[go: up one dir, main page]

CN114979260B - Protocol-based communication method and device, electronic equipment and storage medium - Google Patents

Protocol-based communication method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN114979260B
CN114979260B CN202210515023.0A CN202210515023A CN114979260B CN 114979260 B CN114979260 B CN 114979260B CN 202210515023 A CN202210515023 A CN 202210515023A CN 114979260 B CN114979260 B CN 114979260B
Authority
CN
China
Prior art keywords
receiving
layer
target
protocol
instance object
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210515023.0A
Other languages
Chinese (zh)
Other versions
CN114979260A (en
Inventor
张清森
陈俊灵
吕旭明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Lvlian Technology Co Ltd
Original Assignee
Shenzhen Lvlian Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Lvlian Technology Co Ltd filed Critical Shenzhen Lvlian Technology Co Ltd
Priority to CN202210515023.0A priority Critical patent/CN114979260B/en
Publication of CN114979260A publication Critical patent/CN114979260A/en
Application granted granted Critical
Publication of CN114979260B publication Critical patent/CN114979260B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/26Special purpose or proprietary protocols or architectures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Communication Control (AREA)

Abstract

The invention discloses a protocol-based communication method, a protocol-based communication device, electronic equipment and a storage medium. The protocol-based communication method comprises the following steps: adding a receiving instance object of the receiving layer into a receiving instance object set according to a message monitoring notice sent by the receiving layer, wherein the message monitoring notice comprises a target protocol supported by the receiving layer; receiving a trigger message notification sent by a sending layer, wherein the trigger message notification comprises a target instruction of a designated protocol; and acquiring a set of target receiving instance objects with target protocols being specified protocols in the set of receiving instance objects, and sending a trigger message notification to a receiving layer corresponding to the target receiving instance objects so that the receiving layer executes target instructions. The invention can effectively ensure the success rate and the effectiveness of information transmission.

Description

Protocol-based communication method and device, electronic equipment and storage medium
Technical Field
The present invention relates to the field of communications, and in particular, to a protocol-based communication method, apparatus, electronic device, and storage medium.
Background
In iOS systems (mobile operating systems developed by apple corporation) and existing notification mechanisms are based on "sending" and "receiving" relationships (where the sending and receiving layers are one-to-many relationships) that are "key" binding pairs, but this mechanism is difficult to maintain later and has significant drawbacks. Specifically, the "key value" is a constant such as a user-defined character string, and the receiving layer and the transmitting layer must use the same "key value" to ensure successful communication, and the "key value" is generally character string data, in this case, since part of the character string cannot be recognized and complemented by the compiler, if any party writes "wrongly written word" in the "key value", a problem that the receiving layer and the transmitting layer cannot be successfully matched may occur, resulting in communication failure.
Disclosure of Invention
The invention aims to solve the technical problem that communication is easy to fail based on the relation between transmission and reception which are bound to be pairs based on a key value, and provides a communication method, a device, electronic equipment and a storage medium based on a protocol aiming at the defects in the prior art, so that the success of communication can be effectively ensured.
The technical scheme adopted for solving the technical problems is as follows: there is provided a protocol-based communication method including:
adding a receiving instance object of a receiving layer into a receiving instance object set according to a message monitoring notice sent by the receiving layer, wherein the message monitoring notice comprises a target protocol supported by the receiving layer;
receiving a trigger message notification sent by a sending layer, wherein the trigger message notification comprises a designated protocol and a target instruction in the designated protocol;
acquiring a set of target receiving instance objects from the set of receiving instance objects, wherein a target protocol of the target receiving instance objects is the specified protocol;
and sending the trigger message notification to a receiving layer corresponding to the target receiving instance object so that the receiving layer executes the target instruction.
Wherein the step of sending the trigger message notification to a receiving layer in the target receiving instance object set includes:
judging whether the target receiving instance object in the set of target receiving instance objects survives or not;
if the target receiving instance object survives, sending the triggering message notification to a receiving layer corresponding to the target receiving instance object;
and deleting the target receiving instance object if the target receiving instance object does not survive.
The step of adding the receiving instance object of the receiving layer to a receiving instance object set according to the message monitoring notification sent by the receiving layer includes:
performing weak reference packaging processing on the receiving instance object of the receiving layer, and caching the receiving instance object subjected to the weak reference packaging processing by taking the target protocol as a key value to obtain a packaging instance object;
the wrapper instance object is added to the set of receive instance objects.
After the step of adding the receiving instance object of the receiving layer to a receiving instance object set according to the message monitoring notification sent by the receiving layer, the method comprises the following steps:
and receiving a monitoring removal notification sent by the receiving layer, and removing the receiving instance object from the receiving instance object set according to the monitoring removal notification.
Wherein the step of removing the received instance object from the set of received instance objects according to the snoop remove notification comprises:
removing the wrapper instance object from the set of receive instance objects according to the snoop remove notification, and removing wrapper instances that are empty of weakly referenced instances.
The technical scheme adopted for solving the technical problems is as follows: there is provided a protocol-based communication method applied to a communication system including a receiving layer, a transmitting layer, and an intermediate layer communicatively connected to the transmitting layer and the receiving layer, the protocol-based communication method including:
the receiving layer and the sending layer determine a supported specified protocol, wherein the specified protocol comprises at least one instruction;
the receiving layer sends a message monitoring notice which comprises a target protocol supported by the receiving layer;
the middle layer receives the message monitoring notification, and adds the receiving instance object of the receiving layer to a receiving instance object set according to the message monitoring notification;
the sending layer sends a trigger message notification, wherein the trigger message notification comprises a designated protocol and a target instruction in the designated protocol;
The middle layer acquires a set of target receiving instance objects from the set of receiving instance objects, wherein a target protocol of the target receiving instance objects is the appointed protocol;
and the receiving layer receives the trigger message notification and executes the target instruction.
Wherein the protocol-based communication method further comprises:
the receiving layer sends a monitoring removal notification;
the middle layer receives a interception removal notification sent by the receiving layer, and removes the receiving instance object from the receiving instance object set according to the interception removal notification.
The communication system comprises a plurality of system units, wherein each system unit comprises a receiving layer and a transmitting layer, and an intermediate layer which is in communication connection with the transmitting layer and the receiving layer of each system unit;
the step of determining supported specified protocols by the receiving layer and the transmitting layer comprises the following steps:
the receiving layer in each of the system units and the transmitting layer in each of the system units determine the specified protocols supported;
the step of sending the trigger message notification by the sending layer comprises the following steps:
when a target system unit in the communication system detects that a preset event is triggered, a sending layer of the target system unit sends a trigger message notification;
The step of receiving the trigger message notification and executing the target instruction includes:
and the rest system units in the communication system receive the trigger message notification and execute the target instruction so that the rest system units and the target system units synchronously respond to the preset event.
The technical scheme adopted for solving the technical problems is as follows: there is provided a protocol-based communication apparatus comprising:
the joining module is used for joining the receiving instance object of the receiving layer into a receiving instance object set according to the message monitoring notice sent by the receiving layer, wherein the message monitoring notice comprises a target protocol supported by the receiving layer;
the receiving module is used for receiving a trigger message notification sent by the sending layer, wherein the trigger message notification comprises a designated protocol and a target instruction in the designated protocol;
the acquisition module is used for acquiring a set of target receiving instance objects from the set of receiving instance objects, wherein a target protocol of the target receiving instance objects is the specified protocol;
and the sending module is used for sending the triggering message notification to a receiving layer corresponding to the target receiving instance object so that the receiving layer executes the target instruction.
The technical scheme adopted for solving the technical problems is as follows: there is provided a computer readable storage medium storing a computer program which, when executed by a processor, causes the processor to perform the steps of the method as described above.
The technical scheme adopted for solving the technical problems is as follows: there is provided an electronic device comprising a memory and a processor, the memory storing a computer program which, when executed by the processor, causes the processor to perform the steps of the method as described above.
Compared with the prior art, the message monitoring notification sent by the receiving layer comprises the target protocol supported by the receiving layer, the triggering message notification sent by the sending layer comprises the appointed protocol and the target instruction of the appointed protocol, the set of target receiving instance objects, comprising the appointed protocol, of the target protocol in the set of receiving instance objects is obtained, the triggering message notification is sent to the receiving layer corresponding to the target receiving instance objects, and the sending layer and the receiving layer can successfully transfer information without the need of presetting a key value, so that the Bug caused by low-level errors such as 'wrongly written characters' does not occur, and the success rate and the effectiveness of information transmission can be effectively ensured.
Drawings
In order to more clearly illustrate the embodiments of the invention or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, it being obvious that the drawings in the following description are only some embodiments of the invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Wherein:
FIG. 1 is a flow chart of a first embodiment of a protocol-based communication method provided by the present invention;
FIG. 2 is a schematic diagram of an application scenario provided by the present invention;
FIG. 3 is a flow chart of a second embodiment of a protocol-based communication method provided by the present invention;
FIG. 4 is a flow chart of a third embodiment of a protocol-based communication method provided by the present invention;
FIG. 5 is a flow chart of a fourth embodiment of a protocol-based communication method provided by the present invention;
FIG. 6 is a flow chart of a fifth embodiment of a protocol-based communication method provided by the present invention;
fig. 7 is a schematic diagram of another application scenario provided by the present invention;
FIG. 8 is a schematic diagram illustrating the architecture of one embodiment of a protocol-based communication system provided by the present invention;
FIG. 9 is a schematic diagram of an embodiment of an electronic device according to the present invention;
fig. 10 is a schematic structural diagram of an embodiment of a storage medium according to the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Referring to fig. 1 and fig. 2 in combination, fig. 1 is a flow chart of a first embodiment of a protocol-based communication method provided by the present invention, and fig. 2 is a schematic diagram of an application scenario provided by the present invention, in this implementation scenario, an intermediate layer 20 is provided, the intermediate layer 20 receives a message notification sent by a sending layer 11, and forwards the message notification to a receiving layer 12. Referring specifically to fig. 2, the sending layer 11 needs to send a message notification to at least one (2 in the present embodiment) receiving layers 12 to notify the receiving layers 12 to perform the same or different operations based on the received message notification.
The protocol-based communication method provided by the invention comprises the following steps:
s101: and adding the receiving instance object of the receiving layer into a receiving instance object set according to the message monitoring notice sent by the receiving layer, wherein the message monitoring notice comprises a target protocol supported by the receiving layer.
In a specific implementation scenario, the middle layer receives a message monitoring notification sent by the receiving layer, and when a receiving layer is in a state capable of receiving a trigger message notification sent by the sending layer (the trigger message notification is used for instructing the receiving layer to execute a preset method operation), the receiving layer sends the message monitoring notification to the middle layer so as to notify the middle layer to send the trigger message notification to the receiving layer when forwarding the trigger message notification sent by the sending layer.
The message monitoring notification comprises a target protocol supported by the receiving layer, wherein the target protocol is a communication protocol predetermined by the receiving layer and the sending layer, the communication protocol comprises a plurality of instructions, and the receiving layer can execute any instruction in the target protocol according to the instruction of the sending layer in the triggering message notification. In this implementation scenario, the receiving layer and the sending layer may both support at least one target protocol.
And the middle layer adds the receiving instance object of the receiving layer sending the message monitoring notice into the receiving instance object set according to the received message monitoring notice. Specifically, the receiving instance object may be added to a corresponding receiving instance object set according to a target protocol supported by the receiving layer, for example, the receiving instance object of the receiving layer supporting the a protocol accesses the receiving instance object set supporting the a protocol. The middle layer may receive message listening notifications sent by multiple receiving layers, where the target protocols supported by the multiple receiving layers may be the same or different, and add the receiving instance object of each receiving layer to the corresponding receiving instance object set according to the target protocols supported by the respective receiving layers. In this implementation scenario, after adding a receive instance object to a receive instance object set, the middle layer sends an add snoop notification to the receive layer to inform the receive layer that the add has been completed.
In a specific implementation scenario, weak reference packaging processing is performed on the received instance object instance of the receiving layer, the received instance object after the weak reference packaging processing is cached by taking the target protocol as a key value, a packaged instance object is obtained, and the packaged instance object is added to the received instance object set. If the receiving instance object of the receiving layer is directly cached, the reference count of the receiving instance object is increased, so that memory leakage is caused. In the implementation scene, weak reference packaging processing is carried out on the receiving instance object of the receiving layer to obtain a packaging instance object, the packaging instance object is added into the receiving instance object set, and the receiving layer instance object is replaced by an indirect holding mode, so that memory leakage caused by reference counting is avoided.
S102: and receiving a trigger message notification sent by the sending layer, wherein the trigger message notification comprises a designated protocol and a target instruction in the designated protocol.
In a specific implementation scenario, the sending layer needs to send a trigger message notification to at least one receiving layer predetermined to support the same protocol, the sending layer sends a trigger message notification to the middle layer, and the middle layer receives the trigger message notification. The trigger message notification includes the specified protocols supported by the sending layer and the target instructions of the specified protocols that the sending layer wants to receive the layer to execute.
S103: a set of target receiving instance objects is obtained from the set of receiving instance objects, and a target protocol of the target receiving instance objects is a specified protocol.
In a specific implementation scenario, a set of target receiving instance objects matched with the specified information is obtained from a set of receiving instance objects, specifically, a set of receiving instance objects, in which a target protocol supported by a corresponding receiving layer is a specified protocol, is obtained from the set of receiving instance objects.
S104: and sending the trigger message notification to a receiving layer corresponding to the target receiving instance object so that the receiving layer executes the target instruction.
In a specific implementation scenario, the middle layer sends the trigger message notification to the receiving layers corresponding to the target receiving instance object, so that the receiving layers can receive the designated protocol and the target instruction sent by the sending layer. Since the middle layer selects a receiving layer supporting a specified protocol as the transmitting layer to transmit the trigger message notification, the receiving layer can execute the target instruction of the specified protocol. The preset operations executed by the different receiving layers after receiving the specified protocol and the target instruction may be the same or different, and are predefined by the user. In this implementation scenario, after sending a trigger message notification to the receiving layer corresponding to all the target receiving instance objects, the middle layer sends a completion notification to the sending layer to notify that the tasks sent by the sending layer have been completed.
In this embodiment, the sending layer and the receiving layer do not need to agree with a key value in advance, so that Bug caused by low-level errors such as "wrongly written characters" cannot occur, and success rate and validity of information transmission can be effectively ensured. The middle layer selects all receiving layers in a monitoring state to send trigger message notification, and can realize the one-to-many broadcasting function of a traditional notification mechanism (NSNotification center). Any target instruction defined in any appointed protocol can be identified by the compiler, so that the receiving layer can locate and trace the source of the code sending position through the shortcut key preset by the compiler, and the later maintenance is convenient. After receiving the trigger message notification, the receiving layer directly makes code implementation on the target instruction defined in the specified protocol, and directly executes the target instruction defined in the specified protocol and identified by the compiler, so that the parameters can be directly transferred along with the target instruction, and the relation between the message notification and the attached parameters is reserved.
As can be seen from the foregoing description, in this embodiment, the message monitoring notification sent by the receiving layer includes a target protocol supported by the receiving layer, the trigger message notification sent by the sending layer includes a target instruction specifying the protocol, the middle layer obtains a set of target receiving instance objects including the specified protocol in the target protocol in the set of receiving instance objects, sends the trigger message notification to the receiving layer corresponding to the target receiving instance object, and the sending layer and the receiving layer can transfer information without pre-agreeing with a key value, so that the success rate and the validity of information transmission can be effectively ensured.
Referring to fig. 3, fig. 3 is a flowchart of a second embodiment of a protocol-based communication method according to the present invention. The protocol-based communication method provided by the invention comprises the following steps:
s201: and adding the receiving instance object of the receiving layer into a receiving instance object set according to the message monitoring notice sent by the receiving layer, wherein the message monitoring notice comprises a target protocol supported by the receiving layer.
In this implementation scenario, since step S201 is substantially identical to step S101 of the first embodiment of the protocol-based communication method provided in the present invention, a detailed description is omitted herein.
S202: and receiving a monitoring removal notification sent by the receiving layer, and removing the receiving instance object from the receiving instance object set according to the monitoring removal notification.
In a specific implementation scenario, when a receiving layer is in a state that may not be able or need to receive a trigger message notification sent by a sending layer, the middle layer sends a snoop remove notification to the middle layer, so as to notify the middle layer that the trigger message notification does not need to be sent to the receiving layer when the trigger message notification sent by the sending layer is forwarded. In this implementation scenario, the snoop remove notification may include a target protocol supported by the receiving layer. The middle layer acquires a receiving instance object of the receiving layer needing to be removed from monitoring according to the target protocol, and removes the receiving instance object from the receiving instance object set. After deleting from the set of receiving instance objects, the middle layer sends a remove snoop notification to the receiving layer to notify the receiving layer that removal has been completed.
In the implementation scene, weak reference packaging processing is carried out on the received instance object instance of the receiving layer, the received instance object after the weak reference packaging processing is cached by taking the target protocol as a key value, a packaged instance object is obtained, and the packaged instance object is added into the received instance object set. After receiving a snoop remove notification, removing a wrapper instance object from the set of receiving instance objects according to the snoop remove notification, and removing a wrapper instance that is empty of weakly referenced instances.
As can be seen from the foregoing description, in this embodiment, the middle layer removes the receiving layer from the receiving instance object set according to the monitoring removal notification, and when forwarding the trigger message notification sent by the sending layer, the middle layer does not need to send the trigger message notification to the receiving layer, so that whether the communication connection between the receiving layer and the sending layer exists can be quickly and simply set.
Referring to fig. 4, fig. 4 is a flowchart of a third embodiment of a protocol-based communication method according to the present invention. The protocol-based communication method provided by the invention comprises the following steps:
s301: and adding the receiving instance object of the receiving layer into a receiving instance object set according to the message monitoring notice sent by the receiving layer, wherein the message monitoring notice comprises a target protocol supported by the receiving layer.
S302: and receiving a trigger message notification sent by the sending layer, wherein the trigger message notification comprises specified information, and the specified information comprises a specified protocol and a target instruction of the specified protocol.
S303: the acquiring a set of target protocols in the set of received instance objects includes specifying a set of target received instance objects for the protocol.
In a specific implementation scenario, steps S301 to S303 are substantially identical to steps S101 to S103 in the first embodiment of the protocol-based communication method provided in the present invention, and will not be described herein.
S304: whether the target receiving instance object in the set of target receiving instance objects survives is judged. If yes, go to step S305, if no, go to step S306.
In one specific implementation scenario, a received instance object in a target received instance object set is traversed, and whether the current received instance object survives is determined. If the target receiving instance object is alive, step S305 is performed, a trigger message is sent to the current receiving instance object, and if the target receiving instance object is not alive, step S306 is performed, the current receiving instance object is deleted from the set of target receiving instance objects.
In this implementation scenario, when a receiving instance object is not in a surviving state, the receiving instance object will have a preset identifier, and whether the preset receiving instance object survives can be determined by determining whether a receiving instance object has the preset identifier.
S305: and sending a trigger message notification to a receiving layer corresponding to the target receiving instance object.
S306: the target receiving instance object is deleted.
As can be seen from the above description, in this embodiment, whether the target receiving instance object in the set of target receiving instance objects survives is determined, and if the target receiving instance object survives, a trigger message notification is sent to a receiving layer corresponding to the target receiving instance object, so that the validity of data transmission can be effectively ensured, and resource waste is avoided.
Referring to fig. 5 and fig. 2, fig. 5 is a flowchart illustrating a fourth embodiment of a protocol-based communication method according to the present invention. In this embodiment, the receiving layer and the transmitting layer determine a supported specified protocol prior to information transfer, the specified protocol including at least one instruction. The protocol-based communication method provided by the invention comprises the following steps:
s401: a message interception notification is sent, the message interception notification comprising a target protocol supported by the receiving layer.
S402: and receiving the message monitoring notice, and adding the receiving instance object of the receiving layer into a receiving instance object set according to the message monitoring notice.
S403: and sending a trigger message notification, wherein the trigger message notification comprises the designated protocol and target instructions in the designated protocol.
S404: a set of target receiving instance objects is obtained from the set of receiving instance objects, and a target protocol of the target receiving instance objects is a specified protocol.
S405: and sending the trigger message notification to a receiving layer corresponding to the target receiving instance object.
S406: and receiving a trigger message notification and executing the target instruction.
S407: and sending a monitoring removal notification.
S408: a snoop remove notification is received, and the receive instance object is removed from the set of receive instance objects according to the snoop remove notification.
In a specific implementation scenario, the contents of steps S401 to S407 are described in detail in the embodiments shown in fig. 1 to 4, and will not be described here again.
Referring to fig. 6 and fig. 2, fig. 6 is a flowchart illustrating a fifth embodiment of a protocol-based communication method according to the present invention. In this embodiment, the receiving layer and the transmitting layer determine a supported specified protocol before information transfer, the specified protocol including at least one method. The protocol-based communication method provided by the invention comprises the following steps:
s501: a message interception notification is sent, the message interception notification comprising a target protocol supported by the receiving layer.
S502: receiving a message monitoring notice, carrying out weak reference packaging processing on a receiving instance object of a receiving layer according to the message monitoring notice, and caching the receiving instance object subjected to the weak reference packaging processing by taking a target protocol as a key value to obtain a packaging instance object; the wrapper instance object is added to the set of receive instance objects.
S503: and sending a trigger message notification, wherein the trigger message notification comprises specified information, and the specified information comprises a specified protocol and target instructions in the specified protocol.
S504: a set of target received instance objects is obtained from the set of received instance objects, the target protocol of the target received instance objects comprising the specified protocol.
S505: judging whether the target receiving instance object in the set of target receiving instance objects survives, if so, executing step S506, otherwise, executing step S507.
S506: and sending a trigger message notification to a receiving layer corresponding to the target receiving instance object.
S507: the target receiving instance object is deleted.
S508: and receiving a trigger message notification and executing the target instruction.
S509: and sending a monitoring removal notification.
S510: receiving a snoop remove notification, removing a wrapper instance object from the set of received instance objects according to the snoop remove notification, and removing a wrapper instance that is empty of weakly referenced instances.
In a specific implementation scenario, the contents of steps S501-S510 are already described in detail in the embodiments shown in fig. 1-4, and will not be described here again.
Referring to fig. 7, fig. 7 is a schematic view of another application scenario of the protocol-based communication method provided by the present invention. The communication system 30 includes a plurality of system units 31 each including a reception layer 311, a transmission layer 312, the reception layer 311 in each system unit 31 and the transmission layer 312 in each system unit determining a supported specified protocol, that is, the reception slave 311 and the transmission layer 312 of each system unit 31 support the same specified protocol. The receiving slave 311 and the transmitting layer 312 of each system unit 31 are communicatively connected to the intermediate layer 32.
The middle layer 32 adds the receiving layer 311 in each system unit 31 to the set of receiving instance objects according to the message listening notification sent by the receiving layer 311 in each system unit 31. When the target system unit (system unit a in the present implementation scenario) in the communication system 30 detects that the preset event is triggered, the transmission layer 312 of the target system unit 31 transmits a trigger message notification corresponding to the preset event. The intermediate layer 32 sends the trigger message notification to the remaining receiving layers 311 of the communication system 30, whereby the receiving layers 311 execute the target instructions of the specified protocol in accordance with the trigger message notification. All system units 31 in the communication system 30 are thus able to respond synchronously to a preset event.
For example, when the preset event is automatic backup, according to the prior art, the sending layer 312 of the target system unit a and the rest of receiving layers 311 need to communicate based on a "key value", and once the "key value" leaks in the process of communication transmission, the sending layer 312 of the target system unit a cannot communicate with the receiving layer 311 with the "key value" error, so that some receiving layers 311 do not receive the trigger message notification of the automatic backup sent by the sending layer 312 of the target system unit a, but by the scheme provided by the invention, it can be ensured that all rest of receiving layers 311 can receive the trigger message notification. Specifically, a specific protocol is determined in advance for the sending layer 312 and the receiving layer 311 of each system unit, where the specific protocol includes a plurality of instructions, each receiving layer 311 may execute the instructions in the specific protocol, and the instructions executed by each receiving layer 311 may be the same or different, and in this implementation scenario, the instructions executed by each receiving layer 311 are the same and are all for executing an automatic backup task.
The transmitting layer 312 of the target system unit transmits a trigger message notification related to the automatic backup, and the intermediate layer 32 transmits the trigger message notification to the receiving layers 311 of the remaining system units 31 in the communication system, so that the system units 31 can perform the automatic backup according to the trigger message notification, so that all the system units 31 in the communication system 30 can synchronously perform the automatic backup operation. For the user, the automatic backup function can be ensured to be in an on state regardless of which receiving layer 311 (the visual layer behind) is viewed.
In other implementation scenarios, there may be situations where certain system units 31 do not need to perform certain specific operations, e.g., a specific system unit 31 does not need to perform an automatic backup, the specific system unit 31 sends a snoop remove notification to the middle tier 32. When the next time the transmission layer 312 of the target system unit transmits the trigger message notification related to the automatic backup, the intermediate layer 32 transmits the trigger message notification to the reception layer 311 given the specific system unit and the rest of the reception layers 311 other than the reception layer 311 of the target system unit. Only the receiving layer 311, which receives the trigger message notification, can synchronously perform the automatic backup operation.
Referring to fig. 8, fig. 8 is a schematic structural diagram of an embodiment of a protocol-based communication device according to the present invention. The protocol-based communication device 40 comprises a receiving module 41, a processing module 42.
The receiving module 41 is configured to receive a message monitoring notification sent by the receiving layer, where the message monitoring notification includes a target protocol supported by the receiving layer; and the trigger message notification is also used for receiving the trigger message notification sent by the sending layer, wherein the trigger message notification comprises specified information, and the specified information comprises a specified protocol and target instructions in the specified protocol. The processing module 42 is configured to add the received instance object of the receiving layer to a received instance object set according to the message listening notification; the method is also used for acquiring a set of target receiving instance objects from the set of receiving instance objects, and target protocols of the target receiving instance objects comprise specified protocols; and the receiving layer is used for sending the trigger message notification to the receiving layer corresponding to the target receiving instance object so that the receiving layer executes the operation corresponding to the target instruction.
The protocol-based communication device 40 further includes a wrapper module (not shown), where the wrapper module is configured to perform weak reference wrapper processing on the received instance object of the receiving layer, and cache the received instance object after the weak reference wrapper processing with the target protocol as a key value to obtain a wrapped instance object; the wrapper instance object is added to the set of receive instance objects.
The receiving module 41 is further configured to receive a snoop remove notification sent by the receiving layer, and the processing module 42 is further configured to remove the receiving instance object from the receiving instance object set according to the snoop remove notification.
The processing module 42 is further configured to remove the reference processed received instance object from the set of received instance objects and remove the wrapper instance that is empty of weakly referenced instances according to the snoop remove notification.
The processing module 42 is further configured to determine whether a target received instance object in the set of target received instance objects survives; if the target receiving instance object survives, sending a trigger message notification to a receiving layer corresponding to the target receiving instance object; if the target receiving instance object does not survive, deleting the target receiving instance object.
As can be seen from the above description, in this embodiment, the protocol-based communication system receives a message monitoring notification including a target protocol supported by a receiving layer and sent by a receiving layer, and a trigger message notification including a target instruction specifying the protocol and sent by a sending layer, acquires a set of target receiving instance objects including the specified protocol in a target protocol in a set of receiving instance objects, and sends the trigger message notification to the receiving layer corresponding to the target receiving instance objects, where the sending layer and the receiving layer can transfer information without previously specifying a key value, so that a Bug caused by a low-level error such as "wrongly written word" does not occur, and success rate and validity of information transmission can be effectively ensured.
Referring to fig. 9, fig. 9 is a schematic structural diagram of an electronic device 50 according to an embodiment of the invention. The electronic device 50 comprises a processor 51, a memory 52. The processor 51 is coupled to the memory 52. The memory 52 has stored therein a computer program which is executed by the processor 51 in operation to implement the method as shown in fig. 1, 3-6.
Specific technical details regarding implementation of the protocol-based communication method when the electronic device 50 executes the computer program are discussed in detail in the foregoing method steps, and thus are not described in detail.
Referring to fig. 10, fig. 10 is a schematic structural diagram of an embodiment of a computer readable storage medium according to the present invention. The computer readable storage medium 60 stores at least one computer program 61, where the computer program 61 is used for being executed by a processor to implement the method shown in fig. 1, 3-6, and the detailed method is referred to above and will not be repeated here. In one embodiment, the computer readable storage medium 60 may be a memory chip in a final layer, a hard disk, or a removable hard disk, or a flash disk, an optical disk, or other readable and writable storage tool, a server, or the like.
The foregoing describes certain embodiments of the present disclosure, other embodiments being within the scope of the following claims. In some cases, the actions or steps recited in the claims can be performed in a different order than in the embodiments and still achieve desirable results. Furthermore, the processes depicted in the accompanying drawings do not necessarily have to be in the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing are also possible or may be advantageous.
In this specification, each embodiment is described in a progressive manner, and identical and similar parts of each embodiment are all referred to each other, and each embodiment mainly describes differences from other embodiments. In particular, for apparatus, devices, non-transitory computer readable storage medium embodiments, the description is relatively simple, as it is substantially similar to method embodiments, with reference to portions of the description of method embodiments being relevant.
The apparatus, the device, the nonvolatile computer readable storage medium and the method provided in the embodiments of the present disclosure correspond to each other, and therefore, the apparatus, the device, and the nonvolatile computer storage medium also have similar advantageous technical effects as those of the corresponding method, and since the advantageous technical effects of the method have been described in detail above, the advantageous technical effects of the corresponding apparatus, device, and nonvolatile computer storage medium are not described herein again.
In the 90 s of the 20 th century, improvements to one technology could clearly be distinguished as improvements in hardware (e.g., improvements to circuit structures such as diodes, transistors, switches, etc.) or software (improvements to the process flow). However, with the development of technology, many improvements of the current method flows can be regarded as direct improvements of hardware circuit structures. Designers almost always obtain corresponding hardware circuit structures by programming improved method flows into hardware circuits. Therefore, an improvement of a method flow cannot be said to be realized by a hardware entity module. For example, a programmable logic device (Programmable Logic Device, PLD) (e.g., a field programmable gate array (Field Programmable gate array, FPGA)) is an integrated circuit whose logic function is determined by the user programming the device. A designer programs to "integrate" a digital system onto a PLD without requiring the chip manufacturer to design and fabricate application-specific integrated circuit chips. Moreover, nowadays, instead of manually manufacturing integrated circuit chips, such programming is mostly implemented by using "logic compiler" software, which is similar to the software compiler used in program development and writing, and the original code before the compiling is also written in a specific programming language, which is called hardware description language (Hardware Description Language, HDL), but not just one of the hdds, but a plurality of kinds, such as ABEL (Advanced Boolean Expression Language), AHDL (Altera Hardware DescriptionLanguage), confluence, CUPL (Cornell University Programming Language), HDCal, JHDL (Java Hardware Description Language), lava, lola, myHDL, PALASM, RHDL (RubyHardware Description Language), etc., VHDL (Very-High-SpeedIntegrated Circuit Hardware Description Language) and Verilog are currently most commonly used. It will also be apparent to those skilled in the art that a hardware circuit implementing the logic method flow can be readily obtained by merely slightly programming the method flow into an integrated circuit using several of the hardware description languages described above.
The controller may be implemented in any suitable manner, for example, the controller may take the form of, for example, a microprocessor or processor and a computer readable medium storing computer readable program code (e.g., software or firmware) executable by the (micro) processor, logic gates, switches, application specific integrated circuits (Application Specific Integrated Circuit, ASIC), programmable logic controllers, and embedded microcontrollers, examples of which include, but are not limited to, the following microcontrollers: ARC 625D, atmel AT91SAM, microchip PIC18F26K20, and Silicone Labs C8051F320, the memory controller may also be implemented as part of the control logic of the memory. Those skilled in the art will also appreciate that, in addition to implementing the controller in a pure computer readable program code, it is well possible to implement the same functionality by logically programming the method steps such that the controller is in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers, etc. Such a controller may thus be regarded as a kind of hardware component, and means for performing various functions included therein may also be regarded as structures within the hardware component. Or even means for achieving the various functions may be regarded as either software modules implementing the methods or structures within hardware components.
The system, apparatus, module or unit set forth in the above embodiments may be implemented in particular by a computer chip or entity, or by a product having a certain function. One typical implementation is a computer. In particular, the computer may be, for example, a personal computer, a laptop computer, a cellular telephone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
For convenience of description, the above devices are described as being functionally divided into various units, respectively. Of course, the functions of each element may be implemented in one or more software and/or hardware elements when implemented in the present specification.
It will be appreciated by those skilled in the art that the present description may be provided as a method, system, or computer program product. Accordingly, the present specification embodiments may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present description embodiments may take the form of a computer program product on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.
The present description is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the specification. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In one typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include volatile memory in a computer-readable medium, random Access Memory (RAM) and/or nonvolatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of computer-readable media.
Computer readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of storage media for a computer include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Disks (DVD) or other optical storage, magnetic cassettes, magnetic tape disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device. Computer-readable media, as defined herein, does not include transitory computer-readable media (transmission media), such as modulated data signals and carrier waves.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article or apparatus that comprises the element.
The description may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The specification may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
In this specification, each embodiment is described in a progressive manner, and identical and similar parts of each embodiment are all referred to each other, and each embodiment mainly describes differences from other embodiments. In particular, for system embodiments, since they are substantially similar to method embodiments, the description is relatively simple, as relevant to see a section of the description of method embodiments.
Finally, it should be noted that: the disclosure of a communication method, device, electronic device and storage medium based on a protocol in the embodiments of the present invention is only a preferred embodiment of the present invention, and is only for illustrating the technical scheme of the present invention, but not for limiting the same; although the invention has been described in detail with reference to the foregoing embodiments, those of ordinary skill in the art will understand that; the technical scheme recorded in the various embodiments can be modified or part of technical features in the technical scheme can be replaced equivalently; such modifications and substitutions do not depart from the spirit and scope of the corresponding technical solutions.

Claims (11)

1. A method of protocol-based communication, comprising:
Adding a receiving instance object of a receiving layer into a receiving instance object set according to a message monitoring notice sent by the receiving layer, wherein the message monitoring notice comprises a target protocol supported by the receiving layer;
receiving a trigger message notification sent by a sending layer, wherein the trigger message notification comprises a designated protocol and a target instruction in the designated protocol;
acquiring a set of target receiving instance objects from the set of receiving instance objects, wherein a target protocol of the target receiving instance objects is the specified protocol;
and sending the trigger message notification to a receiving layer corresponding to the target receiving instance object so that the receiving layer executes the target instruction.
2. The protocol-based communication method according to claim 1, wherein the step of sending the trigger message notification to a receiving layer in the target set of receiving instance objects comprises:
judging whether the target receiving instance object in the set of target receiving instance objects survives or not;
if the target receiving instance object survives, sending the triggering message notification to a receiving layer corresponding to the target receiving instance object;
And deleting the target receiving instance object if the target receiving instance object does not survive.
3. The protocol-based communication method according to claim 2, wherein the step of adding the receiving instance object of the receiving layer to a receiving instance object set according to the message listening notification sent by the receiving layer comprises:
performing weak reference packaging processing on the receiving instance object of the receiving layer, and caching the receiving instance object subjected to the weak reference packaging processing by taking the target protocol as a key value to obtain a packaging instance object;
the wrapper instance object is added to the set of receive instance objects.
4. A protocol based communication method according to any one of claims 1-3, wherein after the step of adding a receiving instance object of a receiving layer to a set of receiving instance objects according to a message listening notification sent by the receiving layer, the method comprises:
and receiving a monitoring removal notification sent by the receiving layer, and removing the receiving instance object from the receiving instance object set according to the monitoring removal notification.
5. The protocol-based communication method of claim 4, wherein the step of removing the received instance object from the received instance object set according to the snoop remove notification comprises:
Removing the wrapper instance object from the set of receive instance objects according to the snoop remove notification, and removing wrapper instances that are empty of weakly referenced instances.
6. A protocol-based communication method, applied to a communication system, the communication system including a receiving layer, a transmitting layer, and an intermediate layer, the intermediate layer being communicatively connected to the transmitting layer and the receiving layer, the protocol-based communication method comprising:
the receiving layer and the sending layer determine a supported specified protocol, wherein the specified protocol comprises at least one instruction;
the receiving layer sends a message monitoring notice which comprises a target protocol supported by the receiving layer;
the middle layer receives the message monitoring notification, and adds the receiving instance object of the receiving layer to a receiving instance object set according to the message monitoring notification;
the sending layer sends a trigger message notification, wherein the trigger message notification comprises a designated protocol and a target instruction in the designated protocol;
the middle layer acquires a set of target receiving instance objects from the set of receiving instance objects, wherein a target protocol of the target receiving instance objects is the appointed protocol;
And the receiving layer receives the trigger message notification and executes the target instruction.
7. The protocol-based communication method according to claim 6, further comprising:
the receiving layer sends a monitoring removal notification;
the middle layer receives a interception removal notification sent by the receiving layer, and removes the receiving instance object from the receiving instance object set according to the interception removal notification.
8. The protocol-based communication method according to claim 6, wherein the communication system comprises a plurality of system units, each system unit comprising a receiving layer, a transmitting layer, the communication system further comprising an intermediate layer communicatively coupled to the transmitting layer and the receiving layer of each system unit;
the step of determining supported specified protocols by the receiving layer and the transmitting layer comprises the following steps:
the receiving layer in each of the system units and the transmitting layer in each of the system units determine the specified protocols supported;
the step of sending the trigger message notification by the sending layer comprises the following steps:
when a target system unit in the communication system detects that a preset event is triggered, a sending layer of the target system unit sends a trigger message notification;
The step of receiving the trigger message notification and executing the target instruction includes:
and the rest system units in the communication system receive the trigger message notification and execute the target instruction so that the rest system units and the target system units synchronously respond to the preset event.
9. A protocol-based communication device, comprising:
the receiving module is used for receiving a message monitoring notification sent by a receiving layer, wherein the message monitoring notification comprises a target protocol supported by the receiving layer; the method is also used for receiving a trigger message notification sent by a sending layer, wherein the trigger message notification comprises a designated protocol and a target instruction in the designated protocol;
the processing module is used for adding the receiving instance object of the receiving layer into a receiving instance object set according to the message monitoring notification; the method is also used for acquiring a set of target receiving instance objects from the set of receiving instance objects, and a target protocol of the target receiving instance objects comprises the specified protocol; and the receiving layer is used for sending the trigger message notification to a receiving layer corresponding to the target receiving instance object so that the receiving layer executes the target instruction.
10. A computer readable storage medium, characterized in that a computer program is stored, which, when being executed by a processor, causes the processor to perform the steps of the method according to any of claims 1 to 5.
11. An electronic device comprising a memory and a processor, the memory storing a computer program that, when executed by the processor, causes the processor to perform the steps of the method of any one of claims 1 to 5.
CN202210515023.0A 2022-05-12 2022-05-12 Protocol-based communication method and device, electronic equipment and storage medium Active CN114979260B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210515023.0A CN114979260B (en) 2022-05-12 2022-05-12 Protocol-based communication method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210515023.0A CN114979260B (en) 2022-05-12 2022-05-12 Protocol-based communication method and device, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN114979260A CN114979260A (en) 2022-08-30
CN114979260B true CN114979260B (en) 2023-09-15

Family

ID=82981130

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210515023.0A Active CN114979260B (en) 2022-05-12 2022-05-12 Protocol-based communication method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN114979260B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115543270B (en) * 2022-10-08 2023-06-16 睿珀智能科技有限公司 Software architecture method, system and equipment based on message drive

Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6560318B1 (en) * 2000-09-07 2003-05-06 Cisco Technology, Inc. Arrangement for managing notification preferences for notification delivery messages in an IP-based notification architecture
CN1779646A (en) * 2005-09-12 2006-05-31 浙江大学 Inter-task communication method based on message object in embedded real-time operating system
CN101764707A (en) * 2009-12-30 2010-06-30 成都市华为赛门铁克科技有限公司 Processing method, conversion device and processing system for network configuration event notification message
WO2016193636A1 (en) * 2015-06-04 2016-12-08 Overkiz Methods for generating a conditional software code module, and method for controlling at least one home automation system for a building
CN107426198A (en) * 2017-07-05 2017-12-01 北京辰安信息科技有限公司 A kind of method and system of communication
CN109684114A (en) * 2019-01-02 2019-04-26 深圳乐信软件技术有限公司 Message distributing method, device, terminal and medium based on iOS system
CN111131501A (en) * 2019-12-31 2020-05-08 郑州信大捷安信息技术股份有限公司 MQTT protocol-based message pushing system and method
CN111510499A (en) * 2020-04-20 2020-08-07 深圳市盟天科技有限公司 A communication method, device, equipment and storage medium
CN111541662A (en) * 2020-04-15 2020-08-14 赞同科技股份有限公司 Communication method, device, system and equipment based on binary communication protocol
CN211656158U (en) * 2020-04-22 2020-10-09 深圳市绿联科技有限公司 Signal conversion circuit and signal patch cord
CN111819831A (en) * 2018-03-06 2020-10-23 三星电子株式会社 Message reception notification method and electronic device supporting the method
CN111988241A (en) * 2020-08-20 2020-11-24 恒生电子股份有限公司 Message queuing method, system, device and storage medium
CN112448826A (en) * 2020-11-13 2021-03-05 恒生电子股份有限公司 Multicast message communication method and device, readable medium and electronic equipment
WO2021213035A1 (en) * 2020-04-24 2021-10-28 腾讯科技(深圳)有限公司 Method and apparatus for providing network auxiliary information, electronic device, and computer-readable storage medium
CN113630465A (en) * 2021-08-10 2021-11-09 北京百度网讯科技有限公司 Message processing method, device, equipment and storage medium
CN114328129A (en) * 2022-01-17 2022-04-12 蚂蚁区块链科技(上海)有限公司 Message sending method, apparatus, device and storage medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9749435B2 (en) * 2012-01-20 2017-08-29 Apple Inc. Proxy-based push service

Patent Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6560318B1 (en) * 2000-09-07 2003-05-06 Cisco Technology, Inc. Arrangement for managing notification preferences for notification delivery messages in an IP-based notification architecture
CN1779646A (en) * 2005-09-12 2006-05-31 浙江大学 Inter-task communication method based on message object in embedded real-time operating system
CN101764707A (en) * 2009-12-30 2010-06-30 成都市华为赛门铁克科技有限公司 Processing method, conversion device and processing system for network configuration event notification message
WO2016193636A1 (en) * 2015-06-04 2016-12-08 Overkiz Methods for generating a conditional software code module, and method for controlling at least one home automation system for a building
CN107426198A (en) * 2017-07-05 2017-12-01 北京辰安信息科技有限公司 A kind of method and system of communication
CN111819831A (en) * 2018-03-06 2020-10-23 三星电子株式会社 Message reception notification method and electronic device supporting the method
CN109684114A (en) * 2019-01-02 2019-04-26 深圳乐信软件技术有限公司 Message distributing method, device, terminal and medium based on iOS system
CN111131501A (en) * 2019-12-31 2020-05-08 郑州信大捷安信息技术股份有限公司 MQTT protocol-based message pushing system and method
CN111541662A (en) * 2020-04-15 2020-08-14 赞同科技股份有限公司 Communication method, device, system and equipment based on binary communication protocol
CN111510499A (en) * 2020-04-20 2020-08-07 深圳市盟天科技有限公司 A communication method, device, equipment and storage medium
CN211656158U (en) * 2020-04-22 2020-10-09 深圳市绿联科技有限公司 Signal conversion circuit and signal patch cord
WO2021213035A1 (en) * 2020-04-24 2021-10-28 腾讯科技(深圳)有限公司 Method and apparatus for providing network auxiliary information, electronic device, and computer-readable storage medium
CN111988241A (en) * 2020-08-20 2020-11-24 恒生电子股份有限公司 Message queuing method, system, device and storage medium
CN112448826A (en) * 2020-11-13 2021-03-05 恒生电子股份有限公司 Multicast message communication method and device, readable medium and electronic equipment
CN113630465A (en) * 2021-08-10 2021-11-09 北京百度网讯科技有限公司 Message processing method, device, equipment and storage medium
CN114328129A (en) * 2022-01-17 2022-04-12 蚂蚁区块链科技(上海)有限公司 Message sending method, apparatus, device and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
JMS消息中间件的研究与实现;吴艳艳;《中国优秀硕士学位论文全文数据库 信息科技辑》;全文 *

Also Published As

Publication number Publication date
CN114979260A (en) 2022-08-30

Similar Documents

Publication Publication Date Title
JP6756924B2 (en) Blockchain-based consensus methods and devices
JP6794551B2 (en) Methods and devices for sending transaction information and for consensus verification
CN108712454B (en) File processing method, device and equipment
JP6675518B1 (en) Method and device for processing a service request
CN107395665B (en) Block chain service acceptance and service consensus method and device
CN108628688B (en) Message processing method, device and equipment
KR20190091484A (en) Blockchain consensus method and device
CN111796864B (en) A method and device for data verification
CN112631679B (en) Preloading method and device for micro-applications
CN117932668A (en) File processing method, device, equipment and storage medium based on block chain
CN114979260B (en) Protocol-based communication method and device, electronic equipment and storage medium
CN111198777A (en) Data processing method, device, terminal and storage medium
CN114143140A (en) Data transmission system, method, storage medium and electronic equipment
CN113141267A (en) Firmware upgrading and information processing method, device and equipment
CN113852498B (en) Method and device for deploying, managing and calling components
CN115129728B (en) File verification method and device
CN111355672A (en) Message forwarding method and device
CN117319235A (en) Service calling method and device
CN116743550B (en) Processing method of fault storage nodes of distributed storage cluster
US10152490B2 (en) Sequential replication with limited number of objects
CN108874560B (en) Method and communication device for communication
CN112187759A (en) Cross-network data transmission method and device
CN111949528A (en) Memory leak detection method, device, electronic device and storage medium
CN118132168A (en) Function injection method and device, storage medium and electronic equipment
CN116048977B (en) Test method and device based on data reduction

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant