WO2020113555A1 - 网络会议数据传输方法及电子设备 - Google Patents

网络会议数据传输方法及电子设备 Download PDF

Info

Publication number
WO2020113555A1
WO2020113555A1 PCT/CN2018/119760 CN2018119760W WO2020113555A1 WO 2020113555 A1 WO2020113555 A1 WO 2020113555A1 CN 2018119760 W CN2018119760 W CN 2018119760W WO 2020113555 A1 WO2020113555 A1 WO 2020113555A1
Authority
WO
WIPO (PCT)
Prior art keywords
slave
terminal
data
uploaded
network conference
Prior art date
Application number
PCT/CN2018/119760
Other languages
English (en)
French (fr)
Inventor
韩超
Original Assignee
深圳市柔宇科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市柔宇科技有限公司 filed Critical 深圳市柔宇科技有限公司
Priority to PCT/CN2018/119760 priority Critical patent/WO2020113555A1/zh
Priority to CN201880097598.7A priority patent/CN113169986A/zh
Publication of WO2020113555A1 publication Critical patent/WO2020113555A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/40Support for services or applications

Definitions

  • the present application relates to the field of data processing technology, and in particular, to a network conference data transmission method and electronic equipment.
  • the present application provides a network conference data transmission method, an electronic device, and a computer-readable storage medium, which can reasonably perform data transmission.
  • the present application provides a method for network conference data transmission, which includes:
  • each slave terminal is allocated a communication duration for data upload, and periodically receives data uploaded by each slave terminal within the allocated communication duration.
  • the present application provides a network conference data transmission method.
  • the network conference data transmission method includes:
  • the data is periodically uploaded to the main terminal within the allocated communication duration.
  • the present application provides an electronic device, the electronic device includes a processor, a memory, and a computer program stored in the memory, the processor is configured to execute the computer program stored in the memory to execute the network The steps of the conference data transmission method.
  • the present application provides a terminal system for network conferences, including at least one master terminal and multiple slave terminals; wherein each of the master terminals includes a memory, a processor, and can be stored in the memory and can be processed A computer program running on the device, and when the processor executes the program, the steps of the network conference data transmission method according to the first aspect are implemented; each of the slave terminals includes a memory, a processor, and can be stored on the memory and A computer program running on a processor, when the processor executes the program, the steps of implementing the network conference data transmission method according to the second aspect
  • the communication time allocated to each slave terminal is related to the amount of data to be uploaded, so that the communication time can be more reasonably allocated.
  • FIG. 1 is a flowchart of a network conference data transmission method according to a first embodiment of this application.
  • FIG. 2 is a flowchart of a network conference data transmission method according to a second embodiment of this application.
  • FIG. 3 is a flowchart of a network conference data transmission method according to a third embodiment of this application.
  • FIG. 4 is a flowchart of a network conference data transmission method according to a fourth embodiment of this application.
  • FIG. 5 is a flowchart of a network conference data transmission method according to a fifth embodiment of the present application.
  • FIG. 6 is a schematic diagram of functional modules of an electronic device according to an embodiment of the present application.
  • the composition of the network conference includes at least one master terminal and multiple slave terminals.
  • the network conference data transmission method of this embodiment is applicable to a master terminal; wherein, the master and slave terminals may be various types of terminal devices, For example: electronic whiteboards, smart phones, tablets, computers, etc.
  • network conference data transmission method described in the embodiments of the present application is not limited to the steps and sequence in the flowchart shown in FIG. 1. According to different requirements, the steps in the flowchart shown can be added, removed, or changed in order.
  • the network conference data transmission method includes the following steps:
  • Step 101 Establish a network conference connection with multiple slave terminals.
  • a network conference connection is established with multiple slave terminals via Bluetooth; of course, a network conference connection may be established with multiple slave terminals through other wireless or wired network transmission methods.
  • establishing a network conference connection with multiple slave terminals may include the steps of:
  • the meeting request may include address identification information of a virtual meeting space, such as the address identification or room number of a virtual meeting place; and the meeting acceptance of the meeting request Establish a network conference connection from a terminal; wherein, a network conference connection can be established in the virtual conference space with the slave terminal that accepts the conference request.
  • it may further include the steps of accepting and verifying the identity verification information of the plurality of slave terminals; establishing a network only with the slave terminals that pass the verification and accept the meeting request Conference connection.
  • establishing a network conference connection with multiple slave terminals may include the steps of:
  • the meeting request may include identity verification information of multiple slave terminals; establish a network conference connection with multiple slave terminals, where multiple Identity verification information of the slave terminal, and then only establish a network conference connection with the authenticated slave terminal.
  • the multiple slave terminals may also be sent address identification information containing a virtual conference space, such as the address identification or room number of a virtual meeting place, After that, a network conference connection is established in the virtual conference space with multiple slave terminals.
  • establishing a network conference connection with multiple slave terminals may include the steps of:
  • the meeting request may include identity verification information of the slave terminal; establishing a network conference connection with the slave terminal, wherein the identity of the slave terminal may be verified Verification information, after verification, establish a network conference connection with the slave terminal, the network conference may be established in a virtual conference space; issue a meeting request to a plurality of the slave terminals, wherein the meeting request may include the The address identification information of the virtual meeting space, such as the address identification or room number of the virtual location of the meeting; establish a network conference connection with the slave terminal that accepts the meeting request, where the slave terminal that accepts the meeting request can be established Establish a network conference connection in the virtual conference space.
  • it may further include a step of accepting and verifying the identity verification information of the plurality of slave terminals; afterwards, it is only established with the slave terminal that passes the verification and accepts the meeting request Web conference connection.
  • Step 102 Obtain the amount of data to be uploaded by each slave terminal.
  • the way to obtain the data amount to be uploaded of each slave terminal may be: obtain the data amount to be uploaded from each slave terminal from each slave terminal, or each slave terminal actively send the data amount to be uploaded according to preset conditions .
  • T1 When periodically communicating with the multiple slave terminals, define the duration of one communication cycle for communication between the master terminal and all slave terminals as T1, and the master terminal obtains the amount of data to be uploaded from all slave terminals in one communication cycle
  • the total communication duration is T1a, where T1a is greater than or equal to zero, and T1a is much smaller than T1.
  • T1 can be greater than T1a by 10 times, 20 times, 30 times, etc.
  • the amount of data to be uploaded of each slave terminal is automatically obtained.
  • the amount of data to be uploaded of each slave terminal is obtained; for example, in response to user operations on the master terminal, the amount of data to be uploaded of each slave terminal is obtained;
  • the instruction sent from the terminal to obtain the amount of data to be uploaded from each terminal wherein each instruction issued from the terminal may be an instruction formed by the terminal in response to a user's data upload request, or may be the slave terminal Instructions automatically generated after data transfer is completed, etc.
  • Step 103 According to the amount of data to be uploaded from the slave terminal, allocate a communication duration for data upload to each slave terminal, and periodically receive data uploaded by each slave terminal within the allocated communication duration.
  • the communication time allocated to the slave terminal with a larger amount of data to be uploaded in a communication cycle is greater.
  • the communication duration allocated to each slave terminal is proportional to the amount of data to be uploaded by the slave terminal.
  • the order of communication with each slave terminal can be unlimited, that is, the system performs randomly; it can also be set by the user or the system can communicate with each slave terminal in sequence according to certain rules. For example: Communicate with each slave terminal according to the access sequence of each slave terminal, or sort from most to less or from less to more according to the amount of data to be uploaded by each terminal, or communicate with each slave terminal according to each slave terminal, or according to each slave terminal
  • the preset priority level communicates with each slave terminal.
  • FIG. 2 is a flowchart of a network conference data transmission method according to a second embodiment of the present application.
  • the composition of the network conference includes at least one master terminal and multiple slave terminals.
  • the network conference data transmission method of this embodiment is applicable to the master terminal; wherein, the master and slave terminal devices may be various types of terminal devices , For example: electronic whiteboards, smart phones, tablets, etc.
  • network conference data transmission method described in the embodiments of the present application is not limited to the steps and sequence in the flowchart shown in FIG. 2. According to different requirements, the steps in the flowchart shown can be added, removed, or changed in order.
  • the network conference data transmission method includes the following steps:
  • Step 201 Establish a network conference connection with multiple slave terminals.
  • a network conference connection is established with multiple slave terminals via Bluetooth; of course, in other embodiments, a network conference connection may also be established with multiple slave terminals through other wireless or wired network transmission methods.
  • establishing a network conference connection with multiple slave terminals may include the steps of:
  • the meeting request may include address identification information of a virtual meeting space, such as the address identification or room number of a virtual meeting place; and the meeting acceptance of the meeting request Establish a network conference connection from a terminal; wherein, a network conference connection can be established in the virtual conference space with the slave terminal that accepts the conference request.
  • it may further include the steps of accepting and verifying the identity verification information of the plurality of slave terminals; establishing a network only with the slave terminals that pass the verification and accept the meeting request Conference connection.
  • establishing a network conference connection with multiple slave terminals may include the steps of:
  • the meeting request may include identity verification information of multiple slave terminals; establish a network conference connection with multiple slave terminals, where multiple Identity verification information of the slave terminal, and then only establish a network conference connection with the authenticated slave terminal.
  • the multiple slave terminals may also be sent address identification information containing a virtual conference space, such as the address identification or room number of a virtual meeting place, After that, a network conference connection is established in the virtual conference space with multiple slave terminals.
  • establishing a network conference connection with multiple slave terminals may include the steps of:
  • the meeting request may include identity verification information of the slave terminal; establishing a network conference connection with the slave terminal, wherein the identity of the slave terminal may be verified Verification information, after verification, establish a network conference connection with the slave terminal, the network conference may be established in a virtual conference space; issue a meeting request to a plurality of the slave terminals, wherein the meeting request may include the The address identification information of the virtual meeting space, such as the address identification or room number of the virtual location of the meeting; establish a network conference connection with the slave terminal that accepts the meeting request, where the slave terminal that accepts the meeting request can be established Establish a network conference connection in the virtual conference space.
  • it may further include a step of accepting and verifying the identity verification information of the plurality of slave terminals; afterwards, it is only established with the slave terminal that passes the verification and accepts the meeting request Web conference connection.
  • Step 202 Obtain the amount of data to be uploaded by each slave terminal.
  • the way to obtain the data amount to be uploaded of each slave terminal may be: obtain the data amount to be uploaded from each slave terminal from each slave terminal, or each slave terminal actively send the data amount to be uploaded according to preset conditions .
  • T1 When communicating with the multiple slave terminals periodically, define the duration of one communication cycle for communication between the master terminal and all slave terminals as T1, and within one communication cycle, the master terminal obtains data to be uploaded from all slave terminals
  • the total communication duration of the quantity is T1a, where T1a is greater than or equal to zero, and T1a is much smaller than T1.
  • T1 can be greater than T1a by 10 times, 20 times, 30 times, etc.
  • the amount of data to be uploaded of each slave terminal is automatically obtained.
  • the amount of data to be uploaded of each slave terminal is obtained; for example, in response to user operations on the master terminal, the amount of data to be uploaded of each slave terminal is obtained;
  • the instruction sent from the terminal to obtain the amount of data to be uploaded from each terminal wherein each instruction issued from the terminal may be an instruction formed by the terminal in response to a user's data upload request, or may be the slave terminal Instructions automatically generated after data transfer is completed, etc.
  • Step 203 Based on the amount of data to be uploaded from the slave terminal, calculate the communication duration of data upload assigned to each slave terminal.
  • T1b When communicating with the multiple slave terminals periodically, define the total communication duration of receiving all uploaded data from all slave terminals in a communication cycle as T1b, and define the number of connected slave terminals as N, the first to the Nth
  • the value of A can be set by the customer or set by the system according to certain rules.
  • an upper limit threshold may be set by the user or preset by the system to determine whether the amount of data to be uploaded by each of the slave terminals exceeds the upper limit threshold, and if there is a data amount to be uploaded from the terminal that exceeds the upper limit threshold , Then, in each communication cycle, the slave terminal can be given more communication time, and even other slave terminals can be temporarily given a communication time of zero, that is, the data of this slave terminal is preferentially transmitted, and then periodically Transmit data from other slave terminals.
  • a lower threshold may be set by the user or preset by the system to determine whether the amount of data to be uploaded by each of the slave terminals is less than the lower threshold, and if there is a data amount to be uploaded from the terminal that is less than the lower limit Threshold value, then, in each communication cycle, other slave terminals can be given more communication time, and even the communication time of the slave terminal can be temporarily given to zero, that is, the data of other slave terminals is preferentially transmitted periodically.
  • a lower threshold may be set by the user or preset by the system to determine whether the amount of data to be uploaded from each of the slave terminals is less than the lower threshold, and if there is a data amount from the terminal to be uploaded that is less than the lower limit Threshold, then, in each communication cycle, the slave terminal can be given more communication time, and even the communication time of other slave terminals can be temporarily given to zero, that is, the data of the slave terminal is preferentially and quickly transmitted, After that, the data of each slave terminal is periodically transmitted.
  • the total duration of each communication cycle is a predetermined value. Therefore, if there is a longer communication duration of the slave terminal, for example, it is much greater than the ratio of one communication cycle duration to the number of slave terminals, that is, the average of the communication duration, then There must be a shorter communication time of the slave terminal, for example, much smaller than the average value of the communication time; it can also be understood that in each communication cycle, if the communication time of a certain slave terminal increases, it means compression The communication time of other slave terminals.
  • the communication duration allocated to each slave terminal in each communication cycle can be recalculated; of course, it is not limited to this, that is, it does not need to be Re-acquire the data volume of each slave terminal to be uploaded during the communication cycle, for example, after the data transmission of a slave terminal is completed, re-acquire the data volume of each slave terminal to be uploaded and recalculate the data allocated to each slave cycle The communication time of each slave terminal.
  • Step 204 Periodically receive the data uploaded by each slave terminal within the allocated communication time.
  • the order of communication with each slave terminal can be unrestricted, that is, the system performs randomly; it can also be set by the user or the system can communicate with each slave terminal in sequence according to certain rules. For example, to communicate with each slave terminal in the order in which each slave terminal accesses, or to communicate with each slave terminal in descending order according to the amount of data to be uploaded by each terminal, or in accordance with each slave terminal The preset priority level of the terminal communicates with each slave terminal.
  • FIG. 3 is a flowchart of a network conference data transmission method according to a second embodiment of the present application.
  • the composition of the network conference includes at least one master terminal and multiple slave terminals.
  • the network conference data transmission method of this embodiment is applicable to the master terminal; wherein, the master and slave terminal devices may be various types of terminal devices , For example: electronic whiteboards, smart phones, tablets, etc.
  • network conference data transmission method described in the embodiments of the present application is not limited to the steps and sequence in the flowchart shown in FIG. 3. According to different requirements, the steps in the flowchart shown can be added, removed, or changed in order.
  • the network conference data transmission method includes the following steps:
  • Step 301 Establish a network conference connection with multiple slave terminals.
  • a network conference connection is established with multiple slave terminals via Bluetooth; of course, in other embodiments, a network conference connection may also be established with multiple slave terminals through other wireless or wired network transmission methods.
  • establishing a network conference connection with multiple slave terminals may include the steps of:
  • the meeting request may include address identification information of a virtual meeting space, such as the address identification or room number of a virtual meeting place; and the meeting acceptance of the meeting request Establish a network conference connection from a terminal; wherein, a network conference connection can be established in the virtual conference space with the slave terminal that accepts the conference request.
  • it may further include the steps of accepting and verifying the identity verification information of the plurality of slave terminals; establishing a network only with the slave terminals that pass the verification and accept the meeting request Conference connection.
  • establishing a network conference connection with multiple slave terminals may include the steps of:
  • the meeting request may include identity verification information of multiple slave terminals; establish a network conference connection with multiple slave terminals, where multiple Identity verification information of the slave terminal, and then only establish a network conference connection with the authenticated slave terminal.
  • the multiple slave terminals may also be sent address identification information containing a virtual conference space, such as the address identification or room number of a virtual meeting place, After that, a network conference connection is established in the virtual conference space with multiple slave terminals.
  • establishing a network conference connection with multiple slave terminals may include the steps of:
  • the meeting request may include identity verification information of the slave terminal; establishing a network conference connection with the slave terminal, wherein the identity of the slave terminal may be verified Verification information, after verification, establish a network conference connection with the slave terminal, the network conference can be established in a virtual conference space; issue a meeting request to a plurality of the slave terminals, wherein the meeting request may include the The address identification information of the virtual meeting space, such as the address identification or room number of the virtual location of the meeting; establish a network conference connection with the slave terminal that accepts the meeting request, where the slave terminal that accepts the meeting request can be established Establish a network conference connection in the virtual conference space.
  • it may further include a step of accepting and verifying the identity verification information of the plurality of slave terminals; afterwards, it is only established with the slave terminal that passes the verification and accepts the meeting request Web conference connection.
  • Step 302 Obtain the amount of data to be uploaded from each of the slave terminals.
  • the way to obtain the data amount to be uploaded of each slave terminal may be: obtain the data amount to be uploaded from each slave terminal from each slave terminal, or each slave terminal actively send the data amount to be uploaded according to preset conditions .
  • T1 When periodically communicating with the multiple slave terminals, define the duration of one communication cycle for communication between the master terminal and all slave terminals as T1, and the master terminal obtains the amount of data to be uploaded from all slave terminals in one communication cycle
  • the total communication duration is T1a, where T1a is greater than or equal to zero, and T1a is much smaller than T1.
  • T1 can be greater than T1a by 10 times, 20 times, 30 times, etc.
  • the amount of data to be uploaded of each slave terminal is automatically obtained.
  • the amount of data to be uploaded of each slave terminal is obtained; for example, in response to user operations on the master terminal, the amount of data to be uploaded of each slave terminal is obtained;
  • the instruction sent from the terminal to obtain the amount of data to be uploaded from each terminal wherein each instruction issued from the terminal may be an instruction formed by the terminal in response to a user's data upload request, or may be the slave terminal Instructions automatically generated after data transfer is completed, etc.
  • Step 303 Based on the amount of data to be uploaded from the slave terminal, calculate the communication duration of data upload assigned to each slave terminal.
  • the communication duration of the periodic data upload allocated to each slave terminal is calculated according to the data volume range interval of the data volume to be uploaded by each slave terminal.
  • the data amounts of each slave terminal to be uploaded are sorted and categorized according to the data amount range interval; wherein, the data amount range interval may be an equivalent segment, an incremental segment, etc.; an equivalent segment may be It is divided into segments for every same data volume value.
  • 0-100kB data volume is the first segment
  • 101-200kB data volume is the second segment
  • 201-300kB data volume is the third segment, etc.
  • increment can be from small to large, and the data interval of each segment is continuously increasing.
  • the data volume of 0-100kB is the first segment
  • the data volume of 101-500kB is the second segment
  • the data volume of 501-5000kB is the first Three paragraphs, etc.
  • the communication time allocated to each of the slave terminals is calculated according to the principle that the communication time allocated to the slave terminals in the larger data amount range interval is allocated.
  • the communication duration allocated to the slave terminals within the same data volume range is equal in a communication cycle.
  • an upper limit threshold may be set by the user or preset by the system to determine whether the amount of data to be uploaded by each of the slave terminals exceeds the upper limit threshold, and if there is a data amount to be uploaded from the terminal that exceeds the upper limit threshold , Then, in each communication cycle, the slave terminal can be given more communication time, and even other slave terminals can be temporarily given a communication time of zero, that is, the data of this slave terminal is preferentially transmitted, and then periodically Transmit data from other slave terminals.
  • a lower threshold may be set by the user or preset by the system to determine whether the amount of data to be uploaded by each of the slave terminals is less than the lower threshold, and if there is a data amount to be uploaded from the terminal that is less than the lower limit
  • the threshold value can give other slave terminals more communication time in each communication cycle, and can even temporarily give the slave terminal a communication time of zero, that is, preferentially periodically transmit data of other slave terminals.
  • a lower threshold may be set by the user or preset by the system to determine whether the amount of data to be uploaded from each of the slave terminals is less than the lower threshold, and if there is a data amount from the terminal to be uploaded that is less than the lower limit Threshold value, in each communication cycle, the slave terminal can be given more communication time, and even the communication time of other slave terminals can be temporarily set to zero, that is, the data of the slave terminal is preferentially and quickly transmitted, and then Then periodically transmit the data of other slave terminals.
  • the total duration of each communication cycle is a predetermined value, if there is a longer communication duration of the slave terminal, for example, it is much larger than the ratio of the length of one communication cycle to the number of slave terminals, that is, the average of the communication duration, Then there must be a shorter communication time of the slave terminal, for example, much smaller than the average value of the communication time; it can also be understood that, within a communication cycle, if the communication time of a certain slave terminal is increased, it means compression The communication time of other slave terminals.
  • the communication duration allocated to each slave terminal in each communication cycle can be recalculated; Re-acquire the data volume of each slave terminal to be uploaded within a communication cycle, for example, after the data transmission of a slave terminal is completed, re-acquire the data volume of each slave terminal to be uploaded and recalculate each communication cycle The communication time allocated to each slave terminal.
  • Step 304 Periodically receive the data uploaded by each slave terminal within the allocated communication time.
  • the order of communication with each slave terminal can be unrestricted, that is, the system performs randomly; it can also be set by the user or the system can communicate with each slave terminal in sequence according to certain rules. For example, to communicate with each slave terminal in the order in which each slave terminal accesses, or to communicate with each slave terminal in descending order according to the amount of data to be uploaded by each terminal, or in accordance with each slave terminal The preset priority level of the terminal communicates with each slave terminal.
  • FIG. 4 is a flowchart of a network conference data transmission method according to a third embodiment of the present application.
  • the composition of the network conference includes at least one master terminal and multiple slave terminals.
  • the network conference data transmission method of this embodiment is applicable to the master terminal; wherein, the master and slave terminal devices may be various types of terminal devices , For example: electronic whiteboards, smart phones, tablets, etc.
  • network conference data transmission method described in the embodiments of the present application is not limited to the steps and sequence in the flowchart shown in FIG. 4. According to different requirements, the steps in the flowchart shown can be added, removed, or changed in order.
  • the network conference data transmission method includes the following steps:
  • Step 401 establish a network conference connection with multiple slave terminals.
  • a network conference connection is established with multiple slave terminals via Bluetooth; of course, in other embodiments, a network conference connection may also be established with multiple slave terminals through other wireless or wired network transmission methods.
  • establishing a network conference connection with multiple slave terminals may include the steps of:
  • the meeting request may include address identification information of a virtual meeting space, such as the address identification or room number of a virtual meeting place; and the meeting acceptance of the meeting request Establish a network conference connection from a terminal; wherein, a network conference connection can be established in the virtual conference space with the slave terminal that accepts the conference request.
  • it may further include the steps of accepting and verifying the identity verification information of the plurality of slave terminals; establishing a network only with the slave terminals that pass the verification and accept the meeting request Conference connection.
  • establishing a network conference connection with multiple slave terminals may include the steps of:
  • the meeting request may include identity verification information of multiple slave terminals; establish a network conference connection with multiple slave terminals, where multiple Identity verification information of the slave terminal, and then only establish a network conference connection with the authenticated slave terminal.
  • the multiple slave terminals may also be sent address identification information containing a virtual conference space, such as the address identification or room number of a virtual meeting place, After that, a network conference connection is established in the virtual conference space with multiple slave terminals.
  • establishing a network conference connection with multiple slave terminals may include the steps of:
  • the meeting request may include identity verification information of the slave terminal; establishing a network conference connection with the slave terminal, wherein the identity of the slave terminal may be verified Verification information, after verification, establish a network conference connection with the slave terminal, the network conference can be established in a virtual conference space; issue a meeting request to a plurality of the slave terminals, wherein the meeting request may include the The address identification information of the virtual meeting space, such as the address identification or room number of the virtual location of the meeting; establish a network conference connection with the slave terminal that accepts the meeting request, where the slave terminal that accepts the meeting request can be established Establish a network conference connection in the virtual conference space.
  • it may further include a step of accepting and verifying the identity verification information of the plurality of slave terminals; afterwards, it is only established with the slave terminal that passes the verification and accepts the meeting request Web conference connection.
  • Step 402 Acquire the data amount to be uploaded of each slave terminal and the priority level of each slave terminal.
  • the method for obtaining the data amount and priority level of each slave terminal to be uploaded may be: obtaining the data amount and priority level of each slave terminal to be uploaded from each slave terminal, or by each slave terminal according to preset conditions Send the amount of data to be uploaded and the priority level.
  • the total time required to obtain the data amount and priority level of each slave terminal to be uploaded is defined as T1a; preferably, the data amount of each slave terminal to be uploaded is periodically obtained at a predetermined time interval T1, and/or Or priority level, where T1a is much smaller than T1, for example, T1 can be 10 times, 20 times, 30 times, etc. greater than T1a.
  • the amount of data to be uploaded and the priority level of each slave terminal are automatically obtained.
  • the data amount and priority level of each slave terminal to be uploaded are obtained; for example, in response to the user's operation on the master terminal, the data amount and priority level of each slave terminal to be uploaded is obtained; For another example, in response to each of the instructions sent from the terminal, obtain the amount of data and priority level of each slave terminal to be uploaded, where each of the instructions issued by the terminal may be formed by the terminal responding to the user's data upload request
  • the instruction may also be an instruction automatically generated after the data transmission from the terminal is completed, and so on.
  • the data amount and priority level of the slave terminal to be uploaded can be obtained at the same time or not at the same time, that is to say, it can be obtained separately, and the method of obtaining can be the same or different; the above methods are all applicable to obtaining the slave terminal
  • the amount of data to be uploaded is also suitable for obtaining the priority level of the slave terminal; for example, it can actively read the amount of data to be uploaded on each slave terminal and receive the priority level to be uploaded from each slave terminal.
  • step 403 according to the amount of data to be uploaded from the slave terminal and the priority level of each slave terminal, the communication duration of data upload is allocated to each slave terminal.
  • the rules set by the user or the rules preset by the system according to the rules set by the user or the rules preset by the system, according to the amount of data to be uploaded by each of the slave terminals and the priority level of each of the slave terminals, it can be calculated to be allocated to each of the slaves within a communication cycle The communication time of the terminal.
  • the communication duration is allocated correspondingly according to the priority levels of the slave terminals, and the higher the priority level, the more the communication duration, That is, for the same amount of data to be uploaded, the higher the priority, the more communication time will be allocated in each time period, and the time period used will be less, so the data will be transmitted faster.
  • the communication duration is allocated corresponding to the amount of data to be uploaded from each of the slave terminals, and the communication with a larger amount of data to be uploaded. The more the duration, that is, the same priority level, the greater the amount of data to be uploaded, the more the communication duration.
  • the total communication duration of receiving all uploaded data from all slave terminals in a communication cycle as T1b, and define the number of connected slave terminals as N, the first to the Nth
  • the amounts of data to be uploaded by the slave terminals are: D1, D2, ..., DN
  • the value of A can be set by the customer or set by the system according to certain rules.
  • the upper limit threshold of the amount of data D to be uploaded can also be set by the user or preset by the system to determine whether the amount of data to be uploaded by each of the slave terminals exceeds the upper limit threshold. If the amount of data exceeds the upper limit threshold, the slave terminal can be given more communication time in one communication cycle; even, the communication time of other slave terminals can be temporarily given to zero, that is, the slave terminal’s Data, and then periodically transmit the data of other slave terminals.
  • a lower threshold of the amount of data D to be uploaded may be set by the user or preset by the system to determine whether the amount of data to be uploaded by each of the slave terminals is less than the lower threshold, if there is a slave terminal to be uploaded The amount of data is less than the lower threshold, then, in a communication cycle, other slave terminals can be given more communication time; even, the slave terminal can be temporarily given a communication time of zero, that is, priority transmission of other slave terminals The data.
  • a lower threshold of the amount of data D to be uploaded may be set by the user or preset by the system to determine whether the amount of data to be uploaded by each of the slave terminals is less than the lower threshold, if there is a slave terminal to be uploaded.
  • the amount of data is less than the lower limit threshold, then, in a communication cycle, the slave terminal can be given more communication time; even, the communication time of other slave terminals can be temporarily given to zero, that is, priority is quickly transmitted
  • the data of the slave terminal and then periodically transmit data of other slave terminals.
  • the upper threshold of a priority level O can be set by the user or preset by the system to determine whether the priority level of each slave terminal is within a preset high priority level range.
  • the slave terminal can be given more communication time in one communication cycle; even, the communication time of other slave terminals can be temporarily given to zero, that is, the slave terminal is preferentially transmitted Data, and then periodically transmit the data of other slave terminals.
  • a lower threshold of a priority level O may be set by the user or preset by the system to determine whether the priority level of each of the slave terminals is within a preset low priority level range. If there are slave terminal priority levels less than Within a preset low priority level range, other slave terminals can be given more communication time in one communication cycle; even, the slave terminal can be temporarily given a communication time of zero, that is, priority periodicity To transmit other data from the terminal.
  • the total duration of each communication cycle is a predetermined value, if there is a longer communication duration of the slave terminal, for example, it is much larger than the ratio of the length of one communication cycle to the number of slave terminals, that is, the average of the communication duration , There must be a shorter communication time of the slave terminal, for example, much smaller than the average of the communication time; it can also be understood that, within a communication cycle, if the communication time of a certain slave terminal is increased, it means Compressed the communication time of other slave terminals.
  • the communication time allocated to each slave terminal in each communication cycle can be re-allocated; of course, it is not limited to This means that it is not necessary to reacquire the data volume of each slave terminal to be uploaded in each communication cycle.
  • the data volume of each slave terminal to be uploaded can be obtained and Priority level and recalculate the communication time allocated to each slave terminal in each communication cycle.
  • the communication duration is allocated according to the amount of data to be uploaded, and the communication duration can be calculated by referring to the methods in Embodiments 1, 2, and 3.
  • the size of the priority level O value is generally set by the customer or by the system according to certain rules; for example, setting important users, and setting the priority level of the slave terminal operated by the important user is higher than the priority of the slave terminal operated by the general user Level, so that the priority level O value of the slave terminal operated by an important user is greater than the priority level O value of the slave terminal operated by a general user; or the priority level of the slave terminal operated by a user with a high position is higher than that of a user with a low position
  • the priority level of the operated slave terminal so that the priority level O value of the slave terminal operated by the user with a high position can be set greater than the priority level O value of the slave terminal operated by the user with a low position; etc.
  • Step 404 Periodically receive the data uploaded by each slave terminal within the allocated communication time.
  • the order of communication with each slave terminal can be unlimited, that is, the system performs randomly; it can also be set by the user or the system can communicate with each slave terminal in sequence according to certain rules. For example: Communicate with each slave terminal according to the access sequence of each slave terminal, or sort from most to less or from less to more according to the amount of data to be uploaded by each terminal, or communicate with each slave terminal according to each slave terminal, or according to each slave terminal
  • the preset priority level communicates with each slave terminal.
  • the network conference data transmission method may further include steps:
  • a terminal can be set as the master terminal in response to the user's operation, or the system can be set as the master terminal according to a preset rule.
  • the network conference data transmission method may further include steps:
  • the processing of the data obtained from each terminal includes but is not limited to: summary, modification, deletion, marking, etc.
  • processing the data obtained from each terminal may also include but not limited to: display, save, output, etc.
  • FIG. 5 is a flowchart of a network conference data transmission method according to a fifth embodiment of the present application.
  • the composition of the network conference includes at least one master terminal and multiple slave terminals.
  • the network conference data transmission method of this embodiment is applicable to slave terminals; wherein, the master and slave terminal devices may be various types of terminal devices , For example: electronic whiteboards, smart phones, tablets, computers, etc.
  • network conference data transmission method described in the embodiments of the present application is not limited to the steps and sequence in the flowchart shown in FIG. 5. According to different requirements, the steps in the flowchart shown can be added, removed, or changed in order.
  • the network conference data transmission method includes the following steps:
  • Step 501 Establish a network conference connection with the main terminal.
  • a network conference connection is established with the main terminal via Bluetooth; of course, in other embodiments, a network conference connection may also be established with the main terminal through other wireless network transmission methods.
  • establishing a network conference connection with the master terminal may include the steps of:
  • the meeting request may include address identification information of a virtual meeting space, such as an address identification or room number of a virtual meeting place; accepting the meeting request to communicate with the host
  • the terminal establishes a network conference connection; wherein, the network conference connection may be established in the virtual conference space with the main terminal.
  • it may further include the step of sending identity verification information to the master terminal; after verification, establishing a network conference connection with the master terminal.
  • establishing a network conference connection with the master terminal may include the steps of:
  • the meeting request may include the identity verification information of the slave terminal; establish a network conference connection with the master terminal, wherein, after verification, the master terminal Establish a web conference connection.
  • the host terminal may also receive address identification information including a virtual conference space sent by the host terminal, such as the address identification or room number of the virtual meeting place, etc.
  • the master terminal establishes a network conference connection in the virtual conference space.
  • Step 502 Provide the master terminal with the amount of data to be uploaded.
  • the manner of providing the main terminal with the amount of data to be uploaded may be: allowing the main terminal to control the amount of data to be uploaded by the main terminal, or actively reporting to the main terminal according to preset conditions to be uploaded The amount of data.
  • the amount of data to be uploaded is periodically provided to the master terminal at a predetermined time interval T1.
  • the amount of data to be uploaded is automatically provided to the main terminal.
  • the main terminal after responding to an instruction, is provided with the amount of data to be uploaded; for example, in response to a user's operation on the main terminal, the main terminal is provided with the amount of data to be uploaded; for example, in response
  • the instruction issued by the slave terminal provides the master terminal with the amount of data to be uploaded, wherein the instruction issued by the slave terminal may be an instruction formed by the slave terminal responding to the user's data upload request, or may be the slave Instructions automatically generated after the terminal data transfer is completed, etc.
  • Step 503 Upload data to the host terminal periodically within the allocated communication duration according to the communication duration of the data upload allocated by the host terminal according to the data amount to be uploaded.
  • the communication duration of the data upload may be proportional to the amount of data to be uploaded, or a functional relationship, or the communication duration of the data upload and the data to be uploaded from the slave terminal
  • the quantity and the priority level value are related, etc., for details, please refer to Embodiments 1 to 4.
  • the data transmission method of the web conference may further include the steps of:
  • a terminal can be set as a slave terminal in response to the user's operation, or a terminal can be set as a slave terminal according to a preset rule by the system.
  • a certain terminal may be a master terminal and then a slave terminal, or a slave terminal and then a master terminal, so that the network conference data transmission method described in Embodiment 5 may also precede the methods in Embodiments 1 to 4 Or afterwards, that is, steps 101-103, steps 201-204, steps 301-304, steps 401-404 can be performed on the same terminal before or after steps 501-504, and, in steps 101-103, Steps 201 to 204, steps 301 to 304, steps 401 to 404 and steps 501 to 504 may further include the step of setting this terminal as a slave terminal or setting this terminal as a master terminal.
  • the communication time allocated to each slave terminal is related to the amount of data to be uploaded in one communication cycle, so that the communication time can be more reasonably allocated and the data loss caused by the insufficient bandwidth of the slave terminal can be reduced Probability; and, it can be set to allocate more time to the slave terminal with large data volume or high priority level, so that the slave terminal uploads data more efficiently, and the real-time data communication between the master and slave terminals of the conference system is higher .
  • Embodiments of the present technical solution also provide an electronic device, including a memory, a processor, and a computer program stored on the memory and executable on the processor.
  • the processor executes the program, the foregoing embodiments 1 to 5 are implemented.
  • the electronic device of the present technical solution can be switched between a master terminal and a slave terminal, for example, the electronic device can be used in the above method It can be set as a master terminal or as a slave terminal.
  • the electronic device 1 includes at least a processor 11, a memory 12, and a computer program 13 (for example, an input data processing program) stored in the memory 12 and executable on the processor 11.
  • a computer program 13 for example, an input data processing program
  • the schematic diagram 6 is only an example of the electronic device 1 used to implement the network conference data transmission method of the present application, and does not constitute a limitation on the electronic device 1, and may include more Fewer components, or a combination of certain components, or different components, for example, the electronic device 1 may further include a handwriting input device, an output device, a network access device, a wireless transmission device, a display device, a synchronization module, and the like.
  • steps in the above network conference data transmission methods are implemented, for example, steps 101 to 103 shown in FIG. 1, or steps 201 to 204 shown in FIG. 2, or shown in FIG. 3 Steps 301 to 304, or steps 401 to 404 shown in FIG. 4, and/or steps 501 to 504 shown in FIG.
  • the computer program 13 may be divided into one or more modules/units, and the one or more modules/units are stored in the memory 12 and executed by the processor 11 to complete This application.
  • the one or more modules/units may be a series of computer program 13 instruction segments capable of performing specific functions, and the instruction segments are used to describe the execution process of the computer program 13 in the electronic device 1.
  • the computer program 13 may be divided into a conference request module, a virtual conference space establishment module, an acquisition module, a judgment module, a data calculation module, and so on.
  • the so-called processor 11 may be a central processing unit (Central Processing Unit, CPU), or other general-purpose processors, digital signal processors (Digital Signal Processor, DSP), application specific integrated circuits (Application Specific Integrated Circuit, ASIC), Ready-made programmable gate array (Field-PrograAAable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc.
  • the general-purpose processor may be a microprocessor or the processor may also be any conventional processor, etc.
  • the processor 11 is the control center of the electronic device 1 and is connected to the electronic device 1 using various interfaces and lines Various parts.
  • the memory 12 may be used to store the computer program 13 and/or module/unit.
  • the processor 11 executes or executes the computer program 13 and/or module/unit stored in the memory 12 and stores The data in the memory 12 realizes various functions of the electronic device 1.
  • the memory 12 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, at least one function required application programs (such as sound playback function, image playback function, etc.), etc.; the storage data area may Data created according to the use of the electronic device 1 (for example, audio data, data set and acquired using the above-mentioned web conference data transmission method, etc.), etc. are stored.
  • the memory 12 may include a high-speed random access memory, and may also include a non-volatile memory, such as a hard disk, a memory, a plug-in hard disk, an intelligent memory card (SAartAediaCard, SAC), and a secure digital (SD) card. Flash card (Flash Card), at least one magnetic disk storage device, flash memory device, or other volatile solid-state storage device.
  • a non-volatile memory such as a hard disk, a memory, a plug-in hard disk, an intelligent memory card (SAartAediaCard, SAC), and a secure digital (SD) card.
  • Flash card Flash Card
  • flash Card at least one magnetic disk storage device, flash memory device, or other volatile solid-state storage device.
  • the present application also provides a computer-readable storage medium on which a computer program is stored, and when the computer program is executed by a processor, the steps of the network conference data transmission method described above are implemented.
  • the present application implements all or part of the processes in the methods of the above embodiments, and can also be completed by instructing relevant hardware through a computer program.
  • the computer program can be stored in a computer-readable storage medium. When executed by the processor, the steps of the foregoing method embodiments may be implemented.
  • the computer program includes computer program code, and the computer program code may be in the form of source code, object code, executable file, or some intermediate form.
  • the computer-readable medium may include any entity or device capable of carrying the computer program code, a recording medium, a USB flash drive, a removable hard disk, a magnetic disk, an optical disk, a computer memory, and a read-only memory (ROA, Read-Only AeAory) , Random Access Memory (RAA, RandoA Access AeAory), electrical carrier signals, telecommunications signals and software distribution media, etc.
  • ROA Read-Only AeAory
  • ROA Random Access Memory
  • telecommunications signals and software distribution media etc.
  • the content contained in the computer-readable medium can be appropriately increased or decreased according to the requirements of legislation and patent practice in jurisdictions. For example, in some jurisdictions, according to legislation and patent practice, computer-readable media Does not include electrical carrier signals and telecommunications signals.
  • Embodiments of the present technical solution also provide a terminal system for network conferences, including at least one master terminal and multiple slave terminals; wherein, each of the master terminals includes a memory, a processor, and is stored in the memory and can be processed A computer program running on the device, when the processor executes the program, the steps of the network conference data transmission methods described in the first to fourth embodiments are implemented; each of the slave terminals includes a memory, a processor, and stored on the memory A computer program that can run on a processor that implements the steps of the network conference data transmission method described in Embodiment 5 when the processor executes the program.
  • the functional modules of the master terminal and the slave terminal may refer to the functional modules of the electronic device 1 shown in FIG. 6.
  • the master and slave terminals can be of various types, for example: electronic whiteboard, smart phone, tablet computer, etc.
  • the electronic whiteboard supports handwriting input, it has functions such as writing and drawing, which is closer to the writing mode of traditional conferences, and most electronic whiteboards can be saved, deleted, printed, etc., and have greater advantages for use in conferences. Therefore, it is preferable to
  • the master and slave terminals are both electronic whiteboards.
  • the disclosed network conference data transmission method and electronic device may be implemented in other ways.
  • the above-mentioned network conference data transmission method is only schematic, and there may be other divisions in actual implementation.

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)

Abstract

本申请提供了一种网络会议数据传输方法、电子设备及计算机可读存储介质。所述方法包括:与多个从终端建立网络会议连接;获取各个所述从终端的待上传的数据量;根据从终端的所述待上传的数据量,给各个从终端分配数据上传的通讯时长,周期性的接收各个从终端在分配的通讯时长内所上传的数据。本申请的网络会议数据传输方法更加合理的分配通讯时间。

Description

网络会议数据传输方法及电子设备 技术领域
本申请涉及数据处理技术领域,尤其涉及一种网络会议数据传输方法及电子设备。
背景技术
由于技术限制,过去的会议使用的设备都以分立形式存在,因而导致了一系列问题,比如:安装配置复杂,操作麻烦,占用大量会议室空间,不易记录实时会议信息等等。随着网络技术的发展,网络会议也得到了广泛的应用,为消费者带来了极大的便利。在网络会议中,如果终端数量较多,在终端之间进行数据传输,特别是一对多的数据传输数据时,如何进行合理的数据传输是目前函待解决的问题。
发明内容
鉴于此,本申请提供一种网络会议数据传输方法、电子设备以及计算机可读存储介质,能够合理地进行数据传输。
第一方面,本申请提供一种网络会议数据传输方法,所述网络会议数据传输方法包括:
与多个从终端建立网络会议连接;
获取各个所述从终端的待上传的数据量;及
根据从终端的所述待上传的数据量,给各个从终端分配数据上传的通讯时长,周期性的接收各个从终端在分配的通讯时长内所上传的数据。
第二方面,本申请提供一种网络会议数据传输方法,所述网络会议数据传输方法包括:
与一主终端建立网络会议连接;
向所述主终端提供待上传的数据量;及
依照所述主终端根据所述待上传数据量分配的数据上传的通讯时长,周期性的在分配的通讯时长内向所述主终端上传数据。
第三方面,本申请提供一种电子设备,所述电子设备包括处理器、存储器以及存储于所述存储器中的计算机程序,所述处理器用于运行所述存储器中存储的计算机程序以执行上述网络会议数据传输方法的步骤。
第四方面,本申请提供一种终端系统,用于网络会议,包括至少一个主终端及多个从终端;其中,每个所述主终端包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,所述处理器执行所述程序时实现如第一方面所述的网络会议数据传输方法的步骤;每个所述从终端包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,所述 处理器执行所述程序时实现如第二方面所述的网络会议数据传输方法的步骤
本申请的网络会议数据传输方法中,一个通讯周期内,分配给各个从终端的通讯时长与其待上传的数据量相关,从而可以更加合理的分配通讯时间。
附图说明
为了更清楚地说明本技术方案实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1为本申请第一实施方式的网络会议数据传输方法的流程图。
图2为本申请第二实施方式的网络会议数据传输方法的流程图。
图3为本申请第三实施方式的网络会议数据传输方法的流程图。
图4为本申请第四实施方式的网络会议数据传输方法的流程图。
图5为本申请第五实施方式的网络会议数据传输方法的流程图。
图6为本申请一实施方式的电子设备的功能模块示意图。
具体实施方式
下面将结合本技术方案实施例中的附图,对本技术方案实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
请参阅图1,为本申请第一实施例的网络会议数据传输方法的流程图。本实施例中,网络会议的组成包括至少一个主终端及多个从终端,本实施例的网络会议数据传输方法适用于主终端;其中,所述主、从终端可以为各种类型终端设备,例如:电子白板、智能手机、平板电脑、电脑等。
应说明的是,本申请实施方式的所述的网络会议数据传输方法并不限于图1所示的流程图中的步骤及顺序。根据不同的需求,所示流程图中的步骤可以增加、移除、或者改变顺序。
如图1所示,所述网络会议数据传输方法,包括如下步骤:
步骤101,与多个从终端建立网络会议连接。
其中,本实施例中,通过蓝牙与多个从终端建立网络会议连接;当然,也可以通过其他无线或有线网络传输方式与多个从终端建立网络会议连接。
在一个实施例中,与多个所述从终端建立网络会议连接可以包括步骤:
向多个所述从终端发出会议请求,其中,所述会议请求中可以包含有虚拟会议空间的地址标识信息,例如会议虚拟地点的地址标识或房间号等;与接受所述会议请求的所述从终端建立网络会议连接;其中,可以与接受所述会议请求的所述从终端在所述虚拟会议空间中建立网络会议连接。
可选地,向多个所述从终端发出会议请求之后,还可以包括步骤,接受并验证多个所述从终端的身份验证信息;仅与通过验证并接受所述会议请求的从终端建立网络会议连接。
在另一个实施例中,与多个所述从终端建立网络会议连接可以包括步骤:
接收多个所述从终端发出的会议请求,其中,所述会议请求中可以包含有多个所述从终端的身份验证信息;与多个所述从终端建立网络会议连接,其中,可以验证多个所述从终端的身份验证信息,之后仅与通过验证的所述从终端建立网络会议连接。
可选地,在与多个所述从终端建立网络会议连接之前,还可以向所述多个从终端发送包含有虚拟会议空间的地址标识信息,例如会议虚拟地点的地址标识或房间号等,之后,与多个所述从终端在所述虚拟会议空间中建立网络会议连接。
在又一个实施例中,与多个所述从终端建立网络会议连接可以包括步骤:
接收一个所述从终端发出的会议请求,其中,所述会议请求中可以包含有所述从终端的身份验证信息;与所述从终端建立网络会议连接,其中,可以验证所述从终端的身份验证信息,通过验证之后与所述从终端建立网络会议连接,网络会议可以建立在一虚拟会议空间内;向多个所述从终端发出会议请求,其中,所述会议请求中可以包含有所述虚拟会议空间的地址标识信息,例如会议虚拟地点的地址标识或房间号等;与接受所述会议请求的所述从终端建立网络会议连接,其中,可以与接受所述会议请求的所述从终端在所述虚拟会议空间中建立网络会议连接。
可选地,向多个所述从终端发出会议请求之后,还可以包括步骤,接受并验证多个所述从终端的身份验证信息;之后仅与通过验证并接受所述会议请求的从终端建立网络会议连接。
可以理解,与多个所述从终端建立网络会议连接的方式并不限于上述的几种。
步骤102,获取各个所述从终端的待上传的数据量。
其中,获取各个从终端的待上传的数据量的方式可以为:从各个从终端上获取各个从终端上的待上传的数据量,或由各个从终端按照预设条件主动发送待上传的数据量。
周期性地与所述多个从终端通讯时,定义所述主终端与所有从终端通讯的一个通讯周期的时长为T1,在一个通讯周期内所述主终端获取所有从终端的待上传数据量的总通讯时长为T1a,其中,T1a大于等于零,且T1a远小于T1,例如T1可以10倍、20倍、30倍等的大于T1a。
在一实施例中,在与多个从终端建立网络会议连接之后,自动获取各个所述从终端的待上传的数据量。
在另一实施例中,响应一指令之后,获取各个从终端的待上传的数据量;例如,响应用户对主终端的操作,获取各个从终端的待上传的数据量;又例如,响应各个所述从终端发出的指令,获取各个从终端的待上传的数据量,其中,各个所述从终端发出的指令可以为从终端响应用户的数据上传请求所形成的指令,也可以为所述从终端数据传输完成后自动生成的指令,等。
步骤103,根据从终端的所述待上传的数据量,给各个从终端分配数据上传的通讯时长,周期性的接收各个从终端在分配的通讯时长内所上传的数据。
周期性地与所述多个从终端通讯时,一个通讯周期内,分配给待上传的数据量越大的从终端的通讯时长越多。
在另一实施例中,一个通讯周期内,分配给每个所述从终端的通讯时长与所述从终端待上传的数据量呈正比。
其中,在一个通讯周期内,可以对与各个从终端进行通讯的顺序不做限定,即由系统随机进行;也可以由用户设定或由系统按照一定规则顺次地与各个从终端进行通讯,例如:按照各个从终端接入的顺序与各个从终端进行通讯,或按照各个终端待上传的数据量的多少排序由多到少或由少到多与各个从终端进行通讯,或按照各个从终端预设好的优先等级与各个从终端进行通讯。
请参阅图2,为本申请第二实施例的网络会议数据传输方法的流程图。本实施例中,网络会议的组成包括至少一个主终端及多个从终端,本实施例的网络会议数据传输方法适用于主终端;其中,所述主、从终端设备可以为各种类型终端设备,例如:电子白板、智能手机、平板电脑等。
应说明的是,本申请实施方式的所述的网络会议数据传输方法并不限于图2所示的流程图中的步骤及顺序。根据不同的需求,所示流程图中的步骤可以增加、移除、或者改变顺序。
如图2所示,所述网络会议数据传输方法,包括如下步骤:
步骤201,与多个从终端建立网络会议连接。
其中,本实施例中,通过蓝牙与多个从终端建立网络会议连接;当然,在其他实施例中,也可以通其他无线或有线网络传输方式与多个从终端建立网络会议连接。
在一个实施例中,与多个所述从终端建立网络会议连接可以包括步骤:
向多个所述从终端发出会议请求,其中,所述会议请求中可以包含有虚拟会议空间的地址标识信息,例如会议虚拟地点的地址标识或房间号等;与接受所述会议请求的所述从终端建立网络会议连接;其中,可以与接受所述会议请求的所述从终端在所述虚拟会议空间中建立网络 会议连接。
可选地,向多个所述从终端发出会议请求之后,还可以包括步骤,接受并验证多个所述从终端的身份验证信息;仅与通过验证并接受所述会议请求的从终端建立网络会议连接。
在另一个实施例中,与多个所述从终端建立网络会议连接可以包括步骤:
接收多个所述从终端发出的会议请求,其中,所述会议请求中可以包含有多个所述从终端的身份验证信息;与多个所述从终端建立网络会议连接,其中,可以验证多个所述从终端的身份验证信息,之后仅与通过验证的所述从终端建立网络会议连接。
可选地,在与多个所述从终端建立网络会议连接之前,还可以向所述多个从终端发送包含有虚拟会议空间的地址标识信息,例如会议虚拟地点的地址标识或房间号等,之后,与多个所述从终端在所述虚拟会议空间中建立网络会议连接。
在又一个实施例中,与多个所述从终端建立网络会议连接可以包括步骤:
接收一个所述从终端发出的会议请求,其中,所述会议请求中可以包含有所述从终端的身份验证信息;与所述从终端建立网络会议连接,其中,可以验证所述从终端的身份验证信息,通过验证之后与所述从终端建立网络会议连接,网络会议可以建立在一虚拟会议空间内;向多个所述从终端发出会议请求,其中,所述会议请求中可以包含有所述虚拟会议空间的地址标识信息,例如会议虚拟地点的地址标识或房间号等;与接受所述会议请求的所述从终端建立网络会议连接,其中,可以与接受所述会议请求的所述从终端在所述虚拟会议空间中建立网络会议连接。
可选地,向多个所述从终端发出会议请求之后,还可以包括步骤,接受并验证多个所述从终端的身份验证信息;之后仅与通过验证并接受所述会议请求的从终端建立网络会议连接。
可以理解,与多个所述从终端建立网络会议连接的方式并不限于上述的几种。
步骤202,获取各个所述从终端的待上传的数据量。
其中,获取各个从终端的待上传的数据量的方式可以为:从各个从终端上获取各个从终端上的待上传的数据量,或由各个从终端按照预设条件主动发送待上传的数据量。
周期性地与所述多个从终端通讯时,定义所述主终端与所有从终端通讯的一个通讯周期的时长为T1,在一个通讯周期内,所述主终端获取所有从终端的待上传数据量的总通讯时长为T1a,其中,T1a大于等于零,且T1a远小于T1,例如T1可以10倍、20倍、30倍等的大于T1a。
在一实施例中,在与多个从终端建立网络会议连接之后,自动获取各个所述从终端的待上传的数据量。
在另一实施例中,响应一指令之后,获取各个从终端的待上传的数据量;例如,响应用户 对主终端的操作,获取各个从终端的待上传的数据量;又例如,响应各个所述从终端发出的指令,获取各个从终端的待上传的数据量,其中,各个所述从终端发出的指令可以为从终端响应用户的数据上传请求所形成的指令,也可以为所述从终端数据传输完成后自动生成的指令,等。
步骤203,根据从终端的所述待上传的数据量,计算给各个从终端分配的数据上传的通讯时长。
周期性地与所述多个从终端通讯时,定义一个通讯周期内接收所有从终端的上传数据的总通讯时长为T1b,定义连接的所述从终端的数量为N,第一至第N个所述从终端待上传的数据量分别为:D1,D2,...,DN;则,在一个通讯周期内,分配给第n个所述从终端的通讯时长Tn=T1b*An*Dn/(A1*D1+A2*D2+…+AN*DN),其中,n=1,2,...,N;D1<=D2<=...<=DN;A1,A2,...,AN为常量,且A1<=A2<=...<=AN。
其中,A值的大小可以由客户自行设定或由系统按照一定规则设定。
例如,预设A1=A2=...=AN,从而,计算得到分配给第n个所述从终端的通讯时长Tn=T1b*Dn/(D1+D2+…+DN)。
其中,还可以由用户设定或系统预设一上限阈值,判断各个所述从终端的待上传的数据量是否超过所述上限阈值,如果有从终端的待上传的数据量超过所述上限阈值,则,在每个通讯周期内,可赋予所述从终端更多的通讯时长,甚至可以暂时赋予其他从终端的通讯时长为零,也即优先传输此从终端的数据,之后再周期性地传输其他各个从终端的数据。
再例如,还可以由用户设定或系统预设一下限阈值,判断各个所述从终端的待上传的数据量是否小于所述下限阈值,如果有从终端的待上传的数据量小于所述下限阈值,则,在每个通讯周期内,可赋予其他从终端更多的通讯时长,甚至可以暂时赋予所述从终端的通讯时长为零,也即优先周期性地传输其他从终端的数据。
又例如,还可以由用户设定或系统预设一下限阈值,判断各个所述从终端的待上传的数据量是否小于所述下限阈值,如果有从终端的待上传的数据量小于所述下限阈值,则,在每个通讯周期内,可赋予所述从终端更多的通讯时长,甚至可以暂时赋予其他从终端的通讯时长为零,也即优先迅速地传输完所述从终端的数据,之后再周期性地传输其他各个从终端的数据。
可以理解,每个通讯周期的总时长是一预定值,故,如果有从终端的通讯时长较长,例如远大于一个通讯周期时长与从终端的数量的比值,即通讯时长的平均值,则必然有从终端的通讯时长较短,例如,远小于所述通讯时长的平均值;也可以理解为,在每个通讯周期内,如果增大了某个从终端的通讯时长,则意味着压缩了其他的从终端的通讯时长。
可以理解,可以在每个通讯周期内均重新获取各个从终端的待上传的数据量,例如,如果在步骤202中,定义所述主终端与所有从终端通讯的一个通讯周期的时长为T1,在一个通讯 周期内所述主终端接收所有从终端的待上传数据量的总通讯时长为T1a,则在本步骤中,可以使T1==T1a+T1b,也即,每个通讯周期内均重新获取各个从终端的待上传的数据量,可以理解,此种情况下,可以重新计算每个通讯周期内分配给各个从终端的通讯时长;当然也可以不限于此,即,不需要在每个通讯周期内均重新获取各个从终端的待上传的数据量,例如在某个从终端的数据传输完成之后,再重新获取各个从终端的待上传的数据量并重新计算每个通讯周期内分配给各个从终端的通讯时长。
步骤204,周期性的接收各个从终端在分配的通讯时长内所上传的数据。
其中,在每个通讯周期内,可以对与各个从终端进行通讯的顺序不做限定,即由系统随机进行;也可以由用户设定或由系统按照一定规则顺次地与各个从终端进行通讯,例如:按照各个从终端接入的顺序与各个从终端进行通讯,或按照各个终端待上传的数据量的多少排序由多到少或由少到多与各个从终端进行通讯,或按照各个从终端预设好的优先等级与各个从终端进行通讯。
请参阅图3,为本申请第二实施例的网络会议数据传输方法的流程图。本实施例中,网络会议的组成包括至少一个主终端及多个从终端,本实施例的网络会议数据传输方法适用于主终端;其中,所述主、从终端设备可以为各种类型终端设备,例如:电子白板、智能手机、平板电脑等。
应说明的是,本申请实施方式的所述的网络会议数据传输方法并不限于图3所示的流程图中的步骤及顺序。根据不同的需求,所示流程图中的步骤可以增加、移除、或者改变顺序。
如图3所示,所述网络会议数据传输方法,包括如下步骤:
步骤301,与多个从终端建立网络会议连接。
其中,本实施例中,通过蓝牙与多个从终端建立网络会议连接;当然,在其他实施例中,也可以通其他无线或有线网络传输方式与多个从终端建立网络会议连接。
在一个实施例中,与多个所述从终端建立网络会议连接可以包括步骤:
向多个所述从终端发出会议请求,其中,所述会议请求中可以包含有虚拟会议空间的地址标识信息,例如会议虚拟地点的地址标识或房间号等;与接受所述会议请求的所述从终端建立网络会议连接;其中,可以与接受所述会议请求的所述从终端在所述虚拟会议空间中建立网络会议连接。
可选地,向多个所述从终端发出会议请求之后,还可以包括步骤,接受并验证多个所述从终端的身份验证信息;仅与通过验证并接受所述会议请求的从终端建立网络会议连接。
在另一个实施例中,与多个所述从终端建立网络会议连接可以包括步骤:
接收多个所述从终端发出的会议请求,其中,所述会议请求中可以包含有多个所述从终端 的身份验证信息;与多个所述从终端建立网络会议连接,其中,可以验证多个所述从终端的身份验证信息,之后仅与通过验证的所述从终端建立网络会议连接。
可选地,在与多个所述从终端建立网络会议连接之前,还可以向所述多个从终端发送包含有虚拟会议空间的地址标识信息,例如会议虚拟地点的地址标识或房间号等,之后,与多个所述从终端在所述虚拟会议空间中建立网络会议连接。
在又一个实施例中,与多个所述从终端建立网络会议连接可以包括步骤:
接收一个所述从终端发出的会议请求,其中,所述会议请求中可以包含有所述从终端的身份验证信息;与所述从终端建立网络会议连接,其中,可以验证所述从终端的身份验证信息,通过验证之后与所述从终端建立网络会议连接,网络会议可以建立在一虚拟会议空间内;向多个所述从终端发出会议请求,其中,所述会议请求中可以包含有所述虚拟会议空间的地址标识信息,例如会议虚拟地点的地址标识或房间号等;与接受所述会议请求的所述从终端建立网络会议连接,其中,可以与接受所述会议请求的所述从终端在所述虚拟会议空间中建立网络会议连接。
可选地,向多个所述从终端发出会议请求之后,还可以包括步骤,接受并验证多个所述从终端的身份验证信息;之后仅与通过验证并接受所述会议请求的从终端建立网络会议连接。
可以理解,与多个所述从终端建立网络会议连接的方式并不限于上述的几种。
步骤302,获取各个所述从终端的待上传的数据量。
其中,获取各个从终端的待上传的数据量的方式可以为:从各个从终端上获取各个从终端上的待上传的数据量,或由各个从终端按照预设条件主动发送待上传的数据量。
周期性地与所述多个从终端通讯时,定义所述主终端与所有从终端通讯的一个通讯周期的时长为T1,在一个通讯周期内所述主终端获取所有从终端的待上传数据量的总通讯时长为T1a,其中,T1a大于等于零,且T1a远小于T1,例如T1可以10倍、20倍、30倍等的大于T1a。
在一实施例中,在与多个从终端建立网络会议连接之后,自动获取各个所述从终端的待上传的数据量。
在另一实施例中,响应一指令之后,获取各个从终端的待上传的数据量;例如,响应用户对主终端的操作,获取各个从终端的待上传的数据量;又例如,响应各个所述从终端发出的指令,获取各个从终端的待上传的数据量,其中,各个所述从终端发出的指令可以为从终端响应用户的数据上传请求所形成的指令,也可以为所述从终端数据传输完成后自动生成的指令,等。
步骤303,根据从终端的所述待上传的数据量,计算给各个从终端分配的数据上传的通讯时长。
本实施例中,根据各个所述从终端的待上传的数据量所处的数据量范围区间,计算分配给 各个所述从终端的周期性的数据上传的通讯时长。
具体地,将各个所述从终端的待上传的数据量排序并按照所述数据量范围区间归类;其中,数据量范围区间可以为等值分段,递增分段等;等值分段可以为每隔相同的数据量值分为一段,例如,0-100kB的数据量为第一段,101-200kB的数据量为第二段,201-300kB的数据量为第三段,等;递增分段可以为从小到大,每段的数据量间隔不断增大,例如,0-100kB的数据量为第一段,101-500kB的数据量为第二段,501-5000kB的数据量为第三段,等。
在一实施例中,在一个通讯周期内,根据处于越大的数据量范围区间的所述从终端所分配到的通讯时长越多的原则,计算分配给各个所述从终端的通讯时长。
在一实施例中,在一个通讯周期内,处于相同的数据量范围区间的所述从终端所分配到的通讯时长相等。
其中,还可以由用户设定或系统预设一上限阈值,判断各个所述从终端的待上传的数据量是否超过所述上限阈值,如果有从终端的待上传的数据量超过所述上限阈值,则,在每个通讯周期内,可赋予所述从终端更多的通讯时长,甚至可以暂时赋予其他从终端的通讯时长为零,也即优先传输此从终端的数据,之后再周期性地传输其他各个从终端的数据。
再例如,还可以由用户设定或系统预设一下限阈值,判断各个所述从终端的待上传的数据量是否小于所述下限阈值,如果有从终端的待上传的数据量小于所述下限阈值,则在每个通讯周期内,可赋予其他从终端更多的通讯时长,甚至可以暂时赋予所述从终端的通讯时长为零,也即优先周期性地传输其他从终端的数据。
又例如,还可以由用户设定或系统预设一下限阈值,判断各个所述从终端的待上传的数据量是否小于所述下限阈值,如果有从终端的待上传的数据量小于所述下限阈值,则在每个通讯周期内,可赋予所述从终端更多的通讯时长,甚至可以暂时赋予其他从终端的通讯时长为零,也即优先迅速地传输完所述从终端的数据,之后再周期性地传输其他各个从终端的数据。
可以理解,因每个通讯周期的总时长是一预定值,故,如果有从终端的通讯时长较长,例如远大于一个通讯周期时长与从终端的数量的比值,即通讯时长的平均值,则必然有从终端的通讯时长较短,例如,远小于所述通讯时长的平均值;也可以理解为,在一个通讯周期内,如果增大了某个从终端的通讯时长,则意味着压缩了其他的从终端的通讯时长。
可以理解,也可以在每个通讯周期内均重新获取各个从终端的待上传的数据量,例如,如果在步骤302中,定义所述主终端与所有从终端通讯的一个通讯周期的时长为T1,在一个通讯周期内所述主终端接收所有从终端的待上传数据量的总通讯时长为T1a,则在本步骤中,可以使T1==T1a+T1b,也即,每个通讯周期内均重新获取各个从终端的待上传的数据量,可以理解,此种情况下,可以重新计算每个通讯周期内分配给各个从终端的通讯时长;当然也可以 不限于此,即,不需要在每个通讯周期内均重新获取各个从终端的待上传的数据量,例如可以在某个从终端的数据传输完成之后,再重新获取各个从终端的待上传的数据量并重新计算每个通讯周期内分配给各个从终端的通讯时长。
步骤304,周期性的接收各个从终端在分配的通讯时长内所上传的数据。
其中,在每个通讯周期内,可以对与各个从终端进行通讯的顺序不做限定,即由系统随机进行;也可以由用户设定或由系统按照一定规则顺次地与各个从终端进行通讯,例如:按照各个从终端接入的顺序与各个从终端进行通讯,或按照各个终端待上传的数据量的多少排序由多到少或由少到多与各个从终端进行通讯,或按照各个从终端预设好的优先等级与各个从终端进行通讯。
请参阅图4,为本申请第三实施例的网络会议数据传输方法的流程图。本实施例中,网络会议的组成包括至少一个主终端及多个从终端,本实施例的网络会议数据传输方法适用于主终端;其中,所述主、从终端设备可以为各种类型终端设备,例如:电子白板、智能手机、平板电脑等。
应说明的是,本申请实施方式的所述的网络会议数据传输方法并不限于图4所示的流程图中的步骤及顺序。根据不同的需求,所示流程图中的步骤可以增加、移除、或者改变顺序。
如图4所示,所述网络会议数据传输方法,包括如下步骤:
步骤401,与多个从终端建立网络会议连接。
其中,本实施例中,通过蓝牙与多个从终端建立网络会议连接;当然,在其他实施例中,也可以通其他无线或有线网络传输方式与多个从终端建立网络会议连接。
在一个实施例中,与多个所述从终端建立网络会议连接可以包括步骤:
向多个所述从终端发出会议请求,其中,所述会议请求中可以包含有虚拟会议空间的地址标识信息,例如会议虚拟地点的地址标识或房间号等;与接受所述会议请求的所述从终端建立网络会议连接;其中,可以与接受所述会议请求的所述从终端在所述虚拟会议空间中建立网络会议连接。
可选地,向多个所述从终端发出会议请求之后,还可以包括步骤,接受并验证多个所述从终端的身份验证信息;仅与通过验证并接受所述会议请求的从终端建立网络会议连接。
在另一个实施例中,与多个所述从终端建立网络会议连接可以包括步骤:
接收多个所述从终端发出的会议请求,其中,所述会议请求中可以包含有多个所述从终端的身份验证信息;与多个所述从终端建立网络会议连接,其中,可以验证多个所述从终端的身份验证信息,之后仅与通过验证的所述从终端建立网络会议连接。
可选地,在与多个所述从终端建立网络会议连接之前,还可以向所述多个从终端发送包含 有虚拟会议空间的地址标识信息,例如会议虚拟地点的地址标识或房间号等,之后,与多个所述从终端在所述虚拟会议空间中建立网络会议连接。
在又一个实施例中,与多个所述从终端建立网络会议连接可以包括步骤:
接收一个所述从终端发出的会议请求,其中,所述会议请求中可以包含有所述从终端的身份验证信息;与所述从终端建立网络会议连接,其中,可以验证所述从终端的身份验证信息,通过验证之后与所述从终端建立网络会议连接,网络会议可以建立在一虚拟会议空间内;向多个所述从终端发出会议请求,其中,所述会议请求中可以包含有所述虚拟会议空间的地址标识信息,例如会议虚拟地点的地址标识或房间号等;与接受所述会议请求的所述从终端建立网络会议连接,其中,可以与接受所述会议请求的所述从终端在所述虚拟会议空间中建立网络会议连接。
可选地,向多个所述从终端发出会议请求之后,还可以包括步骤,接受并验证多个所述从终端的身份验证信息;之后仅与通过验证并接受所述会议请求的从终端建立网络会议连接。
可以理解,与多个所述从终端建立网络会议连接的方式并不限于上述的几种。
步骤402,获取各个所述从终端的待上传的数据量及各个所述从终端的优先级别。
其中,获取各个从终端的待上传的数据量及优先级别的方式可以为:从各个从终端上获取各个从终端上的待上传的数据量及优先级别,或由各个从终端按照预设条件主动发送待上传的数据量及优先级别。
其中,定义获取各个从终端的待上传的数据量及优先级别所需的总的时间为T1a;优选地,以一预定时间间隔T1周期性地获取各个从终端的待上传的数据量,及/或优先级别,其中,T1a远小于T1,例如T1可以10倍、20倍、30倍等的大于T1a。
在一实施例中,在与多个从终端建立网络会议连接之后,自动获取各个所述从终端的待上传的数据量及优先级别。
在另一实施例中,响应一指令之后,获取各个从终端的待上传的数据量及优先级别;例如,响应用户对主终端的操作,获取各个从终端的待上传的数据量及优先级别;又例如,响应各个所述从终端发出的指令,获取各个从终端的待上传的数据量及优先级别,其中,各个所述从终端发出的指令可以为从终端响应用户的数据上传请求所形成的指令,也可以为所述从终端数据传输完成后自动生成的指令,等。
可以理解,所述从终端的待上传的数据量及优先级别可以同时获取也可以不同时获取,也就是说可以分开获取,获取的方式可以相同,也可以不同;上述方式均适用于获取从终端的待上传的数据量,也均适用于获取从终端的优先级别;例如,可以主动读取各个从终端上的待上传的数据量,并接收由各个从终端发出的待上传的优先级别。
步骤403,根据从终端的待上传数据量及各个从终端的优先权级别,给各个从终端分配数据上传的通讯时长。
其中,可以按照用户设定的规则或系统预设的规则,根据各个所述从终端的待上传的数据量及各个所述从终端的优先级别,计算得到一个通讯周期内分配给各个所述从终端的通讯时长。
在一实施例中,在一个通讯周期内,当多个从终端具有同样的待上传数据量时,按照各个所述从终端的优先级别对应分配通讯时长,优先级别越高的通讯时长越多,即,同样的待上传数据量,优先级别越高的在每个时间周期内会分配更多的通讯时间,所用的时间周期会更少,因此也会更快得传完数据。
在另一实施例中,在一个通讯周期内,当多个从终端具有同样的优先级别时,按照各个所述从终端的待上传数据量对应分配通讯时长,待上传的数据量越大的通讯时长越多,即,同样的优先级别,待上传的数据量越大的通讯时长越多。
周期性地与所述多个从终端通讯时,定义一个通讯周期内接收所有从终端的上传数据的总通讯时长为T1b,定义连接的所述从终端的数量为N,第一至第N个所述从终端待上传的数据量分别为:D1,D2,...,DN,第一至第N个所述从终端的优先级别值分别为:O1,O2,...,ON,优先级别越高,O值越大;则,一个通讯周期内,分配给第n个所述从终端的通讯时长Tn=T1b*On*An*Dn/(O1*A1*D1+O2*A2*D2+…+ON*AN*DN),其中,n=1,2,...,N;D1<=D2<=...<=DN;A1,A2,...,AN为常量,且A1<=A2<=...<=AN。
其中,A值的大小可以由客户自行设定或由系统按照一定规则设定。
例如,预设A1=A2=...=AN,从而,计算得到分配给第n个所述从终端的通讯时长Tn=T1b*On*Dn/(O1*D1+O2*D2+…+ON*DN)。
其中,还可以由用户设定或系统预设一待上传的数据量D的上限阈值,判断各个所述从终端的待上传的数据量是否超过所述上限阈值,如果有从终端的待上传的数据量超过所述上限阈值,则,在一个通讯周期内,可赋予所述从终端更多的通讯时长;甚至,可以暂时赋予其他从终端的通讯时长为零,也即优先传输此从终端的数据,之后再周期性地传输其他各个从终端的数据。
再例如,还可以由用户设定或系统预设一待上传的数据量D的下限阈值,判断各个所述从终端的待上传的数据量是否小于所述下限阈值,如果有从终端的待上传的数据量小于所述下限阈值,则,在一个通讯周期内,可赋予其他从终端更多的通讯时长;甚至,可以暂时赋予所述从终端的通讯时长为零,也即优先传输其他从终端的数据。
又例如,还可以由用户设定或系统预设一待上传的数据量D的下限阈值,判断各个所述从终端的待上传的数据量是否小于所述下限阈值,如果有从终端的待上传的数据量小于所述下 限阈值,则,在一个通讯周期内,可赋予所述从终端更多的通讯时长;甚至,可以暂时赋予其他从终端的通讯时长为零,也即优先迅速地传输完所述从终端的数据,之后再周期性地传输其他各个从终端的数据。
另外,还可以由用户设定或系统预设一优先级别O的上限阈值,判断各个所述从终端的优先级别是否处于一预设的高优先级别范围内,如果有从终端的优先级别处于一预设的高优先级别范围内,则,在一个通讯周期内,可赋予所述从终端更多的通讯时长;甚至,可以暂时赋予其他从终端的通讯时长为零,也即优先传输此从终端的数据,之后再周期性地传输其他各个从终端的数据。
再例如,还可以由用户设定或系统预设一优先级别O的下限阈值,判断各个所述从终端的优先级别是否处于一预设的低优先级别范围内,如果有从终端的优先级别小于处于一预设的低优先级别范围内,则,在一个通讯周期内,可赋予其他从终端更多的通讯时长;甚至,可以暂时赋予所述从终端的通讯时长为零,也即优先周期性地传输其他从终端的数据。
可以理解,因每个通讯周期的总时长是一预定值,故,如果有从终端的通讯时长较长,例如远大于一个通讯周期的时长与从终端的数量的比值,即通讯时长的平均值,则必然有从终端的通讯时长较短,例如,远小于所述通讯时长的平均值;也可以理解为,在一个通讯周期内,如果增大了某个从终端的通讯时长,则意味着压缩了其他的从终端的通讯时长。
可以理解,也可以在每个通讯周期之内均重新获取各个从终端的待上传的数据量级优先级别,例如,如果在步骤402中,定义所述主终端与所有从终端通讯的一个通讯周期的时长为T1,在一个通讯周期内所述主终端接收所有从终端的待上传数据量的总通讯时长为T1,则在本步骤中,可以使T1==T1a+T1b,也即,每个通讯周期之内均重新获取各个从终端的待上传的数据量及优先级别,可以理解,此种情况下,可以重新即使每个通讯周期内分配给各个从终端的通讯时长;当然也可以不限于此,即,不需要在每个通讯周期内均重新获取各个从终端的待上传的数据量,例如可以在某个从终端的数据传输完成之后,再获取各个从终端的待上传的数据量及优先级别并重新计算每个通讯周期内分配给各个从终端的通讯时长。
可以理解,本实施例中,涉及到仅根据待上传的数据量分配通讯时长的部分,可以参照实施例一、二、三中的方法计算通讯时长。
优先级别O值的大小一般也由客户设定或由系统按照一定规则设定;例如,设定重要用户,并设定重要用户操作的从终端的优先级别高于一般用户操作的从终端的优先级别,从而可设定重要用户操作的从终端的优先级别O值大于一般用户操作的从终端的优先级别O值;或设定职位高的用户操作的从终端的优先级别高于职位低的用户操作的从终端的优先级别,从而可设定职位高的用户操作的从终端的优先级别O值大于职位低的用户操作的从终端的优先级 别O值;等。
步骤404,周期性的接收各个从终端在分配的通讯时长内所上传的数据。
其中,在一个通讯周期内,可以对与各个从终端进行通讯的顺序不做限定,即由系统随机进行;也可以由用户设定或由系统按照一定规则顺次地与各个从终端进行通讯,例如:按照各个从终端接入的顺序与各个从终端进行通讯,或按照各个终端待上传的数据量的多少排序由多到少或由少到多与各个从终端进行通讯,或按照各个从终端预设好的优先等级与各个从终端进行通讯。
可以理解,实际上,前述的第一实施例、第二实施例、第三实施例及第四实施例中,主终端与从终端本身可能并无实际差异,例如,全部都是智能手机或电子白板;所以,在与多个从终端连接之前,所述网络会议数据传输方法均还可以包括步骤:
将一终端设定为主终端。
其中,可以响应用户的操作将一终端设定为主终端,也可以由系统根据一预设规则将一终端设定为主终端。
在前述的第一实施例、第二实施例、第三实施例及第四实施例中,获取各个从终端的数据之后,所述网络会议数据传输方法均还可以包括步骤:
对从各个从终端上获取的数据进行处理。
其中,对从各个从终端上获取的数据进行处理包括但不限于:汇总,修改,删除,标记等。
在一实施例中,对从各个从终端上获取的数据进行处理还可以包括但不限于:显示,保存,输出等。
请参阅图5,为本申请第五实施例的网络会议数据传输方法的流程图。本实施例中,网络会议的组成包括至少一个主终端及多个从终端,本实施例的网络会议数据传输方法适用于从终端;其中,所述主、从终端设备可以为各种类型终端设备,例如:电子白板、智能手机、平板电脑、电脑等。
应说明的是,本申请实施方式的所述的网络会议数据传输方法并不限于图5所示的流程图中的步骤及顺序。根据不同的需求,所示流程图中的步骤可以增加、移除、或者改变顺序。
如图5所示,所述网络会议数据传输方法,包括如下步骤:
步骤501,与主终端建立网络会议连接。
其中,本实施例中,通过蓝牙与主终端建立网络会议连接;当然,在其他实施例中,也可以通其他无线网络传输方式与主终端建立网络会议连接。
在一个实施例中,与所述主终端建立网络会议连接可以包括步骤:
接收所述主终端发出的会议请求,其中,所述会议请求中可以包含有虚拟会议空间的地址 标识信息,例如会议虚拟地点的地址标识或房间号等;接受所述会议请求从而与所述主终端建立网络会议连接;其中,可以与所述主终端在所述虚拟会议空间中建立网络会议连接。
可选地,接受所述会议请求之后,还可以包括步骤,向所述主终端发出身份验证信息;验证通过后与所述主终端建立网络会议连接。
在另一个实施例中,与述主终端建立网络会议连接可以包括步骤:
向所述主终端发出会议请求,其中,所述会议请求中可以包含有所述从终端的身份验证信息;与所述主终端建立网络会议连接,其中,可以在验证通过后与所述主终端建立网络会议连接。
可选地,在与所述主终端建立网络会议连接之前,还可以接收所述主终端发送的包含有虚拟会议空间的地址标识信息,例如会议虚拟地点的地址标识或房间号等,之后,与所述主终端在所述虚拟会议空间中建立网络会议连接。
可以理解,与所述主终端建立网络会议连接的方式并不限于上述的几种。
步骤502,向所述主终端提供待上传的数据量。
其中,向所述主终端提供待上传的数据量的方式可以为:允许被所述主终端控制从而被主终端请求待上传的数据量,或按照预设条件主动向所述主终端上报待上传的数据量。
优选地,以一预定时间间隔T1周期性地向所述主终端提供待上传的数据量。
在一实施例中,在与所述主终端建立网络会议连接之后,自动向所述主终端提供待上传的数据量。
在另一实施例中,响应一指令之后,向所述主终端提供待上传的数据量;例如,响应用户对主终端的操作,向所述主终端提供待上传的数据量;又例如,响应所述从终端发出的指令,向所述主终端提供待上传的数据量,其中,所述从终端发出的指令可以为从终端响应用户的数据上传请求所形成的指令,也可以为所述从终端数据传输完成后自动生成的指令,等。
可以理解,如果没有需要上传的数据,则返回步骤S501。
步骤503,依照所述主终端根据所述待上传数据量分配的数据上传的通讯时长,周期性的在分配的通讯时长内向所述主终端上传数据。
其中,在一个通讯周期内,所述数据上传的通讯时长可以与所述待上传的数据量呈正比,或呈一函数关系,或所述数据上传的通讯时长与所述从终端待上传的数据量及优先级别值相关,等,具体可参实施例一至四所述。
可以理解,实际上,本实施例中,主终端与从终端本身可能并无实际差异,例如,全部都是智能手机、电子白板、平板或电脑;所以,在与主终端连接之前,本实施例的所述网络会议数据传输方法还可以包括步骤:
将一终端设定为从终端。
其中,可以响应用户的操作将一终端设定为从终端,也可以由系统根据一预设规则将一终端设定为从终端。
实际上,某一终端可以先是主终端再是从终端,也可以先是从终端再是主终端,从而也即,实施例五所述的网络会议数据传输方法也可以在实施例一至四的方法之前或之后进行,也就是说,步骤101~103,步骤201~204,步骤301~304,步骤401~404可以在步骤501~504之前或之后在同一终端上进行,并且,在步骤101~103,步骤201~204,步骤301~304,步骤401~404与步骤501~504之间还可以包含步骤:将此终端设定为从终端,或,将此终端设定为主终端。
本申请的网络会议数据传输方法中一个通讯周期内,分配给各个从终端的通讯时长与其待上传的数据量相关,从而可以更加合理的分配通讯时间,降低从终端因为带宽不够造成的数据丢失现象的概率;并且,可以设置为数据量大或优先级别高的从终端分配更多时间,使所述从终端上传数据的效率更高,使会议系统主、从终端的数据通讯实时性就越高。
本技术方案实施例还提供一种电子设备,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,所述处理器执行所述程序时实现上述实施例一至五中所述的网络会议数据传输方法的步骤;可以理解,在一个实施例中,本技术方案的所述电子设备可以在主终端与从终端之间切换,例如,所述电子设备在上述方法中可以被设定为主终端,也可以被设定为从终端。
图6为本申请一实施方式的电子设备1的功能模块示意图。如图6所示,所述电子设备1至少包括处理器11、存储器12、存储在所述存储器12中并可在所述处理器11上运行的计算机程序13(例如输入数据处理程序)。
本领域技术人员可以理解,所述示意图6仅仅是本申请用于实现网络会议数据传输方法的电子设备1的示例,并不构成对所述电子设备1的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件,例如所述电子设备1还可以包括手写输入设备、输出设备、网络接入设备、无线传输设备、显示设备、同步模块等。
所述处理器11执行所述计算机程序13时实现上述各个网络会议数据传输方法中的步骤,例如图1所示的步骤101~103,或者图2示的步骤201~204,或者图3示的步骤301~304,或者图4示的步骤401~404,及/或图5示的步骤501~504。
示例性的,所述计算机程序13可以被分割成一个或多个模块/单元,所述一个或多个模块/单元被存储在所述存储器12中,并由所述处理器11执行,以完成本申请。所述一个或多个模块/单元可以是能够完成特定功能的一系列计算机程序13指令段,所述指令段用于描述所述计算机程序13在所述电子设备1中的执行过程。例如,所述计算机程序13可以被分割成会议 请求模块、虚拟会议空间建立模块、获取模块、判断模块及数据计算模块等。
所称处理器11可以是中央处理单元(Central Processing Unit,CPU),还可以是其他通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现成可编程门阵列(Field-PrograAAable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等,所述处理器11是所述电子设备1的控制中心,利用各种接口和线路连接所述电子设备1的各个部分。
所述存储器12可用于存储所述计算机程序13和/或模块/单元,所述处理器11通过运行或执行存储在所述存储器12内的计算机程序13和/或模块/单元,以及调用存储在存储器12内的数据,实现所述电子设备1的各种功能。所述存储器12可主要包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序(例如声音播放功能、图像播放功能等)等;存储数据区可存储根据电子设备1的使用所创建的数据(例如音频数据,应用上述网络会议数据传输方法而设置、获取的数据等)等。此外,存储器12可以包括高速随机存取存储器,还可以包括非易失性存储器,例如硬盘、内存、插接式硬盘,智能存储卡(SAartAediaCard,SAC),安全数字(Secure Digital,SD)卡,闪存卡(Flash Card)、至少一个磁盘存储器件、闪存器件、或其他易失性固态存储器件。
本申请还提供一种计算机可读存储介质,其上存储有计算机程序,所述计算机程序被处理器执行时实现上述网络会议数据传输方法的步骤。
其中,本申请实现上述实施例方法中的全部或部分流程,也可以通过计算机程序来指令相关的硬件来完成,所述的计算机程序可存储于一计算机可读存储介质中,该计算机程序在被处理器执行时,可实现上述各个方法实施例的步骤。其中,所述计算机程序包括计算机程序代码,所述计算机程序代码可以为源代码形式、对象代码形式、可执行文件或某些中间形式等。所述计算机可读介质可以包括:能够携带所述计算机程序代码的任何实体或装置、记录介质、U盘、移动硬盘、磁碟、光盘、计算机存储器、只读存储器(ROA,Read-Only AeAory)、随机存取存储器(RAA,RandoA Access AeAory)、电载波信号、电信信号以及软件分发介质等。需要说明的是,所述计算机可读介质包含的内容可以根据司法管辖区内立法和专利实践的要求进行适当的增减,例如在某些司法管辖区,根据立法和专利实践,计算机可读介质不包括电载波信号和电信信号。
本技术方案实施例还提供一种终端系统,用于网络会议,包括至少一个主终端及多个从终端;其中,每个所述主终端包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,所述处理器执行所述程序时实现上述实施例一至四中所述的网络会议数据传输方法 的步骤;每个所述从终端包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,所述处理器执行所述程序时实现上述实施例五中所述的网络会议数据传输方法的步骤。所述主终端及从终端的功能模块可参图6所示的电子设备1的功能模块。
其中,所述主、从终端可以为各种类型,例如:电子白板、智能手机、平板电脑等。
因电子白板支持手写输入,有书写、绘画等功能,更接近传统会议的书写模式,并且大部分电子白板能够保存、删除、打印等,在会议中使用具有更大的优势,故,优选地,所述主、从终端均为电子白板。
在本申请所提供的几个具体实施方式中,应该理解到,所揭露的网络会议数据传输方法和电子设备,可以通过其它的方式实现。例如,以上描述的网络会议数据传输方法仅仅是示意性的,实际实现时可以有另外的划分方式。
对于本领域技术人员而言,显然本申请不限于上述示范性实施例的细节,而且在不背离本申请的精神或基本特征的情况下,能够以其他的具体形式实现本申请。因此,无论从哪一点来看,均应将实施例看作是示范性的,而且是非限制性的,本申请的范围由所附权利要求而不是上述说明限定,因此旨在将落在权利要求的等同要件的含义和范围内的所有变化涵括在本申请内。不应将权利要求中的任何附图标记视为限制所涉及的权利要求。此外,显然“包括”一词不排除其他单元或步骤,单数不排除复数。装置权利要求中陈述的多个单元或装置也可以由同一个单元或装置通过软件或者硬件来实现。
最后应说明的是,以上实施方式仅用以说明本申请的技术方案而非限制,尽管参照以上较佳实施方式对本申请进行了详细说明,本领域的普通技术人员应当理解,可以对本申请的技术方案进行修改或等同替换都不应脱离本申请技术方案的精神和范围。

Claims (17)

  1. 一种网络会议数据传输方法,包括:
    与多个从终端建立网络会议连接;
    获取各个所述从终端的待上传的数据量;及
    根据从终端的所述待上传的数据量,给各个从终端分配数据上传的通讯时长,周期性的接收各个从终端在分配的通讯时长内所上传的数据。
  2. 如权利要求1所述的网络会议数据传输方法,其特征在于,周期性地与所述多个从终端通讯时,在一个通讯周期内,待上传的数据量越大的从终端分配的上传数据时长越多。
  3. 如权利要求2所述的网络会议数据传输方法,其特征在于,定义一个通讯周期内接收所有从终端的上传数据的总通讯时长为T1b,定义连接的所述从终端的数量为N,第一至第N个所述从终端待上传的数据量分别为:D1,D2,...,DN;则,在一个通讯周期内,分配给第n个所述从终端的通讯时长Tn=T1b*An*Dn/(A1*D1+A2*D2+…+AN*DN),其中,n=1,2,...,N;D1<=D2<=...<=DN;A1,A2,...,AN为常量,且A1<=A2<=...<=AN。
  4. 如权利要求3所述的网络会议数据传输方法,其特征在于,A1=A2=...=AN,一个通讯周期内,分配给第n个所述从终端的通讯时长Tn=T1b*Dn/(D1+D2+…+DN)。
  5. 如权利要求3所述的网络会议数据传输方法,其特征在于,判断各个所述从终端的待上传的数据量是否超过一上限阈值,如果有从终端的待上传的数据量超过所述上限阈值,则设定所述从终端对应的A值大于其他从终端对应的A值;及/或,判断各个所述从终端的待上传的数据量是否小于一下限阈值,如果有从终端的待上传的数据量小于一下限阈值,则设定所述从终端对应的A值小于其他从终端对应的A值。
  6. 如权利要求2所述的网络会议数据传输方法,其特征在于,定义一个通讯周期的时长为T1,在一个通讯周期内获取所有从终端的待上传数据量的总通讯时长为T1a,在一个通讯周期内接收所有从设备的上传数据的总通讯时长为T1b,其中,T1a大于等于零,且T1=T1a+T1b。
  7. 如权利要求1所述的网络会议数据传输方法,其特征在于,将各个所述从终端的待上传的数据量排序并按照数据量范围区间归类,根据在一个通讯周期内,处于越大的数据量范围区间的所述从终端所分配到的通讯时长越多的原则,分配给各个所述从终端通讯时长。
  8. 如权利要求7所述的网络会议数据传输方法,其特征在于,在一个通讯周期内,处于相同的数据量范围区间的所述从终端所分配到的通讯时长相等。
  9. 如权利要求1所述的网络会议数据传输方法,其特征在于,根据从终端的待上传数据量及各个从终端的优先权级别,给各个从终端分配数据上传的通讯时长。
  10. 如权利要求9所述的网络会议数据传输方法,其特征在于,周期性地与所述多个从终端通讯时,在一个通讯周期内,当多个从终端具有同样的优先级别时,按照各个所述从终端的待上传数据量对应分配通讯时长,待上传的数据量越大的通讯时长越多。
  11. 如权利要求9所述的网络会议数据传输方法,其特征在于,周期性地与所述多个从终端通讯时,定义在一个通讯周期内接收所有从设备的上传数据的总通讯时长为T1b,定义连接的所述从终端的数量为N,第一至第N个所述从终端待上传的数据量分别为:D1,D2,...,DN,第一至第N个所述从终端的优先级别值分别为:O1,O2,...,ON,优先级别越高,O值越大;则,一个通讯周期内分配给第n个所述从终端的通讯时长Tn=T1b*On*An*Dn/(O1*A1*D1+O2*A2*D2+…+ON*AN*DN),其中,n=1,2,...,N;D1<=D2<=...<=DN;A1,A2,...,AN为常量,且A1<=A2<=...<=AN。
  12. 如权利要求11所述的网络会议数据传输方法,其特征在于,A1=A2=...=AN,一个通讯周期内分配给第n个所述从终端的通讯时长Tn=T1b*On*Dn/(O1*D1+O2*D2+…+ON*DN)。
  13. 如权利要求11所述的网络会议数据传输方法,其特征在于,判断各个所述从终端的优先级别是否处于一预设的高优先级别范围内,如果有从终端的优先级别处于所述预设的高优先级别范围内,则设定所述从终端对应的A值大于其他从终端对应的A值;及/或,判断各个所述从终端的优先级别是否处于一预设的低优先级别范围内,如果有从终端的优先级别处于所述预设的低优先级别范围内,则设定所述从终端对应的A值小于其他从终端对应的A值。
  14. 一种网络会议数据传输方法,包括:
    与一主终端建立网络会议连接;
    向所述主终端提供待上传的数据量;及
    依照所述主终端根据所述待上传数据量分配的数据上传的通讯时长,周期性的在分配的通讯时长内向所述主终端上传数据。
  15. 一种电子设备,包括处理器、存储器以及存储于所述存储器中的计算机程序,其特征在于,所述处理器用于运行所述存储器中存储的计算机程序以执行如权利要求1至13中任一项所述的网络会议数据传输方法的步骤。
  16. 一种终端系统,用于网络会议,包括至少一个主终端及多个从终端;其中,每个所述主终端包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,所述处理器执行所述程序时实现如权利要求1至13中任意一项所述的网络会议数据传输方法的步骤;每个所述从终端包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,所述处理器执行所述程序时实现如权利要求14项所述的网络会议数据传输方法的步骤。
  17. 如权利要求16所述的终端系统,其特征在于,所述主终端及所述从终端为电子白板、手机、平板电脑或电脑中的一种。
PCT/CN2018/119760 2018-12-07 2018-12-07 网络会议数据传输方法及电子设备 WO2020113555A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2018/119760 WO2020113555A1 (zh) 2018-12-07 2018-12-07 网络会议数据传输方法及电子设备
CN201880097598.7A CN113169986A (zh) 2018-12-07 2018-12-07 网络会议数据传输方法及电子设备

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2018/119760 WO2020113555A1 (zh) 2018-12-07 2018-12-07 网络会议数据传输方法及电子设备

Publications (1)

Publication Number Publication Date
WO2020113555A1 true WO2020113555A1 (zh) 2020-06-11

Family

ID=70973422

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/119760 WO2020113555A1 (zh) 2018-12-07 2018-12-07 网络会议数据传输方法及电子设备

Country Status (2)

Country Link
CN (1) CN113169986A (zh)
WO (1) WO2020113555A1 (zh)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101258762A (zh) * 2005-07-08 2008-09-03 艾利森电话股份有限公司 用于一键通与会议业务的方法和设备
CN102098738A (zh) * 2009-12-14 2011-06-15 三星电机株式会社 可变地分配数据发送持续时间的无线网络设备及其方法
CN103517419A (zh) * 2012-06-20 2014-01-15 华为终端有限公司 通知上行数据发送的信道使用时间的方法、上行数据发送方法和设备
WO2015027455A1 (zh) * 2013-08-30 2015-03-05 华为技术有限公司 一种无线通信网络数据传输的控制方法及装置

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102011085764A1 (de) * 2011-11-04 2013-05-08 Robert Bosch Gmbh Verfahren zum Betreiben einer Busanordnung

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101258762A (zh) * 2005-07-08 2008-09-03 艾利森电话股份有限公司 用于一键通与会议业务的方法和设备
CN102098738A (zh) * 2009-12-14 2011-06-15 三星电机株式会社 可变地分配数据发送持续时间的无线网络设备及其方法
CN103517419A (zh) * 2012-06-20 2014-01-15 华为终端有限公司 通知上行数据发送的信道使用时间的方法、上行数据发送方法和设备
WO2015027455A1 (zh) * 2013-08-30 2015-03-05 华为技术有限公司 一种无线通信网络数据传输的控制方法及装置

Also Published As

Publication number Publication date
CN113169986A (zh) 2021-07-23

Similar Documents

Publication Publication Date Title
WO2020156259A1 (zh) 内存管理方法、装置、移动终端及存储介质
WO2019144553A1 (zh) 数据存储方法、装置及存储介质
CN109857551B (zh) 基于云计算的服务资源的调度方法及装置、电子设备
WO2017166643A1 (zh) 一种任务资源的量化方法和装置
JP2013537668A (ja) モバイル端末におけるアプリケーションの自動分類のための方法および装置
WO2019042176A1 (zh) 黑名单数据交换方法及应用服务器
WO2020052379A1 (zh) 分布式存储系统中处理对象的元数据的方法及装置
CN109492024A (zh) 数据处理方法、装置、计算机设备以及存储介质
TW202112113A (zh) 資源分享方法、裝置、電腦裝置及存儲介質
CN105512033A (zh) 一种移动终端的自动化测试方法、装置及移动终端
CN111126604A (zh) 模型训练方法、装置、服务器及存储介质
CN112698793A (zh) 一种数据存储方法、装置、机器可读介质及设备
WO2018188541A1 (zh) 任务处理方法、装置、计算机设备及存储介质
CN112328592A (zh) 数据存储方法、电子设备及计算机可读存储介质
CN111142799A (zh) 分布式存储方法及装置、网络节点及存储介质
EP2874059A1 (en) Personal cloud storage chain service system and method
WO2024093549A1 (zh) 文档处理方法、装置、电子设备、存储介质及程序产品
WO2020113555A1 (zh) 网络会议数据传输方法及电子设备
CN111291045A (zh) 服务隔离数据传输方法、装置、计算机设备及存储介质
CN117077221A (zh) 一种硬盘丝印分配方法、装置、计算机设备及介质
WO2020113421A1 (zh) 一种挂载文件系统的方法、终端设备及存储介质
CN114153594A (zh) 一种内容分发网络预热方法、系统、电子设备及存储介质
CN115269063A (zh) 进程创建方法、系统、设备及介质
CN105519055A (zh) 一种I/O通道QoS动态均衡方法及装置
US20210157787A1 (en) Methods and systems for reading data based on plurality of blockchain networks

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18942037

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18942037

Country of ref document: EP

Kind code of ref document: A1