Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Communication method based on inter-column security communication network protocol of reactor protection system

A reactor protection and communication network technology is applied in the communication field based on the safety communication network protocol between columns of a reactor protection system. Identify, avoid cyber conflict and competition, and avoid the effects of uncertainty

Active Publication Date: 2011-06-01
CHINA TECHENERGY +1
View PDF5 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The switch that appeared later solved the shortcomings of the access control method of CSMA / CD (Carrier Sense Multiple Access with Collision Detection), but the switch divides the network into several network segments and caches the data so that the data frame The transmission time is uncertain, which cannot meet the real-time requirements of inter-column communication of the reactor protection system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Communication method based on inter-column security communication network protocol of reactor protection system
  • Communication method based on inter-column security communication network protocol of reactor protection system
  • Communication method based on inter-column security communication network protocol of reactor protection system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] The security network protocol complies with the network interconnection model OSI (Open System Interconnect) researched by the ISO (International Organization for Standardization) organization in 1985 in terms of architecture and service definition. Such as figure 2 The shown secure network protocol consists of three network layers: application layer, data link layer and physical layer. The realization method of the MAC sublayer describing the physical layer and the data link layer follows the IEEE802.3 standard; the receiving and sending of data use the standard Ethernet interface. The application layer protocol defines the structure of the data frame and the realization requirements of the network equipment, and clearly defines the hardware equipment such as the specific physical medium. This embodiment is described according to the order that the high level sends a request to the low level, and the low level provides services for the high level.

[0031] In terms ...

Embodiment 2

[0037] In terms of the application layer, the protocol requires both parties to use asynchronous communication, and the receiver cannot send a response frame to the sender. Both sending and receiving of network devices use 10ms. When reading network data, you can only use periodic query to read network data frames, and you cannot use interrupts to read network data. The total length of the application layer data frame is defined as 512 bytes, and the data frame of the application layer is specified.

[0038] Such as Figure 4 The function code shown has a specific mark on the data mode, which is used to distinguish whether the content in the data communication is a control command or the collected protected data information; the application mode subdivides the mark of the protocol occasion; determines the amount of data in this occasion and the The response speed in the occasion; the four-byte TICK code is used to identify the data packet, which is convenient for sending the...

Embodiment 3

[0041] In terms of the application layer, the protocol requires both parties to use asynchronous communication, and the receiver cannot send a response frame to the sender. Both transmission and reception of network devices use 25ms. When reading network data, you can only use periodic query to read network data frames, and you cannot use interrupts to read network data. The total length of the application layer data frame is defined as 1000 bytes, and the data frame of the application layer is specified.

[0042] Such as Figure 4 The function code shown has a specific mark on the data mode, which is used to distinguish whether the content in the data communication is a control command or the collected protected data information; the application mode subdivides the mark of the protocol occasion; determines the amount of data in this occasion and the The response speed in the occasion; the four-byte TICK code is used to identify the data packet, which is convenient for sendi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a network protocol, in particular relating to a security network protocol for inter-column communication of a system, in particular to a communication method based on a security network protocol for inter-column communication of a reactor protection system. The protection system comprises a communication system among distributed servers, the protocol is composed of a physical layer, a data link layer and an application layer, and the communication method is characterized in that a sending party and a receiving party in network equipment in the security network protocol are in point-to-point connection; and sending and receiving have the same time cycle. By utilizing the communication method, the network transmission is stable, and the communication method further has the specific advantages that as the sending sequences are matched equivalently, the network load is constant, and the safety and real-time property of a network are improved.

Description

technical field [0001] The present invention relates to a network protocol. Specifically, the present invention relates to a safety network protocol for system inter-column communication, especially a communication method based on the inter-column safety communication network protocol of the reactor protection system. Background technique [0002] Network protocol is an indispensable part of computer network, and its function is to ensure normal and reliable data communication between computers. The high degree of automation of data communication between computers places very high demands on the functions and performance of network protocols. From a functional point of view, a network protocol is a series of rules, standards or conventions established for data exchange in computer networks. In addition, there are two other views on the definition of network protocols: network protocol is a language; network protocol is a standard. [0003] Ethernet is the most common commu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L1/00
Inventor 刘丹陈子松孙远张亚栋尹宝娟王晓燕
Owner CHINA TECHENERGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products