CN101039209A - Method for analyzing root warning for multi-manufacturer DWDM network management system - Google Patents
Method for analyzing root warning for multi-manufacturer DWDM network management system Download PDFInfo
- Publication number
- CN101039209A CN101039209A CN200610057170.9A CN200610057170A CN101039209A CN 101039209 A CN101039209 A CN 101039209A CN 200610057170 A CN200610057170 A CN 200610057170A CN 101039209 A CN101039209 A CN 101039209A
- Authority
- CN
- China
- Prior art keywords
- alarm
- propagation
- ideograph
- manufacturer
- dwdm
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention provides an analysis method of root alarm, which identifies and distinguishes the root alarm and derivative alarm by the real-time analysis of relativities between alarms in the DWDM network, and is applicable for the management of failures in multi-manufactures DWDM integrated network management system. The root alarm analysis method of the invention bases on the integration of two technologies: alarm transmission pattern and uniform alarm relationship rule base.
Description
Technical field
The present invention relates to by the correlation between the alarm on the real-time analysis DWDM network, distinguish and discern a kind of method of the root alarm and the alarm of deriving, to help O﹠M personnel location and recovery fault fast, be a solution of fault management in the multi-manufacturer DWDM Integrated Network Management System.
Background technology
Along with developing rapidly of data communication, particularly the Internet traffic carrying capacity is explosive increase, and is more and more higher to the demand of transmission network bandwidth.The quick growth of this transmission network information capacity requirements causes the phenomenon of " optical fiber exhausts ", and promptly existing optical fiber telecommunications system load capacity occurred near saturated situation.
Effective ways that address this problem are the multiplex techniques that adopt the network capacity extension.The multiplex technique of the network capacity extension comprises wavelength division multiplexing (WDM), Time Division Multiplexing and code division multiplexing (CDM).Wherein, for WDM, the speed of electronic equipment only requires it is that the speed of a wavelength channel gets final product, and along with the invention of erbium-doped fiber amplifier (EDFA), WDM technology moves to maturity rapidly and enters commercial applications.
WDM technology is meant, transmits the light wave of a plurality of different wave lengths in the single optical fiber inter-sync, allows data transmission bauds and capacity obtain multiplication.It makes full use of the enormous bandwidth resource in the low-loss district of monomode fiber, adopts multiplexer to merge at the light carrier of transmitting terminal with different wave length, imports monomode fiber then into, is separated by the light carrier of demodulation multiplexer with different wave length at receiving terminal again.Dense wave division multipurpose (DWDM) is meant the less wavelength-division multiplex technique of channel spacing in the same window, and DWDM adopts 1.55 μ m windows at present.Because the DWDM technology can make full use of the enormous bandwidth resource of optical fiber, increases substantially system transmission capacity, reduce transmission cost, so this technology has obtained using widely in the vast capacity transmission of long-distance and backbone network.
The DWDM backbone network of reality can adopt the equipment of how tame manufacturer usually simultaneously, and the equipment of different vendor all has bigger difference at aspects such as structure, realizations, realizes that the whole network maintenance brings very big difficulty for the maintenance centre of telecommunications enterprise.For this reason, many telecommunications enterprises have built the DWDM Integrated Network Management System, include the DWDM Element management system of different manufacturers in unified network management platform, to guarantee to implement the centralized maintenance and the management of the whole network DWDM main line in a network management system.
Fault management is a critical function of DWDM Integrated Network Management System.DWDM backbone network with certain telecommunications enterprise is an example, and the alarm quantity that the DWDM Integrated Network Management System will be received every day in the end of the year 2004 has surpassed 100,000.How Analysis and Screening goes out the root alarm from a large amount of unordered alarms, thereby fault location root fast shortens fault warning and lasts, and becomes a main task and a difficult problem in the daily O﹠M work.
At present in the telecommunication network management field, the method, fuzzy logic, Bayesian network of the method for analysis of some roots alarms such as rule-based analysis arranged, based on methods such as the reasoning of model, artificial neural nets, these methods respectively have pluses and minuses, implement fairly simple as rule-based method, but be subjected to the restriction of limited rule-based knowledge base, the situation beyond can not processing rule; The situation of network be can reflect more accurately based on the method for model, but the restriction of network complexity and the restriction of network change are subjected to easily.
These methods respectively have characteristics, but all exist some significant disadvantages, for example:
1, algorithm complexity, real-time is very poor, can not satisfy management and go up quick fault location, shortens the requirement that fault warning lasts.
2, be difficult to unite with existing telecommunicatioin network management model, need the new model of structure one cover to represent telecommunications network architecture, the Integrated Network Management System influence of using putting into operation is big.
3, only analyze root alarm in single mode, institute based on model too idealized, do not consider the complexity of networking in the real world to make that the accuracy rate as a result that analysis is come out on existing network is low.
4, relatively be suitable for the metastable network of structure, change under the comparatively frequent situation in network configuration, accuracy and real-time all can be subjected to bigger influence.
5, the main line of telecommunications dwdm system all is to cross over a plurality of manufacturers and a plurality of EMS basically, and a fault can cause a plurality of EMS report and alarms of different vendor usually, and a this root alert analysis difficult problem of striding in manufacturer's network environment can't solve.
Summary of the invention
The method for analyzing root warning that the present invention relates to solves the effective means of this difficult problem just.
The invention provides a kind of method for analyzing root warning, the root alarm and the alarm of deriving are distinguished and discerned to this method by the correlation between the alarm on the real-time analysis DWDM network, is applicable in the multi-manufacturer DWDM Integrated Network Management System and realizes fault management capability.Method for analyzing root warning of the present invention is based on the combination of two kinds of technology: an alarm propagation ideograph and a unified alarm name dependency rule storehouse.
The invention provides a kind of root alarm method for searching that is used for multi-manufacturer DWDM network management system, it is characterized in that comprising the steps: to map out from the topological structure of described DWDM network management system the alarm propagation ideograph of described DWDM network management system, described alarm propagation ideograph has shown the oriented annexation corresponding to alarm propagation between a plurality of nodes of described system configuration and the node; Locate all alarms in the described system, and it is mapped as predefined standard alarm; According to described alarm propagation ideograph, find out all alarms that belong to same alarm correlation group and the irrelevant alarm that does not belong to this alarm correlation group; According to predetermined dependency rule storehouse, be subordinated in all alarms of same alarm correlation group and determine the root alarm and the alarm of deriving.
Described alarm promptly refers to Root alarm, is near the alarm of fault generation physical location and level, belongs to main alarm, is the alarm that the telecom operation and maintenance personnel pay close attention to most.
The described alarm of deriving promptly refers to attached alarm, is than the alarm away from fault generation physical location and level, belongs to minor alarm.
The incidence relation and the direction of deriving that the alarm that exists between the alarm source in the described alarm propagation ideograph definition DWDM network takes place, ideograph is supported deep search and breadth first search's algorithm.
Dependence between a plurality of standard alarm that cause by same fault in the described alarm name dependency rule storehouse definition DWDM network on the same resource.
The set of the unified alarm of using in the described standard alarm definition multi-manufacturer DWDM Integrated Network Management System.The alarm mapping function of comprehensive network management is responsible for the alarm of different vendor is converted into unified alarm.
The invention has the advantages that:
1) implementation is simple, supports real-time variation: can map directly to the alarm propagation ideograph from DWDM network topology data, do not need through repeatedly with the conversion of complexity.The variation that network takes place can be reflected in real time on the alarm propagation ideograph.
2) the root alert analysis of support multi-manufacturer DWDM network: unified alarm collects and strides based on the unified alarm name dependence support of alarming the root alert analysis of manufacturer.
3) accuracy height: the rule base of alarm name dependence is made up of a series of alarm name in twos, can determine according to the situation of concrete manufacturer and general rule, also can revise rule base, make the root alert analysis can obtain the higher result of accuracy according to the experience of scene accumulation.
Description of drawings
Accompanying drawing 1 shows the topological diagram of a dwdm system.
Accompanying drawing 2 shows the alert mode propagation figure corresponding to the topological diagram of dwdm system.
Accompanying drawing 3a-3d shows the alert mode propagation figure corresponding to some common dwdm systems.
Accompanying drawing 4 show one embodiment of the invention based on determined relevant alarm of alarm propagation ideograph and irrelevant alarm.
Accompanying drawing 5 show another embodiment of the present invention based on determined relevant alarm of alarm propagation ideograph and irrelevant alarm.
Accompanying drawing 6 show another embodiment of the present invention based on determined relevant alarm of alarm propagation ideograph and irrelevant alarm.
Accompanying drawing 7 shows one embodiment of the invention rule-basedly concerns the determined alarm in storehouse and relevant alarm.
Accompanying drawing 8 shows another embodiment of the present invention rule-basedly concerns the determined alarm in storehouse and relevant alarm.
Accompanying drawing 9 shows another embodiment of the present invention rule-basedly concerns the determined alarm in storehouse and relevant alarm.
Accompanying drawing 10 shows the flow chart of the root alert analysis of another embodiment of the present invention.
Embodiment
The core concept of method for analyzing root warning provided by the invention is to analyze with abstract foundation and irrelevant alarm propagation ideograph and the unified name dependency rule storehouse of alarming of manufacturer with the mechanism that alarm is derived by the alarm report to different vendor.The root alert analysis module of multi-manufacturer DWDM Integrated Network Management System to the alarm that receives from the EMS of manufacturer, is extracted alarm name, alarm source and alarm time of origin, and the analysis of root alarm is finished in input alarm propagation ideograph and alarm name dependency rule storehouse.Particularly, be divided into following several steps:
1, the direct mapping from the DWDM network topology structure to the alarm propagation ideograph.
Fig. 1 shows a kind of schematic diagram of existing dwdm system.In the system of Fig. 1, the parallel OU dish (light multiplex/demultiplex dish) that is connected to of OT dish (optical wavelength changer dish), this OU dish is connected to an OA dish (image intensifer dish), and this OA dish is connected to another OA dish, be connected to the OU dish subsequently, this OU dish is connected to the OT dish.As shown in Figure 1, each module in the system lays respectively at the at all levels of system, and for example optical channel layer (OCH), regenerator section layer (RS), optical multiplex layer (OMS), light transmit section layer (OTS).
Fig. 2 has shown the dwdm system alarm propagation ideograph that obtains from dwdm system shown in Figure 1.This alarm propagation ideograph is applicant's original creation.As shown in Figure 2, the alarm propagation ideograph is by oriented the connecting to form between node and the node.Node is represented alarm source; Annexation between the node is represented the incidence relation that the alarm that exists between the alarm source takes place; The direction of arrow indication is the direction of deriving of alarm.The alarm propagation ideograph has certain hierarchical structure, be divided into optical channel layer (OCH TP), optical multiplex layer (OMS TP), light transmission section layer (OTS TP), four level of turntable (Circuitpack) in the vertical, cause trouble again (RS TP) and OCH TP is in the level, is divergent relationship from the bottom to the top layer.
From the topological structure of system, the basic step of structure alarm propagation ideograph is as follows:
1) sets up relation between port (TP) point of turntable (Circuitpack) and its carrying.
2) according to topological connection relation and dish incidence relation, set up the relation between the physical circuit layer TP.
3) set up the relation of optical channel layer and SDH layer TP.OCHTP is carried on the OMSTP.SCHTP is the end points of system's access service, all has incidence relation with the SCHTP of OCHTP and opposite end, is recorded as carrying (vertically) respectively and with the relation of layer (laterally) in annexation figure.
Contrasting above-mentioned Fig. 1 and Fig. 2 can find, the conversion between system's topological structure schematic diagram and the alarm propagation ideograph has simplicity and similitude, and therefore the topology network data by reality can map directly to the alarm propagation ideograph.
Accompanying drawing 3a-3d further from the common networking topology and the angle of professional topology, has shown the mapping relations from system configuration to the alarm propagation ideograph.
Analyze the architectural characteristic of alarm propagation ideograph, (CP->OTS->OMS->OCH) is unidirectional substantially vertically influence direction, laterally (in the same level) influences direction with two-way in the majority, therefore serve as that the preferential strategy (deep search algorithm) of search can reduce amount of calculation significantly with vertical associated nodes, and the raising calculated performance, guarantee real-time and validity that alarm correlation calculates.
2, the different alarm types that each manufacturer is reported are put in order and are analyzed, and set up unified alarm table on this basis.
Unified alarm list is comprehensively and with reference to each vendor equipment to alarm, form in conjunction with refining after the actual demand at telecommunicatioin network management center to conclude.Unified alarm has unified format and title, and is as shown in table 1:
ID | Unified alarm name | The Chinese remarks |
1 | External Alarm Events | The external alarm incident |
6 | Mismatch of Input Signal | Input signal does not match |
7 | Signal Degrade | Signal Degrade |
8 | Excessive BER | Error code is crossed limit |
9 | Defined Network Element Failure | The failure of configuration network element |
10 | Loss of Input Frame | The input signal LOF |
11 | Loss of Input Signal | Input signal is lost |
12 | SW Download Failure | The software download failure |
13 | SW Version Mismatch | Software version does not match |
14 | Memory Failure | EMS memory error |
15 | Unit Missing | The cell tray dislocation |
16 | Unit Type Mismatch | Slotting cell tray type error |
17 | Unit Failure | The cell tray fault |
18 | DCC Failure | The DCC channel failure |
19 | Shelf Failure | The machine frame fault |
20 | Loss of Optical Channel | Optical channel is lost |
21 | Loss of Optical Line Signal | The optical link dropout |
22 | Optical Line Failure | The optical link fault |
23 | Operation Error | Operating mistake |
24 | Supervision Signal Degrade | The monitor channel Signal Degrade |
25 | Supervision Excessive BER | The monitor channel error code is crossed limit |
26 | Loss of Optical Supervision Signal | The monitor channel dropout |
27 | Supervision loss of Frame | The monitor channel LOF |
214 | Alarm Indication Signal | Alarm indication signal |
218 | APS Failure | APS lost efficacy |
219 | System Alarm | ALM |
222 | Cable Alarm | The cable alarm |
227 | Far End Receive Failure | Far-end receives and lost efficacy |
228 | Laser Degrade | The laser deterioration |
229 | Loss Of Data | Loss of data |
233 | Loss Of Output Signal | Output signal is lost |
237 | Timing Problem | Timing problems |
238 | Transmission Failure | Send and lost efficacy |
239 | Demodulator Failure | Demodulator lost efficacy |
251 | Exercise Test Failure | The exercise test crash |
252 | Exercise Test Ok | Exercise is tested successfully |
254 | Laser Close Report | Laser hardware turn-offs report |
255 | Fec Alarm | Forward error correction alarm |
256 | Loss Of Clock | Loss of clock |
269 | K1-K2 Procotol Mismatch | K1-K2 agreement mismatch |
270 | K2 Mismatch | The K2 mismatch |
284 | Loss Of Pointer | Loss Of Pointer |
296 | Modulator Failure | Modulator lost efficacy |
303 | Path Trace Mismatch | Passage is followed the trail of mismatch |
304 | Payload Type Mismatch | The net load mismatch |
323 | Transmitter Degrade | Send deterioration |
350 | RDI | The remote bug indication |
369 | Power Problem | Power issue |
381 | Laser Failure | Laser fails |
419 | Protection Path Failure | The protection channel failure |
433 | Temperature Out Of Range | Temperature is crossed limit |
446 | FEC Threshold Crossed | The FEC thresholding is out-of-limit |
451 | Laser Bias Current Out of Range | Laser bias current is crossed limit |
453 | Laser Temperature Out of Range | Laser temperature is crossed limit |
455 | Input Optical Power Out of Range | Input optical power is crossed limit |
456 | Output Optical Power Out of Range | Output optical power is crossed limit |
463 | Pump Laser Bias Current Out of Range | Limit is crossed in the pump laser bias current |
464 | Pump Laser Power Out of Range | Pumping laser power is crossed limit |
465 | Pump Laser Temperature Out of Range | The pumping laser temperature is crossed limit |
466 | Threshold Crossed | Thresholding is out-of-limit |
477 | Refrigeration Current Alarm | The alarm of refrigeration electric current |
478 | Laser Lifetime Warning | The laser life-span alarm |
479 | Pump Laser Failure | Pump laser lost efficacy |
480 | Pump Laser Degrade | The pump laser deterioration |
482 | Laser power warning | The laser power alarm |
483 | Background Block Error | Background piece mistake |
484 | Tributary Threshold Crossed | The branch road thresholding is out-of-limit |
485 | Line Threshold Crossed | The circuit thresholding is out-of-limit |
486 | supervisory Channel Threshold Crossed | The monitor channel thresholding is out-of-limit |
487 | Protection Swithching | Protection is switched |
488 | EMS Alarm | The EMS alarm |
489 | EMS Communication Failure | The EMS garble |
490 | Database upload aborted | The data upload aborted |
491 | Init session failed | Failure is met in initialization |
492 | CommsLinkFail | The communication link failure |
493 | Receive Failure | Take defeat |
500 | J0 Trace Identifier Mismatch | J0 trace byte mismatch |
501 | Laser Current Out Of Range | Laser diode current is crossed limit |
502 | No Board Software | Cell tray does not have software |
503 | Board Parameter Not Set | The cell tray parameter is not provided with |
504 | Read or Write Single Chip Register Failed | The failure of read-write cell dish chip memory |
505 | Loss Of Input Multiplexed Signal | The road dropout is closed in input |
506 | Loss Of FEC Frame | Fec frame is lost |
507 | Laser Shutoff | Laser cuts out |
508 | Software trap | Software fault |
509 | Low optical return loss | The circuit return loss reduces |
The unified alarm table of table 1
There are many-to-one mapping relations between manufacturer's alarm and above-mentioned each unified alarm.For example the Loss of Signal of Huawei's equipment alarm and in the Loss of Signal alarm of emerging equipment can be assigned as a standard Loss of Signal alarm, assignment process is finished before alert analysis according to the situation of actual O﹠M by the user.
The corresponding situation of unified standard alarm and manufacturer's alarm (because data volume is bigger, do not give an example one by one, only enumerate the example of the corresponding manufacturer of two standard alarm alarm) as shown in table 2 below at every place standard alarm
ID | Unified alarm name | The Chinese remarks | Manufacturer | Manufacturer's alarm name |
20 | Loss of Optical Channel | Optical channel is lost | Alcatel | User Channel LOS |
20 | Loss of Optical Channel | Optical channel is lost | ZTE | OTU plate channel signal is lost alarm |
20 | Loss of Optical Channel | Optical channel is lost | Lucent | ITRIBcLOS |
20 | Loss of Optical Channel | Optical channel is lost | Lucent | ICHANcLOS |
20 | Loss of Optical Channel | Optical channel is lost | Fenghuo | CH_IOLS |
20 | Loss of Optical Channel | Optical channel is lost | Huawei | CHAN_LOS |
20 | Loss of Optical Channel | Optical channel is lost | Lucent | TRIBcLOS |
20 | Loss of Optical Channel | Optical channel is lost | Lucent | OCHANLOS |
20 | Loss of Optical Channel | Optical channel is lost | Alcatel | Loss Of Channel |
20 | Loss of Optical Channel | Optical channel is lost | Lucent | INCOCH10GLOS |
20 | Loss of Optical Channel | Optical channel is lost | Lucent | OCHANcLOS |
20 | Loss of Optical Channel | Optical channel is lost | Alcatel | Loss Of Wavelength |
20 | Loss of Optical Channel | Optical channel is lost | Alcatel | Input Power Loss |
20 | Loss of Optical Channel | Optical channel is lost | Alcatel | Loss Of Signal |
21 | Loss of Optical Line Signal | The optical link dropout | Nortel | Red band shutoff threshold crossed |
21 | Loss of Optical Line Signal | The optical link dropout | Lucent | OLINEcLOS |
21 | Loss of Optical | The optical link dropout | Fujitsu | CONTFAIL |
Line Signal | ||||
21 | Loss of Optical Line Signal | The optical link dropout | Alcatel | Far End Loss Of Line Mux Signal |
21 | Loss of Optical Line Signal | The optical link dropout | ZTE | LIOP |
21 | Loss of Optical Line Signal | The optical link dropout | Nortel | Shutoff threshold crossed |
21 | Loss of Optical Line Signal | The optical link dropout | Alcatel | Far End Loss Of Line Trib Signal |
21 | Loss of Optical Line Signal | The optical link dropout | Lucent | OLINELOS |
21 | Loss of Optical Line Signal | The optical link dropout | Lucent | WADLINELOS |
21 | Loss of Optical Line Signal | The optical link dropout | Huawei | R_LOS |
21 | Loss of Optical Line Signal | The optical link dropout | Huawei | PORT_MODULE_OFFLINE |
21 | Loss of Optical Line Signal | The optical link dropout | Alcatel | Loss Of Multiplex Section |
21 | Loss of Optical Line Signal | The optical link dropout | Nortel | Blue band shutoff threshold crossed |
21 | Loss of Optical Line Signal | The optical link dropout | ZTE | OA plate input No Light Alarm |
21 | Loss of Optical Line Signal | The optical link dropout | Fenghuo | R_LOS |
The unified alarm of table 2 and manufacturer's alarm correspondence table
3, on the basis of unified alarm table, set up alarm name dependency rule storehouse.
The dependency rule storehouse is made up of a series of alarm name in twos, the dependence between expression alarm and the alarm, and the root alarm preferentially is appointed as in the alarm that is relied in the root alert analysis.Can determine according to the situation of concrete manufacturer and general rule, also can revise rule base according to the experience of scene accumulation.One of the dependency rule storehouse is exemplified below:
Rule numbers | Rule type | The root alarm name | The alarm name of deriving |
1 | System's rule that prestores | Loss of Input Signal | Signal Degrade |
2 | System's rule that prestores | Unit Missing | Unit Failure |
3 | The client is from the customization rule | No Board Software | Unit Failure |
4 | The client is from the customization rule | Loss Of Input Multiplexed Signal | Loss Of FEC Frame |
Table 3 dependency rule storehouse
Described dependency rule storehouse is the practice and the summary of experience of network management center of China Telecom, is the own independent rule base of creating.
The incompatible adaptation of rule set that can also edit in the Relational database table comprises new regulation, also can revise existing rule and adapt to new situation.
4, the multi-manufacturer DWDM Integrated Network Management System positions manufacturer's report and alarm and shines upon, and becomes the alarm of consolidation form.
Positioning function is responsible for the alarm on the alarm source on the different modeling pattern of the EMS of manufacturer is converted into alarm on the unified model, and positioning function specifically may further comprise the steps:
(1) the original alarm source information in the alarm of extraction manufacturer;
(2) analyze original alarm source information and decomposition;
(3) conversion original alarm source information is unified alarm source information;
(4) the unified alarm source sign of alarm is set.
Mapping function is responsible for the title of different vendor's alarm is converted into corresponding unified alarm name, mainly may further comprise the steps:
(1) extracts relevant informations such as original alarm title and manufacturer;
(2) inquiry original alarm and standard alarm map information storehouse;
(3) the unified alarm name sign of alarm is set.
By the location and the mapping of alarm, can shield the diversity of the alarm of manufacturer, for next step root alert analysis of unifying to alarm creates conditions.
The location of alarm and mapping use general string analysis and data base querying technology to realize, repeat no more.
5, to finishing the unified alarm of locating and shining upon, use the alarm propagation ideograph, utilize the incidence relation of the alarm generation of representing among the figure, filter out all alarms that belong to same alarm correlation group.
Referring to accompanying drawing 4, Fig. 4 shows according to the resulting alarm propagation ideograph of above-mentioned steps, has wherein shown the direction of propagation between a plurality of nodes and the node.In addition, also on this alarm propagation ideograph, identify the alarm that all are positioned.Can clearly be seen that all alarms that belong to same alarm correlation group, the star with shade in the accompanying drawing 4 is represented.The alarm that does not belong to this alarm correlation group is irrelevant alarm, with blank star representation.
Accompanying drawing 5-6 and accompanying drawing 4 are similar, have shown the alarm propagation ideograph of system.All alarms that belong to same alarm correlation group that can draw by this alarm propagation ideograph and the alarm that does not belong to this alarm correlation group are irrelevant alarms.Accompanying drawing 4-6 is depicted as under the common network alarm situation, and the result who analyzes institute according to the alarm propagation ideograph illustrates.
6, to belonging to all alarms of same alarm correlation group, use alarm name dependency rule storehouse, pick out the root alarm.
Below provide several examples, illustrate in all alarms that how to be subordinated in the same alarm correlation group and judge the root alarm.
Still at 3 the relevant alarms that belong to the relevant group of same alarm shown in the accompanying drawing 4, use following alarm name relation rule:
Numbering | Warning position | Alarm name | Analysis result |
1 | A | Loss of Input Signal | The root alarm |
2 | B | Signal Degrade | The alarm of deriving |
3 | I | Loss Of Output Signal | The alarm of deriving |
Table 4 dependency rule storehouse
3 alarms in the accompanying drawing 4 lay respectively at node A, B, I, and according to above-mentioned relation rule base table 4, the alarm of inferring node A is the root alarm, and the alarm of Node B, I is the alarm of deriving.As shown in Figure 7, the star representation root alarm shown in the dark-shaded is positioned at node A.
Still, use following alarm name relation rule at 9 the relevant alarms that belong to the relevant group of same alarm shown in the accompanying drawing 5:
Numbering | Warning position | Alarm name | Analysis result |
1 | A | Signal Degrade | The alarm of deriving |
2 | B | Alarm Indication Signal | The alarm of deriving |
3 | C | Alarm Indication Signal | The alarm of deriving |
4 | D | Loss of Optical Line Signal | The alarm of deriving |
5 | E | Unit Missing | The root alarm |
6 | F | Loss of Optical Line Signal | The alarm of deriving |
7 | G | Alarm Indication Signal | The alarm of deriving |
8 | H | Alarm Indication Signal | The alarm of deriving |
9 | I | Signal Degrade | The alarm of deriving |
Table 5 dependency rule storehouse
9 alarms in the accompanying drawing 5 lay respectively at node A, B, C, D, E, F, G, H, I, and according to above-mentioned relation rule base table 5, the alarm of node E is the root alarm, and the alarm of other nodes is the alarms of deriving.As shown in Figure 8, the star representation root alarm shown in the dark-shaded is positioned at node E.
Still, use following alarm name relation rule at 8 the relevant alarms that belong to the relevant group of same alarm shown in the accompanying drawing 6:
Numbering | Warning position | Alarm name | Analysis result |
1 | A | Signal Degrade | The alarm of deriving |
2 | B | Alarm Indication Signal | The alarm of deriving |
3 | C | Alarm Indication Signal | The alarm of deriving |
4 | D | Loss of Optical Line Signal | The root alarm |
5 | F | Loss of Optical Line Signal | The root alarm |
6 | G | Alarm Indication Signal | The alarm of deriving |
7 | H | Alarm Indication Signal | The alarm of deriving |
8 | I | Signal Degrade | The alarm of deriving |
Table 6 dependency rule storehouse
8 alarms in the accompanying drawing 6 lay respectively at node A, B, C, D, F, G, H, I, and according to above-mentioned relation rule base table 6, the alarm of node D, F is the root alarm, and the alarm of other nodes is the alarms of deriving.As shown in Figure 9, the star representation root alarm shown in the dark-shaded, it is between node D, F.
As mentioned above, from a large amount of relevant and irrelevant alarms, determined the root alarm by above-mentioned steps.
Accompanying drawing 10 shows the step of above-mentioned definite root alarm.At first, directly map out the alarm propagation ideograph of described system from the topological structure of described system, described alarm propagation ideograph has shown the oriented annexation corresponding to alarm propagation between a plurality of nodes of described system configuration and the node; Then, locate all alarms in the described system and it is mapped as predefined standard alarm; According to described alarm propagation ideograph, find out all alarms that belong to same alarm correlation group and the irrelevant alarm that does not belong to this alarm correlation group then; According to predefined dependency rule storehouse, be subordinated in all alarms of same alarm correlation group and determine the root alarm and the alarm of deriving.
The core concept of method for analyzing root warning provided by the invention is to analyze with abstract foundation and irrelevant alarm propagation ideograph and the unified name dependency rule storehouse of alarming of manufacturer with the mechanism that alarm is derived by the alarm report to different vendor.
The present invention has overcome defective of the prior art, have a plurality of advantages, for example: implementation is simple, support real-time variation: can map directly to the alarm propagation ideograph from DWDM network topology data, do not need through repeatedly with the conversion of complexity, the variation that network takes place can be reflected in real time on the alarm propagation ideograph; Support the root alert analysis of multi-manufacturer DWDM network: unified alarm collects and strides based on the alarm name dependence support of unified alarm the root alert analysis of manufacturer; The accuracy height: the rule base of alarm name dependence is made up of a series of alarm name in twos, can determine according to the situation of concrete manufacturer and general rule, also can revise rule base, make the root alert analysis can obtain the higher result of accuracy according to the experience of scene accumulation.
Claims (9)
1, a kind of root alarm method for searching that is used for multi-manufacturer DWDM network management system is characterized in that comprising the steps:
Map out the alarm propagation ideograph of described DWDM network management system from the topological structure of described DWDM network management system, described alarm propagation ideograph has shown the oriented annexation corresponding to alarm propagation between a plurality of nodes of described system configuration and the node;
Locate all alarms in the described system, and it is mapped as predefined standard alarm;
According to described alarm propagation ideograph, find out all alarms that belong to same alarm correlation group and the irrelevant alarm that does not belong to this alarm correlation group;
According to predefined dependency rule storehouse, be subordinated in all alarms of same alarm correlation group and determine the root alarm and the alarm of deriving.
2, the method for claim 1, it is characterized in that: described alarm propagation ideograph has defined the incidence relation and the direction of deriving of the alarm generation that exists between the alarm source in the multi-manufacturer DWDM network, and described alarm propagation ideograph is supported deep search and breadth first search's algorithm.
3, method according to claim 1, wherein the alarm propagation ideograph has certain hierarchical structure.
4, method according to claim 1, the alarm that wherein belongs to same alarm correlation group are all alarms that can reach each other by the oriented connection between the node on described alarm propagation ideograph.
5, method according to claim 1, wherein said standard alarm are the unified alarm set of using in the described multi-manufacturer DWDM Integrated Network Management System of definition, and each standard alarm is alarmed corresponding to one or more manufacturers.
6, method according to claim 1, wherein said dependency rule storehouse has defined the dependence between a plurality of standard alarm that caused by same fault in the described multi-manufacturer DWDM network, it is made up of a series of alarm name in twos, the dependence between expression alarm and the alarm.
7, method according to claim 6, wherein the root alarm preferentially is appointed as in the alarm that is relied on.
8, method according to claim 1, wherein said dependency rule storehouse can be determined according to the situation of concrete manufacturer and general rule.
9, method according to claim 1, wherein said dependency rule storehouse can be modified at the scene.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2006100571709A CN100531052C (en) | 2006-03-13 | 2006-03-13 | Method for analyzing root warning for multi-manufacturer DWDM network management system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2006100571709A CN100531052C (en) | 2006-03-13 | 2006-03-13 | Method for analyzing root warning for multi-manufacturer DWDM network management system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101039209A true CN101039209A (en) | 2007-09-19 |
CN100531052C CN100531052C (en) | 2009-08-19 |
Family
ID=38889865
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB2006100571709A Active CN100531052C (en) | 2006-03-13 | 2006-03-13 | Method for analyzing root warning for multi-manufacturer DWDM network management system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN100531052C (en) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101252477B (en) * | 2008-03-27 | 2010-12-22 | 杭州华三通信技术有限公司 | Determining method and analyzing apparatus of network fault root |
CN101997709A (en) * | 2009-08-10 | 2011-03-30 | 中兴通讯股份有限公司 | Root alarm data analysis method and system |
CN102130783A (en) * | 2011-01-24 | 2011-07-20 | 浪潮通信信息系统有限公司 | Intelligent alarm monitoring method of neural network |
CN101577648B (en) * | 2009-06-26 | 2011-08-03 | 杭州华三通信技术有限公司 | Method for determining root cause of network fault and analytic equipment thereof |
CN102571407A (en) * | 2010-12-30 | 2012-07-11 | 中国移动通信集团河北有限公司 | Alarm correlation analysis method and device |
CN102982447A (en) * | 2012-10-31 | 2013-03-20 | 东莞宇龙通信科技有限公司 | Method and system of payment multi-channel prompting information |
CN101964681B (en) * | 2009-07-22 | 2013-08-21 | 中兴通讯股份有限公司 | Device and method for detecting alarm by interruption |
CN104408890A (en) * | 2014-11-05 | 2015-03-11 | 国家电网公司 | Alarm handling method and device of electric power system |
CN104486790A (en) * | 2014-12-31 | 2015-04-01 | 郭辉 | Wireless communication network fault detecting method and device |
CN105071970A (en) * | 2015-08-27 | 2015-11-18 | 中国电信股份有限公司 | Failure analysis method, failure analysis system and network management equipment |
CN111611132A (en) * | 2020-05-20 | 2020-09-01 | 中国移动通信集团江苏有限公司 | Operation and maintenance analysis method, device, equipment and medium for service |
CN114301793A (en) * | 2021-12-30 | 2022-04-08 | 中国电信股份有限公司 | Path generation method and device in optical transmission network |
CN114301793B (en) * | 2021-12-30 | 2024-09-10 | 中国电信股份有限公司 | Path generation method and device in optical transmission network |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
ITMI20010900A1 (en) * | 2001-04-30 | 2002-10-30 | Marconi Comm Spa | TELECOMMUNICATIONS NETWORK WITH AUTOMATIC TOPOLOGY DETECTION AND METHOD FOR THIS DETECTION |
US6810496B1 (en) * | 2001-11-07 | 2004-10-26 | Ciena Corporation | System and method for troubleshooting a network |
-
2006
- 2006-03-13 CN CNB2006100571709A patent/CN100531052C/en active Active
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101252477B (en) * | 2008-03-27 | 2010-12-22 | 杭州华三通信技术有限公司 | Determining method and analyzing apparatus of network fault root |
CN101577648B (en) * | 2009-06-26 | 2011-08-03 | 杭州华三通信技术有限公司 | Method for determining root cause of network fault and analytic equipment thereof |
CN101964681B (en) * | 2009-07-22 | 2013-08-21 | 中兴通讯股份有限公司 | Device and method for detecting alarm by interruption |
CN101997709A (en) * | 2009-08-10 | 2011-03-30 | 中兴通讯股份有限公司 | Root alarm data analysis method and system |
CN102571407A (en) * | 2010-12-30 | 2012-07-11 | 中国移动通信集团河北有限公司 | Alarm correlation analysis method and device |
CN102130783A (en) * | 2011-01-24 | 2011-07-20 | 浪潮通信信息系统有限公司 | Intelligent alarm monitoring method of neural network |
CN102130783B (en) * | 2011-01-24 | 2014-07-02 | 浪潮通信信息系统有限公司 | Intelligent alarm monitoring method of neural network |
CN102982447B (en) * | 2012-10-31 | 2016-04-06 | 东莞宇龙通信科技有限公司 | A kind of method and system paying hyperchannel prompting message |
CN102982447A (en) * | 2012-10-31 | 2013-03-20 | 东莞宇龙通信科技有限公司 | Method and system of payment multi-channel prompting information |
CN104408890A (en) * | 2014-11-05 | 2015-03-11 | 国家电网公司 | Alarm handling method and device of electric power system |
CN104486790A (en) * | 2014-12-31 | 2015-04-01 | 郭辉 | Wireless communication network fault detecting method and device |
CN105071970A (en) * | 2015-08-27 | 2015-11-18 | 中国电信股份有限公司 | Failure analysis method, failure analysis system and network management equipment |
CN105071970B (en) * | 2015-08-27 | 2018-09-11 | 中国电信股份有限公司 | Failure analysis methods and system and Network Management Equipment |
CN111611132A (en) * | 2020-05-20 | 2020-09-01 | 中国移动通信集团江苏有限公司 | Operation and maintenance analysis method, device, equipment and medium for service |
CN111611132B (en) * | 2020-05-20 | 2023-09-05 | 中国移动通信集团江苏有限公司 | Operation and maintenance analysis method, device, equipment and medium for service |
CN114301793A (en) * | 2021-12-30 | 2022-04-08 | 中国电信股份有限公司 | Path generation method and device in optical transmission network |
CN114301793B (en) * | 2021-12-30 | 2024-09-10 | 中国电信股份有限公司 | Path generation method and device in optical transmission network |
Also Published As
Publication number | Publication date |
---|---|
CN100531052C (en) | 2009-08-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101039209A (en) | Method for analyzing root warning for multi-manufacturer DWDM network management system | |
JP7110333B2 (en) | TOPOLOGY PROCESSING METHOD, APPARATUS AND SYSTEM | |
CN112567647B (en) | PON fault positioning method and device | |
CN100479385C (en) | Integral maintaining method and system for multi-equipment | |
US20180359029A1 (en) | Distributed measurements and analysis in networks | |
US9564967B2 (en) | Management system for GPON based services | |
CN105634605A (en) | Method and device for quickly acquiring optical fiber interconnection information | |
CN100375435C (en) | Alarm correlation analysis of light synchronous transmitting net | |
CN1878047A (en) | Method for diffusing crossed restriction information in wavelength division device | |
CN1633082A (en) | A method and apparatus for fault location in communication network | |
Xie et al. | Scaling optical interconnects for hyperscale data center networks | |
CN1957635A (en) | Method for remote access of an optical network device in a passive optical network | |
CN1689273A (en) | Method for automated connection discovery in optical networks | |
CN102130796B (en) | Power communication network detecting method based on reverse N-1 analysis and system thereof | |
CN107493522B (en) | Bandwidth type service self-configuration method | |
CN101056144A (en) | A diagnosis system and method for optical line terminal port | |
CN1606260A (en) | A fault positioning method and equipment for communication network | |
CN104270256B (en) | The test device and method of a kind of cross-platform network alarm and incident management | |
CN102984013A (en) | Alarm analysis method for communication transmission network | |
US7577360B2 (en) | System and method for second order multi-layer traffic grooming for optical network optimization | |
CN103997372A (en) | State monitoring method and device for optical module at optical line terminal | |
US7680033B1 (en) | Network manager circuit rediscovery and repair | |
CN102783087B (en) | Associative alarm method and device based on management layers | |
CN1138382C (en) | Tree service distribution method for transmission products | |
Gillan et al. | Challenges in the application of feature modelling in fixed line telecommunications |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |