Detailed Description
The present application will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present application more apparent. It should be understood that the particular embodiments described herein are illustrative only and are not intended to limit the application, i.e., the embodiments described are merely some, but not all, of the embodiments of the application. The components of the embodiments of the present application generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations.
It is noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The features and capabilities of the present application are described in further detail below in connection with examples.
Example 1
As shown in fig. 1, a digital electronic detonator priming network system includes an initiator and n digital electronic detonators communicatively connected and controlled by the initiator. Each digital electronic detonator at least comprises an electronic control module and a basic detonator, wherein the electronic control module is used for carrying out one-to-one communication connection with the exploder and controlling the working state of each module in the digital electronic detonator, thereby completing the tasks of reading the circuit state of the digital electronic detonator, checking the password, setting the delay detonation duration, charging and discharging, detonating and the like.
In order to accurately detonate a plurality of digital electronic detonators, each electronic control module of each digital electronic detonator is provided with a unique one-to-one corresponding digital identity number, namely UID code. The exploder is communicated with the electronic control module and dials the UID code, so that the digital electronic detonator corresponding to the UID code in the exploding network is selected and one-to-one communication is carried out.
The UID code in the digital electronic detonator is generally compiled by a certain rule. For example, the UID code can be formed by information such as an electronic control module manufacturer code, a detonator manufacturer code, a production year, month, day, production machine number, serial number and the like. Therefore, the majority of bits of the UID codes of the plurality of digital electronic detonators that are typically accessed into the detonation network are the same, with only a few bits being different.
The conventional method for dialing and communicating the UID code in the prior art comprises the following steps: first, operations of [ dialing UID instruction+UID data ] ([ representing communication content, the same applies hereinafter) are executed. After the UID code is dialed, the corresponding digital electronic detonator enters a certain selected state and can be in one-to-one communication with the initiator. And after the UID codes which are not dialed are or a release instruction is received, the corresponding digital electronic detonator is in an unselected state.
The detonation network system uses the conventional UID code dialing method to finish communication generally with long time, and the embodiment of the application optimizes and improves the UID code dialing communication mechanism in order to reduce the time cost of the dialing communication process.
Example two
The embodiment is a UID code double dialing method which can be used for the detonation network system, and the communication efficiency of the detonation network system is improved by optimizing the flow and the mechanism of the UID code dialing.
According to the UID code double dialing method, UIDs of all digital electronic detonators in the detonation network system are split into two groups according to the change frequency of each byte or bit. And carrying out double dialing on the digital electronic detonator according to the split UID group in sequence, so that the digital electronic detonator sequentially confirms the corresponding first dialing state and second dialing state after double dialing, and finally confirms whether the corresponding digital electronic detonator is selected to dial according to the first dialing state and the second dialing state. Finally, the digital electronic detonator which enters the selected dialing state can be in one-to-one communication with the exploder, so that the communication time of the digital electronic detonator is shortened.
In a preferred embodiment, the first dialing state and the second dialing state respectively correspond to two split UID sets, and respectively include two states of dialed state and non-dialed state.
Specifically, as shown in fig. 2, the optimized UID code double dialing method includes the following steps:
splitting the complete UID codes of all n digital electronic detonators into two groups: the method comprises the steps that partial bytes or bits, which are easy to generate the same data, among UIDs in an initiating network system are divided into a first UID group which is not easy to change, and the data corresponding to the first UID group is UIDA; the other UID codes are assigned to a second UID group which is easy to change, and the data corresponding to the second UID group is UIDB.
The post-grouping detonation network system adopts a dual UID code dialing mechanism to carry out dialing communication, and the dialing communication process comprises the following steps: and dialing the first UID group and the second UID group respectively.
In a preferred embodiment, the first UID set and the second UID set are respectively subjected to dialing operations using UIDA and UIDB, i.e., operations of [ dialing UIDA instruction+uida data ] and [ dialing UIDB instruction+uidb data ] are respectively performed.
After dialing the first UID group, the first dialing state can be divided into a dialed UIDA state and an undipped UIDA state according to whether the first UID group is successful in dialing. All digital electronic detonators corresponding to successful dialing of the first UID group form the first group of digital electronic detonators and enter a dialed UIDA state, and the rest digital electronic detonators are in an undipped UIDA state.
And on the basis of completing the dialing of the first UID group, sequentially dialing the second UID group, and dividing the second dialing state into a dialed UIDB state and an undipped UIDB state according to whether the second UID group successfully dials. The digital electronic detonator corresponding to the successful dialing of the second UID group is in the dialed UIDB state, and the dialed UIDB state digital electronic detonator forms the second group digital electronic detonator. The digital electronic detonators which enter the selected dialing state can be determined according to the states of the first group of digital electronic detonators and the second group of digital electronic detonators at the same time, and the digital electronic detonators can be communicated with the detonators one by one.
In a preferred embodiment, the second UID set dials may be performed on the first set of digital electronic detonators that enter the dialed UIDA state, or may be performed on all digital electronic detonators. In a preferred embodiment, the second UID set dialing of the first set of digital electronic detonators into the dialed UIDA state may be preferentially selected.
In the un-dialing UIDA state, whether the second UID group is dialed again or not, the corresponding digital electronic detonator is not always in the selected dialing state; in the dialed UIDA state, but in the un-dialed UIDB state, the corresponding digital electronic detonator does not enter the selected dialing state. Only the dialed UIDA state and the dialed UIDB state, the corresponding digital electronic detonator enters the selected dialing state.
No matter whether the UIDB dials or receives the release instruction, the state of the UIDA in the dialing will not be changed.
In a preferred embodiment, the first UID group may be dialed before the second UID group is dialed, the second UID group may be dialed before the first UID group is dialed, or both may be dialed.
Example III
In a preferred embodiment, when the detonation network communicates, the communication sequence is ordered according to the first UID group, i.e. a group of digital electronic detonators with the same UIDA are arranged continuously and sequentially into a group, and then the detonator and the digital electronic detonators communicate one to one sequentially according to the ordering.
For a group of digital electronic detonators which are arranged continuously and sequentially and have the same UIDA, only a complete [ UIDA shifting instruction+uida data ] and [ UIDB shifting instruction+uidb data ] operation is required to be executed on the first digital electronic detonator in the group, and the rest digital electronic detonators in the subsequent group can be brought into a selected state only by executing [ UIDB shifting instruction+uidb data ]. This can save a lot of time consumed in dialing the UID.
Taking the number of digital electronic detonators in an initiation network system as n as an example, the initiation network system comprises an initiator and n digital electronic detonators in communication connection. After the n UID codes are grouped, the n digital electronic detonators are firstly ordered according to the first UID group. Assuming that the first UID group includes n1 UIDA data, n1 rows are formed by sorting n digital electronic detonators having the same UIDA. On the basis, the first digital electronic detonator in each row is respectively executed once [ UIDA instruction+UIDA data ] so that all the digital electronic detonators in n1 rows can be respectively selected as corresponding dialed UIDA states.
And on the basis, the second UID group is dialed, namely, each digital electronic detonator is dialed by utilizing UIDB data in sequence, and when the digital electronic detonator is finally confirmed to enter a selected dialing state, one-to-one communication can be carried out with the exploder.
In a preferred embodiment, after the grouping ordering of all the digital electronic detonators in the detonation network system as described above, the first UID group dialing is performed on the first digital electronic detonator in the first group of digital electronic detonators having the same UIDA by using the complete UID code data, that is, the conventional UID code dialing method is performed on the first digital electronic detonator/all the digital electronic detonators in the first group of digital electronic detonators: [ Dial UID Command+UID data ]. Because the conventional UID code dialing method can also enable the first group of digital electronic detonators with the same UIDA to enter the dialed UIDA state, the UIDB data is utilized again to perform dialing on the second UID group on the basis, that is, the corresponding digital electronic detonator can be determined to enter the selected dialing state by performing [ UIDB instruction+uidb ].
According to the embodiment, the time consumed by the UID of the dial-set digital electronic detonator can be saved, and the communication efficiency is improved.
Example IV
This example is a further illustration of the present application.
The third embodiment provides a digital electronic detonator priming network communication method based on the previous embodiment, which is used for describing in detail how UID grouping is carried out specifically and efficient digital electronic detonator priming network communication is realized by using a grouped UID code double dialing mechanism.
In a preferred embodiment, the number n of digital electronic detonators in the detonation network system is 500, and the detonation network system comprises one detonator and 500 digital electronic detonators in communication connection.
The initiator and each electronic detonator are communicated with each other by taking bytes as a unit, and each byte comprises 8-bit valid data or instructions, and further comprises information such as check bits, start bits, end bits and the like.
The length of the UID code of the digital electronic detonator is 7 bytes, the first 6 bytes are divided into a first UID group before the UID code is grouped, and the corresponding byte content is set as UIDA data; the last 1 byte is divided into a second UID group, and its corresponding byte content is set as UIDB data.
In this embodiment, it is assumed that UID of 500-fire digital electronic detonator constituting the detonation network system is a continuous hexadecimal number from CBAF2301010000 to CBAF23010101F 3.
In addition, the data length corresponding to other information in the communication data is as follows: the cipher length is 4 bytes, the delay data length is 3 bytes, the return state data length is 1 byte, the detonating instruction length is 4 bytes, and the rest instruction length is 1 byte.
When the detonation network system performs detonation communication, the detonation network system mainly comprises two communication flows of networking detection and time service detonation, and the execution process of the two communication flows and the communication consumption corresponding to different UID code dialing methods are analyzed respectively.
(1) When networking detection is executed, the detonation network system needs to detect whether all the digital electronic detonators input into the detonators are correctly connected to the detonation network, and at the moment, the corresponding communication duration is different when a conventional UID code dialing method and an optimized UID code double dialing method provided by the embodiment are adopted.
If a conventional UID code dialing method is adopted, the following operation needs to be carried out on each digital electronic detonator: if the [ dial UID instruction (1 byte) +uid (7 bytes) +read status instruction (1 byte) +return status (1 byte) +release instruction (1 byte) ], each digital electronic detonator needs to consume 11 bytes of communication time, and all digital electronic detonators consume 5500 bytes of communication time in total;
the improved UID code double dialing method provided in the foregoing embodiment, since there are only two UIDAs in the first UID group, CBAF23010100 and CBAF23010101 respectively. Therefore, when dialing the first UID group, only two operations (1 byte of UIDA dialing instruction) +uida (6 bytes) are needed in total, the corresponding 1 st time is executed when the 1 st transmission CBAF2301010000 is dialed, the 2 nd time is executed when the 257 th transmission CBAF2301010100 is dialed, and the total consumption of 14 bytes of communication duration is 14.
And then, dialing the second UID group, namely executing [ dialing UIDB instruction (1 byte) +UIDB (1 byte) +reading state instruction (1 byte) +return state (1 byte) +releasing instruction (1 byte) ], wherein each digital electronic detonator needs to consume 5 bytes of communication time, and the total consumption of 2500 bytes of communication time. The entire networking detection flow totals 2514 byte communication duration.
As can be seen by comparison, after the improved UID code double dialing method in the embodiment is adopted in the networking detection program, the communication time of the whole networking detection is only 2514 which is 5500 times of that of the conventional UID code dialing method, and the communication time can be saved by about 54%.
(2) When time-service initiation is executed, the initiation network system needs to finish operations such as password checking, delay writing, state confirmation (at least including whether password checking is successful, whether delay writing is correct or not) and the like for each digital electronic detonator, and when a conventional UID code dialing method and the optimized UID code double dialing method provided by the embodiment are adopted, corresponding communication time lengths are different.
If a conventional UID code dialing method is adopted, the following operation needs to be carried out on each digital electronic detonator: the method comprises the steps that (1 byte of UID dialing instruction (1 byte) +UID (7 bytes) +checking password instruction (1 byte) +password (4 bytes) +writing delay instruction (1 byte) +delay data (3 bytes) +reading state instruction (1 byte) +returning state (1 byte) +releasing instruction (1 byte)), 20 bytes of communication time is required to be consumed by each digital electronic detonator, and 10000 bytes of communication time is required to be consumed by all digital electronic detonators in total. Finally, a detonation instruction (4 bytes, one-to-many communication) is needed to make the whole detonation network system complete detonation. Therefore, the corresponding whole time service initiation flow consumes 10004 bytes of communication duration in total.
Based on the same grouping, the modified UID code double dialing method in the foregoing embodiment is used, and only two operations [ dialing UIDA instruction (1 byte) +uida (6 bytes) ] are required to be executed in total when dialing the first UID group, so that a total of 14 bytes of communication duration is consumed. Then, the second UID set needs to be dialed, that is, executing [ dialing UIDB instruction (1 byte) +uidb (1 byte) +checking password instruction (1 byte) +password (4 bytes) +writing delay instruction (1 byte) +delay data (3 bytes) +reading state instruction (1 byte) +return state (1 byte) +release instruction (1 byte) ], and each digital electronic detonator needs to consume 14 bytes of communication duration, and all digital electronic detonators consume 7000 bytes of communication duration in total. Finally, a detonation instruction (4 bytes) is needed to enable the whole detonation network system to finish detonation. Therefore, the corresponding whole time service initiation flow consumes 7004 bytes of communication duration in total.
By comparison, after the improved UID code double dialing method of the embodiment is adopted in the time service initiation procedure, the communication time of the whole initiation network system is only 10004 times 7004 times of the conventional UID code dialing method, and the communication time can be saved by about 30%.
Example five
The application provides a digital electronic detonator detonation network UID code double dialing device, which comprises the following units:
the all UID code acquisition unit is used for acquiring the UID codes of all the digital electronic detonators in the digital electronic detonator priming network system.
And the UID code grouping unit is used for grouping all the UID codes.
And the first UID group dialing unit is used for dialing the first UID group.
And the second UID group dialing unit is used for dialing the second UID group.
The first dialing state confirmation unit is used for confirming the first dialing state of the digital electronic detonator.
And the second dialing state confirmation unit is used for confirming the second dialing state of the digital electronic detonator.
The selected dialing state confirmation unit is used for confirming the digital electronic detonator entering the selected dialing state according to the first dialing state and the second dialing state and is used for communication.
In a preferred embodiment, the device further comprises a complete UID code ordering unit, which is used for optimally ordering the dialing sequence of all digital electronic detonators, so as to save communication time to the greatest extent.
The application further provides a digital electronic detonator detonation network communication device, which at least comprises the UID code double dialing device and performs detonation network communication.
It should be noted that, the specific working process of each unit provided in the above embodiment of the present application may refer to the corresponding steps in the above method embodiment, which is not described herein.
Another embodiment of the present application provides an electronic device, including: memory and a processor.
Wherein the memory is used for storing programs.
The processor is used for executing a program, and when the program is executed, the method is specifically used for realizing the digital electronic detonator detonation network UID code double dialing method and/or the communication method provided by any one of the embodiments.
Another embodiment of the present application provides a computer storage medium, configured to store a computer program, where the computer program is configured to implement the digital electronic detonator detonation network UID code double dialing method and/or the communication method provided in any one of the foregoing embodiments when the computer program is executed.
Computer storage media, including both non-transitory and non-transitory, removable and non-removable media, may be implemented in any method or technology for storage of information. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, read only optical disk read only memory (CD ≡rom), digital Versatile Disks (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by the computing device. Computer-readable media, as defined herein, does not include transitory computer-readable media (transmission media), such as modulated data signals and carrier waves.
Those of skill would further appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative elements and steps are described above generally in terms of functionality in order to clearly illustrate the interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In summary, the application provides a UID code double dialing method, a communication method and a corresponding device for a detonation network of a digital electronic detonator, which are characterized in that after UIDs of all the digital electronic detonators in the detonation network system are split, double dialing is carried out according to a split UID group, a first dialing state and a second dialing state which correspond to the digital electronic detonators after double dialing are sequentially confirmed, and whether the corresponding digital electronic detonators enter a selected dialing state is finally confirmed according to the first dialing state and the second dialing state. All the digital electronic detonators which finally enter the selected dialing state can be in one-to-one communication with the detonators, so that the communication time of the digital electronic detonator detonating network system is shortened, and the networking communication efficiency is improved.
The above description is only a preferred embodiment of the present application, but the scope of the present application is not limited thereto, and any changes or substitutions that are not creatively contemplated by those skilled in the art within the technical scope of the present application should be included in the scope of the present application. Therefore, the protection scope of the present application should be subject to the protection scope defined by the claims.