CN117614867A - Data processing methods, devices, equipment, storage media and program products - Google Patents
Data processing methods, devices, equipment, storage media and program products Download PDFInfo
- Publication number
- CN117614867A CN117614867A CN202311636187.XA CN202311636187A CN117614867A CN 117614867 A CN117614867 A CN 117614867A CN 202311636187 A CN202311636187 A CN 202311636187A CN 117614867 A CN117614867 A CN 117614867A
- Authority
- CN
- China
- Prior art keywords
- data
- preset
- transmission
- data transmission
- target data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
- H04L43/0823—Errors, e.g. transmission errors
- H04L43/0829—Packet loss
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
- H04L43/0823—Errors, e.g. transmission errors
- H04L43/0847—Transmission error
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
- H04L43/0852—Delays
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Environmental & Geological Engineering (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Debugging And Monitoring (AREA)
Abstract
本申请涉及一种数据处理方法、装置、设备、存储介质和程序产品。所述方法包括:在不同试验应力的情况下,采用预设数据检测方式在数据传输前、数据传输过程中以及数据传输后分别对目标数据进行检测,得到多个数据检测结果;在所述数据检测结果不满足预设性能指标的情况下,采用预设处理方式进行处理。采用本方法能够提高数据传输完整性。
This application relates to a data processing method, device, equipment, storage medium and program product. The method includes: under different test stress conditions, using a preset data detection method to detect the target data before data transmission, during data transmission and after data transmission, to obtain multiple data detection results; in the data If the detection results do not meet the preset performance indicators, the preset processing method will be used. Using this method can improve data transmission integrity.
Description
技术领域Technical field
本申请涉及数据处理技术领域,特别是涉及一种数据处理方法、装置、设备、存储介质和程序产品。This application relates to the field of data processing technology, and in particular to a data processing method, device, equipment, storage medium and program product.
背景技术Background technique
随着现代科技的飞速发展,数据传输技术已经成为人们日常生活和工作中不可或缺的一部分。无论是通过电子邮件、社交媒体、视频通话等方式,还是在实际的物联网、智能制造、自动驾驶等应用场景中,数据传输技术都发挥着重要的作用。With the rapid development of modern technology, data transmission technology has become an indispensable part of people's daily life and work. Whether through email, social media, video calls, etc., or in actual application scenarios such as the Internet of Things, smart manufacturing, and autonomous driving, data transmission technology plays an important role.
在数据传输过程中,可能会因为网络丢包、数据损坏以及数据篡改等原因导致传输的数据发生错误,从而影响数据的完整性。During the data transmission process, errors may occur in the transmitted data due to reasons such as network packet loss, data corruption, and data tampering, thus affecting the integrity of the data.
发明内容Contents of the invention
基于此,有必要针对上述技术问题,提供一种能够提高数据传输完整性的数据处理方法、装置、设备、存储介质和程序产品。Based on this, it is necessary to provide a data processing method, device, equipment, storage medium and program product that can improve the integrity of data transmission in response to the above technical problems.
第一方面,本申请提供了一种数据处理方法,包括:In the first aspect, this application provides a data processing method, including:
在不同试验应力的情况下,采用预设数据检测方式在数据传输前、数据传输过程中以及数据传输后分别对目标数据进行检测,得到多个数据检测结果;In the case of different test stresses, the preset data detection method is used to detect the target data before, during and after data transmission, and multiple data detection results are obtained;
在数据检测结果不满足预设性能指标的情况下,采用预设处理方式进行处理。When the data detection results do not meet the preset performance indicators, the preset processing method is used for processing.
在其中一个实施例中,上述采用预设数据检测方式在数据传输前、数据传输过程中以及数据传输后分别对目标数据进行检测,得到多个数据检测结果,包括:In one embodiment, the above-mentioned preset data detection method is used to detect the target data before data transmission, during data transmission, and after data transmission, and multiple data detection results are obtained, including:
利用时间戳比对算法在数据传输前和数据传输后分别对目标数据的完整性进行检测,得到第一数据检测结果;Use the timestamp comparison algorithm to detect the integrity of the target data before and after data transmission, and obtain the first data detection result;
实时监测目标数据在数据传输过程中的性能指标,得到第二数据检测结果;Real-time monitoring of the performance indicators of the target data during the data transmission process and obtaining the second data detection results;
利用哈希函数在数据传输前和数据传输后分别对目标数据的完整性进行检测,得到第三数据检测结果。The hash function is used to detect the integrity of the target data before and after data transmission, and the third data detection result is obtained.
在其中一个实施例中,上述利用时间戳比对算法在数据传输前和数据传输后分别对目标数据的完整性进行校验,得到第一数据验证结果,包括:In one embodiment, the above-mentioned timestamp comparison algorithm is used to verify the integrity of the target data before and after data transmission, and the first data verification result is obtained, which includes:
在数据传输前,使用时间戳比对算法生成时间戳;Before data transmission, a timestamp is generated using a timestamp comparison algorithm;
将时间戳与目标数据进行关联;Associate timestamps with target data;
在数据传输后,利用时间戳比对算法对接收到的数据和目标数据进行比对,得到第一数据验证结果。After the data is transmitted, the received data and the target data are compared using a timestamp comparison algorithm to obtain the first data verification result.
在其中一个实施例中,上述实时监测目标数据在数据传输过程中的性能指标,得到第二数据检测结果,包括:In one embodiment, the performance indicators of the target data during the data transmission process are monitored in real time to obtain the second data detection result, including:
确定需要监测的性能指标;性能指标包括传输速度、延迟以及丢包率中的至少一个;Determine the performance indicators that need to be monitored; performance indicators include at least one of transmission speed, delay, and packet loss rate;
在数据传输过程中,实时监测性能指标,得到第二数据验证结果。During the data transmission process, performance indicators are monitored in real time and the second data verification result is obtained.
在其中一个实施例中,上述利用哈希函数在数据传输前和数据传输后分别对目标数据的完整性进行校验,得到第三数据验证结果,包括:In one embodiment, the hash function is used to verify the integrity of the target data before and after data transmission, and a third data verification result is obtained, including:
在数据传输前计算目标数据的第一哈希值;将目标数据与第一哈希值一同传输给接收端;Calculate the first hash value of the target data before data transmission; transmit the target data and the first hash value to the receiving end together;
在数据传输后,计算接收端接收到的数据的第二哈希值;After data transmission, calculate the second hash value of the data received by the receiving end;
比对第一哈希值和第二哈希值,得到第三数据验证结果。Compare the first hash value and the second hash value to obtain the third data verification result.
在其中一个实施例中,上述在数据检测结果不满足预设性能指标的情况下,采用预设处理方式进行处理,包括:In one embodiment, when the data detection results do not meet the preset performance indicators, the preset processing method is used for processing, including:
在第一数据验证结果和第三数据验证结果不满足预设性能指标的情况下,重传目标数据;If the first data verification result and the third data verification result do not meet the preset performance indicators, retransmit the target data;
在第二数据验证结果不满足预设性能指标的情况下,采用故障恢复策略自动切换到备用传输路径。When the second data verification result does not meet the preset performance indicators, a fault recovery strategy is used to automatically switch to the backup transmission path.
第二方面,本申请还提供了一种数据处理装置,其特征在于,装置包括:In a second aspect, this application also provides a data processing device, which is characterized in that the device includes:
验证模块,用于在不同试验应力的情况下,采用预设数据检测方式在数据传输前、数据传输过程中以及数据传输后分别对目标数据进行检测,得到多个数据检测结果;The verification module is used to detect the target data before, during and after data transmission using preset data detection methods under different test stress conditions to obtain multiple data detection results;
处理模块,用于在数据检测结果不满足预设性能指标的情况下,采用预设处理方式进行处理。The processing module is used to use the preset processing method for processing when the data detection results do not meet the preset performance indicators.
第三方面,本申请还提供了一种计算机设备,包括存储器和处理器,存储器存储有计算机程序,处理器执行计算机程序时实现以下步骤:In a third aspect, this application also provides a computer device, including a memory and a processor. The memory stores a computer program. When the processor executes the computer program, it implements the following steps:
在不同试验应力的情况下,采用预设数据检测方式在数据传输前、数据传输过程中以及数据传输后分别对目标数据进行检测,得到多个数据检测结果;In the case of different test stresses, the preset data detection method is used to detect the target data before, during and after data transmission, and multiple data detection results are obtained;
在数据检测结果不满足预设性能指标的情况下,采用预设处理方式进行处理。When the data detection results do not meet the preset performance indicators, the preset processing method is used for processing.
第四方面,本申请还提供了一种计算机可读存储介质,其上存储有计算机程序,计算机程序被处理器执行时实现以下步骤:In a fourth aspect, this application also provides a computer-readable storage medium on which a computer program is stored. When the computer program is executed by a processor, the following steps are implemented:
在不同试验应力的情况下,采用预设数据检测方式在数据传输前、数据传输过程中以及数据传输后分别对目标数据进行检测,得到多个数据检测结果;In the case of different test stresses, the preset data detection method is used to detect the target data before, during and after data transmission, and multiple data detection results are obtained;
在数据检测结果不满足预设性能指标的情况下,采用预设处理方式进行处理。When the data detection results do not meet the preset performance indicators, the preset processing method is used for processing.
第五方面,本申请还提供了一种计算机程序产品,包括计算机程序,该计算机程序被处理器执行时实现以下步骤:In a fifth aspect, this application also provides a computer program product, including a computer program that implements the following steps when executed by a processor:
在不同试验应力的情况下,采用预设数据检测方式在数据传输前、数据传输过程中以及数据传输后分别对目标数据进行检测,得到多个数据检测结果;In the case of different test stresses, the preset data detection method is used to detect the target data before, during and after data transmission, and multiple data detection results are obtained;
在数据检测结果不满足预设性能指标的情况下,采用预设处理方式进行处理。When the data detection results do not meet the preset performance indicators, the preset processing method is used for processing.
上述数据处理方法、装置、设备、存储介质和程序产品,在不同试验应力的情况下,采用预设数据检测方式在数据传输前、数据传输过程中以及数据传输后分别对目标数据进行检测,得到多个数据检测结果;再在数据检测结果不满足预设性能指标的情况下,采用预设处理方式进行处理;该方法中,通过采用预设数据检测方式,对目标数据进行全面检测,覆盖数据传输前、数据传输过程中和数据传输后的多个关键阶段,可以确保目标数据在各种应力条件下都能够维持高质量和可靠性。另外,采用预设处理方式,以确保及时而有效地应对潜在的问题,该过程紧密结合数据检测的不同阶段,以保障在整个数据传输过程中的稳定性和可靠性。The above data processing methods, devices, equipment, storage media and program products use preset data detection methods to detect target data before data transmission, during data transmission and after data transmission under different test stress conditions, and obtain Multiple data detection results; when the data detection results do not meet the preset performance indicators, the preset processing method is used for processing; in this method, the target data is comprehensively detected by using the preset data detection method, covering the data Multiple critical stages before transmission, during data transmission and after data transmission can ensure that the target data can maintain high quality and reliability under various stress conditions. In addition, preset processing methods are used to ensure timely and effective response to potential problems. This process is closely integrated with different stages of data detection to ensure stability and reliability throughout the entire data transmission process.
附图说明Description of drawings
为了更清楚地说明本申请实施例或相关技术中的技术方案,下面将对实施例或相关技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to more clearly explain the technical solutions in the embodiments of the present application or related technologies, the drawings needed to be used in the description of the embodiments or related technologies will be briefly introduced below. Obviously, the drawings in the following description are only for the purpose of describing the embodiments or related technologies. For some embodiments of the application, those of ordinary skill in the art can also obtain other drawings based on these drawings without exerting creative efforts.
图1为一个实施例中计算机设备的内部结构图;Figure 1 is an internal structural diagram of a computer device in one embodiment;
图2为一个实施例中数据处理方法的流程示意图;Figure 2 is a schematic flow chart of a data processing method in one embodiment;
图3为另一个实施例中数据处理方法的流程示意图;Figure 3 is a schematic flow chart of a data processing method in another embodiment;
图4为另一个实施例中数据处理方法的流程示意图;Figure 4 is a schematic flow chart of a data processing method in another embodiment;
图5为另一个实施例中数据处理方法的流程示意图;Figure 5 is a schematic flow chart of a data processing method in another embodiment;
图6为另一个实施例中数据处理方法的流程示意图;Figure 6 is a schematic flow chart of a data processing method in another embodiment;
图7为一个实施例中数据处理装置的结构框图。Figure 7 is a structural block diagram of a data processing device in one embodiment.
具体实施方式Detailed ways
为了使本申请的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本申请进行进一步详细说明。应当理解,此处描述的具体实施例仅仅用以解释本申请,并不用于限定本申请。In order to make the purpose, technical solutions and advantages of the present application more clear, the present application will be further described in detail below with reference to the drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application and are not used to limit the present application.
在一个示例性的实施例中,提供了一种计算机设备,该计算机设备可以是服务器,其内部结构图可以如图1所示。该计算机设备包括处理器、存储器、输入/输出接口(Input/Output,简称I/O)和通信接口。其中,处理器、存储器和输入/输出接口通过系统总线连接,通信接口通过输入/输出接口连接到系统总线。其中,该计算机设备的处理器用于提供计算和控制能力。该计算机设备的存储器包括非易失性存储介质和内存储器。该非易失性存储介质存储有操作系统、计算机程序和数据库。该内存储器为非易失性存储介质中的操作系统和计算机程序的运行提供环境。该计算机设备的数据库用于存储数据处理过程中的数据。该计算机设备的输入/输出接口用于处理器与外部设备之间交换信息。该计算机设备的通信接口用于与外部的终端通过网络连接通信。该计算机程序被处理器执行时以实现一种数据处理方法。In an exemplary embodiment, a computer device is provided. The computer device may be a server, and its internal structure diagram may be as shown in Figure 1 . The computer device includes a processor, a memory, an input/output interface (Input/Output, referred to as I/O), and a communication interface. Among them, the processor, memory and input/output interface are connected through the system bus, and the communication interface is connected to the system bus through the input/output interface. Wherein, the processor of the computer device is used to provide computing and control capabilities. The memory of the computer device includes non-volatile storage media and internal memory. The non-volatile storage medium stores operating systems, computer programs and databases. This internal memory provides an environment for the execution of operating systems and computer programs in non-volatile storage media. The computer device's database is used to store data during data processing. The input/output interface of the computer device is used to exchange information between the processor and external devices. The communication interface of the computer device is used to communicate with an external terminal through a network connection. The computer program, when executed by the processor, implements a data processing method.
在一个示例性的实施例中,如图2所示,提供了一种数据处理方法,以该方法应用于图1中的计算机设备为例进行说明,包括以下S202至S204。其中:In an exemplary embodiment, as shown in Figure 2, a data processing method is provided. This method is explained by taking the method applied to the computer device in Figure 1 as an example, including the following S202 to S204. in:
S202,在不同试验应力的情况下,采用预设数据检测方式在数据传输前、数据传输过程中以及数据传输后分别对目标数据进行检测,得到多个数据检测结果。S202, under different test stress conditions, use a preset data detection method to detect the target data before data transmission, during data transmission, and after data transmission, and obtain multiple data detection results.
其中,试验应力是指对系统、设备或过程施加的一种控制性压力或条件,旨在测试其性能、稳定性和可靠性。这种压力可以模拟系统在特定工作负荷或环境条件下所面临的挑战,从而帮助评估系统在实际运行中的表现。试验应力的引入可以帮助发现潜在的问题、瓶颈或性能瓶颈,以便对系统进行改进。Among them, test stress refers to a controlled pressure or condition imposed on a system, equipment or process to test its performance, stability and reliability. This stress can help evaluate how the system will perform in real-world operations by simulating the challenges a system faces under specific workloads or environmental conditions. The introduction of experimental stress can help identify potential problems, bottlenecks or performance bottlenecks so that the system can be improved.
以下是一些常见的试验应力:(1)网络流量增加:通过增加模拟用户数量、数据量或请求频率,以测试系统在高负载下的数据传输速度和带宽利用率。(2)系统负荷变化:通过模拟短时间内的大量任务或请求,以测试系统在高负荷下的处理能力和响应时间。(3)环境温度波动:通过改变环境温度,测试设备在不同温度条件下的性能和稳定性,以检验其对温度变化的适应能力。(4)电力波动:通过模拟电压波动或电力中断,以测试设备或系统在不稳定电力供应条件下的工作表现。(5)软件负载测试:通过模拟大规模用户并行访问或复杂的操作,以评估软件在高负荷条件下的性能、稳定性和安全性。(6)机械应力测试:通过施加不同的物理力或振动,测试材料或零部件在各种条件下的耐久性和强度。The following are some common test stresses: (1) Increase in network traffic: by increasing the number of simulated users, data volume, or request frequency to test the system's data transmission speed and bandwidth utilization under high load. (2) System load changes: By simulating a large number of tasks or requests in a short period of time, the system's processing capabilities and response time under high load are tested. (3) Ambient temperature fluctuation: By changing the ambient temperature, the performance and stability of the equipment under different temperature conditions are tested to test its adaptability to temperature changes. (4) Power fluctuation: Test the performance of equipment or systems under unstable power supply conditions by simulating voltage fluctuations or power interruptions. (5) Software load testing: Evaluate the performance, stability and security of software under high load conditions by simulating parallel access by large-scale users or complex operations. (6) Mechanical stress test: Test the durability and strength of materials or components under various conditions by applying different physical forces or vibrations.
在本申请实施例中,在面对不同试验应力的情况下,首先,在数据传输前的预检测阶段,对目标数据执行严格的检查,以确保其完整性和准确性。这可以包括对数据格式、缺失值和异常值的仔细审查,以确保数据满足预期的输入条件。In the embodiment of this application, in the face of different test stresses, first, in the pre-detection stage before data transmission, strict inspection is performed on the target data to ensure its integrity and accuracy. This can include careful review of data formats, missing values, and outliers to ensure that the data meets the expected input conditions.
接下来,在数据传输过程中,引入实时检测机制,以监控数据的稳定性和一致性。通过动态检测数据的变化、丢失或损坏,可以及时发现并纠正潜在的问题,确保数据在传输过程中的可靠性。这可以涉及使用冗余校验、错误纠正码等技术。Next, during the data transmission process, a real-time detection mechanism is introduced to monitor the stability and consistency of the data. By dynamically detecting data changes, loss, or damage, potential problems can be discovered and corrected in a timely manner, ensuring the reliability of data during transmission. This can involve using techniques such as redundancy checking, error correcting codes, etc.
在数据传输完成后的后续检测阶段,再次对目标数据进行检测,以确认其完整性和准确性。这包括对数据一致性的验证、重复项的处理以及必要时的修复措施,确保在传输过程中没有发生不可逆的损失或篡改。In the subsequent detection phase after the data transmission is completed, the target data is detected again to confirm its completeness and accuracy. This includes verification of data consistency, handling of duplicates and remediation where necessary to ensure that no irreversible loss or tampering occurred during transmission.
S204,在数据检测结果不满足预设性能指标的情况下,采用预设处理方式进行处理。S204: When the data detection results do not meet the preset performance indicators, the preset processing method is used for processing.
在本申请实施例中,在检测数据传输前的阶段,如果数据未能满足预设性能指标,将启动相应的预设处理措施。这可以包括数据格式的调整、缺失值的填充或异常值的修复,以确保数据在进入传输过程前达到所需的标准。In the embodiment of the present application, in the stage before detecting data transmission, if the data fails to meet the preset performance indicators, corresponding preset processing measures will be initiated. This can include adjustments to data formatting, filling of missing values, or repair of outliers to ensure the data is up to the required standard before entering the transfer process.
在数据传输过程中,如果实时检测揭示了问题,可以根据预设处理方式立即采取行动。可选的处理措施包括错误纠正码的应用、即时重传机制的触发或是其他技术手段,以维护数据在传输过程中的完整性和一致性。If real-time detection reveals a problem during data transfer, immediate action can be taken based on preset processing methods. Optional processing measures include the application of error correction codes, triggering of instant retransmission mechanisms, or other technical means to maintain the integrity and consistency of data during transmission.
当数据传输完成后,若检测结果未满足性能指标,可以执行相应的后续处理措施。这可以包括对数据进行进一步的验证、清理冗余信息或进行修复。目的是确保传输后的数据能够符合预期的质量标准。After the data transmission is completed, if the detection results do not meet the performance indicators, corresponding follow-up processing measures can be implemented. This can include further validation of the data, cleanup of redundant information, or repair. The purpose is to ensure that the transferred data meets expected quality standards.
上述数据处理方法中,在不同试验应力的情况下,采用预设数据检测方式在数据传输前、数据传输过程中以及数据传输后分别对目标数据进行检测,得到多个数据检测结果;再在数据检测结果不满足预设性能指标的情况下,采用预设处理方式进行处理;该方法中,通过采用预设数据检测方式,对目标数据进行全面检测,覆盖数据传输前、数据传输过程中和数据传输后的多个关键阶段,可以确保目标数据在各种应力条件下都能够维持高质量和可靠性。另外,采用预设处理方式,以确保及时而有效地应对潜在的问题,该过程紧密结合数据检测的不同阶段,以保障在整个数据传输过程中的稳定性和可靠性。In the above data processing method, under different test stress conditions, a preset data detection method is used to detect the target data before data transmission, during data transmission and after data transmission, and multiple data detection results are obtained; then in the data If the detection results do not meet the preset performance indicators, the preset processing method is used for processing; in this method, the target data is comprehensively detected by using the preset data detection method, covering before data transmission, during data transmission and data transmission. Multiple critical stages after transmission ensure that target data maintains high quality and reliability under various stress conditions. In addition, preset processing methods are used to ensure timely and effective response to potential problems. This process is closely integrated with different stages of data detection to ensure stability and reliability throughout the entire data transmission process.
在一个示例性的实施例中,如图3所示,S202包括S302至S306。其中:In an exemplary embodiment, as shown in Figure 3, S202 includes S302 to S306. in:
S302,利用时间戳比对算法在数据传输前和数据传输后分别对目标数据的完整性进行检测,得到第一数据检测结果。S302: Use a timestamp comparison algorithm to detect the integrity of the target data before and after data transmission, and obtain the first data detection result.
S304,实时监测目标数据在数据传输过程中的性能指标,得到第二数据检测结果。S304, monitor the performance indicators of the target data during the data transmission process in real time, and obtain the second data detection result.
S306,利用哈希函数在数据传输前和数据传输后分别对目标数据的完整性进行检测,得到第三数据检测结果。S306: Use the hash function to detect the integrity of the target data before and after data transmission, and obtain the third data detection result.
在本申请实施例中,采用时间戳比对算法,首先在数据传输前对目标数据的完整性进行检测,通过比对时间戳信息来验证数据的时间一致性。这得到了第一数据检测结果,确保数据在传输前处于正确的时间状态。In the embodiment of this application, a timestamp comparison algorithm is used to first detect the integrity of the target data before data transmission, and verify the time consistency of the data by comparing the timestamp information. This results in a first data check, ensuring the data is in the correct time state before transmission.
在数据传输过程中,通过实时监测目标数据的性能指标,得到了第二数据检测结果。这包括对数据传输速度、带宽利用率等实时性能参数的动态监测,以确保数据在传输过程中能够满足预设的性能标准。During the data transmission process, the second data detection result is obtained by monitoring the performance indicators of the target data in real time. This includes dynamic monitoring of real-time performance parameters such as data transmission speed and bandwidth utilization to ensure that data can meet preset performance standards during transmission.
利用哈希函数,在数据传输后对目标数据的完整性进行检测,得到了第三数据检测结果。通过比对数据的哈希值,能够验证数据在传输过程中是否发生了任何不可逆的变化,确保数据的原始状态得到保持。The hash function is used to detect the integrity of the target data after data transmission, and the third data detection result is obtained. By comparing the hash value of the data, it can be verified whether any irreversible changes have occurred during the transmission process, ensuring that the original state of the data is maintained.
上述实施例中,整合这三个数据检测结果,能够全面评估目标数据在不同阶段的状态。如果任何一个阶段的检测结果不符合预期性能指标,可以立即采用预设处理方式来处理数据,以确保数据在整个传输过程中的质量和完整性。这一综合检测和处理过程旨在提高数据传输的可靠性和稳定性,确保目标数据能够在各种应力条件下保持高质量。In the above embodiment, integrating these three data detection results can comprehensively evaluate the status of the target data at different stages. If the detection results at any stage do not meet the expected performance indicators, the data can be processed immediately using preset processing methods to ensure the quality and integrity of the data throughout the transmission process. This comprehensive detection and processing process is designed to improve the reliability and stability of data transmission, ensuring that target data maintains high quality under various stress conditions.
在一个示例性的实施例中,如图4所示,S302包括S402至S406。其中:In an exemplary embodiment, as shown in Figure 4, S302 includes S402 to S406. in:
S402,在数据传输前,使用时间戳比对算法生成时间戳。S402. Before data transmission, use a timestamp comparison algorithm to generate a timestamp.
S404,将时间戳与目标数据进行关联。S404, associate the timestamp with the target data.
S406,在数据传输后,利用时间戳比对算法对接收到的数据和目标数据进行比对,得到第一数据验证结果。S406. After the data is transmitted, use the timestamp comparison algorithm to compare the received data with the target data to obtain the first data verification result.
在本申请实施例中,在数据传输前,首先采用时间戳比对算法生成时间戳,该时间戳将作为数据传输的参考标识。随后,将生成的时间戳与目标数据进行关联,以确保在传输过程中能够准确地追踪数据的时间属性。In this embodiment of the present application, before data transmission, a timestamp comparison algorithm is first used to generate a timestamp, which will be used as a reference identifier for data transmission. The resulting timestamps are then correlated with the target data to ensure that the temporal attributes of the data are accurately tracked during transfer.
随后,一旦数据传输完成,在数据传输后阶段,利用相同的时间戳比对算法对接收到的数据和关联的目标数据进行比对。这个比对过程涉及时间戳的对应关系,以验证接收到的数据是否与传输前的目标数据保持一致。这样,可以得到第一数据验证结果,从而确保了数据在传输后的完整性和时序一致性。Subsequently, once the data transfer is completed, the received data is compared with the associated target data using the same timestamp comparison algorithm in the post-data transfer phase. This comparison process involves the correspondence of timestamps to verify that the received data is consistent with the target data before transmission. In this way, the first data verification result can be obtained, thereby ensuring the integrity and timing consistency of the data after transmission.
上述实施例中,通过时间戳的引入,可以有效地将数据的传输前后联系起来,并借助时间戳比对算法,实现了对数据的验证。这有助于确保数据在传输过程中没有发生不可逆的变化,从而维护数据的可靠性和完整性。In the above embodiment, through the introduction of timestamps, the transmission of data can be effectively linked before and after, and the verification of data can be achieved with the help of timestamp comparison algorithms. This helps ensure that data is not irreversibly changed during transmission, thereby maintaining data reliability and integrity.
在一个示例性的实施例中,如图5所示,S304包括S502至S504。其中:In an exemplary embodiment, as shown in Figure 5, S304 includes S502 to S504. in:
S502,确定需要监测的性能指标;性能指标包括传输速度、延迟以及丢包率中的至少一个。S502: Determine the performance indicators that need to be monitored; the performance indicators include at least one of transmission speed, delay and packet loss rate.
S504,在数据传输过程中,实时监测性能指标,得到第二数据验证结果。S504: During the data transmission process, the performance indicators are monitored in real time and the second data verification result is obtained.
在本申请实施例中,在数据传输过程中,可以实时监测所选性能指标,以获取第二数据验证结果。这包括:In the embodiment of the present application, during the data transmission process, the selected performance indicators can be monitored in real time to obtain the second data verification result. This includes:
(1)传输速度:在传输过程中实时监测数据传输的速度,确保数据以期望的速率进行传送。通过比对实际传输速度与预设的速度标准,能够得到传输速度的第二数据验证结果。(1) Transmission speed: Monitor the speed of data transmission in real time during the transmission process to ensure that data is transmitted at the desired rate. By comparing the actual transmission speed with the preset speed standard, the second data verification result of the transmission speed can be obtained.
(2)延迟:实时监测数据传输的延迟,即从发送数据到接收数据之间的时间间隔。通过比对实际延迟与设定的延迟目标,能够得到延迟的第二数据验证结果。(2) Delay: Monitor the delay of data transmission in real time, that is, the time interval between sending data and receiving data. By comparing the actual delay with the set delay target, the second data verification result of the delay can be obtained.
(3)丢包率:监测数据传输过程中发生的数据丢失情况,计算丢包率。通过比对实际丢包率与预设的丢包率标准,能够得到丢包率的第二数据验证结果。(3) Packet loss rate: Monitor data loss during data transmission and calculate the packet loss rate. By comparing the actual packet loss rate with the preset packet loss rate standard, the second data verification result of the packet loss rate can be obtained.
上述实施例中,通过获取第二数据验证结果,能够迅速发现并响应于性能问题,从而优化数据传输过程的效率和可靠性。In the above embodiment, by obtaining the second data verification result, performance problems can be quickly discovered and responded to, thereby optimizing the efficiency and reliability of the data transmission process.
在一个示例性的实施例中,如图6所示,S306包括S602至S606。其中:In an exemplary embodiment, as shown in Figure 6, S306 includes S602 to S606. in:
S602,在数据传输前计算目标数据的第一哈希值;将目标数据与第一哈希值一同传输给接收端。S602: Calculate the first hash value of the target data before data transmission; transmit the target data and the first hash value to the receiving end together.
S604,在数据传输后,计算接收端接收到的数据的第二哈希值。S604: After data transmission, calculate the second hash value of the data received by the receiving end.
S606,比对第一哈希值和第二哈希值,得到第三数据验证结果。S606: Compare the first hash value and the second hash value to obtain the third data verification result.
在本申请实施例中,在数据传输前,首先对目标数据进行处理,使用哈希函数计算得到第一哈希值。将目标数据与计算得到的第一哈希值一同传输给接收端,以确保数据在传输前的完整性。In the embodiment of the present application, before data transmission, the target data is first processed, and a hash function is used to calculate the first hash value. The target data is transmitted to the receiving end together with the calculated first hash value to ensure the integrity of the data before transmission.
随后,一旦数据传输完成,在数据传输后阶段,接收端计算接收到的数据的第二哈希值。这个计算涵盖了接收到的数据的整体性。Subsequently, once the data transfer is completed, in the post-data transfer phase, the receiving end calculates a second hash value of the received data. This calculation covers the entirety of the received data.
最后,比对传输前计算的第一哈希值与传输后接收端计算的第二哈希值,以得到第三数据验证结果。这个比对过程旨在验证数据在传输过程中是否发生了任何不可逆的变化。一致的哈希值表明数据在传输过程中没有损坏或篡改,确保了数据的完整性。Finally, compare the first hash value calculated before transmission and the second hash value calculated by the receiving end after transmission to obtain the third data verification result. This comparison process is designed to verify whether any irreversible changes have occurred in the data during transmission. Consistent hashes indicate that the data has not been corrupted or tampered with during transmission, ensuring data integrity.
上述实施例中,通过比对第一和第二哈希值,可以有效验证数据在传输过程中是否发生了任何损坏或篡改。一致的哈希值表明数据在传输过程中没有发生不可逆的变化,确保了数据的完整性。通过哈希值的比对,可以检测出数据是否在传输过程中被篡改。任何对数据的篡改都会导致第一和第二哈希值的不一致,从而提供了对数据篡改的可靠检测机制。将第一哈希值与目标数据一同传输给接收端确保了传输前数据和哈希值的一致性。接收端可以使用这个一致性的哈希值来验证接收到的数据是否与发送端的数据匹配。通过在数据传输后计算第二哈希值,这一过程具有实时性,能够及时发现数据传输过程中的问题,从而减小问题的影响范围并提高系统的实时性能。通过哈希值的比对,有助于提高数据传输的安全性,降低数据在传输过程中受到的潜在风险。In the above embodiment, by comparing the first and second hash values, it can be effectively verified whether any damage or tampering has occurred during the transmission of the data. Consistent hash values indicate that the data has not been irreversibly changed during transmission, ensuring data integrity. By comparing hash values, it can be detected whether the data has been tampered with during transmission. Any tampering with the data will result in inconsistency between the first and second hash values, thus providing a reliable detection mechanism for data tampering. Transmitting the first hash value together with the target data to the receiving end ensures the consistency of the data and hash value before transmission. The receiver can use this consistent hash value to verify that the received data matches the sender's data. By calculating the second hash value after data transmission, this process is real-time and can detect problems in the data transmission process in time, thereby reducing the scope of the problem and improving the real-time performance of the system. Through the comparison of hash values, it helps to improve the security of data transmission and reduce potential risks to the data during transmission.
在一个示例性的实施例中,S204包括S702至S704。其中:In an exemplary embodiment, S204 includes S702 to S704. in:
S702,在第一数据验证结果和第三数据验证结果不满足预设性能指标的情况下,重传目标数据。S702: If the first data verification result and the third data verification result do not meet the preset performance indicators, retransmit the target data.
在本申请实施例中,在第一数据验证结果和第三数据验证结果不满足预设性能指标的情况下,可以采取相应的处理措施,进行目标数据的重传。In the embodiment of the present application, when the first data verification result and the third data verification result do not meet the preset performance indicators, corresponding processing measures can be taken to retransmit the target data.
首先,当第一数据验证结果不符合预设性能指标时,识别出数据在传输前或者传输后可能存在的问题,立即启动目标数据的重传。这可以包括重新计算哈希值、更正格式错误或应用其他预设处理方式,以确保数据重新符合预期性能标准。First, when the first data verification result does not meet the preset performance indicators, problems that may exist before or after data transmission are identified, and retransmission of the target data is immediately initiated. This can include recalculating hashes, correcting formatting errors, or applying other preset processing to ensure the data again meets expected performance standards.
同时,如果第三数据验证结果未满足预设性能指标,在这种情况下,也立即采取措施,重新传输目标数据,以确保数据在重新传输后满足预设的性能标准。At the same time, if the third data verification result does not meet the preset performance indicators, in this case, measures will be taken immediately to retransmit the target data to ensure that the data meets the preset performance standards after retransmission.
S704,在第二数据验证结果不满足预设性能指标的情况下,采用故障恢复策略自动切换到备用传输路径。S704: When the second data verification result does not meet the preset performance index, use a fault recovery strategy to automatically switch to the backup transmission path.
在本申请实施例中,在第二数据验证结果不满足预设性能指标的情况下,可以立即启动故障恢复策略,自动切换到备用传输路径。这个过程旨在确保在数据传输过程中保持连续性和高可用性,即使出现性能问题。In this embodiment of the present application, when the second data verification result does not meet the preset performance indicators, the fault recovery strategy can be started immediately and the backup transmission path can be automatically switched. This process is designed to ensure continuity and high availability during data transfer, even if performance issues arise.
首先,一旦第二数据验证结果显示性能未达到预设标准,服务器会识别当前传输路径存在问题。自动切换到备用传输路径是为了避免在问题路径上持续传输可能导致进一步的性能下降或数据损失。First, once the second data verification result shows that the performance does not meet the preset standard, the server will identify that there is a problem with the current transmission path. The automatic switch to an alternate transmission path is to avoid continued transmission on the problem path that could result in further performance degradation or data loss.
采用故障恢复策略,需要确保备用传输路径已事先设置和验证。这可以包括备用通道的激活、路由的调整或其他技术手段,以确保数据可以顺利通过备用路径传输。When adopting a failover strategy, you need to ensure that alternative transmission paths have been set up and verified in advance. This can include activation of backup channels, adjustment of routing, or other technical means to ensure that data can be transmitted smoothly through backup paths.
上述实施例中,当数据验证结果不符合预设性能标准时,立即重传目标数据或自动切换到备用传输路径,能够实现快速的响应和恢复。这降低了性能问题对系统的潜在影响。通过重传目标数据,确保数据在传输前后的一致性和完整性。同时,在故障恢复策略的支持下,自动切换到备用传输路径有助于维护数据传输的连续性,减小数据在传输过程中可能出现的错误或丢失。整合重传机制和故障恢复策略,有助于提高系统的连续性和可用性。即使在面对数据传输过程中的问题,系统仍能够快速自我修复,保持数据传输的顺畅进行。通过及时的重传和故障恢复,减少了数据在传输过程中受到的潜在风险。这对于对数据安全性和完整性要求较高的应用场景尤为重要。采用自动化的重传和故障恢复策略,减少了人工干预的需求,提高了系统的自主性和操作效率。总体而言,这一综合的处理策略有助于维护数据传输的高质量和可靠性,确保数据在各个阶段都能够达到预设的性能标准,提高了鲁棒性。In the above embodiment, when the data verification result does not meet the preset performance standards, the target data is immediately retransmitted or automatically switched to an alternate transmission path, which can achieve rapid response and recovery. This reduces the potential impact of performance issues on the system. By retransmitting the target data, the consistency and integrity of the data before and after transmission are ensured. At the same time, with the support of failure recovery strategies, automatic switching to alternate transmission paths helps maintain the continuity of data transmission and reduce possible errors or losses during data transmission. Integrating retransmission mechanisms and fault recovery strategies helps improve system continuity and availability. Even in the face of problems during data transmission, the system can still quickly repair itself and maintain smooth data transmission. Through timely retransmission and fault recovery, potential risks to data during transmission are reduced. This is particularly important for application scenarios with high requirements on data security and integrity. The use of automated retransmission and failure recovery strategies reduces the need for manual intervention and improves system autonomy and operational efficiency. Overall, this comprehensive processing strategy helps maintain the high quality and reliability of data transmission, ensuring that data can meet preset performance standards at all stages and improving robustness.
以下给出一个详细实施例来对本申请实施例中数据处理方法的过程进行说明,在上述实施例的基础上,该方法的实现过程可以包括以下内容:A detailed embodiment is given below to illustrate the process of the data processing method in the embodiment of the present application. Based on the above embodiment, the implementation process of the method may include the following content:
S1,在不同试验应力的情况下,在数据传输前,使用时间戳比对算法生成时间戳。S1, under different test stress conditions, a timestamp comparison algorithm is used to generate timestamps before data transmission.
S2,将时间戳与目标数据进行关联。S2, associates the timestamp with the target data.
S3,在数据传输后,利用时间戳比对算法对接收到的数据和目标数据进行比对,得到第一数据验证结果。S3. After data transmission, use the timestamp comparison algorithm to compare the received data with the target data to obtain the first data verification result.
S4,确定需要监测的性能指标;性能指标包括传输速度、延迟以及丢包率中的至少一个。S4: Determine the performance indicators that need to be monitored; the performance indicators include at least one of transmission speed, delay and packet loss rate.
S5,在数据传输过程中,实时监测性能指标,得到第二数据验证结果。S5, during the data transmission process, the performance indicators are monitored in real time and the second data verification result is obtained.
S6,在数据传输前计算目标数据的第一哈希值;将目标数据与第一哈希值一同传输给接收端。S6: Calculate the first hash value of the target data before data transmission; transmit the target data and the first hash value to the receiving end together.
S7,在数据传输后,计算接收端接收到的数据的第二哈希值。S7, after data transmission, calculate the second hash value of the data received by the receiving end.
S8,比对第一哈希值和第二哈希值,得到第三数据验证结果。S8: Compare the first hash value and the second hash value to obtain the third data verification result.
S9,在第一数据验证结果和第三数据验证结果不满足预设性能指标的情况下,重传目标数据。S9: If the first data verification result and the third data verification result do not meet the preset performance indicators, retransmit the target data.
S10,在第二数据验证结果不满足预设性能指标的情况下,采用故障恢复策略自动切换到备用传输路径。S10: When the second data verification result does not meet the preset performance index, a fault recovery strategy is used to automatically switch to the backup transmission path.
应该理解的是,虽然如上的各实施例所涉及的流程图中的各个步骤按照箭头的指示依次显示,但是这些步骤并不是必然按照箭头指示的顺序依次执行。除非本文中有明确的说明,这些步骤的执行并没有严格的顺序限制,这些步骤可以以其它的顺序执行。而且,如上的各实施例所涉及的流程图中的至少一部分步骤可以包括多个步骤或者多个阶段,这些步骤或者阶段并不必然是在同一时刻执行完成,而是可以在不同的时刻执行,这些步骤或者阶段的执行顺序也不必然是依次进行,而是可以与其它步骤或者其它步骤中的步骤或者阶段的至少一部分轮流或者交替地执行。It should be understood that although the steps in the flowcharts involved in the above embodiments are shown in sequence as indicated by the arrows, these steps are not necessarily executed in the order indicated by the arrows. Unless explicitly stated in this article, there is no strict order restriction on the execution of these steps, and these steps can be executed in other orders. Moreover, at least some of the steps in the flowcharts involved in the above embodiments may include multiple steps or multiple stages. These steps or stages are not necessarily executed at the same time, but may be executed at different times. The execution order of these steps or stages is not necessarily sequential, but may be performed in turn or alternately with other steps or at least part of the steps or stages in other steps.
基于同样的发明构思,本申请实施例还提供了一种用于实现上述所涉及的数据处理方法的数据处理装置。该装置所提供的解决问题的实现方案与上述方法中所记载的实现方案相似,故下面所提供的一个或多个数据处理装置实施例中的具体限定可以参见上文中对于数据处理方法的限定,在此不再赘述。 Based on the same inventive concept, embodiments of the present application also provide a data processing device for implementing the above-mentioned data processing method. The problem-solving solution provided by this device is similar to the solution recorded in the above method. Therefore, for the specific limitations in one or more data processing device embodiments provided below, please refer to the above limitations on the data processing method. I won’t go into details here .
在一个示例性的实施例中,如图7所示,提供了一种数据处理装置,包括:验证模块11和处理模块12,其中:In an exemplary embodiment, as shown in Figure 7, a data processing device is provided, including: a verification module 11 and a processing module 12, wherein:
验证模块11,用于在不同试验应力的情况下,采用预设数据检测方式在数据传输前、数据传输过程中以及数据传输后分别对目标数据进行检测,得到多个数据检测结果;The verification module 11 is used to detect target data using preset data detection methods before data transmission, during data transmission and after data transmission under different test stress conditions, and obtain multiple data detection results;
处理模块12,用于在数据检测结果不满足预设性能指标的情况下,采用预设处理方式进行处理。The processing module 12 is used to perform processing using a preset processing method when the data detection results do not meet the preset performance indicators.
在另一个实施例中,提供了另一种数据处理装置,在上述实施例的基础上,上述验证模块11可以包括:In another embodiment, another data processing device is provided. Based on the above embodiment, the above verification module 11 may include:
第一检测单元,用于利用时间戳比对算法在数据传输前和数据传输后分别对目标数据的完整性进行检测,得到第一数据检测结果;The first detection unit is used to detect the integrity of the target data before and after data transmission using a timestamp comparison algorithm to obtain the first data detection result;
第二检测单元,用于实时监测目标数据在数据传输过程中的性能指标,得到第二数据检测结果;The second detection unit is used to monitor the performance indicators of the target data in the data transmission process in real time and obtain the second data detection result;
第三检测单元,用于利用哈希函数在数据传输前和数据传输后分别对目标数据的完整性进行检测,得到第三数据检测结果。The third detection unit is used to detect the integrity of the target data before and after data transmission by using a hash function to obtain a third data detection result.
在另一个实施例中,提供了另一种数据处理装置,在上述实施例的基础上,上述第一检测单元可以包括:In another embodiment, another data processing device is provided. Based on the above embodiment, the above-mentioned first detection unit may include:
生成子单元,用于在数据传输前,使用时间戳比对算法生成时间戳;The generation subunit is used to generate timestamps using a timestamp comparison algorithm before data transmission;
关联子单元,用于将时间戳与目标数据进行关联;Correlation subunit, used to associate timestamps with target data;
第一比对子单元,用于在数据传输后,利用时间戳比对算法对接收到的数据和目标数据进行比对,得到第一数据验证结果。The first comparison subunit is used to compare the received data with the target data using a timestamp comparison algorithm after data transmission to obtain the first data verification result.
在另一个实施例中,提供了另一种数据处理装置,在上述实施例的基础上,上述第二检测单元可以包括:In another embodiment, another data processing device is provided. Based on the above embodiment, the above-mentioned second detection unit may include:
确定子单元,用于确定需要监测的性能指标;性能指标包括传输速度、延迟以及丢包率中的至少一个;Determine the subunit, used to determine the performance indicators that need to be monitored; the performance indicators include at least one of transmission speed, delay and packet loss rate;
监测子单元,用于在数据传输过程中,实时监测性能指标,得到第二数据验证结果。The monitoring subunit is used to monitor performance indicators in real time during the data transmission process and obtain the second data verification result.
在另一个实施例中,提供了另一种数据处理装置,在上述实施例的基础上,上述第三检测单元可以包括:In another embodiment, another data processing device is provided. Based on the above embodiment, the above third detection unit may include:
传输子单元,用于在数据传输前计算目标数据的第一哈希值;将目标数据与第一哈希值一同传输给接收端;The transmission subunit is used to calculate the first hash value of the target data before data transmission; transmit the target data and the first hash value to the receiving end together;
接收子单元,用于在数据传输后,计算接收端接收到的数据的第二哈希值;The receiving subunit is used to calculate the second hash value of the data received by the receiving end after data transmission;
第二比对子单元,用于比对第一哈希值和第二哈希值,得到第三数据验证结果。The second comparison subunit is used to compare the first hash value and the second hash value to obtain the third data verification result.
在另一个实施例中,提供了另一种数据处理装置,在上述实施例的基础上,上述处理模块12可以包括:In another embodiment, another data processing device is provided. Based on the above embodiment, the above processing module 12 may include:
重传单元,用于在第一数据验证结果和第三数据验证结果不满足预设性能指标的情况下,重传目标数据;A retransmission unit, configured to retransmit the target data when the first data verification result and the third data verification result do not meet the preset performance indicators;
切换单元,用于在第二数据验证结果不满足预设性能指标的情况下,采用故障恢复策略自动切换到备用传输路径。The switching unit is used to automatically switch to the backup transmission path using a fault recovery strategy when the second data verification result does not meet the preset performance index.
上述数据处理装置中的各个模块可全部或部分通过软件、硬件及其组合来实现。上述各模块可以硬件形式内嵌于或独立于计算机设备中的处理器中,也可以以软件形式存储于计算机设备中的存储器中,以便于处理器调用执行以上各个模块对应的操作。Each module in the above data processing device can be implemented in whole or in part by software, hardware and combinations thereof. Each of the above modules may be embedded in or independent of the processor of the computer device in the form of hardware, or may be stored in the memory of the computer device in the form of software, so that the processor can call and execute the operations corresponding to the above modules.
本领域技术人员可以理解,图7中示出的结构,仅仅是与本申请方案相关的部分结构的框图,并不构成对本申请方案所应用于其上的计算机设备的限定,具体的计算机设备可以包括比图中所示更多或更少的部件,或者组合某些部件,或者具有不同的部件布置。Those skilled in the art can understand that the structure shown in Figure 7 is only a block diagram of a partial structure related to the solution of the present application, and does not constitute a limitation on the computer equipment to which the solution of the present application is applied. Specific computer equipment can May include more or fewer parts than shown, or combine certain parts, or have a different arrangement of parts.
在一个示例性的实施例中,提供了一种计算机设备,包括存储器和处理器,存储器中存储有计算机程序,该处理器执行计算机程序时实现以下步骤:In an exemplary embodiment, a computer device is provided, including a memory and a processor. A computer program is stored in the memory. When the processor executes the computer program, it implements the following steps:
在不同试验应力的情况下,采用预设数据检测方式在数据传输前、数据传输过程中以及数据传输后分别对目标数据进行检测,得到多个数据检测结果;In the case of different test stresses, the preset data detection method is used to detect the target data before, during and after data transmission, and multiple data detection results are obtained;
在数据检测结果不满足预设性能指标的情况下,采用预设处理方式进行处理。When the data detection results do not meet the preset performance indicators, the preset processing method is used for processing.
在一个实施例中,处理器执行计算机程序时还实现以下步骤:In one embodiment, the processor also implements the following steps when executing the computer program:
利用时间戳比对算法在数据传输前和数据传输后分别对目标数据的完整性进行检测,得到第一数据检测结果;Use the timestamp comparison algorithm to detect the integrity of the target data before and after data transmission, and obtain the first data detection result;
实时监测目标数据在数据传输过程中的性能指标,得到第二数据检测结果;Real-time monitoring of the performance indicators of the target data during the data transmission process and obtaining the second data detection results;
利用哈希函数在数据传输前和数据传输后分别对目标数据的完整性进行检测,得到第三数据检测结果。The hash function is used to detect the integrity of the target data before and after data transmission, and the third data detection result is obtained.
在一个实施例中,处理器执行计算机程序时还实现以下步骤:In one embodiment, the processor also implements the following steps when executing the computer program:
在数据传输前,使用时间戳比对算法生成时间戳;Before data transmission, a timestamp is generated using a timestamp comparison algorithm;
将时间戳与目标数据进行关联;Associate timestamps with target data;
在数据传输后,利用时间戳比对算法对接收到的数据和目标数据进行比对,得到第一数据验证结果。After the data is transmitted, the received data and the target data are compared using a timestamp comparison algorithm to obtain the first data verification result.
在一个实施例中,处理器执行计算机程序时还实现以下步骤:In one embodiment, the processor also implements the following steps when executing the computer program:
确定需要监测的性能指标;性能指标包括传输速度、延迟以及丢包率中的至少一个;Determine the performance indicators that need to be monitored; performance indicators include at least one of transmission speed, delay, and packet loss rate;
在数据传输过程中,实时监测性能指标,得到第二数据验证结果。During the data transmission process, performance indicators are monitored in real time and the second data verification result is obtained.
在一个实施例中,处理器执行计算机程序时还实现以下步骤:In one embodiment, the processor also implements the following steps when executing the computer program:
在数据传输前计算目标数据的第一哈希值;将目标数据与第一哈希值一同传输给接收端;Calculate the first hash value of the target data before data transmission; transmit the target data and the first hash value to the receiving end together;
在数据传输后,计算接收端接收到的数据的第二哈希值;After data transmission, calculate the second hash value of the data received by the receiving end;
比对第一哈希值和第二哈希值,得到第三数据验证结果。Compare the first hash value and the second hash value to obtain the third data verification result.
在一个实施例中,处理器执行计算机程序时还实现以下步骤:In one embodiment, the processor also implements the following steps when executing the computer program:
在第一数据验证结果和第三数据验证结果不满足预设性能指标的情况下,重传目标数据;If the first data verification result and the third data verification result do not meet the preset performance indicators, retransmit the target data;
在第二数据验证结果不满足预设性能指标的情况下,采用故障恢复策略自动切换到备用传输路径。When the second data verification result does not meet the preset performance indicators, a fault recovery strategy is used to automatically switch to the backup transmission path.
在一个实施例中,提供了一种计算机可读存储介质,其上存储有计算机程序,计算机程序被处理器执行时实现以下步骤:In one embodiment, a computer-readable storage medium is provided with a computer program stored thereon. When the computer program is executed by a processor, the following steps are implemented:
在不同试验应力的情况下,采用预设数据检测方式在数据传输前、数据传输过程中以及数据传输后分别对目标数据进行检测,得到多个数据检测结果;In the case of different test stresses, the preset data detection method is used to detect the target data before, during and after data transmission, and multiple data detection results are obtained;
在数据检测结果不满足预设性能指标的情况下,采用预设处理方式进行处理。When the data detection results do not meet the preset performance indicators, the preset processing method is used for processing.
在一个实施例中,计算机程序被处理器执行时还实现以下步骤:In one embodiment, the computer program, when executed by the processor, also implements the following steps:
利用时间戳比对算法在数据传输前和数据传输后分别对目标数据的完整性进行检测,得到第一数据检测结果;Use the timestamp comparison algorithm to detect the integrity of the target data before and after data transmission, and obtain the first data detection result;
实时监测目标数据在数据传输过程中的性能指标,得到第二数据检测结果;Real-time monitoring of the performance indicators of the target data during the data transmission process and obtaining the second data detection results;
利用哈希函数在数据传输前和数据传输后分别对目标数据的完整性进行检测,得到第三数据检测结果。The hash function is used to detect the integrity of the target data before and after data transmission, and the third data detection result is obtained.
在一个实施例中,计算机程序被处理器执行时还实现以下步骤:In one embodiment, the computer program, when executed by the processor, also implements the following steps:
在数据传输前,使用时间戳比对算法生成时间戳;Before data transmission, a timestamp is generated using a timestamp comparison algorithm;
将时间戳与目标数据进行关联;Associate timestamps with target data;
在数据传输后,利用时间戳比对算法对接收到的数据和目标数据进行比对,得到第一数据验证结果。After the data is transmitted, the received data and the target data are compared using a timestamp comparison algorithm to obtain the first data verification result.
在一个实施例中,计算机程序被处理器执行时还实现以下步骤:In one embodiment, the computer program, when executed by the processor, also implements the following steps:
确定需要监测的性能指标;性能指标包括传输速度、延迟以及丢包率中的至少一个;Determine the performance indicators that need to be monitored; performance indicators include at least one of transmission speed, delay, and packet loss rate;
在数据传输过程中,实时监测性能指标,得到第二数据验证结果。During the data transmission process, performance indicators are monitored in real time and the second data verification result is obtained.
在一个实施例中,计算机程序被处理器执行时还实现以下步骤:In one embodiment, the computer program, when executed by the processor, also implements the following steps:
在数据传输前计算目标数据的第一哈希值;将目标数据与第一哈希值一同传输给接收端;Calculate the first hash value of the target data before data transmission; transmit the target data and the first hash value to the receiving end together;
在数据传输后,计算接收端接收到的数据的第二哈希值;After data transmission, calculate the second hash value of the data received by the receiving end;
比对第一哈希值和第二哈希值,得到第三数据验证结果。Compare the first hash value and the second hash value to obtain the third data verification result.
在一个实施例中,计算机程序被处理器执行时还实现以下步骤:In one embodiment, the computer program, when executed by the processor, also implements the following steps:
在第一数据验证结果和第三数据验证结果不满足预设性能指标的情况下,重传目标数据;If the first data verification result and the third data verification result do not meet the preset performance indicators, retransmit the target data;
在第二数据验证结果不满足预设性能指标的情况下,采用故障恢复策略自动切换到备用传输路径。When the second data verification result does not meet the preset performance indicators, a fault recovery strategy is used to automatically switch to the backup transmission path.
在一个实施例中,提供了一种计算机程序产品,包括计算机程序,该计算机程序被处理器执行时实现以下步骤:In one embodiment, a computer program product is provided, comprising a computer program that when executed by a processor implements the following steps:
在不同试验应力的情况下,采用预设数据检测方式在数据传输前、数据传输过程中以及数据传输后分别对目标数据进行检测,得到多个数据检测结果;In the case of different test stresses, the preset data detection method is used to detect the target data before, during and after data transmission, and multiple data detection results are obtained;
在数据检测结果不满足预设性能指标的情况下,采用预设处理方式进行处理。When the data detection results do not meet the preset performance indicators, the preset processing method is used for processing.
在一个实施例中,计算机程序被处理器执行时还实现以下步骤:In one embodiment, the computer program, when executed by the processor, also implements the following steps:
利用时间戳比对算法在数据传输前和数据传输后分别对目标数据的完整性进行检测,得到第一数据检测结果;Use the timestamp comparison algorithm to detect the integrity of the target data before and after data transmission, and obtain the first data detection result;
实时监测目标数据在数据传输过程中的性能指标,得到第二数据检测结果;Real-time monitoring of the performance indicators of the target data during the data transmission process and obtaining the second data detection results;
利用哈希函数在数据传输前和数据传输后分别对目标数据的完整性进行检测,得到第三数据检测结果。The hash function is used to detect the integrity of the target data before and after data transmission, and the third data detection result is obtained.
在一个实施例中,计算机程序被处理器执行时还实现以下步骤:In one embodiment, the computer program, when executed by the processor, also implements the following steps:
在数据传输前,使用时间戳比对算法生成时间戳;Before data transmission, a timestamp is generated using a timestamp comparison algorithm;
将时间戳与目标数据进行关联;Associate timestamps with target data;
在数据传输后,利用时间戳比对算法对接收到的数据和目标数据进行比对,得到第一数据验证结果。After the data is transmitted, the received data and the target data are compared using a timestamp comparison algorithm to obtain the first data verification result.
在一个实施例中,计算机程序被处理器执行时还实现以下步骤:In one embodiment, the computer program, when executed by the processor, also implements the following steps:
确定需要监测的性能指标;性能指标包括传输速度、延迟以及丢包率中的至少一个;Determine the performance indicators that need to be monitored; performance indicators include at least one of transmission speed, delay, and packet loss rate;
在数据传输过程中,实时监测性能指标,得到第二数据验证结果。During the data transmission process, performance indicators are monitored in real time and the second data verification result is obtained.
在一个实施例中,计算机程序被处理器执行时还实现以下步骤:In one embodiment, the computer program, when executed by the processor, also implements the following steps:
在数据传输前计算目标数据的第一哈希值;将目标数据与第一哈希值一同传输给接收端;Calculate the first hash value of the target data before data transmission; transmit the target data and the first hash value to the receiving end together;
在数据传输后,计算接收端接收到的数据的第二哈希值;After data transmission, calculate the second hash value of the data received by the receiving end;
比对第一哈希值和第二哈希值,得到第三数据验证结果。Compare the first hash value and the second hash value to obtain the third data verification result.
在一个实施例中,计算机程序被处理器执行时还实现以下步骤:In one embodiment, the computer program, when executed by the processor, also implements the following steps:
在第一数据验证结果和第三数据验证结果不满足预设性能指标的情况下,重传目标数据;If the first data verification result and the third data verification result do not meet the preset performance indicators, retransmit the target data;
在第二数据验证结果不满足预设性能指标的情况下,采用故障恢复策略自动切换到备用传输路径。When the second data verification result does not meet the preset performance indicators, a fault recovery strategy is used to automatically switch to the backup transmission path.
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机程序来指令相关的硬件来完成,所述的计算机程序可存储于一非易失性计算机可读取存储介质中,该计算机程序在执行时,可包括如上述各方法的实施例的流程。其中,本申请所提供的各实施例中所使用的对存储器、数据库或其它介质的任何引用,均可包括非易失性和易失性存储器中的至少一种。非易失性存储器可包括只读存储器(Read-OnlyMemory,ROM)、磁带、软盘、闪存、光存储器、高密度嵌入式非易失性存储器、阻变存储器(ReRAM)、磁变存储器(Magnetoresistive Random Access Memory,MRAM)、铁电存储器(Ferroelectric Random Access Memory,FRAM)、相变存储器(Phase Change Memory,PCM)、石墨烯存储器等。易失性存储器可包括随机存取存储器(Random Access Memory,RAM)或外部高速缓冲存储器等。作为说明而非局限,RAM可以是多种形式,比如静态随机存取存储器(Static Random Access Memory,SRAM)或动态随机存取存储器(Dynamic RandomAccess Memory,DRAM)等。本申请所提供的各实施例中所涉及的数据库可包括关系型数据库和非关系型数据库中至少一种。非关系型数据库可包括基于区块链的分布式数据库等,不限于此。本申请所提供的各实施例中所涉及的处理器可为通用处理器、中央处理器、图形处理器、数字信号处理器、可编程逻辑器、基于量子计算的数据处理逻辑器等,不限于此。Those of ordinary skill in the art can understand that all or part of the processes in the methods of the above embodiments can be completed by instructing relevant hardware through a computer program. The computer program can be stored in a non-volatile computer-readable storage. In the media, when executed, the computer program may include the processes of the above method embodiments. Any reference to memory, database or other media used in the embodiments provided in this application may include at least one of non-volatile and volatile memory. Non-volatile memory can include read-only memory (ROM), magnetic tape, floppy disk, flash memory, optical memory, high-density embedded non-volatile memory, resistive memory (ReRAM), magnetic variable memory (Magnetoresistive Random) Access Memory (MRAM), Ferroelectric Random Access Memory (FRAM), Phase Change Memory (PCM), graphene memory, etc. Volatile memory may include random access memory (Random Access Memory, RAM) or external cache memory. By way of illustration but not limitation, RAM can be in various forms, such as static random access memory (Static Random Access Memory, SRAM) or dynamic random access memory (Dynamic Random Access Memory, DRAM). The databases involved in the various embodiments provided in this application may include at least one of a relational database and a non-relational database. Non-relational databases may include blockchain-based distributed databases, etc., but are not limited thereto. The processors involved in the various embodiments provided in this application may be general-purpose processors, central processing units, graphics processors, digital signal processors, programmable logic devices, quantum computing-based data processing logic devices, etc., and are not limited to this.
以上实施例的各技术特征可以进行任意的组合,为使描述简洁,未对上述实施例中的各个技术特征所有可能的组合都进行描述,然而,只要这些技术特征的组合不存在矛盾,都应当认为是本说明书记载的范围。The technical features of the above embodiments can be combined in any way. To simplify the description, not all possible combinations of the technical features in the above embodiments are described. However, as long as there is no contradiction in the combination of these technical features, all possible combinations should be used. It is considered to be within the scope of this manual.
以上所述实施例仅表达了本申请的几种实施方式,其描述较为具体和详细,但并不能因此而理解为对本申请专利范围的限制。应当指出的是,对于本领域的普通技术人员来说,在不脱离本申请构思的前提下,还可以做出若干变形和改进,这些都属于本申请的保护范围。因此,本申请的保护范围应以所附权利要求为准。The above-described embodiments only express several implementation modes of the present application, and their descriptions are relatively specific and detailed, but should not be construed as limiting the patent scope of the present application. It should be noted that, for those of ordinary skill in the art, several modifications and improvements can be made without departing from the concept of the present application, and these all fall within the protection scope of the present application. Therefore, the scope of protection of this application should be determined by the appended claims.
Claims (10)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311636187.XA CN117614867A (en) | 2023-11-30 | 2023-11-30 | Data processing methods, devices, equipment, storage media and program products |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311636187.XA CN117614867A (en) | 2023-11-30 | 2023-11-30 | Data processing methods, devices, equipment, storage media and program products |
Publications (1)
Publication Number | Publication Date |
---|---|
CN117614867A true CN117614867A (en) | 2024-02-27 |
Family
ID=89951292
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202311636187.XA Pending CN117614867A (en) | 2023-11-30 | 2023-11-30 | Data processing methods, devices, equipment, storage media and program products |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN117614867A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN119557819A (en) * | 2025-02-05 | 2025-03-04 | 交通运输部公路科学研究所 | Method and system for extracting abnormal scenes from intelligent vehicle driving data based on artificial intelligence |
-
2023
- 2023-11-30 CN CN202311636187.XA patent/CN117614867A/en active Pending
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN119557819A (en) * | 2025-02-05 | 2025-03-04 | 交通运输部公路科学研究所 | Method and system for extracting abnormal scenes from intelligent vehicle driving data based on artificial intelligence |
CN119557819B (en) * | 2025-02-05 | 2025-04-22 | 交通运输部公路科学研究所 | Artificial intelligence-based intelligent car driving data abnormal scene extraction method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2022088861A1 (en) | Database fault handling method and apparatus | |
CN112286945B (en) | Configuration change method, system, device and medium based on PBFT algorithm | |
CN103338118A (en) | A communication network connection method and an apparatus thereof | |
CN113872828A (en) | Blockchain oracle state monitoring method | |
CN117614867A (en) | Data processing methods, devices, equipment, storage media and program products | |
CN115328814B (en) | Mirror pair-based fault injection method, device, equipment and storage medium | |
CN112737856B (en) | Link tracking method and device, storage medium and electronic device | |
WO2017012460A1 (en) | Method and apparatus for detecting failure of random memory, and processor | |
WO2015021220A1 (en) | Managing data feeds | |
CN119248550A (en) | A dual-active volume storage system fault processing method and application device thereof | |
CN104868973A (en) | Data integrity verifying method and system | |
CN116760745A (en) | Network exception handling method, apparatus, device, storage medium and program product | |
CN116483803A (en) | Data verification method, device, server and storage medium | |
CN110865918A (en) | Database monitoring method and device, computer equipment and storage medium | |
CN115118646A (en) | Data interaction method and device for switch test system and electronic equipment | |
CN115454928A (en) | System online migration method, system online migration device, equipment and medium | |
CN119484247B (en) | Automatic operation and maintenance method, device, server and storage medium | |
JP5670935B2 (en) | Distributed data management system and operation method thereof | |
CN119512811B (en) | Data backup method, device, electronic device and storage medium | |
CN119311695B (en) | Verification method, device, computer equipment, and readable storage medium for incremental synchronization | |
CN117096817B (en) | Relay, relay repair method, device and computer equipment | |
CN117931830B (en) | Data recovery method, device, electronic device, storage medium and program product | |
CN117135075A (en) | Test methods, devices, computer equipment and storage media for network equipment | |
CN117056106A (en) | Method and device for detecting silent errors in erasure code storage | |
CN120321112A (en) | Request processing method, device, equipment and readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |