CN115052051A - Information processing method, system, controller and terminal based on ICAP protocol - Google Patents
Information processing method, system, controller and terminal based on ICAP protocol Download PDFInfo
- Publication number
- CN115052051A CN115052051A CN202210445154.6A CN202210445154A CN115052051A CN 115052051 A CN115052051 A CN 115052051A CN 202210445154 A CN202210445154 A CN 202210445154A CN 115052051 A CN115052051 A CN 115052051A
- Authority
- CN
- China
- Prior art keywords
- terminal
- burst transmission
- negotiation
- response information
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 230000010365 information processing Effects 0.000 title claims abstract description 18
- 238000003672 processing method Methods 0.000 title claims abstract description 15
- 230000005540 biological transmission Effects 0.000 claims abstract description 101
- 230000004044 response Effects 0.000 claims abstract description 79
- 238000004891 communication Methods 0.000 claims abstract description 50
- 238000000034 method Methods 0.000 claims abstract description 32
- 230000008569 process Effects 0.000 claims abstract description 13
- 238000012545 processing Methods 0.000 claims description 28
- 230000000977 initiatory effect Effects 0.000 claims description 2
- 238000011161 development Methods 0.000 abstract description 3
- 238000012546 transfer Methods 0.000 description 8
- 230000006870 function Effects 0.000 description 6
- 230000006835 compression Effects 0.000 description 3
- 238000007906 compression Methods 0.000 description 3
- 238000004590 computer program Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 230000004907 flux Effects 0.000 description 2
- 238000012880 independent component analysis Methods 0.000 description 2
- 239000003999 initiator Substances 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008878 coupling Effects 0.000 description 1
- 238000010168 coupling process Methods 0.000 description 1
- 238000005859 coupling reaction Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 230000014759 maintenance of location Effects 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 238000005259 measurement Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000002360 preparation method Methods 0.000 description 1
- 238000012827 research and development Methods 0.000 description 1
- 238000004092 self-diagnosis Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/22—Parsing or analysis of headers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/24—Negotiation of communication capabilities
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Communication Control (AREA)
Abstract
An information processing method, a system, a controller and a terminal based on an ICAP protocol are provided, the method comprises the following steps: the control terminal and the terminal carry out session negotiation through the session type message and establish communication connection with the terminal according to a negotiation result; the control terminal initiates a burst transmission request to the terminal; and the control terminal receives the response information of the terminal and processes the burst transmission type message according to the response information. The method can unify the communication procedures of OBD, VCI and other industrial control products, reduce repeated development and improve the stability of communication.
Description
Technical Field
The present application relates to the field of industrial control, and in particular, to an information processing method, system, controller, and terminal based on an ICAP protocol.
Background
Existing industrial control products, such as On-Board Diagnostics (OBD), Vehicle-mounted self-diagnosis (VCI), and Vehicle Communication Interface (VCI), have no unified Communication protocol, and need to be researched and developed separately, so that the products are repeatedly developed, and thus, resources are wasted.
Disclosure of Invention
The application provides an information processing method, system, controller and terminal based on an ICAP (independent component analysis protocol) protocol.
According to a first aspect of the present application, there is provided an information processing method based on an ICAP protocol, including:
the control terminal and the terminal carry out session negotiation through the session type message and establish communication connection with the terminal according to a negotiation result;
the control terminal initiates a burst transmission request to the terminal;
and the control terminal receives the response information of the terminal and processes the burst transmission type message according to the response information.
Further, the processing the burst transmission type message according to the response information includes:
when the response information is a positive response, the control end sends a burst transmission type message to the terminal in a burst transmission mode;
and when the response information is a negative response, the control terminal cancels the transmission of the burst transmission type message to the terminal.
According to a second aspect of the present application, there is provided an information processing method based on an ICAP protocol, including:
the terminal and the control terminal carry out session negotiation through the session type message and establish communication connection with the terminal according to a negotiation result;
the terminal receives the burst transmission request initiated by the control terminal and judges whether to allow the burst transmission to start or not according to the actual issue;
and the terminal sends response information to the control terminal and sends a judgment result to the control terminal through the response information.
Further, the reality includes: whether the data size exceeds a limit, whether the resource can be scheduled to process the batch of data, and/or whether other more important transactions are currently being processed.
Further, the step that the terminal sends response information to the control terminal, and after sending the judgment result to the control terminal through the response information, the method further includes:
and when the response information is a positive response, the terminal receives the burst transmission type message sent by the control terminal in a burst transmission mode.
According to a third aspect of the present application, there is provided an information processing method based on an ICAP protocol, including:
the control terminal and the terminal carry out session negotiation through the session type message and establish communication connection with the terminal according to a negotiation result;
the control terminal initiates a burst transmission request to the terminal;
the terminal receives the burst transmission request initiated by the control terminal and judges whether to allow the burst transmission to start or not according to the actual issue;
the terminal sends response information to the control terminal, and sends a judgment result to the control terminal through the response information;
and the control terminal receives the response information of the terminal and processes the burst transmission type message according to the response information.
According to a fourth aspect of the present application, there is provided a controller based on an ICAP protocol, comprising:
the first negotiation module is used for carrying out session negotiation with the terminal through session type information and establishing communication connection with the terminal according to a negotiation result;
a request module, configured to initiate a burst transmission request to the terminal;
and the first processing module is used for receiving the response information of the terminal and processing the burst transmission type message according to the response information.
According to a fifth aspect of the present application, there is provided a terminal based on an ICAP protocol, comprising:
the second negotiation module is used for carrying out session negotiation with the control terminal through the session type message and establishing communication connection with the terminal according to a negotiation result;
the second processing module is used for receiving the burst transmission request initiated by the control terminal and judging whether the burst transmission is allowed to start or not according to the actual issue;
and the sending module is used for sending response information to the control end and sending a judgment result to the control end through the response information.
According to a sixth aspect of the present application, the present application provides an information processing system based on an ICAP protocol, including a controller and a terminal, where the controller includes a first negotiation module, a request module and a first processing module, and the terminal includes a second negotiation module, a second processing module and a sending module;
the first negotiation module is used for carrying out session negotiation with the second negotiation module through session type information and establishing communication connection with the terminal according to a negotiation result;
the request module is used for initiating a burst transmission request to the terminal;
the second processing module is used for receiving the burst transmission request and judging whether to allow the burst transmission to start or not according to the actual issue;
the sending module is used for sending response information to the control end and sending a judgment result to the control end through the response information;
and the first processing module is used for receiving the response information of the terminal and processing the burst transmission type message according to the response information.
According to a seventh aspect of the present application, there is provided a computer readable storage medium having stored thereon a program executable by a processor to perform the method described above.
Owing to adopted above technical scheme, make the beneficial effect that this application possesses lie in:
according to the information processing method based on the ICAP, the control end and the terminal carry out session negotiation through session type information, and communication connection is established with the terminal according to a negotiation result; the control terminal initiates a burst transmission request to the terminal; and the control terminal receives the response information of the terminal and processes the burst transmission type message according to the response information. The method can unify the communication protocols of OBD, VCI and other industrial control products, reduce repeated development and improve the stability of communication.
Drawings
FIG. 1 is a flow chart of a method in one embodiment of the present application;
FIG. 2 is a flow chart of a method in an embodiment of the present application;
FIG. 3 is a flow chart of a method in a third embodiment of the present application;
FIG. 4 is a schematic diagram of program modules of a controller in one embodiment according to a fourth embodiment of the present application;
fig. 5 is a schematic diagram of program modules of a terminal in a fifth embodiment of the present application;
fig. 6 is a schematic diagram of program modules of a system in a sixth embodiment of the present application.
Detailed Description
The present invention will be described in further detail with reference to the following detailed description and accompanying drawings. Wherein like elements in different embodiments are numbered with like associated elements. In the following description, numerous details are set forth in order to provide a better understanding of the present application. However, one skilled in the art will readily recognize that some of the features may be omitted or replaced with other elements, materials, methods in different instances. In some instances, certain operations related to the present application have not been shown or described in detail in order to avoid obscuring the core of the present application from excessive description, and it is not necessary for those skilled in the art to describe these operations in detail, so that they may be fully understood from the description in the specification and the general knowledge in the art.
Furthermore, the features, operations, or characteristics described in the specification may be combined in any suitable manner to form various embodiments. Also, the various steps or actions in the method descriptions may be transposed or transposed in order, as will be apparent to one of ordinary skill in the art. Thus, the various sequences in the specification and drawings are for the purpose of describing certain embodiments only and are not intended to imply a required sequence unless otherwise indicated where such sequence must be followed.
The numbering of the components as such, e.g., "first", "second", etc., is used herein only to distinguish the objects as described, and does not have any sequential or technical meaning. The term "connected" and "coupled" as used herein includes both direct and indirect connections (couplings), unless otherwise specified.
The ICAP (industrial Control advanced Communication Protocol) in the present application belongs to a transport Protocol (which may correspond to a network layer or a transport layer in the OSI model). The protocol aims to unify the communication procedures of OBD, VCI and other industrial control products, reduce repeated development and improve the stability of communication. The protocol is applied to communication between the application of a numerical control key machine product and a mechanical control module for the first time, gives consideration to classical Bluetooth and serial port communication at present, and can be expanded to USB communication and higher communication links.
The first embodiment is as follows:
as shown in fig. 1, an implementation manner of the information processing method based on the ICAP protocol provided in the embodiment of the present application may include the following steps:
step 101: the control terminal and the terminal carry out session negotiation through the session type message, and establish communication connection with the terminal according to the negotiation result.
Further, the session negotiation includes communication rate negotiation and communication security negotiation.
The communication rate negotiation comprises the maximum baud rate of a communication channel and the maximum data flux which can be borne by both communication parties; the parameters of the rate negotiation include: receive buffer and transmit buffer size.
The communication security negotiation comprises a session initiator informing a receiver of a supported symmetric encryption mode, wherein the encryption mode comprises DES,3DES, AES or NONE; wherein NONE indicates no encryption.
The first step of session establishment is session negotiation, and two communication parties need to carry out comprehensive negotiation on the characteristics of a communication channel to be established and can establish the communication channel after finally reaching an agreement.
The communication rate negotiation comprises the maximum baud rate of the communication channel and the maximum data flux which can be borne by the applications of the two communication parties. The channel baud rate does not need to be transmitted, the maximum baud rate is already determined after the connection mode is determined, and the parameter is known by both sides. The maximum data throughput that an application can tolerate is typically related to the size of the buffer and the speed at which the data in the buffer is processed. Therefore, there are 2 parameters for rate negotiation, that is, the size of the receiving buffer and the sending buffer of both communication parties, the endianness is from high to low:
receiving buffer size | Transmit buffer size |
2bytes | 2bytes |
Table 1 table of rate negotiation parameters
The communication security negotiation is a key step of confidentiality, and a session initiator informs a receiver of supported symmetric encryption modes including DES,3DES, AES and NON. The full set is 4, and a subset of the support can be sent. The receiver selects one encryption mode according to self conditions, if NONE is selected, the encryption mode is not used, the message is transmitted in clear, and the characteristic can be only used in specific occasions, such as a research and development test stage, and the communication efficiency is improved in the occasions where one chip is difficult to monitor. This parameter is expressed in one byte, called the session option, and each of the 3-6 bits represents the support capability of an encryption scheme, as shown in the following table:
table 2 session option structure for rate negotiation parameters
If the session is established by the cube to force channel encryption, 0bit is set to 0, which indicates that communication without encryption is not supported, and the receiver cannot select a NON encryption mode, otherwise, the session cannot be established.
The idle window or heartbeat interval negotiation idle window refers to the measurement of communication activity, is the time of bus idle, and the session can be kept valid in the idle window all the time, and if the bus idle time exceeds the window time, the session can be invalid. The data consists of 4 bytes, 0 representing an infinitely long time window. The final result is based on the number of the response, if the sender gives a non-0 number, the receiver responds 0, and the sender has the right to refuse to continue the negotiation. When the flag in the session option selects the heartbeat interval, session maintenance will be based on the heartbeats, and the session will fail after a specified number of heartbeats have not been answered. And only selecting one of the idle window and the heartbeat interval, and maintaining the session by default by adopting the heartbeat. After the session is invalid, any received message is discarded without any response.
Step 102: the control terminal initiates a burst transmission request to the terminal.
The sending party of the large block data initiates a burst transmission request, and requests parameters are carried to refer to burst transmission request parameters.
The protocol header of the ICAP protocol may include the following fields:
sign (sign) | Packet length | Protocol version | Package attributes | Message ID | Command | Data of | crc |
1byte | 1-4bytes | 0-1byte | 1byte | 1-4bytes | 1byte | nbytes | 1byte |
0x80 | High,LOW | - | - | - | - | - | - |
TABLE 3 protocol header component structure
Packet attributes including compression mode, encryption mode and transmission mode;
message ID: the upper 4 bits are session ID, and the lower 4 bits are packet sequence number during session;
command: 1 byte, the high 2bit is a command type, including a session type message, a control transmission type message and a burst transmission type message, and the low 6bit is a subclass;
data: including the payload.
The command field can be merged with the data field, i.e. the content of the command field can be stored in the data field. When the transport layer and network layer protocols communicate, the contents of the command field of the transport layer protocol or the network layer protocol may be contained in a data field whose meaning is specified by the application layer.
Marking: a fixed 0x80 indicates a packet start.
Packet length: 1-4 bytes, the entire packet length, including packet header, data payload, crc, to facilitate parsing packet integrity.
Protocol version: 0-4 bytes, the upper 4 bits are primary version, the lower 4 bits are secondary version, at most 255 versions are supported, and 0 is reserved. The protocol version is set in order to make the protocol itself extensible and compatible, and the processing of messages by the message sender must be kept consistent, which is based on the protocol version information. The protocol supports a maximum of 255 versions, with 0 reserved, starting at a minimum at 0.1, major versions 0-0x0F, minor versions 1-0x 0F. For example, version: 0.1, 1.3, 15.15, etc. In one embodiment, the protocol header may also contain no protocol version field, such as the bluetooth BLE channel, whose single frame data length cannot exceed 20 bytes.
Further, in another embodiment, the protocol header may include the following fields: packet attributes, message ID, data, packet length, in this embodiment, the protocol header may not include the following fields: flags, protocol versions, and command fields, such as the bluetooth BLE channel.
The package attributes are: the parsing and nature of the packet is controlled. Packet attributes control the properties of the packet, such as parsing and interaction, and currently use 1 byte:
table 4 packet attribute field composition structure of protocol header
The three bit fields may be arbitrarily arranged in the byte, may be arranged adjacent to each other or at intervals, and may be arranged at the upper or lower position. In one embodiment, the lowest order 0 represents the transmission mode, 0 represents the control transmission, the order of the various control transmissions does not matter, and messages can be transmitted interspersed; 1 indicates a burst transfer, and the burst transfer surface needs to transfer a large amount of data at a time, and the period cannot be interrupted until the transfer is completed, and the control transfer or the next burst transfer cannot be started. Bits 1-2 indicate symmetric encryption, 00 indicates no encryption, 01 indicates DES encryption, 10 indicates 3DES encryption, and 11 indicates AES encryption, and generally, the encryption is a result of negotiation between both parties during session establishment, and it is not possible to simply and fixedly use a certain encryption, which is a gospel to an attacker, and only the dynamic negotiation encryption is more secure. Bit 3 indicates whether the data is compressed, 0 indicates no compression, the original byte content is transmitted, and 1 indicates that the byte compression strategy is adopted.
ID: namely, the message ID, the upper 4 bits are the session ID, the lower 4 bits are the packet sequence number during the session, and the lower 4 bits automatically start from 0 when they reach 0x 0F. The message ID is 1-4 bytes long, and in one embodiment, the message ID is structured as follows:
7-4 | 3-0 |
session ID | Intra-session message ID |
Table 5 message ID field composition structure of protocol header
During the session establishment, the 7-4 bits are always 0, the session ID starts from 1 after the establishment, the cycle starts from 1 after F is reached, the message ID rules are consistent, namely the ID field does not have the condition of being equal to 0.
Command: 1 byte, 2 bits high is the command type, and 6 bits low is the subcommand. The command is 1 byte, the high 2bit is a type, and the low 6bit is a subclass, so that the design is convenient for command classification, and the logic is clearer. The command field structure is as follows:
binary value | Name (R) |
00 | Session category messages |
01 | Controlling transmission class messages |
10 | Burst transfer class message |
11 | Retention |
Table 6 command field composition structure of protocol header
Message subclass all 1 indicates this type of message reply message, but command byte 0xFF reserved is an invalid message class, since the 7-6 bit value 11 is a reserved value and 0xFF cannot occur. The session category message any reply has a definite subcategory with the purpose of unambiguously identifying all steps of the session establishment procedure, rather than an ambiguous general reply.
Data: the payload varies according to the command.
crc: the exclusive or value of 1 byte full packet data (except for the crc itself).
Step 103: and the control end receives the response information of the terminal and processes the burst transmission type message according to the response information.
The burst transfer class message is specifically referred to the following table:
table 7 burst transmission class message
Further, step 103 may comprise:
and when the response information is a positive response, the control end sends a burst transmission type message to the terminal in a burst transmission mode.
After all the transmissions are successful, the sender finishes the burst transmission, and at this time, the burst transmission can still be cancelled.
And when the response information is a negative response, the control terminal cancels the transmission of the burst transmission type message to the terminal.
Burst transmission is used for atomic transmission of a large amount of data in a short time, the burst transmission monopolizes a bus in the period, namely after one-time burst transmission is started, any control transmission and other burst transmission are refused by the bus, and other transmissions cannot be started until the burst transmission is finished. Generally, the transmission of any form of file should be in burst transmission, for example: firmware upgrade, ECU data flash, etc. The burst transmission has lower priority but occupies the bus, so that the burst transmission is started once as a result of the common negotiation between the sender and the receiver, the sender cannot independently start the burst transmission, and the receiver can really start the burst transmission only after all preparations are made, because the priority is lower, the receiver has the right to reject the burst transmission under certain conditions.
When the sender goes down and cannot send the next frame data, the receiver should reset the burst transmission that has failed the next session establishment request.
When the receiving party is down and cannot send out the processing state of the previous frame, the sending party should wait for timeout according to 1.5 times of the average response time of each previous frame, and once timeout occurs, the session should be terminated and a new session should be established again so that the states can be synchronized.
Example two:
as shown in fig. 2, an implementation manner of the information processing method based on the ICAP protocol provided in the embodiment of the present application includes the following steps:
step 201: the terminal and the control terminal carry out session negotiation through the session type message and establish communication connection with the terminal according to the negotiation result.
Step 202: and the terminal receives the burst transmission request initiated by the control terminal and judges whether to allow the burst transmission to start or not according to the actual issue.
Further, the reality specifically includes: whether the data size exceeds a limit, whether the resource can be scheduled to process the batch of data, and/or whether other more important transactions are currently being processed.
Step 203: and the terminal sends response information to the control terminal and sends a judgment result to the control terminal through the response information.
Further, step 203 may be followed by:
step 204: and when the response information is a positive response, the terminal receives the burst transmission type message sent by the control end in a burst transmission mode.
Example three:
as shown in fig. 3, an implementation manner of the information processing method based on the ICAP protocol provided in the embodiment of the present application includes the following steps:
step 301: the control terminal and the terminal carry out session negotiation through the session type message, and establish communication connection with the terminal according to the negotiation result.
Step 302: the control terminal initiates a burst transmission request to the terminal.
Step 303: and the terminal receives the burst transmission request initiated by the control terminal and judges whether to allow the burst transmission to be started according to the actual situation.
Step 304: and the terminal sends response information to the control terminal and sends a judgment result to the control terminal through the response information.
Step 305: and the control end receives the response information of the terminal and processes the burst transmission type message according to the response information.
Example four:
as shown in fig. 4, an implementation manner of the controller based on the ICAP protocol provided in the embodiment of the present application includes a first negotiation module 410, a request module 420, and a first processing module 430.
The first negotiation module 410 is configured to perform session negotiation with the terminal through the session type message, and establish a communication connection with the terminal according to a negotiation result.
A request module 420, configured to initiate a burst transmission request to the terminal.
The first processing module 430 is configured to receive response information of the terminal, and process the burst transmission type message according to the response information.
Example five:
as shown in fig. 5, an implementation manner of the ICAP protocol-based terminal provided in this embodiment of the present application includes a second negotiation module 510, a second processing module 520, and a sending module 530.
A second negotiation module 510, configured to perform session negotiation with the control end through the session type message, and establish a communication connection with the terminal according to a negotiation result;
a second processing module 520, configured to receive a burst transmission request initiated by a control end, and determine whether to allow burst transmission to start according to a real issue;
the sending module 530 is configured to send a response message to the control end, and send a determination result to the control end through the response message.
Example six:
as shown in fig. 6, an implementation manner of the information processing system based on the ICAP protocol provided in the embodiment of the present application includes a controller 600 and a terminal 700, where the controller 600 includes a first negotiation module 610, a request module 620 and a first processing module 630, and the terminal 700 includes a second negotiation module 710, a second processing module 720 and a sending module 730;
the first negotiation module 610 is configured to perform session negotiation with the second negotiation module 710 through a session type message, and establish a communication connection with a terminal according to a negotiation result;
a request module 620, configured to initiate a burst transmission request to a terminal;
a second processing module 720, configured to receive the burst transmission request, and determine whether to allow burst transmission to start according to the actual issue;
the sending module 730 is configured to send response information to the control end, and send a determination result to the control end through the response information;
the first processing module 630 is configured to receive response information of the terminal, and process the burst transmission type message according to the response information.
Example seven:
a computer-readable storage medium storing a program executable by a processor to implement the methods of the first, second, and third embodiments.
Those skilled in the art will appreciate that all or part of the functions of the methods in the above embodiments may be implemented by hardware, or may be implemented by a computer program. When all or part of the functions of the above embodiments are implemented by a computer program, the program may be stored in a computer-readable storage medium, and the storage medium may include: a read only memory, a random access memory, a magnetic disk, an optical disk, a hard disk, etc., and the program is executed by a computer to realize the above functions. For example, the program may be stored in a memory of the device, and when the program in the memory is executed by the processor, all or part of the functions described above may be implemented. In addition, when all or part of the functions in the above embodiments are implemented by a computer program, the program may be stored in a storage medium such as a controller, another computer, a magnetic disk, an optical disk, a flash disk, or a portable hard disk, and may be downloaded or copied and stored in a memory of a local device, or a version of a system of the local device may be updated, and when the program in the memory is executed by a processor, all or part of the functions in the above embodiments may be implemented.
The present invention has been described in terms of specific examples, which are provided to aid understanding of the invention and are not intended to be limiting. For a person skilled in the art to which the invention pertains, several simple deductions, modifications or substitutions may be made according to the idea of the invention.
Claims (10)
1. An information processing method based on an ICAP protocol is characterized by comprising the following steps:
the control terminal and the terminal carry out session negotiation through the session type message and establish communication connection with the terminal according to a negotiation result;
the control terminal initiates a burst transmission request to the terminal;
and the control terminal receives the response information of the terminal and processes the burst transmission type message according to the response information.
2. The method of claim 1, wherein the processing the burst transmission class message according to the response information comprises:
when the response information is a positive response, the control end sends a burst transmission type message to the terminal in a burst transmission mode;
and when the response information is a negative response, the control terminal cancels the transmission of the burst transmission type message to the terminal.
3. An information processing method based on an ICAP protocol is characterized by comprising the following steps:
the terminal and the control terminal carry out session negotiation through the session type message and establish communication connection with the terminal according to a negotiation result;
the terminal receives the burst transmission request initiated by the control terminal and judges whether to allow the burst transmission to start or not according to the actual issue;
and the terminal sends response information to the control terminal and sends a judgment result to the control terminal through the response information.
4. The method of claim 3, wherein the reality scenario comprises: whether the data size exceeds a limit, whether the resource can be scheduled to process the batch of data, and/or whether other more important transactions are currently being processed.
5. The method of claim 3, wherein the step of sending the response message to the control end by the terminal, and after sending the determination result to the control end by the response message, further comprises:
and when the response information is a positive response, the terminal receives the burst transmission type message sent by the control terminal in a burst transmission mode.
6. An information processing method based on an ICAP protocol is characterized by comprising the following steps:
the control terminal and the terminal carry out session negotiation through the session type message and establish communication connection with the terminal according to a negotiation result;
the control terminal initiates a burst transmission request to the terminal;
the terminal receives the burst transmission request initiated by the control terminal and judges whether to allow the burst transmission to start or not according to the actual issue;
the terminal sends response information to the control terminal, and sends a judgment result to the control terminal through the response information;
and the control terminal receives the response information of the terminal and processes the burst transmission type message according to the response information.
7. A controller based on the ICAP protocol, comprising:
the first negotiation module is used for carrying out session negotiation with the terminal through session type information and establishing communication connection with the terminal according to a negotiation result;
a request module, configured to initiate a burst transmission request to the terminal;
and the first processing module is used for receiving the response information of the terminal and processing the burst transmission type message according to the response information.
8. A terminal based on the ICAP protocol, comprising:
the second negotiation module is used for carrying out session negotiation with the control terminal through the session type message and establishing communication connection with the terminal according to a negotiation result;
the second processing module is used for receiving the burst transmission request initiated by the control terminal and judging whether the burst transmission is allowed to start or not according to the actual issue;
and the sending module is used for sending response information to the control end and sending a judgment result to the control end through the response information.
9. An information processing system based on an ICAP protocol is characterized by comprising a controller and a terminal, wherein the controller comprises a first negotiation module, a request module and a first processing module, and the terminal comprises a second negotiation module, a second processing module and a sending module;
the first negotiation module is used for carrying out session negotiation with the second negotiation module through session type information and establishing communication connection with the terminal according to a negotiation result;
the request module is used for initiating a burst transmission request to the terminal;
the second processing module is used for receiving the burst transmission request and judging whether to allow the burst transmission to start or not according to the actual issue;
the sending module is used for sending response information to the control terminal and sending a judgment result to the control terminal through the response information;
and the first processing module is used for receiving the response information of the terminal and processing the burst transmission type message according to the response information.
10. A computer-readable storage medium, characterized in that the storage medium has stored thereon a program which is executable by a processor for implementing the method according to any one of claims 1-6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210445154.6A CN115052051B (en) | 2022-04-26 | 2022-04-26 | Information processing method, system, controller and terminal based on ICAP protocol |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210445154.6A CN115052051B (en) | 2022-04-26 | 2022-04-26 | Information processing method, system, controller and terminal based on ICAP protocol |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115052051A true CN115052051A (en) | 2022-09-13 |
CN115052051B CN115052051B (en) | 2023-11-17 |
Family
ID=83158304
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210445154.6A Active CN115052051B (en) | 2022-04-26 | 2022-04-26 | Information processing method, system, controller and terminal based on ICAP protocol |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115052051B (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105898672A (en) * | 2014-05-09 | 2016-08-24 | 苹果公司 | Extended bluetooth communication modes |
CN109068328A (en) * | 2018-10-11 | 2018-12-21 | 中国农业银行股份有限公司 | Secure network communication method, terminal and system |
CN110069050A (en) * | 2019-03-22 | 2019-07-30 | 深圳市朗仁科技有限公司 | Automobile polyelectron control unit detection method and device |
CN111049793A (en) * | 2018-10-12 | 2020-04-21 | 株式会社斯巴鲁 | Protocol conversion device and vehicle diagnostic system |
CN111431784A (en) * | 2020-04-21 | 2020-07-17 | 长念(上海)技术开发有限公司 | Universal MODBUS protocol data analysis method |
US11005732B1 (en) * | 2017-08-23 | 2021-05-11 | F5 Networks, Inc. | Methods for improved service chain classification and management and devices thereof |
-
2022
- 2022-04-26 CN CN202210445154.6A patent/CN115052051B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105898672A (en) * | 2014-05-09 | 2016-08-24 | 苹果公司 | Extended bluetooth communication modes |
US11005732B1 (en) * | 2017-08-23 | 2021-05-11 | F5 Networks, Inc. | Methods for improved service chain classification and management and devices thereof |
CN109068328A (en) * | 2018-10-11 | 2018-12-21 | 中国农业银行股份有限公司 | Secure network communication method, terminal and system |
CN111049793A (en) * | 2018-10-12 | 2020-04-21 | 株式会社斯巴鲁 | Protocol conversion device and vehicle diagnostic system |
CN110069050A (en) * | 2019-03-22 | 2019-07-30 | 深圳市朗仁科技有限公司 | Automobile polyelectron control unit detection method and device |
CN111431784A (en) * | 2020-04-21 | 2020-07-17 | 长念(上海)技术开发有限公司 | Universal MODBUS protocol data analysis method |
Non-Patent Citations (2)
Title |
---|
吴庆立: "电力机车整备作业安全监控控制系统的设计与开发", 信息科技辑 * |
邓庆绪;宁宝锋;金曦;刘志丹;: "基于局部动态可重构技术的多通道数据采集系统", 小型微型计算机系统, no. 09 * |
Also Published As
Publication number | Publication date |
---|---|
CN115052051B (en) | 2023-11-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN113014528B (en) | Message processing method, processing unit and virtual private network server | |
WO2019062621A1 (en) | Duplication transmission method and device | |
WO2021062797A1 (en) | Configuration method and apparatus | |
CN111107581B (en) | Method and device for determining and indicating PDCP copy function, base station and terminal | |
CN101364976A (en) | Method and apparatus for establishing communication channel | |
EP3836735A1 (en) | Method and apparatus for restoring data radio bearer, and storage medium and electronic apparatus | |
WO2021134728A1 (en) | Context management method and apparatus | |
CN111669835A (en) | Communication method, device and system | |
US8254309B2 (en) | Wireless communication equipment system for wireless local area network communication, and wireless communication sequence for the system | |
JP6388938B2 (en) | Discovery of WI-FI direct service via discovery probe | |
JP2024123224A (en) | Base station and terminal | |
CN115052051A (en) | Information processing method, system, controller and terminal based on ICAP protocol | |
CN101582057B (en) | Method, device and system for controlling communication and transmission of human interface device | |
WO2023185952A1 (en) | Mbs processing method, mbs sending apparatus and mbs receiving apparatus | |
CN109792312A (en) | A kind of method, terminal device and network equipment transmitting data | |
CN109167809B (en) | Internet of things platform docking data transmission format processing method | |
WO2021046758A1 (en) | Radio communication method, apparatus and system | |
WO2022247470A1 (en) | Method and apparatus for establishing bluetooth link, device, and storage medium | |
WO2022110919A1 (en) | Information subscription method and apparatus | |
CN115052052A (en) | Information transmission method, device and controller based on ICAP (independent component analysis protocol) | |
WO2021227703A1 (en) | Transmission method, device, and storage medium | |
CN112491903B (en) | Account checking method, device and system among multiple systems | |
CN115052050A (en) | Session negotiation method, device and controller based on ICAP | |
CN113573252A (en) | Data transmission method, system, chip, electronic device and storage medium | |
WO2021134151A1 (en) | Communication method and apparatus |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |