CN104135737B - A kind of LTE network base station element configuration data acquisition methods - Google Patents

A kind of LTE network base station element configuration data acquisition methods Download PDF

Info

Publication number
CN104135737B
CN104135737B CN201410210966.8A CN201410210966A CN104135737B CN 104135737 B CN104135737 B CN 104135737B CN 201410210966 A CN201410210966 A CN 201410210966A CN 104135737 B CN104135737 B CN 104135737B
Authority
CN
China
Prior art keywords
data
message
base station
read
management center
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410210966.8A
Other languages
Chinese (zh)
Other versions
CN104135737A (en
Inventor
高鹏
倪国华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZHEJIANG MINGXUN NETWORK TECHNOLOGY Co Ltd
Original Assignee
ZHEJIANG MINGXUN NETWORK TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZHEJIANG MINGXUN NETWORK TECHNOLOGY Co Ltd filed Critical ZHEJIANG MINGXUN NETWORK TECHNOLOGY Co Ltd
Priority to CN201410210966.8A priority Critical patent/CN104135737B/en
Publication of CN104135737A publication Critical patent/CN104135737A/en
Application granted granted Critical
Publication of CN104135737B publication Critical patent/CN104135737B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a kind of LTE network base station element configuration data acquisition methods, it comprises the following steps:S1, keeper's setting data type;S2, network management center's server based on data type generation command script, and obtained by running command script from base station network element acquisition message;S3, network management center's server read configuration data from message.This programme extracts element configuration data by way of command script, and gathering speed is fast, and efficiency high, the data of acquisition are completely accurate, can be presented directly to user.This programme is managed suitable for LTE network.

Description

A kind of LTE network base station element configuration data acquisition methods
Technical field
The present invention relates to mobile communications network management field, more particularly, to a kind of quick obtaining LTE network base station network element The method of configuration data.
Background technology
Current LTE network base station network element device(eNodeB)Operational factor is obtained by LTE-eNodeB network element configuration files Take, but a prefecture-level network generally there are about 100-10000 eNodeB network element, and configuration file is various, and each file It is required for full dose to parse, extracts and parsing is wasted time and energy, generally more than 2 hours, it is difficult to obtain network operational parameter in real time.
Traditional LTE-eNodeB data capture methods mainly include:
(1) data are read according to network element configuration file
Network element configuration file generated order is sent to all eNodeB by OMC webmasters, after 100% performs, then passes through OMC FTP agent functionalitys collect eNodeB network element configurations file to local disk.Then by the eNodeB network element configurations being collected into text Part is parsed one by one, is collected the parameter configuration data needed, is aggregated into result document to use.
(2) network management database data are extracted
Network management database, timing acquiring element configuration data, network management database collection network element configuration are set up in OMC webmasters side Data can be using full dose collection and incremental crawler mode, and user needs directly extract database number when obtaining element configuration data According to using, this method is ageing poor.
(3) special-purpose software is used
The special-purpose software provided using equipment manufacturer, is generally required and pays high mandate expense, using special-purpose software still Need by being used after extracting eNodeB network element configuration files, ageing not strong, the data class of special-purpose software output is consolidated in addition Fixed, form is fixed, it is impossible to updated at any time according to demand, and limitation is higher.
Current technology method, mainly has the disadvantage that:
1. collect substantial amounts of network element configuration file, process and its cumbersome:The eNodeB network element configuration file types being collected into For TXT or XML file, each eNodeB element configuration datas are deposited in a file, although network element configuration file format is Based on standardization(XML specification)File, but need to carry out whole parsings to each file, could be by the Data Collection of needs Arrive, wasted time and energy for the collection of whole network data.
2. use incremental update database mode, though reduce the operation of database, need carry out database data with Still need to extract whole element configuration datas before just can determine that increment content, contrast after the contrast of element configuration data, and Contrast link is added, efficiency is not solved effectively.
3. can not be according to the flexible output result of user's request.
4. without appropriate data encryption process, it may be leaked when extracting configuration data, there is potential safety hazard.
State Intellectual Property Office of the People's Republic of China disclosed application publication number on 01 07th, 2009 CN101340316A patent document, title is a kind of method and device that network element data is uploaded to network management database, described Method includes step:Obtain the list of data items to be uploaded;According to the list of data items to be uploaded, from network management database Inquiry obtains the configuration data of corresponding data items, and inquiry obtains the configuration data of corresponding data items from network element, to both It is compared, constructing corresponding data increment according to comparative result notifies to wrap;The content of bag is notified according to the data increment Corresponding operation is performed to network management database, the increment storage of network element data is realized.Described device is obtained including list of data items Module, network management database enquiry module, network element enquiry module, increment notify constructing module and synchronization module.This scheme is still deposited In foregoing a variety of weak points.
The content of the invention
Flexibility of the present invention mainly present in solution prior art be not high, the skill that extraction rate is slow, security is low There is provided a kind of convenient and swift, identification process intelligence degree height, a kind of LTE network that customizability is strong, security is good for art problem Base station element configuration data acquisition methods.
The present invention is mainly what is be addressed by following technical proposals for above-mentioned technical problem:A kind of LTE network base Stand element configuration data acquisition methods, comprise the following steps:
S1, keeper's setting data type;
S2, network management center's server based on data type generation command script, and obtained by running command script from base Network element of standing obtains message;
S3, network management center's server read configuration data from message.
Preferably, the step S1 is specially:
The data type that S11, keeper's selection need, inserts self-defined form, this step is mainly obtained from definition and set Put;
S12, network management center's server read from definition tables, and analysis deciphering is carried out to keyword, understand result and deposit one by one Enter two-dimensional array, the first dimension of two-dimensional array is data items, and the second dimension is data type, and two-dimensional array is change long number Group, is primarily due to customized data type and project is all indefinite, therefore needs elongated data.
Preferably, the step S12 is specially:
S121, read from definition tables:Network management center's server reads from User Defined Data Position in definition tables The data line in area, places data into memory variable;
S122, keyword search:Data Matching data type mark in memory variable, if data are empty or lattice Formula is incorrect, then it is assumed that without keyword, directly terminate;If there is keyword, into step S123;
S123, data type mark storage:The length of the two-dimensional array of data type feature database is first increased into by one, then general The two-dimensional array of the data type feature database for the data type mark deposit being fitted on;
S124, Data Entry detection:Detect whether current read data row is subsequently provided with Data Entry mark, if do not had There is setting then to jump to step S122;Finished if there is provided representing that one's own profession is read if Data Entry mark, into step S125;
S125, by Data Entry mark be stored in a two-dimensional array;
S126, into next line data, jump to step S121, circulation is read until all self-defined settings have been read Finish.
The multiple different two-dimensional arrays of storage can be previously set in data type feature database, it is as needed during actual extracting Directly select satisfactory use.
Preferably, the step S2 is specially:
S21, by the way that the two-dimensional array in data type feature database is matched with command database, generation can be in webmaster The command script performed on central server;
S22, command script is input on network management center's server and performs;
S23, perform command script on network management center's server, send data and fetch instructions into base station network element, base station net Member extracts instruction according to data and sends corresponding message to network management center's server, and message is stored in this earth magnetism by network management center's server Disk.
Preferably, the step S21 is specially:
S211, reading data type feature database:By the digital independent of data type feature database into memory array;
S212, the detection of data type feature database:Check in data type feature database whether there are data one by one, if there are data Next step is then carried out, is terminated if no data;
S213, order data matching:The data type mark in data type feature database is read, and in command database Mark is matched, record matching result;
S214, matching result processing:Matching result is handled, records unmatched if matching result is mismatches Data type, if matching result is matching, records order data;
S215, the command script data feedback user by calculating:All order datas that 214 steps are obtained are with order pin This form feeds back to user, if while there is abnormal data, making prompting.
Preferably, the step S3 is specially:
S31, network management center's server obtain message storage path by user's interactive mode;
S32, a line of text is read to interim memory variable;
Data type tag match in S33, a line text and data type feature database that step S32 is read, if Mismatch and then continue to read next line data, all data are run through, and read next message;If result is matched, into step S34;
S34, it will all be stored in a variable from data type mark to the text current message end mark;
S35, by judging the reading of current message, judge its data Storage Format, and according to data Storage Format pair Current message is split according to separator, after segmentation, the data items mark in data type feature database, reads corresponding Data into memory variable;
S36, valid data in memory variable are stored in electrical form, form destination file;
S37, judge whether all messages read and finish, finish, then read if not reading, until run through, after running through, Data result file is showed, whole flows terminate.
Preferably, the step S35 is specially:
S351, preparation message text variable:Get out the text variable that step S34 is obtained, it is ensured that text variable is present;
S352, data Storage Format are checked:Judged by the reading to current message, check it whether containing specific symbol Number, judge its data Storage Format;
S353, processing data Storage Format inspection result:Data Storage Format is numbered, the variable specified is put into;
S354, judge whether data type feature database is complete:Data characteristics according to belonging to current message, to the data class Data items mark in type feature database is checked;
S355, improve data characteristics storehouse:The numbering of message data Storage Format is read, according to the difference of numbering, to message Data are split, and read data items therein, judge the next target will of its data, deposit data characteristics storehouse;
S356, target data reading:The numbering of message data Storage Format is read, according to the difference of numbering, to message Data are split, first matched data Item Mark, whether are matched according to it with data items mark in data characteristics storehouse, The reading of target data is solved, corresponding data are read if matching, prompt message is provided if mismatching, it is wrong for checking By mistake.
Preferably, in the step S23, the data transfer between network management center's server and base station network element is by adding Close, specific cipher mode is:Network management center's servernIndividual unduplicated random number, is designated asK 1 ,K 2 ... ...,K n , store above-mentioned Random number sequence, often increases a base station network element, this random number sequence is preserved in the network element of base station;Network management center's server is sent When data extract instruction, a number is randomly selected from random number sequenceK i , 1≤inThen three data extractions are continuously transmitted Instruction, a length of K when sending interval for the first time and for the second timeiMillisecond, second and third time send duration at intervals ofK i+1 , wheni=n When, orderK i+1 =K 1 ;Base station network element receives three data and extracted after instruction, calculates adjacent data twice and extracts connecing between instructing Interval is received, the interval between second is designated as T1 for the first time, and the interval between second and third time is T2, then from guarantor T1 is searched in the random number sequence deposited, this three data are ignored if not finding and extract instruction;Contrasted if finding random Whether T1 latter position is T2 in Number Sequence, if it is, representing that data extraction command source is legal, sends message into webmaster Central server, if T1 latter position and T2 are unequal in random number sequence, assert that data extraction command source is illegal, neglects Slightly this three data extract instruction.
Preferably, message is encrypted when sending message to network management center's server for base station network element, it is used Key is as follows:The tail end for extracting instruction in data is addedK i+2 List entries is obtained, the hash value of list entries, this Hash is calculated It is worth the key as encrypted message.
For LTE network, the connection between network management center's server and base station network element is more fixed, and data transmission is prolonged It is usually late a stationary value, will not fluctuates easily.So can be judged by the interval between detection twice instruction Whether information source is legal, effectively prevent and disguises oneself as network management center's server to gain element configuration data by cheating, even in legal Network management center's server extract data when to data carry out interception steal, also due to no random number sequence and can not crack plus It is close.The conventional cryptographic fashions such as AES can be used to the cipher mode of message.
The random number generally generated is positive integer, and scope is more suitable between 50 to 1000, and n is typically no less than 100.
This programme customizes the data needed by user, automatically generates the Network Management and Maintenance related to obtaining demand data and operates Order, by performing related command, the message of network element feedback can be obtained in real time.Compared to network element configuration file is extracted, report is used The benefit of text is that it is only related to demand data, and network element configuration file is a kind of full dose file, not only the data comprising demand, And comprising largely with the incoherent data of demand, therefore the utilization rate of message is high, and on ageing, network element enters to related command Row is returned in real time, and configuration file needs certain generation time, therefore message is ageing high.
The most important part of the present invention is the identification of intelligent message data, and message is usually text formatting document, with form text Part is compared, data format uniformity shortcoming, by contextual relation, the scope of special network element data is quickly defined, effective Intelligent depth parsing is carried out to network management data in data area, by the quick traversal of file, all numbers of user's customization are obtained According to, and it is user-defined form that data format, which is intelligently arranged,.
Compared with the existing technology, this method has the advantage that:
1st, data collection rate is fast, is collected only for required data, and execution efficiency is high;
2nd, based on adaptive analytic method, data needed for being presented in user-defined form, and complete essence Really;
3rd, the file that data are directly rendered as the operable form of user is obtained.
The substantial effect that the present invention is brought is that convenient and swift, identification process intelligence degree is high, customizability is strong, peace Good perfection, by EXCEL-VBA implementation tool entities, can be achieved to obtain network wide parameters in 1-5 minutes, and be rendered as user Spreadsheet format data.
Brief description of the drawings
Fig. 1 is a kind of general flow chart of the present invention;
Fig. 2 is a kind of setting data type flow chart of the present invention;
Fig. 3 is a kind of Receive message flow chart of the present invention;
Fig. 4 is a kind of digital independent flow chart of the present invention.
Embodiment
Below by embodiment, and with reference to accompanying drawing, technical scheme is described in further detail.
Embodiment:A kind of LTE network base station element configuration data acquisition methods of the present embodiment, as shown in figure 1, including with Lower step:S1, keeper's setting data type;
S2, network management center's server based on data type generation command script, and obtained by running command script from base Network element of standing obtains message;
S3, network management center's server read configuration data from message.
As shown in Fig. 2 step S1 is specially:
The data type that S11, keeper's selection need, inserts self-defined form, this step is mainly obtained from definition and set Put;
S12, network management center's server read from definition tables, and analysis deciphering is carried out to keyword, understand result and deposit one by one Enter two-dimensional array, the first dimension of two-dimensional array is data items, and the second dimension is data type, and two-dimensional array is change long number Group, is primarily due to customized data type and project is all indefinite, therefore needs elongated data.
Step S12 is specially:
S121, read from definition tables:Network management center's server reads from User Defined Data Position in definition tables The data line in area, places data into memory variable;
S122, keyword search:Data Matching data type mark in memory variable, if data are empty or lattice Formula is incorrect, then it is assumed that without keyword, directly terminate;If there is keyword, into step S123;
S123, data type mark storage:The length of the two-dimensional array of data type feature database is first increased into by one, then general The two-dimensional array of the data type feature database for the data type mark deposit being fitted on;
S124, Data Entry detection:Detect whether current read data row is subsequently provided with Data Entry mark, if do not had There is setting then to jump to step S122;Finished if there is provided representing that one's own profession is read if Data Entry mark, into step S125;
S125, by Data Entry mark be stored in a two-dimensional array;
S126, into next line data, jump to step S121, circulation is read until all self-defined settings have been read Finish.
The multiple different two-dimensional arrays of storage can be previously set in data type feature database, it is as needed during actual extracting Directly select satisfactory use.
As shown in figure 3, step S2 is specially:
S21, by the way that the two-dimensional array in data type feature database is matched with command database, generation can be in webmaster The command script performed on central server;
S22, command script is input on network management center's server and performs;
S23, perform command script on network management center's server, send data and fetch instructions into base station network element, base station net Member extracts instruction according to data and sends corresponding message to network management center's server, and message is stored in this earth magnetism by network management center's server Disk.
Step S21 is specially:
S211, reading data type feature database:By the digital independent of data type feature database into memory array(If data Type feature storehouse array is not discharged, and the step can be omitted);
S212, the detection of data type feature database:Check in data type feature database whether there are data one by one, if there are data Next step is then carried out, is terminated if no data;
S213, order data matching:The data type mark in data type feature database is read, and in command database Mark is matched, record matching result;
S214, matching result processing:Matching result is handled, records unmatched if matching result is mismatches Data type, if matching result is matching, records order data;
S215, the command script data feedback user by calculating:All order datas that 214 steps are obtained are with order pin This form feeds back to user, if while there is abnormal data, making prompting.
As shown in figure 4, step S3 is specially:
S31, network management center's server obtain message storage path by user's interactive mode;
S32, a line of text is read to interim memory variable;
Data type tag match in S33, a line text and data type feature database that step S32 is read, if Mismatch and then continue to read next line data, all data are run through, and read next message;If result is matched, into step S34;
S34, it will all be stored in a variable from data type mark to the text current message end mark;
S35, by judging the reading of current message, check whether it contains specific symbol, judge that its data is deposited Form, generally comprises horizontal table, vertical table, mixture table, also has some considerably complicated forms, by the difference of feature, to current report Text is split according to specific separator, general horizontal table is split using double spaces, vertical table use equal to number and colon divided Cut, form is not limited to these, segmentation symbol can be adjusted, reach the purpose for being partitioned into valid data, after segmentation, root According to the data items mark in data characteristics storehouse, corresponding data are read into memory variable;
S36, valid data in memory variable are stored in electrical form, form destination file;
S37, judge whether all messages read and finish, finish, then read if not reading, until run through, after running through, Data result file is showed, whole flows terminate.
Step S34 is specially:
S341, reading message text
A line message text is read every time, is output in memory variable;
S342, the message ends Mark Detection
By checking line by line, stop when running into the message ends mark, the text that will be output to before in memory variable Notebook data is collected, and obtains a long text.
Step S35 is specially:
S351, preparation message text variable:Get out the text variable that step S34 is obtained, it is ensured that text variable is present;
S352, data Storage Format are checked:Judged by the reading to current message, check it whether containing specific symbol Number, judge its data Storage Format, generally comprise horizontal table, vertical table, mixture table, also have some considerably complicated forms;
S353, processing data Storage Format inspection result:Data Storage Format is numbered, the variable specified is put into;
S354, judge whether data type feature database is complete:Data characteristics according to belonging to current message, it is special to the data The data items mark levied in storehouse is checked that if it is empty data items mark then shows in current data feature database without current The data items flag data of message, then can not carry out target data matching.If inspection result is not sky, it is possible to carry out target Data Matching;
S355, improve data characteristics storehouse:The numbering of message data Storage Format is read, according to the difference of numbering, to message Data are split, and read data items therein, judge the next target will of its data, deposit data characteristics storehouse;
S356, target data reading:The numbering of message data Storage Format is read, according to the difference of numbering, to message Data are split, first matched data Item Mark, whether are matched according to it with data items mark in data characteristics storehouse, The reading of target data is solved, corresponding data are read if matching, prompt message is provided if mismatching, it is wrong for checking By mistake.
In step S23, the data transfer between network management center's server and base station network element is by encryption, specific cipher mode For:Network management center's servernIndividual unduplicated random number, is designated asK 1 ,K 2 ... ...,K n , above-mentioned random number sequence is stored, is often increased Plus a base station network element, this random number sequence is preserved in the network element of base station;When network management center's server sends data extraction instruction, A number is randomly selected from random number sequenceK i , 1≤inThen three data are continuously transmitted and extract instruction, for the first time with the It is secondary to send a length of K when being spacediMillisecond, second and third time send duration at intervals ofK i+1 , wheni=nWhen, orderK i+1 =K 1 ;Base station Network element receives three data and extracted after instruction, calculates adjacent data twice and extracts reception interval between instruction, for the first time and Interval between second is designated as T1, and the interval between second and third time is T2, then from the random number sequence of preservation Middle lookup T1, this three data are ignored if not finding and extract instruction;Contrasted if finding in random number sequence after T1 Whether one be T2, if it is, representing that data extraction command source is legal, sends message to network management center's server, if T1 latter position and T2 are unequal in random number sequence, then assert that data extraction command source is illegal, ignore this three data Extract instruction.
Base station network element message is encrypted, used key is as follows when sending message to network management center's server: The tail end for extracting instruction in data is addedK i+2 List entries is obtained, the hash value of list entries is calculated, this hash value is used as encryption The key of message.
The random number of generation is positive integer, and scope is more suitable between 50 to 1000, and n is typically no less than 100.
Specific embodiment described herein is only to spirit explanation for example of the invention.Technology neck belonging to of the invention The technical staff in domain can be made various modifications or supplement to described specific embodiment or be replaced using similar mode Generation, but without departing from the spiritual of the present invention or surmount scope defined in appended claims.
Although more having used the terms such as network element, data type, message, random number herein, it is not precluded from using it The possibility of its term.It is used for the purpose of more easily describing and explaining the essence of the present invention using these terms;They are solved Any additional limitation is interpreted into all to disagree with spirit of the present invention.

Claims (7)

1. a kind of LTE network base station element configuration data acquisition methods, it is characterised in that comprise the following steps:
S1, keeper's setting data type;
S2, network management center's server based on data type generation command script, and obtained by running command script from base station network element Take message;
S3, network management center's server read configuration data from message;
The step S2 is specially:
S21, by the way that the two-dimensional array in data type feature database is matched with command database, generation can take in network management center The command script performed on business device;
S22, command script is input on network management center's server and performs;
S23, perform command script on network management center's server, send data and fetch instructions into base station network element, base station network element root Instruction is extracted according to data and sends corresponding message to network management center's server, and message is stored in local disk by network management center's server;
In the step S23, the data transfer between network management center's server and base station network element is by encryption, specific cipher mode For:Network management center's servernIndividual unduplicated random number, is designated asK 1 ,K 2 ... ...,K n , above-mentioned random number sequence is stored, is often increased Plus a base station network element, this random number sequence is preserved in the network element of base station;When network management center's server sends data extraction instruction, A number is randomly selected from random number sequenceK i , 1≤inThen three data are continuously transmitted and extract instruction, for the first time with the It is secondary to send a length of K when being spacediMillisecond, second and third time send duration at intervals ofK i+1 , wheni=nWhen, orderK i+1 =K 1 ;Base station Network element receives three data and extracted after instruction, calculates adjacent data twice and extracts reception interval between instruction, for the first time and Interval between second is designated as T1, and the interval between second and third time is T2, then from the random number sequence of preservation Middle lookup T1, this three data are ignored if not finding and extract instruction;Contrasted if finding in random number sequence after T1 Whether one be T2, if it is, representing that data extraction command source is legal, sends message to network management center's server, if T1 latter position and T2 are unequal in random number sequence, then assert that data extraction command source is illegal, ignore this three data Extract instruction.
2. a kind of LTE network base station element configuration data acquisition methods according to claim 1, it is characterised in that described Step S1 is specially:
The data type that S11, keeper's selection need, inserts self-defined form;
S12, network management center's server read from definition tables, and analysis deciphering is carried out to keyword, understand result and are stored in two one by one Dimension group, the first dimension of two-dimensional array is data items, and the second dimension is data type, and two-dimensional array is elongated array.
3. a kind of LTE network base station element configuration data acquisition methods according to claim 2, it is characterised in that described Step S12 is specially:
S121, read from definition tables:Network management center's server reads from User Defined Data Position area in definition tables Data line, places data into memory variable;
S122, keyword search:Data Matching data type mark in memory variable, if data for empty or form not Correctly, then it is assumed that without keyword, directly terminate;If there is keyword, into step S123;
S123, data type mark storage:The length of the two-dimensional array of data type feature database is first increased by one, then be will match to Data type mark deposit data type feature database two-dimensional array;
S124, Data Entry detection:Detect whether current read data row is subsequently provided with Data Entry mark, if do not set Put, jump to step S122;If there is provided entering step S125 if Data Entry mark;
S125, by Data Entry mark be stored in a two-dimensional array;
S126, into next line data, jump to step S121, circulation is read until all self-defined settings are read and finished.
4. a kind of LTE network base station element configuration data acquisition methods according to claim 1, it is characterised in that described Step S21 is specially:
S211, reading data type feature database:By the digital independent of data type feature database into memory array;
S212, the detection of data type feature database:Check in data type feature database whether there are data one by one, enter if it there are data Row next step, terminates if no data;
S213, order data matching:The data type mark in data type feature database is read, with the mark in command database Matched, record matching result;
S214, matching result processing:Matching result is handled, unmatched data are recorded if matching result is mismatches Type, if matching result is matching, records order data;
S215, the command script data feedback user by calculating:All order datas that 214 steps are obtained are with command script shape Formula feeds back to user, if while there is abnormal data, making prompting.
5. a kind of LTE network base station element configuration data acquisition methods according to claim 1, it is characterised in that described Step S3 is specially:
S31, network management center's server obtain message storage path by user's interactive mode;
S32, a line of text is read to interim memory variable;
Data type tag match in S33, a line text and data type feature database that step S32 is read, if not With reading next line data are then continued, all data are run through, and read next message;If result is matched, into step S34;
S34, it will all be stored in a variable from data type mark to the text current message end mark;
S35, by judging the reading of current message, judge its data Storage Format, and according to data Storage Format to current Message is split according to separator, after segmentation, the data items mark in data type feature database, reads corresponding number According into memory variable;
S36, valid data in memory variable are stored in electrical form, form destination file;
S37, judge whether all messages read and finish, finish, then read if not reading, until running through, after running through, present Go out data result file, whole flows terminate.
6. a kind of LTE network base station element configuration data acquisition methods according to claim 5, it is characterised in that described Step S35 is specially:
S351, preparation message text variable:Get out the text variable that step S34 is obtained, it is ensured that text variable is present;
S352, data Storage Format are checked:Judged by the reading to current message, check whether it contains specific symbol, Judge its data Storage Format;
S353, processing data Storage Format inspection result:Data Storage Format is numbered, the variable specified is put into;
S354, judge whether data type feature database is complete:Data characteristics according to belonging to current message, it is special to the data type The data items mark levied in storehouse is checked;
S355, improve data characteristics storehouse:The numbering of message data Storage Format is read, according to the difference of numbering, to message data Split, read data items therein, judge the next target will of its data, deposit data characteristics storehouse;
S356, target data reading:The numbering of message data Storage Format is read, according to the difference of numbering, to message data Split, first matched data Item Mark, whether matched according to it with data items mark in data characteristics storehouse, solved The reading of target data, corresponding data are read if matching, and prompt message is provided if mismatching, for checking mistake.
7. a kind of LTE network base station element configuration data acquisition methods according to claim 1, it is characterised in that base station Network element message is encrypted, used key is as follows when sending message to network management center's server:Extract and refer in data The tail end of order is addedK i+2 Obtain list entries, calculate the hash value of list entries, this hash value as encrypted message key.
CN201410210966.8A 2014-05-20 2014-05-20 A kind of LTE network base station element configuration data acquisition methods Active CN104135737B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410210966.8A CN104135737B (en) 2014-05-20 2014-05-20 A kind of LTE network base station element configuration data acquisition methods

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410210966.8A CN104135737B (en) 2014-05-20 2014-05-20 A kind of LTE network base station element configuration data acquisition methods

Publications (2)

Publication Number Publication Date
CN104135737A CN104135737A (en) 2014-11-05
CN104135737B true CN104135737B (en) 2017-09-19

Family

ID=51808244

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410210966.8A Active CN104135737B (en) 2014-05-20 2014-05-20 A kind of LTE network base station element configuration data acquisition methods

Country Status (1)

Country Link
CN (1) CN104135737B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105786845B (en) * 2014-12-23 2020-03-31 中兴通讯股份有限公司 Method and device for providing network asset data
CN106570037A (en) * 2015-10-12 2017-04-19 中兴通讯股份有限公司 Data processing method and device
CN106686623A (en) * 2015-11-10 2017-05-17 张泽鑫 LTE automatic station opening method based on ICM port
CN107182071B (en) * 2016-03-10 2019-12-10 中国移动通信集团陕西有限公司 office data processing method and device
CN106301891A (en) * 2016-08-02 2017-01-04 中国银联股份有限公司 A kind of configuring information of network appliance processing method and processing device
CN110309214B (en) * 2018-04-10 2023-06-23 腾讯科技(深圳)有限公司 Instruction execution method and equipment, storage medium and server thereof
CN108921514B (en) * 2018-07-02 2019-12-06 深圳云集智造系统技术有限公司 Enterprise mobile office system based on Internet
CN110278123B (en) * 2019-05-10 2021-04-06 新华三技术有限公司 Checking method, checking device, electronic equipment and readable storage medium
CN110955696B (en) * 2019-11-12 2022-10-14 中国经济信息社有限公司 Data reading method, device, equipment and storage medium

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100346609C (en) * 2004-04-16 2007-10-31 华为技术有限公司 Configurating data collecting system and its method in network management
CN100488274C (en) * 2006-11-08 2009-05-13 华为技术有限公司 Base station health checking apparatus and method
CN100554985C (en) * 2007-05-25 2009-10-28 中兴通讯股份有限公司 A kind of method of inspection of north direction interface data integrity
CN101247262A (en) * 2007-12-17 2008-08-20 中国移动通信集团湖北分公司 North direction interface data dynamic comparison supplement system
CN101286879A (en) * 2008-04-29 2008-10-15 中兴通讯股份有限公司 System for displaying data acquired by base stations and displaying method of data acquired by base stations

Also Published As

Publication number Publication date
CN104135737A (en) 2014-11-05

Similar Documents

Publication Publication Date Title
CN104135737B (en) A kind of LTE network base station element configuration data acquisition methods
CN109377244B (en) Food fast traceability system and method based on multi-chain interconnection block chain network
CN102938767B (en) The fuzzy keyword search methodology that efficiently can verify that based on the outer packet system of cloud data
CN102750365B (en) Retrieval method and system of instant voice messages, user device and server
EP2863613A1 (en) Method using mobile terminal to implement cloud searching
CN106657044A (en) Webpage address hopping method for improving security defense of website system
CN105321108A (en) System and method for creating a list of shared information on a peer-to-peer network
Bu et al. Unreconciled collisions uncover cloning attacks in anonymous RFID systems
CN110768936B (en) Method and device for reporting private data and storage medium
CN105337941A (en) Method and device for providing device identifier
CN103488683B (en) Microblog data management system and implementation method thereof
KR102033416B1 (en) Method for generating data extracted from document and apparatus thereof
CN104954346A (en) Attack recognition method based on object analysis and device thereof
CN107592306A (en) Information security monitoring management method and system based on environment of internet of things big data
CN104580310A (en) Log processing method and server
CN105657677A (en) Short message sending method, short message gateway and service platform
CN105791246A (en) Information verification method, device and system
CN104618410B (en) Resource supplying method and apparatus
CN104954345A (en) Attack recognition method based on object analysis and device thereof
CN106951743A (en) A kind of software code infringement detection method
CN106452867A (en) Log message processing method and system
CN104270800B (en) The method and system of communication connection are established with terminal
CN105959746A (en) File generation method and apparatus
CN103514284B (en) Data display system and data display method
CN103079194B (en) Service adaptation method, apparatus and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: Method of obtaining network element configuration data of LTE (Long Term Evolution) network base station

Effective date of registration: 20191121

Granted publication date: 20170919

Pledgee: Hangzhou High-tech Financing Guarantee Co., Ltd.

Pledgor: ZHEJIANG MINGXUN NETWORK TECHNOLOGY CO., LTD.

Registration number: Y2019330000208

PE01 Entry into force of the registration of the contract for pledge of patent right
PC01 Cancellation of the registration of the contract for pledge of patent right

Date of cancellation: 20210122

Granted publication date: 20170919

Pledgee: Hangzhou High-tech Financing Guarantee Co.,Ltd.

Pledgor: ZHEJIANG MINGXUN NETWORK TECHNOLOGY Co.,Ltd.

Registration number: Y2019330000208

PC01 Cancellation of the registration of the contract for pledge of patent right
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: A method for obtaining network element configuration data of LTE network base station

Effective date of registration: 20210911

Granted publication date: 20170919

Pledgee: Hangzhou Gaoxin Financing Guarantee Co.,Ltd.

Pledgor: ZHEJIANG MINGXUN NETWORK TECHNOLOGY Co.,Ltd.

Registration number: Y2021330001515

PE01 Entry into force of the registration of the contract for pledge of patent right