A kind of LTE network base station element configuration data acquisition methods
Technical field
The present invention relates to mobile communications network management field, especially relate to a kind of method of quick obtaining LTE network base station element configuration data.
Background technology
LTE network base station network element device (eNodeB) operational factor is by LTE-eNodeB network element configuration file acquisition at present, but a prefecture-level network approximately has 100-10000 eNodeB network element conventionally, configuration file is various, and each file needs full dose to resolve, extraction and parsing are wasted time and energy, conventionally more than 2 hours, be difficult to Real-time Obtaining network operation parameter.
Traditional LTE-eNodeB data capture method mainly comprises:
(1) according to network element configuration file reading out data
By OMC webmaster, to all eNodeB, send the order of network element configuration file generated, after 100% execution, then collect eNodeB network element configuration file to local disk by the FTP agent functionality of OMC.Then the eNodeB network element configuration file of collecting is resolved one by one, collect the parameter configuration data needing, be aggregated into result document for use.
(2) extract network management data database data
In OMC webmaster side, set up network management data storehouse, timing acquiring element configuration data, network management data storehouse gathers element configuration data can adopt full dose collection and incremental crawler mode, can directly extract database data and use when user need to obtain element configuration data, and the method is ageing poor.
(3) use special-purpose software
The special-purpose software that uses equipment manufacturer to provide, generally need to pay high mandate expense, use special-purpose software still to need to use after extracting eNodeB network element configuration file, ageing not strong, in addition the data class of special-purpose software output is fixed, form is fixed, and can not upgrade at any time according to demand, and limitation is higher.
Current technical method, mainly contains following shortcoming:
1. collect a large amount of network element configuration files, process and loaded down with trivial details: the eNodeB network element configuration file type of collecting is TXT or XML file, each eNodeB element configuration data is deposited in a file, although network element configuration file format is the file based on standardization (XML standard), but need to all resolve each file, the Data Collection of needs could be arrived, for whole network data is collected, waste time and energy.
2. adopt incremental update database mode, though reduced the operation of database, but the contrast that need to carry out database data and element configuration data could be determined increment content afterwards, before contrast, still need to extract whole element configuration datas, and increased contrast link, effectively do not solved efficiency.
3. can not be according to the flexible Output rusults of user's request.
4. there is no suitable data encryption process, while extracting configuration data, may leak, have potential safety hazard.
State Intellectual Property Office of the People's Republic of China discloses the patent documentation that application publication number is CN101340316A on 01 07th, 2009, title is a kind of method and device that network element data is uploaded to network management data storehouse, and described method comprises step: obtain the list of data items that will upload; According to the described list of data items that will upload, from network management data storehouse, inquiry obtains the configuration data of corresponding data item, and from network element, inquiry obtains the configuration data of corresponding data item, and both are compared, and according to comparative result, constructs corresponding data increment notification package; According to the content of described data increment notification package, corresponding operation is carried out in network management data storehouse, realize the increment warehouse-in of network element data.Described device comprises list of data items acquisition module, network management data library inquiry module, network element enquiry module, increment notice constructing module and synchronization module.Still there is aforesaid multiple weak point in this scheme.
Summary of the invention
The present invention is mainly the technical problem that solves that the existing flexibility of prior art is not high, extraction rate is slow, fail safe is low etc., and a kind of convenient and swift, the intelligent degree of identifying is high, customizability is strong, fail safe is good a kind of LTE network base station element configuration data acquisition methods is provided.
The present invention is directed to above-mentioned technical problem is mainly solved by following technical proposals: a kind of LTE network base station element configuration data acquisition methods, comprises the following steps:
S1, keeper's setting data type;
S2, network management center's server generate command script according to data type, and are obtained from base station network element and obtained message by action command script;
S3, network management center's server read configuration data from message.
As preferably, described step S1 is specially:
S11, keeper select the data type needing, and insert self-defined form, and this step is to be mainly obtained from definition setting;
S12, network management center's server read self-defined form, keyword is carried out to analyze, understand result and deposit one by one two-dimensional array in, the first dimension of two-dimensional array is data items, the second dimension is data type, two-dimensional array is elongated array, is mainly because self-defining data type and project are all indefinite, therefore need elongated data.
As preferably, described step S12 is specially:
S121, read self-defined form: network management center's server reads the data line in User Defined Data Position district in self-defined form, and data are put into memory variable;
S122, keyword search: according to the Data Matching data type sign in memory variable, if data are that sky or form are incorrect, think and there is no keyword, directly finish; If there is keyword, enter step S123;
S123, data type sign warehouse-in: first the length of the two-dimensional array of data type feature database is increased to one, then the two-dimensional array of the data type feature database that the data type sign matching is deposited in;
S124, data strip visual inspection are surveyed: detect the capable follow-up data strip target will that whether is provided with of current reading out data, if do not arranged, jump to step S122; If be provided with data strip target will, represent that one's own profession reads completely, enter step S125;
S125, deposit data strip target will in a two-dimensional array;
S126, enter next line data, jump to step S121, circulation is read until all self-defined settings are read complete.
In data type feature database, can set in advance a plurality of different two-dimensional arrays of storage, during actual extracting, directly select as required satisfactory use.
As preferably, described step S2 is specially:
S21, by the two-dimensional array in data type feature database is mated with order data storehouse, the command script that generation can be carried out on network management center's server;
S22, command script is input on network management center's server and is carried out;
S23, on network management center's server fill order script, send data and extract instruction to base station network element, base station network element extracts instruction according to data and sends corresponding message to network management center's server, network management center's server deposits message in local disk.
As preferably, described step S21 is specially:
S211, reading out data type feature storehouse: the data of data type feature database are read in memory array;
S212, data type feature database detect: check one by one in data type feature database whether have data, if exist data to carry out next step, if countless certificate finishes;
S213, order data coupling: the data type sign in reading out data type feature storehouse, mates record matching result with the sign in order data storehouse;
S214, matching result are processed: matching result is processed, if matching result records unmatched data type for not mating, if matching result is coupling, record order data;
S215, by the command script data feedback user who calculates: all order datas that 214 steps are obtained feed back to user with command script form, if there is abnormal data, make prompting simultaneously.
As preferably, described step S3 is specially:
S31, network management center's server, by user interactions mode, obtain message and deposit path;
S32, read text a line to interim memory variable;
Data type tag match in S33, a line text that step S32 is read and data type feature database, continues to read next line data if do not mate, all data run through and read next message; If result coupling, enters step S34;
S34, will to the text current ENMES sign, all leave in a variable from data type sign;
S35, by the judgement of reading to current message, judge its deposit data form, and according to deposit data form, current message is cut apart according to separator, after cutting apart, according to the data items sign in data type feature database, read corresponding data in memory variable;
S36, valid data in memory variable are stored in electrical form, form destination file;
S37, to judge whether all messages read complete, if do not read completely, then reads, until run through, after running through, presents data result file, and all flow processs finish.
As preferably, described step S35 is specially:
S351, preparation message text variable: be ready to the text variable that step S34 obtains, guarantee that text variable exists;
S352, deposit data formal check: by the judgement of reading to current message, check whether it contains specific symbol, judge its deposit data form;
S353, deal with data Storage Format check result: deposit data form is numbered, puts into the variable of appointment;
S354, judge that whether data type feature database is complete: according to the data characteristics under current message, the data items sign in this data type feature database is checked;
S355, improve data characteristics storehouse: read the numbering of message data Storage Format, according to the difference of numbering, message data is cut apart, read data items wherein, judge the next target will of its data, deposit data characteristics storehouse in;
Reading of S356, target data: the numbering that reads message data Storage Format, according to the difference of numbering, message data is cut apart, first matched data Item Mark, according to itself and whether the mating of data items sign in data characteristics storehouse, solve reading of target data, if coupling reads corresponding data, if do not mate, provide information, for checking mistake.
As preferably, in described step S23, the transfer of data between network management center's server and base station network element is through encrypting, and concrete cipher mode is: network management center's server
nindividual unduplicated random number, is designated as
k 1 ,
k 2 ...,
k n , store above-mentioned random number sequence, base station network element of every increase is preserved this random number sequence in the network element of base station; When network management center's server sends data extraction instruction, from random number sequence, randomly draw a number
k i , 1≤
i≤
nthen send continuously three secondary data and extract instruction, sending for the first time and for the second time interval duration is K
imillisecond, sends duration for the second time and for the third time and is spaced apart
k i+1 , when
i=
ntime, order
k i+1 =
k 1 ; Base station network element receives three secondary data and extracts after instruction, calculate adjacent two secondary data and extract the reception interval between instruction, interval for the first time and is for the second time designated as T1, interval for the second time and is for the third time T2, then from the random number sequence of preserving, search T1, if do not found, ignore this three secondary data and extract instruction; If found, whether latter one that contrasts T1 in random number sequence be T2, if, represent that data are extracted command source legal, send message to network management center's server, if in random number sequence T1 rear one with T2 unequal, assert that data are extracted command source illegal, ignore this three secondary data and extract instruction.
As preferably, base station network element, when sending message to network management center's server, is encrypted message, and the key using is as follows: the tail end that extracts instruction in data adds
k i+2 obtain list entries, calculate the hash value of list entries, this hash value is as the key of encrypting message.
For LTE network, the connection between network management center's server and base station network element is comparatively fixing, and data transfer delay is generally a stationary value, can not fluctuate easily.So can judge that whether information source is legal by the interval of detecting between twice instruction, the network management center's server that effectively prevented from disguising oneself as is gained element configuration data by cheating, even if data are tackled and are stolen when extracting data at legal network management center server, also cannot not crack encryption owing to there is no random number sequence.Can be with conventional cipher modes such as AES to the cipher mode of message.
The general random number generating is positive integer, and scope is comparatively suitable between 50 to 1000, and n is generally not less than 100.
The data that this programme needs by customization, automatically generate the Network Management and Maintenance operational order relevant to obtaining demand data, by carrying out related command, and the message can Real-time Obtaining network element feeding back.Compare and extract network element configuration file, the benefit of using message is that it is only relevant to demand data, and network element configuration file is a kind of full dose file, not only comprise the data of demand, and comprise a large amount of and the incoherent data of demand, therefore the utilance of message is high, on ageing, network element returns in real time to related command, and configuration file needs certain rise time, therefore message is ageing high.
The most important part of the present invention is intelligent message data identification, message is generally text formatting document, compare with form document, data format uniformity shortcoming, by contextual relation, defines the scope of special network element data fast, within the scope of active data, network management data is carried out to intelligent deep analysis, by the quick traversal of file, obtain all data of customization, and data format intelligence is arranged as user-defined form.
Compared with the existing technology, this method has following advantage:
1, data collection rate is fast, only for needed data, collects, and execution efficiency is high;
2, take adaptive analytic method as basis, can present desired data with user-defined form, and complete accurate;
3, obtain the file that data are directly rendered as user-operable form.
The substantial effect that the present invention brings is, the intelligent degree of convenient and swift, identifying is high, customizability is strong, fail safe good, by EXCEL-VBA implementation tool entity, can realize in 1-5 minute the whole network parameter acquiring, and be rendered as user's spreadsheet format data.
Accompanying drawing explanation
Fig. 1 is a kind of general flow chart of the present invention;
Fig. 2 is a kind of setting data type flow chart of the present invention;
Fig. 3 is a kind of Receive message flow chart of the present invention;
Fig. 4 is that a kind of data of the present invention read flow chart.
Embodiment
Below by embodiment, and by reference to the accompanying drawings, technical scheme of the present invention is described in further detail.
Embodiment: a kind of LTE network base station element configuration data acquisition methods of the present embodiment, as shown in Figure 1, comprises the following steps: S1, keeper's setting data type;
S2, network management center's server generate command script according to data type, and are obtained from base station network element and obtained message by action command script;
S3, network management center's server read configuration data from message.
As shown in Figure 2, step S1 is specially:
S11, keeper select the data type needing, and insert self-defined form, and this step is to be mainly obtained from definition setting;
S12, network management center's server read self-defined form, keyword is carried out to analyze, understand result and deposit one by one two-dimensional array in, the first dimension of two-dimensional array is data items, the second dimension is data type, two-dimensional array is elongated array, is mainly because self-defining data type and project are all indefinite, therefore need elongated data.
Step S12 is specially:
S121, read self-defined form: network management center's server reads the data line in User Defined Data Position district in self-defined form, and data are put into memory variable;
S122, keyword search: according to the Data Matching data type sign in memory variable, if data are that sky or form are incorrect, think and there is no keyword, directly finish; If there is keyword, enter step S123;
S123, data type sign warehouse-in: first the length of the two-dimensional array of data type feature database is increased to one, then the two-dimensional array of the data type feature database that the data type sign matching is deposited in;
S124, data strip visual inspection are surveyed: detect the capable follow-up data strip target will that whether is provided with of current reading out data, if do not arranged, jump to step S122; If be provided with data strip target will, represent that one's own profession reads completely, enter step S125;
S125, deposit data strip target will in a two-dimensional array;
S126, enter next line data, jump to step S121, circulation is read until all self-defined settings are read complete.
In data type feature database, can set in advance a plurality of different two-dimensional arrays of storage, during actual extracting, directly select as required satisfactory use.
As shown in Figure 3, step S2 is specially:
S21, by the two-dimensional array in data type feature database is mated with order data storehouse, the command script that generation can be carried out on network management center's server;
S22, command script is input on network management center's server and is carried out;
S23, on network management center's server fill order script, send data and extract instruction to base station network element, base station network element extracts instruction according to data and sends corresponding message to network management center's server, network management center's server deposits message in local disk.
Step S21 is specially:
S211, reading out data type feature storehouse: the data of data type feature database are read in memory array and (if data type feature database array discharges this step, can not omitted);
S212, data type feature database detect: check one by one in data type feature database whether have data, if exist data to carry out next step, if countless certificate finishes;
S213, order data coupling: the data type sign in reading out data type feature storehouse, mates record matching result with the sign in order data storehouse;
S214, matching result are processed: matching result is processed, if matching result records unmatched data type for not mating, if matching result is coupling, record order data;
S215, by the command script data feedback user who calculates: all order datas that 214 steps are obtained feed back to user with command script form, if there is abnormal data, make prompting simultaneously.
As shown in Figure 4, step S3 is specially:
S31, network management center's server, by user interactions mode, obtain message and deposit path;
S32, read text a line to interim memory variable;
Data type tag match in S33, a line text that step S32 is read and data type feature database, continues to read next line data if do not mate, all data run through and read next message; If result coupling, enters step S34;
S34, will to the text current ENMES sign, all leave in a variable from data type sign;
S35, by the judgement of reading to current message, check whether it contains specific symbol, judge its deposit data form, generally comprise horizontal table, vertical table, mixture table, also have some quite complicated forms, by the difference of feature, current message is cut apart according to specific separator, general horizontal table is used two spaces to cut apart, vertical table is used the number of equaling and colon to cut apart, form is not limited to these, can adjust segmentation symbol, reach the object that is partitioned into valid data, after cutting apart, according to the data items sign in data characteristics storehouse, read corresponding data in memory variable,
S36, valid data in memory variable are stored in electrical form, form destination file;
S37, to judge whether all messages read complete, if do not read completely, then reads, until run through, after running through, presents data result file, and all flow processs finish.
Step S34 is specially:
S341, read message text
Read a line message text at every turn, output in memory variable;
S342, ENMES Mark Detection
By matching check line by line, while running into ENMES sign, stop, the text data outputing to before in memory variable is gathered, obtain a long article originally.
Step S35 is specially:
S351, preparation message text variable: be ready to the text variable that step S34 obtains, guarantee that text variable exists;
S352, deposit data formal check: by the judgement of reading to current message, check whether it contains specific symbol, judge its deposit data form, generally comprise horizontal table, vertical table, mixture table, also have some quite complicated forms;
S353, deal with data Storage Format check result: deposit data form is numbered, puts into the variable of appointment;
S354, judge that whether data type feature database is complete: according to the data characteristics under current message, data items sign in this data characteristics storehouse is checked, data items sign shows not contain in current data feature database the data items flag data of current message if it is empty, cannot carry out target data coupling.If check result is not empty, just can carry out target data coupling;
S355, improve data characteristics storehouse: read the numbering of message data Storage Format, according to the difference of numbering, message data is cut apart, read data items wherein, judge the next target will of its data, deposit data characteristics storehouse in;
Reading of S356, target data: the numbering that reads message data Storage Format, according to the difference of numbering, message data is cut apart, first matched data Item Mark, according to itself and whether the mating of data items sign in data characteristics storehouse, solve reading of target data, if coupling reads corresponding data, if do not mate, provide information, for checking mistake.
In step S23, the transfer of data between network management center's server and base station network element is through encrypting, and concrete cipher mode is: network management center's server
nindividual unduplicated random number, is designated as
k 1 ,
k 2 ...,
k n , store above-mentioned random number sequence, base station network element of every increase is preserved this random number sequence in the network element of base station; When network management center's server sends data extraction instruction, from random number sequence, randomly draw a number
k i , 1≤
i≤
nthen send continuously three secondary data and extract instruction, sending for the first time and for the second time interval duration is K
imillisecond, sends duration for the second time and for the third time and is spaced apart
k i+1 , when
i=
ntime, order
k i+1 =
k 1 ; Base station network element receives three secondary data and extracts after instruction, calculate adjacent two secondary data and extract the reception interval between instruction, interval for the first time and is for the second time designated as T1, interval for the second time and is for the third time T2, then from the random number sequence of preserving, search T1, if do not found, ignore this three secondary data and extract instruction; If found, whether latter one that contrasts T1 in random number sequence be T2, if, represent that data are extracted command source legal, send message to network management center's server, if in random number sequence T1 rear one with T2 unequal, assert that data are extracted command source illegal, ignore this three secondary data and extract instruction.
Base station network element, when sending message to network management center's server, is encrypted message, and the key using is as follows: the tail end that extracts instruction in data adds
k i+2 obtain list entries, calculate the hash value of list entries, this hash value is as the key of encrypting message.
The random number generating is positive integer, and scope is comparatively suitable between 50 to 1000, and n is generally not less than 100.
Specific embodiment described herein is only to the explanation for example of the present invention's spirit.Those skilled in the art can make various modifications or supplement or adopt similar mode to substitute described specific embodiment, but can't depart from spirit of the present invention or surmount the defined scope of appended claims.
Although more used the terms such as network element, data type, message, random number herein, do not got rid of the possibility of using other term.Use these terms to be only used to describe more easily and explain essence of the present invention; They are construed to any additional restriction is all contrary with spirit of the present invention.