CN102857357A - Method and device for implementing network management configuration - Google Patents

Method and device for implementing network management configuration Download PDF

Info

Publication number
CN102857357A
CN102857357A CN2011101797296A CN201110179729A CN102857357A CN 102857357 A CN102857357 A CN 102857357A CN 2011101797296 A CN2011101797296 A CN 2011101797296A CN 201110179729 A CN201110179729 A CN 201110179729A CN 102857357 A CN102857357 A CN 102857357A
Authority
CN
China
Prior art keywords
subfunction
configuration data
carried out
transaction
submodule
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2011101797296A
Other languages
Chinese (zh)
Other versions
CN102857357B (en
Inventor
张敦华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201110179729.6A priority Critical patent/CN102857357B/en
Publication of CN102857357A publication Critical patent/CN102857357A/en
Application granted granted Critical
Publication of CN102857357B publication Critical patent/CN102857357B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention provides a method and a device for implementing network management configuration, and aims to solve the problem that existing network management configuration is complicated in implementing, high in workload of development and maintenance, easy to be failed, and hard to meet variable requirements of operators. The method includes receiving configuration data which are based on service attribute of a service and input by a user; receiving a configuration command for configuring the service attribute according to the configuration data; starting a database transaction and executing a service binding function to the configuration data in the database transaction; submitting the database transaction if the function is executed successfully; and rolling back the database transaction if the function is failed. By the method and the device, complicated configuration logic can be clear, correlation among service logics is less, and the service logics are easy to maintain.

Description

A kind of implementation method of network management configuration and implement device
Technical field
The present invention relates to the network management technology field, particularly a kind of implementation method of network management configuration and implement device.
Background technology
Existing network management configuration function is defined as configuration data one by one allocation list usually, uses the relational data library storage, and the constraint logic of configuration and related operation all use the mode of hard coded to leave in the code, and finally utilizes database to realize persistence.Because the network management configuration functions of modules is complicated, changes in demand is many, and this causes the service logic of hard coded to become increasingly complex, and is interweaved together, and the later maintenance workload is made mistakes very greatly and easily.Such as finish the whole configuration data of a base station, may need hundreds of to open the page, each page has tens fields, the additions and deletions of each field of the inside change and will be configured one by one, well imagine that workload is very huge, particularly configuration data is understood the frequent variations because base station functions increases, and this causes the developer will ceaselessly safeguard the code of these configuration service logics.
As seen, the implementation procedure of existing network management configuration is complicated, and the development and maintenance workload is made mistakes greatly and easily, and is difficult to satisfy the demand that operator constantly changes.
Summary of the invention
The embodiment of the invention provides a kind of implementation method and implement device of network management configuration, and complicated in order to the implementation procedure that solves existing network management configuration, the development and maintenance workload is made mistakes greatly and easily, and is difficult to satisfy the constantly problem of the demand of variation of operator.
The embodiment of the invention provides a kind of implementation method of network management configuration, comprising:
Receive the user for the configuration data of the service attribute input of a business;
Reception utilizes described configuration data to dispose the configuration order of described service attribute;
Open a db transaction, in described db transaction, described configuration data is carried out function with described business-binding;
When described function runs succeeded, submit described db transaction to; When described function is carried out unsuccessfully, the described db transaction of rollback.
Wherein, described function comprises a plurality of subfunctions;
Described when described function runs succeeded, submit described db transaction to; When described function was carried out unsuccessfully, the described db transaction of rollback was specially:
When described a plurality of subfunctions all run succeeded, submit described db transaction to; When any subfunction is carried out unsuccessfully in described a plurality of subfunctions, the described db transaction of rollback.
Described a plurality of subfunction comprises:
Carry out secure authentication and mutually exclusive authentication the first subfunction, to configuration data carry out legitimate verification the second subfunction, with configuration data write the 3rd subfunction of configuration database, the 4th subfunction that the related data of configuration data are processed and the 5th subfunction of log and reported event.
The described function of in described db transaction described configuration data being carried out with described business-binding is specially:
In described db transaction, described configuration data is carried out described the first subfunction;
When the result who described configuration data is carried out described the first subfunction is described configuration data during by secure authentication and mutually exclusive authentication, described configuration data is carried out described the second subfunction;
When the result who described configuration data is carried out described the second subfunction is described configuration data when legal, described configuration data is carried out described the 3rd subfunction;
After described the 3rd subfunction runs succeeded, described configuration data is carried out described the 4th subfunction;
After described the 4th subfunction runs succeeded, described configuration data is carried out described the 5th subfunction.
Describedly described configuration data carried out described the 4th subfunction be specially:
To described the second subfunction of the nested execution of related data, the 3rd subfunction and the 4th subfunction of described configuration data, until handle all related data of described configuration data.
The embodiment of the invention provides a kind of implement device of network management configuration, comprising:
Business Entity is used for receiving the user for the configuration data of the service attribute input of a business;
The order receiver module is used for receiving and utilizes described configuration data to dispose the configuration order of described service attribute;
The affairs opening module is used for opening a db transaction after described order receiver module receives described configuration order, in described db transaction described configuration data is carried out and the function of described business-binding;
Affairs are submitted module to, are used for submitting described db transaction to when described function runs succeeded;
The transaction rollback module is used for when described function is carried out unsuccessfully the described db transaction of rollback.
Wherein, described affairs are submitted module to, also can be used for comprising a plurality of subfunctions, when described a plurality of subfunctions all run succeeded, submitting described db transaction to when described function;
Described transaction rollback module also can be used for when described function comprises that any subfunction is carried out unsuccessfully in a plurality of subfunctions, the described a plurality of subfunctions the described db transaction of rollback.
Described affairs opening module comprises:
The business description submodule, be used for storing the business description of described a plurality of subfunctions, described a plurality of subfunctions comprise: carry out secure authentication and mutually exclusive authentication the first subfunction, to configuration data carry out legitimate verification the second subfunction, with configuration data write the 3rd subfunction of configuration database, the 4th subfunction that the related data of configuration data are processed and the 5th subfunction of log and reported event.
Described affairs opening module also can comprise:
Open submodule, be used for after described order receiver module receives described configuration order, opening a db transaction;
First monitors submodule, is used for after described unlatching submodule is opened described db transaction, sends the first triggering command to described business description submodule;
Described business description submodule also is used in when receiving described the first triggering command, in described db transaction described configuration data is carried out described the first subfunction;
Second monitors submodule, be used for when the result who described configuration data is carried out described the first subfunction be described configuration data during by secure authentication and mutually exclusive authentication, send the second triggering command to described business description submodule;
Described business description submodule, also be used in when receiving described the second triggering command, described configuration data is carried out described the second subfunction, and when the result who described configuration data is carried out described the second subfunction be described configuration data when legal, described configuration data is carried out described the 3rd subfunction;
The 3rd monitors submodule, is used for after described the 3rd subfunction runs succeeded, and sends the 3rd triggering command to described business description submodule;
Described business description submodule also is used in when receiving described the 3rd triggering command, and described configuration data is carried out described the 4th subfunction;
The 4th monitors submodule, is used for after described the 4th subfunction runs succeeded, and sends the 4th triggering command to described business description submodule;
Described business description submodule also is used in when receiving described the 4th triggering command, and described configuration data is carried out described the 5th subfunction.
Described business description submodule also can be used for described the second subfunction of the nested execution of related data, the 3rd subfunction and the 4th subfunction to described configuration data, until handle all related data of described configuration data.
When the technical scheme of utilizing the embodiment of the invention to provide is carried out network management configuration, to be packaged in the db transaction for the configuration order of the service attribute of a business, in db transaction, configuration data is carried out function with this business-binding, submission and the rollback of the integrality fulfillment database affairs of usage data storehouse affairs, compared with prior art, this technical scheme makes complicated configuration logic orderliness more clear, and association seldom is easy to safeguard between the service logic.
Description of drawings
Fig. 1 is the implementation method flow chart of network management configuration in the embodiment of the invention;
Fig. 2 is the particular flow sheet of steps A 1-A5 in the embodiment of the invention;
Fig. 3 is the structural representation of a kind of implement device of network management configuration in the embodiment of the invention;
Fig. 4 is the structural representation of the implement device of another kind of network management configuration in the embodiment of the invention.
Embodiment
For technical problem, technical scheme and advantage that the embodiment of the invention will be solved is clearer, be described in detail below in conjunction with the accompanying drawings and the specific embodiments.
As shown in Figure 1, the embodiment of the invention provides a kind of implementation method of network management configuration, may further comprise the steps:
The configuration data that step S101, reception user input for the service attribute of a business.
Step S102, reception utilize the configuration order of configuration data configuration service attribute.
Configuration order can be inputted after having inputted configuration data by the user.
Step S103, open a db transaction, in db transaction, configuration data is carried out function with this business-binding.
Above-mentioned functions can comprise a plurality of subfunctions, and preferably, a plurality of subfunctions comprise following:
Carry out the first subfunction of secure authentication and mutually exclusive authentication; Wherein, whether secure authentication digital examination user has these configuration datas of limiting operation, and whether the mutually exclusive authentication digital examination is current only has a user these configuration datas of operation (usually not allowing many people to revise simultaneously a cover configuration data).
Configuration data is carried out the second subfunction of legitimate verification; Wherein, whether the input value of each field of configuration data being carried out legitimate verification digital examination configuration data is legal, and whether in the scope of certain regulation, such as scope is 0 to 100, if the configuration data of input is not 101 just right; Whether the field that must input is arranged for another example and the user does not input etc.
Configuration data is write the 3rd subfunction of configuration database.
Related data to configuration data are processed the 4th subfunction of (comprising increase, deletion or modification); Sometimes, revised certain configuration data, can cause the variation of other configuration data, otherwise data are exactly illegal.Such as making a data into 100, the b data just become 300 automatically so, are exactly 600 if a is 50, b; Create for another example the record of a cellular base station, so correspondingly can create in the lump the frame-saw groove data in the base station; When deletion, also be to delete in the lump.This is exactly the concept that the related data of configuration data are processed, if there is not related operation, the consistency of configuration data and integrality just can't be guaranteed, and this also is the groundwork of configuration service.
The 5th subfunction of log and reported event; Wherein, the log index will record the daily record of operation according to after finishing dealing with, and is used for the process of later stage tracking operation; The reporting events index will be with data through processing this advisory to other related system according to after finishing dealing with.
At this moment, as shown in Figure 2, in db transaction, the function of configuration data execution and business-binding is specially following steps A1-A5:
Steps A 1, in db transaction, configuration data is carried out the first subfunction.
Steps A 2, when the result who configuration data is carried out the first subfunction is configuration data during by secure authentication and mutually exclusive authentication (the first subfunction runs succeeded), configuration data is carried out the second subfunction.
And when the result who configuration data is carried out the first subfunction be configuration data (the first subfunction is carried out unsuccessfully), then rollback db transaction during not by secure authentication and mutually exclusive authentication.
Steps A 3, when the result who configuration data is carried out the second subfunction is configuration data when legal (the second subfunction runs succeeded), configuration data is carried out the 3rd subfunction.
And when the result who configuration data is carried out the second subfunction be configuration data (the second subfunction is carried out unsuccessfully), then rollback db transaction when illegal.
After steps A 4, the 3rd subfunction run succeeded, configuration data is carried out the 4th subfunction.
And when the 3rd subfunction is carried out unsuccessfully, rollback db transaction then.
After steps A 5, the 4th subfunction run succeeded, configuration data is carried out the 5th subfunction.
And when the 4th subfunction is carried out unsuccessfully, rollback db transaction then.
Wherein, configuration data is carried out the 4th subfunction be specially: to nested execution the second subfunction of the related data of configuration data, the 3rd subfunction and the 4th subfunction, until handle all related data of configuration data.Namely the second subfunction, the 3rd subfunction and the 4th subfunction can be carried out repeatedly because of the related operation of order, and the first subfunction and the 5th subfunction Exactly-once.
Step S104, when function runs succeeded, submit db transaction to; When function is carried out unsuccessfully, the rollback db transaction.
Wherein, function runs succeeded and refers to that the result that function is carried out is sure result, successful result, such as the result who configuration data is carried out secure authentication and mutually exclusive authentication being configuration data during by secure authentication and mutually exclusive authentication, illustrating configuration data is carried out secure authentication and this function of mutually exclusive authentication runs succeeded; When the result who configuration data is carried out legitimate verification is configuration data when legal, illustrate to run succeeded to configuration data being carried out this function of legitimate verification.Otherwise, function is carried out and is referred to that unsuccessfully the result that function is carried out is the result who negates, failed result, such as the result who configuration data is carried out secure authentication and mutually exclusive authentication being configuration data during not by secure authentication and mutually exclusive authentication, illustrating configuration data is carried out secure authentication and this function of mutually exclusive authentication is carried out unsuccessfully; When the result who configuration data is carried out legitimate verification is configuration data when illegal, illustrate and carry out unsuccessfully configuration data being carried out this function of legitimate verification.
When above-mentioned functions comprised a plurality of subfunction, step S104 can be specially:
When a plurality of subfunctions all run succeeded, submit db transaction to; When any subfunction is carried out unsuccessfully in a plurality of subfunctions, the rollback db transaction.
As fully visible, when the method for utilizing the embodiment of the invention to provide is carried out network management configuration, to be packaged in the db transaction for the configuration order of the service attribute of a business, in db transaction, configuration data is carried out function with this business-binding, submission and the rollback of the integrality fulfillment database affairs of usage data storehouse affairs, compared with prior art, the method that the embodiment of the invention provides makes complicated configuration logic orderliness more clear, association seldom is easy to safeguard between the service logic.
The implementation method of the network management configuration that the corresponding embodiment of the invention provides, as shown in Figure 3, the embodiment of the invention provides a kind of implement device of network management configuration, comprising:
Business Entity is used for receiving the user for the configuration data of the service attribute input of a business; The corresponding business of Business Entity stores one or more service attributes of this business; Can be embodied as webpage such as Business Entity, be labeled with one or more service attributes of this business on the webpage, and provide user input area, the user can be at user input area input and the corresponding configuration data of service attribute;
The order receiver module is used for receiving the configuration order of utilizing configuration data configuration service attribute; Configuration order can be inputted after having inputted configuration data by the user, can be embodied as a button or option such as the order receiver module, after the user has inputted configuration data, can trigger this button or select option, to submit a configuration order to;
The affairs opening module is used for opening a db transaction after the order receiver module receives configuration order, in db transaction configuration data is carried out and the function of this business-binding;
Affairs are submitted module to, are used for submitting db transaction to when function runs succeeded;
The transaction rollback module is used for when function is carried out unsuccessfully the rollback db transaction.
The implement device of the network management configuration that the embodiment of the invention provides, Business Entity of corresponding each business setting, thereby each business has been divided into one by one independently logical block, and will be packaged in the db transaction for the configuration order of the service attribute of a business, in db transaction, configuration data is carried out function with this business-binding, submission and the rollback of the integrality fulfillment database affairs of usage data storehouse affairs, compared with prior art, the device that the embodiment of the invention provides makes complicated configuration logic orderliness more clear, association seldom is easy to safeguard between the service logic.
Wherein, affairs are submitted module to, also can be used for comprising a plurality of subfunctions, when a plurality of subfunction all runs succeeded, submitting db transaction to when function;
The transaction rollback module also can be used for when function comprises that any subfunction is carried out unsuccessfully in a plurality of subfunctions, a plurality of subfunction rollback db transaction.
As shown in Figure 4, the affairs opening module can comprise:
The business description submodule, be used for the business description of storage and a plurality of subfunctions of above-mentioned business-binding, a plurality of subfunctions comprise: carry out secure authentication and mutually exclusive authentication the first subfunction, to configuration data carry out legitimate verification the second subfunction, with configuration data write the 3rd subfunction of configuration database, the 4th subfunction that the related data of configuration data are processed and the 5th subfunction of log and reported event.Wherein, business description can use certain programming language or script mode to realize.
At this moment, more as shown in Figure 4, the affairs opening module can also comprise:
Open submodule, be used for after the order receiver module receives configuration order, opening a db transaction;
First monitors submodule, is used for sending the first triggering command to the business description submodule after opening submodule turn-on data storehouse affairs;
The business description submodule also is used in when receiving the first triggering command, in db transaction configuration data is carried out the first subfunction;
Second monitors submodule, be used for when the result who configuration data is carried out the first subfunction be configuration data during by secure authentication and mutually exclusive authentication, send the second triggering command to the business description submodule;
The business description submodule also is used in when receiving the second triggering command, and configuration data is carried out the second subfunction, and when the result who configuration data is carried out the second subfunction be configuration data when legal, configuration data is carried out the 3rd subfunction;
The 3rd monitors submodule, is used for sending the 3rd triggering command to the business description submodule after the 3rd subfunction runs succeeded;
The business description submodule also is used in when receiving the 3rd triggering command, and configuration data is carried out the 4th subfunction;
The 4th monitors submodule, is used for sending the 4th triggering command to the business description submodule after the 4th subfunction runs succeeded;
The business description submodule also is used in when receiving the 4th triggering command, and configuration data is carried out the 5th subfunction.
In addition, the business description submodule also can be used for nested execution the second subfunction of the related data of configuration data, the 3rd subfunction and the 4th subfunction, until handle all related data of configuration data.Namely the second subfunction, the 3rd subfunction and the 4th subfunction can be carried out repeatedly because of the related operation of order, and the first subfunction and the 5th subfunction Exactly-once.
Above-mentioned implement device utilizes various monitoring submodules that subfunction is divided further, makes complicated configuration logic orderliness more clear, and association still less is easy to safeguard between the service logic.
In addition, a Configuration Framework container can also be set, the packing of above-mentioned inking device is put in this Configuration Framework container, and this container of initialization when starting in system, can realize the function of network management configuration.
One of ordinary skill in the art will appreciate that, realize that all or part of step in the method for the above-mentioned fact is to come the relevant hardware of instruction finish by program, above-mentioned program can be stored in the storage medium that a computer can read, this program comprises above-mentioned step when carrying out.Above-mentioned storage medium can be ROM/RAM, disk, CD etc.
The above is preferred implementation of the present invention; should be pointed out that for those skilled in the art, under the prerequisite that does not break away from principle of the present invention; can also make some improvements and modifications, these improvements and modifications also should be considered as protection scope of the present invention.

Claims (10)

1. the implementation method of a network management configuration is characterized in that, comprising:
Receive the user for the configuration data of the service attribute input of a business;
Reception utilizes described configuration data to dispose the configuration order of described service attribute;
Open a db transaction, in described db transaction, described configuration data is carried out function with described business-binding;
When described function runs succeeded, submit described db transaction to; When described function is carried out unsuccessfully, the described db transaction of rollback.
2. implementation method as claimed in claim 1 is characterized in that,
Described function comprises a plurality of subfunctions;
Described when described function runs succeeded, submit described db transaction to; When described function was carried out unsuccessfully, the described db transaction of rollback was specially:
When described a plurality of subfunctions all run succeeded, submit described db transaction to; When any subfunction is carried out unsuccessfully in described a plurality of subfunctions, the described db transaction of rollback.
3. implementation method as claimed in claim 2 is characterized in that, described a plurality of subfunctions comprise:
Carry out secure authentication and mutually exclusive authentication the first subfunction, to configuration data carry out legitimate verification the second subfunction, with configuration data write the 3rd subfunction of configuration database, the 4th subfunction that the related data of configuration data are processed and the 5th subfunction of log and reported event.
4. implementation method as claimed in claim 3 is characterized in that, the described function of in described db transaction described configuration data being carried out with described business-binding is specially:
In described db transaction, described configuration data is carried out described the first subfunction;
When the result who described configuration data is carried out described the first subfunction is described configuration data during by secure authentication and mutually exclusive authentication, described configuration data is carried out described the second subfunction;
When the result who described configuration data is carried out described the second subfunction is described configuration data when legal, described configuration data is carried out described the 3rd subfunction;
After described the 3rd subfunction runs succeeded, described configuration data is carried out described the 4th subfunction;
After described the 4th subfunction runs succeeded, described configuration data is carried out described the 5th subfunction.
5. implementation method as claimed in claim 3 is characterized in that, describedly described configuration data is carried out described the 4th subfunction is specially:
To described the second subfunction of the nested execution of related data, the 3rd subfunction and the 4th subfunction of described configuration data, until handle all related data of described configuration data.
6. the implement device of a network management configuration is characterized in that, comprising:
Business Entity is used for receiving the user for the configuration data of the service attribute input of a business;
The order receiver module is used for receiving and utilizes described configuration data to dispose the configuration order of described service attribute;
The affairs opening module is used for opening a db transaction after described order receiver module receives described configuration order, in described db transaction described configuration data is carried out and the function of described business-binding;
Affairs are submitted module to, are used for submitting described db transaction to when described function runs succeeded;
The transaction rollback module is used for when described function is carried out unsuccessfully the described db transaction of rollback.
7. implement device as claimed in claim 6 is characterized in that,
Described affairs are submitted module to, also are used for comprising a plurality of subfunctions, when described a plurality of subfunctions all run succeeded, submitting described db transaction to when described function;
Described transaction rollback module, also be used for when described function comprise a plurality of subfunctions, when described any subfunction of a plurality of subfunctions is carried out unsuccessfully, the described db transaction of rollback.
8. implement device as claimed in claim 7 is characterized in that, described affairs opening module comprises:
The business description submodule, be used for storing the business description of described a plurality of subfunctions, described a plurality of subfunctions comprise: carry out secure authentication and mutually exclusive authentication the first subfunction, to configuration data carry out legitimate verification the second subfunction, with configuration data write the 3rd subfunction of configuration database, the 4th subfunction that the related data of configuration data are processed and the 5th subfunction of log and reported event.
9. implement device as claimed in claim 8 is characterized in that, described affairs opening module also comprises:
Open submodule, be used for after described order receiver module receives described configuration order, opening a db transaction;
First monitors submodule, is used for after described unlatching submodule is opened described db transaction, sends the first triggering command to described business description submodule;
Described business description submodule also is used in described db transaction described configuration data being carried out described the first subfunction when receiving described the first triggering command;
Second monitors submodule, be used for when the result who described configuration data is carried out described the first subfunction be described configuration data during by secure authentication and mutually exclusive authentication, send the second triggering command to described business description submodule;
Described business description submodule, also be used for when receiving described the second triggering command, described configuration data is carried out described the second subfunction, and when the result who described configuration data is carried out described the second subfunction be described configuration data when legal, described configuration data is carried out described the 3rd subfunction;
The 3rd monitors submodule, is used for after described the 3rd subfunction runs succeeded, and sends the 3rd triggering command to described business description submodule;
Described business description submodule also is used for when receiving described the 3rd triggering command described configuration data being carried out described the 4th subfunction;
The 4th monitors submodule, is used for after described the 4th subfunction runs succeeded, and sends the 4th triggering command to described business description submodule;
Described business description submodule also is used for when receiving described the 4th triggering command described configuration data being carried out described the 5th subfunction.
10. implement device as claimed in claim 9 is characterized in that,
Described business description submodule also is used for described the second subfunction of the nested execution of related data, the 3rd subfunction and the 4th subfunction to described configuration data, until handle all related data of described configuration data.
CN201110179729.6A 2011-06-29 2011-06-29 Method and device for implementing network management configuration Active CN102857357B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110179729.6A CN102857357B (en) 2011-06-29 2011-06-29 Method and device for implementing network management configuration

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110179729.6A CN102857357B (en) 2011-06-29 2011-06-29 Method and device for implementing network management configuration

Publications (2)

Publication Number Publication Date
CN102857357A true CN102857357A (en) 2013-01-02
CN102857357B CN102857357B (en) 2017-04-26

Family

ID=47403567

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110179729.6A Active CN102857357B (en) 2011-06-29 2011-06-29 Method and device for implementing network management configuration

Country Status (1)

Country Link
CN (1) CN102857357B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016065904A1 (en) * 2014-10-29 2016-05-06 中兴通讯股份有限公司 Database processing method, device and system
CN105915372A (en) * 2016-04-07 2016-08-31 烽火通信科技股份有限公司 Temporary configuration management system and method based on automatic rollback

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6115715A (en) * 1998-06-29 2000-09-05 Sun Microsystems, Inc. Transaction management in a configuration database
CN1703007A (en) * 2004-02-20 2005-11-30 国际商业机器公司 Method, system for checking and repairing a network configuration
CN1964273A (en) * 2005-11-10 2007-05-16 华为技术有限公司 A method to interact service configuration information
CN101163043A (en) * 2007-11-08 2008-04-16 华为技术有限公司 Network management function configuring method and system
CN101178665A (en) * 2007-12-06 2008-05-14 华为技术有限公司 Method and apparatus for realizing configuring affair
CN101340688A (en) * 2007-07-04 2009-01-07 中兴通讯股份有限公司 Configuration script configuring method based on strip operation tag in network management system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6115715A (en) * 1998-06-29 2000-09-05 Sun Microsystems, Inc. Transaction management in a configuration database
CN1703007A (en) * 2004-02-20 2005-11-30 国际商业机器公司 Method, system for checking and repairing a network configuration
CN1964273A (en) * 2005-11-10 2007-05-16 华为技术有限公司 A method to interact service configuration information
CN101340688A (en) * 2007-07-04 2009-01-07 中兴通讯股份有限公司 Configuration script configuring method based on strip operation tag in network management system
CN101163043A (en) * 2007-11-08 2008-04-16 华为技术有限公司 Network management function configuring method and system
CN101178665A (en) * 2007-12-06 2008-05-14 华为技术有限公司 Method and apparatus for realizing configuring affair

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016065904A1 (en) * 2014-10-29 2016-05-06 中兴通讯股份有限公司 Database processing method, device and system
CN105915372A (en) * 2016-04-07 2016-08-31 烽火通信科技股份有限公司 Temporary configuration management system and method based on automatic rollback

Also Published As

Publication number Publication date
CN102857357B (en) 2017-04-26

Similar Documents

Publication Publication Date Title
US10534773B2 (en) Intelligent query parameterization of database workloads
CN110162516B (en) Data management method and system based on mass data processing
CN102436473B (en) Menu management device and menu managing method
CN107220757B (en) System and method for rule configuration and analysis
CN102236672A (en) Method and device for importing data
CN101713968B (en) Switching operation ticket generating system of converter station and application method thereof
CN101630431A (en) Method for processing multi-client centralized invoicing data and method for printing invoice
CN105335143A (en) Business processing method and apparatus
CN104169902A (en) Synchronizing local and remote data
US10679230B2 (en) Associative memory-based project management system
CN103440279A (en) Data adapter and data adaptation method thereof in data acquisition process
CN107528912A (en) A kind of automatic method, system and relevant apparatus for realizing distributing real time system
CN110895537A (en) Method and device for freely inquiring authority control
CA2793400C (en) Associative memory-based project management system
US20120005519A1 (en) System and method for providing collaborative master data processes
CN110134646B (en) Knowledge platform service data storage and integration method and system
CN111639121A (en) Big data platform and method for constructing customer portrait
CN104573053B (en) A kind of configuration item template dynamic customization method based on XML
CN102857357A (en) Method and device for implementing network management configuration
US8229946B1 (en) Business rules application parallel processing system
CN107423035B (en) Product data management system in software development process
CN105703941A (en) Method and device for processing configuration transaction
CN111221698A (en) Task data acquisition method and device
CN104216986A (en) Device and method for improving data query efficiency through pre-operation according to data update period
CN103617476A (en) A book management system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant