A kind of LTE network base station element configuration data acquisition methods
Technical field
The present invention relates to mobile communications network management field, more particularly, to a kind of quick obtaining LTE network base station network element
The method of configuration data.
Background technology
Current LTE network base station network element device(eNodeB)Operational factor is obtained by LTE-eNodeB network element configuration files
Take, but a prefecture-level network generally there are about 100-10000 eNodeB network element, and configuration file is various, and each file
It is required for full dose to parse, extracts and parsing is wasted time and energy, generally more than 2 hours, it is difficult to obtain network operational parameter in real time.
Traditional LTE-eNodeB data capture methods mainly include:
(1) data are read according to network element configuration file
Network element configuration file generated order is sent to all eNodeB by OMC webmasters, after 100% performs, then passes through OMC
FTP agent functionalitys collect eNodeB network element configurations file to local disk.Then by the eNodeB network element configurations being collected into text
Part is parsed one by one, is collected the parameter configuration data needed, is aggregated into result document to use.
(2) network management database data are extracted
Network management database, timing acquiring element configuration data, network management database collection network element configuration are set up in OMC webmasters side
Data can be using full dose collection and incremental crawler mode, and user needs directly extract database number when obtaining element configuration data
According to using, this method is ageing poor.
(3) special-purpose software is used
The special-purpose software provided using equipment manufacturer, is generally required and pays high mandate expense, using special-purpose software still
Need by being used after extracting eNodeB network element configuration files, ageing not strong, the data class of special-purpose software output is consolidated in addition
Fixed, form is fixed, it is impossible to updated at any time according to demand, and limitation is higher.
Current technology method, mainly has the disadvantage that:
1. collect substantial amounts of network element configuration file, process and its cumbersome:The eNodeB network element configuration file types being collected into
For TXT or XML file, each eNodeB element configuration datas are deposited in a file, although network element configuration file format is
Based on standardization(XML specification)File, but need to carry out whole parsings to each file, could be by the Data Collection of needs
Arrive, wasted time and energy for the collection of whole network data.
2. use incremental update database mode, though reduce the operation of database, need carry out database data with
Still need to extract whole element configuration datas before just can determine that increment content, contrast after the contrast of element configuration data, and
Contrast link is added, efficiency is not solved effectively.
3. can not be according to the flexible output result of user's request.
4. without appropriate data encryption process, it may be leaked when extracting configuration data, there is potential safety hazard.
State Intellectual Property Office of the People's Republic of China disclosed application publication number on 01 07th, 2009
CN101340316A patent document, title is a kind of method and device that network element data is uploaded to network management database, described
Method includes step:Obtain the list of data items to be uploaded;According to the list of data items to be uploaded, from network management database
Inquiry obtains the configuration data of corresponding data items, and inquiry obtains the configuration data of corresponding data items from network element, to both
It is compared, constructing corresponding data increment according to comparative result notifies to wrap;The content of bag is notified according to the data increment
Corresponding operation is performed to network management database, the increment storage of network element data is realized.Described device is obtained including list of data items
Module, network management database enquiry module, network element enquiry module, increment notify constructing module and synchronization module.This scheme is still deposited
In foregoing a variety of weak points.
The content of the invention
Flexibility of the present invention mainly present in solution prior art be not high, the skill that extraction rate is slow, security is low
There is provided a kind of convenient and swift, identification process intelligence degree height, a kind of LTE network that customizability is strong, security is good for art problem
Base station element configuration data acquisition methods.
The present invention is mainly what is be addressed by following technical proposals for above-mentioned technical problem:A kind of LTE network base
Stand element configuration data acquisition methods, comprise the following steps:
S1, keeper's setting data type;
S2, network management center's server based on data type generation command script, and obtained by running command script from base
Network element of standing obtains message;
S3, network management center's server read configuration data from message.
Preferably, the step S1 is specially:
The data type that S11, keeper's selection need, inserts self-defined form, this step is mainly obtained from definition and set
Put;
S12, network management center's server read from definition tables, and analysis deciphering is carried out to keyword, understand result and deposit one by one
Enter two-dimensional array, the first dimension of two-dimensional array is data items, and the second dimension is data type, and two-dimensional array is change long number
Group, is primarily due to customized data type and project is all indefinite, therefore needs elongated data.
Preferably, the step S12 is specially:
S121, read from definition tables:Network management center's server reads from User Defined Data Position in definition tables
The data line in area, places data into memory variable;
S122, keyword search:Data Matching data type mark in memory variable, if data are empty or lattice
Formula is incorrect, then it is assumed that without keyword, directly terminate;If there is keyword, into step S123;
S123, data type mark storage:The length of the two-dimensional array of data type feature database is first increased into by one, then general
The two-dimensional array of the data type feature database for the data type mark deposit being fitted on;
S124, Data Entry detection:Detect whether current read data row is subsequently provided with Data Entry mark, if do not had
There is setting then to jump to step S122;Finished if there is provided representing that one's own profession is read if Data Entry mark, into step S125;
S125, by Data Entry mark be stored in a two-dimensional array;
S126, into next line data, jump to step S121, circulation is read until all self-defined settings have been read
Finish.
The multiple different two-dimensional arrays of storage can be previously set in data type feature database, it is as needed during actual extracting
Directly select satisfactory use.
Preferably, the step S2 is specially:
S21, by the way that the two-dimensional array in data type feature database is matched with command database, generation can be in webmaster
The command script performed on central server;
S22, command script is input on network management center's server and performs;
S23, perform command script on network management center's server, send data and fetch instructions into base station network element, base station net
Member extracts instruction according to data and sends corresponding message to network management center's server, and message is stored in this earth magnetism by network management center's server
Disk.
Preferably, the step S21 is specially:
S211, reading data type feature database:By the digital independent of data type feature database into memory array;
S212, the detection of data type feature database:Check in data type feature database whether there are data one by one, if there are data
Next step is then carried out, is terminated if no data;
S213, order data matching:The data type mark in data type feature database is read, and in command database
Mark is matched, record matching result;
S214, matching result processing:Matching result is handled, records unmatched if matching result is mismatches
Data type, if matching result is matching, records order data;
S215, the command script data feedback user by calculating:All order datas that 214 steps are obtained are with order pin
This form feeds back to user, if while there is abnormal data, making prompting.
Preferably, the step S3 is specially:
S31, network management center's server obtain message storage path by user's interactive mode;
S32, a line of text is read to interim memory variable;
Data type tag match in S33, a line text and data type feature database that step S32 is read, if
Mismatch and then continue to read next line data, all data are run through, and read next message;If result is matched, into step
S34;
S34, it will all be stored in a variable from data type mark to the text current message end mark;
S35, by judging the reading of current message, judge its data Storage Format, and according to data Storage Format pair
Current message is split according to separator, after segmentation, the data items mark in data type feature database, reads corresponding
Data into memory variable;
S36, valid data in memory variable are stored in electrical form, form destination file;
S37, judge whether all messages read and finish, finish, then read if not reading, until run through, after running through,
Data result file is showed, whole flows terminate.
Preferably, the step S35 is specially:
S351, preparation message text variable:Get out the text variable that step S34 is obtained, it is ensured that text variable is present;
S352, data Storage Format are checked:Judged by the reading to current message, check it whether containing specific symbol
Number, judge its data Storage Format;
S353, processing data Storage Format inspection result:Data Storage Format is numbered, the variable specified is put into;
S354, judge whether data type feature database is complete:Data characteristics according to belonging to current message, to the data class
Data items mark in type feature database is checked;
S355, improve data characteristics storehouse:The numbering of message data Storage Format is read, according to the difference of numbering, to message
Data are split, and read data items therein, judge the next target will of its data, deposit data characteristics storehouse;
S356, target data reading:The numbering of message data Storage Format is read, according to the difference of numbering, to message
Data are split, first matched data Item Mark, whether are matched according to it with data items mark in data characteristics storehouse,
The reading of target data is solved, corresponding data are read if matching, prompt message is provided if mismatching, it is wrong for checking
By mistake.
Preferably, in the step S23, the data transfer between network management center's server and base station network element is by adding
Close, specific cipher mode is:Network management center's servernIndividual unduplicated random number, is designated asK 1 ,K 2 ... ...,K n , store above-mentioned
Random number sequence, often increases a base station network element, this random number sequence is preserved in the network element of base station;Network management center's server is sent
When data extract instruction, a number is randomly selected from random number sequenceK i , 1≤i≤nThen three data extractions are continuously transmitted
Instruction, a length of K when sending interval for the first time and for the second timeiMillisecond, second and third time send duration at intervals ofK i+1 , wheni=n
When, orderK i+1 =K 1 ;Base station network element receives three data and extracted after instruction, calculates adjacent data twice and extracts connecing between instructing
Interval is received, the interval between second is designated as T1 for the first time, and the interval between second and third time is T2, then from guarantor
T1 is searched in the random number sequence deposited, this three data are ignored if not finding and extract instruction;Contrasted if finding random
Whether T1 latter position is T2 in Number Sequence, if it is, representing that data extraction command source is legal, sends message into webmaster
Central server, if T1 latter position and T2 are unequal in random number sequence, assert that data extraction command source is illegal, neglects
Slightly this three data extract instruction.
Preferably, message is encrypted when sending message to network management center's server for base station network element, it is used
Key is as follows:The tail end for extracting instruction in data is addedK i+2 List entries is obtained, the hash value of list entries, this Hash is calculated
It is worth the key as encrypted message.
For LTE network, the connection between network management center's server and base station network element is more fixed, and data transmission is prolonged
It is usually late a stationary value, will not fluctuates easily.So can be judged by the interval between detection twice instruction
Whether information source is legal, effectively prevent and disguises oneself as network management center's server to gain element configuration data by cheating, even in legal
Network management center's server extract data when to data carry out interception steal, also due to no random number sequence and can not crack plus
It is close.The conventional cryptographic fashions such as AES can be used to the cipher mode of message.
The random number generally generated is positive integer, and scope is more suitable between 50 to 1000, and n is typically no less than 100.
This programme customizes the data needed by user, automatically generates the Network Management and Maintenance related to obtaining demand data and operates
Order, by performing related command, the message of network element feedback can be obtained in real time.Compared to network element configuration file is extracted, report is used
The benefit of text is that it is only related to demand data, and network element configuration file is a kind of full dose file, not only the data comprising demand,
And comprising largely with the incoherent data of demand, therefore the utilization rate of message is high, and on ageing, network element enters to related command
Row is returned in real time, and configuration file needs certain generation time, therefore message is ageing high.
The most important part of the present invention is the identification of intelligent message data, and message is usually text formatting document, with form text
Part is compared, data format uniformity shortcoming, by contextual relation, the scope of special network element data is quickly defined, effective
Intelligent depth parsing is carried out to network management data in data area, by the quick traversal of file, all numbers of user's customization are obtained
According to, and it is user-defined form that data format, which is intelligently arranged,.
Compared with the existing technology, this method has the advantage that:
1st, data collection rate is fast, is collected only for required data, and execution efficiency is high;
2nd, based on adaptive analytic method, data needed for being presented in user-defined form, and complete essence
Really;
3rd, the file that data are directly rendered as the operable form of user is obtained.
The substantial effect that the present invention is brought is that convenient and swift, identification process intelligence degree is high, customizability is strong, peace
Good perfection, by EXCEL-VBA implementation tool entities, can be achieved to obtain network wide parameters in 1-5 minutes, and be rendered as user
Spreadsheet format data.
Brief description of the drawings
Fig. 1 is a kind of general flow chart of the present invention;
Fig. 2 is a kind of setting data type flow chart of the present invention;
Fig. 3 is a kind of Receive message flow chart of the present invention;
Fig. 4 is a kind of digital independent flow chart of the present invention.
Embodiment
Below by embodiment, and with reference to accompanying drawing, technical scheme is described in further detail.
Embodiment:A kind of LTE network base station element configuration data acquisition methods of the present embodiment, as shown in figure 1, including with
Lower step:S1, keeper's setting data type;
S2, network management center's server based on data type generation command script, and obtained by running command script from base
Network element of standing obtains message;
S3, network management center's server read configuration data from message.
As shown in Fig. 2 step S1 is specially:
The data type that S11, keeper's selection need, inserts self-defined form, this step is mainly obtained from definition and set
Put;
S12, network management center's server read from definition tables, and analysis deciphering is carried out to keyword, understand result and deposit one by one
Enter two-dimensional array, the first dimension of two-dimensional array is data items, and the second dimension is data type, and two-dimensional array is change long number
Group, is primarily due to customized data type and project is all indefinite, therefore needs elongated data.
Step S12 is specially:
S121, read from definition tables:Network management center's server reads from User Defined Data Position in definition tables
The data line in area, places data into memory variable;
S122, keyword search:Data Matching data type mark in memory variable, if data are empty or lattice
Formula is incorrect, then it is assumed that without keyword, directly terminate;If there is keyword, into step S123;
S123, data type mark storage:The length of the two-dimensional array of data type feature database is first increased into by one, then general
The two-dimensional array of the data type feature database for the data type mark deposit being fitted on;
S124, Data Entry detection:Detect whether current read data row is subsequently provided with Data Entry mark, if do not had
There is setting then to jump to step S122;Finished if there is provided representing that one's own profession is read if Data Entry mark, into step S125;
S125, by Data Entry mark be stored in a two-dimensional array;
S126, into next line data, jump to step S121, circulation is read until all self-defined settings have been read
Finish.
The multiple different two-dimensional arrays of storage can be previously set in data type feature database, it is as needed during actual extracting
Directly select satisfactory use.
As shown in figure 3, step S2 is specially:
S21, by the way that the two-dimensional array in data type feature database is matched with command database, generation can be in webmaster
The command script performed on central server;
S22, command script is input on network management center's server and performs;
S23, perform command script on network management center's server, send data and fetch instructions into base station network element, base station net
Member extracts instruction according to data and sends corresponding message to network management center's server, and message is stored in this earth magnetism by network management center's server
Disk.
Step S21 is specially:
S211, reading data type feature database:By the digital independent of data type feature database into memory array(If data
Type feature storehouse array is not discharged, and the step can be omitted);
S212, the detection of data type feature database:Check in data type feature database whether there are data one by one, if there are data
Next step is then carried out, is terminated if no data;
S213, order data matching:The data type mark in data type feature database is read, and in command database
Mark is matched, record matching result;
S214, matching result processing:Matching result is handled, records unmatched if matching result is mismatches
Data type, if matching result is matching, records order data;
S215, the command script data feedback user by calculating:All order datas that 214 steps are obtained are with order pin
This form feeds back to user, if while there is abnormal data, making prompting.
As shown in figure 4, step S3 is specially:
S31, network management center's server obtain message storage path by user's interactive mode;
S32, a line of text is read to interim memory variable;
Data type tag match in S33, a line text and data type feature database that step S32 is read, if
Mismatch and then continue to read next line data, all data are run through, and read next message;If result is matched, into step
S34;
S34, it will all be stored in a variable from data type mark to the text current message end mark;
S35, by judging the reading of current message, check whether it contains specific symbol, judge that its data is deposited
Form, generally comprises horizontal table, vertical table, mixture table, also has some considerably complicated forms, by the difference of feature, to current report
Text is split according to specific separator, general horizontal table is split using double spaces, vertical table use equal to number and colon divided
Cut, form is not limited to these, segmentation symbol can be adjusted, reach the purpose for being partitioned into valid data, after segmentation, root
According to the data items mark in data characteristics storehouse, corresponding data are read into memory variable;
S36, valid data in memory variable are stored in electrical form, form destination file;
S37, judge whether all messages read and finish, finish, then read if not reading, until run through, after running through,
Data result file is showed, whole flows terminate.
Step S34 is specially:
S341, reading message text
A line message text is read every time, is output in memory variable;
S342, the message ends Mark Detection
By checking line by line, stop when running into the message ends mark, the text that will be output to before in memory variable
Notebook data is collected, and obtains a long text.
Step S35 is specially:
S351, preparation message text variable:Get out the text variable that step S34 is obtained, it is ensured that text variable is present;
S352, data Storage Format are checked:Judged by the reading to current message, check it whether containing specific symbol
Number, judge its data Storage Format, generally comprise horizontal table, vertical table, mixture table, also have some considerably complicated forms;
S353, processing data Storage Format inspection result:Data Storage Format is numbered, the variable specified is put into;
S354, judge whether data type feature database is complete:Data characteristics according to belonging to current message, it is special to the data
The data items mark levied in storehouse is checked that if it is empty data items mark then shows in current data feature database without current
The data items flag data of message, then can not carry out target data matching.If inspection result is not sky, it is possible to carry out target
Data Matching;
S355, improve data characteristics storehouse:The numbering of message data Storage Format is read, according to the difference of numbering, to message
Data are split, and read data items therein, judge the next target will of its data, deposit data characteristics storehouse;
S356, target data reading:The numbering of message data Storage Format is read, according to the difference of numbering, to message
Data are split, first matched data Item Mark, whether are matched according to it with data items mark in data characteristics storehouse,
The reading of target data is solved, corresponding data are read if matching, prompt message is provided if mismatching, it is wrong for checking
By mistake.
In step S23, the data transfer between network management center's server and base station network element is by encryption, specific cipher mode
For:Network management center's servernIndividual unduplicated random number, is designated asK 1 ,K 2 ... ...,K n , above-mentioned random number sequence is stored, is often increased
Plus a base station network element, this random number sequence is preserved in the network element of base station;When network management center's server sends data extraction instruction,
A number is randomly selected from random number sequenceK i , 1≤i≤nThen three data are continuously transmitted and extract instruction, for the first time with the
It is secondary to send a length of K when being spacediMillisecond, second and third time send duration at intervals ofK i+1 , wheni=nWhen, orderK i+1 =K 1 ;Base station
Network element receives three data and extracted after instruction, calculates adjacent data twice and extracts reception interval between instruction, for the first time and
Interval between second is designated as T1, and the interval between second and third time is T2, then from the random number sequence of preservation
Middle lookup T1, this three data are ignored if not finding and extract instruction;Contrasted if finding in random number sequence after T1
Whether one be T2, if it is, representing that data extraction command source is legal, sends message to network management center's server, if
T1 latter position and T2 are unequal in random number sequence, then assert that data extraction command source is illegal, ignore this three data
Extract instruction.
Base station network element message is encrypted, used key is as follows when sending message to network management center's server:
The tail end for extracting instruction in data is addedK i+2 List entries is obtained, the hash value of list entries is calculated, this hash value is used as encryption
The key of message.
The random number of generation is positive integer, and scope is more suitable between 50 to 1000, and n is typically no less than 100.
Specific embodiment described herein is only to spirit explanation for example of the invention.Technology neck belonging to of the invention
The technical staff in domain can be made various modifications or supplement to described specific embodiment or be replaced using similar mode
Generation, but without departing from the spiritual of the present invention or surmount scope defined in appended claims.
Although more having used the terms such as network element, data type, message, random number herein, it is not precluded from using it
The possibility of its term.It is used for the purpose of more easily describing and explaining the essence of the present invention using these terms;They are solved
Any additional limitation is interpreted into all to disagree with spirit of the present invention.