Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Protocol conflict matching method and system, storage medium and computer equipment

A matching method and protocol technology, applied in transmission systems, electrical components, etc., can solve problems such as difficulty in analyzing characteristics between protocols, manual intervention, and incompatibility between protocol A and protocol B.

Active Publication Date: 2020-10-27
广州天源信息科技股份有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For directly using the source code of a general-purpose programming language (such as C language) to express the protocol, it will become very difficult to analyze the characteristics of the protocol and the protocol
For example: the tcp-server of the platform listens to a port 8000. When two devices using protocol A and protocol B want to access the platform, can they share port 8000? Can protocol A and protocol B be compatible with each other? For problems such as these, automatic analysis is very difficult for the case of using general-purpose programming language source code to express the agreement, and most cases require human intervention

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protocol conflict matching method and system, storage medium and computer equipment
  • Protocol conflict matching method and system, storage medium and computer equipment
  • Protocol conflict matching method and system, storage medium and computer equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0024] Such as figure 1 As shown, in the present embodiment, the protocol conflict matching method of the present invention is realized by using a structured protocol parser syntax tree generation algorithm, which mainly includes the following steps:

[0025] Step S1. Define a data protocol representation method based on action nodes, so that each action corresponds to a node in the syntax tree of the protocol parser.

[0026] In this embodiment, use the node Int8: a to read an 8-bit integer number from the data source and name it a; use the node Int16: a to read a 16-bit integer number from the data source and name it a; use The if statement in a high-level programming language, that is, the node if($0>1), judges whether the value of the 0th node of the message is greater than 1, where $0 represents the value of the 0th node.

[0027] Step S2, dividing the nodes in step S1 into "branch nodes" and "non-branch nodes".

[0028] In this embodiment, the nodes Int8 and Int16 are ...

example 1

[0058] Example 1. Failed to generate syntax tree

[0059] Merge Protocol A, Protocol B, and Protocol C into one message group (adjust the order of the messages for the next demonstration, but in fact the order of the messages is irrelevant) First, enter the synthesized message group as shown in Table 5:

[0060]

[0061] table 5

[0062] Each message (each row) in this group of messages has a node, so it is not all empty; the 0th node of each row of messages pops up, as shown in Table 6, if a row is already empty, then define a node that represents empty Replace the pop-up node, or directly judge that there is a conflict, and end the algorithm.

[0063]

[0064] Table 6

[0065] Because the 0th node does not contain an if node, it does not contain a branch node; and because the pop-up nodes are all Int8:id, they are consistent and there is no conflict; so add this node to the output.

[0066] Then, enter the remaining nodes in the synthesized message group, as shown i...

example 2

[0090] Example 2, normal generation of syntax tree

[0091] In the case of failure to generate the syntax tree, protocol C is removed, only protocol A and protocol B are merged, and protocol A and protocol B are merged into one message group.

[0092] First, enter the merged message group, see Table 14:

[0093]

[0094] Table 14

[0095] Each message (each row) in this group of messages has nodes, so it is not all empty; the first node of each row of messages pops up, see Table 15:

[0096]

[0097] Table 15

[0098] Because the first node does not contain an if node, it does not contain a branch node; and because the pop-up nodes are all Int8:id, they are consistent and there is no conflict. Add this node to the output.

[0099] Then, enter the remaining nodes, see Table 16:

[0100]

[0101] Table 16

[0102] Since each message (each row) in this group of messages has a node, it is not all empty; the first node of each message pops up, see Table 17:

[0103...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of Internet of Things protocol analysis, in particular to a protocol conflict matching method and system, a storage medium and computer equipment, and themethod comprises the steps: defining a data protocol representation method based on action nodes, enabling each action to correspond to one node in a protocol analyzer syntax tree, and dividing the nodes into branch nodes and non-branch nodes; expressing the protocol of each device as a protocol structure of one or more rows of nodes according to the number of message types of the devices; synthesizing the protocol structures of all the devices into a group of messages, traversing the synthesized message groups, and generating a syntax tree for the synthesized message groups; and if the syntaxtree can be successfully generated, determining that the protocols of the corresponding equipment do not conflict with each other and can be bound to the same data source. According to the method, the characteristics in the protocols and between the protocols can be automatically analyzed, whether multiple protocols can share one data source or not is determined, and the automatic analysis and matching problem that whether the multiple protocols can be compatible with one another or not is solved.

Description

technical field [0001] The invention relates to the technical field of Internet of Things protocol analysis, in particular to a protocol conflict matching method, system, storage medium and computer equipment. Background technique [0002] In the development of the existing IoT platform, access to various devices has become an inevitable requirement. In order to transmit their internal information, these IoT devices will encode the internal information into binary data according to certain rules, and then use the physical interface to transmit it. Generally, we call this rule "protocol". And when we want to access a certain device, we need to use the protocol codec part of the code. [0003] Some devices that use standardized and standardized protocols can be configured for the standardized protocols they use. However, there are still a large number of devices that use custom protocols. In this case, independent code writing is required. When there are many types of devic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L69/22
Inventor 陈思衡吴晓鹏刘佳
Owner 广州天源信息科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products