CN115499318B - Tunnel monitoring data communication management and control method, system and terminal equipment - Google Patents

Tunnel monitoring data communication management and control method, system and terminal equipment Download PDF

Info

Publication number
CN115499318B
CN115499318B CN202211442846.1A CN202211442846A CN115499318B CN 115499318 B CN115499318 B CN 115499318B CN 202211442846 A CN202211442846 A CN 202211442846A CN 115499318 B CN115499318 B CN 115499318B
Authority
CN
China
Prior art keywords
data
monitoring
preset
communication
tunnel
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211442846.1A
Other languages
Chinese (zh)
Other versions
CN115499318A (en
Inventor
易明伟
陈小华
陈月高
杨成远
钱晓悦
沈杰
单江波
马怿潇
单永平
曾高峰
章国荣
彭祝华
孙晓军
万勇
刘向书
浦振豪
彭泽铭
徐岗财
徐国华
阮贝
章涛
曾智力
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan Zhili Engineering Science And Technology Co ltd
Zhejiang Jining Expressway Co.,Ltd.
Original Assignee
Hunan Zhili Engineering Science And Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hunan Zhili Engineering Science And Technology Co ltd filed Critical Hunan Zhili Engineering Science And Technology Co ltd
Priority to CN202211442846.1A priority Critical patent/CN115499318B/en
Publication of CN115499318A publication Critical patent/CN115499318A/en
Application granted granted Critical
Publication of CN115499318B publication Critical patent/CN115499318B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0823Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability
    • H04L41/083Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability for increasing network speed
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0852Delays
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q9/00Arrangements in telecontrol or telemetry systems for selectively calling a substation from a main station, in which substation desired apparatus is selected for applying a control signal thereto or for obtaining measured values therefrom

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Environmental & Geological Engineering (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The present application relates to the field of data communications, and in particular, to a method, a system, and a terminal device for managing and controlling tunnel monitoring data communications. The method comprises the following steps: acquiring response time of communication data; judging whether the response time is within a preset response threshold interval or not; if the response time is within a preset response threshold interval, acquiring corresponding data traffic, processing the data traffic according to a preset rectification rule, and generating corresponding target transmission data; if the response time is greater than a preset response threshold interval, acquiring corresponding monitoring data; reading the monitoring data and generating corresponding data integrity; judging whether the integrity of the data meets a preset test standard or not; if the data integrity does not meet the preset testing standards, adjusting an uploading strategy corresponding to the monitoring data, and generating a corresponding data control scheme; and performing communication control on the monitoring data according to the data control scheme. The method and the system for managing and controlling the tunnel monitoring data communication have the effect of improving the communication effect of the monitoring data in the tunnel.

Description

Tunnel monitoring data communication management and control method, system and terminal equipment
Technical Field
The present application relates to the field of data communications, and in particular, to a method, a system, and a terminal device for managing and controlling tunnel monitoring data communications.
Background
The tunnel monitoring mainly refers to monitoring of tunnel surrounding rocks and lining technical conditions by using various instruments and instruments in the construction process so as to ensure the safety of tunnel construction and provide related monitoring data for follow-up to guide construction.
The tunnel construction and operation method has the advantages that sudden accidents caused by unfavorable geological disasters become a potential safety hazard in the engineering field, and great economic loss and severe social influence are caused, so that the tunnel needs to be monitored and measured in real time, stress states and stress distribution of a tunnel supporting structure under different working conditions are known, and dynamic conditions and stability conditions of surrounding rocks and the structure are mastered. In a conventional monitoring method, various instruments and instruments generally acquire monitoring data corresponding to a tunnel in real time, and then transmit the acquired monitoring data to a monitoring terminal for analysis and calculation, so as to grasp the relevant safety conditions of the tunnel.
In the transmission process of monitoring data communication, conditions such as communication interruption or communication delay are inevitably caused due to some burst factors, so that the monitoring terminal cannot timely and completely acquire corresponding monitoring data of the tunnel, and therefore workers cannot accurately know related safety conditions in the tunnel, and the communication effect is poor.
Disclosure of Invention
In order to improve the communication effect of the monitoring data in the tunnel, the application provides a method and a system for managing and controlling the communication of the monitoring data in the tunnel.
In a first aspect, the present application provides a method for managing and controlling tunnel monitoring data communication, including the following steps:
acquiring response time of communication data;
judging whether the response time is within a preset response threshold interval or not;
if the response time is within the preset response threshold interval, acquiring corresponding data traffic, and processing the data traffic according to a preset rectification rule to generate corresponding target transmission data;
if the response time is larger than the preset response threshold interval, acquiring corresponding monitoring data;
reading the monitoring data and generating corresponding data integrity;
judging whether the data integrity meets a preset test standard or not;
if the data integrity does not meet the preset testing standard, adjusting an uploading strategy corresponding to the monitoring data, and generating a corresponding data management and control scheme;
and performing communication control on the monitoring data according to the data control scheme.
By adopting the technical scheme, whether the response time of the communication data is within the corresponding preset response threshold interval or not is judged, so that the communication network corresponding to the communication data is in a delay state or a fault state conveniently, wherein the corresponding data flow in the network delay state is adjusted according to the preset rectification rule, and the corresponding target transmission data is generated, so that the communication speed of the communication data is improved, when the network fault occurs, the corresponding uploading strategy of the monitoring data in the communication network is adjusted, a data management and control scheme for improving the integrity of the corresponding data of the monitoring data is conveniently generated, the communication management and control is implemented on the monitoring data through the data management and control scheme, so that the integrity of the relevant monitoring data of the monitoring data in the communication network fault is ensured, and the communication effect of the monitoring data in the tunnel is improved.
Optionally, if the response time is within the preset response threshold interval, acquiring corresponding data traffic, and processing the data traffic according to a preset rectification rule to generate corresponding target transmission data includes the following steps:
if the response time is within the preset response threshold interval, judging whether the data flow exceeds a preset network bearing threshold;
if the data traffic is at the preset network bearing threshold, acquiring a data packet corresponding to the data traffic;
analyzing the data packet to generate corresponding monitoring characteristic data;
judging whether redundant data corresponding to the monitoring feature data exist in the data packet or not;
and if the redundant data corresponding to the monitoring feature data exists in the data packet, rejecting the redundant data.
By adopting the technical scheme, whether the corresponding redundant data exists in the monitoring characteristic data in the data packet or not is judged within the range of the network bearing threshold value, so that the redundant data corresponding to the monitoring characteristic data can be removed conveniently under the network delay, and the communication efficiency corresponding to the monitoring data is improved.
Optionally, if the redundant data corresponding to the monitoring feature data exists in the data packet, the method further includes the following steps after the redundant data is removed:
if the redundant data corresponding to the monitoring characteristic data exists, acquiring a monitoring safety value corresponding to the redundant data;
judging whether the monitoring safety value is smaller than a preset data safety threshold value or not;
if the monitoring safety value is smaller than the preset data safety threshold value, the redundant data is classified into a data blacklist;
and limiting the flow of the redundant data in the data blacklist according to a preset flow control rule.
By adopting the technical scheme, the redundant data of which the monitoring safety value is not in accordance with the preset data safety threshold value is included in the data blacklist, so that the redundant data can be conveniently limited in batches, and the communication efficiency of the monitoring data is improved.
Optionally, after analyzing the data packet and generating corresponding monitoring feature data, the method further includes the following steps:
identifying the monitoring characteristic data to generate corresponding characteristic identification parameters;
setting a feature matching grade corresponding to the feature identification parameter according to a preset feature matching rule;
and comparing the feature matching grades according to a preset selection rule, and selecting the monitoring feature data corresponding to the highest feature matching grade as target feature data.
By adopting the technical scheme, the monitoring characteristic data corresponding to the highest characteristic matching level is obtained as the target characteristic data, so that the analysis and the processing of relevant important data in the monitoring data are preferentially carried out.
Optionally, after comparing the feature matching levels according to a preset selection rule and selecting the monitoring feature data corresponding to the highest feature matching level as target feature data, the method further includes the following steps:
acquiring a data risk value corresponding to the target characteristic data;
judging whether the data risk value exceeds a preset risk threshold value or not;
if the data risk value exceeds the preset risk threshold value, setting a corresponding risk grade according to the data risk value corresponding to the target characteristic data;
and according to the risk level, matching a corresponding encryption mode to encrypt the target characteristic data.
By adopting the technical scheme, the corresponding encryption mode is matched for encryption according to the risk level corresponding to the target characteristic data, so that the occurrence of important data loss caused by communication network delay is reduced.
Optionally, if the response time is greater than the preset response threshold interval, acquiring corresponding monitoring data includes the following steps:
if the response time is larger than the preset response threshold interval, acquiring a data emergency measure corresponding to the communication data;
calibrating the data security level corresponding to the communication data according to the data emergency measure;
and selecting the communication data with the highest data security level as the monitoring data according to a priority acquisition rule.
By adopting the technical scheme, when the communication network fails, the integrity of relevant important data in the monitoring data is ensured by preferentially acquiring the communication data with the highest data security level.
Optionally, if the data integrity does not meet the preset test standard, adjusting the uploading policy corresponding to the monitoring data, and generating a corresponding data management and control scheme includes the following steps:
if the data integrity does not meet the preset measurement standard, acquiring a data interference factor corresponding to the monitoring data;
acquiring a corresponding target interference item according to the interference type of the data interference factor;
and adjusting an uploading strategy corresponding to the monitoring data according to the target interference item, and generating a corresponding data management and control scheme.
By adopting the technical scheme, when the communication network fails, the corresponding target interference item is obtained according to the data interference factor actually corresponding to the interference factor to adjust the uploading strategy corresponding to the monitoring data, so that the loss of the actually measured data is reduced to the greatest extent.
Optionally, if the response time is greater than the preset response threshold interval, the obtaining of the corresponding monitoring data includes the following steps:
if the response time is larger than the preset response threshold interval, acquiring a corresponding data processing functional module;
judging whether the data processing function corresponding to the data processing function module meets a preset function standard or not;
if the data processing function corresponding to the data processing function module does not accord with the preset function standard, acquiring a corresponding target fault item;
and setting the fault grade corresponding to the data processing functional module as the monitoring data according to the fault type of the target fault item.
By adopting the technical scheme, the corresponding fault grade is set according to the type of the target fault item specifically appearing in the data processing functional module, so that the communication fault can be conveniently identified by the staff and the subsequent fault repairing work can be conveniently carried out.
In a second aspect, the present application provides a system for managing tunnel monitoring data communication, including:
the first acquisition module is used for acquiring the response time of the communication data;
the first judging module is used for judging whether the response time is within a preset response threshold interval or not;
the processing module is used for acquiring corresponding data traffic and processing the data traffic according to a preset rectification rule to generate corresponding target transmission data if the response time is within the preset response threshold interval;
the second acquisition module is used for acquiring corresponding monitoring data if the response time is greater than the preset response threshold interval;
the reading module is used for reading the monitoring data and generating corresponding data integrity;
the second judgment module is used for judging whether the data integrity meets a preset test standard;
the adjusting module is used for adjusting an uploading strategy corresponding to the monitoring data and generating a corresponding data management and control scheme if the data integrity does not meet the preset measurement standard;
and the management and control module is used for performing communication management and control on the monitoring data according to the data management and control scheme.
By adopting the technical scheme, whether the response time of the communication data acquired by the first acquisition module is within the corresponding preset response threshold interval is judged according to the first judgment module, so that the communication network corresponding to the communication data is in a delay state or a fault state is conveniently known, wherein the processing module is used for processing the corresponding data flow in the network delay state according to the preset rectification rule to generate corresponding target transmission data so as to improve the communication speed of the communication data, when a network fault occurs, the reading module is used for reading the uploaded monitoring data acquired by the second acquisition module to generate the data integrity corresponding to the monitoring data, the adjusting module is further used for adjusting the uploading strategy corresponding to the monitoring data which does not accord with the preset corresponding measurement standard, so that a data control scheme for improving the data integrity corresponding to the monitoring data is conveniently generated, the management and control module is combined for implementing communication management and control on the monitoring data according to the data management and control scheme so as to ensure the integrity of the monitoring data when the communication network fault occurs, and thus the communication effect of the monitoring data in the tunnel is improved.
In a third aspect, the present application provides a terminal device, which adopts the following technical solution:
the terminal equipment comprises a memory and a processor, wherein computer instructions capable of running on the processor are stored in the memory, and when the processor loads and executes the computer instructions, the tunnel monitoring data communication management and control method is adopted.
By adopting the technical scheme, the tunnel monitoring data communication management and control method generates computer instructions and stores the computer instructions in the memory so as to be loaded and executed by the processor, so that the terminal equipment is manufactured according to the memory and the processor, and the tunnel monitoring data communication management and control method is convenient to use.
To sum up, the application comprises the following beneficial technical effects: judging whether the response time of the communication data is in a corresponding preset response threshold interval or not, so as to conveniently know whether the communication network corresponding to the communication data is in a delay state or a fault state, wherein the corresponding data traffic in the network delay state is processed according to a preset rectification rule to generate corresponding target transmission data, so as to improve the communication speed of the communication data, when the network fault occurs, the monitoring data is divided by reading the collected and uploaded monitoring data and acquiring the corresponding data integrity, so as to conveniently perform cache recording on the actually measured data of the monitoring data and the data missing item specifically corresponding to the missed measurement data, so as to ensure the integrity of the monitoring data, rectify the data according to the actual condition of the data traffic under the network delay condition to improve the communication speed of the data, and respectively perform cache calibration on the collected and uploaded monitoring data by subdividing data types under the network fault condition, so as to improve the communication effect of the monitoring data in the tunnel.
Drawings
Fig. 1 is a schematic flowchart illustrating steps S101 to S108 in a method for managing and controlling tunnel monitoring data communication according to the present application.
Fig. 2 is a schematic flowchart illustrating steps S201 to S206 in a method for managing and controlling tunnel monitoring data communication according to the present application.
Fig. 3 is a schematic flowchart illustrating steps S301 to S304 in a method for managing and controlling tunnel monitoring data communication according to the present application.
Fig. 4 is a schematic flowchart illustrating steps S401 to S403 in a method for managing and controlling tunnel monitoring data communication according to the present application.
Fig. 5 is a schematic flowchart illustrating steps S501 to S504 in a method for managing and controlling tunnel monitoring data communication according to the present application.
Fig. 6 is a schematic flowchart of steps S601 to S603 in the method for managing and controlling tunnel monitoring data communication according to the present application.
Fig. 7 is a schematic flowchart of steps S701 to S703 in the method for managing and controlling tunnel monitoring data communication according to the present application.
Fig. 8 is a schematic flowchart illustrating steps S801 to S804 in a method for managing and controlling tunnel monitoring data communication according to the present application.
Fig. 9 is a schematic block diagram of a system for managing tunnel monitoring data communication provided in the present application.
Description of the reference numerals:
1. a first acquisition module; 2. a first judgment module; 3. a processing module; 4. a second acquisition module; 5. a reading module; 6. a second judgment module; 7. an adjustment module; 8. and a management and control module.
Detailed Description
The present application is described in further detail below with reference to figures 1-8.
The embodiment of the application discloses a tunnel monitoring data communication management and control method, as shown in fig. 1, comprising the following steps:
s101, acquiring response time of communication data;
s102, judging whether the response time is in a preset response threshold interval or not;
s103, if the response time is within a preset response threshold value interval, acquiring corresponding data traffic, and processing the data traffic according to a preset rectification rule to generate corresponding target transmission data;
s104, if the response time is larger than a preset response threshold interval, acquiring corresponding monitoring data;
s105, reading the monitoring data and generating corresponding data integrity;
s106, judging whether the integrity of the data meets a preset test standard;
s107, if the integrity of the data does not meet the preset testing standards, adjusting an uploading strategy corresponding to the monitoring data, and generating a corresponding data management and control scheme;
and S108, carrying out communication control on the monitoring data according to the data control scheme.
The communication data in step S101 refers to data that needs to be communicated in the tunnel monitoring process, and the response time refers to the communication transmission time of the communication data.
In practical applications, the response time is a concept of a plurality of fields such as a computer, a display and the like, and means the response time of a sensor when a change of a step value occurs from no load to load on a network.
In a computer network, the response time of communication data is also affected by delay, which refers to the time required for a data block (frame, packet segment, etc.) to be transmitted from one end of a link or network to the other, including transmission delay and propagation delay.
A transmission delay, which is a time required for a node to switch a data block from the node to a transmission medium when the node transmits data, i.e., a time taken for a last bit to be transmitted from a first bit of the data block to be transmitted, and a calculation formula of the transmission delay is as follows: transmission delay = data block length/information transmission rate.
Propagation delay, which is the time required for an electromagnetic wave signal to propagate on a transmission channel with a certain length, i.e. the time that the signal propagates from one end of the channel to the other end, and the calculation formula of the propagation delay is as follows: propagation delay = transmission channel length/electromagnetic wave signal propagation rate.
The preset response threshold interval from step S102 to step S104 refers to a preset response time interval when the communication network is in a delay state, the data traffic refers to traffic that the current communication data needs to be transmitted, the preset rectification rule refers to a rule for performing arrangement control on data traffic corresponding to the communication data preset when the communication network is in the delay state, the target transmission data refers to tunnel monitoring data transmitted to the monitoring terminal, and the monitoring data refers to related tunnel monitoring data that the system preferentially acquires from the communication data when the communication network is in a fault.
The tunnel monitoring data in the target transmission data comprise observation data inside and outside a tunnel hole, tunnel vault settlement measurement data, tunnel surface settlement monitoring data and tunnel peripheral displacement measurement data.
The method comprises the steps of observing data inside and outside a tunnel, observing and collecting working face states, surrounding rock deformation and surrounding rock weathering conditions after tunnel excavation is completed every time, analyzing integrity and stability of the tunnel, judging whether the tunnel is consistent with design, observing whether cracks and peeling exist after surrounding rock is primarily sprayed with concrete, observing whether the earth surface swells or not, and analyzing whether tunnel excavation and supporting methods are reliable or not by judging whether the tunnel excavation affects the outside of the tunnel or not, wherein related data information can be subjected to picture capture through a related shooting instrument, and related picture data are further transmitted to a monitoring terminal.
The method comprises the steps of measuring tunnel vault settlement data, namely measuring a descending displacement value of a tunnel vault, observing vault settlement, firstly searching a reference point, punching the vault, burying an embedded part, hanging a convergence ruler, selecting a standard elevation section point as a reference point, vertically placing a steel ruler on the standard elevation point, placing a level gauge between the reference point and the standard elevation point, measuring and calculating the elevation of the vault by using the level gauge, obtaining vault settlement value as the height difference measured in two intervals, archiving the obtained data after measurement and drawing a curve graph of the vault settlement value along with time change so as to facilitate summary analysis, wherein the measured data can be transmitted to a monitoring control end through an intelligent data acquisition terminal, and obtaining the corresponding curve graph of the vault settlement value along with time change through analysis and calculation of the monitoring control end.
In general, in a tunnel excavation stage, since a covering layer at an entrance is thin and stability is poor after arching, surface subsidence is likely to occur, and at this time, if a construction method is not suitable, collapse or harmful surface subsidence is likely to be brought, thereby threatening tunnel construction safety. The purpose of the ground surface settlement monitoring measurement is to measure the ground surface settlement displacement, summarize the law of the ground surface settlement, set a monitoring reference point for the ground surface settlement monitoring, use a high-precision total station for monitoring, and further transmit the obtained ground surface settlement measurement data to a monitoring terminal.
In practical application, the response time reflects the processing capacity of the communication system to the request at the current moment, and is one of the key indexes for representing the operation state of the communication system, under the condition that the system normally operates, the change of the response time should be shown as fluctuation up and down in a small range near a certain fixed data, once the index of the response time is greatly increased, the communication system is likely to have a fault, so that the index of the response time needs to be monitored, abnormal conditions can be found in time, and a series of losses caused by the fault can be reduced.
It should be noted that the communication network delay refers to the time used for transmission in the transmission medium, which is related to the tcp/ip protocol, which is also called transmission control protocol/internet protocol, and refers to a protocol cluster capable of implementing information transmission among a plurality of different networks, various data are transmitted in the network medium through the network protocol (such as tcp/ip protocol), if the amount of information is too large and not limited, the excessive data traffic will cause slow response of the device, causing network delay, and the time used for transmission in the transmission medium, i.e. the time from the beginning of a message entering the network to the beginning of its leaving the network.
For example, the preset response threshold interval corresponding to the communication data is 10ms to 20ms, when the response time of the communication data is less than 10ms, it indicates that the communication network is in a normal unobstructed state, when the response time of the communication data is 10ms to 20ms (also including equal to 10ms and 20 ms), it indicates that the communication network is in a delayed state, and when the response time of the communication data is greater than 20ms, it indicates that the communication network is in a fault.
For another example, the preset rectification rule may be a preset or temporarily set finishing control rule for the data traffic corresponding to the communication data when the network state is in the delay state, the response time of the communication data obtained through correlation detection is 15ms, it can be determined that the network state is in the delay state at this time, the corresponding data traffic in the communication data is further obtained, the current network bandwidth is queried according to the data traffic detected by the preset rectification rule, it is known through determination that the data traffic at this time has exceeded the maximum transmission capability of the network bandwidth, and the data amount corresponding to the data traffic is further adjusted according to the actual size of the data traffic, so as to reduce the delay caused by the data traffic congestion.
For another example, the response time of the communication data obtained through the correlation detection is 22ms, it can be determined that the network state is in a fault state at this time, and the monitoring data in the communication data further includes tunnel vault settlement measurement data and tunnel ground surface settlement monitoring data, where the tunnel vault settlement measurement data and the tunnel ground surface settlement monitoring data are important tunnel monitoring data in the communication data.
Moreover, the response time of the communication data obtained through the correlation detection is 8ms, the network state can be judged to be in a normal and unobstructed state at the moment, and the system does not perform any processing at the moment.
The data integrity in the steps S104 to S107 refers to the data integrity of the actually acquired and uploaded monitoring data, the preset measurement standard refers to a preset acquisition standard of the data integrity corresponding to the monitoring data, the uploading policy refers to the uploading data amount, the uploading rate or the uploading interval of the monitoring data corresponding to the data acquisition device, and the data management and control scheme refers to a data management and control scheme after the uploading policy corresponding to the monitoring data is adjusted.
In actual application, when a communication system breaks down, due to chain reaction of related systems, the acquisition equipment can also work abnormally, the integrity of the monitoring data acquired by the acquisition equipment when the monitoring data is abnormal is analyzed at the moment, the integrity of the monitoring data acquired by the acquisition equipment when the monitoring data is abnormal is obtained, and the uploading strategy of the corresponding data acquisition equipment of the monitoring data to the data is further adjusted, so that the uploading adjustment of the monitoring data is facilitated when the communication system breaks down, and the data integrity of the monitoring data can be protected to the maximum extent.
For example, the data acquisition standard corresponding to the tunnel internal and external observation data obtained according to the preset measurement standard includes working face state data, surrounding rock deformation data and surrounding rock weathering data, the acquired tunnel internal and external observation data includes the working face state data, the surrounding rock deformation data and the surrounding rock weathering data at the same time, and then the corresponding data integrity is 100%.
When the communication network is in a fault state, acquiring corresponding monitoring data, namely tunnel internal and external observation data, wherein the tunnel internal and external observation data comprise working surface state data, calculating the data integrity corresponding to the tunnel internal and external observation data to be 33%, and judging that the tunnel internal and external observation data do not accord with corresponding preset stress measurement standards.
And further, the judgment result of the communication system is adaptively adjusted, certain setting and coordination are carried out on equipment accessed to the communication system, and an uploading strategy corresponding to the monitoring data is adjusted, wherein the uploading strategy refers to the uploading data volume, uploading rate or uploading interval of the monitoring data by the communication system, especially equipment with large data volume, such as video and the like, can be adjusted in frame rate, resolution and the like, the transmission of important monitoring data and the integrity of the whole data are ensured, the important monitoring data are controlled in a certain range, and a corresponding data management and control scheme is further generated.
For another example, when the communication network is in a fault state, the corresponding monitoring data, that is, the inside and outside observation data of the tunnel is obtained, the inside and outside observation data of the tunnel includes working face state data, surrounding rock deformation data, and surrounding rock weathering data, then the integrity of the data corresponding to the inside and outside observation data of the tunnel can be calculated to be 100%, it can be determined that the inside and outside observation data of the tunnel meets the corresponding preset measurement standards, and the system calibrates the inside and outside observation data of the tunnel to be the completion of the collection.
In step 108, the data management and control scheme includes a management and control scheme formed after the current monitoring data uploading policy is adjusted when the communication network fails, and the data management and control scheme may be to adjust an upper limit of a network bandwidth to increase an uploading data amount of the related monitoring data when the communication network fails.
For example, when the communication network is in a fault state, acquiring corresponding monitoring data, that is, tunnel internal and external observation data, wherein the tunnel internal and external observation data includes working surface state data, calculating that the data integrity corresponding to the tunnel internal and external observation data is 33%, determining that the tunnel internal and external observation data does not meet corresponding preset measurement standards, further adjusting a collection uploading strategy corresponding to the tunnel internal and external observation data, and further increasing the collection uploading data volume of surrounding rock deformation data and surrounding rock weathering data.
The method for managing and controlling communication of tunnel monitoring data according to this embodiment determines whether the response time of the communication data is within a corresponding preset response threshold interval, so as to know whether the communication network corresponding to the communication data is in a delayed state or a failure state, wherein the corresponding data traffic in the network delayed state is adjusted according to a preset rectification rule, so as to generate corresponding target transmission data, so as to improve the communication speed of the communication data, when a network failure occurs, a data management and control scheme for improving the integrity of the corresponding data of the monitoring data is generated by adjusting a corresponding uploading policy of the monitoring data in the communication network, and the data management and control scheme implements communication management and control on the monitoring data, so as to ensure the integrity of the relevant monitoring data of the monitoring data when the communication network fails, thereby improving the communication effect of the monitoring data in the tunnel.
In one implementation manner of this embodiment, as shown in fig. 2, step S103 is to acquire a corresponding data traffic if the response time is within a preset response threshold interval, and process the data traffic according to a preset rectification rule to generate corresponding target transmission data, and includes the following steps:
s201, if the response time is within a preset response threshold interval, judging whether the data flow exceeds a preset network bearing threshold;
s202, if the data flow is at a preset network bearing threshold value, acquiring a data packet corresponding to the data flow;
s203, analyzing the data packet to generate corresponding monitoring characteristic data;
s204, judging whether corresponding redundant data exist in the monitoring characteristic data according to a preset characteristic standard;
s205, judging whether redundant data corresponding to the monitoring feature data exist or not;
s206, if the redundant data corresponding to the monitoring characteristic data exist, the redundant data are removed.
The preset network bearing threshold from step S201 to step S202 is the bearing capacity of the current communication network for data transmission, the data packet is a data packet containing the data information of the monitoring data related to the tunnel monitoring image, and the monitoring characteristic information is the tunnel characteristic data generated by identifying the data information of the tunnel monitoring image.
In practical applications, the preset network bearer threshold corresponds to the transmission efficiency of the current communication network broadband, and when the network bandwidth is detected to be insufficient, the data volume of the data traffic can be adjusted to prevent delay caused by congestion, wherein the adjustment of the data traffic can be performed by selectively limiting the data contained in the data packet corresponding to the data traffic.
For example, when the data traffic corresponding to the preset network bearer threshold is 1000 million, that is, when the data traffic exceeds 1000 million, the transmission phase rate of the network broadband may decrease. Knowing that the data traffic required to be transmitted currently is 800 megabytes, if it can be determined that the data traffic is at the corresponding preset network bearing threshold, a data packet corresponding to the data traffic is further acquired, where the data packet is a data unit in TCP/IP protocol communication transmission.
For another example, when the data traffic required to be transmitted currently is 1200 megabits, it can be determined that the data traffic exceeds the corresponding preset network bearer threshold, and the system outputs corresponding prompt information according to the data traffic value of the data traffic.
The data packet in step S203 refers to a set of data blocks of the tunnel surveillance video or image, and the surveillance feature data refers to feature data in the tunnel surveillance video or image.
In the actual application, the data package is packed and stored the surrounding rock deformation image in the observation data inside and outside the tunnel cave, and the monitoring characteristic data that the observation data corresponds inside and outside the tunnel cave can be surrounding rock surface crack quantity in the surrounding rock deformation image, wherein the monitoring characteristic data can be acquired through relevant camera equipment.
For example, analyzing the data packet, obtaining a surrounding rock deformation image in the observation data inside and outside the tunnel, and obtaining 2 positions of the number of the surrounding rock surface cracks by identifying monitoring characteristic data corresponding to the surrounding rock deformation image.
The redundant data in steps S204 to S205 refers to the repeated data corresponding to the monitoring characteristic data.
In actual application, if the monitoring characteristic data is the number of the surrounding rock surface cracks, the purpose of monitoring the number of the surrounding rock surface cracks is to prevent the risk of tunnel collapse caused by the increase of the number of the cracks, and the redundant data corresponding to the number of the surrounding rock surface cracks only causes the transmission burden of a communication network, possibly causing more serious communication delay.
Moreover, if the data packet does not have redundant data corresponding to the monitoring characteristic data, the system does not take any action.
According to the tunnel monitoring data communication management and control method provided by the embodiment, whether corresponding redundant data exists in the monitoring characteristic data in the data packet or not is judged within the range of the network bearing threshold value, so that the redundant data corresponding to the monitoring characteristic data can be removed conveniently under the network delay, and the communication efficiency corresponding to the monitoring data is improved.
In one implementation manner of this embodiment, as shown in fig. 3, in step S205, if there is redundant data corresponding to the monitored feature data in the data packet, after removing the redundant data, the method further includes the following steps:
s301, if redundant data corresponding to the monitoring characteristic data exist, a monitoring safety value corresponding to the redundant data is obtained;
s302, judging whether the monitoring safety value is smaller than a preset data safety threshold value or not;
s303, if the monitoring safety value is smaller than a preset data safety threshold value, the redundant data is classified into a data blacklist;
s304, flow limiting is carried out on the redundant data in the data blacklist according to a preset flow control rule.
The monitoring safety value in step S301 is a safety requirement level value of the redundant data corresponding to the monitoring characteristic data.
In practical applications, since the redundant data can support the recovery of the corresponding monitoring feature data, when some relatively important monitoring feature data are damaged, the safety requirement level value corresponding to the redundant data corresponding to the monitoring feature data will be high.
For example, when hardware of the tunnel communication device fails, corresponding important monitoring characteristic data can be lost, and the monitoring characteristic data can be recovered through redundant data related to the monitoring characteristic data.
The preset data security threshold in steps S302 to S303 refers to a security value corresponding to preset monitoring feature data, and the data blacklist refers to a list of redundant data smaller than the preset data security threshold.
In practical application, the safety value of certain type of monitoring characteristic data in the tunnel monitoring data can be known through the preset data safety threshold, the higher the safety value is, the more important the corresponding monitoring characteristic data is, that is, the monitoring characteristic data has the capability of correspondingly recovering the monitoring characteristic data when being damaged or damaged, and some monitoring characteristic data systems which are possible or impossible relative to the tunnel safety generally do not have the requirement of relevant safety recovery.
For example, the monitoring characteristic data is surrounding rock concrete stripping data in observation data inside and outside the tunnel, whether concrete cracks and stripping conditions exist after the surrounding rock is subjected to primary concrete spraying can be obtained according to the surrounding rock concrete stripping data, the monitoring safety value of redundant data corresponding to the surrounding rock concrete stripping data is 1, the preset data safety threshold value corresponding to the surrounding rock concrete stripping data can be obtained according to the surrounding rock concrete stripping data, the threshold value corresponding to the surrounding rock concrete stripping data is 3, it can be judged that the monitoring safety value is smaller than the preset data safety threshold value of the surrounding rock concrete stripping data, and the redundant data is classified into a data blacklist.
For another example, if the monitoring safety value of the redundant data corresponding to the surrounding rock concrete peeling data is 4, it can be determined that the monitoring safety value is greater than the preset data safety threshold of the surrounding rock concrete peeling data, and the redundant data is classified into a data white list, where the data white list is a set of redundant data greater than the preset data safety threshold corresponding to the surrounding rock concrete peeling data.
The preset flow control rule in step S304 refers to a rule for performing flow control on redundant data recorded in the data blacklist.
For example, the communication transmission rate of the normal data traffic is 100 million per second, and the communication transmission rate of the redundant data in the data blacklist can be controlled to be less than 10 million per second according to the preset flow control rule, so that the effect of limiting the flow is achieved.
According to the tunnel monitoring data communication management and control method, the redundant data with the monitoring safety value not conforming to the preset data safety threshold value are included in the data blacklist, so that the redundant data can be conveniently limited in batch, and the communication efficiency of the monitoring data is improved.
In one implementation manner of this embodiment, as shown in fig. 4, after parsing the data packet and generating corresponding monitoring feature data in step S203, the method further includes the following steps:
s401, identifying monitoring characteristic data and generating corresponding characteristic identification parameters;
s402, setting a feature matching grade corresponding to the feature identification parameter according to a preset feature matching rule;
and S403, comparing the feature matching grades according to a preset selection rule, and selecting the monitoring feature data corresponding to the highest feature matching grade as target feature data.
The feature identification parameters in step S401 refer to the number of tunnel monitoring features in the monitoring feature data, and the tunnel monitoring features refer to hidden dangers that the tunnel needs to be monitored.
For example, if the monitored characteristic data is a surrounding rock deformation image, the characteristic identification parameter corresponding to the surrounding rock deformation image is the number of surrounding rock surface cracks, the characteristic identification parameter is 1, and the number of corresponding surrounding rock surface cracks is 1.
The preset feature matching rule in steps S402 to S403 is a rule for setting a corresponding feature matching level according to a numerical value of the feature identification parameter, the preset selection rule is a rule for screening a highest feature matching level, and the target feature data is tunnel monitoring feature data transmitted in advance.
In practical application, the preset feature matching rule is to set a corresponding feature matching level according to an actual feature identification parameter of the monitored feature data, the higher the feature matching level is, the more hidden dangers of a relevant tunnel in the monitored feature data are, and the monitored feature data with the highest feature matching level is further screened according to the preset selection rule for pre-transmission.
According to the tunnel monitoring data communication control method provided by the embodiment, the monitoring feature data corresponding to the highest feature matching level is obtained as the target feature data, so that the analysis and the processing of relevant important data in the monitoring data are preferentially performed.
In one implementation manner of this embodiment, as shown in fig. 5, after comparing the feature matching levels according to a preset selection rule and selecting the monitoring feature data corresponding to the highest feature matching level as the target feature data in step S403, the method further includes the following steps:
s501, acquiring a data risk value corresponding to target characteristic data;
s502, judging whether the data risk value exceeds a preset risk threshold value;
s503, if the data risk value exceeds a preset risk threshold value, setting a corresponding risk grade according to the data risk value corresponding to the target characteristic data;
and S504, according to the risk level, the corresponding encryption mode is matched to encrypt the target characteristic data.
In steps S501 to S503, the data risk value refers to a data loss risk value corresponding to the target feature data in the network delay state, the preset risk threshold value refers to a risk value enough to damage the target feature data, and the risk level refers to a risk level set according to the data risk value corresponding to the target feature data.
For example, if the data risk value corresponding to the corresponding target feature data in the observation data inside and outside the tunnel hole is 6, and the preset risk threshold corresponding to the target feature data is 5, it may be determined that the data risk value corresponding to the target feature data exceeds the corresponding preset risk threshold, and the risk level corresponding to the target feature data is set according to that the data risk value is 6, where a higher data risk value indicates a higher corresponding risk level, and a higher risk of damage to the target feature data is.
For another example, if the data risk value corresponding to the target characteristic data is 2, it may be determined that the data risk value corresponding to the target characteristic data does not exceed the corresponding preset risk threshold, and the system continues to monitor the data risk value corresponding to the target characteristic data.
The encryption mode in step S504 is an encryption mode adapted to the risk level corresponding to the target feature data, and the higher the risk level corresponding to the target feature data is, the higher the encryption safety factor of the corresponding encryption mode is.
For example, the target characteristic data is surrounding rock crack quantity data and surrounding rock local collapse quantity data, the risk level of the surrounding rock crack quantity data is high, the target characteristic data is encrypted by adopting a symmetric algorithm of a high-level encryption standard, the security level of the high-level encryption standard is high, the risk level of the surrounding rock local collapse quantity data is low, the target characteristic data is encrypted by adopting the symmetric algorithm of a data encryption standard, the encryption speed of the data encryption standard is high, and a large amount of surrounding rock local collapse quantity data can be encrypted quickly.
According to the tunnel monitoring data communication management and control method, the corresponding encryption mode is matched for encryption according to the risk level corresponding to the target characteristic data, and therefore the occurrence of important data loss caused by communication network delay is reduced.
In one implementation manner of this embodiment, as shown in fig. 6, if the response time is greater than the preset response threshold interval in step S104, the acquiring the corresponding monitoring data includes the following steps:
s601, if the response time is larger than a preset response threshold interval, acquiring a data emergency measure corresponding to the communication data;
s602, calibrating a data security level corresponding to communication data according to data emergency measures;
and S603, selecting the communication data with the highest data security level as monitoring data according to the priority acquisition rule.
The data emergency measure in step S601 to step S602 refers to a data processing measure when a communication network fails, and the data security level refers to a security protection level corresponding to the communication data.
In practical application, the data emergency measures store the protection priority of the corresponding tunnel communication data when a communication fault occurs, and further protect the corresponding tunnel communication data according to the data emergency measures, wherein the higher the data security level corresponding to the communication data is, the higher the corresponding protection priority is.
The priority acquisition rule in step S603 is a rule for preferentially acquiring the communication data with the highest data security level.
In practical application, some communication data of the tunnel play a vital role in tunnel safety assessment, for example, tunnel surface subsidence monitoring data, the measured surface subsidence displacement can be known according to the tunnel surface subsidence monitoring data, whether tunnel collapse or harmful surface subsidence danger can be caused by current construction can be judged through the surface subsidence displacement, and therefore the corresponding data safety level of the tunnel surface subsidence monitoring data is higher.
According to the tunnel monitoring data communication control method provided by the embodiment of the invention, the monitoring feature data corresponding to the highest feature matching level is obtained as the target feature data, so that the analysis and the processing of relevant important data in the monitoring data are preferentially performed.
In one implementation manner of this embodiment, as shown in fig. 7, in step S107, if the data integrity does not meet the preset measurement standard, the uploading policy corresponding to the monitoring data is adjusted, and the generating of the corresponding data management and control scheme includes the following steps:
s701, if the integrity of the data does not accord with a preset testing standard, acquiring a data interference factor corresponding to the monitored data;
s702, acquiring a corresponding target interference item according to the interference type of the data interference factor;
and S703, adjusting an uploading strategy corresponding to the monitoring data according to the target interference item, and generating a corresponding data management and control scheme.
The data interference factor in step S701 refers to an interference factor causing a fault in the communication network, wherein the main functions of the communication transmission system include three aspects: firstly, connecting a data acquisition port, and converting, collecting and storing data acquired by a data acquisition end of communication equipment; secondly, in the data transmission process, the transmission of collected or stored data is realized through related media, and the data is transmitted from the acquisition end to the use end; and thirdly, connecting a data using terminal, and transmitting the transmission data information to the using terminal through conversion, wherein the using terminal is a monitoring terminal of the tunnel.
The target interference item in step S702 refers to a fault type occurring when the network fails, for example, an abnormality occurs in the process of converting, collecting and storing data collected by the data collection end of the communication device, and the corresponding target interference item is collection interference.
The uploading policy in step S703 refers to uploading the data amount of the monitoring data in real time, for example, when the communication network is in a fault state, acquiring corresponding monitoring data, that is, tunnel internal and external observation data, and if the working surface state data in the tunnel internal and external observation data has been acquired and uploaded, the surrounding rock deformation data and the surrounding rock weathering data have not been completely acquired and uploaded, and then the corresponding target interference item is acquisition interference.
And further acquiring the uploading data volume corresponding to the surrounding rock deformation data as 10KB/s and the uploading data volume corresponding to the surrounding rock weathering data as 15KB/s according to the target interference item for acquiring interference, further increasing the uploading data volume of the surrounding rock deformation data and the surrounding rock weathering data, adjusting the uploading data volume of the surrounding rock deformation data to 20KB/s, adjusting the uploading data volume of the surrounding rock weathering data to 25KB/s, and further forming a corresponding data management and control scheme.
According to the tunnel monitoring data communication management and control method provided by the embodiment, when a communication network fails, the corresponding target interference item is obtained according to the data interference factor actually corresponding to the interference factor, and the uploading strategy corresponding to the monitoring data is adjusted, so that the loss of the actually measured data is reduced to the greatest extent.
In one implementation manner of this embodiment, as shown in fig. 8, if the response time is greater than the preset response threshold interval in step S104, the acquiring the corresponding monitoring data includes the following steps:
s801, if the response time is larger than a preset response threshold interval, acquiring a corresponding data processing function module;
s802, judging whether a data processing function corresponding to the data processing function module meets a preset function standard or not;
s803, if the data processing function corresponding to the data processing function module does not meet the preset function standard, acquiring a corresponding target fault item;
s804, according to the fault type of the target fault item, setting a fault grade corresponding to the data processing function module as monitoring data.
The data processing function modules in steps S801 to S804 refer to each data communication processing function module in the tunnel communication network, the preset function standard refers to a normal data processing function standard corresponding to the data processing function module, the target fault item refers to a fault item in the data processing function module that does not meet the corresponding preset function standard, and the fault level refers to a level set by the fault severity of the target fault item.
In actual application, whether the data processing function module meets the corresponding preset function standard or not is judged, which data processing function modules in the tunnel monitoring data communication network are convenient to acquire abnormal faults, the corresponding target fault items of the data processing function modules are further acquired, the severity of the communication network faults corresponding to the tunnel monitoring data is convenient to acquire according to the actual fault types of the target fault items, and the corresponding fault grades are set as the corresponding monitoring data according to the severity of the communication network faults.
According to the tunnel monitoring data communication management and control method provided by the embodiment, the corresponding fault level is set according to the type of the target fault item specifically appearing in the data processing function module, so that the communication fault can be conveniently identified by a worker and the subsequent fault repairing work can be conveniently carried out.
The embodiment of the application discloses tunnel monitoring data communication management and control system, refer to fig. 9, include:
a first obtaining module 1, configured to obtain response time of communication data;
the first judging module 2 is used for judging whether the response time is within a preset response threshold interval;
if the response time is within the preset response threshold interval, the processing module 3 is configured to obtain the corresponding data traffic, process the data traffic according to a preset rectification rule, and generate corresponding target transmission data;
the second obtaining module 4, if the response time is greater than the preset response threshold interval, the second obtaining module 4 is configured to obtain corresponding monitoring data;
the reading module 5 is used for reading the monitoring data and generating corresponding data integrity;
the second judging module 6 is used for judging whether the data integrity meets the preset testing standard;
if the integrity of the data does not meet the preset test standard, the adjusting module 7 is used for adjusting the uploading strategy corresponding to the monitored data and generating a corresponding data control scheme;
and the management and control module 8 is used for performing communication management and control on the monitoring data according to the data management and control scheme.
The tunnel monitoring data communication management and control system provided by this embodiment determines, according to the first determining module 2, whether the response time of the communication data acquired by the first acquiring module 1 is within a corresponding preset response threshold interval, so as to facilitate learning that the communication network corresponding to the communication data is in a delayed state or a failure state, wherein the processing module 3 processes the corresponding data traffic in the network delayed state according to a preset rectification rule to generate corresponding target transmission data, so as to facilitate increasing the communication speed of the communication data, when a network failure occurs, the reading module 5 reads the uploaded monitoring data acquired by the second acquiring module 4 to generate data integrity corresponding to the monitoring data, further the adjusting module 7 adjusts an uploading policy corresponding to the monitoring data that does not meet a preset corresponding measurement standard, so as to generate a data management and control scheme for increasing the data integrity corresponding to the monitoring data, and control are implemented according to the data management and control scheme by combining the management and control module 8, so as to ensure the integrity of the monitoring data when the communication network failure occurs, thereby improving the communication effect of the monitoring data in the tunnel.
It should be noted that, the tunnel monitoring data communication management and control system provided in the embodiment of the present application further includes each module and/or corresponding sub-module corresponding to the logic function or logic step of any one of the above tunnel monitoring data communication management and control methods, so as to achieve the same effect as each logic function or logic step, which is not described herein again specifically.
The embodiment of the application further discloses a terminal device, which comprises a memory, a processor and a computer instruction which is stored in the memory and can run on the processor, wherein when the processor executes the computer instruction, any one of the tunnel monitoring data communication control methods in the embodiments is adopted.
The terminal device may adopt a computer device such as a desktop computer, a notebook computer, or a cloud server, and the terminal device includes but is not limited to a processor and a memory, for example, the terminal device may further include an input/output device, a network access device, a bus, and the like.
The processor may be a Central Processing Unit (CPU), and of course, according to an actual use situation, other general processors, digital Signal Processors (DSPs), application Specific Integrated Circuits (ASICs), field Programmable Gate Arrays (FPGAs) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, and the like may also be used, and the general processor may be a microprocessor or any conventional processor, and the present application does not limit the present invention.
The memory may be an internal storage unit of the terminal device, for example, a hard disk or a memory of the terminal device, or an external storage device of the terminal device, for example, a plug-in hard disk, a Smart Memory Card (SMC), a secure digital card (SD) or a flash memory card (FC) equipped on the terminal device, and the memory may also be a combination of the internal storage unit of the terminal device and the external storage device, and the memory is used for storing computer instructions and other instructions and data required by the terminal device, and the memory may also be used for temporarily storing data that has been output or will be output, which is not limited in this application.
The terminal device stores any one of the tunnel monitoring data communication management and control methods in the embodiments in a memory of the terminal device, and the tunnel monitoring data communication management and control method is loaded and executed on a processor of the terminal device, so that the terminal device is convenient to use.
The above embodiments are preferred embodiments of the present application, and the protection scope of the present application is not limited by the above embodiments, so: all equivalent changes made according to the structure, shape and principle of the present application shall be covered by the protection scope of the present application.

Claims (9)

1. A tunnel monitoring data communication management and control method is characterized by comprising the following steps:
acquiring response time of communication data;
judging whether the response time is within a preset response threshold interval or not;
if the response time is within the preset response threshold interval, judging whether the data flow exceeds a preset network bearing threshold, if the data flow is within the preset network bearing threshold, acquiring a data packet corresponding to the data flow, analyzing the data packet, generating corresponding monitoring characteristic data, judging whether redundant data corresponding to the monitoring characteristic data exist in the data packet, and if the redundant data corresponding to the monitoring characteristic data exist in the data packet, rejecting the redundant data;
if the response time is larger than the preset response threshold interval, acquiring corresponding monitoring data;
reading the monitoring data to generate corresponding data integrity;
judging whether the data integrity meets a preset test standard or not;
if the data integrity does not meet the preset testing standard, adjusting an uploading strategy corresponding to the monitoring data, and generating a corresponding data management and control scheme;
and performing communication control on the monitoring data according to the data control scheme.
2. The method according to claim 1, wherein if the redundant data corresponding to the monitoring feature data exists in the data packet, the method further includes the following steps after the redundant data is removed:
if the redundant data corresponding to the monitoring characteristic data exists, a safety threshold corresponding to the redundant data is obtained;
judging whether the safety threshold is smaller than a preset data safety threshold or not;
if the safety threshold value is smaller than the preset data safety threshold value, the redundant data is classified into a data blacklist;
and limiting the flow of the redundant data in the data blacklist according to a preset flow control rule.
3. The method according to claim 1, further comprising the following steps after the analyzing the data packet and generating the corresponding monitoring feature data:
identifying the monitoring characteristic data to generate corresponding characteristic identification parameters;
setting a feature matching grade corresponding to the feature identification parameter according to a preset feature matching rule;
and comparing the feature matching grades according to a preset selection rule, and selecting the monitoring feature data corresponding to the highest feature matching grade as target feature data.
4. The method as claimed in claim 3, wherein the step of comparing the feature matching levels according to a preset selection rule and selecting the monitoring feature data corresponding to the highest feature matching level as the target feature data further comprises the following steps:
acquiring a data risk value corresponding to the target characteristic data;
judging whether the data risk value exceeds a preset risk threshold value or not;
if the data risk value exceeds the preset risk threshold value, setting a corresponding risk grade according to the data risk value corresponding to the target characteristic data;
and according to the risk level, matching a corresponding encryption mode to encrypt the target characteristic data.
5. The method according to claim 1, wherein if the response time is greater than the preset response threshold interval, acquiring the corresponding monitoring data includes the following steps:
if the response time is larger than the preset response threshold interval, acquiring a data emergency measure corresponding to the communication data;
calibrating the data security level corresponding to the communication data according to the data emergency measure;
and selecting the communication data with the highest data security level as the monitoring data according to a priority acquisition rule.
6. The method according to claim 1, wherein if the data integrity does not meet the preset measurement requirement standard, adjusting an upload policy corresponding to the monitored data, and generating a corresponding data management and control scheme includes:
if the data integrity does not meet the preset measurement standard, acquiring a data interference factor corresponding to the monitoring data;
acquiring a corresponding target interference item according to the interference type of the data interference factor;
and adjusting an uploading strategy corresponding to the monitoring data according to the target interference item, and generating a corresponding data management and control scheme.
7. The method as claimed in claim 1, wherein the step of obtaining the corresponding monitoring data if the response time is greater than the preset response threshold interval includes the steps of:
if the response time is larger than the preset response threshold interval, acquiring a corresponding data processing functional module;
judging whether the data processing function corresponding to the data processing function module meets a preset function standard or not;
if the data processing function corresponding to the data processing function module does not accord with the preset function standard, acquiring a corresponding target fault item;
and setting the fault grade corresponding to the data processing functional module as the monitoring data according to the fault type of the target fault item.
8. The utility model provides a tunnel monitoring data communication management and control system which characterized in that includes:
a first acquisition module (1) for acquiring a response time of communication data;
the first judging module (2) is used for judging whether the response time is in a preset response threshold interval or not;
a processing module (3), configured to, if the response time is within the preset response threshold interval, determine whether the data traffic exceeds a preset network bearer threshold, if the data traffic is within the preset network bearer threshold, obtain a data packet corresponding to the data traffic, analyze the data packet, generate corresponding monitoring feature data, determine whether redundant data corresponding to the monitoring feature data exists in the data packet, and if the redundant data corresponding to the monitoring feature data exists in the data packet, reject the redundant data;
the second acquisition module (4), if the response time is greater than the preset response threshold interval, the second acquisition module (4) is used for acquiring corresponding monitoring data;
the reading module (5) is used for reading the monitoring data and generating corresponding data integrity;
the second judging module (6) is used for judging whether the data integrity meets a preset to-be-measured standard or not;
the adjusting module (7) is used for adjusting the uploading strategy corresponding to the monitoring data and generating a corresponding data management and control scheme if the data integrity does not meet the preset testing standard;
a management and control module (8) for performing communication management and control on the monitoring data according to the data management and control scheme.
9. A terminal device comprising a memory and a processor, wherein the memory stores computer instructions capable of running on the processor, and the processor when loading and executing the computer instructions adopts the tunnel monitoring data communication management method according to any one of claims 1 to 7.
CN202211442846.1A 2022-11-18 2022-11-18 Tunnel monitoring data communication management and control method, system and terminal equipment Active CN115499318B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211442846.1A CN115499318B (en) 2022-11-18 2022-11-18 Tunnel monitoring data communication management and control method, system and terminal equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211442846.1A CN115499318B (en) 2022-11-18 2022-11-18 Tunnel monitoring data communication management and control method, system and terminal equipment

Publications (2)

Publication Number Publication Date
CN115499318A CN115499318A (en) 2022-12-20
CN115499318B true CN115499318B (en) 2023-02-24

Family

ID=85116145

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211442846.1A Active CN115499318B (en) 2022-11-18 2022-11-18 Tunnel monitoring data communication management and control method, system and terminal equipment

Country Status (1)

Country Link
CN (1) CN115499318B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115981219B (en) * 2023-03-21 2023-06-30 山东博安智能科技股份有限公司 Intelligent monitoring system for high-speed tunnel

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110311758A (en) * 2019-07-19 2019-10-08 北京清源新创科技有限公司 Data low latency transmission method, device and equipment and storage medium
CN112129346A (en) * 2020-09-14 2020-12-25 湖南致力工程科技有限公司 Tunnel automatic monitoring and early warning method and system
CN112713967A (en) * 2020-12-30 2021-04-27 北京猿力未来科技有限公司 Data transmission method and device

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101515196A (en) * 2009-03-18 2009-08-26 华为技术有限公司 Method, system and device for controlling embedded system power consumption
WO2015035573A1 (en) * 2013-09-11 2015-03-19 华为技术有限公司 Network transmission method and apparatus
CN111200830B (en) * 2020-01-02 2022-04-26 腾讯科技(深圳)有限公司 Data transmission method and device and electronic equipment
CN111314335B (en) * 2020-02-10 2021-10-08 腾讯科技(深圳)有限公司 Data transmission method, device, terminal, storage medium and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110311758A (en) * 2019-07-19 2019-10-08 北京清源新创科技有限公司 Data low latency transmission method, device and equipment and storage medium
CN112129346A (en) * 2020-09-14 2020-12-25 湖南致力工程科技有限公司 Tunnel automatic monitoring and early warning method and system
CN112713967A (en) * 2020-12-30 2021-04-27 北京猿力未来科技有限公司 Data transmission method and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
监控阈值模型及报警事件关联规则研究;张小翠;《中国金融电脑》;20160507(第05期);全文 *

Also Published As

Publication number Publication date
CN115499318A (en) 2022-12-20

Similar Documents

Publication Publication Date Title
CN105205394B (en) Data detection method and device for intrusion detection
CN115499318B (en) Tunnel monitoring data communication management and control method, system and terminal equipment
CN113283344A (en) Mining conveying belt deviation detection method based on semantic segmentation network
CN114997682B (en) Construction site safety monitoring system and method based on big data
US8935039B2 (en) Method for reducing detection data of a monitoring device in a vehicle, and method for monitoring a vehicle defect in near real time using same
CN115936428B (en) Incremental power distribution network external damage prevention constant value optimizing system
CN115269342B (en) Monitoring cloud platform based on edge computing and monitoring method thereof
CN103095485A (en) Network risk assessment method based on combination of Bayesian algorithm and matrix method
CN115038088B (en) Intelligent network security detection early warning system and method
KR101353387B1 (en) Communication tower-structure status monitoring system using displacement sensor
CN115935415A (en) Data safety early warning system based on industrial internet multi-factor perception
CN116108402A (en) Method, equipment and storage medium based on electric power multi-source heterogeneous data fusion analysis
CN112924990B (en) Landslide body monitoring method and system based on GNSS accelerometer fusion
CN113780237A (en) External damage prevention early warning method, device and system for underground pipeline
CN110166972B (en) Intelligent sensing system with block chain module
CN117037065A (en) Flame smoke concentration detection method, device, computer equipment and storage medium
JP7206051B2 (en) Monitoring system
CN116579601A (en) Mine safety production risk monitoring and early warning system and method
JP5405535B2 (en) Landslide maintenance management system and landslide maintenance management method
CN113869240A (en) Transmission optical cable real-time warning method and device based on deep learning algorithm
CN106443279A (en) A monitoring method, apparatus and system for operation management abnormity in a power grid
CN112982503A (en) Subway foundation pit construction monitoring system, method, equipment and storage medium
CN111189533A (en) External force invasion monitoring method and device, computer equipment and storage medium
CN113965384B (en) Network security anomaly detection method, device and computer storage medium
CN115788390B (en) Remote monitoring method for carbon dioxide fracturing auxiliary pressurizing device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20230412

Address after: Room 607, 6th Floor, No. 50 Jiaotong Road, Changshuo Street, Anji County, Huzhou City, Zhejiang Province, 313300

Patentee after: Zhejiang Jining Expressway Co.,Ltd.

Patentee after: HUNAN ZHILI ENGINEERING SCIENCE AND TECHNOLOGY CO.,LTD.

Address before: 410006 No.106 Ziyuan Road, Xueshi street, Yuelu District, Changsha City, Hunan Province

Patentee before: HUNAN ZHILI ENGINEERING SCIENCE AND TECHNOLOGY CO.,LTD.

TR01 Transfer of patent right