[0056] Examples:
[0057] Table 1 is a definition table of message numbers in the variable message format of the present invention.
[0058] The message number uses a string to indicate the style, function and grouping information of the message: the first digit of the string indicates the message style, and the options are J/X/D/Q, where J is the drone room and X is the aircraft , D is machine ground, Q is other message styles; digits 2-3 and 4-5 of the string represent the first and second index of the message function, n and m are the first and second index characters of the message function respectively, both From 00 to 99; the 6th digit is the message group number, s represents different groups, defined by variable message rules. Message semantics describes the message with keywords, characterizing the function, type, content, etc. of the entire message. As shown in Table 1, the first-level index character 01 is network control, the second-level character 01 is the network monitoring message in network control, 02 is the system coordination message, and 03 is the safety message. The priority in the message increases gradually from 0-1-2-3. The level of confidentiality is gradually increased from 0-1-2 to 3, respectively representing unencrypted, secret, confidential and top secret. 0 and 1 in the receipt request are not to send and to send the receipt respectively. According to the content query in Table 1, the message number J0101 represents the network monitoring message in the network control between drones.
[0059] Table 2 is a coding convention table in the variable message rule of the present invention.
[0060] The standard time is expressed in Greenwich Mean Time (GMT); the position information is expressed in the longitude/latitude coordinates of the World Geodetic System (WGS-84), and the corresponding transformation algorithm is required for other times; the end flag of the text field in the field end flag is an ASCII value 1111111 (deleted), used to indicate the end of its own text and character-based text fields; the data field code is a text character data field composed of 7-bit ASCII strings, and the linear connection sequence of the message field is each successive data The least significant bit of the second character of the field is followed by the most significant bit of the first character, until all are connected; the logic/data field needs to be clearly defined in the description, and the numeric data bit represents the actual value.
[0061] Table 3 is a table of sending and receiving rules in the variable message rule of the present invention.
[0062] The sending opportunity and repeated sending rules stipulate that the first sending will be carried out when the first sending opportunity comes. If the repeat ID is not 1, then the subsequent sending opportunities will be based on the number of repetitions, time interval, priority, etc.; data available means that each field of the message is Complete; the priority of the message is gradually increased from 0-1-2-3, within the same priority group, processed in first-in-first-out order; the message receiving rule is that after receiving the message, the system will determine the appropriate message format and key The legality of fields, etc. shall be processed in accordance with the corresponding rules; the receipt rules are: 1) The system responds to the message requesting receipt, the priority of the receipt is consistent with the original message, and the priority can be changed if necessary, 2) if the message is returned If it is not received, it can be sent twice at most. 3) If the received message cannot be obeyed, the reason must be stated in the return receipt; semantic indexing rules include: 1) Each node in the network is divided according to J, X, D, and Q, The further progress group is divided into second-level groups, each of the second-level group members from 1 to all nodes N, the maximum number of each second-level group is C(1, N)+C(2,N)+…+C (NN), 2) The message grouping index s is the number of each secondary group. According to different secondary groups, routing and distribution based on message semantics are completed. 3) If s is not filled in, follow J/X/D/ Different groups of Q, broadcast to all members in the group.
[0063] Table 4 shows the process of generating network monitoring messages in the variable message functional domain of the present invention.
[0064] Network monitoring messages are used to collect and provide network status information and are the basis of the entire information link. Take its message generation process as an example to illustrate the variable message function domain. The variable message functional domain refers to the functional domain that constructs the message according to grammar and marks. The marks include group repeat mark (GR), group existence mark (GE), return group (UG), etc. Repeat mark, 1 means repetition, 0 means no repetition, decide whether to repeat (repeat); group existence mark, 1 means existence, 0 means absent, determine the number of groups (build group); return group, 1 means level 1, 0 means Level 2, decide to return (upgrade); Uniform Resource Name (URN), the unique representation of the node. In Table 4, the network monitoring message generation process in the variable message functional domain can be regarded as a nested message writing process, and its structure is as follows:
[0065] (1)
[0066] (2)
[0067] (3)
[0068] Repeat (4.1)-GR (automatically lower one level on the original basis)
[0069] (4.2)
[0070] Repeat(4.3.1)——GR
[0071] (4.3.2)
[0072] (4.3.3)
[0073] (4.3.4)
[0074] (4.3.5)
[0075] (4.3.6)-UG(1)
[0076] Bulit Gr (4.4)-GE (the content is automatically reduced by one level on the original basis) Repeat (4.4.1)-GR
[0077] (4.4.2)
[0078] Repeat(4.4.3.1)——GR
[0079] (4.4.3.2)
[0080] (4.4.3.3)
[0081] (4.4.3.4)-UG(1)
[0082] Bulit Gr (4.4.4)-GE
[0083] (4.4.4.1)
[0084] Repeat(4.4.4.2.1)——GR
[0085] (4.4.4.2.2)
[0086] (4.4.4.2.3)
[0087] (4.4.4.2.4)
[0088] (4.4.4.2.5)——UG(2)
[0089] Bulit Gr (4.4.5)-GE
[0090] (4.4.5.1)
[0091] Repeat(4.4.5.2.1)——GR
[0092] (4.4.5.2.2)
[0093] (4.4.5.2.3)
[0094] (4.4.5.2.4)
[0095] (4.4.5.2.5)——UG(2)
[0096] (4.4.6)-UG(2)
[0097] (5)——END
[0098] Therefore, the structure and content of the message are variable. According to the different network types and the number of connected nodes, the sending and receiving are counted and monitored, and different messages are formed for delivery to other nodes.
[0099] Table 1
[0100]
[0101]
[0102] Table 2
[0103]
[0104] table 3
[0105]
[0106]
[0107] Table 4
[0108]
[0109]