CN217388751U - Internet of things network penetration system - Google Patents

Internet of things network penetration system Download PDF

Info

Publication number
CN217388751U
CN217388751U CN202221384682.7U CN202221384682U CN217388751U CN 217388751 U CN217388751 U CN 217388751U CN 202221384682 U CN202221384682 U CN 202221384682U CN 217388751 U CN217388751 U CN 217388751U
Authority
CN
China
Prior art keywords
network
penetrator
cloud platform
communication
internet
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202221384682.7U
Other languages
Chinese (zh)
Inventor
冼南宝
李力
魏鹏耀
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Kunpeng Wulian Technology Co ltd
Original Assignee
Guangzhou Kunpeng Wulian Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Kunpeng Wulian Technology Co ltd filed Critical Guangzhou Kunpeng Wulian Technology Co ltd
Priority to CN202221384682.7U priority Critical patent/CN217388751U/en
Application granted granted Critical
Publication of CN217388751U publication Critical patent/CN217388751U/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Small-Scale Networks (AREA)

Abstract

The application discloses thing networking network pierces through system belongs to thing networking technology field, and this thing networking network pierces through system, including treating debugging equipment, network penetrator, operator basic station, cloud platform and computer terminal, treat debugging equipment the network penetrator the operator basic station the cloud platform with computer terminal communication connection in proper order to realize treating the remote communication connection of debugging equipment and computer terminal through the network construction, accomplish signal transmission. The system is different from the traditional scheme and has the effects of low cost, convenience in maintenance and the like.

Description

Internet of things network penetration system
Technical Field
The application relates to the technical field of Internet of things, in particular to a network penetration system of the Internet of things.
Background
In the production and life process, various commodity products can be sold to various places in a wide market range. Some products are applied after installation and debugging are needed, which puts too high technical ability requirements on consumers or requires a seller to go to a product installation site for debugging. The traditional debugging mode is high in cost and inconvenient to operate. As shown in fig. 1, the device to be debugged 110 is connected to the PC120 for debugging through a network cable, and a technician arrives at the field and debugs the device to be debugged through the PC 120.
With the continuous development of internet communication and network technology, especially the development of internet of things technology, the remote debugging is possible. More and more sales merchants realize remote debugging of the equipment by using the Internet of things penetration technology, and great convenience is provided for installation and maintenance of the equipment. However, the traditional internet of things penetration system has the problems of high cost, resource waste and the like.
In summary, the problems of the related art need to be solved.
SUMMERY OF THE UTILITY MODEL
The present application aims to solve at least one of the technical problems in the related art to some extent.
Therefore, an object of the embodiments of the present application is to provide an internet of things network penetration system, which is used to achieve at least one of the effects of reducing cost and facilitating maintenance.
In order to achieve the technical purpose, the technical scheme adopted by the embodiment of the application comprises the following steps:
on one hand, the embodiment of the application provides an internet of things network penetration system, which comprises equipment to be debugged, a network penetrator, an operator base station, a cloud platform and a computer terminal, wherein the equipment to be debugged, the network penetrator, the operator base station, the cloud platform and the computer terminal are sequentially in communication connection;
the computer terminal is used for sending an intranet penetration request message to the cloud platform;
the cloud platform receives the request information, allocates a public network port and sends the allocated port number information to the computer terminal; issuing an intranet penetration instruction through MQTT, and transmitting the instruction to the network penetrator through the operator base station;
the computer terminal receives the port number information and is connected with the cloud platform according to a port number TCP distributed by the port number information;
the network penetrator establishes an intranet TCP (transmission control protocol) communicated with the equipment to be debugged according to the intranet penetration instruction to realize communication connection between the network penetrator and the equipment to be debugged; the TCP connection is established with the cloud platform through the operator base station, and mapping is established for data forwarding;
and the cloud platform is further used for establishing mapping between the distributed public network ports and the internal network TCP after receiving the TCP connection of the network penetrator, so as to realize data forwarding.
In addition, the internet of things network penetration system according to the above embodiment of the present application may further have the following additional technical features:
further, in one embodiment of the present application, the communication mode of the network penetrator supports wired communication and wireless communication, and the wireless communication is compatible with WIFI, 4G and 5G communication.
Further, in one embodiment of the present application, the wireless communication is also compatible with ad hoc network communication.
Further, in an embodiment of the present application, the network penetrator is provided with a Mini-PCIE seat to implement wireless communication.
Advantages and benefits of the present application will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the present application:
the utility model provides a thing networking network pierces through system, including treating debugging equipment, network penetrator, operator basic station, cloud platform and computer terminal, treat debugging equipment the network penetrator the operator basic station the cloud platform with computer terminal is communication connection in proper order to realize treating the remote communication connection of debugging equipment and computer terminal through the network construction, accomplish signal transmission. The system has the effects of low cost, convenient maintenance and the like.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings of the embodiments of the present application or the related technical solutions in the prior art are described below, it should be understood that the drawings in the following description are only for convenience and clarity of describing some embodiments in the technical solutions of the present invention, and it is obvious for those skilled in the art that other drawings can also be obtained according to these drawings without creative efforts.
FIG. 1 is a conventional device commissioning system;
FIG. 2 is a diagram of a device debug system in a re-penetration debug mode;
fig. 3 is a network penetration system of the internet of things provided in an embodiment of the present application;
FIG. 4 is a block diagram of a port configuration of a network penetrator in the system according to the embodiment of the present application;
FIG. 5 is a block diagram of another port configuration of a network penetrator in the system according to the embodiment of the present application;
FIG. 6 is a circuit diagram of a port setup circuit of a network penetrator in the system according to the embodiment of the present application;
fig. 7 is a circuit diagram of another port configuration of a network penetrator in the system according to the embodiment of the present application.
Detailed Description
The present application is further described with reference to the following figures and specific examples. The described embodiments should not be considered as limiting the present application, and all other embodiments obtained by a person skilled in the art without making any inventive step are within the scope of protection of the present application.
In the following description, reference is made to "some embodiments" which describe a subset of all possible embodiments, but it is understood that "some embodiments" may be the same subset or different subsets of all possible embodiments, and may be combined with each other without conflict.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs. The terminology used herein is for the purpose of describing embodiments of the present application only and is not intended to be limiting of the application.
Fig. 1 shows a conventional device debugging system, a device to be debugged 110 is connected to a PC120 for debugging through a network cable, and a technician debugs the device to be debugged through the PC120 after arriving at a site, so that the manual maintenance cost is high, the response speed for processing a device problem is not timely, and the processing efficiency is low. Remote debugging and maintenance are carried out on the equipment by deploying network penetration software on a computer host PC 2; the system is large in size, high in power consumption, inflexible in outdoor deployment, not energy-saving, and capable of consuming port numbers for a long time to waste resources.
Fig. 2 shows an apparatus debugging system in a re-penetration debugging mode, where ready-made general network penetration software (such as lan proxy software) is deployed on a local server 3 where an apparatus is located, and is used to connect and communicate an apparatus 1 to be debugged with a cloud server 4, and finally, debug and maintain the apparatus 1 to be debugged remotely through a PC 2. The local server of the method is often an X86 server, and the cost is generally high; the existing general network penetration software needs to occupy the allocated network port number for a long time and cannot release the allocated network port number, so that network resources are wasted, and if the number of the devices is huge, the network port number is deficient.
Fig. 3 is a network penetration system of the internet of things according to an embodiment of the present application. The network penetrator 7 in the system is a lightweight network penetrator, the device 1 to be debugged, the network penetrator 7, the operator base station 8, the cloud platform 5 and the computer PC2 are sequentially in communication connection, and the device 1 to be debugged can be debugged and maintained remotely only by being connected with the network penetrator 7. The computer terminal is used for sending request intranet penetration information to the cloud platform. The cloud platform receives the request information, allocates a public network port and sends the allocated port number information to the computer terminal; and issuing an intranet penetration instruction through the MQTT, and transmitting the instruction to the network penetrator through the operator base station. And the computer terminal receives the port number information and is connected with the cloud platform according to a port number TCP distributed by the port number information. The network penetrator establishes an intranet TCP (transmission control protocol) communicated with the equipment to be debugged according to the intranet penetration instruction to realize communication connection between the network penetrator and the equipment to be debugged; and establishing TCP connection with the cloud platform through the operator base station, and establishing mapping for data forwarding. And the cloud platform is further used for establishing mapping between the distributed public network ports and the internal network TCP after receiving the TCP connection of the network penetrator, so as to realize data forwarding. The scheme is low in implementation cost and high in deployment processing efficiency.
The information transfer relationship of the system shown in fig. 3 is as follows.
A user sends a request for intranet penetration information to the cloud platform by using a computer terminal PC2, the cloud platform 5 receives the request information, allocates a public network port and sends the allocated port number information to a PC 2;
the PC2 receives the port number information, and is connected with the cloud platform 5 according to the port number TCP allocated by the port number information;
after receiving the request information, the cloud platform 5 also issues an intranet penetration instruction through MQTT, and transmits the instruction to the network penetrator 7 through the operator base station 6;
the network penetrator 7 establishes an intranet TCP communicated with the equipment 1 to be debugged according to the intranet penetration instruction, so that communication connection between the network penetrator 7 and the equipment 1 to be debugged is realized, the network penetrator 7 also establishes TCP connection with the cloud platform 5 through the operator base station 6 and establishes mapping for data forwarding;
after receiving the TCP connection of the network penetrator 7, the cloud platform 5 establishes mapping between the allocated public network port and the internal network TCP, thereby implementing data forwarding.
The system configuration does not need to fixedly occupy a port number for a long time, can realize the repeated use of port resources, and supports the network penetration of the number of the terminals in the massive levels.
In practical application, a user establishes a TCP connection to a port allocated to the cloud platform 5 by using the computer terminal PC2, initiates service invocation, and the cloud platform 5 forwards service data to the network penetrator 7; the network penetrator 7 forwards the data to the device 1 to be debugged, so that the data communication between the device 1 to be debugged and the external network user is realized.
In some embodiments, the communication mode of the network penetrator 7 may support wired and wireless, and the wireless communication may be compatible with WIFI, 4G/5G and ad hoc networks, and support communication modes in different scenarios.
In some embodiments, in the presence of a fixed broadband network and convenient wiring, wired communication may be adopted, and wired network communication may be realized through a standard RJ45 interface, and the circuit is shown in fig. 6.
In FIG. 6, the J3 element is an RJ45 socket, and the model is 5JA-1X1-8P 8C-S; the U2 element is ESD protection circuit with model number SLVU 2.8-4. Pins 4 and 5 of the J3 are connected with a power supply V12V _ OUT, and can supply power to the outside. Diode D5 is used to prevent reverse connection of the power supply. The 4 th-5 th pins can be used for supplying power to equipment to be debugged, such as a camera and the like. The 6 th leg of J3 is connected with the 4 th leg of U2, the 3 rd leg of J3 is connected with the 3 rd leg of U2, the 2 nd leg of J3 is connected with the 2 nd leg of U2, and the 1 st leg of J3 is connected with the 1 st leg of U2. The connection relation is not shown in fig. 6, and the correspondence relation between the signal names in the drawing can be obtained. The 5 th to 8 th pins of U2 are connected to the processor (not shown) of the networker 7. Surge protection circuits are connected between pins 6 and 3 and between pins 2 and 1 of the J3, and each surge protection circuit comprises a resistance element and a gas discharge tube as shown in fig. 6. And a 12 th pin and a 13 th pin of the J3 are respectively connected with a LINK _ LED signal and an SPD _ LED signal and are used for driving display output, if the network connection is successful, the LINK _ LED output signal drives a corresponding signal lamp to be normally on, and if data is received and transmitted, the SPD _ LED output signal drives a corresponding signal lamp to flicker. The right end of J3 in FIG. 6 is used for connecting the network cable. A processor (not shown) processes the received signal, such as encoding or transcoding the received video stream, and transmits the processed signal to the cloud.
In some embodiments, under the condition of wired network coverage or inconvenient wire pulling, wireless communication can be adopted, a standard Mini-PCIE seat is adopted, different communication modules are inserted, and WIFI, 4G, 5G or ad hoc network communication is realized, so that the method is flexible, the compatibility is strong, and the circuit is shown in fig. 7. The model of the J9 element is XDMP-067-A01, and the 36 th and 38 th feet of the J9 element are used for receiving WIFI or 4G or 5G signals; 8, 10, 12, 14, 16, 44 can be used for inserting SIM cards; the pins 23 and 31 can be used as two serial ports of autonomous network communication; the 11 th pin supplies power to the outside to supply power to an external indicator light and/or a signal light, for example, for indicating the normal communication of the module; the 46 th pin is a reserved pin; the 20 th pin is a 4G or 5G or ad hoc network enabling pin, and the 22 th pin is connected with a reset signal; a 33 rd pin is a power-on enabling pin; the resistor R86 connected with the pin 17 and the resistor R92 connected with the pin 19 can be plugged, so that hardware debugging is facilitated.
The network penetrator 7 in fig. 3 may have 2 network roles: a wireless routing mode and a network compatible mode. The wireless routing mode means that other devices can be plugged into the RJ45 port of the penetrator to access the internet through the wireless network, as shown in fig. 4. The network compatible mode means that in some scenes, the internet access is realized by a mode of externally connecting a fixed network with a penetrator network port, a fixed broadband is preferred to be accessed, and if the fixed broadband cannot be accessed, the fixed broadband is automatically switched to access the internet through a wireless network, as shown in fig. 5.
In summary, the internet of things penetration system provided by the embodiment of the present application has at least one of the following advantages: the wireless communication system can support wired and wireless communication, is compatible with WIFI, 4G/5G and ad hoc networks, and supports communication modes in different scenes; the network mode can be switched, and the network roles of the penetrators can be flexibly changed; the remote penetration of the third-party network equipment can be realized, the remote debugging and maintenance of the third-party network equipment are supported, and the maintenance cost is reduced; one port number does not need to be occupied for a long time, the repeated use of port resources can be realized, and the network penetration of the number of massive terminals can be supported.
In embodiments of the present application, although the present application is described in the context of functional modules, it should be understood that, unless otherwise stated to the contrary, one or more of the functions and/or features may be integrated in a single physical device and/or software module, or one or more of the functions and/or features may be implemented in a separate physical device or software module. It will also be appreciated that a detailed discussion regarding the actual implementation of each module is not necessary for an understanding of the present application. Rather, the actual implementation of the various functional modules in the apparatus disclosed herein will be understood within the ordinary skill of an engineer, given the nature, function, and internal relationship of the modules. Accordingly, those skilled in the art can, using ordinary skill, practice the present application as set forth in the claims without undue experimentation. It is also to be understood that the specific concepts disclosed are merely illustrative of and not intended to limit the scope of the application, which is defined by the appended claims and their full scope of equivalents.
In the foregoing description of the specification, reference to the description of "one embodiment/example," "another embodiment/example," or "certain embodiments/examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the application. In this specification, schematic representations of the above terms do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
While embodiments of the present application have been shown and described, it will be understood by those of ordinary skill in the art that: numerous changes, modifications, substitutions and alterations can be made to the embodiments without departing from the principles and spirit of the application, the scope of which is defined by the claims and their equivalents.
While the present application has been described with reference to the preferred embodiments, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined by the appended claims.
In the description herein, references to the description of the term "one embodiment," "another embodiment," or "certain embodiments," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the application. In this specification, schematic representations of the above terms do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
While embodiments of the present application have been shown and described, it will be understood by those of ordinary skill in the art that: numerous changes, modifications, substitutions and alterations can be made to the embodiments without departing from the principles and spirit of the application, the scope of which is defined by the claims and their equivalents.

Claims (5)

1. The Internet of things network penetration system is characterized by comprising equipment to be debugged, a network penetrator, an operator base station, a cloud platform and a computer terminal, wherein the equipment to be debugged, the network penetrator, the operator base station, the cloud platform and the computer terminal are sequentially in communication connection;
the computer terminal is used for sending an intranet penetration request message to the cloud platform;
the cloud platform receives the request information, allocates a public network port and sends the allocated port number information to the computer terminal; issuing an intranet penetration instruction through MQTT, and transmitting the instruction to the network penetrator through the operator base station;
the computer terminal receives the port number information and is connected with the cloud platform according to a port number TCP distributed by the port number information;
the network penetrator establishes an intranet TCP (transmission control protocol) communicated with the equipment to be debugged according to the intranet penetration instruction to realize communication connection between the network penetrator and the equipment to be debugged; the TCP connection is established with the cloud platform through the operator base station, and mapping is established for data forwarding;
and the cloud platform is also used for receiving the TCP connection of the network penetrator and establishing mapping between the distributed public network port and the intranet TCP so as to realize data forwarding.
2. The internet-of-things network penetration system according to claim 1, wherein the communication mode of the network penetrator supports wired communication and wireless communication, and the wireless communication is compatible with WIFI, 4G and 5G communication.
3. The internet of things network penetration system according to claim 2, wherein the network penetrator is provided with an RJ4R5 port to realize wired network communication.
4. The internet of things network penetration system of claim 2, wherein the wireless communication is also compatible with ad hoc network communication.
5. The Internet of things network penetration system according to any one of claims 2 to 4, wherein the network penetrator is provided with a Mini-PCIE base to realize wireless communication.
CN202221384682.7U 2022-06-02 2022-06-02 Internet of things network penetration system Active CN217388751U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202221384682.7U CN217388751U (en) 2022-06-02 2022-06-02 Internet of things network penetration system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202221384682.7U CN217388751U (en) 2022-06-02 2022-06-02 Internet of things network penetration system

Publications (1)

Publication Number Publication Date
CN217388751U true CN217388751U (en) 2022-09-06

Family

ID=83089079

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202221384682.7U Active CN217388751U (en) 2022-06-02 2022-06-02 Internet of things network penetration system

Country Status (1)

Country Link
CN (1) CN217388751U (en)

Similar Documents

Publication Publication Date Title
US4763104A (en) Gateway for use in load control system
CN101272583B (en) Method for near-end maintaining radio remote module
US20100054276A1 (en) System and method for providing communication between intelligent electronic devices via an open channel
CN108667661B (en) Automatic numbering system and numbering method for in-situ distributed protection management host
CN1268995C (en) Wireless local area network on-site bus network control station
EP3779310A1 (en) Controller of air-conditioning unit, and air-conditioner
CN102595317A (en) Communication signal self-adapting transmission method and system
CN208386576U (en) A kind of industrial network exchange serial server with simple switched management function
CN107547475A (en) A kind of data processing equipment and its system for supporting more communication protocol conversions
CN108012305A (en) Smart machine matches somebody with somebody network method, system and smart machine
CN217388751U (en) Internet of things network penetration system
CN110602768A (en) Intelligent Internet of things gateway method and device fusing multiple types of data transmission protocols
CN111083447B (en) Network communication method, device and storage medium
CN207677999U (en) Novel protocol conversion device
SG192223A1 (en) Wireless device and wireless network system
CN110971519A (en) Port interconnection management method and device
CN216217652U (en) Stage lamps and lanterns management system based on RDM agreement
CN102336355A (en) Elevator monitoring system
CN203027289U (en) System for realizing serial communication among computer, host computer and slave computer
CN214205565U (en) Intelligent gateway equipment fusing LoRa and NB-IOT wireless communication technology
CN201571113U (en) Wireless network system and wireless network terminal machine adopted by wireless network system
Cisco Installing the STS-10x
Cisco Installing the STS-10x
CN208924267U (en) A kind of energy gateway apparatus
US7349996B2 (en) Method and system for remote management of data over a wireless link

Legal Events

Date Code Title Description
GR01 Patent grant
GR01 Patent grant