CN112822245A - Agricultural Internet of things big data access system and method - Google Patents

Agricultural Internet of things big data access system and method Download PDF

Info

Publication number
CN112822245A
CN112822245A CN202011622462.9A CN202011622462A CN112822245A CN 112822245 A CN112822245 A CN 112822245A CN 202011622462 A CN202011622462 A CN 202011622462A CN 112822245 A CN112822245 A CN 112822245A
Authority
CN
China
Prior art keywords
module
data
equipment
connection
message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202011622462.9A
Other languages
Chinese (zh)
Inventor
高先圣
何俊明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuxi Kaiyi Internet Of Things Technology Development Co ltd
Original Assignee
Wuxi Kaiyi Internet Of Things Technology Development Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuxi Kaiyi Internet Of Things Technology Development Co ltd filed Critical Wuxi Kaiyi Internet Of Things Technology Development Co ltd
Priority to CN202011622462.9A priority Critical patent/CN112822245A/en
Publication of CN112822245A publication Critical patent/CN112822245A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y10/00Economic sectors
    • G16Y10/05Agriculture
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y30/00IoT infrastructure
    • G16Y30/10Security thereof
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y40/00IoT characterised by the purpose of the information processing
    • G16Y40/50Safety; Security of things, users, data or systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/50Queue scheduling
    • H04L47/62Queue scheduling characterised by scheduling criteria
    • H04L47/625Queue scheduling characterised by scheduling criteria for service slots or service orders
    • H04L47/6275Queue scheduling characterised by scheduling criteria for service slots or service orders based on priority
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/565Conversion or adaptation of application format or content

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Agronomy & Crop Science (AREA)
  • Economics (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Medical Informatics (AREA)
  • General Business, Economics & Management (AREA)
  • Power Engineering (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention relates to an agricultural Internet of things big data access system and method, wherein the system comprises: a configuration module; the equipment module is connected with the configuration module; the connecting module is connected with the equipment module; the authentication module is respectively connected with the equipment module and the connection module; the message processing module is connected with the authentication module; the linkage control module is connected with the authentication module and the message processing module; the exception handling module is connected with the linkage control module and the message handling module; and the monitoring module is connected with the message processing module. The access of mass anonymous devices adopts a three-level preprocessing mechanism, so that the resource consumption caused by anonymous connection, illegal connection and repeated connection is avoided, and the access capacity and efficiency of processing devices are improved; the high-concurrency data processing adopts dynamic message queue processing to dynamically generate a message queue and a processing priority, and system resources are fully utilized; the conversion rate of data is improved.

Description

Agricultural Internet of things big data access system and method
Technical Field
The invention relates to the technical field of Internet of things, in particular to an agricultural Internet of things big data access system and method.
Background
In the agricultural internet of things, namely in a greenhouse control system, physical quantity parameters such as temperature, relative humidity, pH value, illumination intensity, soil nutrients, CO2 concentration and the like in the environment are detected by using equipment such as a temperature sensor, a humidity sensor, a pH value sensor, a light sensor, a CO2 sensor and the like of the internet of things system, and are displayed in real time by various instruments or used as automatically controlled parameters to participate in automatic control, so that a good and appropriate growing environment for crops is ensured.
The agricultural product production environment is more complicated, and the environmental factor that is influenced is more, and temperature, light, water, fertilizer, gas, insect pest, crop body etc. multidimension degree data have decided crop planting environment and growth development jointly, and the agricultural thing networking trade is mixed and disorderly, and the industry standard does not have the unity, and each family adopts industry standard or self-control communication protocol respectively, and the system can be fast, simple and convenient, accurate identification data and provide the extending capability. Although the agricultural internet of things data are various in types, the data characteristics are similar, and for real-time data transmitted by massive distributed sensing terminals in parallel, the system needs to safely and reliably process and receive heterogeneous data and efficiently utilize system resources. Agricultural geographical position is usually remote, and communication signal is not very good, and phenomena such as communication interruption, half packet, stick package easily take place in the data transmission process, and the system can distinguish and handle unusual data. Massive anonymous, illegal and reconnected equipment is frequently accessed, so that the invalid resource consumption is increased, the system processing capacity is reduced, and the efficiency is low. The high concurrent data processing of the agricultural Internet of things consumes a large amount of system resources, so that platform pressure is caused, additional resource expansion is needed, and the cost is increased. Error data and incomplete data generated in the data communication process lack an effective processing mode, the efficiency is low, and the system fault tolerance is low.
Thus, significant advances in the art are needed.
Disclosure of Invention
In order to solve the technical problem, in view of the above-mentioned defects in the prior art, on one hand, the invention provides an agricultural internet of things big data access system, which includes:
a configuration module;
the equipment module is connected with the configuration module;
a connection module connected with the equipment module;
the authentication module is respectively connected with the equipment module and the connection module;
the message processing module is connected with the authentication module;
the linkage control module is connected with the authentication module and the message processing module;
the exception handling module is connected with the linkage control module and the message handling module; (ii) a
And the monitoring module is connected with the message processing module.
Preferably, the configuration module is configured to configure group information, a data conversion format set, and authentication information, and provide parameter initialization for system operation.
Preferably, the equipment module is used for defining an identification number, a data conversion format and a linkage control mode of the equipment and providing a template for equipment individual identification and information processing.
Preferably, the connection module is used for massive anonymous or named connection, and provides rapid device access.
Preferably, the authentication module is used for system identification of the device, verifying the validity of the access device, and acquiring a data conversion format of the information processing.
Preferably, the message processing module is configured to add the received message to the dynamic message queue according to the category characteristic of the message, and process the received data according to the device identification number and the data conversion format.
Preferably, the linkage control module is configured to trigger the device control when the data of the message processing satisfies the linkage control condition.
Preferably, the exception handling module is configured to find that the received data does not conform to the data conversion format in the message processing, extract protocol extraction feature quantity analysis from the source data, perform data splitting, integration or discarding, and improve the resolution of the data.
Correspondingly, on the other hand, the invention also provides an agricultural internet of things big data access method, which comprises the following steps:
s1, configuring group information and data format conversion set of the equipment;
s2, the equipment module distributes an equipment identification number, wherein the equipment identification number is an identification of the equipment in the system and is used for distinguishing different equipment and configuring a linkage control mode;
s3, the terminal equipment is communicated with the network and sends a connection request;
s4, the system receives the request information and records the connection information;
s5, the authentication module processes the named connection incidental information or the subsequent independent authentication information of anonymous connection, and authenticates whether the connection is legal or not through the equipment identification number, the equipment identity and the secret key, and allows the connection to carry out data communication after the authentication is passed;
s6, acquiring source data from the authentication connection, dynamically generating different types of ActiveMq message queues according to the equipment access characteristics of the messages, the current concurrency and the resource information of the current platform server, and assigning priority levels to each type of message queues;
s7, the consumer takes out the source data with high priority from the queue;
s8, detecting whether the data is complete according to a data format conversion method, if the data feature quantity is not completely extracted, analyzing the half-pack and pack-sticking phenomena, and completing data analysis through unpacking, packing and other processing;
and S9, carrying out exception processing on the illegal data, and recording an illegal data log.
Preferably, step S9 is followed by:
and S10, judging whether the linkage control is preset, if so, triggering the corresponding linkage control message, adding the linkage control message into a message queue, and executing the linkage control.
The agricultural Internet of things big data access method has the following beneficial effects: the access of mass anonymous devices adopts a three-level preprocessing mechanism, so that the resource consumption caused by anonymous connection, illegal connection and repeated connection is avoided, and the access capacity and efficiency of processing devices are improved; the high-concurrency data processing adopts dynamic message queue processing, and message queues and processing priorities are dynamically generated according to the access characteristics of the equipment, concurrency and the load balancing capacity of the server, so that system resources are fully utilized; according to a preset equipment data conversion format, the data extraction characteristic quantity of half-pack, sticky-pack and the like is analyzed, the data integrity and the effectiveness of local data are analyzed, and the data conversion rate is improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the structures shown in the drawings without creative efforts.
The invention will be further described with reference to the accompanying drawings and examples, in which:
FIG. 1 is a schematic structural diagram of an agricultural Internet of things big data access system of the invention;
FIG. 2 is a flow chart of an agricultural Internet of things big data access method of the invention;
FIG. 3 is a flow chart of the connection process employed in FIG. 2;
FIG. 4 is a flow chart of the connection cleaning employed in FIG. 2;
fig. 5 is a flow chart of the linkage control employed in fig. 2.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that, if directional indications (such as up, down, left, right, front, and back … …) are involved in the embodiment of the present invention, the directional indications are only used to explain the relative positional relationship between the components, the movement situation, and the like in a specific posture (as shown in the drawing), and if the specific posture is changed, the directional indications are changed accordingly.
In addition, if there is a description of "first", "second", etc. in an embodiment of the present invention, the description of "first", "second", etc. is for descriptive purposes only and is not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In addition, technical solutions between various embodiments may be combined with each other, but must be realized by a person skilled in the art, and when the technical solutions are contradictory or cannot be realized, such a combination should not be considered to exist, and is not within the protection scope of the present invention.
Example one
Fig. 1 is a schematic structural diagram of an agricultural internet of things big data access system according to the present invention, and is shown in fig. 1. As shown in fig. 1, in the agricultural internet of things big data access system provided by the first embodiment of the present invention, at least,
the configuration module is used for configuring group information, a data conversion format set and authentication information and providing parameter initialization for system operation;
the equipment module is connected with the configuration module and used for defining the identification number, the data conversion format and the linkage control mode of the equipment and providing a template for equipment individual identification and information processing;
the connection module is connected with the equipment module and used for providing quick equipment access for mass anonymous or named connection;
the authentication module is respectively connected with the equipment module and the connection module and is used for identifying the system of the equipment, verifying the legality of the access equipment and acquiring the data conversion format of information processing;
the message processing module is connected with the authentication module and is used for adding the received message into a dynamic message queue according to the class characteristics of the message and processing the received data according to the equipment identification number and the data conversion format;
the linkage control module is connected with the authentication module and the message processing module and used for triggering equipment control when the data processed by the message meet the linkage control condition;
the exception handling module is connected with the linkage control module and the message handling module and used for finding that the received data does not conform to a data conversion format in the message handling, extracting protocol extraction characteristic quantity analysis from source data, and performing data splitting, integration or abandonment to improve the resolution of the data;
and the monitoring module is connected with the message processing module.
The configuration module is used for setting the group information, the data format conversion set and the authentication information of the equipment.
The equipment module is connected with the configuration module, selects the preset group information and data format conversion method in the configuration information when defining the equipment, and configures a linkage control mode.
The connection module is connected with the equipment module, and when the equipment is connected, the connection module acquires the connection information of the equipment and acquires the connection information of the equipment, wherein the connection information comprises an IP (Internet protocol) and a port number.
The authentication module is connected with the connection module and the equipment module, judges whether the equipment in the third-level connection queue is legal or not, and acquires equipment information corresponding to the equipment if the equipment is legal, wherein the equipment information comprises group information, a data format conversion method and a linkage control mode.
The message processing module is connected with the linkage control module and the exception handling module, and if the linkage control condition is triggered by the message processing data, the linkage control module is started. And if the data are abnormal, starting abnormal processing.
In the embodiment, hundred thousand-level anonymity and named test is carried out on two common commercial machines (dual cores, single CPU and 8G), and the connection confirmation response time is less than 20 ms;
10 ten thousand connections are made on two common commercial machines (double-core, single CPU, 8G), a data packet is 64Kb, the single data receiving and processing time is less than 8s, and the occupation rate of machine resources is 75% on average.
Through the design of the above embodiment, the invention has the beneficial effects that:
(1) the access of mass anonymous devices adopts a three-level preprocessing mechanism, so that the resource consumption caused by anonymous connection, illegal connection and repeated connection is avoided, and the access capacity and efficiency of processing devices are improved
(2) The high-concurrency data processing adopts dynamic message queue processing, and message queues and processing priorities are dynamically generated according to the access characteristics of the equipment, the concurrency amount and the load balancing capacity of the server, so that system resources are fully utilized.
(3) According to a preset equipment data conversion format, the data extraction characteristic quantity of half-pack, sticky-pack and the like is analyzed, the data integrity and the effectiveness of local data are analyzed, and the data conversion rate is improved.
Example two
Fig. 2 is a flow chart of an agricultural internet of things big data access method of the invention. As shown in fig. 2, the invention also provides an agricultural internet of things big data access method, which comprises the following steps:
s1, configuring group information and data format conversion set of the equipment;
and the definition of a standard general data conversion protocol and a custom data format conversion method of Modbus, MQTT and COAP is supported.
S2, the equipment module distributes an equipment identification number, wherein the equipment identification number is an identification of the equipment in the system and is used for distinguishing different equipment and configuring a linkage control mode;
the equipment module distributes an identification number of the equipment, wherein the identification number is an identification mark of the equipment in the system and is used for distinguishing different equipment, and a linkage control mode is configured, and comprises a linkage control equipment identification number, a period (timing and period), a time point, duration and operation (on, off and stop).
S3, the terminal equipment is communicated with the network and sends a connection request;
s4, the system receives the request information and records the connection information;
the system receives the request information, records the connection information (terminal IP, port, socket object), and enters the connection processing service, as shown in fig. 3, where fig. 3 is a flow chart of the connection processing adopted in fig. 2.
S4, the system receives the request information, and the recording the connection information further includes the steps of:
s41, judging whether the connection is in the authentication connection queue, if so, updating the latest processing time of the connection in the replacement authentication connection queue of the buffer area to be buffered, and transferring the latest processing time to a message processing module;
s42, if not, judging whether the authentication connection queue is in the blacklist queue, if so, rejecting connection, and increasing the frequency by 1;
s43, if not, judging whether the connection queue is in the connection queue to be checked, if so, updating the connection, and increasing the frequency by 1;
s44, if the connection is not in the queue, putting the connection into the queue;
s45, receiving authentication information from the connection to be checked, wherein the authentication information may be attached authentication information during connection or authentication information following anonymous connection, verifying whether the information is legal, and if the information is legal, moving the connection from the connection queue to be checked into an authentication connection queue and updating the latest processing time;
s46, if the verification is illegal, updating the connection, and increasing the frequency by 1;
s47, performing connection cleaning tasks on each connection in the connection queue regularly;
step S47, the periodically performing connection cleaning task for each connection in the connection queue further includes:
s471, verifying and checking whether the connection has no data processing for a long time by the authentication connection queue, and releasing the connection if the connection is overtime, so that system resources are saved;
s472, if the connection queue to be verified receives the authentication information (mark number, user name, secret key, etc.), if the verification rule is satisfied, the connection is moved into the authentication connection queue, and the processing time is updated;
s473, if the connection to be verified is illegal, judging that the connection buffering time is exceeded, and if the connection to be verified is illegal, transferring the connection to a blacklist queue;
s474, if the connection to be verified is illegal, judging that the connection buffering frequency is exceeded, and if the connection buffering frequency is exceeded, transferring the connection to a blacklist queue;
and S475, judging whether the connection exceeds the forbidden time in the blacklist queue, if so, releasing the connection and allowing reconnection.
S5, the authentication module processes the named connection incidental information or the subsequent independent authentication information of anonymous connection, and authenticates whether the connection is legal or not through the equipment identification number, the equipment identity and the secret key, and allows the connection to carry out data communication after the authentication is passed;
s6, acquiring source data from the authentication connection, dynamically generating different types of ActiveMq message queues according to the equipment access characteristics of the messages, the current concurrency and the resource information of the current platform server, and assigning priority levels to each type of message queues;
and acquiring source data from the authentication connection, dynamically generating different types of ActiveMq message queues according to the characteristics (heartbeat, data acquisition, state feedback, instruction issuing, notification and the like) of equipment access of the messages, the current concurrency quantity and the resource information of the current platform server, and assigning a priority level to each type of message queue. For ultra-high concurrency data, in order to avoid data loss, data is stored on a computer storage medium in combination with data serialization.
S7, the consumer takes out the source data with high priority from the queue;
s8, detecting whether the data is complete according to a data format conversion method, if the data feature quantity is not completely extracted, analyzing the half-pack and pack-sticking phenomena, and completing data analysis through unpacking, packing and other processing;
s9, for illegal data, carrying out exception handling and recording illegal data logs;
s10, exception handling adopts a Hystrix method, and interaction between distributed services is controlled by adding delay tolerance and fault tolerance logic;
the exception handling adopts a Hystrix method, interaction among distributed services is controlled by adding delay tolerance and fault-tolerant logic, and the overall elasticity of the system can be improved. Hystrix can ensure that the whole service fails under the condition that one dependency has a problem, and avoid cascading failures.
And S11, judging whether the linkage control is preset, if so, triggering the corresponding linkage control message, adding the linkage control message into a message queue, and executing the linkage control.
Fig. 4 is a flow chart of the connection cleaning employed in fig. 2. As shown in FIG. 4, the buffer queue is verified for validity, and if the buffer queue is legal, the buffer queue is considered as a checked queue. Judging whether the connection of the queue is overtime or not, and if the connection is overtime, releasing the connection; if not, judging whether the buffering time is exceeded, and if not, judging whether the buffering frequency is exceeded. If the buffering frequency is exceeded, the queue is forbidden, then whether the forbidden time is exceeded is judged, and if yes, the connection is released. If the buffering time is exceeded, the queue is prohibited, then whether the prohibiting time is exceeded is judged, and if yes, the connection is released.
Fig. 5 is a flow chart of the linkage control employed in fig. 2. As shown in fig. 5, the method includes receiving a message, maintaining a dynamic message queue, enqueuing the message, performing serialization processing on the message, then taking out source data, verifying data integrity according to a data format conversion method, configuring a linkage control mode to process data analysis, and then performing exception processing and linkage control.
In the embodiment, hundred thousand-level anonymity and named test is carried out on two common commercial machines (dual cores, single CPU and 8G), and the connection confirmation response time is less than 20 ms;
10 ten thousand connections are made on two common commercial machines (double-core, single CPU, 8G), a data packet is 64Kb, the single data receiving and processing time is less than 8s, and the occupation rate of machine resources is 75% on average.
Through the design of the above embodiment, the invention has the beneficial effects that:
(1) the access of mass anonymous devices adopts a three-level preprocessing mechanism, so that the resource consumption caused by anonymous connection, illegal connection and repeated connection is avoided, and the access capacity and efficiency of processing devices are improved
(2) The high-concurrency data processing adopts dynamic message queue processing, and message queues and processing priorities are dynamically generated according to the access characteristics of the equipment, the concurrency amount and the load balancing capacity of the server, so that system resources are fully utilized.
(3) According to a preset equipment data conversion format, the data extraction characteristic quantity of half-pack, sticky-pack and the like is analyzed, the data integrity and the effectiveness of local data are analyzed, and the data conversion rate is improved.
While the invention has been described with reference to specific embodiments, it will be understood by those skilled in the art that various changes may be made and equivalents may be substituted without departing from the scope of the invention. In addition, many modifications may be made to adapt a particular situation to the teachings of the invention without departing from its scope. Therefore, it is intended that the invention not be limited to the particular embodiments disclosed, but that the invention will include all embodiments falling within the scope of the appended claims.

Claims (10)

1. The utility model provides an agricultural thing networking big data access system which characterized in that includes:
a configuration module;
the equipment module is connected with the configuration module;
a connection module connected with the equipment module;
the authentication module is respectively connected with the equipment module and the connection module;
the message processing module is connected with the authentication module;
the linkage control module is connected with the authentication module and the message processing module;
the exception handling module is connected with the linkage control module and the message handling module;
and the monitoring module is connected with the message processing module.
2. The agricultural internet of things big data access system of claim 1, wherein the configuration module is configured to configure group information, a data conversion format set and authentication information, and provide parameter initialization for system operation.
3. The agricultural internet of things big data access system according to claim 1, wherein the equipment module is used for defining an identification number, a data conversion format and a linkage control mode of equipment and providing a template for equipment individual identification and information processing.
4. The agricultural internet of things big data access system of claim 1, wherein the connection module is configured to provide fast device access for mass anonymous or named connections.
5. The agricultural internet of things big data access system according to any one of claims 1 to 4, wherein the authentication module is used for system identification of equipment, verifying the legality of access equipment and acquiring a data conversion format of information processing.
6. The agricultural internet of things big data access system according to any one of claims 1 to 4, wherein the message processing module is used for adding the received messages into a dynamic message queue according to the type characteristics of the messages and processing the received data according to the equipment identification number and the data conversion format.
7. The agricultural internet of things big data access system according to any one of claims 1 to 4, wherein the linkage control module is used for triggering device control when the message processing data meet linkage control conditions.
8. The agricultural internet of things big data access system according to any one of claims 1 to 4, wherein the exception handling module is used for finding that received data does not conform to a data conversion format in message processing, extracting protocol extraction characteristic quantity analysis from source data, and performing data splitting, integration or abandonment to improve the resolution of the data.
9. An agricultural Internet of things big data access method is characterized by comprising the following steps:
s1, configuring group information and data format conversion set of the equipment;
s2, the equipment module distributes an equipment identification number, wherein the equipment identification number is an identification of the equipment in the system and is used for distinguishing different equipment and configuring a linkage control mode;
s3, the terminal equipment is communicated with the network and sends a connection request;
s4, the system receives the request information and records the connection information;
s5, the authentication module processes the named connection incidental information or the subsequent independent authentication information of anonymous connection, and authenticates whether the connection is legal or not through the equipment identification number, the equipment identity and the secret key, and allows the connection to carry out data communication after the authentication is passed;
s6, acquiring source data from the authentication connection, dynamically generating different types of ActiveMq message queues according to the equipment access characteristics of the messages, the current concurrency and the resource information of the current platform server, and assigning priority levels to each type of message queues;
s7, the consumer takes out the source data with high priority from the queue;
s8, detecting whether the data is complete according to a data format conversion method, if the data feature quantity is not completely extracted, analyzing the half-pack and pack-sticking phenomena, and completing data analysis through unpacking, packing and other processing;
and S9, carrying out exception processing on the illegal data, and recording an illegal data log.
10. The agricultural internet of things big data access method according to claim 1, further comprising, after the step S10:
and S11, judging whether the linkage control is preset, if so, triggering the corresponding linkage control message, adding the linkage control message into a message queue, and executing the linkage control.
CN202011622462.9A 2020-12-31 2020-12-31 Agricultural Internet of things big data access system and method Withdrawn CN112822245A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011622462.9A CN112822245A (en) 2020-12-31 2020-12-31 Agricultural Internet of things big data access system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011622462.9A CN112822245A (en) 2020-12-31 2020-12-31 Agricultural Internet of things big data access system and method

Publications (1)

Publication Number Publication Date
CN112822245A true CN112822245A (en) 2021-05-18

Family

ID=75854627

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011622462.9A Withdrawn CN112822245A (en) 2020-12-31 2020-12-31 Agricultural Internet of things big data access system and method

Country Status (1)

Country Link
CN (1) CN112822245A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023139426A1 (en) * 2022-01-19 2023-07-27 The Gsi Group Llc Hardware agnostic systems for converting source signals of agricultural equipment to structured signals for communication over computer networks
CN117240903A (en) * 2023-10-17 2023-12-15 苏州庚商教育智能科技有限公司 Internet of things offline message dynamic management configuration system

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023139426A1 (en) * 2022-01-19 2023-07-27 The Gsi Group Llc Hardware agnostic systems for converting source signals of agricultural equipment to structured signals for communication over computer networks
CN117240903A (en) * 2023-10-17 2023-12-15 苏州庚商教育智能科技有限公司 Internet of things offline message dynamic management configuration system
CN117240903B (en) * 2023-10-17 2024-02-23 苏州庚商教育智能科技有限公司 Internet of things offline message dynamic management configuration system

Similar Documents

Publication Publication Date Title
CN110661820B (en) Internet of things data processing method and device, equipment and storage medium
CN101159005A (en) Method and system to adaptively manage the quality of service of interactions between smart item networks and enterprise applications
CN110688280B (en) Management system, method, equipment and storage medium for alarm event
CN112822245A (en) Agricultural Internet of things big data access system and method
CN110659109B (en) System and method for monitoring openstack virtual machine
CN110943884B (en) Data processing method and device
US20070016960A1 (en) NTO input validation technique
CN111770162B (en) Network bandwidth limiting method, device, master node and storage medium
CN111355622A (en) Container traffic monitoring method, system and computer readable storage medium
CN111913818A (en) Method for determining dependency relationship between services and related device
CN109460307A (en) Micro services a little, which are buried, based on log calls tracking and its system
KR20070044200A (en) Software architecture for ubiquitous sensor network and method of event request and response performing in the software architecture
CN106130897B (en) Performance optimization method based on Router Simulation
CN109902028A (en) Automated testing method, device, equipment and the storage medium of ACL characteristic
CN111198804A (en) Gateway-based industrial internet platform third-party micro-service monitoring and early warning method
CN112035303A (en) Data testing method and device, computer and readable storage medium
CN110445824A (en) NB-IoT data reporting method, device, system and computer readable storage medium
CN111984505A (en) Operation and maintenance data acquisition engine and acquisition method
US10044838B2 (en) Method of automatically setting protocol in programmable logic controller system
CN107104956A (en) A kind of remote sensing distribution method and system based on user's relative importance value
CN110109807A (en) A kind of early warning maintenance system of blank pipe important equipment
CN103944779B (en) A kind of WAP service features monitoring method and system
US20060095518A1 (en) Software application for modular sensor network node
CN117675653A (en) Link detection method, device, equipment and medium
CN110198246A (en) A kind of method and system of traffic monitoring

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20210518

WW01 Invention patent application withdrawn after publication