CN102857357B - Method and device for implementing network management configuration - Google Patents

Method and device for implementing network management configuration Download PDF

Info

Publication number
CN102857357B
CN102857357B CN201110179729.6A CN201110179729A CN102857357B CN 102857357 B CN102857357 B CN 102857357B CN 201110179729 A CN201110179729 A CN 201110179729A CN 102857357 B CN102857357 B CN 102857357B
Authority
CN
China
Prior art keywords
subfunction
configuration data
configuration
transaction
business
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201110179729.6A
Other languages
Chinese (zh)
Other versions
CN102857357A (en
Inventor
张敦华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201110179729.6A priority Critical patent/CN102857357B/en
Publication of CN102857357A publication Critical patent/CN102857357A/en
Application granted granted Critical
Publication of CN102857357B publication Critical patent/CN102857357B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention provides a method and a device for implementing network management configuration, and aims to solve the problem that existing network management configuration is complicated in implementing, high in workload of development and maintenance, easy to be failed, and hard to meet variable requirements of operators. The method includes receiving configuration data which are based on service attribute of a service and input by a user; receiving a configuration command for configuring the service attribute according to the configuration data; starting a database transaction and executing a service binding function to the configuration data in the database transaction; submitting the database transaction if the function is executed successfully; and rolling back the database transaction if the function is failed. By the method and the device, complicated configuration logic can be clear, correlation among service logics is less, and the service logics are easy to maintain.

Description

A kind of implementation method of network management configuration and realize device
Technical field
The present invention relates to technical field of network management, more particularly to a kind of implementation method of network management configuration and device is realized.
Background technology
Configuration data is generally defined as allocation list one by one by existing network management configuration function, using relational data stock Storage, the constraint logic of configuration and related operation are stored in code using the mode of hard coded, and finally utilize data base's reality Existing persistence.Because network management configuration functions of modules is complicated, changes in demand is more, and this causes the service logic of hard coded more and more multiple It is miscellaneous, and be interweaved together, later maintenance workload is very big and easily malfunctions.Such as complete the whole of base station Configuration data, it may be necessary to which the hundreds of page, each page has tens fields, and the additions and deletions of each field of the inside change will be one by one Configured, well imagined that workload is very huge, particularly configuration data can frequently be become because base station functions increase Change, this causes developer ceaselessly to safeguard the code of these configuration service logics.
It can be seen that, existing network management configuration realizes that process is complicated, and exploitation maintenance workload is big and easy error, and is difficult to meet The demand that operator is continually changing.
The content of the invention
Embodiments provide a kind of implementation method of network management configuration and realize device, match somebody with somebody to solve existing webmaster That what is put realizes that process is complicated, and exploitation maintenance workload is big and easily malfunctions, and is difficult to meet the demand that operator is continually changing Problem.
The embodiment of the present invention provides a kind of implementation method of network management configuration, including:
The configuration data that receive user is input into for the service attribute of a business;
Receive the configuration order that the service attribute is configured using the configuration data;
A db transaction is opened, the configuration data is performed and the business-binding in the db transaction Function;
When function executing success, the db transaction is submitted to;When the function executing fails, described in rollback Db transaction.
Wherein, the function includes multiple subfunctions;
It is described when function executing success, submit the db transaction to;When the function executing fails, rollback The db transaction, specially:
When the plurality of subfunction all runs succeeded, the db transaction is submitted to;When in the plurality of subfunction When any one subfunction performs failure, db transaction described in rollback.
The plurality of subfunction includes:
The first subfunction for carrying out secure authentication and mutually exclusive authentication is, the second sub- work(that legitimate verification is carried out to configuration data The 4th for, being processed by the 3rd subfunction of configuration data write configuration database, to the related data of configuration data is sub 5th subfunction of function and log and reported event.
Described execution to the configuration data in the db transaction is specially with the function of the business-binding:
First subfunction is performed to the configuration data in the db transaction;
When the result that first subfunction is performed to the configuration data be the configuration data by secure authentication and During mutually exclusive authentication, second subfunction is performed to the configuration data;
When the result that second subfunction is performed to the configuration data is that the configuration data is legal, match somebody with somebody to described Put data and perform the 3rd subfunction;
After 3rd subfunction runs succeeded, the 4th subfunction is performed to the configuration data;
After 4th subfunction runs succeeded, the 5th subfunction is performed to the configuration data.
It is described that configuration data execution the 4th subfunction is specially:
The nested execution of related data second subfunction, the 3rd subfunction and the 4th sub- work(to the configuration data Can, all related data until having processed the configuration data.
What the embodiment of the present invention provided a kind of network management configuration realizes device, including:
Business Entity, for the configuration data that receive user is input into for the service attribute of a business;
Order receiver module, for receiving the configuration order that the service attribute is configured using the configuration data;
Affairs opening module, for after the Order receiver module receives the configuration order, opening a data Storehouse affairs, the function with the business-binding is performed in the db transaction to the configuration data;
Affairs submit module to, for when the function executing is successful, submitting the db transaction to;
Transaction rollback module, for when the function executing fails, db transaction described in rollback.
Wherein, the affairs submit module to, it may also be used for when the function includes multiple subfunctions, the plurality of subfunction When all running succeeded, the db transaction is submitted to;
The transaction rollback module, it may also be used for appoint in the function includes multiple subfunctions, the plurality of subfunction When one sub- function executing fails, db transaction described in rollback.
The affairs opening module includes:
Business description submodule, for storing the business description of the plurality of subfunction, the plurality of subfunction includes:Enter First subfunction of row secure authentication and mutually exclusive authentication, the second subfunction that legitimate verification is carried out to configuration data, will configuration The 4th subfunction and record that 3rd subfunction of data write configuration database, the related data to configuration data are processed Daily record and the 5th subfunction of reported event.
The affairs opening module may also include:
Submodule is opened, for after the Order receiver module receives the configuration order, opening a data base Affairs;
First monitors submodule, for after the unlatching submodule opens the db transaction, sending the first triggering Instruct to the business description submodule;
The business description submodule, it may also be used for when the first triggering command is received, in data base's thing First subfunction is performed to the configuration data in business;
Second monitors submodule, is the configuration for working as the result that first subfunction is performed to the configuration data When data are by secure authentication and mutually exclusive authentication, the second triggering command is sent to the business description submodule;
The business description submodule, it may also be used for when second triggering command is received, to the configuration data Second subfunction is performed, and when the result that second subfunction is performed to the configuration data is configuration data conjunction During method, the 3rd subfunction is performed to the configuration data;
3rd monitors submodule, for after the 3rd subfunction runs succeeded, sending the 3rd triggering command to described Business description submodule;
The business description submodule, it may also be used for when three triggering command is received, to the configuration data Perform the 4th subfunction;
4th monitors submodule, for after the 4th subfunction runs succeeded, sending the 4th triggering command to described Business description submodule;
The business description submodule, it may also be used for when four triggering command is received, to the configuration data Perform the 5th subfunction.
The business description submodule, it may also be used for nested to the related data of the configuration data to perform described second sub Function, the 3rd subfunction and the 4th subfunction, all related data until having processed the configuration data.
When carrying out network management configuration using technical scheme provided in an embodiment of the present invention, by for the service attribute of a business Configuration order be packaged in a db transaction, configuration data is performed and the work(of the business-binding in db transaction Can, realize the submission and rollback of db transaction, compared with prior art, the technical scheme using the integrity of db transaction Make the configuration logic orderliness of complexity apparent, associate between service logic little, it is easy to safeguard.
Description of the drawings
Fig. 1 is the implementation method flow chart of network management configuration in the embodiment of the present invention;
Fig. 2 is the particular flow sheet of step A1-A5 in the embodiment of the present invention;
Fig. 3 is a kind of structural representation for realizing device of network management configuration in the embodiment of the present invention;
Fig. 4 is the structural representation for realizing device of another kind of network management configuration in the embodiment of the present invention.
Specific embodiment
Technical problem, technical scheme and advantage to be solved the embodiment of the present invention is clearer, below in conjunction with attached Figure and specific embodiment are described in detail.
As shown in figure 1, embodiments providing a kind of implementation method of network management configuration, comprise the following steps:
The configuration data that step S101, receive user are input into for the service attribute of a business.
Step S102, reception utilize the configuration order of configuration data configuration service attribute.
Configuration order can be input into by user after configuration data has been input into.
Step S103, one db transaction of unlatching, perform and the business-binding in db transaction to configuration data Function.
Above-mentioned functions may include multiple subfunctions, it is preferable that multiple subfunctions include following:
Carry out the first subfunction of secure authentication and mutually exclusive authentication;Wherein, secure authentication digital examination user is either with or without authority These configuration datas are operated, mutually exclusive authentication digital examination is currently that only one of which user is operating these configuration datas (generally Many people are not allowed while changing a set of configuration data).
The second subfunction of legitimate verification is carried out to configuration data;Wherein, carry out legitimate verification to configuration data to refer to Check whether the input value of each field of configuration data is legal, if in the scope that certain specifies, such as scope is 0 to arrive 100, it is not right if the configuration data being input into is 101;Whether there is the field that must be input into for another example and user is not input into Deng.
Configuration data is write into the 3rd subfunction of configuration database.
4th subfunction of (including increasing, being deleted or modified) is processed to the related data of configuration data;Sometimes, Certain configuration data is have modified, the change of other configuration data can be caused, otherwise data are exactly illegal.Such as by a numbers According to making 100 into, then b data just automatically become 300, if a is 50, b is exactly 600;A cellular base station is created for another example Record, then correspondingly can in the lump create the frame frame slot number evidence in base station;It is also to need to delete in the lump when deleting.This is just It is concept that the related data to configuration data are processed, if without related operation, the concordance of configuration data and complete Property just cannot be guaranteed, and this is also the groundwork of configuration service.
5th subfunction of log and reported event;Wherein, log refers to after the completion of data processing, to record behaviour The daily record of work, the process of operation is followed the trail of for the later stage;Reporting events refer to after the completion of data processing, by data through processing this Individual situation notifies to give other related systems.
Now, as shown in Fig. 2 below performing to configuration data in db transaction and be specially with the function of business-binding Step A1-A5:
Step A1, in db transaction to configuration data perform the first subfunction.
Step A2, when the result that the first subfunction is performed to configuration data be that configuration data is reflected by secure authentication and mutual exclusion Temporary (the first subfunction runs succeeded), the second subfunction is performed to configuration data.
And when the result that the first subfunction is performed to configuration data is that configuration data does not pass through secure authentication and mutually exclusive authentication When (the first subfunction performs failure), then rollback db transaction.
Step A3, when to configuration data perform the second subfunction result be configuration data it is legal when (the second subfunction is held Go successfully), the 3rd subfunction is performed to configuration data.
And when the result that the second subfunction is performed to configuration data is that (the second subfunction performs mistake when configuration data is illegal Lose), then rollback db transaction.
After step A4, the 3rd subfunction run succeeded, the 4th subfunction is performed to configuration data.
And when the 3rd subfunction performs failure, then rollback db transaction.
After step A5, the 4th subfunction run succeeded, the 5th subfunction is performed to configuration data.
And when the 4th subfunction performs failure, then rollback db transaction.
Wherein, perform the 4th subfunction to configuration data to be specially:The nested execution second of related data to configuration data Subfunction, the 3rd subfunction and the 4th subfunction, all related data until having processed configuration data.I.e. the second subfunction, 3rd subfunction and the 4th subfunction can be because the related operation of order be performed repeatedly, and the first subfunction and the 5th subfunction are only Perform once.
Step S104, when function executing success when, submit to db transaction;When function executing fails, rollback data base Affairs.
Wherein, function executing successfully refers to the result, successful result that the result of function executing is affirmative, such as when to matching somebody with somebody Put data carry out secure authentication and mutually exclusive authentication result be configuration data by secure authentication and mutually exclusive authentication when, illustrate to matching somebody with somebody Putting data carries out secure authentication and mutually exclusive authentication this function executing success;When the result that legitimate verification is carried out to configuration data For configuration data it is legal when, illustrate to carrying out legitimate verification this function executing success to configuration data.Conversely, function executing The result for unsuccessfully referring to function executing be negative result, the result of failure, such as when configuration data is carried out secure authentication with When the result of mutually exclusive authentication is that configuration data does not pass through secure authentication and mutually exclusive authentication, illustrate to carry out secure authentication to configuration data With this function executing failure of mutually exclusive authentication;When the result that legitimate verification is carried out to configuration data is that configuration data is illegal When, illustrate to carrying out legitimate verification this function executing failure to configuration data.
When above-mentioned functions include multiple subfunctions, step S104 can be specially:
When multiple subfunctions all run succeeded, db transaction is submitted to;When any one subfunction in multiple subfunctions When performing failure, rollback db transaction.
As fully visible, when carrying out network management configuration using method provided in an embodiment of the present invention, by for the industry of a business The configuration order of business attribute is packaged in a db transaction, configuration data is performed in db transaction is tied up with the business Fixed function, using the integrity of db transaction the submission and rollback of db transaction are realized, compared with prior art, this The method that bright embodiment is provided makes the configuration logic orderliness of complexity apparent, associates between service logic little, it is easy to safeguard.
The implementation method of correspondence network management configuration provided in an embodiment of the present invention, as shown in figure 3, embodiments providing A kind of network management configuration realizes device, including:
Business Entity, for the configuration data that receive user is input into for the service attribute of a business;One Business Entity One business of correspondence, one or more service attributes for the business that is stored with;Such as Business Entity can be embodied as webpage, webpage On be labeled with one or more service attributes of the business, and be provided with user input area, user can be in user input area It is upper to be input into configuration data corresponding with service attribute;
Order receiver module, for receiving using the configuration order of configuration data configuration service attribute;Configuration order can be by User is input into after configuration data has been input into, such as Order receiver module can be embodied as a button or option, and user is defeated After having entered configuration data, can trigger the button or select option, to submit a configuration order to;
Affairs opening module, for after Order receiver module receives configuration order, opening a db transaction, The function with the business-binding is performed to configuration data in db transaction;
Affairs submit module to, for when function executing is successful, submitting db transaction to;
Transaction rollback module, for when function executing fails, rollback db transaction.
Network management configuration provided in an embodiment of the present invention realizes device, corresponds to one Business Entity of each business setting, from And each business be divide into into logical block independent one by one, and by for the configuration order of the service attribute of business packaging In a db transaction, the function with the business-binding is performed to configuration data in db transaction, using data base The integrity of affairs realizes the submission and rollback of db transaction, compared with prior art, device provided in an embodiment of the present invention Make the configuration logic orderliness of complexity apparent, associate between service logic little, it is easy to safeguard.
Wherein, affairs submit module to, it may also be used for when function includes that multiple subfunctions, multiple subfunctions all run succeeded When, submit db transaction to;
Transaction rollback module, it may also be used for any one subfunction is held in function includes multiple subfunctions, multiple subfunctions During row failure, rollback db transaction.
As shown in figure 4, affairs opening module can include:
Business description submodule, for storing the business description with multiple subfunctions of above-mentioned business-binding, many sub- work( Can include:The first subfunction for carrying out secure authentication and mutually exclusive authentication is, the second sub- work(that legitimate verification is carried out to configuration data The 4th for, being processed by the 3rd subfunction of configuration data write configuration database, to the related data of configuration data is sub 5th subfunction of function and log and reported event.Wherein, business description can be using certain programming language or script Mode is realized.
Now, then as shown in figure 4, affairs opening module can also include:
Submodule is opened, for after Order receiver module receives configuration order, opening a db transaction;
First monitors submodule, for after submodule turn-on data storehouse affairs are opened, sending first triggering command to industry Business description submodule;
Business description submodule, it may also be used for when first triggering command is received, to configuring number in db transaction According to performing the first subfunction;
Second monitors submodule, for passing through safety for configuration data when the result that the first subfunction is performed to configuration data When authentication and mutually exclusive authentication, send the second triggering command and give business description submodule;
Business description submodule, it may also be used for when the second triggering command is received, to configuration data the second sub- work(is performed Can, and when the result that the second subfunction is performed to configuration data is that configuration data is legal, the 3rd sub- work(is performed to configuration data Energy;
3rd monitors submodule, for after the 3rd subfunction runs succeeded, sending the 3rd triggering command to business description Submodule;
Business description submodule, it may also be used for when three triggering commands is received, to configuration data the 4th sub- work(is performed Energy;
4th monitors submodule, for after the 4th subfunction runs succeeded, sending the 4th triggering command to business description Submodule;
Business description submodule, it may also be used for when four triggering commands is received, to configuration data the 5th sub- work(is performed Energy.
In addition, business description submodule, it may also be used for it is nested to the related data of configuration data perform the second subfunction, the Three subfunctions and the 4th subfunction, all related data until having processed configuration data.That is the second subfunction, the 3rd subfunction Can perform repeatedly because of the related operation of order with the 4th subfunction, and the first subfunction and the 5th subfunction Exactly-once.
Above-mentioned to realize that device is further divided subfunction using various monitoring submodules, the configuration for making complexity is patrolled Collect orderliness apparent, associate between service logic less, it is easy to safeguard.
Furthermore it is also possible to arrange a Configuration Framework container, the packing of above-mentioned configuration device is put into into the Configuration Framework container In, and the container is initialized in system start-up, you can realize the function of network management configuration.
It will appreciated by the skilled person that realizing that all or part of step in above-mentioned true method can be Related hardware is instructed to complete by program, above-mentioned program can be stored in the storage medium that a computer can read In, the program upon execution, including above-mentioned step.Above-mentioned storage medium, can be ROM/RAM, disk, CD etc..
The above is the preferred embodiment of the present invention, it is noted that for those skilled in the art For, on the premise of without departing from principle of the present invention, some improvements and modifications can also be made, these improvements and modifications Should be regarded as protection scope of the present invention.

Claims (8)

1. a kind of implementation method of network management configuration, it is characterised in that include:
The configuration data that receive user is input into for the service attribute of a business;
Receive the configuration order that the service attribute is configured using the configuration data;
A db transaction is opened, the work(with the business-binding is performed to the configuration data in the db transaction Can, the function includes multiple subfunctions:Carry out the first subfunction of secure authentication and mutually exclusive authentication, configuration data is closed Second subfunction of method checking, the 3rd subfunction, the associate number to configuration data that configuration data is write configuration database According to the 5th subfunction of the 4th subfunction and log and reported event for being processed;
When function executing success, the db transaction is submitted to;When the function executing fails, data described in rollback Storehouse affairs.
2. implementation method as claimed in claim 1, it is characterised in that described when function executing success, submits described to Db transaction;When the function executing fails, db transaction described in rollback, specially:
When the plurality of subfunction all runs succeeded, the db transaction is submitted to;When arbitrary in the plurality of subfunction When individual sub- function executing fails, db transaction described in rollback.
3. implementation method as claimed in claim 2, it is characterised in that it is described in the db transaction to the configuration number It is specially with the function of the business-binding according to performing:
First subfunction is performed to the configuration data in the db transaction;
When the result that first subfunction is performed to the configuration data is that the configuration data passes through secure authentication and mutual exclusion During authentication, second subfunction is performed to the configuration data;
When the result that second subfunction is performed to the configuration data is that the configuration data is legal, to the configuration number According to execution the 3rd subfunction;
After 3rd subfunction runs succeeded, the 4th subfunction is performed to the configuration data;
After 4th subfunction runs succeeded, the 5th subfunction is performed to the configuration data.
4. implementation method as claimed in claim 2, it is characterised in that described that the 4th sub- work(is performed to the configuration data Can be specially:
The nested execution of related data second subfunction, the 3rd subfunction and the 4th subfunction to the configuration data, directly To all related data for having processed the configuration data.
5. a kind of network management configuration realizes device, it is characterised in that include:
Business Entity, for the configuration data that receive user is input into for the service attribute of a business;
Order receiver module, for receiving the configuration order that the service attribute is configured using the configuration data;
Affairs opening module, for after the Order receiver module receives the configuration order, opening data base's thing Business, the function with the business-binding is performed in the db transaction to the configuration data, and the function includes multiple Subfunction;Affairs opening module includes:Business description submodule, it is described for storing the business description of the plurality of subfunction Multiple subfunctions include:Carry out the first subfunction of secure authentication and mutually exclusive authentication, legitimate verification is carried out to configuration data Second subfunction, the 3rd subfunction that configuration data is write configuration database, the related data to configuration data are processed The 4th subfunction and log and reported event the 5th subfunction;
Affairs submit module to, for when the function executing is successful, submitting the db transaction to;
Transaction rollback module, for when the function executing fails, db transaction described in rollback.
6. device is realized as claimed in claim 5, it is characterised in that
The affairs submit module to, are additionally operable to when the function includes that multiple subfunctions, the plurality of subfunction are all performed into During work(, the db transaction is submitted to;
The transaction rollback module, is additionally operable to arbitrary height in the function includes multiple subfunctions, the plurality of subfunction When function executing fails, db transaction described in rollback.
7. device is realized as claimed in claim 5, it is characterised in that the affairs opening module also includes:
Submodule is opened, for after the Order receiver module receives the configuration order, opening a db transaction;
First monitors submodule, for after the unlatching submodule opens the db transaction, sending first triggering command To the business description submodule;
The business description submodule, is additionally operable to when the first triggering command is received, right in the db transaction The configuration data performs first subfunction;
Second monitors submodule, is the configuration data for working as the result that first subfunction is performed to the configuration data During by secure authentication and mutually exclusive authentication, the second triggering command is sent to the business description submodule;
The business description submodule, is additionally operable to, when second triggering command is received, to the configuration data institute be performed The second subfunction is stated, and when the result that second subfunction is performed to the configuration data is that the configuration data is legal, 3rd subfunction is performed to the configuration data;
3rd monitors submodule, for after the 3rd subfunction runs succeeded, sending the 3rd triggering command to the business Description submodule;
The business description submodule, is additionally operable to, when three triggering command is received, to the configuration data institute be performed State the 4th subfunction;
4th monitors submodule, for after the 4th subfunction runs succeeded, sending the 4th triggering command to the business Description submodule;
The business description submodule, is additionally operable to, when four triggering command is received, to the configuration data institute be performed State the 5th subfunction.
8. device is realized as claimed in claim 7, it is characterised in that
The business description submodule, be additionally operable to it is nested to the related data of the configuration data perform second subfunction, 3rd subfunction and the 4th subfunction, all related data until having processed the configuration data.
CN201110179729.6A 2011-06-29 2011-06-29 Method and device for implementing network management configuration Active CN102857357B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110179729.6A CN102857357B (en) 2011-06-29 2011-06-29 Method and device for implementing network management configuration

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110179729.6A CN102857357B (en) 2011-06-29 2011-06-29 Method and device for implementing network management configuration

Publications (2)

Publication Number Publication Date
CN102857357A CN102857357A (en) 2013-01-02
CN102857357B true CN102857357B (en) 2017-04-26

Family

ID=47403567

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110179729.6A Active CN102857357B (en) 2011-06-29 2011-06-29 Method and device for implementing network management configuration

Country Status (1)

Country Link
CN (1) CN102857357B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105550178A (en) * 2014-10-29 2016-05-04 中兴通讯股份有限公司 Database processing method and device and system
CN105915372B (en) * 2016-04-07 2018-11-30 烽火通信科技股份有限公司 Provisional configuration management system and method based on automatic rollback

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6115715A (en) * 1998-06-29 2000-09-05 Sun Microsystems, Inc. Transaction management in a configuration database
CN1703007A (en) * 2004-02-20 2005-11-30 国际商业机器公司 Method, system for checking and repairing a network configuration
CN1964273A (en) * 2005-11-10 2007-05-16 华为技术有限公司 A method to interact service configuration information
CN101163043A (en) * 2007-11-08 2008-04-16 华为技术有限公司 Network management function configuring method and system
CN101178665A (en) * 2007-12-06 2008-05-14 华为技术有限公司 Method and apparatus for realizing configuring affair
CN101340688A (en) * 2007-07-04 2009-01-07 中兴通讯股份有限公司 Configuration script configuring method based on strip operation tag in network management system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6115715A (en) * 1998-06-29 2000-09-05 Sun Microsystems, Inc. Transaction management in a configuration database
CN1703007A (en) * 2004-02-20 2005-11-30 国际商业机器公司 Method, system for checking and repairing a network configuration
CN1964273A (en) * 2005-11-10 2007-05-16 华为技术有限公司 A method to interact service configuration information
CN101340688A (en) * 2007-07-04 2009-01-07 中兴通讯股份有限公司 Configuration script configuring method based on strip operation tag in network management system
CN101163043A (en) * 2007-11-08 2008-04-16 华为技术有限公司 Network management function configuring method and system
CN101178665A (en) * 2007-12-06 2008-05-14 华为技术有限公司 Method and apparatus for realizing configuring affair

Also Published As

Publication number Publication date
CN102857357A (en) 2013-01-02

Similar Documents

Publication Publication Date Title
CN103544074B (en) The method of calibration of a kind of business and device
WO2019179056A1 (en) Configurable system and method based on rule engine, device, and storage medium
CN104391934B (en) Data verification method and device
US8121385B1 (en) System and method for generating magnetic ink character recognition (MICR) testing documents
CN103092742B (en) Program log recording optimization method and system
CN102355461B (en) XBRL (Extensible Business Reporting Language) credible data storage method and credible data storage system
CN102013083A (en) Method and system for generating emergency action plan based on pre-arranged plan
CN107070919A (en) Idempotence for db transaction
CN102044008A (en) Contract management information system
CN111897863A (en) Multi-source heterogeneous data fusion and convergence method
CN103793399A (en) Method for integrating information resources of system of politics and law
CN104077530A (en) Method and device used for evaluating safety of data access sentence
CN106503974A (en) Transaction data processing method and device
CN104679650A (en) Method for evaluating credibility of software architecture oriented models
CN103077019B (en) A kind of graphical parameter batch maintenance method and device
CN105978147A (en) File interaction based remote constant value amending system for automatic safety devices
CN104965781A (en) Method and apparatus for generating test case
CN102857357B (en) Method and device for implementing network management configuration
CN114003600A (en) Data processing method, system, electronic device and storage medium
CN105703941A (en) Method and device for processing configuration transaction
CN116563065A (en) Intelligent test question processing method, system, storage medium and electronic equipment
CN116841980A (en) Bank data processing system
CN105913226B (en) Nuclear power plant's operation support system based on intelligent voice prompt
CN106447181A (en) Analysis method and device based on timeliness of ERP business approval
Martinelli et al. Model checking based approach for compliance checking

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant