CN101917282A - Method, device and system for processing alarm shielding rules - Google Patents

Method, device and system for processing alarm shielding rules Download PDF

Info

Publication number
CN101917282A
CN101917282A CN2010102335711A CN201010233571A CN101917282A CN 101917282 A CN101917282 A CN 101917282A CN 2010102335711 A CN2010102335711 A CN 2010102335711A CN 201010233571 A CN201010233571 A CN 201010233571A CN 101917282 A CN101917282 A CN 101917282A
Authority
CN
China
Prior art keywords
shielding rules
alarm
rules
management equipment
alarm shielding
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2010102335711A
Other languages
Chinese (zh)
Other versions
CN101917282B (en
Inventor
刘伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201010233571.1A priority Critical patent/CN101917282B/en
Priority to PCT/CN2010/078923 priority patent/WO2012009911A1/en
Publication of CN101917282A publication Critical patent/CN101917282A/en
Application granted granted Critical
Publication of CN101917282B publication Critical patent/CN101917282B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0604Management of faults, events, alarms or notifications using filtering, e.g. reduction of information by using priority, element types, position or time

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses a method, a device and a system for processing alarm shielding rules, which are used for reducing the processing complexity of the alarm shielding rules and increasing efficiency. The method comprises the following steps of: acquiring a first alarm shielding rule which is preset locally and recorded in a tree structure and a second alarm shielding rule which is preset for at least one network management equipment and recorded in the tree structure from the at least one network management equipment by network management equipment; converting the first alarm shielding rule and the second alarm shielding rule into a first group of alarm shielding rules and a second group of alarm shielding rules which are recorded in a linear structure respectively; and comparing the first group of alarm shielding rules with the second group of alarm shielding rules to obtain shielding rule increment. Thus, the method, the device and the system reduce the comparison complexity of the alarm shielding rules and increase the efficiency on the premise of saving unnecessary message transmission and ensuring the setting correctness of the shielding rules; meanwhile, the invention discloses the device and the system for processing the alarm shielding rules.

Description

A kind of processing method of alarm shielding rules, Apparatus and system
Technical field
The present invention relates to the communications field, relate in particular to a kind of processing method, Apparatus and system of alarm shielding rules.
Background technology
Alarm management is one of critical function of modern network management system (abbreviation webmaster), and alarm management is provided with two parts by alarm demonstration and alarm to be formed, and alarm shield is to alarm one of function the most complicated in the part is set, and has irreplaceable effect.So-called alarm shield is meant that the user is provided with all alarm items of management equipment by graphic user interface, and the user can shield any alarm item, makes that the alarm item after the shielding does not produce alarm.
Telecommunication apparatus is to be base unit with the network element, consult shown in the accompanying drawing 1, can assign the polylith veneer on each network element, a plurality of ports are arranged on every veneer, in each port, may also comprise logic port (as logic ports such as FTP, CTP), that is to say that telecommunication apparatus is made up of resources such as veneer, port, logic ports, under each resource, include a plurality of test points, and under each test point, include a plurality of alarms.Generally speaking, equipment is the tree relation that can't support directly to describe with the mode of order line above-mentioned resource-test point-alarm, can only issue complex rule to reach the purpose of alarm shield by webmaster.
As shown in the above, description to alarm shielding rules need be used resource, test point, alarm three elements, and has certain hierarchical structure relation between these three elements, the user may select a plurality of resources when alarm shield is set, under each resource, can select a plurality of test points again, and can select a plurality of alarms items to shield at each test point, description to this kind hierarchical structure on Network Management Equipment is a message that comprises tree data structure, on management equipment then is this tree relation to be split as many records preserve respectively.For example, the user selects m resource, in each resource, include n test point, and each test point is had j alarm item, Network Management Equipment is preserved this hierarchical structure by generating a message, after Network Management Equipment is issued to management equipment with this message, on management equipment, is split as m * n * j bar alarm shielding rules and preserves.
Network Management Equipment issues alarm shielding rules to management equipment can take following method: at first transmitting order to lower levels is removed the whole alarm shielding rules on the management equipment, issues the alarm shielding rules that the user is provided with to management equipment then.This method realizes simple, but for the alarm shield item that originally has been provided with, need issue the shielding rules of this alarm item when resetting again after the removing again, a lot of unnecessary messages have been caused issuing, and when the cleared alarm shielding rules, may cause this alarm to produce, and then this alarm item is provided with shielding, this alarm is disappeared, the easy like this user of making produces doubt, is unfavorable for user's experience.
Another kind method is the alarm shielding rules that has been provided with of searching and managing equipment at first, alarm shielding rules with user's setting compares then, remove and shielding to be set on the management equipment but the user this time not have the alarm item of setting, the newly-installed alarm item of shielding user, for the user the constant alarm item in front and back is set and does not issue shielding rules, and only issue the alarm shielding rules that front and back change to some extent is set, like this, do not need to issue unnecessary message, when but this method compares at the alarm shielding rules to Network Management Equipment and management equipment, be two groups of a plurality of trees of comparison, need navigate to the node of two same grades of tree during each the comparison earlier, node to this grade compares again, needs relatively all nodes of tree, realizes very complicated.
Summary of the invention
The invention provides a kind of processing method, Apparatus and system of alarm shielding rules,, reduce alarm shielding rules complexity relatively, raise the efficiency in order to when saving downward message, guaranteeing the shielding correctness.
The concrete technical scheme that the embodiment of the invention provides is as follows:
A kind of processing method of alarm shielding rules comprises:
Network Management Equipment obtains first alarm shielding rules that local default employing tree writes down, and obtains second alarm shielding rules that writes down at the default employing tree of this at least one management equipment from least one management equipment;
Described first alarm shielding rules and second alarm shielding rules are converted to first group of alarm shielding rules and the second group of alarm shielding rules that adopts the linear structure record respectively;
Described first group of alarm shielding rules and second group of alarm shielding rules are compared, obtain the shielding rules increment.
A kind of processing unit of alarm shielding rules comprises:
First processing unit, be used for Network Management Equipment and obtain first alarm shielding rules that local default employing tree writes down, and obtain second alarm shielding rules that writes down at the default employing tree of this at least one management equipment from least one management equipment;
Second processing unit is used for described first alarm shielding rules and second alarm shielding rules are converted to first group of alarm shielding rules and the second group of alarm shielding rules that adopts the linear structure record respectively;
The 3rd processing unit is used for described first group of alarm shielding rules and described second group of alarm shielding rules are compared, and obtains the shielding rules increment.
A kind of alarm shielding rules treatment system comprises:
The alarm shielding rules processing unit, be used for Network Management Equipment and obtain first alarm shielding rules that local default employing tree writes down, and second alarm regulation that obtains the employing tree record of presetting at this at least one management equipment from least one management equipment, described first alarm shielding rules and second alarm shielding rules are converted to first group of alarm shielding rules and the second group of alarm shielding rules that adopts the linear structure record respectively, and described first group of alarm shielding rules and described second group of alarm shielding rules compared, obtain the shielding rules increment, and issue described shielding rules increment;
Management equipment is used to receive the described shielding rules increment that described alarm shielding rules processing unit issues, and according to the alarm shielding rules of this shielding rules incremental update this locality.
Based on technique scheme, in the embodiment of the invention, Network Management Equipment is converted to the alarm shielding rules of tree record the alarm shielding rules of linear structure, compare at the alarm shielding rules that adopts the linear structure record on Network Management Equipment and the management equipment again, thereby will compare the data that two groups of a plurality of trees are converted to two groups of a plurality of linear structures of comparison, significantly reduced complexity relatively, improved efficient, and after relatively, obtain the shielding rules increment, Network Management Equipment only issues this shielding rules increment when issuing shielding rules, for the user shielding rules constant alarm item in front and back is set and does not issue shielding rules, thereby under the prerequisite of the correctness that does not influence the shielding rules setting, saved the message that issues.
Description of drawings
Fig. 1 is a management equipment alarm distributed architecture figure;
Fig. 2 is the treatment system Organization Chart of alarm shielding rules in the embodiment of the invention;
Fig. 3 is an alarm shielding rules processing unit structure chart in the embodiment of the invention;
Fig. 4 is the detail flowchart that in the embodiment of the invention alarm shielding rules of management equipment is provided with;
Fig. 5 is the detail flowchart that alarm shielding rules is handled in the embodiment of the invention.
Embodiment
In order to reduce the complexity that alarm shielding rules is provided with, raise the efficiency, a kind of processing method of alarm shielding rules is provided in the embodiment of the invention, can guarantee that shielding is provided with under the prerequisite of correctness, the message that saving issues, and reduce the complexity that alarm shielding rules is provided with, raise the efficiency.This method is: Network Management Equipment obtains first alarm shielding rules that local default employing tree writes down, and second alarm shielding rules that obtains the employing tree record of presetting at this management equipment from management equipment, and above-mentioned first alarm shielding rules and above-mentioned second alarm shielding rules be converted to first group of alarm shielding rules and the second group of alarm shielding rules that adopts the linear structure record respectively, first group of alarm shielding rules and second group of alarm shielding rules are compared, obtain the shielding rules increment.
The shielding item that changes to some extent before and after above-mentioned shielding rules increment is characterized by and is provided with, this shielding rules increment comprises removes shielding rules and newly-increased shielding rules, wherein, remove shielding rules and refer to and need the shielding rules removed on the management equipment, newly-increased shielding rules refers to needs the shielding rules that increases newly on the management equipment.
Below in conjunction with accompanying drawing the preferred embodiment of the present invention is elaborated.
Consult accompanying drawing 2, in the embodiment of the invention, the treatment system of alarm shielding rules mainly comprises alarm shielding rules processing unit 20 and management equipment 21, wherein,
Alarm shielding rules processing unit 20, be used to obtain first alarm shielding rules that the local default employing tree of Network Management Equipment writes down, and second alarm regulation that obtains employing trees record of presetting at this at least one management equipment 21 from least one management equipment 21, described first alarm shielding rules and second alarm shielding rules are converted to first group of alarm shielding rules and the second group of alarm shielding rules that adopts the linear structure record respectively, and described first group of alarm shielding rules and described second group of alarm shielding rules compared, obtain the shielding rules increment, and issue described shielding rules increment;
Management equipment 21 is used for the described shielding rules increment that receiving alarm shielding rules processing unit 20 issues, and according to the alarm shielding rules of this shielding rules incremental update this locality.
Consult accompanying drawing 3, in the embodiment of the invention, alarm shielding rules processing unit 20 mainly comprises following processing unit:
First processing unit 201, be used for Network Management Equipment and obtain first alarm shielding rules that local default employing tree writes down, and obtain second alarm shielding rules that writes down at the default employing tree of this at least one management equipment from least one management equipment;
Second processing unit 202 is used for above-mentioned first alarm shielding rules and second alarm shielding rules are converted to first group of alarm shielding rules and the second group of alarm shielding rules that adopts the linear structure record respectively;
The 3rd processing unit 203 is used for above-mentioned first group of alarm shielding rules and above-mentioned second group of alarm shielding rules are compared, and obtains the shielding rules increment.
Consult shown in the accompanying drawing 4, in the embodiment of the invention, as follows to the detailed process that the alarm shielding rules of management equipment is provided with:
Step 401: the alarm shielding rules on the searching and managing equipment, and judge whether there is alarm shielding rules on this management equipment, just judge and whether have the alarm item that shielding has been set on the management equipment, if there is not alarm shielding rules on this management equipment, the alarm shielding rules that user on the Network Management Equipment is provided with is converted to newly-increased shielding rules, should be the shielding rules increment, execution in step 404 by newly-increased shielding rules; Otherwise there is alarm shielding rules on the above-mentioned management equipment, reads the alarm shielding rules of this management equipment, and be kept in the tree data structure that defines in the Network Management Equipment, to be converted to the alarm shielding rules of tree, execution in step 402.
Wherein, the tree data structure that defines in Network Management Equipment is used to preserve alarm shielding rules, alarm shielding rules on the management equipment is to split into many form to be kept at respectively in the database of above-mentioned management equipment, after Network Management Equipment reads alarm shielding rules on the above-mentioned management equipment, this alarm shielding rules is stored in the tree data structure, and the alarm shielding rules that forms tree is kept at the webmaster side.
Step 402: judge whether there is the shielding item in the alarm shielding rules that the user is provided with on the Network Management Equipment, as not existing, alarm shielding rules on the management equipment is converted to the removing shielding rules, and this removing shielding rules is the shielding rules increment, execution in step 404; Otherwise there is the shielding item in the alarm shielding rules that the user is provided with on the Network Management Equipment, carries out comparison step 403.
Step 403: the alarm shielding rules of Network Management Equipment and the alarm shielding rules of the management equipment of obtaining are compared, obtain the shielding rules increment.
Step 404: give above-mentioned management equipment with above-mentioned shielding rules incremental distribution, according to the alarm shielding rules of the above-mentioned management equipment of this shielding rules incremental update.
Wherein, issue above-mentioned shielding rules increment and give above-mentioned management equipment, at the removing shielding rules in the shielding rules increment corresponding shielding item on this management equipment is done removing and handle, and corresponding shielding item on this management equipment is provided with shielding at the newly-increased shielding rules in the shielding rules increment.
Based on the said system framework, consult accompanying drawing 5, in the embodiment of the invention, performing step 403 alarm shielding rules detailed process relatively is as follows:
Step 501: Network Management Equipment obtains first alarm shielding rules that local default employing tree writes down, and obtains second alarm shielding rules that writes down at the default employing tree of this at least one management equipment from least one management equipment.
Step 502:, be converted to first group of alarm shielding rules and second group of alarm shielding rules of linear structure respectively with first alarm shielding rules of the local employing tree record of presetting of Network Management Equipment and second alarm shielding rules of the employing tree record that above-mentioned management equipment is preset.
The process that the alarm shielding rules of tree is converted to the linear structure alarm shielding rules is: travel through the data of each node in the alarm shielding rules of above-mentioned employing tree record and write down this data, above-mentioned node is root node, child node or leafy node; Whenever traverse a leafy node, the data combination of all nodes on will be from root node to this leafy node path is the data of a linear structure, the alarm shielding rules of the corresponding strip adoption linear structure record of the data of this linear structure; Adopt the alarm shielding rules of linear structure record to form one group of alarm shielding rules all that obtain.
More preferably, this linear structure adopts the form of character string, the alarm shielding rules that is about to tree is converted to the form of a plurality of character strings, wherein, a character string is represented an alarm shielding rules, according to the user demand is set, alarm shielding rules can be provided with at resource, test point or alarm item, the leafy node of corresponding tree alarm shielding rules is resource, test point or alarm item, and the character string that is converted to linear structure can be made up of the one or more information in resource, test point or the alarm item.If alarm shielding rules is to be provided with at the alarm item, then root node is a resource, and child node is a test point, leafy node is the alarm item, each character string is made up of resource, test point, alarm item, therebetween with CSV, is the most fine-grained alarm shielding rules.
For example, the user need shield all alarm items of 1 correspondence of the test point under the resource 1, at this moment when shielding rules is set, can only comprise resource 1 and test point 1 to character string that should shielding rules, expression is provided with shielding to all the alarm items under the test point 1; And for example, the user need be with alarm item 1 shielding of 1 correspondence of the test point under the resource 1 when shielding rules is set, and then character string that should shielding rules is comprised resource 1, test point 1, alarm 1, is the most fine-grained alarm shielding rules.
Step 503: first group of alarm shielding rules of more above-mentioned linear structure at Network Management Equipment and at second group of alarm shielding rules of the linear structure of management equipment obtains the shielding rules increment.
Wherein, the shielding rules increment comprises removes shielding rules and newly-increased shielding rules, removes shielding rules and is characterized by and needs the shielding rules removed on the management equipment, and newly-increased shielding rules is characterized by the newly-increased shielding rules that needs on the management equipment.
Preferably, when second group of alarm shielding rules to first group of alarm shield of Network Management Equipment linear structure and management equipment linear structure compares, first group of alarm shielding rules with management equipment is as the criterion, second group of alarm shielding rules of traversal Network Management Equipment linear structure, after relatively, will not comprise in first group of alarm shielding rules of Network Management Equipment, and the alarm item that comprises in second group of alarm shielding rules of management equipment, as removing shielding rules, removing is set with shielding with corresponding alarm item on the management equipment.In like manner, second group of alarm shielding rules with Network Management Equipment is as the criterion, first group of alarm shielding rules of traversal management equipment, by not comprising in second group of alarm shielding rules with management equipment after relatively, and the alarm item that comprises in first group of alarm shielding rules of Network Management Equipment, as newly-increased shielding rules, so that corresponding alarm item on the management equipment is provided with shielding.
For example, the alarm shielding rules of preserving on the management equipment is A, B, C, the alarm shielding rules that the user this time is provided with on Network Management Equipment is B, C, D, wherein, A, B, C, D at first are as the criterion with the alarm shielding rules on the management equipment for the alarm item, the alarm shielding rules on the traversal Network Management Equipment, find not have alarm shielding rules A on the Network Management Equipment, then with A as removing shielding rules; Secondly, be as the criterion with the alarm shielding rules on the Network Management Equipment, alarm shielding rules on the traversal management equipment, find not have alarm shielding rules D on the management equipment, then with D as newly-increased shielding rules, B, C are all arranged in the alarm shielding rules on management equipment and the Network Management Equipment, and then the alarm item of B, C correspondence is constant before and after being provided with, and will remove shielding rules A and newly-increased shielding rules D as the shielding rules increment.
At first the process that in the above-mentioned steps 502 alarm shielding rules of tree is converted to the linear structure alarm shielding rules of character string forms is illustrated.
Example 1, the alarm mask data structure that defines in the Network Management Equipment is as follows:
AlarmSurvSetList-T::=SEQUENCE?OF?AlarmSurvSet-T
AlarmSurvSet-T::=SEQUENCE{
ResName NamingAttributes-T resource
SurvSet LayeredProbableCauseList-T test point-alarm corresponding relation tabulation
}
LayeredProbableCauseList-T::=SEQUENCE?OF?LayeredProbableCause-T
LayeredProbableCause-T::=SEQUENCE{
LayerRate LayerRate-T, test point
A probableCauseList ProbableCauseList-T alarm tabulation
}
ProbableCauseList-T::=SEQUENCE?OF?ProbableCause-T
Wherein, AlarmSurvSetList-T represents a series of alarm shielding rules under the resource, resName represents a resource (veneer in the management equipment, port or logic port), survSet represents the corresponding relation of a series of test points-alarm item under this resource, layerRate represents the title of test point, probableCauseList represents the alarm item tabulation under the test point, supposing has 2 test points under the resource that is called resName1, be respectively layerRate1, layerRate2,2 alarm items are arranged again under each test point, the alarm item of test point layerRate1 correspondence is ProbableCause1, ProbableCause2, the alarm item of test point layerRate2 correspondence is ProbableCause3, ProbableCause4, travel through each node of this tree, can be exchanged into 4 character strings, be respectively { resName1, layerRate1, ProbableCause1}, { resName1, layerRate1, ProbableCause2}, { resName1, layerRate2, ProbableCause3}, { resName1, layerRate2, ProbableCause4}, wherein, each character string is represented a shielding rules.
In above-mentioned example 1 tree is converted on the basis of linear structure of character string forms, in the step 503 relatively the process of the alarm shielding rules of Network Management Equipment and management equipment be illustrated.
Example 2, the shielding rules of supposing the management equipment obtained is for to be provided with shielding to the ProbableCause1 among the test point layerRate1 of resource resName1, and the shielding rules that the user resets on Network Management Equipment is, ProbableCause2 among the test point layerRate1 of resource resName1 and the ProbableCause4 among the test point layerRate2 are provided with shielding.The character string that the shielding rules of management equipment is converted to linear structure is { resName1, layerRate1, ProbableCause1}, the character string that the shielding rules that user on the webmaster is provided with is converted to linear structure is { resName1, layerRate1, ProbableCause2}, { resName1, layerRate2, ProbableCause4}.Each character string in the shielding rules of the linear structure that the user is provided with on character string in the shielding rules of the linear structure of extract management equipment and the Network Management Equipment compares, be about to character string { resName1, layerRate1, ProbableCause1} compares with all character strings of expression Network Management Equipment shielding rules, relatively do not comprise character string { resName1 in the character string of back discovery expression Network Management Equipment shielding rules, layerRate1, ProbableCause1}, then with character string { resName1, the shielding rules that layerRate1, ProbableCause1} represent is as removing shielding rules; Each character string in the character string of expression Network Management Equipment shielding rules all character strings with expression management equipment shielding rules are compared, be about to the character string { resName1 in the Network Management Equipment shielding rules, layerRate1, ProbableCause2} compares with all character strings of expression management equipment shielding rules, again with the character string { resName1 in the Network Management Equipment shielding rules, layerRate2, ProbableCause4} compares with all character strings of expression management equipment shielding rules, relatively the back is found, { resName1 in the Network Management Equipment shielding rules, layerRate1, ProbableCause2}, { resName1, layerRate2, the ProbableCause4} character string does not exist in the character string of expression management equipment shielding rules, then with shielding rules { resName1, layerRate1, ProbableCause2}, { ProbableCause4} is as newly-increased shielding rules for resName1, layerRate2.
Based on the foregoing description, alarm shielding rules with user's default employing tree data structure record on Network Management Equipment, and the alarm shielding rules that on management equipment, is provided with that uses the tree data structure record in the webmaster side, be converted to the linear structure of character string forms respectively, shielding rules to two linear structures compares again, essence is to be converted to two groups of character strings are compared, to compare two groups of a plurality of tree data structures and be converted to two groups of many character strings of comparison, thereby significantly reduced complexity relatively, improved efficient.Simultaneously, relatively the back obtains the shielding rules increment, and webmaster only issues this shielding rules increment when issuing shielding rules, and the constant alarm item of shielding rules does not issue shielding rules before and after being provided with for the user, thereby saved issuing of unnecessary message, can guarantee to shield the correctness of setting again.
In sum, adopt the alarm shielding rules processing method in the embodiment of the invention, realized having reduced alarm shielding rules complexity relatively, improved efficient saving downward message, guaranteeing that shielding is provided with under the prerequisite of correctness.
Obviously, those skilled in the art can carry out various changes and modification to the present invention and not break away from the spirit and scope of the present invention.Like this, if of the present invention these are revised and modification belongs within the scope of claim of the present invention and equivalent technologies thereof, then the present invention also is intended to comprise these changes and modification interior.

Claims (10)

1. the processing method of an alarm shielding rules is characterized in that, comprising:
Network Management Equipment obtains first alarm shielding rules that local default employing tree writes down, and obtains second alarm shielding rules that writes down at the default employing tree of this at least one management equipment from least one management equipment;
Described first alarm shielding rules and second alarm shielding rules are converted to first group of alarm shielding rules and the second group of alarm shielding rules that adopts the linear structure record respectively;
Described first group of alarm shielding rules and second group of alarm shielding rules are compared, obtain the shielding rules increment.
2. the method for claim 1 is characterized in that, will adopt the alarm shielding rules of tree record to be converted to the one group of alarm shielding rules that adopts the linear structure record, comprising:
Travel through the data of each node in the alarm shielding rules of described employing tree record and write down this data, described node is root node, child node or leafy node;
Whenever traverse a leafy node, the data combination of all nodes on will be from root node to this leafy node path is the data of a linear structure, the alarm shielding rules of the corresponding strip adoption linear structure record of the data of this linear structure;
Adopt the alarm shielding rules of linear structure record to form one group of alarm shielding rules all that obtain.
3. method as claimed in claim 1 or 2 is characterized in that, described linear structure is the form of character string, and described character string is made up of resource, test point, alarm item, and a character string is represented an alarm shielding rules.
4. the method for claim 1 is characterized in that, described shielding rules increment is characterized by need on the shielding rules removed and the described management equipment to need the shielding rules that increases newly on the described management equipment.
5. as claim 1 or 4 described methods, it is characterized in that, obtain described shielding rules increment after, comprising: issue described shielding rules increment to described management equipment, described management equipment is according to this shielding rules incremental update alarm shielding rules.
6. the processing unit of an alarm shielding rules is characterized in that, comprising:
First processing unit, be used for Network Management Equipment and obtain first alarm shielding rules that local default employing tree writes down, and obtain second alarm shielding rules that writes down at the default employing tree of this at least one management equipment from least one management equipment;
Second processing unit is used for described first alarm shielding rules and second alarm shielding rules are converted to first group of alarm shielding rules and the second group of alarm shielding rules that adopts the linear structure record respectively;
The 3rd processing unit is used for described first group of alarm shielding rules and described second group of alarm shielding rules are compared, and obtains the shielding rules increment.
7. device as claimed in claim 6 is characterized in that, when described second processing unit will adopt the alarm shielding rules of tree record to be converted to the one group of alarm shielding rules that adopts the linear structure record,
Travel through the data of each node in the alarm shielding rules of described employing tree record and write down this data, described node is root node, child node or leafy node;
Whenever traverse a leafy node, the data combination of all nodes on will be from root node to this leafy node path is the data of a linear structure, the alarm shielding rules of the corresponding strip adoption linear structure record of the data of this linear structure;
Adopt the alarm shielding rules of linear structure record to form one group of alarm shielding rules all that obtain.
8. as claim 6 or 7 described devices, it is characterized in that described linear structure is the form of character string, described character string is made up of resource, test point, alarm item, and a character string is represented an alarm shielding rules.
9. device as claimed in claim 6 is characterized in that, the described shielding rules increment that described the 3rd processing unit obtains is characterized by need on the shielding rules removed and the described management equipment to need the shielding rules that increases newly on the described management equipment.
10. an alarm shielding rules treatment system is characterized in that, comprising:
The alarm shielding rules processing unit, be used for Network Management Equipment and obtain first alarm shielding rules that local default employing tree writes down, and second alarm regulation that obtains the employing tree record of presetting at this at least one management equipment from least one management equipment, described first alarm shielding rules and second alarm shielding rules are converted to first group of alarm shielding rules and the second group of alarm shielding rules that adopts the linear structure record respectively, and described first group of alarm shielding rules and described second group of alarm shielding rules compared, obtain the shielding rules increment, and issue described shielding rules increment;
Management equipment is used to receive the described shielding rules increment that described alarm shielding rules processing unit issues, and according to the alarm shielding rules of this shielding rules incremental update this locality.
CN201010233571.1A 2010-07-20 2010-07-20 Method, device and system for processing alarm shielding rules Expired - Fee Related CN101917282B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201010233571.1A CN101917282B (en) 2010-07-20 2010-07-20 Method, device and system for processing alarm shielding rules
PCT/CN2010/078923 WO2012009911A1 (en) 2010-07-20 2010-11-19 Method, apparatus and system for processing alarm screening rule

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201010233571.1A CN101917282B (en) 2010-07-20 2010-07-20 Method, device and system for processing alarm shielding rules

Publications (2)

Publication Number Publication Date
CN101917282A true CN101917282A (en) 2010-12-15
CN101917282B CN101917282B (en) 2014-12-17

Family

ID=43324679

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201010233571.1A Expired - Fee Related CN101917282B (en) 2010-07-20 2010-07-20 Method, device and system for processing alarm shielding rules

Country Status (2)

Country Link
CN (1) CN101917282B (en)
WO (1) WO2012009911A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106326262A (en) * 2015-06-29 2017-01-11 中兴通讯股份有限公司 Alarm inquiry method and device, and optical transmission network management system
CN110213207A (en) * 2018-05-07 2019-09-06 腾讯科技(深圳)有限公司 A kind of network security defence method and equipment based on log analysis
CN113055213A (en) * 2019-12-27 2021-06-29 中兴通讯股份有限公司 Alarm information management method, alarm information management system and server
CN114448774A (en) * 2021-12-16 2022-05-06 武汉光迅科技股份有限公司 Alarm processing method, device and storage medium

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11171851B2 (en) 2014-01-28 2021-11-09 Hewlett Packard Enterprise Development Lp Group alert in server systems

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1581170A (en) * 2003-08-15 2005-02-16 国际商业机器公司 Method and system for comparing files of two computers
CN101106477A (en) * 2006-07-12 2008-01-16 中兴通讯股份有限公司 Method for generating incremental data based on flow number

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1581170A (en) * 2003-08-15 2005-02-16 国际商业机器公司 Method and system for comparing files of two computers
CN101106477A (en) * 2006-07-12 2008-01-16 中兴通讯股份有限公司 Method for generating incremental data based on flow number

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106326262A (en) * 2015-06-29 2017-01-11 中兴通讯股份有限公司 Alarm inquiry method and device, and optical transmission network management system
CN110213207A (en) * 2018-05-07 2019-09-06 腾讯科技(深圳)有限公司 A kind of network security defence method and equipment based on log analysis
CN110213207B (en) * 2018-05-07 2021-12-28 腾讯科技(深圳)有限公司 Network security defense method and equipment based on log analysis
CN113055213A (en) * 2019-12-27 2021-06-29 中兴通讯股份有限公司 Alarm information management method, alarm information management system and server
CN113055213B (en) * 2019-12-27 2024-05-28 中兴通讯股份有限公司 Alarm information management method, alarm information management system and server
CN114448774A (en) * 2021-12-16 2022-05-06 武汉光迅科技股份有限公司 Alarm processing method, device and storage medium
CN114448774B (en) * 2021-12-16 2023-12-05 武汉光迅科技股份有限公司 Alarm processing method, device and storage medium

Also Published As

Publication number Publication date
WO2012009911A1 (en) 2012-01-26
CN101917282B (en) 2014-12-17

Similar Documents

Publication Publication Date Title
CN109254733B (en) Method, device and system for storing data
JP5427640B2 (en) Decision tree generation apparatus, decision tree generation method, and program
KR101617696B1 (en) Method and device for mining data regular expression
CN111324577B (en) Yml file reading and writing method and device
CN104636084B (en) A kind of apparatus and method of the large data of electric power being carried out to distributed store
CN107611962B (en) Power grid system branch searching method and system and electronic equipment
US11314830B2 (en) Method and apparatus for automatically discovering gas station POI, storage medium and device
JP2009099124A (en) Method and system for data construction
CN101917282B (en) Method, device and system for processing alarm shielding rules
CN106844089A (en) A kind of method and apparatus for recovering tree data storage
CN103399888A (en) Differential synchronization method and system for power grid model data
US20160301572A1 (en) Communication control device, communication control method, and computer program product
CN109828965B (en) Data processing method and electronic equipment
CN109768878B (en) Network work order calculation method and device based on big data
CN109993390A (en) Alarm association and worksheet processing optimization method, device, equipment and medium
CN114239237A (en) Power distribution network simulation scene generation system and method supporting digital twinning
CN113157904A (en) Sensitive word filtering method and system based on DFA algorithm
CN107292049A (en) A kind of Design of Simulation System method based on ICD data flows
CN108460055B (en) Method, system, equipment and storage medium for exporting excel data table
CN109861846A (en) Using call relation acquisition methods, system and storage medium
CN113297274B (en) Signing data query method and system
CN111104247A (en) Method, apparatus and computer program product for managing data replication
CN115344538A (en) Log processing method, device and equipment and readable storage medium
CN104735097A (en) Information collecting method and system
CN111159273B (en) Data stream processing method, device, server and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20141217

Termination date: 20190720