Unlock instant, AI-driven research and patent intelligence for your innovation.

A Data Communication Method Based on Two Sets of Unidirectional Boundaries

A data communication and boundary technology, applied in the field of communication, can solve the problems of serious data interaction delay, constant polling, and multiple data landings, etc., and achieve the effect of solving real-time data interaction, reducing complexity, and low configuration requirements.

Active Publication Date: 2021-06-29
普康迪(北京)数码科技股份有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, in the public security industry, in two completely physically separated networks, there are two commonly used data interaction methods based on two sets of one-way boundaries: the first is to transfer data through FTP files: put the requested data into FTP on a network segment, and use the boundary Synchronize to FTP on another network segment, which realizes data transmission, but the efficiency and concurrency are not guaranteed, and the status of data transmission cannot be known
The second method is similar to the first method, replacing FTP with DB, although it has some advantages in data query and classification, but the efficiency is lower than the first method, and the cost of maintaining DB is higher
[0003] Specifically, defect 1 of the existing technology: Whether the traditional boundary synchronization method is FTP or DB, there will be data landing multiple times and continuous polling, disk IO reads and writes are frequent, and the cost of maintaining FTP clusters and databases It is also relatively high. Improving the interaction efficiency depends on adding more hardware resources.
Defect 2: Due to the polling method, the data interaction delay is relatively serious, and the data status cannot be obtained in time, which has a great impact on business scenarios with high real-time requirements

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Data Communication Method Based on Two Sets of Unidirectional Boundaries

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The data communication method based on two sets of unidirectional borders provided by the present invention uses UDP as a data transmission mode without changing the original network security level to realize real-time command query and secure data transmission in two sets of physically isolated networks. In the environment, the two-way UDP protocol is used to form a communication link, and data transmission confirmation, data merging and data processing are realized according to the message type, message number, and message length.

[0029] Both ends of the boundary have a set of sending service and receiving service respectively. The received data is directly written into the memory, and multi-thread processing technology is used to encapsulate the data, analyze instructions and execute instructions. After receiving the data, it immediately sends a confirmation packet. If there is no data returned in the confirmation packet, the message resending mechanism is started t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a communication method, which solves the problems of low efficiency and high expansion cost caused by disk IO. Including: on the basis of not changing the original network security level, use UDP as the data transmission method to realize real-time command query and secure data transmission; in two sets of physically isolated network environments, use the two-way UDP protocol to form a communication link, According to the message type, message number, and message length, data transmission confirmation, data merging, and data processing are realized; both ends of the boundary have a set of sending service and receiving service, and the received data is directly written into the memory, using multi-thread processing technology Encapsulate the data, analyze the instructions and execute the instructions, send the confirmation packet immediately after receiving the data, and start the message resending mechanism for the data that does not return the confirmation packet to prevent data loss.

Description

technical field [0001] The invention relates to a communication method, in particular to a data communication method based on two sets of unidirectional boundaries. Background technique [0002] At present, in the public security industry, in two completely physically separated networks, there are two commonly used data interaction methods based on two sets of one-way boundaries: the first is to transfer data through FTP files: put the requested data into FTP on a network segment, and use the boundary Synchronizing to FTP on another network segment enables data transmission, but the efficiency and concurrency cannot be guaranteed, and the status of data transmission cannot be known. The second method is similar to the first method, replacing FTP with DB, although it has some advantages in data query and classification, but the efficiency is lower compared with the first method, and the maintenance cost of DB is higher. [0003] Specifically, defect 1 of the existing technol...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L1/00H04L1/18H04L29/06H04L29/08
CPCH04L1/0007H04L1/1822H04L63/02H04L67/02H04L69/164H04L69/22H04L67/568
Inventor 刘波
Owner 普康迪(北京)数码科技股份有限公司