Visualized protocol analysis method and system for fire-fighting Internet of Things data

A technology of data analysis and protocol analysis, which is applied in the field of protocol analysis of fire-fighting Internet of Things data, can solve the problems of time-consuming and labor-intensive analysis, and achieve the effects of increasing development time, fast, accurate and efficient development, and increasing workload

Active Publication Date: 2020-12-11
智维云图(上海)智能科技有限公司
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] To sum up, in the current protocol analysis method, it is necessary to specify a corresponding analysis scheme for each protocol, and analyzing these protocols will become a time-consuming and labor-intensive task.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Visualized protocol analysis method and system for fire-fighting Internet of Things data
  • Visualized protocol analysis method and system for fire-fighting Internet of Things data
  • Visualized protocol analysis method and system for fire-fighting Internet of Things data

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0065] Such as figure 1 As shown, it is a specific flow chart of a protocol analysis method for visualized fire-fighting Internet of Things data in the present invention. it includes:

[0066] S11: Aiming at the data analysis protocol for analyzing the fire data transmitted in the fire protection Internet of Things, establish a preset tool library corresponding to the data analysis protocol, and store the preset method applied in the data analysis protocol in the preset in the tool library.

[0067] Specifically, in this embodiment, in the data analysis protocol of fire protection data, some preset methods are generally used. The data analysis process is to use a plurality of different or the same preset methods according to the The analysis logic is the process of calling the preset methods one by one to analyze the fire data. A preset tool library is established in the server in advance, and some preset methods are written into the preset tool library. In the follow-up, ...

no. 2 example

[0087] Compared with the first embodiment, the steps are basically the same, and the biggest difference is that in S14, when obtaining the parameter value corresponding to the data parameter in the fire data, it also includes: verifying the data parameter, specifically The steps are:

[0088] The preset method for verifying the data parameter is added in the preset tool library.

[0089] In the object value of the data parameter in the parsing protocol json object, an object for verifying the data parameter and an object for parsing after the data parameter is verified are nested, wherein the verification The object value of the data parameter object stores the preset method for verifying the data parameter and the corresponding method parameter for calling the preset method, and the method parameter for calling the preset method is used when the data parameter is verified. The name of the preset method for parsing the data parameter and the corresponding method paramet...

no. 3 example

[0097] Compared with the second embodiment, the biggest difference is that when verifying the data parameters, the drools rule engine is used to manage the process of parsing the fire data through the data parsing protocol, and the data parameters will be verified The part is written into the rule condition part of the drools rule engine, and the part parsing the data parameter is written into the rule result part of the drools rule engine; when executing the drools rule engine, only when the drools rule engine The rule result part of the drools rule engine will be executed only after the execution of the rule condition part is passed.

[0098] Specifically, in this embodiment, when the parameter value of the fire data parameter is obtained during operation, the when part is written into the rule condition part of the drools rule engine, and the result part is written into the rule result part of the drools rule engine. According to the execution mechanism of the drools ru...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of protocol analysis of fire-fighting Internet of Things data, and provides a visualized protocol analysis method and system for fire-fighting Internet ofThings data. The method comprises the steps: building a preset tool library corresponding to a data analysis protocol; receiving protocol analysis information through a visual configuration platform;splicing the data analysis protocol into an analysis protocol json object; when a byte array needs to be analyzed, transmitting the byte array into the analysis protocol json object, acquiring parameter values corresponding to the data parameters for each data parameter contained in the byte array, and splicing the parameter values to form a fire-fighting data json object; when the parameter values corresponding to the data parameters in the fire-fighting data need to be obtained, obtaining the corresponding parameter values through the data parameters in the fire-fighting data json object. The technical problem that in a current protocol analysis method, an analysis scheme needs to be specified for each protocol is solved.

Description

technical field [0001] The invention relates to the technical field of protocol analysis of fire-fighting internet of things data, in particular to a protocol analysis method and system for visualized fire-fighting internet of things data. Background technique [0002] The Internet of Things was proposed by the United States in the 1990s. It refers to the use of communication technologies such as local networks or the Internet to connect sensors, controllers, machines, people and things together in a new way to form a relationship between people and things, things and things. The Internet of things realizes informatization, remote management control and intelligent network. The Internet of Things is an extension of the Internet, which includes the Internet and all resources on the Internet, and is compatible with all Internet applications. [0003] At present, fire-fighting Internet of Things technology refers to information sensing equipment such as radio frequency identif...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06G06F16/28
CPCH04L69/22H04L69/06G06F16/287G06F16/288
Inventor 张克文王秋浦荆煋燃
Owner 智维云图(上海)智能科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products