Background technology
Along with the development of operator's full-service operation, network size constantly expands, and network configuration is day by day complicated.Especially bringing of 4G epoch, need to include LTE equipment in webmaster, meet the Network Management and Maintenance demand of LTE network, when LTE networking completes, webmaster can provide perfect O&M supporting method, the complexity of network is safeguarded and has been proposed new requirement network management, for the data Layer of bottom, no longer require to realize all management application at this layer, but emphasize more the availability of interface and data.In maintenance process, because of LTE equipment networking Applicative time not long, especially operation maintenance center of OMC(maintenance centre) northbound interface is also unstable, often find that data are imperfect, problem not in time, the requirement that the north direction interface data quality of entirety does not reach webmaster, and often cannot carry out positioning problems, cause the availability of network management system to decline, if network management data is of low quality, cause confidence level to decline, traffic affecting management.
The importance of the quality of data is not second to business function, and the quality of data is the important leverage that business runs well.Whether O&M personnel often query the data that obtain from network management system complete, accurate, credible, finally affect service fulfillment efficiency, as resource data inaccuracy, upgrade not in time, cause equipment or port information can not truly reflect current service condition, have a strong impact on opening and using of business.
Data quality management need to be served as daily work, just as service system is processed business every day, carry out the routine work of data management every day, therefore need to set up a closed loop management mechanism, find in time, analyze, revise data, promote the availability of whole data, build one automatically, the quality of data monitoring system of closed loop is imperative.
The at present monitoring of the quality of data is mainly by mode artificial or that combine with part IT means, but in default of a complete monitoring system and method, monitors at present efficiency and effect all undesirable.
Therefore need to promote monitoring by an automated method and promote the quality of data, and give full play to the value that data produce, promote service ability, reduce O&M cost, guarantee Cybersecurity Operation, for business development provides strong support.
Summary of the invention
For evade monitoring dimension not, analysis depth and the inadequate problem of range, the mode of the present invention from adopting multiple dimensions to monitor one by one, in conjunction with the O&M experience of safeguarding to OMC northbound interface and the requirement of the quality of data of network management system to northbound interface for a long time, connectedness to northbound interface, promptness, integrality, validity are monitored in conjunction with the accuracy of index, set up active data quality monitoring mechanism, find by monitoring the problem that north direction interface data quality is potential, provide quality of data report timely comprehensively, the expansion of prevention and control error range.
The technical solution adopted in the present invention is as follows:
The quality of data of operation maintenance center of the maintenance centre northbound interface that can configure is a method for monitoring automatically, specifically comprises the following steps:
The connectedness monitoring of A, data-interface, the cycle sends packet to monitored interface, and interface is received rear timely return information, represents that Interface status is normal, records return time delay simultaneously and returns results;
B, the monitoring of data promptness, be that the promptness of northbound interface generation data report is checked, whether inspection north direction interface data source produces on request data, formed corresponding data report file;
The monitoring of C, data integrity, checks in north direction interface data report whether comprise network element and the data type that all configurations gather, and the network element number contrast that the network element number configuring in metadata management and existing network are collected, counts access ratio;
D, data validity monitoring, whether the data object that inspection northbound interface provides is effective;
E, data accuracy monitoring, for wireless parameter, performance data, measurement report parameter value, can carry out the interval setting of reasonability; For the data that exceed reasonability interval, provide abnormal early warning, reason in time notes abnormalities; For the value of key index in different inspection items, set the threshold value of corresponding index, threshold value definition has the upper limit, lower threshold definition; Index arranges multiple threshold intervals according to the different periods, to demonstrate different abnormal ranks;
F, the monitoring result of northbound interface is carried out to record, problem is classified; Form the quality of data report of northbound interface, formed quality of data knowledge base according to the processing summary of experience of the relevant data of collecting and Process Problems.
In steps A, the packet return time delay of transmission exceedes 5s without returning, and represents that interface is connective undesired at present.
In step B, the length that produces the cycle according to data claims to different cycles data delay, if the time delay that report produces is greater than the value of delay requirement and occurs data delay, the data report file time delay thresholding that configures Various types of data in metadata management, carries out early warning timely for the data that exceed time delay thresholding.
In step C, need to ensure the integrality of image data, enter filling mining flow process for the data that do not collect, require the first collection percentage of head rice of Various types of data to be at least 98%, after filling mining, reach 100%.
In step C, Integrity Verification not only checks for the integrality of network element number, the data type taking network element as unit in data report is verified the integrality of statistics network element data simultaneously, the first percentage of head rice of data that gathers network element is at least 95%, reaches 100% after filling mining.
In step D, whether the data object that inspection northbound interface provides effectively comprises following content:
A, file content comprise file header and file body two parts; File need to have the mark that significantly starts and finish;
Whether b, data object form meet standard-required;
Whether c, interface document and interface description document conform to;
Whether d, report file order of the field be consistent with standard;
Whether whether e, attribute field lack and record lacks;
Whether f, data value be within the scope of the codomain defining, and whether data format, type and business rule be consistent;
Carry out in time early warning for the data that do not meet validity rule, the first validity gathering of data at least will reach more than 99%, carries out filling mining again for invalid data, and after filling mining, data validity reaches 100%.
In step F, Question Classification is divided into following three classes:
The problem that a, monitoring generate;
The problem that b, assessment are found;
C, the manual problem of submitting to.
LTE: be 3GPP(3rd Generation Partnership Project) Long Term Evolution (Long Term Evolution) of leading universal mobile telecommunications system technology
OMC: network operation maintenance centre
Northbound interface: the interface of access and management
Network element: the equipment in network, the least unit that can monitor and manage in network management
Metadata: the data of data of description, data of description attribute (property) information, is used to refer to the Management and application of the attributes such as Data Source, data type, the data term of validity and validity etc.
Connective: data-interface can normally connect, login, to asking timely response
Promptness: refer to the promptness of data acquisition, transmission, processing, loading, wherein the link of most critical is to gather.Gather promptness and investigate the promptness that data are prepared, contain source data transmission and obtain promptness etc.
Integrality: refer to that whether data are complete, Data Elements, key element attribute and the element relationship of description exist or do not exist, mainly comprises entity disappearance, attribute disappearance, record disappearance etc.
Validity: whether data of description value within the scope of the codomain defining, mainly comprises the validity of form, type, codomain and business rule.The rule of validity can arrange in metadata management module.
Accuracy: the accuracy that is mainly index algorithm, data handling procedure.This accuracy is mainly that the mode that algorithm, data processing sequence and the hand inspection of the index by defining in metadata management combines ensures.
The present invention is to northbound interface long-time maintenance experience, and various dimensions, various visual angles are analysed in depth and combined LTE(Long Term Evolution Long Term Evolution simultaneously) webmaster realized the docking port quality of data to the requirement of northbound interface and carried out omnibearing monitoring.From the connectedness of interface, can login row, docking port is monitored, not only realize the analysis of the data report of interface own, and the content of report is carried out to the analysis of various dimensions, especially the data target in report is carried out to analysis of the accuracy, greatly promoted the transparency of data, energy is locator data problem accurately, finds the root of data problem.Can in time, automatically, initiatively pinpoint the problems, avoid analyzing again the low situation of search efficiency afterwards, by information-based means, realize automation and the standardization safeguarded; By feature the classification of summary data, different classes of data are taked respectively to different maintenance measures, given full play to the disposal ability of IT system, realize the automated maintenance of system, and the quality of data is presented to end user, make the application of data more have reliability.Realize closed loop hidden danger management, to reach the target of " safe operation takes preventive measures ".
The beneficial effect that technical scheme provided by the invention is brought is:
1,, by automatic monitoring method, realized the data integrity of network management data, lacked without field, and conformed to existing network network element actual disposition quantity; All configurations all have corresponding data, and data are accurate, truly reflect existing network actual motion state, and data all can complete to gather and process and present in regulation time delay, reflect in time existing network actual state;
2, promoted the O&M efficiency of network element, improved the stability of network, for the stable operation of network provides strong support.Reduce maintenance cost, improved operating efficiency;
Even if 3 new network elements network after application, only add corresponding configuration rule and read service data and just can realize automatic monitoring in configuration, thering is good autgmentability, by this kind of method and system, improve greatly operating efficiency, reduced attendant's workload.
Embodiment
For making the object, technical solutions and advantages of the present invention clearer, below in conjunction with accompanying drawing, embodiment of the present invention is described further in detail.
Embodiment mono-
As shown in Figure 1, the method for the present embodiment comprises the following steps:
1, carry out rule configuration for Monitoring Rules and metadata management.Centered by monitored object, carry out rule configuration from the whole process of data type, data item, collection, processing, comprising:
The configuration of A, collection source, deploy content is as following table:
ID |
DSN |
Data source protocol type |
Server ip |
Port numbers |
Login username |
Entry password |
? |
? |
? |
? |
? |
? |
? |
The configuration of B, collection rule, deploy content is as following table:
ID |
Data type |
Data report type |
The acquisition granularity |
Delay requirement |
? |
? |
? |
? |
? |
C, check rule configuration, deploy content is as following table:
ID |
Data type |
Data report type |
The acquisition granularity |
Delay requirement |
Need to gather NE quantity |
Need acquisition target quantity |
The quantity that comprises index |
? |
? |
? |
? |
? |
? |
? |
? |
D, extremely need the rule configuration of alarm for checking, deploy content is as follows:
ID |
Check rule ID |
Abnormality alarming content keyword |
Alarm presentation mode |
? |
? |
? |
? |
2, northbound interface connectivity checks, from allocation list, read out the configuration data that needs the data source detecting, according to the connectedness of the IP address of the content detection northbound interface of configuration data, periodically the IP to northbound interface of (cycle is generally set as 1 minute) gives out a contract for a project (ping), records time delay and returns results.Testing result enters database.
The data source connectivity checks table that thes contents are as follows:
ID |
DSN |
Data source protocol type |
Server ip |
Detection time |
Type of detection |
Be communicated with time delay |
Packet loss |
Be communicated with result |
? |
? |
? |
? |
? |
? |
? |
? |
? |
3, data source promptness checks, from the rule of configuration, read out the source cycle and the delay requirement that need to detect data, the promptness that data source (northbound interface) is produced to data report checks, detects and whether produces on request data, formed corresponding data report file.
The timely scope of examination of data is as following table: (note: for exceeding the file generating not yet for 12 hours, be not labeled as and do not generate)
ID |
DSN |
Data source protocol type |
Server ip |
Dataset name |
Data volume indicates |
The data time started |
The ED time |
Detection time |
Data generate sign on time |
The data rise time |
? |
? |
? |
? |
? |
? |
? |
? |
? |
? |
? |
4, data integrity inspection, checks in north direction interface data report whether comprise network element and the data type that all configurations gather, and the NE No. that existing network actual acquisition arrives contrasts.
The data integrity scope of examination is as following table:
ID |
DSN |
Dataset name |
Tables of data title |
The data time started |
The ED time |
Detection time |
Actual NE No. |
Configuring network element |
Difference NE No. |
? |
? |
? |
? |
? |
? |
? |
? |
? |
? |
5, data validity inspection, checks whether north direction interface data report service data object and data format, file format etc. are effective.
The data validity scope of examination is as following table:
ID |
DSN |
Dataset name |
Tables of data title |
Data item title |
The data time started |
The ED time |
Data item effectively indicates |
Data item actual value |
? |
? |
? |
? |
? |
? |
? |
? |
? |
6, data accuracy monitoring, for wireless parameter, resource data, performance data, MR parameter value, can carry out the interval setting of reasonability; For the data that exceed reasonability interval, provide abnormal early warning, reason in time notes abnormalities.
Data accuracy Detection of content is as following table:
ID |
DSN |
Dataset name |
Tables of data title |
Data target title |
The data time started |
The ED time |
Data target accurately indicates |
Data target actual value |
Index allocation scope |
? |
? |
? |
? |
? |
? |
? |
? |
? |
? |
The foregoing is only preferred embodiment of the present invention, in order to limit the present invention, within the spirit and principles in the present invention not all, any amendment of doing, be equal to replacement, improvement etc., within all should being included in protection scope of the present invention.