Message processing method based on distributed network

A distributed network and message processing technology, applied in the field of message processing in distributed networks, can solve the problems of message processing time extension, waste of transmission bandwidth, high network resource overhead, etc., and achieve fast distribution and processing speed, good adaptability, The effect of transmission efficiency and strong environmental adaptability

Active Publication Date: 2020-03-27
4 Cites 2 Cited by

AI-Extracted Technical Summary

Problems solved by technology

This brings huge data redundancy during transmission and wastes limited transmission bandwidth
In addition, the semantic information of the message is not involved in the traditional message processing, but the...
View more


The invention discloses a message processing method based on a distributed network. The method comprises the following steps: 1, formulating a message format; 2, formulating a generation rule of eachformat in the message; 3, generating a message according to the generation rule and the variable message domain rule in the step 2, and sending the message according to a code agreement and a sendingrule; and 4, receiving the message generated in the step 3 according to code agreement and a receiving rule, and performing message indexing and subsequent processing according to message semantics toobtain information carried in the message. The method aims at solving the problems of various message types, different security levels, high time sensitivity and the like in a wireless private network formed by distributed nodes such as an unmanned aerial vehicle group and the like. By designing a variable message format conforming to private network services, defining transceiving rules of different messages in a network, designing a forming method of each functional domain, and quickly addressing and distributing the messages according to semantics and the rules, the processing efficiency of the messages in the network is improved.

Application Domain

Network topologiesMessaging/mailboxes/announcements

Technology Topic

EngineeringReal-time computing +6


  • Message processing method based on distributed network
  • Message processing method based on distributed network
  • Message processing method based on distributed network


  • Experimental program(1)

Example Embodiment

[0056] Examples:
[0057] Table 1 is a definition table of message numbers in the variable message format of the present invention.
[0058] The message number uses a string to indicate the style, function and grouping information of the message: the first digit of the string indicates the message style, and the options are J/X/D/Q, where J is the drone room and X is the aircraft , D is machine ground, Q is other message styles; digits 2-3 and 4-5 of the string represent the first and second index of the message function, n and m are the first and second index characters of the message function respectively, both From 00 to 99; the 6th digit is the message group number, s represents different groups, defined by variable message rules. Message semantics describes the message with keywords, characterizing the function, type, content, etc. of the entire message. As shown in Table 1, the first-level index character 01 is network control, the second-level character 01 is the network monitoring message in network control, 02 is the system coordination message, and 03 is the safety message. The priority in the message increases gradually from 0-1-2-3. The level of confidentiality is gradually increased from 0-1-2 to 3, respectively representing unencrypted, secret, confidential and top secret. 0 and 1 in the receipt request are not to send and to send the receipt respectively. According to the content query in Table 1, the message number J0101 represents the network monitoring message in the network control between drones.
[0059] Table 2 is a coding convention table in the variable message rule of the present invention.
[0060] The standard time is expressed in Greenwich Mean Time (GMT); the position information is expressed in the longitude/latitude coordinates of the World Geodetic System (WGS-84), and the corresponding transformation algorithm is required for other times; the end flag of the text field in the field end flag is an ASCII value 1111111 (deleted), used to indicate the end of its own text and character-based text fields; the data field code is a text character data field composed of 7-bit ASCII strings, and the linear connection sequence of the message field is each successive data The least significant bit of the second character of the field is followed by the most significant bit of the first character, until all are connected; the logic/data field needs to be clearly defined in the description, and the numeric data bit represents the actual value.
[0061] Table 3 is a table of sending and receiving rules in the variable message rule of the present invention.
[0062] The sending opportunity and repeated sending rules stipulate that the first sending will be carried out when the first sending opportunity comes. If the repeat ID is not 1, then the subsequent sending opportunities will be based on the number of repetitions, time interval, priority, etc.; data available means that each field of the message is Complete; the priority of the message is gradually increased from 0-1-2-3, within the same priority group, processed in first-in-first-out order; the message receiving rule is that after receiving the message, the system will determine the appropriate message format and key The legality of fields, etc. shall be processed in accordance with the corresponding rules; the receipt rules are: 1) The system responds to the message requesting receipt, the priority of the receipt is consistent with the original message, and the priority can be changed if necessary, 2) if the message is returned If it is not received, it can be sent twice at most. 3) If the received message cannot be obeyed, the reason must be stated in the return receipt; semantic indexing rules include: 1) Each node in the network is divided according to J, X, D, and Q, The further progress group is divided into second-level groups, each of the second-level group members from 1 to all nodes N, the maximum number of each second-level group is C(1, N)+C(2,N)+…+C (NN), 2) The message grouping index s is the number of each secondary group. According to different secondary groups, routing and distribution based on message semantics are completed. 3) If s is not filled in, follow J/X/D/ Different groups of Q, broadcast to all members in the group.
[0063] Table 4 shows the process of generating network monitoring messages in the variable message functional domain of the present invention.
[0064] Network monitoring messages are used to collect and provide network status information and are the basis of the entire information link. Take its message generation process as an example to illustrate the variable message function domain. The variable message functional domain refers to the functional domain that constructs the message according to grammar and marks. The marks include group repeat mark (GR), group existence mark (GE), return group (UG), etc. Repeat mark, 1 means repetition, 0 means no repetition, decide whether to repeat (repeat); group existence mark, 1 means existence, 0 means absent, determine the number of groups (build group); return group, 1 means level 1, 0 means Level 2, decide to return (upgrade); Uniform Resource Name (URN), the unique representation of the node. In Table 4, the network monitoring message generation process in the variable message functional domain can be regarded as a nested message writing process, and its structure is as follows:
[0065] (1)
[0066] (2)
[0067] (3)
[0068] Repeat (4.1)-GR (automatically lower one level on the original basis)
[0069] (4.2)
[0070] Repeat(4.3.1)——GR
[0071] (4.3.2)
[0072] (4.3.3)
[0073] (4.3.4)
[0074] (4.3.5)
[0075] (4.3.6)-UG(1)
[0076] Bulit Gr (4.4)-GE (the content is automatically reduced by one level on the original basis) Repeat (4.4.1)-GR
[0077] (4.4.2)
[0078] Repeat(——GR
[0079] (
[0080] (
[0081] (
[0082] Bulit Gr (4.4.4)-GE
[0083] (
[0084] Repeat(——GR
[0085] (
[0086] (
[0087] (
[0088] (——UG(2)
[0089] Bulit Gr (4.4.5)-GE
[0090] (
[0091] Repeat(——GR
[0092] (
[0093] (
[0094] (
[0095] (——UG(2)
[0096] (4.4.6)-UG(2)
[0097] (5)——END
[0098] Therefore, the structure and content of the message are variable. According to the different network types and the number of connected nodes, the sending and receiving are counted and monitored, and different messages are formed for delivery to other nodes.
[0099] Table 1
[0102] Table 2
[0104] table 3
[0107] Table 4


no PUM

Description & Claims & Application Information

We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.

Similar technology patents

Detachable concrete lintel mold


Machine bottom surface spraying equipment


Oil filling nozzle

InactiveCN102943952AGood adaptabilityEasy to fill oil
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products