taking the earliest time point as a starting point, dividing each front-end device at a fixed time interval, extracting data to be sent of each front-end device at the same time interval, analyzing the priority level corresponding to the data to be sent in each front-end device at the same time interval, and the front-end equipment with high priority in the same time interval preferentially transmits data to the back-end equipment.
Further, the data transmission scheduling and allocating module regulates and controls the priority level of data sent by each front-end device to the same back-end device in the same time interval, and the method comprises the following steps:
step F1, obtaining the time length occupied by the front Q times of data sent to the back end device by each front end device in the same time interval and the transmission delay rate corresponding to the transmission data
Figure 109902DEST_PATH_IMAGE015
V is the number of front-end devices in the same time interval,
Figure DEST_PATH_IMAGE016
the length of time for the front-end device to send data to the back-end device t times is v =1, 2.;
step F2, obtaining the number of communication character segments respectively contained in the data transmitted from the front end device to the back end device Q times before in step F1
Figure 471482DEST_PATH_IMAGE017
Figure 275490DEST_PATH_IMAGE017
The number of communication character segments contained in the data sent to the back-end equipment for the tth front-end equipment at the tth time;
step F3, analyzing the average duration corresponding to each communication character segment sent by each front-end device to the back-end device
Figure DEST_PATH_IMAGE018
Step F4, extracting the encryption grade of the data to be sent by each front-end device to the back-end device
Figure 473254DEST_PATH_IMAGE019
Step F5, adopting a priority level regulation and control model to numerically calculate the priority level of the data sent by each front-end device to the back-end device, numerically displaying the priority level regulation and control coefficient of the data sent by each front-end device to the back-end device at the same time interval, and determining the priority level of the data sent by each front-end device to the back-end device according to the sequence of the priority level regulation and control coefficients from large to small.
The invention has the beneficial effects that:
according to the communication equipment safety management system based on the Internet of things, the transmission data is analyzed in the process that the communication equipment is used as a data transmission bridge, so that the quantitative display of the data loss condition and the transmission delay condition existing in the data transmission process is obtained, the communication transmission evaluation coefficient can be analyzed by combining with the transmission quality evaluation model, the real-time transmission quality of the data in the transmission process is displayed, the influence caused by the fault of an interference source or the communication equipment in the data transmission process is displayed from the side, and the transmission interference factor is convenient to repair.
The invention carries out the fault tracing simulation through the fault tracing simulation module, can detect the fault types of the wireless network bridge in the data transmission process of the front-end equipment and the back-end equipment, particularly compares the communication transmission evaluation coefficient with the communication transmission evaluation coefficient corresponding to each fault type, can screen out at least one fault type in the communication transmission process one by one, realizes the fault tracing, can solve or reduce the interference factors interfering the communication transmission quality one by one, eliminates or reduces the interference degree of the interference factors on the communication transmission quality, and improves the communication transmission quality.
The data transmission method and the data transmission system have the advantages that the data to be transmitted are subjected to transmission scheduling control through the data security management module, the encryption grade is determined according to the data to be transmitted, the security in the data transmission process is improved, the encryption grade can be determined according to the data to be transmitted and the relevant matching coefficient to be encrypted between the encryption grades, the self-adaptive diversified encryption of the data to be transmitted is realized, the requirements of different encryption degrees are met, the security in the data transmission process is effectively protected, and the risk that the data is stolen in the data transmission process is prevented.
The invention adopts the data transmission scheduling and distributing module to determine the data transmission priority level when a plurality of front-end devices transmit data to the same back-end device, realizes the sequential regulation and control and distribution of data transmission to the back-end devices of each front-end device, ensures the orderliness of the data received by the back-end device, avoids the problem of data receiving disorder caused by the simultaneous transmission of data to the same back-end device by a plurality of front-end devices, and effectively ensures the timeliness of data transmission.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
A communication device safety management system based on the Internet of things mainly aims at a safety management system of a wireless bridge in a communication process, wherein the communication device takes the wireless bridge as a research object and comprises a transmission data acquisition module, a data transmission analysis module, a data recovery verification module, a transmission quality evaluation module, a fault tracing simulation module and a data safety management module.
The transmission data acquisition module is used for acquiring data transmitted by front-end equipment connected with the wireless network bridge and data received by back-end equipment, and transmitting the data transmitted by the front-end equipment and the data received by the back-end equipment to the data transmission analysis module.
The wireless network bridge establishes network connection with the front-end equipment and the back-end equipment respectively so as to transmit data sent by the front-end equipment to the back-end equipment through the wireless network bridge and realize a wireless mode of data transmission.
The data transmission analysis module is used for extracting data sent by the front-end equipment and data received by the back-end equipment, comparing the data received by the back-end equipment with the communication character segments in the data sent by the front-end equipment in sequence according to each communication character segment, judging the quantity a of the lost communication character segments in the data transmission process, and further counting the data loss rate
Figure DEST_PATH_IMAGE020
And A is the number of communication character segments contained in the data sent by the front-end equipment, and the serial number of the lost communication character segment is extracted and fed back to the data recovery and verification module.
If one or more data bits are lost in one communication character segment, the communication character segment belongs to data loss, the communication character segment is taken as a unit, and each communication character segment consists of 8 binary data bits, 1 start bit, 1 even check bit and 2 stop bits.
The data recovery and check module is used for extracting the serial number of the lost communication character segment, feeding the serial number back to the wireless bridge, extracting the communication character segment corresponding to the serial number in the data sent by the front-end equipment, retransmitting the communication character segment to the back-end equipment, detecting whether the retransmitted communication character segment is lost or not, if the retransmitted communication character segment is not lost, inserting the newly received communication character segment into the original lost data according to the sequence corresponding to the serial number of each communication character segment, enabling the back-end equipment to receive the integrity of the data sent by the front-end equipment and ensure that the data is organized and not disordered, if the communication character segment is continuously lost, continuously sending the data until the number of repeated transmission is greater than the set number limit, and simultaneously sending an abnormal transmission instruction to the data security management module.
The transmission quality evaluation module is used for acquiring the time of sending data by the front-end equipment and the initial time and the final time of receiving the data by the back-end equipment to obtain initial transmission time length and final transmission time length, analyzing the transmission delay rate corresponding to the fact that the wireless bridge completely sends the data sent by the front-end equipment to the back-end equipment according to the initial transmission time length, the final transmission time length and the set transmission standard time length, extracting the times of repeated transmission (the times of repeated transmission is less than K times, and K generally takes a value of 3 times) of the data recovery verification module in the same data transmission process, the number of communication character segments transmitted each time and the number of communication character segments lost in the communication character segment transmission process, analyzing a communication transmission evaluation coefficient by adopting a transmission quality evaluation model, wherein the communication transmission evaluation coefficient is used for reflecting the transmission quality of the same data in the transmission process, and indirectly reflects the degree of influence of the interference source or the fault on the data in the transmission process.
The data sent by the front-end equipment consists of a plurality of data packets, the data packets are sent by the Internet of things equipment at fixed time intervals under most conditions, and the time intervals among the data packets tend to be uniform. The initial time is the time point when the data is received by the back-end equipment for the first time, when the data is not lost in the data transmission process, the initial time and the final time for the back-end equipment to receive the data are the same, when the data is lost in the data transmission process, the final time for the back-end equipment to receive the data is the time point when the wireless network bridge completely re-transmits the lost data to the back-end equipment, and the time point when the back-end equipment completely receives the data transmitted by the front-end equipment is ensured to be used as the final time.
The initial transmission duration is a time difference corresponding to the time for the front-end equipment to initially transmit the data and the initial time for the back-end equipment to receive the data. The final transmission time length is a difference value between the final time when the back-end equipment completely receives the data sent by the front-end equipment and the time when the front-end equipment sends the data.
The data transmission table records the transmission time length corresponding to the transmission of the front-end equipment and the back-end equipment through the wireless network bridge under different transmission distances, wherein the transmission time length is the communication transmission time length under the condition of not being interfered by other interference sources and is used as the standard transmission time length under the transmission distance.
Transmission delay rate
Figure 20910DEST_PATH_IMAGE001
The calculation formula of (c):
Figure 502575DEST_PATH_IMAGE002
Figure 743064DEST_PATH_IMAGE021
is the time duration of the initial transmission,
Figure 162544DEST_PATH_IMAGE004
for the duration of the final transmission time,
Figure 513891DEST_PATH_IMAGE006
and the transmission standard time length corresponding to the transmission distance between the front end equipment and the back end equipment.
The transmission quality evaluation model is as follows:
Figure 584484DEST_PATH_IMAGE007
Figure 261453DEST_PATH_IMAGE008
the number of communication segments not lost during the transmission of the kth communication segment,
Figure 168229DEST_PATH_IMAGE009
the number of the communication character segments transmitted at the kth time is K, the number of times of repeated transmission in the same data transmission process is K, and E is larger than or equal to 1.
The communication transmission evaluation coefficient is inversely proportional to the data transmission quality, and when the data is transmitted once and E is equal to 1, the value of K is 1, and the same data is repeatedly transmitted for 3 times at most.
The fault tracing simulation module is used for simulating and inputting various fault types of the wireless network bridge in the using process, judging communication transmission evaluation coefficients corresponding to data transmitted by the wireless network bridge under various fault types, comparing the actually analyzed communication transmission evaluation coefficients with the communication transmission evaluation coefficients corresponding to the various fault types input in the simulation, screening out the fault type corresponding to the communication transmission evaluation coefficient under various fault types input in the simulation which is closest to the actually analyzed communication transmission evaluation coefficients so as to feed the fault type back to a worker, checking the screened fault type, if the communication transmission evaluation coefficient is still larger than 1 after checking, continuing to screen the fault until the difference value between the communication transmission evaluation coefficient and the numerical value 1 is in an allowable range, and performing fault tracing simulation on the fault tracing simulation module, the method can detect the fault types of the wireless network bridge in the data transmission process of the front-end equipment and the back-end equipment, reduce the communication interference in the transmission process of the wireless network bridge, and recalculate the communication transmission evaluation coefficient of the wireless network bridge when one fault type is screened out.
The fault tracing simulation module is used for checking and analyzing the transmission fault types of the wireless network bridge in the communication process of the front-end equipment and the back-end equipment, and the following method is adopted:
step H1, extracting the communication transmission evaluation coefficient in the data transmission process, and screening out the fault type corresponding to the communication transmission evaluation coefficient under each fault type of the simulation input closest to the communication transmission evaluation coefficient;
step H2, checking and eliminating the fault types screened in the step H1;
step H3, detecting the communication transmission evaluation coefficient in the data transmission process again, comparing the current communication transmission evaluation coefficient with the communication transmission evaluation coefficient in the step H1, if the current communication transmission evaluation coefficient is larger than the communication transmission evaluation coefficient in the step H1, indicating that the fault type checked in the step H2 is wrong, and performing simulation detection again, otherwise, executing a step H4;
step H4, determining whether the transmission allowable error coefficient corresponding to the communication transmission evaluation coefficient in step H3 is greater than a set value (0.1), if so, screening the fault type corresponding to the communication transmission evaluation coefficient under each fault type of the analog input closest to the communication transmission evaluation coefficient, where the transmission allowable error coefficient is equal to a ratio of a difference between the communication transmission evaluation coefficient and the value 1 to the value 1;
and H5, repeating the steps H3-H4 until the transmission allowable error coefficient corresponding to the communication transmission evaluation coefficient is smaller than the set value.
By comparing the communication transmission evaluation coefficient with the communication transmission evaluation coefficient corresponding to each fault type, at least one fault type existing in the communication transmission process can be screened out one by one, the tracing of faults is realized, the interference factors disturbing the communication transmission quality can be solved or reduced one by one, and the interference degree of the interference factors to the transmission quality is eliminated or reduced.
For fault types existing in the process that a wireless network bridge transmits data sent by front-end equipment to back-end equipment, the fault types comprise that the line sequence of a crystal head does not conform to the regulations, transmission channel interference, obstacles exist among the network bridges, antenna angle changes and the like, and the solutions corresponding to the fault types are respectively as follows: replacing a standard crystal head; adjusting the communication in the transmission process, and keeping away from an interference channel or moving the equipment and the wireless bridge out of an interference area; removing the obstacle; the antenna angle is adjusted, and the phenomenon that the antenna is blown to be deflected when encountering strong wind because the antenna is not fastened for a long time is avoided.
The data security management module is used for receiving an abnormal transmission instruction sent by the data recovery verification module, extracting fault types of the wireless network bridge analyzed by the fault tracing simulation module according to the abnormal transmission instruction, performing repair test on the existing fault types to test whether the detected fault types are eliminated or not, and eliminating abnormal conditions in the data transmission process.
The data security management module performs transmission scheduling control on data to be transmitted, and specifically adopts the following method:
step S1, obtaining key characteristic values in the data to be transmitted, and establishing a key characteristic value set
Figure DEST_PATH_IMAGE022
The key characteristic value is composed of a multi-bit binary value;
s2, extracting the occurrence frequency of each key characteristic value in the key characteristic value set A, and establishing a characteristic value frequency set B;
step S3, comparing the key characteristic values in the key characteristic value set A with the key characteristic values in the key characteristic value set Cj corresponding to the maximum encryption level to obtain a key characteristic value comparison set, wherein the weight coefficient corresponding to the key characteristic values in the key characteristic value set Cj at the same encryption level is
Figure 792108DEST_PATH_IMAGE010
J is the encryption level, the value is 0, 1, 2 and 3, when j is equal to 3, the encryption level required by the data to be transmitted is the maximum, when j is equal to 0, the data to be transmitted does not need to be encrypted,
Figure 999099DEST_PATH_IMAGE011
the number of key characteristic values under the jth encryption level is;
step S4, according to the key characteristic value comparison set and the occurrence times of the key characteristic values in the step S3, the to-be-encrypted phases between the data to be transmitted and the key characteristic value set with the maximum encryption level are countedCoefficient of correlation
Figure 93307DEST_PATH_IMAGE023
Figure 752958DEST_PATH_IMAGE013
Whether the f-th key characteristic value exists in the data to be transmitted in the key characteristic value set Cj under the j-th encryption level or not is judged, if yes,
Figure 711687DEST_PATH_IMAGE013
a value of 1, if not present, then
Figure 507605DEST_PATH_IMAGE013
The value of the oxygen-containing gas is 0,
Figure 526376DEST_PATH_IMAGE014
the number of times that the f-th key characteristic value in the key characteristic value set A appears in the data to be transmitted is determined;
step S5, judging whether the relevant matching coefficient to be encrypted between the data to be transmitted and the key characteristic value set with the maximum encryption level is larger than a set threshold value, if so, encrypting the data to be transmitted according to the encryption level, and if not, executing step S6;
and S6, sequentially reducing the levels to be encrypted, sequentially comparing the key characteristic values in the key characteristic value set A with the key characteristic values in the key characteristic value set Cj for reducing the encryption level to count the related matching coefficients to be encrypted between the data set to be transmitted and the key characteristic value set for reducing the encryption level step by step, and repeating the step S5 and the step S6 until the related matching coefficients to be encrypted between the data to be transmitted and the key characteristic value set corresponding to the encryption level reduced step by step are greater than a set threshold value, and encrypting the data to be transmitted by the wireless bridge according to the encryption level corresponding to the related matching coefficients to be encrypted which are greater than the set threshold value.
The data security management module is used for determining the encryption grade of the data to be transmitted, so that the preparation before data transmission is realized, the security in the data transmission process is improved, the encryption grade can be determined according to the data to be transmitted and the relevant matching coefficient to be encrypted between the encryption grades, the self-adaptive and diversified encryption of the data to be transmitted is realized, the requirements of different encryption degrees are met, the security in the data transmission process is effectively protected, and the risk that the data is stolen in the transmission process is guarded against.
Example two
In the embodiment, for the case that one front-end device transmits data to one back-end device, and for the case that multiple front-end devices need to transmit data to one back-end device at the same time, the following design is made:
a data transmission scheduling and distributing module is added, the data transmission scheduling and distributing module is used for obtaining a plurality of front-end devices which send data to-be-transmitted instructions to the rear-end devices and time points corresponding to the data to-be-transmitted instructions sent by the front-end devices to the rear-end devices, sequencing the time points corresponding to the data to-be-transmitted instructions sent by the front-end devices to the rear-end devices, dividing the front-end devices by using the earliest time point as a starting point at a fixed time interval, extracting data required to be sent by the front-end devices at the same time interval, analyzing the priority levels corresponding to the data to be sent in the front-end devices at the same time interval, and preferentially sending the data to the rear-end devices according to the front-end devices with high priority levels in the same time interval so as to realize the sequential regulation and distribution of data transmission of the front-end devices to the rear-end devices, the data receiving sequence of the back-end equipment is enabled, and the priority level of the data sent by each front-end equipment in the previous time interval is earlier than that of the data sent by each front-end equipment in the later time interval.
The data transmission scheduling and distributing module regulates and controls the priority level of data sent by each front-end device to the same back-end device in the same time interval, and the method comprises the following steps:
step F1, obtaining the time length occupied by the front Q times of data sent to the back end device by each front end device in the same time interval and the transmission delay rate corresponding to the transmission data
Figure 673324DEST_PATH_IMAGE015
V is the number of front-end devices in the same time interval,
Figure 435744DEST_PATH_IMAGE016
the length of time for the vth front-end device to send data to the back-end device is v =1, 2.;
step F2, obtaining the number of communication character segments respectively contained in the data transmitted by the front end device to the back end device Q times before in step F1
Figure 351747DEST_PATH_IMAGE017
Figure 525108DEST_PATH_IMAGE017
The number of communication character segments contained in the data sent to the back-end equipment for the nth front-end equipment is nth;
step F3, analyzing the average duration corresponding to each communication character segment sent by each front-end device to the back-end device
Figure 893773DEST_PATH_IMAGE018
Step F4, extracting the encryption grade of the data to be sent by each front-end device to the back-end device
Figure 928725DEST_PATH_IMAGE019
Step F5, adopting a priority level regulation and control model to numerically calculate the priority level of data sent by each front-end device to the back-end device, numerically displaying the priority level regulation and control coefficient of data sent by each front-end device to the back-end device at the same time interval, and determining the priority level of data sent by each front-end device to the back-end device according to the sequence of the priority level regulation and control coefficients from large to small.
The priority regulation model is
Figure DEST_PATH_IMAGE024
Figure 417344DEST_PATH_IMAGE025
Is the priority level regulation coefficient corresponding to the v-th front-end equipment at the same time interval,
Figure DEST_PATH_IMAGE027AAAA
and
Figure DEST_PATH_IMAGE029AA
and respectively sending the maximum value and the minimum value of the average duration corresponding to each communication character section to the back-end equipment.
The above formulas are all the formulas for taking the numerical value of the dimension, the formula is a formula for obtaining the latest real situation by software simulation of collected mass data, the parameters in the formula are set by the technical personnel in the field according to the actual situation, the setting of the threshold and the size of the weight coefficient are specific numerical values obtained by quantizing each parameter, the subsequent comparison is convenient, and the proportional relation between the parameters and the quantized numerical values is not affected as long as the sizes of the threshold and the weight coefficient are set.
The foregoing is merely exemplary and illustrative of the principles of the present invention and various modifications, additions and substitutions of the specific embodiments described herein may be made by those skilled in the art without departing from the principles of the present invention or exceeding the scope of the claims set forth herein.

Claims (8)

1. The utility model provides a communication equipment safety management system based on thing networking which characterized in that: the system comprises a transmission data acquisition module, a data transmission analysis module, a data recovery verification module, a transmission quality evaluation module and a fault tracing simulation module;
the transmission data acquisition module is used for acquiring data transmitted by front-end equipment connected with the wireless network bridge and data received by back-end equipment; the data transmission analysis module is used for comparing the data sent by the front-end equipment with the data received by the back-end equipment, judging the quantity a of the lost communication character segments in the data transmission process and analyzing the data loss rate;
the data recovery and verification module is used for extracting the number of the lost communication character segment, feeding the number back to the wireless network bridge, extracting the communication character segment corresponding to the number in the data sent by the front-end equipment, retransmitting the communication character segment to the back-end equipment, and detecting whether the retransmitted communication character segment is lost or not;
the transmission quality evaluation module is used for acquiring the time for the front-end equipment to send data and the initial time and the final time for the back-end equipment to receive the data, analyzing the transmission delay rate corresponding to the fact that the wireless bridge completely sends the data sent by the front-end equipment to the back-end equipment, extracting the times of repeated transmission, the number of communication character segments transmitted each time and the number of lost communication character segments in the same data transmission process, and analyzing a communication transmission evaluation coefficient by adopting a transmission quality evaluation model;
the transmission quality evaluation model is as follows:
Figure DEST_PATH_IMAGE001
Figure 892753DEST_PATH_IMAGE002
the number of communication segments not lost during the transmission of the kth communication segment,
Figure DEST_PATH_IMAGE003
the number of communication character segments transmitted at the kth time is K, the number of times of repeated transmission in the same data transmission process is K, and E is more than or equal to 1;
the fault tracing simulation module is used for simulating and inputting various fault types of the wireless network bridge in the using process, judging communication transmission evaluation coefficients corresponding to data transmitted by the wireless network bridge under various fault types, comparing the actually analyzed communication transmission evaluation coefficients with the communication transmission evaluation coefficients corresponding to various fault types input in a simulation mode, and screening out the fault type corresponding to the communication transmission evaluation coefficient under various fault types input in the simulation mode, which is closest to the actually analyzed communication transmission evaluation coefficient.
2. The internet of things-based communication equipment security management system of claim 1, wherein: the transmission delay rate
Figure 344594DEST_PATH_IMAGE004
The calculation formula of (c):
Figure DEST_PATH_IMAGE005
Figure 208645DEST_PATH_IMAGE006
is the time duration of the initial transmission,
Figure DEST_PATH_IMAGE007
for the length of the final transmission time,
Figure 491859DEST_PATH_IMAGE008
the time length of the initial transmission is the time difference between the time of the front-end equipment initially sending data and the initial time of the back-end equipment receiving the data, and the final transmission time length is the difference between the final time of the back-end equipment completely receiving the data sent by the front-end equipment and the time of the front-end equipment sending the data.
3. The internet of things-based communication equipment security management system of claim 2, wherein: the fault tracing simulation module checks and analyzes the transmission fault types of the wireless network bridge in the communication process of the front-end equipment and the back-end equipment, and adopts the following method:
step H1, extracting the communication transmission evaluation coefficient in the data transmission process, and screening out the fault type corresponding to the communication transmission evaluation coefficient under each fault type of the simulation input closest to the communication transmission evaluation coefficient;
step H2, checking and eliminating the fault types screened in the step H1;
step H3, detecting the communication transmission evaluation coefficient in the data transmission process again, comparing the current communication transmission evaluation coefficient with the communication transmission evaluation coefficient in the step H1, if the current communication transmission evaluation coefficient is larger than the communication transmission evaluation coefficient in the step H1, indicating that the fault type checked in the step H2 is wrong, and performing simulation detection again, otherwise, executing a step H4;
step H4, determining whether the transmission allowable error coefficient corresponding to the communication transmission evaluation coefficient in step H3 is greater than a set numerical value, if so, screening the fault type corresponding to the communication transmission evaluation coefficient under each fault type of the analog input closest to the communication transmission evaluation coefficient, where the transmission allowable error coefficient is equal to a ratio of a difference between the communication transmission evaluation coefficient and the numerical value 1 to the numerical value 1;
and H5, repeating the steps H3-H4 until the transmission allowable error coefficient corresponding to the communication transmission evaluation coefficient is smaller than the set value.
4. The internet-of-things-based communication equipment security management system of claim 3, wherein: the wireless network bridge fault detection system further comprises a data safety management module, wherein the data safety management module is used for receiving an abnormal transmission instruction sent by the data recovery verification module, extracting fault types of the wireless network bridge analyzed by the fault tracing simulation module according to the abnormal transmission instruction, carrying out repair test on the existing fault types to test whether the detected fault types are eliminated or not, eliminating abnormal conditions in the data transmission process, and carrying out transmission scheduling control on data to be transmitted after the faults are eliminated.
5. The internet of things-based communication equipment security management system of claim 4, wherein: the data security management module performs transmission scheduling control on data to be transmitted, and specifically adopts the following method:
s1, obtaining key characteristic values in the data to be transmitted, and establishing a key characteristic value set A;
s2, extracting the occurrence frequency of each key characteristic value in the key characteristic value set A, and establishing a characteristic value frequency set B;
step S3, comparing the key characteristic values in the key characteristic value set A with the key characteristic values in the key characteristic value set Cj corresponding to the maximum encryption level to obtain a key characteristic value comparison set, wherein the weight coefficient corresponding to the key characteristic values in the key characteristic value set Cj at the same encryption level is
Figure DEST_PATH_IMAGE009
J is the encryption level, the value is 0, 1, 2 and 3, when j is equal to 3, the encryption level required by the data to be transmitted is the maximum, when j is equal to 0, the data to be transmitted does not need to be encrypted,
Figure 783163DEST_PATH_IMAGE010
the number of key characteristic values under the jth encryption level is;
s4, according to the comparison set of the key characteristic values and the occurrence frequency of the key characteristic values in the step S3, counting the relevant matching coefficients to be encrypted between the data to be transmitted and the key characteristic value set with the maximum encryption level;
step S5, judging whether the relevant matching coefficient to be encrypted between the data to be transmitted and the key characteristic value set with the maximum encryption level is larger than a set threshold value, if so, encrypting the data to be transmitted according to the encryption level, and if not, executing step S6;
and S6, sequentially reducing the grade to be encrypted, sequentially comparing key characteristic values in the key characteristic value set A with key characteristic values in the key characteristic value set Cj of the encryption grade reduced to count the relevant matching coefficients to be encrypted between the data set to be transmitted and the key characteristic value set of the encryption grade reduced step by step, and repeating the step S5 and the step S6 until the relevant matching coefficients to be encrypted between the data to be transmitted and the key characteristic value set corresponding to the encryption grade reduced step by step are greater than a set threshold value, and encrypting the data to be transmitted by the wireless bridge according to the encryption grade corresponding to the relevant matching coefficients to be encrypted which are greater than the set threshold value.
6. The internet of things-based communication equipment security management system of claim 5, wherein: calculation of the correlation matching coefficient to be encrypted
Figure 519038DEST_PATH_IMAGE012
Figure DEST_PATH_IMAGE013
Whether the f-th key characteristic value exists in the data to be transmitted in the key characteristic value set Cj under the j-th encryption level or not is judged, if yes,
Figure 186779DEST_PATH_IMAGE013
a value of 1, if not present, then
Figure 121237DEST_PATH_IMAGE013
The value of the oxygen is 0, and the oxygen concentration is less than or equal to zero,
Figure 317864DEST_PATH_IMAGE014
the number of times that the f-th key eigenvalue in the key eigenvalue set a appears in the data to be transmitted is used.
7. The internet of things-based communication device security management system of claim 6, wherein: in the case where a plurality of front-end devices transmit data to the same back-end device, a data transmission scheduling and distributing module is needed to be added, the data transmission scheduling and distributing module is used for obtaining a plurality of front-end devices which send data to-be-transmitted instructions to the rear-end devices and time points corresponding to the data to-be-transmitted instructions sent by the front-end devices to the rear-end devices, sequencing the time points corresponding to the data to-be-transmitted instructions sent by the front-end devices to the rear-end devices, and taking the earliest time point as a starting point, dividing each front-end device at a fixed time interval, extracting data to be sent of each front-end device at the same time interval, analyzing the priority level corresponding to the data to be sent in each front-end device at the same time interval, and the front-end equipment with high priority in the same time interval preferentially transmits data to the back-end equipment.
8. The internet of things-based communication equipment security management system of claim 7, wherein: the data transmission scheduling and distributing module regulates and controls the priority level of data sent by each front-end device to the same back-end device in the same time interval, and the method comprises the following steps:
step F1, obtaining the length of time occupied by the data sent to the back end device by each front end device for the first Q times in the same time interval and the transmission delay rate corresponding to the transmission data
Figure DEST_PATH_IMAGE015
V is the number of front-end devices in the same time interval,
Figure 541035DEST_PATH_IMAGE016
the length of time for the front-end device to send data to the back-end device t times is v =1, 2.;
step F2, obtaining the number of communication character segments respectively contained in the data transmitted by the front end device to the back end device Q times before in step F1
Figure DEST_PATH_IMAGE017
Figure 746888DEST_PATH_IMAGE017
The number of communication character segments contained in the data sent to the back-end equipment for the nth front-end equipment is nth;
step F3, analyzing the average time length corresponding to each communication character segment sent by each front-end device to the back-end device each time
Figure 535852DEST_PATH_IMAGE018
Step F4, extracting the encryption grade of the data to be sent by each front-end device to the back-end device
Figure DEST_PATH_IMAGE019
Step F5, adopting a priority level regulation and control model to numerically calculate the priority level of data sent by each front-end device to the back-end device, numerically displaying the priority level regulation and control coefficient of data sent by each front-end device to the back-end device at the same time interval, and determining the priority level of data sent by each front-end device to the back-end device according to the sequence of the priority level regulation and control coefficients from large to small;
the priority regulation model is
Figure 434538DEST_PATH_IMAGE020
Figure DEST_PATH_IMAGE021
Is the priority level regulation coefficient corresponding to the v-th front-end equipment at the same time interval,
Figure 145005DEST_PATH_IMAGE022
and
Figure DEST_PATH_IMAGE023
and respectively sending the maximum value and the minimum value of the average time length corresponding to each communication character section to the back-end equipment for the front-end equipment.
CN202210356082.8A 2022-04-06 2022-04-06 Communication equipment safety management system based on Internet of things Active CN114500235B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210356082.8A CN114500235B (en) 2022-04-06 2022-04-06 Communication equipment safety management system based on Internet of things

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210356082.8A CN114500235B (en) 2022-04-06 2022-04-06 Communication equipment safety management system based on Internet of things

Publications (2)

Publication Number Publication Date
CN114500235A CN114500235A (en) 2022-05-13
CN114500235B true CN114500235B (en) 2022-07-26

Family

ID=81488770

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210356082.8A Active CN114500235B (en) 2022-04-06 2022-04-06 Communication equipment safety management system based on Internet of things

Country Status (1)

Country Link
CN (1) CN114500235B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111609883A (en) * 2020-05-20 2020-09-01 合肥惠科达信息科技有限责任公司 Communication machine room protection monitoring management system based on big data
CN111726354A (en) * 2020-06-17 2020-09-29 梅州市悦思智能科技有限公司 Data transmission encryption equipment based on Internet of things
US11175975B1 (en) * 2018-12-26 2021-11-16 Adtran, Inc. Systems and methods for detecting faults in a telecommunication system using retrain data
WO2021253708A1 (en) * 2020-06-20 2021-12-23 华为技术有限公司 Memory fault handling method and apparatus, device and storage medium

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1992650B (en) * 2005-12-30 2011-05-11 中兴通讯股份有限公司 Method for detecting calling continuity of IP packet carrying network
CA3072045A1 (en) * 2017-08-02 2019-02-07 Strong Force Iot Portfolio 2016, Llc Methods and systems for detection in an industrial internet of things data collection environment with large data sets
CN111800294B (en) * 2020-06-09 2022-11-22 中移(杭州)信息技术有限公司 Gateway fault diagnosis method and device, network equipment and storage medium
CN112463422A (en) * 2020-11-04 2021-03-09 鸬鹚科技(苏州)有限公司 Internet of things fault operation and maintenance method and device, computer equipment and storage medium
CN112986783B (en) * 2021-03-19 2024-03-01 宁波群芯微电子股份有限公司 Test system and test method for photoelectric coupler
CN113485268B (en) * 2021-07-15 2022-06-14 深圳市壹佰度科技有限公司 Industrial Internet of things-based multi-scene distributed information control system
CN114004306A (en) * 2021-11-10 2022-02-01 嘉应学院 Equipment fault evaluation system and method based on multi-dimensional data of Internet of things
CN113792825B (en) * 2021-11-17 2022-08-02 国网江苏省电力有限公司营销服务中心 Fault classification model training method and device for electricity information acquisition equipment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11175975B1 (en) * 2018-12-26 2021-11-16 Adtran, Inc. Systems and methods for detecting faults in a telecommunication system using retrain data
CN111609883A (en) * 2020-05-20 2020-09-01 合肥惠科达信息科技有限责任公司 Communication machine room protection monitoring management system based on big data
CN111726354A (en) * 2020-06-17 2020-09-29 梅州市悦思智能科技有限公司 Data transmission encryption equipment based on Internet of things
WO2021253708A1 (en) * 2020-06-20 2021-12-23 华为技术有限公司 Memory fault handling method and apparatus, device and storage medium

Also Published As

Publication number Publication date
CN114500235A (en) 2022-05-13

Similar Documents

Publication Publication Date Title
CN101645884B (en) Multi-measure network abnormity detection method based on relative entropy theory
CN103888315B (en) A kind of adaptive burst flow detection means and its detection method
CN114757590B (en) Enterprise operation risk early warning and management and control system based on big data analysis
US20070133608A1 (en) Video quality assessment
CN110413441A (en) Active and standby storage volume synchrodata method of calibration, device, equipment and storage medium
CN104486101B (en) A kind of online power remote IEC104 transmission abnormality detection methods
CN104320297A (en) Method and device for network anomaly detection and network communication control
CN105281945A (en) Data flow-based deterministic network integrity fault detection method
ATE507672T1 (en) METHOD FOR DISRUPTION ANALYSIS OF A REAL-TIME DATA STREAM IN A DATA NETWORK, COMMUNICATIONS SYSTEM AND MONITORING COMPUTER
CN109034400A (en) A kind of substation's exception metric data predicting platform system
CN107547572A (en) A kind of CAN communication means based on pseudo random number
CN114500235B (en) Communication equipment safety management system based on Internet of things
CN104684014B (en) Mobile communications network transmission testing method
CN111787013A (en) Attack monitoring device and method of optical fiber time synchronization system
CN110189011B (en) Fault assessment method and system for intensive power transmission channel under natural disaster
CN107078927A (en) Network connection is recognized
CN107302477A (en) A kind of Ethernet switch interface test method
CN103716211B (en) The data traffic measuring method of the network terminal
DE60320295T2 (en) FORMAT DETECTION
CN112053564A (en) Method for checking vehicle card inconsistency of highway network
CN114760215B (en) Method and system for monitoring data transmission performance of computer network
CN115544614A (en) Wiring system construction method based on BIM5D remote monitoring
CN115913349A (en) Optical cable equipment abnormity positioning method and device, storage medium and terminal
CN115953044A (en) Power grid state stability evaluation method based on federal learning and block chain technology
CN114584370A (en) Server data interaction network security system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant