CN115052052A - Information transmission method, device and controller based on ICAP (independent component analysis protocol) - Google Patents

Information transmission method, device and controller based on ICAP (independent component analysis protocol) Download PDF

Info

Publication number
CN115052052A
CN115052052A CN202210445156.5A CN202210445156A CN115052052A CN 115052052 A CN115052052 A CN 115052052A CN 202210445156 A CN202210445156 A CN 202210445156A CN 115052052 A CN115052052 A CN 115052052A
Authority
CN
China
Prior art keywords
control
transmission
terminal
protocol
session
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210445156.5A
Other languages
Chinese (zh)
Inventor
李小华
杨显平
金翔宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Yunjia Intelligent Technology Co Ltd
Original Assignee
Shenzhen Yunjia Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Yunjia Intelligent Technology Co Ltd filed Critical Shenzhen Yunjia Intelligent Technology Co Ltd
Priority to CN202210445156.5A priority Critical patent/CN115052052A/en
Publication of CN115052052A publication Critical patent/CN115052052A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/22Parsing or analysis of headers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/24Negotiation of communication capabilities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Communication Control (AREA)

Abstract

An information transmission method, device and controller based on ICAP protocol, the said protocol includes the protocol header, the said method includes: the control terminal and the terminal carry out session negotiation through the session type message and establish communication connection with the terminal according to a negotiation result; the control end defines the type and the transmission mode of the information to be transmitted through the protocol header; and when the transmission mode is control transmission, the control end sends a control transmission type message to the terminal in a control transmission mode. The method can unify the communication protocols of OBD, VCI and other industrial control products, reduce repeated development and improve the stability of communication.

Description

Information transmission method, device and controller based on ICAP (independent component analysis protocol)
Technical Field
The present application relates to the field of industrial control, and in particular, to an information transmission method, apparatus and controller based on an ICAP protocol.
Background
Existing industrial control products, such as On-Board Diagnostics (OBD), Vehicle-mounted self-diagnosis (VCI), and Vehicle Communication Interface (VCI), have no unified Communication protocol, and need to be researched and developed separately, so that the products are repeatedly developed, and thus, resources are wasted.
Disclosure of Invention
The application provides an information transmission method, an information transmission device and a controller based on an ICAP protocol.
According to a first aspect of the present application, there is provided an information transmission method based on an ICAP protocol, the protocol including a protocol header, the method including:
the control terminal and the terminal carry out session negotiation through the session type message and establish communication connection with the terminal according to a negotiation result;
the control end defines the type and the transmission mode of the information to be transmitted through the protocol header;
and when the transmission mode is control transmission, the control end sends a control transmission type message to the terminal in a control transmission mode.
Further, the protocol header includes the following fields:
the package attributes are: including a transmission mode, the transmission mode including a control transmission and a burst transmission;
command: command types are defined including session class messages, control transfer class messages, and burst transfer class messages.
Further, the control terminal sends a control transmission type message to the terminal through a control transmission mode, including:
the plurality of request messages sent by the control terminal and the corresponding response messages sent by the terminal can be transmitted out of order and in a nested manner.
Further, the controlling the transmission type message specifically includes: parameter setting, parameter inquiry, state reporting, equipment control and response.
According to a second aspect of the present application, there is provided a controller based on an ICAP protocol, the protocol including a protocol header, the controller comprising:
the negotiation module is used for carrying out session negotiation with the terminal through the session type message and establishing communication connection with the terminal according to a negotiation result;
the definition module is used for defining the information category and the transmission mode to be transmitted through the protocol header;
and the processing module is used for sending the control transmission type message to the terminal in a control transmission mode when the transmission mode is control transmission.
Further, the protocol header includes the following fields:
the package attributes are: including a transmission mode, the transmission mode including a control transmission and a burst transmission;
command: command types are defined including session class messages, control transfer class messages, and burst transfer class messages.
Further, the processing module includes:
a transmitting unit configured to transmit a plurality of pieces of request information;
and the receiving unit is used for receiving corresponding response information sent by the terminal, and the request information and the response information can be transmitted out of order and in a nested manner.
According to a third aspect of the present application, there is provided an information transmission apparatus based on an ICAP protocol, comprising:
a memory for storing a program;
a processor for implementing the above method by executing the program stored in the memory.
According to a fourth aspect of the present application, there is provided a computer readable storage medium storing a program executable by a processor to perform the method described above.
Owing to adopted above technical scheme, make the beneficial effect that this application possesses lie in:
the information transmission method based on the ICAP protocol provided by the embodiment of the application comprises the steps that a control terminal and a terminal carry out session negotiation through session type information, and communication connection is established with the terminal according to a negotiation result; the control end defines the type and the transmission mode of the information to be transmitted through the protocol header; when the transmission mode is control transmission, the control end sends control transmission type information to the terminal through a control transmission mode.
Drawings
FIG. 1 is a flow chart of a method in one embodiment of the present application;
FIG. 2 is a schematic diagram of program modules of a controller according to a second embodiment of the present application;
fig. 3 is a schematic diagram of program modules of a controller in another embodiment according to a second embodiment of the present application.
Detailed Description
The present invention will be described in further detail with reference to the following detailed description and accompanying drawings. Wherein like elements in different embodiments are numbered with like associated elements. In the following description, numerous details are set forth in order to provide a better understanding of the present application. However, those skilled in the art will readily recognize that some of the features may be omitted or replaced with other elements, materials, methods in different instances. In some instances, certain operations related to the present application have not been shown or described in this specification in order not to obscure the core of the present application with unnecessary detail, and it is not necessary for those skilled in the art to describe these operations in detail, so that they may be fully understood from the description in the specification and the general knowledge in the art.
Furthermore, the features, operations, or characteristics described in the specification may be combined in any suitable manner to form various embodiments. Also, the various steps or actions in the method descriptions may be transposed or transposed in order, as will be apparent to one of ordinary skill in the art. Thus, the various sequences in the specification and drawings are for the purpose of describing certain embodiments only and are not intended to imply a required sequence unless otherwise indicated where such sequence must be followed.
The ordinal numbers used herein for the components, such as "first," "second," etc., are used merely to distinguish between the objects described, and do not have any sequential or technical meaning. The term "connected" and "coupled" when used in this application, unless otherwise indicated, includes both direct and indirect connections (couplings).
The ICAP (industrial Control advanced Communication Protocol) in the present application belongs to a transport Protocol (which may correspond to a network layer or a transport layer in the OSI model). The protocol aims at unifying the communication regulations of OBD, VCI and other industrial control products, reducing repeated development and improving the stability of communication. The protocol is applied to communication between the application of a numerical control key machine product and a mechanical control module for the first time, gives consideration to classical Bluetooth and serial port communication at present, and can be expanded to USB communication and higher communication links.
The first embodiment is as follows:
as shown in fig. 1, in the information transmission method based on the ICAP protocol provided in the embodiment of the present application, the ICAP protocol includes a protocol header, and the method may include the following steps:
step 101: the control terminal and the terminal carry out session negotiation through the session type message, and establish communication connection with the terminal according to the negotiation result.
Further, the session negotiation includes communication rate negotiation and communication security negotiation.
The communication rate negotiation comprises the maximum baud rate of a communication channel and the maximum data flux which can be borne by both communication parties; the parameters of the rate negotiation include: receive buffer and transmit buffer size.
The communication security negotiation comprises a session initiator informing a symmetric encryption mode supported by a receiver, wherein the encryption mode comprises DES,3DES, AES or NONE; wherein NONE indicates no encryption.
The first step of session establishment is session negotiation, and two communication parties need to carry out comprehensive negotiation on the characteristics of a communication channel to be established and can establish the communication channel after finally reaching an agreement.
The communication rate negotiation comprises the maximum baud rate of the communication channel and the maximum data flux which can be borne by the applications of the two communication parties. The channel baud rate does not need to be transmitted, the maximum baud rate is already determined after the connection mode is determined, and the parameter is known by both sides. The maximum data throughput that an application can tolerate by itself is typically related to the buffer size and the processing speed of the data in the buffer. Therefore, there are 2 parameters for rate negotiation, that is, the size of the receiving buffer and the sending buffer of both communication parties, the endianness is from high to low:
receiving buffer size Transmit buffer size
2bytes 2bytes
TABLE 1 Rate negotiation parameters Table
The communication security negotiation is a key step of confidentiality, and a session initiator informs a receiver of supported symmetric encryption modes including DES,3DES, AES and NONE. The full set is 4, and a subset of the support can be sent. The receiver selects one encryption mode according to self conditions, if NONE is selected, the encryption mode is not used, the message is transmitted in clear, and the characteristic can be only used in specific occasions, such as a research and development test stage, and the communication efficiency is improved in the occasions where one chip is difficult to monitor. This parameter is expressed in one byte, called the session option, and each of the 3-6 bits represents the support capability of an encryption scheme, as shown in the following table:
Figure BDA0003616436600000041
table 2 session option structure for rate negotiation parameters
If the session is established by the cube to force channel encryption, 0bit is set to 0, which indicates that communication without encryption is not supported, and the receiver cannot select a NON encryption mode, otherwise, the session cannot be established.
The idle window or heartbeat interval negotiation idle window refers to the measurement of communication activity, is the time of bus idle, and the session can be always kept valid in the idle window, and if the bus idle time exceeds the window time, the session can be invalid. The data consists of 4 bytes, 0 representing an infinitely long time window. The final result is based on the number of the response, if the sender gives a non-0 number, the receiver responds 0, and the sender has the right to refuse to continue the negotiation. When the flag in the session option selects the heartbeat interval, session maintenance will be based on the heartbeats, and the session will fail after a specified number of heartbeats have not been answered. And only selecting one of the idle window and the heartbeat interval, and maintaining the session by default by adopting the heartbeat. After the session is invalid, any received message is discarded without any response.
Step 102: the control end defines the information category and the transmission mode to be transmitted through the protocol header.
The protocol header may include the following fields:
the package attributes are: including a transmission mode, the transmission mode including a control transmission and a burst transmission;
command: command types are defined including session class messages, control transfer class messages, and burst transfer class messages.
Further, in an embodiment, the protocol header may specifically include the following fields:
sign (sign) Packet length Protocol version Package attributes ID Command Data of crc
1byte 1-4bytes 0-1byte 1byte 1-4bytes 1byte nbytes 1byte
0x80 High,LOW - - - - - -
TABLE 3 protocol header component structure
Marking: a fixed 0x80 indicates that a packet is started and the flag may not be used for short-range communications.
Packet length: 1-4 bytes, the entire packet length, including the packet header, data payload, crc, facilitates parsing packet integrity.
Protocol version: 0-4 bytes, the upper 4 bits are primary version, the lower 4 bits are secondary version, at most 255 versions are supported, and 0 is reserved. The protocol version is set in order to make the protocol itself extensible and compatible, and the processing of messages by the message sender must be kept consistent, which is based on the protocol version information. The protocol supports a maximum of 255 versions, with 0 reserved, starting at a minimum at 0.1, major versions 0-0x0F, minor versions 1-0x 0F. For example, version: 0.1, 1.3, 15.15, etc. In one embodiment, the protocol header may also contain no protocol version field, such as the bluetooth BLE channel, whose single frame data length cannot exceed 20 bytes.
Further, in another embodiment, the protocol header may include the following fields: packet attributes, message ID, data, packet length, in this embodiment, the protocol header may not include the following fields: flags, protocol version, and command fields, such as bluetooth BLE channel.
The package attributes may be used to control the parsing and properties of the package. Packet attributes control the properties of the packet, such as parsing and interaction, and currently use 1 byte:
Figure BDA0003616436600000051
table 4 packet attribute field composition structure of protocol header
The three bit fields may be arbitrarily arranged in the byte, may be arranged adjacent to each other or at intervals, and may be arranged at the upper or lower position. In one embodiment, the lowest order 0 represents the transmission mode, 0 represents the control transmission, the order of the various control transmissions does not matter, and messages can be interspersed; 1 indicates a burst transfer, and the burst transfer surface needs to transfer a large amount of data at a time, and the period cannot be interrupted until the transfer is completed, and the control transfer or the next burst transfer cannot be started. Bits 1-2 indicate symmetric encryption, 00 indicates no encryption, 01 indicates DES encryption, 10 indicates 3DES encryption, and 11 indicates AES encryption, and generally, the encryption is a result of negotiation between both parties during session establishment, and it is not possible to simply and fixedly use a certain encryption, which is a gospel to an attacker, and only the dynamic negotiation encryption is more secure. Bit 3 indicates whether the data is compressed, 0 indicates no compression, the original byte content is transmitted, and 1 indicates that the byte compression strategy is adopted.
ID: namely, the message ID, the upper 4 bits are the session ID, the lower 4 bits are the packet sequence number during the session, and the lower 4 bits automatically start from 0 when they reach 0x 0F. The message ID is 1 byte in length and has the following composition structure:
7-4 3-0
session ID Intra-session message ID
Table 5 message ID field composition structure of protocol header
During session establishment, bits 7-4 are always 0, after establishment, the session ID starts from 1, and after F is reached, the loop starts from 1, and the message ID rules are consistent, that is, the ID field does not have the condition of being equal to 0.
Command: 1 byte, 2 bits high is the command type, and 6 bits low is the subcommand. The command is 1 byte, the high 2bit is a type, and the low 6bit is a subclass, so that the design is convenient for command classification, and the logic is clearer. The command field includes the following:
binary value Name (R)
00 Session category messages
01 Control transmission classAuthentication messages
10 Burst transfer class message
11 Retention
TABLE 6 Command field content of protocol header
Message subclass all 1 indicates this type of message reply message, but command byte 0xFF reserved is an invalid message class, since the 7-6 bit value 11 is a reserved value and 0xFF cannot occur. The session category message any reply has a definite subcategory with the purpose of unambiguously identifying all steps of the session establishment procedure, rather than an ambiguous general reply.
Data: the payload varies according to the command.
crc: the exclusive or value of 1 byte full packet data (except for the crc itself).
Step 103: and when the transmission mode is control transmission, the control end sends a control transmission type message to the terminal in a control transmission mode.
Further, step 103 may specifically include:
a plurality of request messages sent by the control end and corresponding response messages sent by the terminal can be transmitted in disorder and nesting.
For example: s sends A message and then sends B message, R can respond B message according to actual situation first, then respond A message, the message nesting and response disorder happen in the period, this and burst transmission have essential difference.
Further, the controlling the transmission type message may specifically include: parameter setting, parameter inquiry, state reporting, equipment control and response.
The control transmission category message is specifically referred to in the following table:
binary value Name(s)
000001 Parameter setting
000010 Parameter query
000011 State query
000100 Status reporting
000101 Device control
111111 Answering
Others Retention
Table 7 control transmission class message
Setting parameters: in general, when industrial control equipment needs to work normally, various environment parameters need to be set externally, and any process capable of changing the parameters is abstracted into parameter setting by the protocol;
parameter query: actively acquiring environmental information of current industrial control equipment;
and (3) state query: actively inquiring the state of the industrial control equipment, wherein the state is usually reported but delay may exist, so that active inquiry can be realized;
and (3) reporting the state: the device actively reports the current state information, and the general state belongs to the dynamic variables of the environment, and the current state information cannot be set like parameters, so the concept of 'state setting' does not exist. According to different application scenes, the state report can be timely reported or delayed, and under the latter condition, the external part can timely know the interested state through 'state query'.
Controlling equipment: and executing various control commands supported by the equipment, and paying attention to distinguishing and relation among 'control', 'parameter setting' and 'state inquiry'. If there is a "control" command that can only change the operating "parameters", then this "control" command should fall within the "parameter set" command category and not the "device control" subcategory.
And (3) response: if there is an answer in each sub-command, the answer sender uses the answer sub-command, so that the boundary between the command and the answer can be clearly distinguished from the protocol.
Example two:
as shown in fig. 2 and fig. 3, a controller based on an ICAP protocol provided in an embodiment of the present application includes a protocol header, and the controller may include a negotiation module 210, a definition module 220, and a processing module 230.
And the negotiation module 210 is configured to perform session negotiation with the terminal through the session type message, and establish a communication connection with the terminal according to a negotiation result.
Further, the session negotiation includes communication rate negotiation and communication security negotiation.
The communication rate negotiation comprises the maximum baud rate of a communication channel and the maximum data flux which can be borne by both communication parties; parameters for rate negotiation include: receive buffer and transmit buffer size.
The communication security negotiation comprises a session initiator informing a receiver of a supported symmetric encryption mode, wherein the encryption mode comprises DES,3DES, AES or NONE; wherein NONE indicates no encryption.
The first step of session establishment is session negotiation, and two communication parties need to carry out comprehensive negotiation on the characteristics of a communication channel to be established and can establish the communication channel after finally reaching an agreement.
The communication rate negotiation comprises the maximum baud rate of the communication channel and the maximum data flux which can be borne by the applications of the two communication parties. The channel baud rate does not need to be transmitted, the maximum baud rate is already determined after the connection mode is determined, and the parameter is known by both sides. The maximum data throughput that an application can tolerate by itself is typically related to the buffer size and the processing speed of the data in the buffer. Therefore, there are 2 parameters for rate negotiation, namely, the size of the receiving buffer and the sending buffer of both communication parties, and the endianness is from high to low:
receiving buffer size Transmit buffer size
2bytes 2bytes
TABLE 1 Rate negotiation parameters Table
The communication security negotiation is a key step of confidentiality, and a session initiator informs a receiver of supported symmetric encryption modes including DES,3DES, AES and NONE. The full set is 4, and a subset of the support can be sent. The receiver selects one encryption mode according to self conditions, if NONE is selected, the encryption mode is not used, the message is transmitted in clear, and the characteristic can be only used in specific occasions, such as a research and development test stage, and the communication efficiency is improved in the occasions where one chip is difficult to monitor. This parameter is expressed in one byte, called the session option, and each of the 3-6 bits represents the support capability of an encryption scheme, as shown in the following table:
Figure BDA0003616436600000081
table 2 session option structure for rate negotiation parameters
If the session is established by the cube to force channel encryption, 0bit is set to 0, which indicates that communication without encryption is not supported, and the receiver cannot select a NON encryption mode, otherwise, the session cannot be established.
The idle window or heartbeat interval negotiation idle window refers to the measurement of communication activity, is the time of bus idle, and the session can be kept valid in the idle window all the time, and if the bus idle time exceeds the window time, the session can be invalid. The data consists of 4 bytes, 0 representing an infinitely long time window. The final result is based on the number of the response, if the sender gives a non-0 number, the receiver responds 0, and the sender has the right to refuse to continue the negotiation. When the flag in the session option selects the heartbeat interval, session maintenance will be based on the heartbeats, and the session will fail after a specified number of heartbeats have not been answered. And only selecting one of the idle window and the heartbeat interval, and maintaining the session by default by adopting the heartbeat. After the session is invalid, any received message is discarded without any response.
The defining module 220 is used for defining the information category and the transmission mode to be transmitted through the protocol header.
The protocol header may include the following fields:
the package attributes are: including a transmission mode, the transmission mode including a control transmission and a burst transmission;
command: command types are defined including session class messages, control transfer class messages, and burst transfer class messages.
The command field can be merged with the data field, i.e. the content of the command field can be stored in the data field. When the transport layer and network layer protocols communicate, the contents of the command field of the transport layer protocol or the network layer protocol may be contained in a data field whose meaning is specified by the application layer.
Further, in an embodiment, the protocol header may specifically include the following fields:
sign (C) Packet length Protocol version Package attributes ID Command Data of crc
1byte 2bytes 1byte 1byte 1byte 1byte nbytes 1byte
0x80 High,LOW - - - - - -
TABLE 3 protocol header component structure
Marking: a fixed 0x80 indicates that a packet is started and the flag may not be used for short-range communications.
Packet length: 1-4 bytes, the entire packet length, including the packet header, data payload, crc, facilitates parsing packet integrity.
Protocol version: 0-1 byte, the upper 4 bits are primary version, the lower 4 bits are secondary version, at most 255 versions are supported, 0 is reserved. The protocol version is set in order to make the protocol itself extensible and compatible, and the processing of messages by the message sender must be kept consistent, which is based on the protocol version information. The protocol supports a maximum of 255 versions, with 0 reserved, starting at a minimum at 0.1, major versions 0-0x0F, minor versions 1-0x 0F. For example, version: 0.1, 1.3, 15.15, etc. In one embodiment, the protocol header may also not contain a protocol version field, such as a bluetooth BLE channel, whose single frame data length cannot exceed 20 bytes.
Further, in another embodiment, the protocol header may include the following fields: packet attributes, message ID, data, packet length, in this embodiment, the protocol header may not include the following fields: flags, protocol version, and command fields, such as bluetooth BLE channel.
The package attributes are: the parsing and nature of the packet is controlled. Packet attributes control the properties of the packet, such as parsing and interaction, and currently use 1 byte:
Figure BDA0003616436600000101
table 4 packet attribute field composition structure of protocol header
The three bit fields may be arbitrarily arranged in the byte, may be arranged adjacent to each other or at intervals, and may be arranged at the upper or lower position. In one embodiment, the lowest order 0 represents the transmission mode, 0 represents the control transmission, the order of the various control transmissions does not matter, and messages can be transmitted interspersed; 1 indicates a burst transfer, and the burst transfer surface needs to transfer a large amount of data at a time, and the period cannot be interrupted until the transfer is completed, and the control transfer or the next burst transfer cannot be started. Bits 1-2 indicate symmetric encryption, 00 indicates no encryption, 01 indicates DES encryption, 10 indicates 3DES encryption, and 11 indicates AES encryption, and generally, encryption is a result of negotiation between both parties during session establishment, and some encryption cannot be simply and fixedly used, which is a gospel to an attacker, and is more secure only by dynamically negotiating encryption. Bit 3 indicates whether the data is compressed, 0 indicates no compression, the original byte content is transmitted, and 1 indicates that the byte compression strategy is adopted.
ID: namely, the message ID, the upper 4 bits are the session ID, the lower 4 bits are the packet sequence number during the session, and the lower 4 bits automatically start from 0 when they reach 0x 0F. The message ID is 1-4 bytes long, and in one embodiment, the message ID is structured as follows:
7-4 3-0
session ID Intra-session message ID
Table 5 message ID field composition structure of protocol header
During session establishment, bits 7-4 are always 0, after establishment, the session ID starts from 1, and after F is reached, the loop starts from 1, and the message ID rules are consistent, that is, the ID field does not have the condition of being equal to 0.
Command: 1 byte, with the upper 2 bits being the command type and the lower 6 bits being the subcommands. The command adopts 1 byte, the high 2bit is a type, and the low 6bit is a subclass, and the design is convenient for command classification, so that the logic is clearer. The command field includes the following:
binary value Name (R)
00 Session category messages
01 Controlling transmission class messages
10 Burst transfer class message
11 Retention
TABLE 6 Command field content of protocol header
Message subclass all 1 indicates this type of message reply message, but command byte 0xFF reserved is an invalid message class, since the 7-6 bit value 11 is a reserved value and 0xFF cannot occur. The session category message any reply has a definite subcategory with the purpose of unambiguously identifying all steps of the session establishment procedure, rather than an ambiguous general reply.
Data: the payload varies from command to command.
And (c) crc: the exclusive or value of 1 byte full packet data (except for the crc itself).
The processing module 230 is configured to send a control transmission type message to the terminal through a control transmission mode when the transmission mode is control transmission.
Further, the processing module 230 may include a processing unit 231;
a transmitting unit 231 for transmitting a plurality of pieces of request information;
the receiving unit 232 is configured to receive corresponding response information sent by the terminal, and the request information and the response information may be transmitted out of order and in a nested manner.
For example: s sends A message and then sends B message, R can respond B message according to actual situation first, then respond A message, the message nesting and response disorder occur during the period, this and burst transmission have essential difference.
Further, the controlling the transmission type message may specifically include: parameter setting, parameter inquiry, state report, equipment control and response.
The correspondence between the content of the control transmission type message and the binary value is specifically referred to the following table:
binary value Name (R)
000001 Parameter setting
000010 Parameter query
000011 State query
000100 Status reporting
000101 Device control
111111 Answering
Others Retention
Table 7 control transmission class message
Setting parameters: in general, when industrial control equipment needs to work normally, various environment parameters need to be set externally, and any process capable of changing the parameters is abstracted into parameter setting by the protocol;
parameter query: actively acquiring environmental information of current industrial control equipment;
and (3) state query: actively inquiring the state of the industrial control equipment, wherein the state is usually reported but delay may exist, so that active inquiry can be realized;
and (3) reporting the state: the device actively reports the current state information, and the general state belongs to the dynamic variables of the environment, and the current state information cannot be set like parameters, so the concept of 'state setting' does not exist. The state reporting is different according to application scenes, the reporting can be timely carried out, and the reporting can be delayed, and under the latter condition, the external part can timely know the interested state through 'state query'.
Controlling equipment: and executing various control commands supported by the equipment, and paying attention to distinguishing and relation among 'control', 'parameter setting' and 'state inquiry'. If there is a "control" command that can only change the operating "parameters", then this "control" command should fall within the "parameter set" command category and not the "device control" subcategory.
And (3) response: if there is an answer in each sub-command, the answer sender uses the answer sub-command, so that the boundary between the command and the answer can be clearly distinguished from the protocol.
Example three:
an implementation manner of the ICAP-based information transmission apparatus provided in the embodiment of the present application includes a memory and a processor.
A memory for storing a program;
and the processor is used for executing the program stored in the memory to realize the method in the first embodiment.
Example four:
a computer readable storage medium having a program stored thereon, the program being executable by a processor to perform the method of the first embodiment.
Those skilled in the art will appreciate that all or part of the functions of the various methods in the above embodiments may be implemented by hardware, or may be implemented by computer programs. When all or part of the functions of the above embodiments are implemented by a computer program, the program may be stored in a computer-readable storage medium, and the storage medium may include: a read only memory, a random access memory, a magnetic disk, an optical disk, a hard disk, etc., and the program is executed by a computer to realize the above functions. For example, the program may be stored in a memory of the device, and when the program in the memory is executed by the processor, all or part of the functions described above may be implemented. In addition, when all or part of the functions in the above embodiments are implemented by a computer program, the program may be stored in a storage medium such as a controller, another computer, a magnetic disk, an optical disk, a flash disk, or a removable hard disk, and may be downloaded or copied to a memory of a local device, or may be version-updated in a system of the local device, and when the program in the memory is executed by a processor, all or part of the functions in the above embodiments may be implemented.
The present invention has been described in terms of specific examples, which are provided to aid understanding of the invention and are not intended to be limiting. Numerous simple deductions, modifications or substitutions may also be made by those skilled in the art in light of the present teachings.

Claims (10)

1. An information transmission method based on an ICAP protocol, wherein the protocol comprises a protocol header, the method comprising:
the control terminal and the terminal carry out session negotiation through the session type message and establish communication connection with the terminal according to a negotiation result;
the control end defines the type and the transmission mode of the information to be transmitted through the protocol header;
and when the transmission mode is control transmission, the control terminal sends a control transmission type message to the terminal in a control transmission mode.
2. The method of claim 1, wherein the protocol header comprises the following fields:
the package attributes are: including a transmission mode, the transmission mode including control transmissions and burst transmissions;
command: command types are defined including session class messages, control transfer class messages, and burst transfer class messages.
3. The method of claim 1, wherein the controlling end sends the control transmission category message to the terminal through a control transmission manner, comprising:
the plurality of request messages sent by the control terminal and the corresponding response messages sent by the terminal can be transmitted out of order and in a nested manner.
4. The method of claim 1, wherein the controlling the transmission type message specifically comprises: parameter setting, parameter inquiry, state reporting, equipment control and response.
5. A controller based on an ICAP protocol, the protocol including a protocol header, the controller comprising:
the negotiation module is used for carrying out session negotiation with the terminal through the session type message and establishing communication connection with the terminal according to a negotiation result;
the definition module is used for defining the information category and the transmission mode to be transmitted through the protocol header;
and the processing module is used for sending a control transmission type message to the terminal through a control transmission mode when the transmission mode is control transmission.
6. The controller of claim 5, wherein the protocol header comprises the following fields:
the package attributes are: including a transmission mode, the transmission mode including a control transmission and a burst transmission;
command: command types are defined including session class messages, control transfer class messages, and burst transfer class messages.
7. The controller of claim 5, wherein the processing module comprises:
a transmitting unit configured to transmit a plurality of pieces of request information;
and the receiving unit is used for receiving corresponding response information sent by the terminal, and the request information and the response information can be transmitted out of order and in a nested manner.
8. The controller according to claim 5, wherein the controlling the transmission type message specifically comprises: parameter setting, parameter inquiry, state reporting, equipment control and response.
9. An information transmission apparatus based on an ICAP protocol, comprising:
a memory for storing a program;
a processor for implementing the method of any one of claims 1-4 by executing a program stored by the memory.
10. A computer-readable storage medium, characterized in that the storage medium has stored thereon a program which is executable by a processor for implementing the method according to any one of claims 1-4.
CN202210445156.5A 2022-04-26 2022-04-26 Information transmission method, device and controller based on ICAP (independent component analysis protocol) Pending CN115052052A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210445156.5A CN115052052A (en) 2022-04-26 2022-04-26 Information transmission method, device and controller based on ICAP (independent component analysis protocol)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210445156.5A CN115052052A (en) 2022-04-26 2022-04-26 Information transmission method, device and controller based on ICAP (independent component analysis protocol)

Publications (1)

Publication Number Publication Date
CN115052052A true CN115052052A (en) 2022-09-13

Family

ID=83157550

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210445156.5A Pending CN115052052A (en) 2022-04-26 2022-04-26 Information transmission method, device and controller based on ICAP (independent component analysis protocol)

Country Status (1)

Country Link
CN (1) CN115052052A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1809070A (en) * 2006-01-26 2006-07-26 华为技术有限公司 Method of implementing resource control on access layer per VC in L2VPN
CN1984132A (en) * 2005-12-12 2007-06-20 华为技术有限公司 Method and terminal for processing session ability information
CN102457437A (en) * 2010-10-21 2012-05-16 巴比禄股份有限公司 Connecting apparatus and method for transmitting packets

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1984132A (en) * 2005-12-12 2007-06-20 华为技术有限公司 Method and terminal for processing session ability information
CN1809070A (en) * 2006-01-26 2006-07-26 华为技术有限公司 Method of implementing resource control on access layer per VC in L2VPN
CN102457437A (en) * 2010-10-21 2012-05-16 巴比禄股份有限公司 Connecting apparatus and method for transmitting packets

Similar Documents

Publication Publication Date Title
US7461164B2 (en) Medium access control with software -and hardware- based components in a wireless network
US8897209B2 (en) Systems and methods for parallel communication with legacy WLAN receivers
CN110831240B (en) Base station and user equipment for early data transmission in random access procedure
CN107113782A (en) System and method for avoiding interference in digital communication
WO2022068506A1 (en) Data transmission method and apparatus
CN111727613A (en) Data transmission method and device
WO2021203850A1 (en) Negotiation method for operation mode, initiating end, receiving end, chip system, and medium
CN110808948A (en) Remote procedure calling method, device and system
WO2022042235A1 (en) Data packet sending method and apparatus, data packet processing method and apparatus, device, and data packet
WO2021204091A1 (en) Method and device for clearing buffer
WO2021212514A1 (en) Device-to-device based resource determination method, and device
US20150289297A1 (en) Packet Transmission Method and System, and Station
US9699685B1 (en) Battery life assisted scheduling
CN115052052A (en) Information transmission method, device and controller based on ICAP (independent component analysis protocol)
WO2020177169A1 (en) Communication method, apparatus and system
WO2021159907A1 (en) Information transmission method, base station and terminal
CN115052051B (en) Information processing method, system, controller and terminal based on ICAP protocol
CN115052056A (en) Industrial control communication method, device, equipment and storage medium
CN111182517A (en) CAN and Bluetooth data conversion system and data transmission method thereof
WO2022024176A1 (en) Base station and terminal
CN113364869B (en) Block chain message transmission method, equipment and storage medium
CN115052050A (en) Session negotiation method, device and controller based on ICAP
WO2021227703A1 (en) Transmission method, device, and storage medium
CN101765193B (en) Method for scheduling resource in EDCH, user terminal and communication system
CN110224803B (en) LoRa communication method for realizing beacon autonomous discovery

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination