CN115052051A - Information processing method, system, controller and terminal based on ICAP protocol - Google Patents

Information processing method, system, controller and terminal based on ICAP protocol Download PDF

Info

Publication number
CN115052051A
CN115052051A CN202210445154.6A CN202210445154A CN115052051A CN 115052051 A CN115052051 A CN 115052051A CN 202210445154 A CN202210445154 A CN 202210445154A CN 115052051 A CN115052051 A CN 115052051A
Authority
CN
China
Prior art keywords
terminal
burst transmission
negotiation
response information
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210445154.6A
Other languages
Chinese (zh)
Other versions
CN115052051B (en
Inventor
李小华
杨显平
金翔宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Yunjia Intelligent Technology Co Ltd
Original Assignee
Shenzhen Yunjia Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Yunjia Intelligent Technology Co Ltd filed Critical Shenzhen Yunjia Intelligent Technology Co Ltd
Priority to CN202210445154.6A priority Critical patent/CN115052051B/en
Publication of CN115052051A publication Critical patent/CN115052051A/en
Application granted granted Critical
Publication of CN115052051B publication Critical patent/CN115052051B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/22Parsing or analysis of headers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/24Negotiation of communication capabilities

Abstract

An information processing method, a system, a controller and a terminal based on an ICAP protocol are provided, the method comprises the following steps: the control terminal and the terminal carry out session negotiation through the session type message and establish communication connection with the terminal according to a negotiation result; the control terminal initiates a burst transmission request to the terminal; and the control terminal receives the response information of the terminal and processes the burst transmission type message according to the response information. The method can unify the communication procedures of OBD, VCI and other industrial control products, reduce repeated development and improve the stability of communication.

Description

Information processing method, system, controller and terminal based on ICAP (independent component analysis protocol)
Technical Field
The present application relates to the field of industrial control, and in particular, to an information processing method, system, controller, and terminal based on an ICAP protocol.
Background
Existing industrial control products, such as On-Board Diagnostics (OBD), Vehicle-mounted self-diagnosis (VCI), and Vehicle Communication Interface (VCI), have no unified Communication protocol, and need to be researched and developed separately, so that the products are repeatedly developed, and thus, resources are wasted.
Disclosure of Invention
The application provides an information processing method, system, controller and terminal based on an ICAP (independent component analysis protocol) protocol.
According to a first aspect of the present application, there is provided an information processing method based on an ICAP protocol, including:
the control terminal and the terminal carry out session negotiation through the session type message and establish communication connection with the terminal according to a negotiation result;
the control terminal initiates a burst transmission request to the terminal;
and the control terminal receives the response information of the terminal and processes the burst transmission type message according to the response information.
Further, the processing the burst transmission type message according to the response information includes:
when the response information is a positive response, the control end sends a burst transmission type message to the terminal in a burst transmission mode;
and when the response information is a negative response, the control terminal cancels the transmission of the burst transmission type message to the terminal.
According to a second aspect of the present application, there is provided an information processing method based on an ICAP protocol, including:
the terminal and the control terminal carry out session negotiation through the session type message and establish communication connection with the terminal according to a negotiation result;
the terminal receives the burst transmission request initiated by the control terminal and judges whether to allow the burst transmission to start or not according to the actual issue;
and the terminal sends response information to the control terminal and sends a judgment result to the control terminal through the response information.
Further, the reality includes: whether the data size exceeds a limit, whether the resource can be scheduled to process the batch of data, and/or whether other more important transactions are currently being processed.
Further, the step that the terminal sends response information to the control terminal, and after sending the judgment result to the control terminal through the response information, the method further includes:
and when the response information is a positive response, the terminal receives the burst transmission type message sent by the control terminal in a burst transmission mode.
According to a third aspect of the present application, there is provided an information processing method based on an ICAP protocol, including:
the control terminal and the terminal carry out session negotiation through the session type message and establish communication connection with the terminal according to a negotiation result;
the control terminal initiates a burst transmission request to the terminal;
the terminal receives the burst transmission request initiated by the control terminal and judges whether to allow the burst transmission to start or not according to the actual issue;
the terminal sends response information to the control terminal, and sends a judgment result to the control terminal through the response information;
and the control terminal receives the response information of the terminal and processes the burst transmission type message according to the response information.
According to a fourth aspect of the present application, there is provided a controller based on an ICAP protocol, comprising:
the first negotiation module is used for carrying out session negotiation with the terminal through session type information and establishing communication connection with the terminal according to a negotiation result;
a request module, configured to initiate a burst transmission request to the terminal;
and the first processing module is used for receiving the response information of the terminal and processing the burst transmission type message according to the response information.
According to a fifth aspect of the present application, there is provided a terminal based on an ICAP protocol, comprising:
the second negotiation module is used for carrying out session negotiation with the control terminal through the session type message and establishing communication connection with the terminal according to a negotiation result;
the second processing module is used for receiving the burst transmission request initiated by the control terminal and judging whether the burst transmission is allowed to start or not according to the actual issue;
and the sending module is used for sending response information to the control end and sending a judgment result to the control end through the response information.
According to a sixth aspect of the present application, the present application provides an information processing system based on an ICAP protocol, including a controller and a terminal, where the controller includes a first negotiation module, a request module and a first processing module, and the terminal includes a second negotiation module, a second processing module and a sending module;
the first negotiation module is used for carrying out session negotiation with the second negotiation module through session type information and establishing communication connection with the terminal according to a negotiation result;
the request module is used for initiating a burst transmission request to the terminal;
the second processing module is used for receiving the burst transmission request and judging whether to allow the burst transmission to start or not according to the actual issue;
the sending module is used for sending response information to the control end and sending a judgment result to the control end through the response information;
and the first processing module is used for receiving the response information of the terminal and processing the burst transmission type message according to the response information.
According to a seventh aspect of the present application, there is provided a computer readable storage medium having stored thereon a program executable by a processor to perform the method described above.
Owing to adopted above technical scheme, make the beneficial effect that this application possesses lie in:
according to the information processing method based on the ICAP, the control end and the terminal carry out session negotiation through session type information, and communication connection is established with the terminal according to a negotiation result; the control terminal initiates a burst transmission request to the terminal; and the control terminal receives the response information of the terminal and processes the burst transmission type message according to the response information. The method can unify the communication protocols of OBD, VCI and other industrial control products, reduce repeated development and improve the stability of communication.
Drawings
FIG. 1 is a flow chart of a method in one embodiment of the present application;
FIG. 2 is a flow chart of a method in an embodiment of the present application;
FIG. 3 is a flow chart of a method in a third embodiment of the present application;
FIG. 4 is a schematic diagram of program modules of a controller in one embodiment according to a fourth embodiment of the present application;
fig. 5 is a schematic diagram of program modules of a terminal in a fifth embodiment of the present application;
fig. 6 is a schematic diagram of program modules of a system in a sixth embodiment of the present application.
Detailed Description
The present invention will be described in further detail with reference to the following detailed description and accompanying drawings. Wherein like elements in different embodiments are numbered with like associated elements. In the following description, numerous details are set forth in order to provide a better understanding of the present application. However, one skilled in the art will readily recognize that some of the features may be omitted or replaced with other elements, materials, methods in different instances. In some instances, certain operations related to the present application have not been shown or described in detail in order to avoid obscuring the core of the present application from excessive description, and it is not necessary for those skilled in the art to describe these operations in detail, so that they may be fully understood from the description in the specification and the general knowledge in the art.
Furthermore, the features, operations, or characteristics described in the specification may be combined in any suitable manner to form various embodiments. Also, the various steps or actions in the method descriptions may be transposed or transposed in order, as will be apparent to one of ordinary skill in the art. Thus, the various sequences in the specification and drawings are for the purpose of describing certain embodiments only and are not intended to imply a required sequence unless otherwise indicated where such sequence must be followed.
The numbering of the components as such, e.g., "first", "second", etc., is used herein only to distinguish the objects as described, and does not have any sequential or technical meaning. The term "connected" and "coupled" as used herein includes both direct and indirect connections (couplings), unless otherwise specified.
The ICAP (industrial Control advanced Communication Protocol) in the present application belongs to a transport Protocol (which may correspond to a network layer or a transport layer in the OSI model). The protocol aims to unify the communication procedures of OBD, VCI and other industrial control products, reduce repeated development and improve the stability of communication. The protocol is applied to communication between the application of a numerical control key machine product and a mechanical control module for the first time, gives consideration to classical Bluetooth and serial port communication at present, and can be expanded to USB communication and higher communication links.
The first embodiment is as follows:
as shown in fig. 1, an implementation manner of the information processing method based on the ICAP protocol provided in the embodiment of the present application may include the following steps:
step 101: the control terminal and the terminal carry out session negotiation through the session type message, and establish communication connection with the terminal according to the negotiation result.
Further, the session negotiation includes communication rate negotiation and communication security negotiation.
The communication rate negotiation comprises the maximum baud rate of a communication channel and the maximum data flux which can be borne by both communication parties; the parameters of the rate negotiation include: receive buffer and transmit buffer size.
The communication security negotiation comprises a session initiator informing a receiver of a supported symmetric encryption mode, wherein the encryption mode comprises DES,3DES, AES or NONE; wherein NONE indicates no encryption.
The first step of session establishment is session negotiation, and two communication parties need to carry out comprehensive negotiation on the characteristics of a communication channel to be established and can establish the communication channel after finally reaching an agreement.
The communication rate negotiation comprises the maximum baud rate of the communication channel and the maximum data flux which can be borne by the applications of the two communication parties. The channel baud rate does not need to be transmitted, the maximum baud rate is already determined after the connection mode is determined, and the parameter is known by both sides. The maximum data throughput that an application can tolerate is typically related to the size of the buffer and the speed at which the data in the buffer is processed. Therefore, there are 2 parameters for rate negotiation, that is, the size of the receiving buffer and the sending buffer of both communication parties, the endianness is from high to low:
receiving buffer size Transmit buffer size
2bytes 2bytes
Table 1 table of rate negotiation parameters
The communication security negotiation is a key step of confidentiality, and a session initiator informs a receiver of supported symmetric encryption modes including DES,3DES, AES and NON. The full set is 4, and a subset of the support can be sent. The receiver selects one encryption mode according to self conditions, if NONE is selected, the encryption mode is not used, the message is transmitted in clear, and the characteristic can be only used in specific occasions, such as a research and development test stage, and the communication efficiency is improved in the occasions where one chip is difficult to monitor. This parameter is expressed in one byte, called the session option, and each of the 3-6 bits represents the support capability of an encryption scheme, as shown in the following table:
Figure BDA0003616434850000051
table 2 session option structure for rate negotiation parameters
If the session is established by the cube to force channel encryption, 0bit is set to 0, which indicates that communication without encryption is not supported, and the receiver cannot select a NON encryption mode, otherwise, the session cannot be established.
The idle window or heartbeat interval negotiation idle window refers to the measurement of communication activity, is the time of bus idle, and the session can be kept valid in the idle window all the time, and if the bus idle time exceeds the window time, the session can be invalid. The data consists of 4 bytes, 0 representing an infinitely long time window. The final result is based on the number of the response, if the sender gives a non-0 number, the receiver responds 0, and the sender has the right to refuse to continue the negotiation. When the flag in the session option selects the heartbeat interval, session maintenance will be based on the heartbeats, and the session will fail after a specified number of heartbeats have not been answered. And only selecting one of the idle window and the heartbeat interval, and maintaining the session by default by adopting the heartbeat. After the session is invalid, any received message is discarded without any response.
Step 102: the control terminal initiates a burst transmission request to the terminal.
The sending party of the large block data initiates a burst transmission request, and requests parameters are carried to refer to burst transmission request parameters.
The protocol header of the ICAP protocol may include the following fields:
sign (sign) Packet length Protocol version Package attributes Message ID Command Data of crc
1byte 1-4bytes 0-1byte 1byte 1-4bytes 1byte nbytes 1byte
0x80 High,LOW - - - - - -
TABLE 3 protocol header component structure
Packet attributes including compression mode, encryption mode and transmission mode;
message ID: the upper 4 bits are session ID, and the lower 4 bits are packet sequence number during session;
command: 1 byte, the high 2bit is a command type, including a session type message, a control transmission type message and a burst transmission type message, and the low 6bit is a subclass;
data: including the payload.
The command field can be merged with the data field, i.e. the content of the command field can be stored in the data field. When the transport layer and network layer protocols communicate, the contents of the command field of the transport layer protocol or the network layer protocol may be contained in a data field whose meaning is specified by the application layer.
Marking: a fixed 0x80 indicates a packet start.
Packet length: 1-4 bytes, the entire packet length, including packet header, data payload, crc, to facilitate parsing packet integrity.
Protocol version: 0-4 bytes, the upper 4 bits are primary version, the lower 4 bits are secondary version, at most 255 versions are supported, and 0 is reserved. The protocol version is set in order to make the protocol itself extensible and compatible, and the processing of messages by the message sender must be kept consistent, which is based on the protocol version information. The protocol supports a maximum of 255 versions, with 0 reserved, starting at a minimum at 0.1, major versions 0-0x0F, minor versions 1-0x 0F. For example, version: 0.1, 1.3, 15.15, etc. In one embodiment, the protocol header may also contain no protocol version field, such as the bluetooth BLE channel, whose single frame data length cannot exceed 20 bytes.
Further, in another embodiment, the protocol header may include the following fields: packet attributes, message ID, data, packet length, in this embodiment, the protocol header may not include the following fields: flags, protocol versions, and command fields, such as the bluetooth BLE channel.
The package attributes are: the parsing and nature of the packet is controlled. Packet attributes control the properties of the packet, such as parsing and interaction, and currently use 1 byte:
Figure BDA0003616434850000061
table 4 packet attribute field composition structure of protocol header
The three bit fields may be arbitrarily arranged in the byte, may be arranged adjacent to each other or at intervals, and may be arranged at the upper or lower position. In one embodiment, the lowest order 0 represents the transmission mode, 0 represents the control transmission, the order of the various control transmissions does not matter, and messages can be transmitted interspersed; 1 indicates a burst transfer, and the burst transfer surface needs to transfer a large amount of data at a time, and the period cannot be interrupted until the transfer is completed, and the control transfer or the next burst transfer cannot be started. Bits 1-2 indicate symmetric encryption, 00 indicates no encryption, 01 indicates DES encryption, 10 indicates 3DES encryption, and 11 indicates AES encryption, and generally, the encryption is a result of negotiation between both parties during session establishment, and it is not possible to simply and fixedly use a certain encryption, which is a gospel to an attacker, and only the dynamic negotiation encryption is more secure. Bit 3 indicates whether the data is compressed, 0 indicates no compression, the original byte content is transmitted, and 1 indicates that the byte compression strategy is adopted.
ID: namely, the message ID, the upper 4 bits are the session ID, the lower 4 bits are the packet sequence number during the session, and the lower 4 bits automatically start from 0 when they reach 0x 0F. The message ID is 1-4 bytes long, and in one embodiment, the message ID is structured as follows:
7-4 3-0
session ID Intra-session message ID
Table 5 message ID field composition structure of protocol header
During the session establishment, the 7-4 bits are always 0, the session ID starts from 1 after the establishment, the cycle starts from 1 after F is reached, the message ID rules are consistent, namely the ID field does not have the condition of being equal to 0.
Command: 1 byte, 2 bits high is the command type, and 6 bits low is the subcommand. The command is 1 byte, the high 2bit is a type, and the low 6bit is a subclass, so that the design is convenient for command classification, and the logic is clearer. The command field structure is as follows:
binary value Name (R)
00 Session category messages
01 Controlling transmission class messages
10 Burst transfer class message
11 Retention
Table 6 command field composition structure of protocol header
Message subclass all 1 indicates this type of message reply message, but command byte 0xFF reserved is an invalid message class, since the 7-6 bit value 11 is a reserved value and 0xFF cannot occur. The session category message any reply has a definite subcategory with the purpose of unambiguously identifying all steps of the session establishment procedure, rather than an ambiguous general reply.
Data: the payload varies according to the command.
crc: the exclusive or value of 1 byte full packet data (except for the crc itself).
Step 103: and the control end receives the response information of the terminal and processes the burst transmission type message according to the response information.
The burst transfer class message is specifically referred to the following table:
Figure BDA0003616434850000071
Figure BDA0003616434850000081
table 7 burst transmission class message
Further, step 103 may comprise:
and when the response information is a positive response, the control end sends a burst transmission type message to the terminal in a burst transmission mode.
After all the transmissions are successful, the sender finishes the burst transmission, and at this time, the burst transmission can still be cancelled.
And when the response information is a negative response, the control terminal cancels the transmission of the burst transmission type message to the terminal.
Burst transmission is used for atomic transmission of a large amount of data in a short time, the burst transmission monopolizes a bus in the period, namely after one-time burst transmission is started, any control transmission and other burst transmission are refused by the bus, and other transmissions cannot be started until the burst transmission is finished. Generally, the transmission of any form of file should be in burst transmission, for example: firmware upgrade, ECU data flash, etc. The burst transmission has lower priority but occupies the bus, so that the burst transmission is started once as a result of the common negotiation between the sender and the receiver, the sender cannot independently start the burst transmission, and the receiver can really start the burst transmission only after all preparations are made, because the priority is lower, the receiver has the right to reject the burst transmission under certain conditions.
When the sender goes down and cannot send the next frame data, the receiver should reset the burst transmission that has failed the next session establishment request.
When the receiving party is down and cannot send out the processing state of the previous frame, the sending party should wait for timeout according to 1.5 times of the average response time of each previous frame, and once timeout occurs, the session should be terminated and a new session should be established again so that the states can be synchronized.
Example two:
as shown in fig. 2, an implementation manner of the information processing method based on the ICAP protocol provided in the embodiment of the present application includes the following steps:
step 201: the terminal and the control terminal carry out session negotiation through the session type message and establish communication connection with the terminal according to the negotiation result.
Step 202: and the terminal receives the burst transmission request initiated by the control terminal and judges whether to allow the burst transmission to start or not according to the actual issue.
Further, the reality specifically includes: whether the data size exceeds a limit, whether the resource can be scheduled to process the batch of data, and/or whether other more important transactions are currently being processed.
Step 203: and the terminal sends response information to the control terminal and sends a judgment result to the control terminal through the response information.
Further, step 203 may be followed by:
step 204: and when the response information is a positive response, the terminal receives the burst transmission type message sent by the control end in a burst transmission mode.
Example three:
as shown in fig. 3, an implementation manner of the information processing method based on the ICAP protocol provided in the embodiment of the present application includes the following steps:
step 301: the control terminal and the terminal carry out session negotiation through the session type message, and establish communication connection with the terminal according to the negotiation result.
Step 302: the control terminal initiates a burst transmission request to the terminal.
Step 303: and the terminal receives the burst transmission request initiated by the control terminal and judges whether to allow the burst transmission to be started according to the actual situation.
Step 304: and the terminal sends response information to the control terminal and sends a judgment result to the control terminal through the response information.
Step 305: and the control end receives the response information of the terminal and processes the burst transmission type message according to the response information.
Example four:
as shown in fig. 4, an implementation manner of the controller based on the ICAP protocol provided in the embodiment of the present application includes a first negotiation module 410, a request module 420, and a first processing module 430.
The first negotiation module 410 is configured to perform session negotiation with the terminal through the session type message, and establish a communication connection with the terminal according to a negotiation result.
A request module 420, configured to initiate a burst transmission request to the terminal.
The first processing module 430 is configured to receive response information of the terminal, and process the burst transmission type message according to the response information.
Example five:
as shown in fig. 5, an implementation manner of the ICAP protocol-based terminal provided in this embodiment of the present application includes a second negotiation module 510, a second processing module 520, and a sending module 530.
A second negotiation module 510, configured to perform session negotiation with the control end through the session type message, and establish a communication connection with the terminal according to a negotiation result;
a second processing module 520, configured to receive a burst transmission request initiated by a control end, and determine whether to allow burst transmission to start according to a real issue;
the sending module 530 is configured to send a response message to the control end, and send a determination result to the control end through the response message.
Example six:
as shown in fig. 6, an implementation manner of the information processing system based on the ICAP protocol provided in the embodiment of the present application includes a controller 600 and a terminal 700, where the controller 600 includes a first negotiation module 610, a request module 620 and a first processing module 630, and the terminal 700 includes a second negotiation module 710, a second processing module 720 and a sending module 730;
the first negotiation module 610 is configured to perform session negotiation with the second negotiation module 710 through a session type message, and establish a communication connection with a terminal according to a negotiation result;
a request module 620, configured to initiate a burst transmission request to a terminal;
a second processing module 720, configured to receive the burst transmission request, and determine whether to allow burst transmission to start according to the actual issue;
the sending module 730 is configured to send response information to the control end, and send a determination result to the control end through the response information;
the first processing module 630 is configured to receive response information of the terminal, and process the burst transmission type message according to the response information.
Example seven:
a computer-readable storage medium storing a program executable by a processor to implement the methods of the first, second, and third embodiments.
Those skilled in the art will appreciate that all or part of the functions of the methods in the above embodiments may be implemented by hardware, or may be implemented by a computer program. When all or part of the functions of the above embodiments are implemented by a computer program, the program may be stored in a computer-readable storage medium, and the storage medium may include: a read only memory, a random access memory, a magnetic disk, an optical disk, a hard disk, etc., and the program is executed by a computer to realize the above functions. For example, the program may be stored in a memory of the device, and when the program in the memory is executed by the processor, all or part of the functions described above may be implemented. In addition, when all or part of the functions in the above embodiments are implemented by a computer program, the program may be stored in a storage medium such as a controller, another computer, a magnetic disk, an optical disk, a flash disk, or a portable hard disk, and may be downloaded or copied and stored in a memory of a local device, or a version of a system of the local device may be updated, and when the program in the memory is executed by a processor, all or part of the functions in the above embodiments may be implemented.
The present invention has been described in terms of specific examples, which are provided to aid understanding of the invention and are not intended to be limiting. For a person skilled in the art to which the invention pertains, several simple deductions, modifications or substitutions may be made according to the idea of the invention.

Claims (10)

1. An information processing method based on an ICAP protocol is characterized by comprising the following steps:
the control terminal and the terminal carry out session negotiation through the session type message and establish communication connection with the terminal according to a negotiation result;
the control terminal initiates a burst transmission request to the terminal;
and the control terminal receives the response information of the terminal and processes the burst transmission type message according to the response information.
2. The method of claim 1, wherein the processing the burst transmission class message according to the response information comprises:
when the response information is a positive response, the control end sends a burst transmission type message to the terminal in a burst transmission mode;
and when the response information is a negative response, the control terminal cancels the transmission of the burst transmission type message to the terminal.
3. An information processing method based on an ICAP protocol is characterized by comprising the following steps:
the terminal and the control terminal carry out session negotiation through the session type message and establish communication connection with the terminal according to a negotiation result;
the terminal receives the burst transmission request initiated by the control terminal and judges whether to allow the burst transmission to start or not according to the actual issue;
and the terminal sends response information to the control terminal and sends a judgment result to the control terminal through the response information.
4. The method of claim 3, wherein the reality scenario comprises: whether the data size exceeds a limit, whether the resource can be scheduled to process the batch of data, and/or whether other more important transactions are currently being processed.
5. The method of claim 3, wherein the step of sending the response message to the control end by the terminal, and after sending the determination result to the control end by the response message, further comprises:
and when the response information is a positive response, the terminal receives the burst transmission type message sent by the control terminal in a burst transmission mode.
6. An information processing method based on an ICAP protocol is characterized by comprising the following steps:
the control terminal and the terminal carry out session negotiation through the session type message and establish communication connection with the terminal according to a negotiation result;
the control terminal initiates a burst transmission request to the terminal;
the terminal receives the burst transmission request initiated by the control terminal and judges whether to allow the burst transmission to start or not according to the actual issue;
the terminal sends response information to the control terminal, and sends a judgment result to the control terminal through the response information;
and the control terminal receives the response information of the terminal and processes the burst transmission type message according to the response information.
7. A controller based on the ICAP protocol, comprising:
the first negotiation module is used for carrying out session negotiation with the terminal through session type information and establishing communication connection with the terminal according to a negotiation result;
a request module, configured to initiate a burst transmission request to the terminal;
and the first processing module is used for receiving the response information of the terminal and processing the burst transmission type message according to the response information.
8. A terminal based on the ICAP protocol, comprising:
the second negotiation module is used for carrying out session negotiation with the control terminal through the session type message and establishing communication connection with the terminal according to a negotiation result;
the second processing module is used for receiving the burst transmission request initiated by the control terminal and judging whether the burst transmission is allowed to start or not according to the actual issue;
and the sending module is used for sending response information to the control end and sending a judgment result to the control end through the response information.
9. An information processing system based on an ICAP protocol is characterized by comprising a controller and a terminal, wherein the controller comprises a first negotiation module, a request module and a first processing module, and the terminal comprises a second negotiation module, a second processing module and a sending module;
the first negotiation module is used for carrying out session negotiation with the second negotiation module through session type information and establishing communication connection with the terminal according to a negotiation result;
the request module is used for initiating a burst transmission request to the terminal;
the second processing module is used for receiving the burst transmission request and judging whether to allow the burst transmission to start or not according to the actual issue;
the sending module is used for sending response information to the control terminal and sending a judgment result to the control terminal through the response information;
and the first processing module is used for receiving the response information of the terminal and processing the burst transmission type message according to the response information.
10. A computer-readable storage medium, characterized in that the storage medium has stored thereon a program which is executable by a processor for implementing the method according to any one of claims 1-6.
CN202210445154.6A 2022-04-26 2022-04-26 Information processing method, system, controller and terminal based on ICAP protocol Active CN115052051B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210445154.6A CN115052051B (en) 2022-04-26 2022-04-26 Information processing method, system, controller and terminal based on ICAP protocol

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210445154.6A CN115052051B (en) 2022-04-26 2022-04-26 Information processing method, system, controller and terminal based on ICAP protocol

Publications (2)

Publication Number Publication Date
CN115052051A true CN115052051A (en) 2022-09-13
CN115052051B CN115052051B (en) 2023-11-17

Family

ID=83158304

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210445154.6A Active CN115052051B (en) 2022-04-26 2022-04-26 Information processing method, system, controller and terminal based on ICAP protocol

Country Status (1)

Country Link
CN (1) CN115052051B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105898672A (en) * 2014-05-09 2016-08-24 苹果公司 Extended bluetooth communication modes
CN109068328A (en) * 2018-10-11 2018-12-21 中国农业银行股份有限公司 Secure network communication method, terminal and system
CN110069050A (en) * 2019-03-22 2019-07-30 深圳市朗仁科技有限公司 Automobile polyelectron control unit detection method and device
CN111049793A (en) * 2018-10-12 2020-04-21 株式会社斯巴鲁 Protocol conversion device and vehicle diagnostic system
CN111431784A (en) * 2020-04-21 2020-07-17 长念(上海)技术开发有限公司 Universal MODBUS protocol data analysis method
US11005732B1 (en) * 2017-08-23 2021-05-11 F5 Networks, Inc. Methods for improved service chain classification and management and devices thereof

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105898672A (en) * 2014-05-09 2016-08-24 苹果公司 Extended bluetooth communication modes
US11005732B1 (en) * 2017-08-23 2021-05-11 F5 Networks, Inc. Methods for improved service chain classification and management and devices thereof
CN109068328A (en) * 2018-10-11 2018-12-21 中国农业银行股份有限公司 Secure network communication method, terminal and system
CN111049793A (en) * 2018-10-12 2020-04-21 株式会社斯巴鲁 Protocol conversion device and vehicle diagnostic system
CN110069050A (en) * 2019-03-22 2019-07-30 深圳市朗仁科技有限公司 Automobile polyelectron control unit detection method and device
CN111431784A (en) * 2020-04-21 2020-07-17 长念(上海)技术开发有限公司 Universal MODBUS protocol data analysis method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
吴庆立: "电力机车整备作业安全监控控制系统的设计与开发", 信息科技辑 *
邓庆绪;宁宝锋;金曦;刘志丹;: "基于局部动态可重构技术的多通道数据采集系统", 小型微型计算机系统, no. 09 *

Also Published As

Publication number Publication date
CN115052051B (en) 2023-11-17

Similar Documents

Publication Publication Date Title
WO2017201654A1 (en) Data transmission method, network device and terminal device
WO2019062621A1 (en) Duplication transmission method and device
EP3836735A1 (en) Method and apparatus for restoring data radio bearer, and storage medium and electronic apparatus
WO2021134728A1 (en) Context management method and apparatus
WO2022042235A1 (en) Data packet sending method and apparatus, data packet processing method and apparatus, device, and data packet
WO2022222299A1 (en) Communication method for wifi device, and device and computer-readable storage medium
CN113141674A (en) Link configuration method, device, system and storage medium in multi-link system
CN111107581B (en) Method and device for determining and indicating PDCP copy function, base station and terminal
CN115052051A (en) Information processing method, system, controller and terminal based on ICAP protocol
WO2023185952A1 (en) Mbs processing method, mbs sending apparatus and mbs receiving apparatus
CN109792312A (en) A kind of method, terminal device and network equipment transmitting data
WO2021046758A1 (en) Radio communication method, apparatus and system
US20220346119A1 (en) Data transmission method, terminal apparatus, and storage medium
WO2022247470A1 (en) Method and apparatus for establishing bluetooth link, device, and storage medium
CN115052052A (en) Information transmission method, device and controller based on ICAP (independent component analysis protocol)
WO2021169645A1 (en) Data transmission method and terminal
CN115052050A (en) Session negotiation method, device and controller based on ICAP
CN113573252A (en) Data transmission method, system, chip, electronic device and storage medium
CN110572440B (en) Method and device for data transmission, household appliance and storage medium
CN112491903A (en) Account checking method, device and system among multiple systems
WO2019213958A1 (en) Data packet transmission method and device
WO2020125314A1 (en) System and method for adjusting protocol stack data, and storage medium
CN113572695A (en) Link aggregation method and device, computing equipment and computer storage medium
TWI836730B (en) Integrity protection method and associated wireless communciation apparatus
WO2023070377A1 (en) Block acknowledgment agreement deletion method and apparatus, and multi-link device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant