Research Article

[Retracted] Network Interconnection Security Buffer Technology for Power Monitoring System

Table 3

Paradigm check algorithm for request packets.

Input: Request data, protocol name. XML file
Output: 1 and compliant packets/0, discard noncompliant packets; “1” indicates the request packet meets the protocol data specification, and “0” means noncompliance
1 input RequestData
2 analyze protocol name.XML, and generate data structure “S” and rule “R”
3 analyze and unify format of RequestData according to the structure of “S”
4 for i = 1 to n/traverse the rule set “R” /
5 for j = 1 to m/ traverse the set “S” and search the corresponding field based on the field name in the rule set/
6 if S[j].name = R[i].name/ compare the fields, if the field names are the same/
7 The field if conforms to the protocol rule defined by the user
8 i++
9 else data frame is discarded, return 0/ discard the data in case of inconformity/
10 end if
11 else j++
12 end if
13 end for
14 end for
15 output the parsed data structure “S” in the format defined in Table 2
16 return 1