[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN109920217B - Data transmission method and device and security monitoring system - Google Patents

Data transmission method and device and security monitoring system Download PDF

Info

Publication number
CN109920217B
CN109920217B CN201711326272.0A CN201711326272A CN109920217B CN 109920217 B CN109920217 B CN 109920217B CN 201711326272 A CN201711326272 A CN 201711326272A CN 109920217 B CN109920217 B CN 109920217B
Authority
CN
China
Prior art keywords
module
data
link
differential
stage
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711326272.0A
Other languages
Chinese (zh)
Other versions
CN109920217A (en
Inventor
林彦国
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Hikvision Digital Technology Co Ltd
Original Assignee
Hangzhou Hikvision Digital Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Hikvision Digital Technology Co Ltd filed Critical Hangzhou Hikvision Digital Technology Co Ltd
Priority to CN201711326272.0A priority Critical patent/CN109920217B/en
Publication of CN109920217A publication Critical patent/CN109920217A/en
Application granted granted Critical
Publication of CN109920217B publication Critical patent/CN109920217B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Alarm Systems (AREA)

Abstract

The application provides a data transmission method, a data transmission device and a security monitoring system. This security protection monitored control system includes: the system comprises an alarm host, a plurality of communication modules and a plurality of expansion modules; the alarm host is communicated with the corresponding next-level module through a bus and executes alarm processing according to data obtained by polling the corresponding next-level module; each communication module is communicated with the corresponding upper-level module through a self state port, communicated with the corresponding lower-level module through a self expansion port, and used for reporting data to the upper-level module according to the data obtained by polling from the corresponding lower-level module; each expansion module is communicated with the corresponding upper-level module through the state port of the expansion module, is communicated with the defense area detector through the expansion port of the expansion module, and reports data to the upper-level module according to the security data obtained from the corresponding defense area detector. The security monitoring system provided by the application can solve the problem that communication delay is high in the prior art.

Description

Data transmission method and device and security monitoring system
Technical Field
The application relates to the technical field of security monitoring, in particular to a data transmission method, a data transmission device and a security monitoring system.
Background
For a security monitoring system, the number of areas to be detected is large, and at the moment, a large number of defense area detectors need to be accessed, wherein the defense area detectors are used for detecting security data of the defense area.
Security monitoring systems in the prior art generally include: the system comprises an alarm host and a plurality of expansion modules; the alarm host is communicated with the extension modules through the bus, each extension module comprises a state port and at least one extension port, the state ports are communicated with the alarm host, and the extension ports are communicated with the defense area detectors, so that the alarm host can poll the extension modules, security data of the corresponding defense area detectors are obtained through the extension modules, and alarm processing is executed based on the polled data.
Therefore, the existing security monitoring system is directly communicated with the extension modules through the alarm host, so that the alarm host needs to poll the extension modules one by one to obtain security data, and communication delay is high.
Disclosure of Invention
In view of this, the present application provides a security monitoring system to solve the problem of high communication delay of the existing security monitoring system. In addition, the application also provides a data transmission method and device, so that the bus communication is not easy to block when the security monitoring system is expanded in a large scale, and the security monitoring system has higher data transmission efficiency.
Specifically, the method is realized through the following technical scheme:
in a first aspect, the present application provides a security monitoring system, including: the system comprises an alarm host, a plurality of communication modules and a plurality of expansion modules; each communication module comprises a state port and at least one expansion port, and each expansion module comprises a state port and at least one expansion port;
the alarm host is communicated with the corresponding next-level module through a bus and used for executing alarm processing according to the data obtained by polling the corresponding next-level module; wherein, the next level module that the alarm host computer corresponds includes: at least one communication module and/or at least one expansion module;
each communication module is communicated with the corresponding upper-level module through a state port of the communication module, is communicated with the corresponding lower-level module through an expansion port of the communication module, and is used for reporting data to the corresponding upper-level module according to the data obtained by polling from the corresponding lower-level module; wherein, the last level module that any communication module corresponds includes: the alarm host or a communication module; the next-level module corresponding to any communication module comprises: at least one communication module and/or at least one expansion module;
each expansion module is communicated with the corresponding upper-level module through a state port of the expansion module, is communicated with the defense area detector through an expansion port of the expansion module, and is used for reporting data to the corresponding upper-level module according to security data obtained from the corresponding defense area detector; wherein, the last level module that any expansion module corresponds includes: a communication module or the alarm host.
In a second aspect, the application provides a data transmission method, which is applied to an alarm host in a security monitoring system; the method comprises the following steps:
monitoring whether the reference data acquisition condition is met;
when the reference data acquisition condition is met, polling each next-level module to acquire reference data corresponding to a link of each next-level module; the reference data is current security data;
when the reference data acquisition condition is not met, polling each next-stage module to acquire differential data corresponding to a link of each next-stage module; the differential data corresponding to the link of any next-stage module is as follows: the difference value of the first latest data of the next-stage module relative to the first standard data is as follows: the latest differential data corresponding to the link of the next-stage module is the following first standard data: and the alarm host computer obtains the result of the last data request of the next-stage module.
In a third aspect, the present application provides a data transmission method, which is applied to a communication module in a security monitoring system; the method comprises the following steps:
monitoring whether a previous-stage module requests data from the communication module;
when the condition that the previous-stage module requests data from the communication module and the data type is a reference type is monitored, polling each next-stage module to obtain current security data corresponding to a link of each next-stage module;
determining the current security data obtained by polling as reference data corresponding to a link of the communication module, and feeding back the reference data to the previous-stage module;
when the condition that the upper-level module requests data from the communication module and the data type is a differential type is monitored, differential data corresponding to a link of the communication module is obtained; the differential data corresponding to the communication module link is as follows: a difference value of the second latest data with respect to the second standard data, the second latest data being: the latest differential data corresponding to the link of each next-stage module is as follows: the last data request result of the last level module to the communication module;
and feeding back differential data corresponding to the communication module link to the upper-level module.
In a fourth aspect, the present application provides a data transmission method, which is applied to an expansion module in a security monitoring system; the method comprises the following steps:
monitoring whether a previous-stage module requests data from the expansion module;
when the condition that the previous-stage module requests data from the expansion module and the data type is the reference type is monitored, detecting each defense area detector connected with the expansion module to obtain the current security data of each defense area detector;
determining the current security data as reference data corresponding to a link of the expansion module, and feeding the reference data back to the previous-stage module;
when the condition that the previous-stage module requests data from the expansion module and the data type is a differential type is monitored, obtaining differential data corresponding to a link of the expansion module; the differential data corresponding to the link of the expansion module is as follows: a difference value of the third latest data with respect to the third standard data, the third latest data being: the latest security data of each defense area detector connected with the expansion module are as follows: the last data request of the last level module to the expansion module is obtained;
and feeding back differential data corresponding to the link of the expansion module to the previous-stage module.
In a fifth aspect, the present application provides a data transmission device, which is applied to an alarm host in a security monitoring system; the device comprises:
the monitoring unit is used for judging whether the reference data acquisition condition is met or not;
the reference data acquisition unit is used for polling each next-level module when the reference data acquisition condition is met, and acquiring reference data corresponding to a link of each next-level module; the reference data is current security data;
the differential data acquisition unit is used for polling each next-level module when the reference data acquisition condition is not met, and acquiring differential data corresponding to a link of each next-level module; the differential data corresponding to the link of any next-stage module is as follows: the difference value of the first latest data of the next-stage module relative to the first standard data is as follows: the latest differential data corresponding to the link of the next-stage module is the following first standard data: and the alarm host computer obtains the result of the last data request of the next-stage module.
In a sixth aspect, the present application provides a data transmission device, which is applied to a communication module in a security monitoring system; the device comprises:
the first monitoring unit is used for monitoring whether the upper-level module requests data from the communication module;
the first security data obtaining unit is used for polling each next-level module to obtain current security data corresponding to a link of each next-level module when the condition that the previous-level module requests data from the communication module and the data type is a reference type is monitored;
the first data feedback unit is used for determining the current security data obtained by polling as reference data corresponding to the communication module link and feeding the reference data back to the previous-stage module;
the first differential data obtaining unit is used for obtaining differential data corresponding to a link of the communication module when the condition that the last-stage module requests data from the communication module and the data type is a differential type is monitored; the differential data corresponding to the communication module link is as follows: a difference value of the second latest data with respect to the second standard data, the second latest data being: the latest differential data corresponding to the link of each next-stage module is as follows: the last data request result of the last level module to the communication module;
and the second data feedback unit is used for feeding back the differential data corresponding to the communication module link to the upper-level module.
In a seventh aspect, the present application provides a data transmission device, which is applied to an expansion module in a security monitoring system; the device comprises:
the second monitoring unit is used for monitoring whether the upper-level module requests data from the expansion module;
the second security data obtaining unit is used for detecting each defense area detector connected with the expansion module when the condition that the previous-stage module requests data from the expansion module and the data type is the reference type is monitored, and obtaining the current security data of each defense area detector;
the third data feedback unit is used for determining the current security data as reference data corresponding to the link of the expansion module and feeding the reference data back to the previous-stage module;
the second differential data obtaining unit is used for obtaining differential data corresponding to a link of the expansion module when the condition that the previous-stage module requests data from the expansion module and the data type is a differential type is monitored; the differential data corresponding to the link of the expansion module is as follows: a difference value of the third latest data with respect to the third standard data, the third latest data being: the latest security data of each defense area detector connected with the expansion module are as follows: the last data request of the last level module to the expansion module is obtained;
and the fourth data feedback unit is used for feeding back the differential data corresponding to the link of the expansion module to the previous-stage module.
In an eighth aspect, the present application provides an electronic device, where the electronic device is an alarm host in a security monitoring system; the electronic device includes: an internal bus, a memory, a processor, and a communication interface; the processor, the communication interface and the memory complete mutual communication through the internal bus; the memory is used for storing machine feasible instructions corresponding to the data transmission method;
the processor is configured to read the machine-readable instructions on the memory and execute the instructions to implement the following operations:
monitoring whether the reference data acquisition condition is met;
when the reference data acquisition condition is met, polling each next-level module to acquire reference data corresponding to a link of each next-level module; the reference data is current security data;
when the reference data acquisition condition is not met, polling each next-stage module to acquire differential data corresponding to a link of each next-stage module; the differential data corresponding to the link of any next-stage module is as follows: the difference value of the first latest data of the next-stage module relative to the first standard data is as follows: the latest differential data corresponding to the link of the next-stage module is the following first standard data: and the alarm host computer obtains the result of the last data request of the next-stage module.
In a ninth aspect, the present application provides an electronic device, where the electronic device is a communication module in a security monitoring system; the electronic device includes: an internal bus, a memory, a processor, and a communication interface; the processor, the communication interface and the memory complete mutual communication through the internal bus; the memory is used for storing machine feasible instructions corresponding to the data transmission method;
the processor is configured to read the machine-readable instructions on the memory and execute the instructions to implement the following operations:
monitoring whether a previous-stage module requests data from the electronic equipment;
when the condition that the previous-stage module requests data from the electronic equipment and the data type is the reference type is monitored, polling each next-stage module to obtain current security data corresponding to a link of each next-stage module;
determining current security data obtained by polling as reference data corresponding to a link of the electronic equipment, and feeding the reference data back to the upper-level module;
when the condition that the upper-level module requests data from the electronic equipment and the data type is a differential type is monitored, obtaining differential data corresponding to a link of the electronic equipment; the differential data corresponding to the link of the electronic device is as follows: a difference value of the second latest data with respect to the second standard data, the second latest data being: the latest differential data corresponding to the link of each next-stage module is as follows: the last data request of the electronic equipment is requested by the last module;
and feeding back differential data corresponding to the link of the electronic equipment to the previous-stage module.
In a tenth aspect, the present application provides an electronic device, where the electronic device is an expansion module in a security monitoring system; the electronic device includes: an internal bus, a memory, a processor, and a communication interface; the processor, the communication interface and the memory complete mutual communication through the internal bus; the memory is used for storing machine feasible instructions corresponding to the data transmission method;
the processor is configured to read the machine-readable instructions on the memory and execute the instructions to implement the following operations:
monitoring whether a previous-stage module requests data from the electronic equipment;
when the condition that the previous-stage module requests data from the electronic equipment and the data type is the reference type is monitored, detecting each defense area detector connected with the expansion module to obtain current security data of each defense area detector;
determining the current security data as reference data corresponding to a link of the electronic equipment, and feeding the reference data back to the upper-level module;
when the condition that the upper-level module requests data from the electronic equipment and the data type is a differential type is monitored, obtaining differential data corresponding to a link of the electronic equipment; the differential data corresponding to the link of the electronic device is as follows: a difference value of the third latest data with respect to the third standard data, the third latest data being: the latest security data of each defense area detector connected with the electronic equipment are as follows: the last data request of the electronic equipment is requested by the last module;
and feeding back differential data corresponding to the link of the electronic equipment to the previous-stage module.
In the security monitoring system provided by the application, the alarm host can be communicated with the communication module and/or the extension module, and the communication module can be used as a next-level module of another communication module or the alarm host and as a previous-level module of the communication modules and/or the extension modules, so that the security monitoring system provided by the scheme can perform hierarchical polling to obtain security data. Therefore, compared with the existing one-by-one polling expansion module of the alarm host in the security monitoring system, the security monitoring system provided by the application can greatly reduce communication delay
In addition, the data transmission method and device provided by the application are based on the security monitoring system, and bus communication is not easy to block when the security monitoring system is expanded in a large scale, so that the security monitoring system has high data transmission efficiency.
Drawings
Fig. 1(a), fig. 1(b) and fig. 1(c) are respectively schematic structural diagrams of a security monitoring system provided by the present application;
fig. 2(a) and fig. 2(b) are respectively schematic structural diagrams of a communication module in a security monitoring system provided by the present application; fig. 2(c) is a schematic structural diagram of an expansion module in a security monitoring system provided in the present application;
FIG. 3 is a flow chart of a data transfer method provided by the present application from the perspective of an alarm host;
FIG. 4 is another flow chart of a data transfer method provided by the present application from the perspective of an alarm host;
FIG. 5 is a flow chart of a data transmission method provided by the present application from the perspective of a communication module;
FIG. 6 is another flow chart of a data transmission method provided by the present application from the perspective of a communication module;
FIG. 7 is a flow chart of a data transmission method provided by the present application from the perspective of an expansion module;
FIG. 8 is another flow chart of a data transmission method provided by the present application from the perspective of an expansion module;
FIG. 9 is a schematic diagram of a data transmission device provided in the present application from the perspective of an alarm host;
fig. 10 is a schematic structural diagram of a data transmission device provided in the present application from the perspective of a communication module;
fig. 11 is a schematic structural diagram of a data transmission device provided in the present application from the perspective of an expansion module;
fig. 12 is a schematic structural diagram of an electronic device provided in the present application.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present application, as detailed in the appended claims.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in this application and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It is to be understood that although the terms first, second, third, etc. may be used herein to describe various information, such information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of the present application. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context.
In order to solve the problem that the communication delay of a security monitoring system is high in the prior art, the application provides a security monitoring system.
The application provides a security protection monitored control system includes: the system comprises an alarm host, a plurality of communication modules and a plurality of expansion modules; each communication module comprises a state port and at least one expansion port, and each expansion module comprises a state port and at least one expansion port;
the alarm host is communicated with the corresponding next-level module through a bus and used for executing alarm processing according to the data obtained by polling the corresponding next-level module; wherein, the next level module that this alarm host computer corresponds includes: at least one communication module and/or at least one expansion module;
each communication module is communicated with the corresponding upper-level module through a state port of the communication module, is communicated with the corresponding lower-level module through an expansion port of the communication module, and is used for reporting data to the corresponding upper-level module according to the data obtained by polling from the corresponding lower-level module; wherein, the last level module that any communication module corresponds includes: the alarm host or a communication module; the next-level module corresponding to any communication module comprises: at least one communication module and/or at least one expansion module;
each expansion module is communicated with the corresponding upper-level module through a state port of the expansion module, is communicated with the defense area detector through an expansion port of the expansion module, and is used for reporting data to the corresponding upper-level module according to security data obtained from the corresponding defense area detector; wherein, the last level module that any expansion module corresponds includes: a communication module or the alarm host.
The communication module and the defense area extension module in the security monitoring system belong to a processor integrated with data acquisition, transmission and processing functions, and a specific hardware structure is not limited herein.
In this application, the alarm host may be connected to the communication module through a bus, or may be connected to the expansion module through a bus, that is, all the next-level modules corresponding to the alarm host may only include a plurality of communication modules or a plurality of expansion modules, or may include both a plurality of communication modules and a plurality of expansion modules, which is reasonable.
In addition, since each communication module in the present application includes a status extension and at least one extension port, as shown in fig. 2(a) and 2(b), each communication module corresponds to only one upper module and corresponds to at least one lower module, specifically, the upper module corresponding to each communication module may be an alarm host or another communication module, and all the lower modules corresponding to each communication module may include only an extension module or a communication module, or may include both an extension module and a communication module. Similarly, since each expansion module in the present application includes a status port and at least one expansion port, as shown in fig. 2(c), each expansion module corresponds to only one previous module and corresponds to at least one next module, specifically, the previous module corresponding to each expansion module may be an alarm host or a communication module, and since the expansion module is the communication module at the bottom layer, all the next modules corresponding to each expansion module are defense area detectors. It can be seen that, based on the structure of communication module and extension module, the security protection monitored control system that this application provided's extension mode is very abundant, can satisfy the demand of various application scenarios, for example: fig. 1(a), fig. 1(b), and fig. 1(c) respectively show a schematic structural diagram of a security monitoring system provided by the present application to adapt to different application scenarios. It is emphasized that fig. 1(a), 1(b) and 1(c) are merely examples and should not be construed as limiting the present application.
It should be noted that, in the security monitoring system provided by the present application, each module obtains data through its corresponding next-level module, and performs corresponding processing based on the obtained data. Specifically, the alarm host acquires data by polling the next-stage module of the alarm host, and executes alarm analysis according to the acquired data; when receiving a data request of a previous-stage module, the communication module acquires data by polling a next-stage module of the communication module and reports the data acquired from the next-stage polling to the previous-stage module; and when the expansion module receives the data request of the previous-stage module, the expansion module obtains security data by detecting the defense area detector connected with the expansion module, and feeds back data to the previous-stage module based on the obtained security data.
In addition, it can be understood that the defense area detector is used for detecting security data of a defense area, where the security data may include, but is not limited to, security status data, where the security status data may include: a dangerous state and a normal state. Wherein, the region that the defence area detector was aimed at is the defence area, and is specific, reports to the police according to the defence area and whether is equipped with the delay time and distinguishes, and the defence area divide into: an instantaneous defense area and a delayed defense area; and distinguish according to the mounted position of defence area detector and its precaution function, the defence area divide into: perimeter defence areas, access defence areas, interior defence areas, day and night defence areas, fire defence areas and the like.
It should be noted that the defense area detector in the present application may be a defense area detector existing in the prior art, and specifically, what kind of defense area detector is adopted is determined according to a specific application scenario, which is not limited in the present application. In addition, the specific alarm mode of the alarm host and the alarm analysis process based on the obtained data can refer to the prior art, and the application is not limited.
In the security monitoring system provided by the application, the alarm host can be communicated with the communication module and/or the extension module, and the communication module can be used as a next-level module of another communication module or the alarm host and as a previous-level module of the communication modules and/or the extension modules, so that the security monitoring system provided by the scheme can perform hierarchical polling to obtain security data. Therefore, compared with the existing security monitoring system in which the alarm host polls the extension module one by one, the security monitoring system provided by the application can greatly reduce communication delay; moreover, the topological structure of the security monitoring system is easy to network and flexible in expansion.
According to the security monitoring system provided by the application, when the number of the communication modules and the number of the extension modules are large, data are gathered from the bottom layer to the high layer, the communication modules need to collect data of all the modules on the links of the communication modules and then communicate with the upper layer, and the data are more and more. In order to enable bus communication to be not prone to blocking when a security monitoring system is expanded in a large scale and enable the security monitoring system to have high data transmission efficiency, the application provides a data transmission method and device from the perspective of an alarm host, a communication module and an expansion module respectively.
First, a data transmission method provided by the present application is described below from the perspective of an alarm host.
As shown in fig. 3, from the perspective of the alarm host, the present application provides a data transmission method, which may include the following steps:
s101, monitoring whether a reference data acquisition condition is met;
it should be noted that the reference data acquired corresponding to the reference data acquisition condition is complete security data of the security monitoring system, that is, security data of all the defense area detectors.
In order to ensure data integrity, reference data may be acquired at system initialization, and at this time, whether the reference data acquisition condition is met is determined as follows: judging whether to carry out system initialization or not; of course, in order to ensure the communication stability, the reference data may be acquired at intervals, and at this time, the determining whether the reference data acquisition condition is met may be: and judging whether the preset time is reached.
S102, when the reference data acquisition condition is met, polling each next-level module to acquire reference data corresponding to a link of each next-level module; the reference data is current security data;
when the condition that the reference data acquisition is met is monitored, the fact that complete data needs to be acquired is indicated, and therefore the alarm host can poll each next-level module to acquire the reference data corresponding to the link of each next-level module, namely the current security data. It should be emphasized that, since the method is described in this embodiment from the perspective of standing on the alarm host, the next-stage modules described in this embodiment are all the next-stage modules corresponding to the alarm host. In addition, when the reference data is acquired, the polling rate of each next-stage module may be set according to the actual situation, which is not limited herein.
It should be noted that, if the next-stage module is an extension module, the link of the extension module itself is the connected defense area detector, and if the alarm host polls the extension module when meeting the reference data acquisition condition, the extension module acquires the current security data from the connected defense area detector and reports the security data to the alarm host.
And if the next-level module is a communication module, the link of the communication module is a link from the directly-connected module to the defense area detector, if the alarm host polls the communication module when meeting the reference data acquisition condition, the communication module requests to acquire reference data of the link of the directly-connected module from the directly-connected module, the sum of the reference data acquired from each directly-connected module is used as reference data corresponding to the link of the communication module and reported to the alarm host, wherein the reference data of the link of the directly-connected module is as follows: the directly connected module requests the sum of the reference data of the self-link of each connected module, and so on.
It can be understood that, after the alarm host polls to obtain the reference data fed back by each next-stage module, the alarm host can execute alarm processing according to the reference data. The process of executing alarm processing based on the reference data obtained by polling belongs to the prior art, and the process is not limited in the application.
And S103, when the reference data acquisition condition is not met, polling each next-stage module to obtain differential data corresponding to the link of each next-stage module.
The differential data corresponding to the link of any next-stage module is as follows: the difference value of the first latest data of the next-stage module relative to the first standard data is as follows: the latest differential data corresponding to the link of the next-level module is the following first standard data: the alarm host computer obtains the result of the last data request of the next-level module.
In order to ensure high efficiency of data transmission and eliminate the time meeting the reference data acquisition condition, the alarm host can poll each next-level module to obtain the differential data corresponding to the link of each next-level module so as to reduce the data volume. It should be emphasized that, although the amount of data transmitted is reduced, the alarm host can determine the complete security data of the security monitoring system according to the differential data obtained by the request, the differential data obtained by the previous request and the reference data, so as not to affect the alarm analysis and the integrity of the stored data. In addition, when differential data is acquired, the polling rate of each next-stage module may be set according to actual conditions, which is not limited herein. In addition, when the reference data acquisition condition is not met, the differential data acquisition time or condition may be set, and when the differential data acquisition time or condition is reached, each next-stage module is polled to obtain the differential data corresponding to its own link, and of course, when the reference data acquisition condition is not met, each next-stage module may also be polled continuously at a certain polling rate, which is reasonable.
It should be noted that, if the next-stage module is an extension module, the link of the extension module itself is the connected defense area detector, and when the alarm host requests differential data from the extension module, the extension module can determine two types of data, calculate a differential value between the two types of data, obtain differential data corresponding to the extension module, and report the differential data to the alarm host; wherein, one kind of data in the two kinds of data is: the latest security data obtained from the connected defense area detectors, and the other type of data is as follows: and the alarm host machine polls the data obtained from the expansion module last time.
And if the next-stage module is a communication module, the link of the communication module is a link from each directly-connected module to the defense area detector, when the alarm host requests differential data from the communication module, the communication module can request to obtain the differential data of the link of each directly-connected module from each directly-connected module, calculate a differential value between the differential data obtained from each directly-connected module and the data obtained by the alarm host from the communication module in the last polling process, obtain the differential data corresponding to the link of the communication module and report the differential data to the alarm host. If the directly connected module is a communication module, the differential data of the link of the directly connected module is as follows: the directly connected module obtains differential data from the connected module, and the communication module polls the directly connected module last time to obtain a differential value of the data; and if the directly connected module is an expansion module, the differential data of the link of the directly connected module is as follows: the security data obtained by the directly connected module from the connected defense area detector and the difference value of the data obtained by the communication module from the directly connected module in the last polling process are obtained.
It should be emphasized that, in a security monitoring system, in order to ensure timely and efficient risk handling, the detection priorities for different defense areas may be different, and generally, the higher the number of alarms is, the higher the detection priority is for the defense area. Based on the processing idea, the step of polling each next-stage module to obtain the differential data corresponding to the link of each next-stage module when the reference data obtaining condition is not met may include:
and when the reference data acquisition condition is not met, polling each next-level module according to the polling priority of each next-level module to obtain the differential data corresponding to the link of each next-level module.
The polling priority of each next-level module can be set manually, or can be set automatically according to a certain reference standard.
Optionally, in a specific implementation manner, the determining manner of the polling priority of each next-level module of the alarm host may include:
determining the data length of differential data fed back by each next-stage module within a first preset time period;
determining the polling priority of each next-level module of the alarm host according to the data length corresponding to each next-level module and the total first data length; the first total data length is the sum of the data lengths corresponding to the next-stage modules.
Specifically, the ratio of the data length corresponding to each next-level module to the total first data length may be determined as the polling priority of each next-level module, and certainly, the method is not limited to this. In order to cope with the scene change and ensure the priority reliability, the priorities of the next modules may be dynamically calculated, that is, the polling priority determination operation is performed once at a certain interval, and the data used by the polling priority determination operation is the latest data.
For example: the calculation process of the priority of the next-level module A0-Am corresponding to the alarm host can include:
accumulating the lengths of the differential data of the next-stage modules A0-Am in a certain time period to obtain the data lengths corresponding to the next-stage modules, wherein the data length SAx of the next-stage module Ax is the polling priority of the next-stage module Ax
Figure BDA0001505718550000141
For the next-level module Ax, the polling process according to the polling priority is as follows: in the total number of times of
Figure BDA0001505718550000142
In the polling process, the polling times of the next-stage module Ax are SAx times, namely every other time
Figure BDA0001505718550000143
And polling once.
It should be emphasized that the above-mentioned manner of automatically setting the polling priority is only given as an example and should not be construed as limiting the application, for example: and multiplying the data length corresponding to each next-level module by a certain weight, and then dividing the data length by the total length of the first data to obtain the polling priority corresponding to each next-level module, and the like.
In the scheme provided by the application, the reference data of the link of each next-stage module is obtained only when the reference data obtaining condition is met; and all the other moments obtain the differential data of each next-level module, so that the data volume is greatly reduced, and therefore, the scheme can ensure that bus communication is not easy to block when the security monitoring system is expanded on a large scale, and the security monitoring system has higher data transmission efficiency.
In the following, a data transmission method provided by the present application from the perspective of an alarm host is described with reference to specific application examples.
As shown in fig. 4, from the perspective of an alarm host, a data transmission method provided by the present application may include the following steps:
s201, monitoring whether a reference data acquisition condition is met;
in this embodiment, S201 is the same as S101 of the above embodiment, and is not described herein again.
S202, when the reference data acquisition condition is met, polling each next-level module, and issuing a corresponding polling instruction belonging to the reference type to each polled next-level module;
it should be noted that, if the next-stage module is an extension module, the link of the extension module itself is the connected defense area detector, if the alarm host polls the extension module when meeting the reference data acquisition condition, a polling instruction belonging to the reference type is issued to the extension module, and the extension module obtains the current security data from the connected defense area detector, generates a reference data frame carrying the current security data, and reports the reference data frame to the alarm host.
If the next-level module is a communication module, the link of the communication module is the link from the directly-connected module to the defense area detector, and if the alarm host polls the communication module when meeting the reference data acquisition condition, a polling instruction belonging to the reference type is issued to the communication module; correspondingly, the communication module can request to obtain the reference data of the link of the directly connected module from the directly connected module through the polling instruction belonging to the reference type, the sum of the reference data obtained from each directly connected module is used as the reference data corresponding to the link of the communication module, and a reference data frame carrying the reference data is generated and reported to the alarm host. Wherein, if the directly connected module is a communication module, the reference data of the link of the directly connected module is as follows: the directly connected modules request the sum of the reference data of the self links of each connected module obtained through the polling instruction belonging to the reference type, and so on; and if the directly connected module is an extended module, the reference data of the link of the directly connected module is as follows: and obtaining current security data from the connected defense area detectors.
Optionally, in a specific implementation, the data format of the polling instruction may be as follows:
Byte(1) Byte(2) Byte(3) Byte(4) Byte(5) Byte(6) Byte(7)
Start Addr1 Addr2 Length Type Command Checksum
wherein, Start: the packet head, such as: 0xA 3;
addr 1: a sender address;
addr 2: receiver address
Length: the length of the data;
type: the packet type specifically refers to: ascending or descending;
and (2) Command: command values, different values representing a polling command of a differential type and a polling command of a reference type;
checksum: and checking the value.
The data format of the response frame (reference data frame and differential data frame) corresponding to the polling command is as follows:
Byte(1) Byte(2) Byte(3) Byte(4) Byte(5) Byte(6) Byte(7)-Byte(N) Byte(N+1)
Start Addr1 Addr2 Length Type Command Data(1)-Data(N-6) Checksum
assuming that the extension module supports 8 defense areas, when a polling command belonging to a reference type is sent to the extension module, the format of a parameter data frame fed back is as follows:
Byte(1) Byte(2) Byte(3) Byte(4) Byte(5) Byte(6) Byte(7)-Byte(22) Byte(23)
Start Addr1 Addr2 Length Type Command Data(1)-Data(16) Checksum
and Data (1) -Data (16) are returned defense area indexes and security Data, wherein Data (1) is a defense area 1 index, Data (2) is security Data of the defense area 1, Data (3) is a defense area 2 index, Data (4) is security Data of the defense area 2, and the like.
S203, receiving a reference data frame which is fed back by each next-stage module and carries the current security data corresponding to the link of the next-stage module;
s204, determining the security data in the received reference data frame as reference data corresponding to the link of each next-level module;
after the reference data frame carrying the current security data corresponding to the link of each next-stage module is obtained, the security data can be extracted from the received reference data frame, and the extracted security data is determined as the reference data corresponding to the link of each next-stage module.
S205, when the reference data acquisition condition is not met, polling each next-stage module, and issuing a corresponding polling instruction belonging to a differential type to each polled next-stage module;
in order to ensure high efficiency of data transmission and eliminate the time meeting the reference data acquisition condition, the alarm host can poll each next-level module and issue corresponding polling instructions belonging to a differential type to each polled next-level module so as to obtain differential data corresponding to a link of each next-level module, thereby reducing the data volume.
It should be noted that, if the next-stage module is an extension module, the link of the extension module itself is the connected defense area detector, and when the alarm host requests the extension module for differential data, the alarm host issues a corresponding polling instruction belonging to a differential type to the extension module; correspondingly, the expansion module can determine the latest security data obtained from the connected defense area detector, determine the data obtained by the alarm host from the last polling of the expansion module, calculate the difference value of the determined two types of data, obtain the difference data corresponding to the expansion module, further generate a difference data frame carrying the calculated difference data, and report the difference data frame to the alarm host.
If the next-level module is a communication module, the link of the communication module is the link from each directly-connected module to the defense area detector, and when the alarm host requests differential data from the communication module, a polling instruction belonging to a differential type is issued to the communication module; correspondingly, the communication module can request to obtain the differential data of the link of each directly connected module from each directly connected module based on the differential polling instruction, calculate the differential value between the differential data obtained from each directly connected module and the data obtained by the alarm host from the communication module in the last polling process, obtain the differential data corresponding to the link of the communication module, generate the differential data frame carrying the differential data and report the differential data frame to the alarm host. If the directly connected module is a communication module, the differential data of the link of the directly connected module is as follows: the directly connected module obtains differential data from the connected module through a differential type polling instruction, and the communication module polls the directly connected module last time to obtain a differential value of the data; and if the directly connected module is an expansion module, the differential data of the link of the directly connected module is as follows: the security data obtained by the directly connected module from the connected defense area detector and the difference value of the data obtained by the communication module from the directly connected module in the last polling process are obtained.
It should be emphasized that, in a security monitoring system, in order to ensure timely and efficient risk handling, the detection priorities for different defense areas may be different, and generally, the higher the number of alarms is, the higher the detection priority is for the defense area. Based on the processing idea, the step of polling each next-stage module to obtain the differential data corresponding to the link of each next-stage module when the reference data obtaining condition is not met may include:
and when the reference data acquisition condition is not met, polling each next-level module according to the polling priority of each next-level module, and issuing a corresponding polling instruction belonging to a differential type to each next-level module polled.
The polling priority of each next-level module may be manually set, or may be automatically set according to a certain reference standard, which is specifically referred to the relevant content in the above embodiments.
Note that, as for the data format of the polling command belonging to the differential type, the data format of the polling command described above can be referred to.
S206, receiving a differential data frame which is fed back by each next-stage module and carries differential data corresponding to the link of the next-stage module;
s207, differential data is extracted from the received differential data frame.
After receiving the differential data frame sent by each next-stage module, the differential data can be extracted from the received differential data frame, so as to obtain the polled differential data of the link of each next-stage module.
Assuming that at a certain polling time, the complete security data obtained from an extension module is as follows:
D(1) D(2) D(3) D(4) D(5) D(6) D(7) D(8) D(9) D(10) D(11) D(12) D(13) D(14) D(15) D(16)
1 0 2 0 3 0 4 1 5 0 6 0 7 0 8 0
after the polling is finished, the security data is changed into:
D(1) D(2) D(3) D(4) D(5) D(6) D(7) D(8) D(9) D(10) D(11) D(12) D(13) D(14) D(15) D(16)
1 1 2 0 3 0 4 0 5 0 6 0 7 0 8 0
the next polling uses a differential polling command to query the expansion module, and if only the states of the defense areas 1 and 4 are changed, the differential data frame to be sent is:
Byte(1)-Byte(6) Byte(7) Byte(8) Byte(9) Byte(10) Byte(11)
Start-Command 1 1 4 0 Checksum
the data length of the differential data carried by the differential data frame is 4 bits.
In this embodiment, only when the reference data acquisition condition is met, a polling instruction belonging to a reference type is issued to each next-stage module polled to acquire reference data of a link of each next-stage module; and other moments issue polling instructions belonging to a differential type to each next-level module polled, so that differential data of each next-level module is obtained, and the data volume is greatly reduced.
The following describes a data transmission method provided by the present application from the perspective of a communication module.
As shown in fig. 5, from the perspective of the communication module, the security monitoring method provided by the present application may include the following steps:
s301, monitoring whether a superior module requests data from the communication module;
the upper-level module corresponding to the communication module can be another communication module or an alarm host.
S302, when the condition that the previous-stage module requests data from the communication module and the data type is the reference type is monitored, polling each next-stage module to obtain current security data corresponding to a link of each next-stage module;
since the method is described in the present embodiment from the perspective of standing on the communication module, the next-level module described in the present embodiment is a next-level module corresponding to the communication module.
It should be noted that, if the next-stage module is an extension module, the link of the extension module itself is the connected defense area detector, and if the communication module requests the reference type data from the extension module, the extension module obtains the current security data from the connected defense area detector and reports the security data to the alarm host.
And if the next-stage module is another communication module, the link of the other communication module is a link from the directly-connected module to the defense area detector, if the communication module requests the other communication module for data of a reference type, the other communication module requests the directly-connected module to obtain reference data of the link of the directly-connected module from the directly-connected module, and the sum of the reference data obtained from the directly-connected modules is used as reference data corresponding to the link of the other communication module and reported to the communication module. Wherein, the reference data of the link of the directly connected module is as follows: the directly connected module requests the sum of the reference data of the self-link of each connected module, and so on.
S303, determining the current security data obtained by polling as reference data corresponding to the communication module link, and feeding the reference data back to the previous-stage module;
the reference data corresponding to the communication module link is as follows: the sum of the reference data reported by each next-level module of the communication module.
S304, when the condition that the upper-level module requests data from the communication module and the data type is a differential type is monitored, differential data corresponding to a link of the communication module is obtained;
the differential data corresponding to the communication module link is as follows: a difference value of the second latest data with respect to the second standard data, the second latest data being: the latest differential data corresponding to the link of each next-stage module is as follows: the last data request of the communication module is obtained by the last module.
Optionally, in an implementation manner, the communication module may request each next-stage module to obtain differential data corresponding to its own link of each next-stage module, and determine a sum of the obtained differential data corresponding to its own link of each next-stage module as the differential data corresponding to its own link of the communication module.
It should be noted that, if the next-stage module is an extension module, the link of the extension module itself is the connected defense area detector, and if the communication module requests differential data from the extension module, the extension module can determine two types of data, and calculate the differential value between the two types of data, to obtain the differential data corresponding to the link of the extension module itself and report to the communication module; wherein, one kind of data in the two kinds of data is: the latest security data obtained from the connected defense area detectors, and the other type of data is as follows: the communication module polls the last data from the expansion module.
And if the next-stage module is another communication module, the link of the other communication module is a link from each directly-connected module to the defense area detector, when the communication module requests differential data from the other communication module, the other communication module can request to obtain the differential data of the link of each directly-connected module from each directly-connected module, and calculate a differential value between the differential data obtained from each directly-connected module and the data obtained by the communication module from the other communication module in the last polling, so as to obtain the differential data corresponding to the link of the other communication module and report the differential data to the communication module. If the directly connected module is a communication module, the differential data of the link of the directly connected module is as follows: the directly connected module obtains the differential data from the connected module, and the other communication module obtains the differential value of the data from the directly connected module in the last polling; and if the directly connected module is an expansion module, the differential data of the link of the directly connected module is as follows: the security data obtained by the module directly connected from the connected defense area detector and the difference value of the data obtained by the other communication module from the module directly connected last time through polling are obtained.
Optionally, in another implementation manner, in order to further improve the communication efficiency, the communication module may store, in advance, differential data corresponding to a link of each next-stage module, and further, when the previous-stage module requests the differential data, the communication module may determine, directly based on the pre-stored data, the differential data corresponding to the link of the communication module itself. Based on the processing idea, the method provided by this embodiment may further include:
polling each next-level module to obtain differential data corresponding to a link of each next-level module;
accordingly, the second latest data is: the communication module stores the latest differential data corresponding to the link of each next-level module.
It should be emphasized that, in a security monitoring system, in order to ensure timely and efficient risk handling, the detection priorities for different defense areas may be different, and generally, the higher the number of alarms is, the higher the detection priority is for the defense area. Based on the processing idea, the polling each next-stage module to obtain the differential data corresponding to the link of each next-stage module may include:
and polling each next-level module according to the polling priority of each next-level module to obtain the differential data corresponding to the link of each next-level module.
The polling priority of each next-level module can be set manually, or can be set automatically according to a certain reference standard.
Optionally, in an implementation manner, the determining manner of the polling priority of each next-level module of the communication module may include:
determining the data length of the differential data fed back by each next-stage module in a second preset time period;
calculating the polling priority of each next-level module according to the data length corresponding to each next-level module and the total length of the second data; wherein the total length of the second data is: and the sum of the data lengths corresponding to the next-level modules.
For example: the calculation process of the priority of the next-level module B0-Bm corresponding to the communication module may include:
accumulating the lengths of the differential data of the next-stage module B0-Bm in a certain time period to obtain the data length corresponding to each next-stage module, wherein the polling priority of the next-stage module Bx is the data length SBx of the next-stage module Bx
Figure BDA0001505718550000221
For the next-level module Bx, the polling process according to the polling priority is as follows: in the total number of times of
Figure BDA0001505718550000222
In the polling process, the polling times of the next-stage module Bx is SBx, namely every other time
Figure BDA0001505718550000223
And polling once.
It should be emphasized that the above-described manner of automatically setting the polling priority is given as an example only and should not be construed as limiting the present application.
S305, feeding back the differential data corresponding to the link of the communication module to the previous module.
After obtaining the differential data corresponding to the communication module, the differential data corresponding to the link of the communication module is fed back to the previous-stage module.
In this embodiment, the communication module polls each next-level module only when the previous-level module requests reference data, obtains and reports current security data corresponding to a link of each next-level module; when the last-stage module requests the differential data, the differential data corresponding to the link of the last-stage module is obtained and reported, and the data volume is greatly reduced.
A data transmission method provided by the present application from the perspective of a communication module is described below with reference to specific embodiments.
As shown in fig. 6, from the perspective of a communication module, a data transmission method provided by the present application may include the following steps:
s401, monitoring whether a superior module issues a polling instruction to the communication module;
the data format of the polling command may refer to the specific format of the polling command given in the above embodiments, and is not described herein again.
S402, when it is monitored that the previous-stage module issues the polling instruction to the communication module and the issued polling instruction is of a reference type, polling each next-stage module, and issuing the corresponding polling instruction belonging to the reference type to each next-stage module polled;
it should be noted that, if the next-stage module is an extension module, the link of the extension module itself is the connected defense area detector, and if the communication module polls the extension module, a polling instruction belonging to the reference type is issued to the extension module; correspondingly, the expansion module obtains the current security data from the connected defense area detector, generates a reference data frame carrying the current security data and reports the reference data frame to the communication module.
If the next-stage module is another communication module, the link of the other communication module is a link from the directly-connected module to the defense area detector, and if the communication module polls the other communication module, a polling instruction belonging to a reference type is issued to the other communication module; correspondingly, the other communication module may request to obtain the reference data of the link of the directly connected module from the directly connected module through the polling instruction belonging to the reference type, and the sum of the reference data obtained from each directly connected module is used as the reference data corresponding to the link of the other communication module, so as to generate a reference data frame carrying the reference data and report the reference data frame to the communication module. Wherein, if the directly connected module is a communication module, the reference data of the link of the directly connected module is as follows: the directly connected modules request the sum of the reference data of the self links of each connected module obtained through the polling instruction belonging to the reference type, and so on; and if the directly connected module is an expansion module, the reference data of the link of the directly connected module is the current security data obtained from the connected defense area detector.
S403, receiving reference data frames which are fed back by each next-stage module and carry current security data corresponding to the link of the next-stage module, and extracting the security data from the received reference data frames;
s404, determining the current security data obtained by polling as reference data corresponding to the communication module link;
s405, generating a reference data frame carrying the reference data, and feeding the generated reference data frame back to the previous-stage module;
the data format of the reference data frame may refer to the format of the response frame corresponding to the polling command in the above embodiments, which is not described herein again.
S406, when the polling instruction issued by the previous-stage module is monitored and the issued polling instruction is of a differential type, obtaining differential data corresponding to a link of the communication module;
optionally, in an implementation manner, the communication module may poll each next-stage module, issue a polling instruction belonging to a differential type to each next-stage module polled to obtain differential data corresponding to a link of each next-stage module, and determine a sum of the obtained differential data corresponding to the link of each next-stage module as the differential data corresponding to the link of the communication module.
It should be noted that, if the next-stage module is an extension module, the link of the extension module itself is the connected defense area detector, and if the communication module requests the extension module for differential data, a polling instruction belonging to a differential type is issued to the extension module; correspondingly, the expansion module can determine the latest security data obtained from the connected defense area detector, determine the data obtained by the communication module from the last polling of the expansion module, calculate the difference value of the determined two types of data, obtain the differential data corresponding to the link of the expansion module, generate a differential data frame carrying the obtained differential data, and report the differential data frame to the communication module.
If the next-stage module is another communication module, the link of the other communication module is the link from each direct-connected module to the defense area detector, and when the communication module requests the other communication module for differential data, a polling instruction belonging to a differential type is issued to the other communication module; correspondingly, the other communication module may request to obtain the differential data of the link of each directly connected module from each directly connected module, calculate a differential value between the differential data obtained from each directly connected module and the data obtained by the communication module from the other communication module in the last polling process, obtain the differential data corresponding to the link of the other communication module, generate a differential data frame carrying the obtained differential data, and report the differential data frame to the communication module. If the directly connected module is a communication module, the differential data of the link of the directly connected module is as follows: the directly connected module obtains the differential data from the connected module, and the other communication module obtains the differential value of the data from the directly connected module in the last polling; and if the directly connected module is an expansion module, the differential data of the link of the directly connected module is as follows: the security data obtained by the module directly connected from the connected defense area detector and the difference value of the data obtained by the other communication module from the module directly connected last time through polling are obtained.
Optionally, in another implementation manner, in order to further improve the communication efficiency, the communication module may store, in advance, differential data corresponding to a link of each next-stage module, and further, when the previous-stage module requests the differential data, the communication module may determine, directly based on the pre-stored data, the differential data corresponding to the link of the communication module itself. Based on the processing idea, the method provided by this embodiment may further include:
polling each next-level module, issuing a polling instruction belonging to a differential type to each next-level module polled to obtain differential data corresponding to a link of each next-level module;
accordingly, the second latest data is: the communication module stores the latest differential data corresponding to the link of each next-level module.
S407, generating a differential data frame carrying differential data corresponding to the link of the communication module itself, and feeding back the differential data frame to the previous-stage module.
After obtaining the differential data corresponding to the link of the communication module, a differential data frame carrying the differential data corresponding to the link of the communication module can be generated, and the differential data frame is fed back to the previous-stage module.
The data format of the differential data frame may refer to the data format of the response frame corresponding to the polling instruction in the foregoing embodiment, which is not described herein again.
In this embodiment, the communication module polls each next-level module only when the previous-level module issues a polling instruction of a reference type, and issues a polling instruction of the reference type to each next-level module, so as to obtain and report current security data corresponding to a link of each next-level module; when the upper-level module issues the polling instruction belonging to the differential type, the differential data corresponding to the self link is obtained and reported, and the data volume is greatly reduced. Therefore, through the scheme, the bus communication is not easy to block when the security monitoring system is expanded on a large scale, and therefore the security monitoring system has high data transmission efficiency.
A data transmission method provided by the present application is described below from the perspective of an expansion module.
As shown in fig. 7, from the perspective of the expansion module, a data transmission method provided by the present application may include the following steps:
s501, monitoring whether a previous-stage module requests data from the expansion module;
the upper-level module corresponding to the expansion module can be an alarm host or a communication module.
S502, when the condition that the previous-stage module requests data from the expansion module and the data type is the reference type is monitored, detecting each defense area detector connected with the expansion module to obtain the current security data of each defense area detector;
when the previous-stage module is monitored to request data from the expansion module and the data type is the reference type, the previous-stage module is indicated to hope to obtain complete data, therefore, the expansion module can detect each defense area detector connected with the expansion module to obtain the current security data of each defense area detector.
S503, determining the current security data as reference data corresponding to the link of the expansion module, and feeding the reference data back to the previous-stage module;
s504, when the previous-stage module is monitored to request data from the expansion module and the data type is a differential type, obtaining differential data corresponding to a link of the expansion module;
the differential data corresponding to the link of the expansion module is as follows: a difference value of the third latest data with respect to the third standard data, the third latest data being: the latest security data of each defense area detector connected with the extension module is as follows: the last data request of the last level module to the expansion module is obtained.
Optionally, in an implementation manner, a specific implementation manner of obtaining the differential data corresponding to the link of the expansion module may be: and detecting each defense area detector to obtain security data of each defense area detector, and taking a difference value between the obtained security data and a result obtained by a last data request of the previous-stage module for the expansion module as the difference data corresponding to the link of the expansion module.
Optionally, in another implementation manner, in order to further improve communication efficiency, the expansion module may store security data of each defense area detector in advance, and then determine, when the previous-stage module requests differential data, differential data corresponding to a link of the expansion module itself based on the stored data. Based on the processing idea, the method provided by the application may further include:
detecting each defense area detector connected with the expansion module to obtain security data of each defense area detector, and storing the security data obtained by detection;
accordingly, the third latest data is: the latest data in the security data of each defense area detector stored by the expansion module.
And S505, feeding back the differential data corresponding to the link of the expansion module to the previous-stage module.
After obtaining the differential data corresponding to the link of the expansion module itself, the differential data corresponding to the link of the expansion module itself may be fed back to the previous-stage module.
In this embodiment, the extension module detects each defense area detector connected to the extension module only when the previous-stage module requests reference data, obtains current security data of each defense area detector, and reports the current security data; when the last-stage module requests the differential data, the differential data corresponding to the link of the last-stage module is obtained and reported, and the data volume is greatly reduced.
A data transmission method provided by the present application from the perspective of the expansion module is described below with reference to specific embodiments.
As shown in fig. 8, from the perspective of the expansion module, a data transmission method provided by the present application may include the following steps:
s601, monitoring whether the upper-level module issues a polling instruction to the expansion module;
the data format of the polling command may refer to the data format of the polling command in the above embodiments, which is not described herein again.
S602, when the previous-stage module is monitored to issue a polling instruction to the expansion module and the issued polling instruction is a reference type, detecting each defense area detector connected with the expansion module to obtain current security data of each defense area detector;
s603, determining the current security data as reference data corresponding to the link of the expansion module;
s604, generating a reference data frame carrying the reference data, and feeding the generated reference data frame back to the previous-stage module;
the data format of the reference data frame may refer to the data format of the response frame of the polling command in the above embodiments, which is not described herein again.
S605, when the polling instruction issued by the previous-stage module is monitored and the issued polling instruction is of a differential type, obtaining differential data corresponding to a link of the expansion module;
optionally, in an implementation manner, a specific implementation manner of obtaining the differential data corresponding to the link of the expansion module may be: and detecting each defense area detector to obtain security data of each defense area detector, and taking a difference value between the obtained security data and a result obtained by a last data request of the previous-stage module for the expansion module as the difference data corresponding to the link of the expansion module.
Optionally, in another implementation manner, in order to further improve communication efficiency, the expansion module may store security data of each defense area detector in advance, and then determine, when the previous-stage module requests differential data, differential data corresponding to a link of the expansion module based on the stored data. Based on the processing idea, the method provided by the application may further include:
detecting each defense area detector connected with the expansion module to obtain security data of each defense area detector, and storing the security data obtained by detection;
accordingly, the third latest data is: the latest data in the security data of each defense area detector stored by the expansion module.
S606, generating a differential data frame carrying the differential data, and feeding the generated differential data frame back to the previous module.
After obtaining the differential data corresponding to the link of the expansion module itself, a differential data frame carrying the differential data may be generated, and the generated differential data frame is fed back to the previous-stage module.
The data format of the differential data frame may refer to the data format of the response frame of the polling command in the foregoing embodiment, which is not described herein again.
In this embodiment, the extension module detects each defense area detector connected to the extension module only when the previous-stage module issues a polling instruction belonging to a reference type, obtains current security data of each defense area detector, and reports the security data; when the upper-level module issues the polling instruction belonging to the differential type, the differential data corresponding to the self link is obtained and reported, and the data volume is greatly reduced.
Corresponding to the method embodiment provided from the perspective of the alarm host, the application provides a data transmission device, which is applied to the alarm host in a security monitoring system; as shown in fig. 9, the apparatus may include:
a monitoring unit 910, configured to monitor whether a reference data acquisition condition is met;
a reference data obtaining unit 920, configured to poll each next-stage module when the reference data obtaining condition is met, and obtain reference data corresponding to a link of each next-stage module; the reference data is current security data;
a differential data obtaining unit 930, configured to poll each next-stage module when the reference data obtaining condition is not met, and obtain differential data corresponding to a link of each next-stage module; the differential data corresponding to the link of any next-stage module is as follows: the difference value of the first latest data of the next-stage module relative to the first standard data is as follows: the latest differential data corresponding to the link of the next-stage module is the following first standard data: and the alarm host computer obtains the result of the last data request of the next-stage module.
In the scheme provided by the application, the reference data of the link of each next-stage module is obtained only when the reference data obtaining condition is met; and all the other moments obtain the differential data of each next-level module, so that the data volume is greatly reduced, and therefore, the scheme can ensure that bus communication is not easy to block when the security monitoring system is expanded on a large scale, and the security monitoring system has higher data transmission efficiency. Optionally, the reference data obtaining unit 920 may include:
the first polling instruction issuing subunit is used for polling each next-level module when the reference data acquisition condition is met, and issuing a corresponding polling instruction belonging to the reference type to each polled next-level module;
the reference data frame obtaining subunit is used for receiving the reference data frame which is fed back by each next-stage module and carries the current security data corresponding to the link of the reference data frame;
and the reference data obtaining subunit is used for determining the security data in the received reference data frame as the reference data corresponding to the link of each next-level module.
Alternatively, the differential data obtaining unit 930 may include:
the first polling instruction issuing subunit is used for polling each next-stage module when the reference data acquisition condition is not met, and issuing a corresponding polling instruction belonging to a differential type to each polled next-stage module;
the differential data frame obtaining subunit is used for receiving the differential data frames which are fed back by each next-stage module and carry the differential data corresponding to the own link;
and a differential data obtaining subunit, configured to extract differential data from the received differential data frame.
Optionally, the differential data obtaining unit 930 is specifically configured to:
and when the reference data acquisition condition is not met, polling each next-level module according to the polling priority of each next-level module to obtain the differential data corresponding to the link of each next-level module.
Optionally, the determining manner of the polling priority of each next-level module of the alarm host may include:
determining the data length of differential data fed back by each next-stage module within a first preset time period;
determining the polling priority of each next-level module of the alarm host according to the data length corresponding to each next-level module and the total first data length; and the total length of the first data is the sum of the data lengths corresponding to the next-stage modules.
Corresponding to the embodiment of the method provided from the perspective of the communication module, the application also provides a data transmission device, which is applied to the communication module in a security monitoring system; as shown in fig. 10, the apparatus may include:
a first monitoring unit 1010, configured to monitor whether a previous module requests data from the communication module;
a first security data obtaining unit 1020, configured to poll each next-level module when it is monitored that the previous-level module requests data from the communication module and the data type is a reference type, and obtain current security data corresponding to a link of each next-level module;
the first data feedback unit 1030 is configured to determine current security data obtained through polling as reference data corresponding to a link of the communication module, and feed the reference data back to the previous-stage module;
the first differential data obtaining unit 1040 is configured to obtain differential data corresponding to a link of the communication module when it is monitored that the previous-stage module requests data from the communication module and the data type is a differential type; the differential data corresponding to the communication module link is as follows: a difference value of the second latest data with respect to the second standard data, the second latest data being: the latest differential data corresponding to the link of each next-stage module is as follows: the last data request result of the last level module to the communication module;
a second data feedback unit 1050, configured to feed back differential data corresponding to the link of the communication module to the previous-stage module.
In this embodiment, the communication module polls each next-level module only when the previous-level module requests reference data, obtains and reports current security data corresponding to a link of each next-level module; when the last-stage module requests the differential data, the differential data corresponding to the link of the last-stage module is obtained and reported, and the data volume is greatly reduced. Optionally, the apparatus provided in this embodiment may further include:
the polling unit is used for polling each next-level module to obtain differential data corresponding to the link of each next-level module;
correspondingly, the second latest data is: and the communication module stores the latest differential data corresponding to the link of each next-stage module.
Optionally, the first listening unit 1010 is specifically configured to:
monitoring whether a previous-stage module issues a polling instruction to the communication module;
the first security data obtaining unit 1020 may include:
the instruction issuing subunit is used for polling each next-level module and issuing a corresponding polling instruction belonging to the reference type to each next-level module polled when the previous-level module is monitored to issue the polling instruction to the communication module and the issued polling instruction is of the reference type;
the security data acquisition subunit is used for receiving the reference data frame which is fed back by each next-level module and carries the current security data corresponding to the link of the security data acquisition subunit, and extracting the security data from the received reference data frame;
the first data feedback unit 1030 is specifically configured to:
and determining the current security data obtained by polling as reference data corresponding to the communication module link, generating a reference data frame carrying the reference data, and feeding the generated reference data frame back to the previous-stage module.
Optionally, the first listening unit 1010 is specifically configured to:
monitoring whether a previous-stage module issues a polling instruction to the communication module;
the first differential data obtaining unit 1040 may include:
the differential data acquisition subunit is used for acquiring differential data corresponding to a link of the communication module when the fact that the upper-level module issues the polling instruction to the communication module and the issued polling instruction is of a differential type is monitored;
the second data feedback unit 1050 is specifically configured to:
and generating a differential data frame carrying differential data corresponding to the communication module link, and feeding the differential data frame back to the previous-stage module.
Optionally, the polling unit is specifically configured to:
and polling each next-level module according to the polling priority of each next-level module to obtain the differential data corresponding to the link of each next-level module.
Optionally, the determining manner of the polling priority of each next-level module of the communication modules includes:
determining the data length of the differential data fed back by each next-stage module in a second preset time period;
calculating the polling priority of each next-level module according to the data length corresponding to each next-level module and the total length of the second data; wherein the total length of the second data is: and the sum of the data lengths corresponding to the next-level modules.
Corresponding to the method embodiment provided from the perspective of the expansion module, the application also provides a data transmission device, which is applied to the expansion module in a security monitoring system; as shown in fig. 11, the apparatus may include:
a second monitoring unit 1110, configured to monitor whether a previous module requests data from the extension module;
a second security data obtaining unit 1120, configured to detect each defense area detector connected to the expansion module when it is monitored that the previous-stage module requests data from the expansion module and the data type is a reference type, so as to obtain current security data of each defense area detector;
a third data feedback unit 1130, configured to determine current security data as reference data corresponding to a link of the expansion module itself, and feed back the reference data to the previous-stage module;
a second differential data obtaining unit 1140, configured to obtain differential data corresponding to a link of the expansion module when it is monitored that the previous-stage module requests data from the expansion module and the data type is a differential type; the differential data corresponding to the link of the expansion module is as follows: a difference value of the third latest data with respect to the third standard data, the third latest data being: the latest security data of each defense area detector connected with the expansion module are as follows: the last data request of the last level module to the expansion module is obtained;
a fourth data feedback unit 1150, configured to feed back the differential data corresponding to the link of the expansion module to the previous-stage module.
In this embodiment, the extension module detects each defense area detector connected to the extension module only when the previous-stage module requests reference data, obtains current security data of each defense area detector, and reports the current security data; when the last-stage module requests the differential data, the differential data corresponding to the link of the last-stage module is obtained and reported, and the data volume is greatly reduced. Optionally, the apparatus provided in this embodiment may further include:
the detection unit is used for detecting each defense area detector connected with the expansion module to obtain security data of each defense area detector and storing the detected security data;
the third latest data is: and the expansion module stores the latest data in the security data of each defense area detector.
Optionally, the second listening unit 1110 is specifically configured to: monitoring whether a previous-stage module issues a polling instruction to the extension module or not;
the second security data obtaining unit 1120 is specifically configured to:
when the fact that a previous-stage module issues a polling instruction to the expansion module and the issued polling instruction is of a reference type is monitored, detecting each defense area detector connected with the expansion module to obtain current security data of each defense area detector;
the third data feedback module 1130 is specifically configured to:
and determining the current security data as reference data corresponding to the link of the expansion module, generating a reference data frame carrying the reference data, and feeding back the generated reference data frame to the previous-stage module.
Optionally, the second monitoring unit 1110 is specifically configured to:
monitoring whether a previous-stage module issues a polling instruction to the extension module or not;
the second differential data obtaining unit 1140 is specifically configured to:
when the condition that the upper-level module issues a polling instruction to the defense area communication module and the issued polling instruction is of a differential type is monitored, differential data corresponding to a link of the expansion module is obtained;
the fourth data feedback unit 1150 is specifically configured to:
and generating a differential data frame carrying the differential data, and feeding the generated differential data frame back to the previous-stage module.
Corresponding to the data transmission method provided from the angle of the alarm host, the embodiment of the application also provides an electronic device, wherein the electronic device is the alarm host in the security monitoring system; as shown in fig. 12, the electronic apparatus includes: an internal bus 1210, a memory (memory)1220, a processor (processor)1230, and a communication Interface (Communications Interface) 1240; the processor 1230, the communication interface 1240 and the memory 1220 are all in communication with each other via the internal bus 1210;
the memory 1220 is configured to store a machine-executable instruction corresponding to a data transmission method;
the processor 1230 is configured to read the machine-readable instructions on the memory 1220 and execute the instructions to implement the following operations:
monitoring whether the reference data acquisition condition is met;
when the reference data acquisition condition is met, polling each next-level module to acquire reference data corresponding to a link of each next-level module; the reference data is current security data;
when the reference data acquisition condition is not met, polling each next-stage module to acquire differential data corresponding to a link of each next-stage module; the differential data corresponding to the link of any next-stage module is as follows: the difference value of the first latest data of the next-stage module relative to the first standard data is as follows: the latest differential data corresponding to the link of the next-stage module is the following first standard data: and the alarm host computer obtains the result of the last data request of the next-stage module.
In this embodiment, for the related description of the specific steps of the data transmission method, reference may be made to the description content in the method embodiment provided from the perspective of the alarm host in the present application, and details are not described herein.
Corresponding to the data transmission method provided from the perspective of the communication module, the embodiment of the application further provides an electronic device, wherein the electronic device is a communication module in a security monitoring system; the electronic device includes: an internal bus, a memory, a processor, and a communication interface; the processor, the communication interface and the memory complete mutual communication through the internal bus;
the memory is used for storing machine feasible instructions corresponding to the data transmission method;
the processor is configured to read the machine-readable instructions on the memory and execute the instructions to implement the following operations:
monitoring whether a previous-stage module requests data from the electronic equipment;
when the condition that the previous-stage module requests data from the electronic equipment and the data type is the reference type is monitored, polling each next-stage module to obtain current security data corresponding to a link of each next-stage module;
determining current security data obtained by polling as reference data corresponding to a link of the electronic equipment, and feeding the reference data back to the upper-level module;
when the condition that the upper-level module requests data from the electronic equipment and the data type is a differential type is monitored, obtaining differential data corresponding to a link of the electronic equipment; the differential data corresponding to the link of the electronic device is as follows: a difference value of the second latest data with respect to the second standard data, the second latest data being: the latest differential data corresponding to the link of each next-stage module is as follows: the last data request of the electronic equipment is requested by the last module;
and feeding back differential data corresponding to the link of the electronic equipment to the previous-stage module.
The structure of the electronic device in this embodiment is the same as that of the electronic device (i.e., the alarm host) in the previous embodiment, and specific structure may refer to fig. 12.
In this embodiment, for the related description of the specific steps of the data transmission method, reference may be made to the description content in the method embodiment provided in the present application from the perspective of the communication module, which is not described herein again.
Corresponding to the data transmission method provided from the perspective of the expansion module, the embodiment of the application further provides an electronic device, wherein the electronic device is an expansion module in a security monitoring system; the electronic device includes: an internal bus, a memory, a processor, and a communication interface; the processor, the communication interface and the memory complete mutual communication through the internal bus;
the memory is used for storing machine feasible instructions corresponding to the data transmission method;
the processor is configured to read the machine-readable instructions on the memory and execute the instructions to implement the following operations:
monitoring whether a previous-stage module requests data from the electronic equipment;
when the condition that the previous-stage module requests data from the electronic equipment and the data type is the reference type is monitored, detecting each defense area detector connected with the expansion module to obtain current security data of each defense area detector;
determining the current security data as reference data corresponding to a link of the electronic equipment, and feeding the reference data back to the upper-level module;
when the condition that the upper-level module requests data from the electronic equipment and the data type is a differential type is monitored, obtaining differential data corresponding to a link of the electronic equipment; the differential data corresponding to the link of the electronic device is as follows: a difference value of the third latest data with respect to the third standard data, the third latest data being: the latest security data of each defense area detector connected with the electronic equipment are as follows: the last data request of the electronic equipment is requested by the last module;
and feeding back differential data corresponding to the link of the electronic equipment to the previous-stage module.
The structure of the electronic device in this embodiment is the same as that of the electronic device (i.e., the alarm host) in the previous embodiment, and specific structure may refer to fig. 12.
In this embodiment, for the related description of the specific steps of the data transmission method, reference may be made to the description content in the method embodiment provided in the present application from the perspective of the expansion module, which is not described herein again.
For the device embodiments, since they substantially correspond to the method embodiments, reference may be made to the partial description of the method embodiments for relevant points. The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules can be selected according to actual needs to achieve the purpose of the scheme of the application. One of ordinary skill in the art can understand and implement it without inventive effort.
The above description is only exemplary of the present application and should not be taken as limiting the present application, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present application should be included in the scope of protection of the present application.

Claims (22)

1. A security monitoring system, comprising: the system comprises an alarm host, a plurality of communication modules and a plurality of expansion modules; each communication module comprises a state port and at least one expansion port, and each expansion module comprises a state port and at least one expansion port;
the alarm host is communicated with the corresponding next-level module through a bus and used for executing alarm processing according to the data obtained by polling the corresponding next-level module; wherein, the next level module that the alarm host computer corresponds includes: at least one communication module and/or at least one expansion module;
when the reference data acquisition condition is met, the alarm host is used for polling each next-level module to acquire reference data corresponding to a link of each next-level module; the reference data is current security data; when the reference data acquisition condition is not met, the alarm host is used for polling each next-stage module to obtain differential data corresponding to the link of each next-stage module; the differential data corresponding to the link of any next-stage module is as follows: the difference value of the first latest data of the next-stage module relative to the first standard data is as follows: the latest differential data corresponding to the link of the next-stage module is the following first standard data: the alarm host computer obtains the result of the last data request of the next-stage module;
each communication module is communicated with the corresponding upper-level module through a state port of the communication module, is communicated with the corresponding lower-level module through an expansion port of the communication module, and is used for reporting data to the corresponding upper-level module according to the data obtained by polling from the corresponding lower-level module; wherein, the last level module that any communication module corresponds includes: the alarm host or a communication module; the next-level module corresponding to any communication module comprises: at least one communication module and/or at least one expansion module;
each expansion module is communicated with the corresponding upper-level module through a state port of the expansion module, is communicated with the defense area detector through an expansion port of the expansion module, and is used for reporting data to the corresponding upper-level module according to security data obtained from the corresponding defense area detector; wherein, the last level module that any expansion module corresponds includes: a communication module or the alarm host.
2. A data transmission method is characterized in that the method is applied to an alarm host in a security monitoring system; the method comprises the following steps:
monitoring whether the reference data acquisition condition is met;
when the reference data acquisition condition is met, polling each next-level module to acquire reference data corresponding to a link of each next-level module; the reference data is current security data;
when the reference data acquisition condition is not met, polling each next-stage module to acquire differential data corresponding to a link of each next-stage module; the differential data corresponding to the link of any next-stage module is as follows: the difference value of the first latest data of the next-stage module relative to the first standard data is as follows: the latest differential data corresponding to the link of the next-stage module is the following first standard data: and the alarm host computer obtains the result of the last data request of the next-stage module.
3. The method according to claim 2, wherein the step of polling each next-level module to obtain the reference data corresponding to the link of each next-level module when the reference data obtaining condition is met comprises:
when the reference data acquisition condition is met, polling each next-level module, and issuing a corresponding polling instruction belonging to the reference type to each polled next-level module;
receiving a reference data frame which is fed back by each next-stage module and carries current security data corresponding to a link of the next-stage module;
and determining the security data in the received reference data frame as the reference data corresponding to the link of each next-level module.
4. The method according to claim 2 or 3, wherein the step of polling each next-stage module to obtain the differential data corresponding to the link of each next-stage module when the reference data obtaining condition is not met comprises:
when the reference data acquisition condition is not met, polling each next-stage module, and issuing a corresponding polling instruction belonging to a differential type to each polled next-stage module;
receiving a differential data frame which is fed back by each next-stage module and carries differential data corresponding to a self link;
differential data is extracted from the received differential data frame.
5. The method according to claim 2 or 3, wherein when the reference data obtaining condition is not met, polling each next-stage module to obtain differential data corresponding to its own link of each next-stage module includes:
and when the reference data acquisition condition is not met, polling each next-level module according to the polling priority of each next-level module to obtain the differential data corresponding to the link of each next-level module.
6. The method of claim 5, wherein the polling priority of each next level module of the alarm master is determined by:
determining the data length of differential data fed back by each next-stage module within a first preset time period;
determining the polling priority of each next-level module of the alarm host according to the data length corresponding to each next-level module and the total first data length; and the total length of the first data is the sum of the data lengths corresponding to the next-stage modules.
7. A data transmission method is characterized in that the method is applied to a communication module in a security monitoring system; the method comprises the following steps:
monitoring whether a previous-stage module requests data from the communication module;
when the condition that the previous-stage module requests data from the communication module and the data type is a reference type is monitored, polling each next-stage module to obtain current security data corresponding to a link of each next-stage module;
determining the current security data obtained by polling as reference data corresponding to a link of the communication module, and feeding back the reference data to the previous-stage module;
when the condition that the upper-level module requests data from the communication module and the data type is a differential type is monitored, differential data corresponding to a link of the communication module is obtained; the differential data corresponding to the communication module link is as follows: a difference value of the second latest data with respect to the second standard data, the second latest data being: the latest differential data corresponding to the link of each next-stage module is as follows: the last data request result of the last level module to the communication module;
and feeding back differential data corresponding to the communication module link to the upper-level module.
8. The method of claim 7, further comprising:
polling each next-level module to obtain differential data corresponding to a link of each next-level module;
correspondingly, the second latest data is: and the communication module stores the latest differential data corresponding to the link of each next-stage module.
9. The method according to claim 7 or 8, wherein the step of listening whether the higher-level module requests data from the communication module comprises:
monitoring whether a previous-stage module issues a polling instruction to the communication module;
when the step that the previous-level module requests data from the communication module and the data type is the reference type is monitored, polling each next-level module to obtain the current security data corresponding to the link of each next-level module comprises the following steps:
when the fact that the upper-level module issues the polling instruction to the communication module and the issued polling instruction is of a reference type is monitored, polling each lower-level module, and issuing the corresponding polling instruction which belongs to the reference type to each polled lower-level module;
receiving a reference data frame which is fed back by each next-stage module and carries current security data corresponding to a link of the next-stage module, and extracting the security data from the received reference data frame;
the step of feeding back the reference data to the previous-stage module includes:
and generating a reference data frame carrying the reference data, and feeding the generated reference data frame back to the previous-stage module.
10. The method according to claim 7 or 8, wherein the step of listening whether the higher-level module requests data from the communication module comprises:
monitoring whether a previous-stage module issues a polling instruction to the communication module;
the step of obtaining the differential data corresponding to the link of the communication module when it is monitored that the previous-stage module requests data from the communication module and the data type is the differential type includes:
when it is monitored that the upper-level module issues a polling instruction to the communication module and the issued polling instruction is of a differential type, acquiring differential data corresponding to a link of the communication module;
the step of feeding back the differential data corresponding to the communication module link to the previous-stage module includes:
and generating a differential data frame carrying differential data corresponding to the communication module link, and feeding the differential data frame back to the previous-stage module.
11. The method according to claim 8, wherein the step of polling each next-level module to obtain the differential data corresponding to its own link of each next-level module comprises:
and polling each next-level module according to the polling priority of each next-level module to obtain the differential data corresponding to the link of each next-level module.
12. The method of claim 11, wherein determining the polling priority of each next-level module of the communication modules comprises:
determining the data length of the differential data fed back by each next-stage module in a second preset time period;
calculating the polling priority of each next-level module according to the data length corresponding to each next-level module and the total length of the second data; wherein the total length of the second data is: and the sum of the data lengths corresponding to the next-level modules.
13. A data transmission method is characterized in that the method is applied to an expansion module in a security monitoring system; the method comprises the following steps:
monitoring whether a previous-stage module requests data from the expansion module;
when the condition that the previous-stage module requests data from the expansion module and the data type is the reference type is monitored, detecting each defense area detector connected with the expansion module to obtain the current security data of each defense area detector;
determining the current security data as reference data corresponding to a link of the expansion module, and feeding the reference data back to the previous-stage module;
when the condition that the previous-stage module requests data from the expansion module and the data type is a differential type is monitored, obtaining differential data corresponding to a link of the expansion module; the differential data corresponding to the link of the expansion module is as follows: a difference value of the third latest data with respect to the third standard data, the third latest data being: the latest security data of each defense area detector connected with the expansion module are as follows: the last data request of the last level module to the expansion module is obtained;
and feeding back differential data corresponding to the link of the expansion module to the previous-stage module.
14. The method of claim 13, further comprising:
detecting each defense area detector connected with the expansion module to obtain security data of each defense area detector, and storing the security data obtained by detection;
the third latest data is: and the expansion module stores the latest data in the security data of each defense area detector.
15. The method according to claim 13 or 14, wherein the step of listening whether the higher-level module requests data from the expansion module comprises:
monitoring whether a previous-stage module issues a polling instruction to the extension module or not;
when the previous-stage module is monitored to request data from the expansion module and the data type is the reference type, detecting each defense area detector connected with the expansion module to obtain the current security data of each defense area detector, wherein the step comprises the following steps:
when the fact that a previous-stage module issues a polling instruction to the expansion module and the issued polling instruction is of a reference type is monitored, detecting each defense area detector connected with the expansion module to obtain current security data of each defense area detector;
the step of feeding back the reference data to the previous-stage module includes:
and generating a reference data frame carrying the reference data, and feeding the generated reference data frame back to the previous-stage module.
16. The method according to claim 13 or 14, wherein the step of listening whether the higher-level module requests data from the expansion module comprises:
monitoring whether a previous-stage module issues a polling instruction to the extension module or not;
the step of obtaining the differential data corresponding to the link of the expansion module when it is monitored that the previous-stage module requests data from the expansion module and the data type is the differential type includes:
when the condition that the upper-level module issues a polling instruction to the defense area communication module and the issued polling instruction is of a differential type is monitored, differential data corresponding to a link of the expansion module is obtained;
the step of feeding back the differential data to the previous-stage module includes:
and generating a differential data frame carrying the differential data, and feeding the generated differential data frame back to the previous-stage module.
17. A data transmission device is characterized in that the device is applied to an alarm host in a security monitoring system; the device comprises:
the monitoring unit is used for judging whether the reference data acquisition condition is met or not;
the reference data acquisition unit is used for polling each next-level module when the reference data acquisition condition is met, and acquiring reference data corresponding to a link of each next-level module; the reference data is current security data;
the differential data acquisition unit is used for polling each next-level module when the reference data acquisition condition is not met, and acquiring differential data corresponding to a link of each next-level module; the differential data corresponding to the link of any next-stage module is as follows: the difference value of the first latest data of the next-stage module relative to the first standard data is as follows: the latest differential data corresponding to the link of the next-stage module is the following first standard data: and the alarm host computer obtains the result of the last data request of the next-stage module.
18. A data transmission device is characterized in that the data transmission device is applied to a communication module in a security monitoring system; the device comprises:
the first monitoring unit is used for monitoring whether the upper-level module requests data from the communication module;
the first security data obtaining unit is used for polling each next-level module to obtain current security data corresponding to a link of each next-level module when the condition that the previous-level module requests data from the communication module and the data type is a reference type is monitored;
the first data feedback unit is used for determining the current security data obtained by polling as reference data corresponding to the communication module link and feeding the reference data back to the previous-stage module;
the first differential data obtaining unit is used for obtaining differential data corresponding to a link of the communication module when the condition that the last-stage module requests data from the communication module and the data type is a differential type is monitored; the differential data corresponding to the communication module link is as follows: a difference value of the second latest data with respect to the second standard data, the second latest data being: the latest differential data corresponding to the link of each next-stage module is as follows: the last data request result of the last level module to the communication module;
and the second data feedback unit is used for feeding back the differential data corresponding to the communication module link to the upper-level module.
19. A data transmission device is characterized in that the data transmission device is applied to an expansion module in a security monitoring system; the device comprises:
the second monitoring unit is used for monitoring whether the upper-level module requests data from the expansion module;
the second security data obtaining unit is used for detecting each defense area detector connected with the expansion module when the condition that the previous-stage module requests data from the expansion module and the data type is the reference type is monitored, and obtaining the current security data of each defense area detector;
the third data feedback unit is used for determining the current security data as reference data corresponding to the link of the expansion module and feeding the reference data back to the previous-stage module;
the second differential data obtaining unit is used for obtaining differential data corresponding to a link of the expansion module when the condition that the previous-stage module requests data from the expansion module and the data type is a differential type is monitored; the differential data corresponding to the link of the expansion module is as follows: a difference value of the third latest data with respect to the third standard data, the third latest data being: the latest security data of each defense area detector connected with the expansion module are as follows: the last data request of the last level module to the expansion module is obtained;
and the fourth data feedback unit is used for feeding back the differential data corresponding to the link of the expansion module to the previous-stage module.
20. An electronic device is an alarm host in a security monitoring system; characterized in that the electronic device comprises: an internal bus, a memory, a processor, and a communication interface; the processor, the communication interface and the memory complete mutual communication through the internal bus; the memory is used for storing machine feasible instructions corresponding to the data transmission method;
the processor is configured to read the machine-executable instructions on the memory and execute the instructions to:
monitoring whether the reference data acquisition condition is met;
when the reference data acquisition condition is met, polling each next-level module to acquire reference data corresponding to a link of each next-level module; the reference data is current security data;
when the reference data acquisition condition is not met, polling each next-stage module to acquire differential data corresponding to a link of each next-stage module; the differential data corresponding to the link of any next-stage module is as follows: the difference value of the first latest data of the next-stage module relative to the first standard data is as follows: the latest differential data corresponding to the link of the next-stage module is the following first standard data: and the alarm host computer obtains the result of the last data request of the next-stage module.
21. An electronic device is a communication module in a security monitoring system; characterized in that the electronic device comprises: an internal bus, a memory, a processor, and a communication interface; the processor, the communication interface and the memory complete mutual communication through the internal bus; the memory is used for storing machine feasible instructions corresponding to the data transmission method;
the processor is configured to read the machine-executable instructions on the memory and execute the instructions to:
monitoring whether a previous-stage module requests data from the electronic equipment;
when the condition that the previous-stage module requests data from the electronic equipment and the data type is the reference type is monitored, polling each next-stage module to obtain current security data corresponding to a link of each next-stage module;
determining current security data obtained by polling as reference data corresponding to a link of the electronic equipment, and feeding the reference data back to the upper-level module;
when the condition that the upper-level module requests data from the electronic equipment and the data type is a differential type is monitored, obtaining differential data corresponding to a link of the electronic equipment; the differential data corresponding to the link of the electronic device is as follows: a difference value of the second latest data with respect to the second standard data, the second latest data being: the latest differential data corresponding to the link of each next-stage module is as follows: the last data request of the electronic equipment is requested by the last module;
and feeding back differential data corresponding to the link of the electronic equipment to the previous-stage module.
22. An electronic device is an expansion module in a security monitoring system; characterized in that the electronic device comprises: an internal bus, a memory, a processor, and a communication interface; the processor, the communication interface and the memory complete mutual communication through the internal bus; the memory is used for storing machine feasible instructions corresponding to the data transmission method;
the processor is configured to read the machine-executable instructions on the memory and execute the instructions to:
monitoring whether a previous-stage module requests data from the electronic equipment;
when the condition that the previous-stage module requests data from the electronic equipment and the data type is the reference type is monitored, detecting each defense area detector connected with the expansion module to obtain current security data of each defense area detector;
determining the current security data as reference data corresponding to a link of the electronic equipment, and feeding the reference data back to the upper-level module;
when the condition that the upper-level module requests data from the electronic equipment and the data type is a differential type is monitored, obtaining differential data corresponding to a link of the electronic equipment; the differential data corresponding to the link of the electronic device is as follows: a difference value of the third latest data with respect to the third standard data, the third latest data being: the latest security data of each defense area detector connected with the electronic equipment are as follows: the last data request of the electronic equipment is requested by the last module;
and feeding back differential data corresponding to the link of the electronic equipment to the previous-stage module.
CN201711326272.0A 2017-12-13 2017-12-13 Data transmission method and device and security monitoring system Active CN109920217B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711326272.0A CN109920217B (en) 2017-12-13 2017-12-13 Data transmission method and device and security monitoring system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711326272.0A CN109920217B (en) 2017-12-13 2017-12-13 Data transmission method and device and security monitoring system

Publications (2)

Publication Number Publication Date
CN109920217A CN109920217A (en) 2019-06-21
CN109920217B true CN109920217B (en) 2021-04-27

Family

ID=66958495

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711326272.0A Active CN109920217B (en) 2017-12-13 2017-12-13 Data transmission method and device and security monitoring system

Country Status (1)

Country Link
CN (1) CN109920217B (en)

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3658696B2 (en) * 1996-03-29 2005-06-08 能美防災株式会社 Disaster prevention equipment
CN101593399A (en) * 2009-07-10 2009-12-02 浙江大学 Fire monitoring system based on GPRS and ZigBee sensor network
CN101872536A (en) * 2010-06-24 2010-10-27 北京航空航天大学 System for monitoring intrusion on basis of wireless sensor network
CN201853309U (en) * 2010-11-29 2011-06-01 朱成杰 Coal bunker fire disaster early warning and monitoring device based on wireless sense network
US20120169510A1 (en) * 2011-01-04 2012-07-05 General Electric Company Systems, methods, and apparatus for providing security services utilizing a smart utility meter
JP2014153876A (en) * 2013-02-07 2014-08-25 Plum Systems Inc Inter-operator information transmission system in noise environment, inter-operator information transmission device, and transmission method using the device
JP6517554B2 (en) * 2015-03-19 2019-05-22 株式会社東芝 Transmission system and transmission station
US10019881B2 (en) * 2015-11-04 2018-07-10 Streamlight, Inc. Personnel tracking and monitoring system and method employing protective gear including a personnel electronic monitor device

Also Published As

Publication number Publication date
CN109920217A (en) 2019-06-21

Similar Documents

Publication Publication Date Title
CN110247810B (en) System and method for collecting container service monitoring data
CN102938710B (en) For supervisory control system and the method for large-scale server
CN103001824B (en) A kind of supervisory control system and method for supervising monitoring multiple servers
CN201821366U (en) Real-time monitoring system for temperature and humidity of computer room environment
CN109039819A (en) Delay statistics method, apparatus, system and storage medium
US20150169724A1 (en) Event stream processing system, method and machine-readable storage
CN105302751A (en) Data processing method and device and electronic equipment
CN109547959B (en) Fire-fighting wireless sensor network optimization method, device, server and medium
CN109406751A (en) Regional plantation object soil quality high-precision real-time monitoring system
CN104833055A (en) Method and device for transmitting data of multi-split air conditioning system
CN109920217B (en) Data transmission method and device and security monitoring system
CN115729287A (en) Warehouse environment monitoring system and method
CN110213734A (en) A kind of dynamic data packet communication method and system based on intelligent building Internet of Things
CN108171265A (en) A kind of label preparation method, device and electronic equipment
CN105471938A (en) Server load management method and server load management device
US11416517B2 (en) Partitioning data in a clustered database environment
US20210123784A1 (en) Automations device for monitoring field level sensors in oil and gas industry
CN105468684A (en) Sensitive word filtering system and communication method thereof
CN103944777A (en) Distributed monitoring system information processing method and system
CN105554856B (en) A kind of wireless communications method and system
CN104753738A (en) Flow measurement method and device
CN105282647B (en) A kind of MPP speaker control method and access controller
CN111918233B (en) Anomaly detection method suitable for wireless aviation network
CN106535346A (en) Method for establishing network connection
EP3926986B1 (en) Edge solid state drive (ssd) device, edge data system, and computer-implemented method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant