CN102857357B - Method and device for implementing network management configuration - Google Patents
Method and device for implementing network management configuration Download PDFInfo
- Publication number
- CN102857357B CN102857357B CN201110179729.6A CN201110179729A CN102857357B CN 102857357 B CN102857357 B CN 102857357B CN 201110179729 A CN201110179729 A CN 201110179729A CN 102857357 B CN102857357 B CN 102857357B
- Authority
- CN
- China
- Prior art keywords
- subfunction
- configuration data
- configuration
- transaction
- business
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention provides a method and a device for implementing network management configuration, and aims to solve the problem that existing network management configuration is complicated in implementing, high in workload of development and maintenance, easy to be failed, and hard to meet variable requirements of operators. The method includes receiving configuration data which are based on service attribute of a service and input by a user; receiving a configuration command for configuring the service attribute according to the configuration data; starting a database transaction and executing a service binding function to the configuration data in the database transaction; submitting the database transaction if the function is executed successfully; and rolling back the database transaction if the function is failed. By the method and the device, complicated configuration logic can be clear, correlation among service logics is less, and the service logics are easy to maintain.
Description
Technical field
The present invention relates to technical field of network management, more particularly to a kind of implementation method of network management configuration and device is realized.
Background technology
Configuration data is generally defined as allocation list one by one by existing network management configuration function, using relational data stock
Storage, the constraint logic of configuration and related operation are stored in code using the mode of hard coded, and finally utilize data base's reality
Existing persistence.Because network management configuration functions of modules is complicated, changes in demand is more, and this causes the service logic of hard coded more and more multiple
It is miscellaneous, and be interweaved together, later maintenance workload is very big and easily malfunctions.Such as complete the whole of base station
Configuration data, it may be necessary to which the hundreds of page, each page has tens fields, and the additions and deletions of each field of the inside change will be one by one
Configured, well imagined that workload is very huge, particularly configuration data can frequently be become because base station functions increase
Change, this causes developer ceaselessly to safeguard the code of these configuration service logics.
It can be seen that, existing network management configuration realizes that process is complicated, and exploitation maintenance workload is big and easy error, and is difficult to meet
The demand that operator is continually changing.
The content of the invention
Embodiments provide a kind of implementation method of network management configuration and realize device, match somebody with somebody to solve existing webmaster
That what is put realizes that process is complicated, and exploitation maintenance workload is big and easily malfunctions, and is difficult to meet the demand that operator is continually changing
Problem.
The embodiment of the present invention provides a kind of implementation method of network management configuration, including:
The configuration data that receive user is input into for the service attribute of a business;
Receive the configuration order that the service attribute is configured using the configuration data;
A db transaction is opened, the configuration data is performed and the business-binding in the db transaction
Function;
When function executing success, the db transaction is submitted to;When the function executing fails, described in rollback
Db transaction.
Wherein, the function includes multiple subfunctions;
It is described when function executing success, submit the db transaction to;When the function executing fails, rollback
The db transaction, specially:
When the plurality of subfunction all runs succeeded, the db transaction is submitted to;When in the plurality of subfunction
When any one subfunction performs failure, db transaction described in rollback.
The plurality of subfunction includes:
The first subfunction for carrying out secure authentication and mutually exclusive authentication is, the second sub- work(that legitimate verification is carried out to configuration data
The 4th for, being processed by the 3rd subfunction of configuration data write configuration database, to the related data of configuration data is sub
5th subfunction of function and log and reported event.
Described execution to the configuration data in the db transaction is specially with the function of the business-binding:
First subfunction is performed to the configuration data in the db transaction;
When the result that first subfunction is performed to the configuration data be the configuration data by secure authentication and
During mutually exclusive authentication, second subfunction is performed to the configuration data;
When the result that second subfunction is performed to the configuration data is that the configuration data is legal, match somebody with somebody to described
Put data and perform the 3rd subfunction;
After 3rd subfunction runs succeeded, the 4th subfunction is performed to the configuration data;
After 4th subfunction runs succeeded, the 5th subfunction is performed to the configuration data.
It is described that configuration data execution the 4th subfunction is specially:
The nested execution of related data second subfunction, the 3rd subfunction and the 4th sub- work(to the configuration data
Can, all related data until having processed the configuration data.
What the embodiment of the present invention provided a kind of network management configuration realizes device, including:
Business Entity, for the configuration data that receive user is input into for the service attribute of a business;
Order receiver module, for receiving the configuration order that the service attribute is configured using the configuration data;
Affairs opening module, for after the Order receiver module receives the configuration order, opening a data
Storehouse affairs, the function with the business-binding is performed in the db transaction to the configuration data;
Affairs submit module to, for when the function executing is successful, submitting the db transaction to;
Transaction rollback module, for when the function executing fails, db transaction described in rollback.
Wherein, the affairs submit module to, it may also be used for when the function includes multiple subfunctions, the plurality of subfunction
When all running succeeded, the db transaction is submitted to;
The transaction rollback module, it may also be used for appoint in the function includes multiple subfunctions, the plurality of subfunction
When one sub- function executing fails, db transaction described in rollback.
The affairs opening module includes:
Business description submodule, for storing the business description of the plurality of subfunction, the plurality of subfunction includes:Enter
First subfunction of row secure authentication and mutually exclusive authentication, the second subfunction that legitimate verification is carried out to configuration data, will configuration
The 4th subfunction and record that 3rd subfunction of data write configuration database, the related data to configuration data are processed
Daily record and the 5th subfunction of reported event.
The affairs opening module may also include:
Submodule is opened, for after the Order receiver module receives the configuration order, opening a data base
Affairs;
First monitors submodule, for after the unlatching submodule opens the db transaction, sending the first triggering
Instruct to the business description submodule;
The business description submodule, it may also be used for when the first triggering command is received, in data base's thing
First subfunction is performed to the configuration data in business;
Second monitors submodule, is the configuration for working as the result that first subfunction is performed to the configuration data
When data are by secure authentication and mutually exclusive authentication, the second triggering command is sent to the business description submodule;
The business description submodule, it may also be used for when second triggering command is received, to the configuration data
Second subfunction is performed, and when the result that second subfunction is performed to the configuration data is configuration data conjunction
During method, the 3rd subfunction is performed to the configuration data;
3rd monitors submodule, for after the 3rd subfunction runs succeeded, sending the 3rd triggering command to described
Business description submodule;
The business description submodule, it may also be used for when three triggering command is received, to the configuration data
Perform the 4th subfunction;
4th monitors submodule, for after the 4th subfunction runs succeeded, sending the 4th triggering command to described
Business description submodule;
The business description submodule, it may also be used for when four triggering command is received, to the configuration data
Perform the 5th subfunction.
The business description submodule, it may also be used for nested to the related data of the configuration data to perform described second sub
Function, the 3rd subfunction and the 4th subfunction, all related data until having processed the configuration data.
When carrying out network management configuration using technical scheme provided in an embodiment of the present invention, by for the service attribute of a business
Configuration order be packaged in a db transaction, configuration data is performed and the work(of the business-binding in db transaction
Can, realize the submission and rollback of db transaction, compared with prior art, the technical scheme using the integrity of db transaction
Make the configuration logic orderliness of complexity apparent, associate between service logic little, it is easy to safeguard.
Description of the drawings
Fig. 1 is the implementation method flow chart of network management configuration in the embodiment of the present invention;
Fig. 2 is the particular flow sheet of step A1-A5 in the embodiment of the present invention;
Fig. 3 is a kind of structural representation for realizing device of network management configuration in the embodiment of the present invention;
Fig. 4 is the structural representation for realizing device of another kind of network management configuration in the embodiment of the present invention.
Specific embodiment
Technical problem, technical scheme and advantage to be solved the embodiment of the present invention is clearer, below in conjunction with attached
Figure and specific embodiment are described in detail.
As shown in figure 1, embodiments providing a kind of implementation method of network management configuration, comprise the following steps:
The configuration data that step S101, receive user are input into for the service attribute of a business.
Step S102, reception utilize the configuration order of configuration data configuration service attribute.
Configuration order can be input into by user after configuration data has been input into.
Step S103, one db transaction of unlatching, perform and the business-binding in db transaction to configuration data
Function.
Above-mentioned functions may include multiple subfunctions, it is preferable that multiple subfunctions include following:
Carry out the first subfunction of secure authentication and mutually exclusive authentication;Wherein, secure authentication digital examination user is either with or without authority
These configuration datas are operated, mutually exclusive authentication digital examination is currently that only one of which user is operating these configuration datas (generally
Many people are not allowed while changing a set of configuration data).
The second subfunction of legitimate verification is carried out to configuration data;Wherein, carry out legitimate verification to configuration data to refer to
Check whether the input value of each field of configuration data is legal, if in the scope that certain specifies, such as scope is 0 to arrive
100, it is not right if the configuration data being input into is 101;Whether there is the field that must be input into for another example and user is not input into
Deng.
Configuration data is write into the 3rd subfunction of configuration database.
4th subfunction of (including increasing, being deleted or modified) is processed to the related data of configuration data;Sometimes,
Certain configuration data is have modified, the change of other configuration data can be caused, otherwise data are exactly illegal.Such as by a numbers
According to making 100 into, then b data just automatically become 300, if a is 50, b is exactly 600;A cellular base station is created for another example
Record, then correspondingly can in the lump create the frame frame slot number evidence in base station;It is also to need to delete in the lump when deleting.This is just
It is concept that the related data to configuration data are processed, if without related operation, the concordance of configuration data and complete
Property just cannot be guaranteed, and this is also the groundwork of configuration service.
5th subfunction of log and reported event;Wherein, log refers to after the completion of data processing, to record behaviour
The daily record of work, the process of operation is followed the trail of for the later stage;Reporting events refer to after the completion of data processing, by data through processing this
Individual situation notifies to give other related systems.
Now, as shown in Fig. 2 below performing to configuration data in db transaction and be specially with the function of business-binding
Step A1-A5:
Step A1, in db transaction to configuration data perform the first subfunction.
Step A2, when the result that the first subfunction is performed to configuration data be that configuration data is reflected by secure authentication and mutual exclusion
Temporary (the first subfunction runs succeeded), the second subfunction is performed to configuration data.
And when the result that the first subfunction is performed to configuration data is that configuration data does not pass through secure authentication and mutually exclusive authentication
When (the first subfunction performs failure), then rollback db transaction.
Step A3, when to configuration data perform the second subfunction result be configuration data it is legal when (the second subfunction is held
Go successfully), the 3rd subfunction is performed to configuration data.
And when the result that the second subfunction is performed to configuration data is that (the second subfunction performs mistake when configuration data is illegal
Lose), then rollback db transaction.
After step A4, the 3rd subfunction run succeeded, the 4th subfunction is performed to configuration data.
And when the 3rd subfunction performs failure, then rollback db transaction.
After step A5, the 4th subfunction run succeeded, the 5th subfunction is performed to configuration data.
And when the 4th subfunction performs failure, then rollback db transaction.
Wherein, perform the 4th subfunction to configuration data to be specially:The nested execution second of related data to configuration data
Subfunction, the 3rd subfunction and the 4th subfunction, all related data until having processed configuration data.I.e. the second subfunction,
3rd subfunction and the 4th subfunction can be because the related operation of order be performed repeatedly, and the first subfunction and the 5th subfunction are only
Perform once.
Step S104, when function executing success when, submit to db transaction;When function executing fails, rollback data base
Affairs.
Wherein, function executing successfully refers to the result, successful result that the result of function executing is affirmative, such as when to matching somebody with somebody
Put data carry out secure authentication and mutually exclusive authentication result be configuration data by secure authentication and mutually exclusive authentication when, illustrate to matching somebody with somebody
Putting data carries out secure authentication and mutually exclusive authentication this function executing success;When the result that legitimate verification is carried out to configuration data
For configuration data it is legal when, illustrate to carrying out legitimate verification this function executing success to configuration data.Conversely, function executing
The result for unsuccessfully referring to function executing be negative result, the result of failure, such as when configuration data is carried out secure authentication with
When the result of mutually exclusive authentication is that configuration data does not pass through secure authentication and mutually exclusive authentication, illustrate to carry out secure authentication to configuration data
With this function executing failure of mutually exclusive authentication;When the result that legitimate verification is carried out to configuration data is that configuration data is illegal
When, illustrate to carrying out legitimate verification this function executing failure to configuration data.
When above-mentioned functions include multiple subfunctions, step S104 can be specially:
When multiple subfunctions all run succeeded, db transaction is submitted to;When any one subfunction in multiple subfunctions
When performing failure, rollback db transaction.
As fully visible, when carrying out network management configuration using method provided in an embodiment of the present invention, by for the industry of a business
The configuration order of business attribute is packaged in a db transaction, configuration data is performed in db transaction is tied up with the business
Fixed function, using the integrity of db transaction the submission and rollback of db transaction are realized, compared with prior art, this
The method that bright embodiment is provided makes the configuration logic orderliness of complexity apparent, associates between service logic little, it is easy to safeguard.
The implementation method of correspondence network management configuration provided in an embodiment of the present invention, as shown in figure 3, embodiments providing
A kind of network management configuration realizes device, including:
Business Entity, for the configuration data that receive user is input into for the service attribute of a business;One Business Entity
One business of correspondence, one or more service attributes for the business that is stored with;Such as Business Entity can be embodied as webpage, webpage
On be labeled with one or more service attributes of the business, and be provided with user input area, user can be in user input area
It is upper to be input into configuration data corresponding with service attribute;
Order receiver module, for receiving using the configuration order of configuration data configuration service attribute;Configuration order can be by
User is input into after configuration data has been input into, such as Order receiver module can be embodied as a button or option, and user is defeated
After having entered configuration data, can trigger the button or select option, to submit a configuration order to;
Affairs opening module, for after Order receiver module receives configuration order, opening a db transaction,
The function with the business-binding is performed to configuration data in db transaction;
Affairs submit module to, for when function executing is successful, submitting db transaction to;
Transaction rollback module, for when function executing fails, rollback db transaction.
Network management configuration provided in an embodiment of the present invention realizes device, corresponds to one Business Entity of each business setting, from
And each business be divide into into logical block independent one by one, and by for the configuration order of the service attribute of business packaging
In a db transaction, the function with the business-binding is performed to configuration data in db transaction, using data base
The integrity of affairs realizes the submission and rollback of db transaction, compared with prior art, device provided in an embodiment of the present invention
Make the configuration logic orderliness of complexity apparent, associate between service logic little, it is easy to safeguard.
Wherein, affairs submit module to, it may also be used for when function includes that multiple subfunctions, multiple subfunctions all run succeeded
When, submit db transaction to;
Transaction rollback module, it may also be used for any one subfunction is held in function includes multiple subfunctions, multiple subfunctions
During row failure, rollback db transaction.
As shown in figure 4, affairs opening module can include:
Business description submodule, for storing the business description with multiple subfunctions of above-mentioned business-binding, many sub- work(
Can include:The first subfunction for carrying out secure authentication and mutually exclusive authentication is, the second sub- work(that legitimate verification is carried out to configuration data
The 4th for, being processed by the 3rd subfunction of configuration data write configuration database, to the related data of configuration data is sub
5th subfunction of function and log and reported event.Wherein, business description can be using certain programming language or script
Mode is realized.
Now, then as shown in figure 4, affairs opening module can also include:
Submodule is opened, for after Order receiver module receives configuration order, opening a db transaction;
First monitors submodule, for after submodule turn-on data storehouse affairs are opened, sending first triggering command to industry
Business description submodule;
Business description submodule, it may also be used for when first triggering command is received, to configuring number in db transaction
According to performing the first subfunction;
Second monitors submodule, for passing through safety for configuration data when the result that the first subfunction is performed to configuration data
When authentication and mutually exclusive authentication, send the second triggering command and give business description submodule;
Business description submodule, it may also be used for when the second triggering command is received, to configuration data the second sub- work(is performed
Can, and when the result that the second subfunction is performed to configuration data is that configuration data is legal, the 3rd sub- work(is performed to configuration data
Energy;
3rd monitors submodule, for after the 3rd subfunction runs succeeded, sending the 3rd triggering command to business description
Submodule;
Business description submodule, it may also be used for when three triggering commands is received, to configuration data the 4th sub- work(is performed
Energy;
4th monitors submodule, for after the 4th subfunction runs succeeded, sending the 4th triggering command to business description
Submodule;
Business description submodule, it may also be used for when four triggering commands is received, to configuration data the 5th sub- work(is performed
Energy.
In addition, business description submodule, it may also be used for it is nested to the related data of configuration data perform the second subfunction, the
Three subfunctions and the 4th subfunction, all related data until having processed configuration data.That is the second subfunction, the 3rd subfunction
Can perform repeatedly because of the related operation of order with the 4th subfunction, and the first subfunction and the 5th subfunction Exactly-once.
Above-mentioned to realize that device is further divided subfunction using various monitoring submodules, the configuration for making complexity is patrolled
Collect orderliness apparent, associate between service logic less, it is easy to safeguard.
Furthermore it is also possible to arrange a Configuration Framework container, the packing of above-mentioned configuration device is put into into the Configuration Framework container
In, and the container is initialized in system start-up, you can realize the function of network management configuration.
It will appreciated by the skilled person that realizing that all or part of step in above-mentioned true method can be
Related hardware is instructed to complete by program, above-mentioned program can be stored in the storage medium that a computer can read
In, the program upon execution, including above-mentioned step.Above-mentioned storage medium, can be ROM/RAM, disk, CD etc..
The above is the preferred embodiment of the present invention, it is noted that for those skilled in the art
For, on the premise of without departing from principle of the present invention, some improvements and modifications can also be made, these improvements and modifications
Should be regarded as protection scope of the present invention.
Claims (8)
1. a kind of implementation method of network management configuration, it is characterised in that include:
The configuration data that receive user is input into for the service attribute of a business;
Receive the configuration order that the service attribute is configured using the configuration data;
A db transaction is opened, the work(with the business-binding is performed to the configuration data in the db transaction
Can, the function includes multiple subfunctions:Carry out the first subfunction of secure authentication and mutually exclusive authentication, configuration data is closed
Second subfunction of method checking, the 3rd subfunction, the associate number to configuration data that configuration data is write configuration database
According to the 5th subfunction of the 4th subfunction and log and reported event for being processed;
When function executing success, the db transaction is submitted to;When the function executing fails, data described in rollback
Storehouse affairs.
2. implementation method as claimed in claim 1, it is characterised in that described when function executing success, submits described to
Db transaction;When the function executing fails, db transaction described in rollback, specially:
When the plurality of subfunction all runs succeeded, the db transaction is submitted to;When arbitrary in the plurality of subfunction
When individual sub- function executing fails, db transaction described in rollback.
3. implementation method as claimed in claim 2, it is characterised in that it is described in the db transaction to the configuration number
It is specially with the function of the business-binding according to performing:
First subfunction is performed to the configuration data in the db transaction;
When the result that first subfunction is performed to the configuration data is that the configuration data passes through secure authentication and mutual exclusion
During authentication, second subfunction is performed to the configuration data;
When the result that second subfunction is performed to the configuration data is that the configuration data is legal, to the configuration number
According to execution the 3rd subfunction;
After 3rd subfunction runs succeeded, the 4th subfunction is performed to the configuration data;
After 4th subfunction runs succeeded, the 5th subfunction is performed to the configuration data.
4. implementation method as claimed in claim 2, it is characterised in that described that the 4th sub- work(is performed to the configuration data
Can be specially:
The nested execution of related data second subfunction, the 3rd subfunction and the 4th subfunction to the configuration data, directly
To all related data for having processed the configuration data.
5. a kind of network management configuration realizes device, it is characterised in that include:
Business Entity, for the configuration data that receive user is input into for the service attribute of a business;
Order receiver module, for receiving the configuration order that the service attribute is configured using the configuration data;
Affairs opening module, for after the Order receiver module receives the configuration order, opening data base's thing
Business, the function with the business-binding is performed in the db transaction to the configuration data, and the function includes multiple
Subfunction;Affairs opening module includes:Business description submodule, it is described for storing the business description of the plurality of subfunction
Multiple subfunctions include:Carry out the first subfunction of secure authentication and mutually exclusive authentication, legitimate verification is carried out to configuration data
Second subfunction, the 3rd subfunction that configuration data is write configuration database, the related data to configuration data are processed
The 4th subfunction and log and reported event the 5th subfunction;
Affairs submit module to, for when the function executing is successful, submitting the db transaction to;
Transaction rollback module, for when the function executing fails, db transaction described in rollback.
6. device is realized as claimed in claim 5, it is characterised in that
The affairs submit module to, are additionally operable to when the function includes that multiple subfunctions, the plurality of subfunction are all performed into
During work(, the db transaction is submitted to;
The transaction rollback module, is additionally operable to arbitrary height in the function includes multiple subfunctions, the plurality of subfunction
When function executing fails, db transaction described in rollback.
7. device is realized as claimed in claim 5, it is characterised in that the affairs opening module also includes:
Submodule is opened, for after the Order receiver module receives the configuration order, opening a db transaction;
First monitors submodule, for after the unlatching submodule opens the db transaction, sending first triggering command
To the business description submodule;
The business description submodule, is additionally operable to when the first triggering command is received, right in the db transaction
The configuration data performs first subfunction;
Second monitors submodule, is the configuration data for working as the result that first subfunction is performed to the configuration data
During by secure authentication and mutually exclusive authentication, the second triggering command is sent to the business description submodule;
The business description submodule, is additionally operable to, when second triggering command is received, to the configuration data institute be performed
The second subfunction is stated, and when the result that second subfunction is performed to the configuration data is that the configuration data is legal,
3rd subfunction is performed to the configuration data;
3rd monitors submodule, for after the 3rd subfunction runs succeeded, sending the 3rd triggering command to the business
Description submodule;
The business description submodule, is additionally operable to, when three triggering command is received, to the configuration data institute be performed
State the 4th subfunction;
4th monitors submodule, for after the 4th subfunction runs succeeded, sending the 4th triggering command to the business
Description submodule;
The business description submodule, is additionally operable to, when four triggering command is received, to the configuration data institute be performed
State the 5th subfunction.
8. device is realized as claimed in claim 7, it is characterised in that
The business description submodule, be additionally operable to it is nested to the related data of the configuration data perform second subfunction,
3rd subfunction and the 4th subfunction, all related data until having processed the configuration data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110179729.6A CN102857357B (en) | 2011-06-29 | 2011-06-29 | Method and device for implementing network management configuration |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110179729.6A CN102857357B (en) | 2011-06-29 | 2011-06-29 | Method and device for implementing network management configuration |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102857357A CN102857357A (en) | 2013-01-02 |
CN102857357B true CN102857357B (en) | 2017-04-26 |
Family
ID=47403567
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201110179729.6A Active CN102857357B (en) | 2011-06-29 | 2011-06-29 | Method and device for implementing network management configuration |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102857357B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105550178A (en) * | 2014-10-29 | 2016-05-04 | 中兴通讯股份有限公司 | Database processing method and device and system |
CN105915372B (en) * | 2016-04-07 | 2018-11-30 | 烽火通信科技股份有限公司 | Provisional configuration management system and method based on automatic rollback |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6115715A (en) * | 1998-06-29 | 2000-09-05 | Sun Microsystems, Inc. | Transaction management in a configuration database |
CN1703007A (en) * | 2004-02-20 | 2005-11-30 | 国际商业机器公司 | Method, system for checking and repairing a network configuration |
CN1964273A (en) * | 2005-11-10 | 2007-05-16 | 华为技术有限公司 | A method to interact service configuration information |
CN101163043A (en) * | 2007-11-08 | 2008-04-16 | 华为技术有限公司 | Network management function configuring method and system |
CN101178665A (en) * | 2007-12-06 | 2008-05-14 | 华为技术有限公司 | Method and apparatus for realizing configuring affair |
CN101340688A (en) * | 2007-07-04 | 2009-01-07 | 中兴通讯股份有限公司 | Configuration script configuring method based on strip operation tag in network management system |
-
2011
- 2011-06-29 CN CN201110179729.6A patent/CN102857357B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6115715A (en) * | 1998-06-29 | 2000-09-05 | Sun Microsystems, Inc. | Transaction management in a configuration database |
CN1703007A (en) * | 2004-02-20 | 2005-11-30 | 国际商业机器公司 | Method, system for checking and repairing a network configuration |
CN1964273A (en) * | 2005-11-10 | 2007-05-16 | 华为技术有限公司 | A method to interact service configuration information |
CN101340688A (en) * | 2007-07-04 | 2009-01-07 | 中兴通讯股份有限公司 | Configuration script configuring method based on strip operation tag in network management system |
CN101163043A (en) * | 2007-11-08 | 2008-04-16 | 华为技术有限公司 | Network management function configuring method and system |
CN101178665A (en) * | 2007-12-06 | 2008-05-14 | 华为技术有限公司 | Method and apparatus for realizing configuring affair |
Also Published As
Publication number | Publication date |
---|---|
CN102857357A (en) | 2013-01-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103544074B (en) | The method of calibration of a kind of business and device | |
CN104391934B (en) | Data verification method and device | |
US7916925B2 (en) | System and method for generating magnetic ink character recognition (MICR) testing documents | |
CN102355461B (en) | XBRL (Extensible Business Reporting Language) credible data storage method and credible data storage system | |
CN106570406A (en) | Data level permission configuration method and device | |
CN102013083A (en) | Method and system for generating emergency action plan based on pre-arranged plan | |
CN102044008A (en) | Contract management information system | |
CN109034616A (en) | A kind of statistical analysis system based on intelligent substation configuration data control | |
CN103793399A (en) | Method for integrating information resources of system of politics and law | |
CN104077530A (en) | Method and device used for evaluating safety of data access sentence | |
CN106503974A (en) | Transaction data processing method and device | |
CN103077019B (en) | A kind of graphical parameter batch maintenance method and device | |
CN104965781A (en) | Method and apparatus for generating test case | |
CN105978147A (en) | File interaction based remote constant value amending system for automatic safety devices | |
CN102857357B (en) | Method and device for implementing network management configuration | |
CN106570684A (en) | Information changing method and information changing device | |
CN116563065A (en) | Intelligent test question processing method, system, storage medium and electronic equipment | |
CN116841980A (en) | Bank data processing system | |
CN105913226B (en) | Nuclear power plant's operation support system based on intelligent voice prompt | |
CN106447181A (en) | Analysis method and device based on timeliness of ERP business approval | |
Martinelli et al. | Model checking based approach for compliance checking | |
CN107045542A (en) | Data query system and querying method | |
CN112907233A (en) | Management method, device, equipment and storage medium of high availability scheme | |
CN105303050A (en) | Fault information storage method and system of medical equipment | |
KR102676516B1 (en) | Apparatus and Method for Providing Intelligent Task Automation Service |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |