CN110071837B - Alarm processing method and system for access network - Google Patents
Alarm processing method and system for access network Download PDFInfo
- Publication number
- CN110071837B CN110071837B CN201910351777.5A CN201910351777A CN110071837B CN 110071837 B CN110071837 B CN 110071837B CN 201910351777 A CN201910351777 A CN 201910351777A CN 110071837 B CN110071837 B CN 110071837B
- Authority
- CN
- China
- Prior art keywords
- alarm
- shielding
- requirement
- sdn controller
- network management
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/0604—Management of faults, events, alarms or notifications using filtering, e.g. reduction of information by using priority, element types, position or time
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/0681—Configuration of triggering conditions
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses an alarm processing method and system of an access network, relating to the technical field of alarm processing, wherein the original alarm is converted into a standard alarm by receiving the original alarm uploaded by equipment; analyzing the standard alarm, and extracting and storing alarm data; setting an alarm shielding table, an alarm category table and an alarm level table; according to the alarm data, the alarm category table and the alarm level table, whether the alarm meets the requirement of the alarm shielding table or not is judged, the alarm meeting the requirement is reported, the compatibility between the original traditional network management and various different lower-layer devices is realized, the SDN controller can adapt to various SDN controllers, and meanwhile, the SDN controller can be well adapted to the lower-layer devices which possibly appear newly and the upper-layer devices which appear newly in the future without large framework transformation.
Description
Technical Field
The invention relates to the technical field of alarm processing, in particular to an alarm processing method and system of an access network.
Background
In an access network system, system maintainability includes fault management of equipment, and when a certain software module or a certain component of the equipment is abnormal, the module or the component reports an alarm. The existing multi-hop network architecture has large network delay and cannot meet the more and more severe delay requirement of services, the network flattening is the future development direction, and the network needs to be reconstructed. The network functional unit with separated control and forwarding and standardization can effectively respond to the challenges of the access network; the network is reconstructed through NFV, functions of the existing proprietary equipment are fused, network hop count is reduced, network delay can be effectively reduced, and challenges of an access network are met; by means of NFV (Network Function Virtualization), the functional part of the terminal device, especially the value-added service part, is moved up, so that the device form life cycle can be prolonged, and the challenge faced by the access Network can be met.
When the physical device is managed by different upper-layer SDN (Software Defined Network) controllers and traditional Network managers, the device needs to support reporting of an alarm to different SDN controllers and traditional Network managers at the same time, and the requirements of each SDN controller and the traditional Network managers are met. Different alarm management systems are generally required to manage alarms of different upper-layer systems, so that the system resources are occupied, and the processing efficiency is low.
Disclosure of Invention
Aiming at the defects in the prior art, the invention aims to provide an alarm processing method and an alarm processing system for an access network, which are compatible with various different lower-layer devices, the original traditional network management and various different upper-layer SDN controllers.
In order to achieve the above purposes, the technical scheme adopted by the invention is as follows: an alarm processing method of an access network comprises the following steps:
receiving an original alarm uploaded by equipment, and converting the original alarm into a standard alarm;
analyzing the standard alarm, and extracting and storing alarm data;
setting an alarm shielding table, an alarm category table and an alarm level table;
and judging whether the alarm meets the requirement of an alarm shielding table or not according to the alarm data, the alarm category table and the alarm level table, and reporting the alarm meeting the requirement.
On the basis of the above scheme, the alarm shielding table is used for recording alarm IDs and alarm shielding modes corresponding to the alarms in the SDN controller system and the network management system, respectively, the alarm category table is used for recording alarm IDs and alarm types corresponding to the alarms in the SDN controller system and the network management system, respectively, and the alarm level table is used for recording alarm IDs and alarm levels of the alarms in the SDN controller system and the network management system, respectively.
On the basis of the scheme, the alarm shielding mode comprises one of an alarm level, an alarm type and an alarm source object.
On the basis of the scheme, the alarm data comprises an alarm type, an alarm ID, an alarm source object and an alarm starting time.
On the basis of the scheme, the method further comprises the following steps: and judging whether the alarm meets the requirement of an alarm shielding table or not according to the alarm data, the alarm category table and the alarm level table, and recording alarm confirmation and alarm clearing operation made by a user in an SDN controller system or a network management system through an alarm operation table after the alarm meeting the requirement is reported.
The invention also provides an alarm processing system of the access network, which comprises:
an alert adaptation module to: receiving an original alarm uploaded by equipment, and converting the original alarm into a standard alarm;
an alert storage module to: analyzing the standard alarm, and extracting and storing alarm data;
an alert processing module to: setting an alarm shielding table, an alarm category table and an alarm level table, judging whether the alarm meets the requirement of the alarm shielding table or not according to the alarm data, the alarm category table and the alarm level table, and reporting the alarm meeting the requirement.
On the basis of the above scheme, the alarm shielding table is used for recording alarm IDs and alarm shielding modes corresponding to the alarms in the SDN controller system and the network management system, respectively, the alarm category table is used for recording alarm IDs and alarm types corresponding to the alarms in the SDN controller system and the network management system, respectively, and the alarm level table is used for recording alarm IDs and alarm levels of the alarms in the SDN controller system and the network management system, respectively.
On the basis of the scheme, the alarm shielding mode comprises one of an alarm level, an alarm type and an alarm source object.
On the basis of the scheme, the alarm data comprises an alarm type, an alarm ID, an alarm source object and an alarm starting time.
On the basis of the above scheme, the system further comprises an alarm operation module, which is used for: and judging whether the alarm meets the requirement of an alarm shielding table or not according to the alarm data, the alarm category table and the alarm level table, and recording alarm confirmation and alarm clearing operation made by a user in an SDN controller system or a network management system through an alarm operation table after the alarm meeting the requirement is reported.
Compared with the prior art, the invention has the advantages that:
the invention converts the original alarm into the standard alarm by receiving the original alarm uploaded by the equipment; analyzing the standard alarm, and extracting and storing alarm data; setting an alarm shielding table, an alarm category table and an alarm level table; according to the alarm data, the alarm category table and the alarm level table, whether the alarm meets the requirement of the alarm shielding table or not is judged, the alarm meeting the requirement is reported, the compatibility between the original traditional network management and various different lower-layer devices is realized, the SDN controller can adapt to various SDN controllers, and meanwhile, the SDN controller can be well adapted to the lower-layer devices which possibly appear newly and the upper-layer devices which appear newly in the future without large framework transformation.
Drawings
Fig. 1 is a schematic flow chart of an alarm processing method of an access network according to an embodiment of the present invention;
fig. 2 is a schematic flow chart of the method for processing an alarm in an access network according to the embodiment of the present invention to determine whether the alarm meets the requirement of an alarm mask table;
fig. 3 is a schematic structural diagram of an alarm processing system of an access network according to an embodiment of the present invention.
Detailed Description
Embodiments of the present invention will be described in further detail below with reference to the accompanying drawings.
Referring to fig. 1, an embodiment of the present invention provides an alarm processing method for an access network, including the following steps:
s1, receiving the original alarm uploaded by the equipment, and converting the original alarm into a standard alarm;
s2, analyzing the standard alarm, extracting and storing alarm data;
s3, setting an alarm shielding table, an alarm category table and an alarm level table;
and S4, judging whether the alarm accords with the requirement of the alarm shielding table according to the alarm data, the alarm category table and the alarm level table, and reporting the alarm which accords with the requirement.
Preferably, when an alarm of a certain type of equipment is received, the corresponding relation table is searched, a standard alarm corresponding to the alarm of the equipment is found, and then the next step of processing is performed.
Preferably, the alarm shielding table is used for recording the alarm ID and the corresponding alarm shielding manner of each alarm in the SDN controller system and the network management system. Each system filters the alarm by using the alarm shielding table of the system, and the alarm conforming to the filter is sent to the upper-layer system.
The alarm category table is used for recording alarm IDs and corresponding alarm types of the alarms in the SDN controller system and the network management system respectively. For example, x.733 contains 4 kinds of alarms "communication alarm, quality of service alarm, process failure alarm, environmental alarm", and the alarm category table maps the alarms to the 4 kinds of alarms. For example, in a Chinese Telecommunication (CTC) model, alarms are classified into 6 kinds of alarms of "communication alarm, quality of service alarm, process failure alarm, device alarm, environment alarm, device event", and an alarm category table maps the alarms into the 6 kinds of alarms.
The alarm level table is used for recording alarm IDs and alarm levels of all alarms in the SDN controller system and the network management system respectively. For example, 5 levels are defined in the YANG model, respectively, inderminate (level cannot be determined), minor, warning, major, critical 5 levels, and the alarm level table maps the alarm to these 5 alarms. For example, the CTC defines 4 levels "Emergency alert, Primary alert, Secondary alert, reminder alert" and the alert level table maps alerts to these 4 alerts.
Preferably, the alarm masking means includes one of an alarm level, an alarm type and an alarm source object.
Preferably, the alarm data includes an alarm type, an alarm ID, an alarm source object, and an alarm start time.
Preferably, the method further comprises the steps of: and judging whether the alarm meets the requirement of an alarm shielding table or not according to the alarm data, the alarm category table and the alarm level table, and recording alarm confirmation and alarm clearing operation made by a user in an SDN controller system or a network management system through an alarm operation table after the alarm meeting the requirement is reported.
According to the operation of each network management user, confirming or closing the alarm, if the alarm is closed, deleting the alarm in the current alarm operation table of the network management, and adding the alarm in the history alarm table of the network management. But only if the alarm source of the alarm really ends the alarm, the alarm is really deleted in the alarm storage module. Each SDN controller or traditional network management operation table is only the result of the operation of the SDN controller or traditional network management user of the alarm.
And respectively and sequentially polling the alarm shielding tables of the SDN controllers or the traditional network managers, and judging whether the alarm is sent to each SDN controller or the traditional network manager or not according to the respective alarm shielding tables.
Taking an alarm shielding table of a certain alarm system as an example, if the alarm shielding table judges whether to report an alarm according to an alarm level, judging whether the alarm conforms to the level defined in the alarm shielding table according to an alarm level table corresponding to the SDN controller or the traditional network manager, and reporting the alarm according to the conforming level; if the alarm shielding table takes the alarm source object as the filtering condition, reporting the alarm if the alarm source object meets the requirement of the alarm shielding table; if the alarm shielding table takes the alarm category as the filtering condition, if the alarm category is judged to meet the requirement of the alarm shielding table according to the alarm category table corresponding to the SDN controller or the traditional network manager, the alarm is reported; and after the judgment of the alarm shielding table of the SDN controller is finished, continuing the judgment of the alarm shielding table corresponding to the next SDN controller until the judgment of the alarm shielding tables of all the SDN controllers is finished.
Specifically, referring to fig. 2, according to the alarm data, the alarm category table and the alarm level table, determining whether the alarm meets the requirement of the alarm mask table, and reporting the alarm meeting the requirement, specifically includes the following steps:
101, judging whether alarm shielding tables of all SDN systems are judged, if yes, ending; if not, acquiring an undetermined alarm shielding table, and entering step 102;
102, judging the type of the alarm shielding table, and if the type is based on the level, entering a step 103; if yes, go to step 104; if yes, go to step 105;
103, judging whether the alarm accords with the alarm level of the alarm shielding table, if so, entering the step 106, otherwise, returning to the step 101;
104, judging whether the alarm accords with an alarm source of an alarm shielding table, if so, entering a step 106, otherwise, returning to the step 101;
105, judging whether the alarm accords with the alarm category of the alarm mask table, if so, entering a step 106, and if not, returning to the step 101;
and 106, reporting the alarm to a corresponding system.
Referring to fig. 3, an embodiment of the present invention further provides an alarm processing system for an access network, including:
an alert adaptation module to: receiving an original alarm uploaded by equipment, and converting the original alarm into a standard alarm;
an alert storage module to: analyzing the standard alarm, and extracting and storing alarm data;
an alert processing module to: setting an alarm shielding table, an alarm category table and an alarm level table, judging whether the alarm meets the requirement of the alarm shielding table or not according to the alarm data, the alarm category table and the alarm level table, and reporting the alarm meeting the requirement.
The alarm adaptation module processes the alarm reported by the alarm source to become standard alarm data, and reports the alarm data to the alarm processing module, the standard alarm original data is stored in a public area, and each SDN controller and the traditional network manager can access the standard alarm data. However, for different SDN controllers or traditional network managers, there are an alarm operation table, an alarm classification table, an alarm level table, and an alarm mask table, which are independent of each other. The user of each SDN controller or the traditional network manager confirms or cancels the alarm without influencing the alarms of other SDN controllers or the users of the traditional network manager. For the same alarm message, the alarm processing of each SDN controller and the network manager is different.
Each SDN controller or traditional network manager has different classification tables and different alarm level tables for the same alarm, and forms respective alarm shielding tables according to respective alarm classification rules and alarm levels.
Preferably, the alarm shielding table is configured to record an alarm ID and an alarm shielding manner corresponding to each alarm in the SDN controller system and the network management system, the alarm category table is configured to record an alarm ID and an alarm type corresponding to each alarm in the SDN controller system and the network management system, and the alarm level table is configured to record an alarm ID and an alarm level corresponding to each alarm in the SDN controller system and the network management system.
Preferably, the alarm masking means includes one of an alarm level, an alarm type and an alarm source object.
Preferably, the alarm data includes an alarm type, an alarm ID, an alarm source object, and an alarm start time.
Preferably, the system further comprises an alarm operation module for: and judging whether the alarm meets the requirement of an alarm shielding table or not according to the alarm data, the alarm category table and the alarm level table, and recording alarm confirmation and alarm clearing operation made by a user in an SDN controller system or a network management system through an alarm operation table after the alarm meeting the requirement is reported.
The system has the working procedures as follows:
after the system receives the alarm sent by the lower layer object, the alarm adaptation module converts the alarm into a standard alarm and sends the standard alarm to the alarm processing module; the alarm storage module analyzes the standard alarm, and extracts and stores alarm data.
And the alarm processing module polls the alarm shielding tables of the SDN controllers or the traditional network management in sequence respectively, and whether the alarm is sent to the SDN controllers or the traditional network management depends on the alarm shielding tables. Taking an alarm shielding table of a certain alarm system as an example, if the alarm shielding table judges whether to report an alarm according to an alarm level, judging whether the alarm conforms to the level defined in the alarm shielding table according to an alarm level table corresponding to the SDN controller or the traditional network manager, and reporting the alarm according to the conforming level; if the alarm shielding table takes the alarm source object as the filtering condition, reporting the alarm if the alarm source object meets the requirement of the alarm shielding table; if the alarm shielding table takes the alarm category as the filtering condition, if the alarm category is judged to meet the requirement of the alarm shielding table according to the alarm category table corresponding to the SDN controller or the traditional network manager, the alarm is reported; and after the judgment of the alarm shielding table of the SDN controller is finished, continuing the judgment of the alarm shielding table corresponding to the next SDN controller until the judgment of the alarm shielding tables of all the SDN controllers is finished.
Based on the same inventive concept, embodiments of the present application provide a computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, implements all or part of the method steps of an alarm processing method of an access network.
The present invention may also be implemented by instructing related hardware through a computer program, where the computer program may be stored in a computer readable storage medium, and when the computer program is executed by a processor, the steps of the method embodiments may be implemented. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer readable medium may include: any entity or device capable of carrying computer program code, recording medium, U.S. disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution media, and the like. It should be noted that the computer readable medium may contain other components which may be suitably increased or decreased as required by legislation and patent practice in jurisdictions, for example, in some jurisdictions, in accordance with legislation and patent practice, the computer readable medium does not include electrical carrier signals and telecommunications signals.
Based on the same inventive concept, an embodiment of the present application further provides an electronic device, which includes a memory and a processor, where the memory stores a computer program running on the processor, and the processor implements all or part of the method steps in the alarm processing method of the access network when executing the computer program.
The Processor may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, discrete hardware components, etc. The general purpose processor may be a microprocessor or the processor may be any conventional processor or the like, the processor being the control center of the computer device and the various interfaces and lines connecting the various parts of the overall computer device.
The memory may be used to store computer programs and/or modules, and the processor may implement various functions of the computer device by executing or executing the computer programs and/or modules stored in the memory, as well as by invoking data stored in the memory. The memory may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, video data, etc.) created according to the use of the cellular phone, etc. In addition, the memory may include high speed random access memory, and may also include non-volatile memory, such as a hard disk, a memory, a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), at least one magnetic disk storage device, a Flash memory device, or other volatile solid state storage device.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, server, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, optical storage, and the like) having computer-usable program code embodied therein.
The present invention has been described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), servers and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.
Claims (8)
1. An alarm processing method of an access network is characterized by comprising the following steps:
receiving an original alarm uploaded by equipment, and converting the original alarm into a standard alarm;
analyzing the standard alarm, and extracting and storing alarm data;
setting an alarm shielding table, an alarm category table and an alarm level table;
judging whether the alarm meets the requirement of an alarm shielding table or not according to the alarm data, the alarm category table and the alarm level table, and reporting the alarm meeting the requirement;
the alarm shielding table is used for recording alarm IDs and alarm shielding modes corresponding to the alarms in the SDN controller system and the network management system respectively, the alarm category table is used for recording the alarm IDs and alarm types corresponding to the alarms in the SDN controller system and the network management system respectively, and the alarm level table is used for recording the alarm IDs and alarm levels of the alarms in the SDN controller system and the network management system respectively;
different SDN controllers in the SDN controller system and different network managers in the network management system are respectively provided with an alarm operation table, an alarm classification table and an alarm shielding table which are independent from each other;
and judging whether the alarm meets the requirement of an alarm shielding table or not according to the alarm data, the alarm category table and the alarm level table, and respectively polling the alarm shielding tables of the SDN controllers or the network managers in sequence in the process of reporting the alarm meeting the requirement until the alarm shielding tables of all the SDN controllers or all the network managers are judged to be finished.
2. The method of claim 1, wherein the alarm masking mode comprises one of an alarm level, an alarm type, and an alarm source object.
3. The method of claim 1, wherein the alarm data includes an alarm type, an alarm ID, an alarm source object, and an alarm start time.
4. The method of claim 1, further comprising the steps of: and judging whether the alarm meets the requirement of an alarm shielding table or not according to the alarm data, the alarm category table and the alarm level table, and recording alarm confirmation and alarm clearing operation made by a user in an SDN controller system or a network management system through an alarm operation table after the alarm meeting the requirement is reported.
5. An alarm handling system of an access network, comprising:
an alert adaptation module to: receiving an original alarm uploaded by equipment, and converting the original alarm into a standard alarm;
an alert storage module to: analyzing the standard alarm, and extracting and storing alarm data;
an alert processing module to: setting an alarm shielding table, an alarm category table and an alarm level table, judging whether the alarm meets the requirement of the alarm shielding table or not according to the alarm data, the alarm category table and the alarm level table, and reporting the alarm meeting the requirement;
the alarm shielding table is used for recording alarm IDs and alarm shielding modes corresponding to the alarms in the SDN controller system and the network management system respectively, the alarm category table is used for recording the alarm IDs and alarm types corresponding to the alarms in the SDN controller system and the network management system respectively, and the alarm level table is used for recording the alarm IDs and alarm levels of the alarms in the SDN controller system and the network management system respectively;
different SDN controllers in the SDN controller system and different network managers in the network management system are respectively provided with an alarm operation table, an alarm classification table and an alarm shielding table which are independent from each other;
and judging whether the alarm meets the requirement of an alarm shielding table or not according to the alarm data, the alarm category table and the alarm level table, and respectively polling the alarm shielding tables of the SDN controllers or the network managers in sequence in the process of reporting the alarm meeting the requirement until the alarm shielding tables of all the SDN controllers or all the network managers are judged to be finished.
6. The system of claim 5, wherein the alarm masking mode comprises one of an alarm level, an alarm type, and an alarm source object.
7. The system of claim 5, wherein the alarm data includes an alarm type, an alarm ID, an alarm source object, and an alarm start time.
8. The system of claim 5, wherein the system further comprises an alert operation module to: and judging whether the alarm meets the requirement of an alarm shielding table or not according to the alarm data, the alarm category table and the alarm level table, and recording alarm confirmation and alarm clearing operation made by a user in an SDN controller system or a network management system through an alarm operation table after the alarm meeting the requirement is reported.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910351777.5A CN110071837B (en) | 2019-04-28 | 2019-04-28 | Alarm processing method and system for access network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910351777.5A CN110071837B (en) | 2019-04-28 | 2019-04-28 | Alarm processing method and system for access network |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110071837A CN110071837A (en) | 2019-07-30 |
CN110071837B true CN110071837B (en) | 2022-02-01 |
Family
ID=67369360
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910351777.5A Active CN110071837B (en) | 2019-04-28 | 2019-04-28 | Alarm processing method and system for access network |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110071837B (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101908981A (en) * | 2010-09-03 | 2010-12-08 | 烽火通信科技股份有限公司 | Method for shielding and uniformly processing alarm and performance data |
CN107769954A (en) * | 2016-08-23 | 2018-03-06 | 南京中兴软件有限责任公司 | The screen method and device of equipment alarm |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100489690B1 (en) * | 2003-02-14 | 2005-05-17 | 삼성전자주식회사 | Method for procesing event and controlling real error and modeling database table |
-
2019
- 2019-04-28 CN CN201910351777.5A patent/CN110071837B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101908981A (en) * | 2010-09-03 | 2010-12-08 | 烽火通信科技股份有限公司 | Method for shielding and uniformly processing alarm and performance data |
CN107769954A (en) * | 2016-08-23 | 2018-03-06 | 南京中兴软件有限责任公司 | The screen method and device of equipment alarm |
Also Published As
Publication number | Publication date |
---|---|
CN110071837A (en) | 2019-07-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2021008414A1 (en) | Alarm method for internet of things device, and related apparatus | |
CN110351111A (en) | A kind of subscription processing method, network node and customer data base | |
CN111355610A (en) | Exception handling method and device based on edge network | |
CN109348434B (en) | Scene information sending method, sending device and terminal equipment | |
CN109245929A (en) | Method, apparatus, computer storage medium and the equipment of the automatic discovery network equipment | |
CN107682219B (en) | Android system-based dial testing method and device for testing number | |
CN114765623A (en) | Information subscribing method, information distributing method and device | |
CN114676205A (en) | Event information processing method and device | |
CN110784358A (en) | Method and device for constructing network call relation topological graph | |
CN110071837B (en) | Alarm processing method and system for access network | |
CN111949421B (en) | SDK calling method, device, electronic equipment and computer readable storage medium | |
CN113949522A (en) | System and method for realizing intelligent data communication forwarding | |
CN111262747B (en) | Internet of things-based equipment network access control method and Internet of things platform | |
CN111008209B (en) | Data reconciliation method, device and system, storage medium and electronic device | |
CN104394283A (en) | Dynamic adjustment method and system of IVR menu | |
CN108234795B (en) | Voice alarm method, device, system, storage medium and processor | |
CN116795643A (en) | Alarm management method | |
CN108260077A (en) | For identifying the device and method for usurping vehicle identification identification information | |
CN111683113A (en) | Method and device for clearing service | |
CN106959903A (en) | Trap instruction Trap processing method and processing device | |
CN109858637A (en) | A kind of unattended carwash fault handling method, device and system | |
CN114143403B (en) | Intelligent outbound method, device, outbound system and storage medium | |
CN117255002A (en) | Fault processing method and device, storage medium and network equipment | |
CN100401681C (en) | Method for realizing configuration of service frame data | |
WO2020259045A1 (en) | Method and device for identifying terminal experiencing anomaly, storage medium, and electronic device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |