CN101917282B - Method, device and system for processing alarm shielding rules - Google Patents

Method, device and system for processing alarm shielding rules Download PDF

Info

Publication number
CN101917282B
CN101917282B CN201010233571.1A CN201010233571A CN101917282B CN 101917282 B CN101917282 B CN 101917282B CN 201010233571 A CN201010233571 A CN 201010233571A CN 101917282 B CN101917282 B CN 101917282B
Authority
CN
China
Prior art keywords
shielding rules
alarm
rules
management equipment
alarm shielding
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201010233571.1A
Other languages
Chinese (zh)
Other versions
CN101917282A (en
Inventor
刘伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201010233571.1A priority Critical patent/CN101917282B/en
Priority to PCT/CN2010/078923 priority patent/WO2012009911A1/en
Publication of CN101917282A publication Critical patent/CN101917282A/en
Application granted granted Critical
Publication of CN101917282B publication Critical patent/CN101917282B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0604Management of faults, events, alarms or notifications using filtering, e.g. reduction of information by using priority, element types, position or time

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses a method, a device and a system for processing alarm shielding rules, which are used for reducing the processing complexity of the alarm shielding rules and increasing efficiency. The method comprises the following steps of: acquiring a first alarm shielding rule which is preset locally and recorded in a tree structure and a second alarm shielding rule which is preset for at least one network management equipment and recorded in the tree structure from the at least one network management equipment by network management equipment; converting the first alarm shielding rule and the second alarm shielding rule into a first group of alarm shielding rules and a second group of alarm shielding rules which are recorded in a linear structure respectively; and comparing the first group of alarm shielding rules with the second group of alarm shielding rules to obtain shielding rule increment. Thus, the method, the device and the system reduce the comparison complexity of the alarm shielding rules and increase the efficiency on the premise of saving unnecessary message transmission and ensuring the setting correctness of the shielding rules; meanwhile, the invention discloses the device and the system for processing the alarm shielding rules.

Description

A kind of processing method of alarm shielding rules, Apparatus and system
Technical field
The present invention relates to the communications field, particularly relate to a kind of processing method of alarm shielding rules, Apparatus and system.
Background technology
Alarm management is one of critical function of modern network management system (abbreviation webmaster), alarm management arranges two parts by alarm display and alarm and forms, and alarm shield is one of function of complexity the most in alarm setting unit, there is irreplaceable effect.So-called alarm shield refers to that user is arranged by the alarm item that graphic user interface is all to management equipment, and user can shield any alarm item, makes the alarm item after shielding not produce alarm.
Telecommunication apparatus take network element as base unit, shown in accompanying drawings 1, each network element can assign polylith veneer, every block veneer there is multiple port, logic port (as logic ports such as FTP, CTP) also may be comprised in each port, that is telecommunication apparatus is made up of resources such as veneer, port, logic ports, includes multiple test point under each resource, and under each test point, include multiple alarm item.Generally, equipment cannot support directly to describe the tree relation of above-mentioned resource-test point-alarm item by the mode of order line, can only issue complicated rule to reach the object of alarm shield by webmaster.
As shown in the above, need to use resource to the description of alarm shielding rules, test point, alarm item three elements, and between these three elements, there is certain hierarchical relationship, user may select multiple resource when arranging alarm shield, multiple test point can be selected again under each resource, and multiple alarm item can be selected to shield for each test point, Network Management Equipment is a message comprising tree data structure to the description of this kind of hierarchical structure, management equipment is then this tree relation is split as many records to preserve respectively.Such as, user selects m resource, n test point is included in each resource, and have j alarm item to each test point, Network Management Equipment preserves this hierarchical structure by generating a message, after this message is issued to management equipment by Network Management Equipment, management equipment is split as m × n × j bar alarm shielding rules and preserves.
Network Management Equipment issues alarm shielding rules to management equipment can take following methods: first transmitting order to lower levels removes the whole alarm shielding rules in management equipment, then issues the alarm shielding rules of user's setting to management equipment.The method realizes simple, but for the alarm shield item originally arranged, the shielding rules re-issuing this alarm item is needed when resetting again after removing, cause having issued a lot of unnecessary message, and this alarm may be caused to produce when cleared alarm shielding rules, and then shielding is arranged to this alarm item, this alarm can be made to disappear, the easy like this user of making produces doubt, is unfavorable for the experience of user.
Another kind method is the first alarm shielding rules that arranged of searching and managing equipment, then the alarm shielding rules arranged with user compares, remove in management equipment and shielding has been set but this alarm item do not arranged of user, the newly-installed alarm item of shielding user, before and after arranging for user, constant alarm item does not issue shielding rules, and only issue alarm shielding rules front and back being set and changing to some extent, like this, do not need to issue unnecessary message, but the method is when comparing the alarm shielding rules of Network Management Equipment and management equipment, compare two groups of multiple trees, need the node first navigating to two same grades of tree when comparing at every turn, again the node of this grade is compared, need all nodes comparing tree, realize very complicated.
Summary of the invention
The invention provides a kind of processing method of alarm shielding rules, Apparatus and system, in order to while saving downward message, guarantee shielding correctness, reduce the complexity that alarm shielding rules compares, raise the efficiency.
The concrete technical scheme that the embodiment of the present invention provides is as follows:
A processing method for alarm shielding rules, comprising:
Network Management Equipment obtains the first alarm shielding rules of the local employing tree record preset, and obtains the second alarm shielding rules of the employing tree record preset for this at least one management equipment from least one management equipment;
Described first alarm shielding rules and the second alarm shielding rules are converted to respectively the first group of alarm shielding rules and second group of alarm shielding rules that adopt linear structure record;
Described first group of alarm shielding rules and second group of alarm shielding rules are compared, obtains shielding rules increment.
A processing unit for alarm shielding rules, comprising:
First processing unit, obtain the first alarm shielding rules of the local employing tree record preset for Network Management Equipment, and obtain the second alarm shielding rules of the employing tree record preset for this at least one management equipment from least one management equipment;
Second processing unit, for being converted to the first group of alarm shielding rules and second group of alarm shielding rules that adopt linear structure record respectively by described first alarm shielding rules and the second alarm shielding rules;
3rd processing unit, for described first group of alarm shielding rules and described second group of alarm shielding rules being compared, obtains shielding rules increment.
A kind of alarm shielding rules treatment system, comprising:
Alarm shielding rules processing unit, the first alarm shielding rules of the local employing tree record preset is obtained for Network Management Equipment, and the second alarm regulation of the employing tree record preset for this at least one management equipment is obtained from least one management equipment, described first alarm shielding rules and the second alarm shielding rules are converted to respectively the first group of alarm shielding rules and second group of alarm shielding rules that adopt linear structure record, and described first group of alarm shielding rules and described second group of alarm shielding rules are compared, obtain shielding rules increment, and issue described shielding rules increment,
Management equipment, for receiving the described shielding rules increment that described alarm shielding rules processing unit issues, and according to the alarm shielding rules of this shielding rules incremental update this locality.
Based on technique scheme, in the embodiment of the present invention, the alarm shielding rules of tree record is converted to the alarm shielding rules of linear structure by Network Management Equipment, again for Network Management Equipment and management equipment adopting the alarm shielding rules of linear structure record compare, thus be converted to comparing two groups of multiple trees the data comparing two groups of multiple linear structures, greatly reduce the complexity compared, improve efficiency, and obtain shielding rules increment after the comparison, Network Management Equipment only issues this shielding rules increment when issuing shielding rules, the alarm item arranging front and back shielding rules constant for user does not issue shielding rules, thus under the prerequisite not affecting the correctness that shielding rules is arranged, save the message issued.
Accompanying drawing explanation
Fig. 1 is management equipment alarm item distributed architecture figure;
Fig. 2 is the treatment system Organization Chart of alarm shielding rules in the embodiment of the present invention;
Fig. 3 is alarm shielding rules processing unit structure chart in the embodiment of the present invention;
Fig. 4 is to the detail flowchart that the alarm shielding rules of management equipment is arranged in the embodiment of the present invention;
Fig. 5 is the detail flowchart of alarm shielding rules process in the embodiment of the present invention.
Embodiment
In order to reduce the complexity that alarm shielding rules is arranged, raising the efficiency, in the embodiment of the present invention, providing a kind of processing method of alarm shielding rules, can under guarantee shielding arranges the prerequisite of correctness, save the message issued, and reduce the complexity of alarm shielding rules setting, raise the efficiency.The method is: Network Management Equipment obtains the first alarm shielding rules of the local employing tree record preset, and the second alarm shielding rules of the employing tree record preset for this management equipment is obtained from management equipment, and above-mentioned first alarm shielding rules and above-mentioned second alarm shielding rules are converted to respectively the first group of alarm shielding rules and second group of alarm shielding rules that adopt linear structure record, first group of alarm shielding rules and second group of alarm shielding rules are compared, obtains shielding rules increment.
The shielding item that above-mentioned shielding rules increment changes before and after being characterized by and arranging to some extent, this shielding rules increment comprises removes shielding rules and newly-increased shielding rules, wherein, remove shielding rules and refer to shielding rules management equipment needing remove, newly-increased shielding rules refers to shielding rules management equipment needing increase newly.
Below in conjunction with accompanying drawing, the preferred embodiment of the present invention is described in detail.
Accompanying drawings 2, in the embodiment of the present invention, the treatment system of alarm shielding rules mainly comprises alarm shielding rules processing unit 20 and management equipment 21, wherein,
Alarm shielding rules processing unit 20, for obtaining the first alarm shielding rules of the employing tree record that Network Management Equipment this locality is preset, and the second alarm regulation of the employing tree record preset for this at least one management equipment 21 is obtained from least one management equipment 21, described first alarm shielding rules and the second alarm shielding rules are converted to respectively the first group of alarm shielding rules and second group of alarm shielding rules that adopt linear structure record, and described first group of alarm shielding rules and described second group of alarm shielding rules are compared, obtain shielding rules increment, and issue described shielding rules increment,
Management equipment 21, for the described shielding rules increment that receiving alarm shielding rules processing unit 20 issues, and according to the alarm shielding rules of this shielding rules incremental update this locality.
Accompanying drawings 3, in the embodiment of the present invention, alarm shielding rules processing unit 20 mainly comprises following processing unit:
First processing unit 201, obtain the first alarm shielding rules of the local employing tree record preset for Network Management Equipment, and obtain the second alarm shielding rules of the employing tree record preset for this at least one management equipment from least one management equipment;
Second processing unit 202, for being converted to the first group of alarm shielding rules and second group of alarm shielding rules that adopt linear structure record respectively by above-mentioned first alarm shielding rules and the second alarm shielding rules;
3rd processing unit 203, for above-mentioned first group of alarm shielding rules and above-mentioned second group of alarm shielding rules being compared, obtains shielding rules increment.
Shown in accompanying drawings 4, in the embodiment of the present invention, the detailed process arranged the alarm shielding rules of management equipment is as follows:
Step 401: the alarm shielding rules on searching and managing equipment, and judge whether this management equipment exists alarm shielding rules, namely judge whether management equipment exists the alarm item that shielding has been set, if there is not alarm shielding rules in this management equipment, the alarm shielding rules that user on Network Management Equipment is arranged is converted to newly-increased shielding rules, this newly-increased shielding rules is shielding rules increment, performs step 404; Otherwise there is alarm shielding rules in above-mentioned management equipment, read the alarm shielding rules of this management equipment, and be kept in the tree data structure defined in Network Management Equipment, to be converted to the alarm shielding rules of tree, perform step 402.
Wherein, the tree data structure defined in Network Management Equipment is for preserving alarm shielding rules, alarm shielding rules in management equipment is that the form splitting into many is kept in the database of above-mentioned management equipment respectively, after Network Management Equipment reads the alarm shielding rules in above-mentioned management equipment, be stored in tree data structure by this alarm shielding rules, the alarm shielding rules forming tree is kept at webmaster side.
Step 402: judge whether there is shielding item in the alarm shielding rules that on Network Management Equipment, user is arranged, if do not existed, alarm shielding rules in management equipment is converted to removing shielding rules, and this removing shielding rules is shielding rules increment, performs step 404; Otherwise there is shielding item in the alarm shielding rules that on Network Management Equipment, user is arranged, perform comparison step 403.
Step 403: compared by the alarm shielding rules of the alarm shielding rules of Network Management Equipment and the management equipment of acquisition, obtains shielding rules increment.
Step 404: give above-mentioned management equipment, according to the alarm shielding rules of the above-mentioned management equipment of this shielding rules incremental update by above-mentioned shielding rules incremental distribution.
Wherein, issue above-mentioned shielding rules increment to above-mentioned management equipment, for the removing shielding rules in shielding rules increment, removing process is done to shielding item corresponding in this management equipment, and for the newly-increased shielding rules in shielding rules increment, shielding is arranged to shielding item corresponding in this management equipment.
Based on said system framework, accompanying drawings 5, in the embodiment of the present invention, realizes the detailed process that step 403 alarm shielding rules compares as follows:
Step 501: Network Management Equipment obtains the first alarm shielding rules of the local employing tree record preset, and obtains the second alarm shielding rules of the employing tree record preset for this at least one management equipment from least one management equipment.
Step 502: the second alarm shielding rules of the employing tree record that the first alarm shielding rules of the employing tree record preset Network Management Equipment this locality and above-mentioned management equipment are preset, is converted to first group of alarm shielding rules and second group of alarm shielding rules of linear structure respectively.
The process alarm shielding rules of tree being converted to linear structure alarm shielding rules is: travel through the data of each node in the alarm shielding rules of above-mentioned employing tree record and record this data, above-mentioned node is root node, child node or leafy node; Often traversing a leafy node, will be the data of a linear structure from root node to the data assemblies of all nodes on this leafy node path, the alarm shielding rules of the corresponding strip adoption linear structure record of data of this linear structure; The alarm shielding rules of all employing linear structure records obtained is formed one group of alarm shielding rules.
More preferably, this linear structure adopts the form of character string, alarm shielding rules by tree is converted to the form of multiple character string, wherein, a character string represents an alarm shielding rules, according to user, demand is set, alarm shielding rules can be arranged for resource, test point or alarm item, the leafy node of corresponding tree alarm shielding rules is resource, test point or alarm item, and the character string being converted to linear structure can be made up of the one or more information in resource, test point or alarm item.If alarm shielding rules arranges for alarm item, then root node is resource, and child node is test point, leafy node is alarm item, each character string is made up of resource, test point, alarm item, therebetween with CSV, is the most fine-grained alarm shielding rules.
Such as, user, when arranging shielding rules, needs all alarm items of test point 1 correspondence under resource 1 to shield, at this moment, to the character string of shielding rules resource 1 and test point 1 should only can be comprised, represent and shielding is arranged to all alarm items under test point 1; And for example, user, when arranging shielding rules, needs the alarm item 1 of test point 1 correspondence under resource 1 to shield, then to the character string of shielding rules comprising resource 1, test point 1, alarm item 1, be the most fine-grained alarm shielding rules.
Step 503: second group of alarm shielding rules of first group of alarm shielding rules of the more above-mentioned linear structure for Network Management Equipment and the linear structure for management equipment, obtains shielding rules increment.
Wherein, shielding rules increment comprises removes shielding rules and newly-increased shielding rules, removes shielding rules and is characterized by shielding rules management equipment needing remove, and newly-increased shielding rules is characterized by the newly-increased shielding rules that management equipment needs.
Preferably, when comparing first group of alarm shield of Network Management Equipment linear structure and second group of alarm shielding rules of management equipment linear structure, be as the criterion with first of management equipment group of alarm shielding rules, second group of alarm shielding rules of traversal Network Management Equipment linear structure, by not comprising in Network Management Equipment first group of alarm shielding rules more afterwards, and the alarm item comprised in second of management equipment group of alarm shielding rules, as removing shielding rules, so that the shielding of alarm item corresponding in management equipment is arranged removing.In like manner, be as the criterion with second of Network Management Equipment group of alarm shielding rules, first group of alarm shielding rules of traversal management equipment, by not comprising in second of management equipment group of alarm shielding rules more afterwards, and the alarm item comprised in first of Network Management Equipment group of alarm shielding rules, as newly-increased shielding rules, to arrange shielding to alarm item corresponding in management equipment.
Such as, the alarm shielding rules that management equipment is preserved is A, B, C, the alarm shielding rules that user is this time arranged on Network Management Equipment is B, C, D, wherein, A, B, C, D are alarm item, are first as the criterion with the alarm shielding rules in management equipment, the alarm shielding rules on traversal Network Management Equipment, find that Network Management Equipment does not exist alarm shielding rules A, then using A as removing shielding rules; Secondly, be as the criterion with the alarm shielding rules on Network Management Equipment, alarm shielding rules in traversal management equipment, find that management equipment does not exist alarm shielding rules D, then using D as newly-increased shielding rules, have B, C in alarm shielding rules on management equipment and Network Management Equipment, then the alarm item that B, C are corresponding is constant before and after arranging, and will remove shielding rules A and newly-increased shielding rules D as shielding rules increment.
First the process of the linear structure alarm shielding rules in above-mentioned steps 502, the alarm shielding rules of tree being converted to character string forms is illustrated.
Example 1, the alarm mask data structure defined in Network Management Equipment is as follows:
AlarmSurvSetList-T::=SEQUENCE?OF?AlarmSurvSet-T
AlarmSurvSet-T::=SEQUENCE{
ResName NamingAttributes-T resource
SurvSet LayeredProbableCauseList-T test point-alarm item corresponding relation list
}
LayeredProbableCauseList-T::=SEQUENCE?OF?LayeredProbableCause-T
LayeredProbableCause-T::=SEQUENCE{
LayerRate LayerRate-T, test point
The list of probableCauseList ProbableCauseList-T alarm item
}
ProbableCauseList-T::=SEQUENCE?OF?ProbableCause-T
Wherein, an AlarmSurvSetList-T represents a series of alarm shielding rules under a resource, resName represents a resource (veneer in management equipment, port or logic port), survSet represents the corresponding relation of a series of test points-alarm item under this resource, layerRate represents the title of test point, probableCauseList represents the alarm item list under test point, suppose there are 2 test points under name is called the resource of resName1, be respectively layerRate1, layerRate2, 2 alarm items are had again under each test point, the alarm item that test point layerRate1 is corresponding is ProbableCause1, ProbableCause2, the alarm item that test point layerRate2 is corresponding is ProbableCause3, ProbableCause4, travel through each node of this tree, can be exchanged into 4 character strings, be respectively { resName1, layerRate1, ProbableCause1}, { resName1, layerRate1, ProbableCause2}, { resName1, layerRate2, ProbableCause3}, { resName1, layerRate2, ProbableCause4}, wherein, each character string represents a shielding rules.
In above-mentioned example 1, tree is converted on the basis of the linear structure of character string forms, the process of the alarm shielding rules comparing Network Management Equipment and management equipment in step 503 is illustrated.
Example 2, suppose that the shielding rules of management equipment obtained is arrange shielding to the ProbableCause1 in the test point layerRate1 of resource resName1, and the shielding rules that user resets on Network Management Equipment is, shielding is arranged to the ProbableCause2 in the test point layerRate1 of resource resName1 and the ProbableCause4 in test point layerRate2.The shielding rules of management equipment is converted to the character string of linear structure for { resName1, layerRate1, ProbableCause1}, the shielding rules that user on webmaster is arranged is converted to the character string of linear structure for { resName1, layerRate1, ProbableCause2}, { resName1, layerRate2, ProbableCause4}.On a character string in the shielding rules of the linear structure of extract management equipment and Network Management Equipment the linear structure that user is arranged shielding rules in each character string compare, by character string { resName1, layerRate1, ProbableCause1} compares with all character strings of expression Network Management Equipment shielding rules, find more afterwards not comprise character string { resName1 in the character string of expression Network Management Equipment shielding rules, layerRate1, ProbableCause1}, then by character string { resName1, layerRate1, the shielding rules that ProbableCause1} represents is as removing shielding rules, the all character strings of each character string represented in the character string of Network Management Equipment shielding rules with expression management equipment shielding rules are compared, by the character string { resName1 in Network Management Equipment shielding rules, layerRate1, ProbableCause2} compares with all character strings of expression management equipment shielding rules, again by the character string { resName1 in Network Management Equipment shielding rules, layerRate2, ProbableCause4} compares with all character strings of expression management equipment shielding rules, after find, { resName1 in Network Management Equipment shielding rules, layerRate1, ProbableCause2}, { resName1, layerRate2, ProbableCause4} character string does not exist in the character string representing management equipment shielding rules, then by shielding rules { resName1, layerRate1, ProbableCause2}, { resName1, layerRate2, ProbableCause4} is as newly-increased shielding rules.
Based on above-described embodiment, by the alarm shielding rules of the employing tree data structure record that user presets on Network Management Equipment, and the alarm shielding rules arranged in management equipment of tree data structure record is used in webmaster side, be converted to the linear structure of character string forms respectively, again the shielding rules of two linear structures is compared, essence is converted to compare two groups of character strings, be converted to compare two groups of many character strings by comparing two groups of multiple tree data structures, thus greatly reduce the complexity compared, improve efficiency.Simultaneously, obtain shielding rules increment more afterwards, webmaster only issues this shielding rules increment when issuing shielding rules, the alarm item arranging front and back shielding rules constant for user does not issue shielding rules, thus save issuing of unnecessary message, can ensure again to shield the correctness arranged.
In sum, adopt the alarm shielding rules processing method in the embodiment of the present invention, achieve under saving downward message, guarantee shielding arrange the prerequisite of correctness, reduce the complexity that alarm shielding rules compares, improve efficiency.
Obviously, those skilled in the art can carry out various change and modification to the present invention and not depart from the spirit and scope of the present invention.Like this, if these amendments of the present invention and modification belong within the scope of the claims in the present invention and equivalent technologies thereof, then the present invention is also intended to comprise these change and modification.

Claims (7)

1. a processing method for alarm shielding rules, is characterized in that, comprising:
Network Management Equipment obtains the first alarm shielding rules of the local employing tree record preset, and obtains the second alarm shielding rules of the employing tree record preset for this at least one management equipment from least one management equipment;
Described first alarm shielding rules and the second alarm shielding rules are converted to respectively the first group of alarm shielding rules and second group of alarm shielding rules that adopt linear structure record, described linear structure is the form of character string, described character string is made up of resource, test point, alarm item, and a character string represents an alarm shielding rules;
Described first group of alarm shielding rules and second group of alarm shielding rules are compared, obtains shielding rules increment;
Issue described shielding rules increment to described management equipment, by described management equipment according to this shielding rules incremental update alarm shielding rules.
2. the method for claim 1, is characterized in that, will the alarm shielding rules of tree record be adopted to be converted to the one group of alarm shielding rules adopting linear structure record, comprising:
Travel through the data of each node in the alarm shielding rules of described employing tree record and record this data, described node is root node, child node or leafy node;
Often traversing a leafy node, will be the data of a linear structure from root node to the data assemblies of all nodes on this leafy node path, the alarm shielding rules of the corresponding strip adoption linear structure record of data of this linear structure;
The alarm shielding rules of all employing linear structure records obtained is formed one group of alarm shielding rules.
3. the method for claim 1, is characterized in that, described shielding rules increment is characterized by the shielding rules described management equipment needing the shielding rules of removing and described management equipment need increase newly.
4. a processing unit for alarm shielding rules, is characterized in that, comprising:
First processing unit, obtain the first alarm shielding rules of the local employing tree record preset for Network Management Equipment, and obtain the second alarm shielding rules of the employing tree record preset for this at least one management equipment from least one management equipment;
Second processing unit, for described first alarm shielding rules and the second alarm shielding rules being converted to respectively the first group of alarm shielding rules and second group of alarm shielding rules that adopt linear structure record, described linear structure is the form of character string, described character string is made up of resource, test point, alarm item, and a character string represents an alarm shielding rules;
3rd processing unit, for described first group of alarm shielding rules and described second group of alarm shielding rules are compared, obtain shielding rules increment, issue described shielding rules increment to described management equipment, by described management equipment according to this shielding rules incremental update alarm shielding rules.
5. device as claimed in claim 4, is characterized in that, when the alarm shielding rules of employing tree record is converted to the one group of alarm shielding rules adopting linear structure record by described second processing unit,
Travel through the data of each node in the alarm shielding rules of described employing tree record and record this data, described node is root node, child node or leafy node;
Often traversing a leafy node, will be the data of a linear structure from root node to the data assemblies of all nodes on this leafy node path, the alarm shielding rules of the corresponding strip adoption linear structure record of data of this linear structure;
The alarm shielding rules of all employing linear structure records obtained is formed one group of alarm shielding rules.
6. device as claimed in claim 4, is characterized in that, the described shielding rules increment that described 3rd processing unit obtains is characterized by the shielding rules described management equipment needing the shielding rules of removing and described management equipment need increase newly.
7. an alarm shielding rules treatment system, is characterized in that, comprising:
Alarm shielding rules processing unit, the first alarm shielding rules of the local employing tree record preset is obtained for Network Management Equipment, and the second alarm regulation of the employing tree record preset for this at least one management equipment is obtained from least one management equipment, described first alarm shielding rules and the second alarm shielding rules are converted to respectively the first group of alarm shielding rules and second group of alarm shielding rules that adopt linear structure record, described linear structure is the form of character string, described character string is by resource, test point, alarm item forms, article one, character string represents an alarm shielding rules, and described first group of alarm shielding rules and described second group of alarm shielding rules are compared, obtain shielding rules increment, and issue described shielding rules increment,
Management equipment, for receiving the described shielding rules increment that described alarm shielding rules processing unit issues, and according to the alarm shielding rules of this shielding rules incremental update this locality.
CN201010233571.1A 2010-07-20 2010-07-20 Method, device and system for processing alarm shielding rules Expired - Fee Related CN101917282B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201010233571.1A CN101917282B (en) 2010-07-20 2010-07-20 Method, device and system for processing alarm shielding rules
PCT/CN2010/078923 WO2012009911A1 (en) 2010-07-20 2010-11-19 Method, apparatus and system for processing alarm screening rule

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201010233571.1A CN101917282B (en) 2010-07-20 2010-07-20 Method, device and system for processing alarm shielding rules

Publications (2)

Publication Number Publication Date
CN101917282A CN101917282A (en) 2010-12-15
CN101917282B true CN101917282B (en) 2014-12-17

Family

ID=43324679

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201010233571.1A Expired - Fee Related CN101917282B (en) 2010-07-20 2010-07-20 Method, device and system for processing alarm shielding rules

Country Status (2)

Country Link
CN (1) CN101917282B (en)
WO (1) WO2012009911A1 (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11171851B2 (en) 2014-01-28 2021-11-09 Hewlett Packard Enterprise Development Lp Group alert in server systems
CN106326262A (en) * 2015-06-29 2017-01-11 中兴通讯股份有限公司 Alarm inquiry method and device, and optical transmission network management system
CN110213207B (en) * 2018-05-07 2021-12-28 腾讯科技(深圳)有限公司 Network security defense method and equipment based on log analysis
CN113055213B (en) * 2019-12-27 2024-05-28 中兴通讯股份有限公司 Alarm information management method, alarm information management system and server
CN114448774B (en) * 2021-12-16 2023-12-05 武汉光迅科技股份有限公司 Alarm processing method, device and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1581170A (en) * 2003-08-15 2005-02-16 国际商业机器公司 Method and system for comparing files of two computers
CN101106477A (en) * 2006-07-12 2008-01-16 中兴通讯股份有限公司 Method for generating incremental data based on flow number

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1581170A (en) * 2003-08-15 2005-02-16 国际商业机器公司 Method and system for comparing files of two computers
CN101106477A (en) * 2006-07-12 2008-01-16 中兴通讯股份有限公司 Method for generating incremental data based on flow number

Also Published As

Publication number Publication date
CN101917282A (en) 2010-12-15
WO2012009911A1 (en) 2012-01-26

Similar Documents

Publication Publication Date Title
CN101266610B (en) Web active user website accessing mode on-line excavation method
CN101917282B (en) Method, device and system for processing alarm shielding rules
JP5092165B2 (en) Data construction method and system
CN109150640A (en) A kind of method for discovering network topology and system based on double layer network agreement
US20230362251A1 (en) Method and apparatus for managing iot device, and server and storage medium thereof
CN106815409B (en) Analysis method of power grid topological relation
CN103399888B (en) The differential synchronization method of grid model data and system
CN1980144A (en) Method for quickly configurating large data-quantity network management data
CN106844089A (en) A kind of method and apparatus for recovering tree data storage
CN104660447B (en) A kind of management method of SNMP nodal informations and management system
CN110795093B (en) Interactive view generation method and device
CN102857949A (en) Method and device for planning data consistency guarantees
CN105787090A (en) Index building method and system of OLAP system of electric data
CN113190947A (en) Feed line group dividing method and device
CN107239568B (en) Distributed index implementation method and device
CN109617746B (en) SCD network configuration verification method based on SPCD file
CN111475602A (en) Multi-version knowledge graph storage method and device, storage medium and electronic equipment
CN113486012B (en) Optical cable data model processing system for comprehensive network maintenance management
CN110532260B (en) Logic expression storage and reading method and device, electronic equipment and medium
CN108173688A (en) A kind of management method of the networking configuration content based on tree and version number
KR101927689B1 (en) Method for processing of cim network diagram
KR20080008573A (en) Method for extracting association rule from xml data
CN103577406B (en) A kind of method and device managing unstructured data
CN104951557B (en) The system and method upgraded based on tree structure to administrative division resource
CN107592207B (en) Network management service data management method and network management service data management device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20141217

Termination date: 20190720

CF01 Termination of patent right due to non-payment of annual fee