CN111769966B - Clone upgrading method, system and application - Google Patents

Clone upgrading method, system and application Download PDF

Info

Publication number
CN111769966B
CN111769966B CN202010380107.9A CN202010380107A CN111769966B CN 111769966 B CN111769966 B CN 111769966B CN 202010380107 A CN202010380107 A CN 202010380107A CN 111769966 B CN111769966 B CN 111769966B
Authority
CN
China
Prior art keywords
upgrade
base station
clone
software
dect
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010380107.9A
Other languages
Chinese (zh)
Other versions
CN111769966A (en
Inventor
叶国真
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiamen Yealink Network Technology Co Ltd
Original Assignee
Xiamen Yealink Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiamen Yealink Network Technology Co Ltd filed Critical Xiamen Yealink Network Technology Co Ltd
Priority to CN202010380107.9A priority Critical patent/CN111769966B/en
Publication of CN111769966A publication Critical patent/CN111769966A/en
Priority to PCT/CN2021/084258 priority patent/WO2021223549A1/en
Application granted granted Critical
Publication of CN111769966B publication Critical patent/CN111769966B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0813Configuration setting characterised by the conditions triggering a change of settings
    • H04L41/082Configuration setting characterised by the conditions triggering a change of settings the condition being updates or upgrades of network functionality
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/61Installation
    • G06F8/63Image based installation; Cloning; Build to order
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/70Software maintenance or management
    • G06F8/71Version control; Configuration management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/084Configuration by using pre-existing information, e.g. using templates or copying from other elements
    • H04L41/0846Configuration by using pre-existing information, e.g. using templates or copying from other elements based on copy from other elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0876Aspects of the degree of configuration automation
    • H04L41/0886Fully automatic configuration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0889Techniques to speed-up the configuration process
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0893Assignment of logical groups to network elements
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Automation & Control Theory (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Stored Programmes (AREA)

Abstract

The invention discloses a clone upgrading method, a clone upgrading system and application, and belongs to the technical field of DECT. Aiming at the problem of low anti-degradation management efficiency of DECT roaming system software and hardware in the prior art, the invention provides a clone upgrading method, a clone upgrading system and a DECT roaming system. The invention realizes the degradation limit of the base station in the DECT roaming system by using the hardware upgrading number and the software upgrading number, does not need management personnel to pay attention to the problem of software version matching, avoids system or equipment faults caused by negligence in management, ensures that the system is stable, improves the management efficiency, and is suitable for deployment and use of the roaming system.

Description

Clone upgrading method, system and application
Technical Field
The invention relates to the technical field of DECT, in particular to a clone upgrading method, a clone upgrading system and an application.
Background
In a DECT roaming system, a Base station Base roams between different DECT hosts DM, the Base station being connected to a DECT host registration while roaming in the system. If the Base is in the DM1 roaming system, the Base needs to be connected with DM 1; when a Base registers with a DM2 roaming system, the Base needs to first de-register with DM1 from the DM1 roaming system and then connect with DM2 registration. At this time, there may be a problem that the software versions of DM1 and DM2 are inconsistent, for example, DM1 is a new software version and DM2 is an old software version, and then the software corresponding to the Base is degraded from the new version to the old version. After a software version is upgraded, degradation from a new version of the software to an old version of the software is typically not allowed, i.e., degradation is prohibited, due to problems with the old version of the software. If the software version corresponding to the Base is de-registered from the DM1 and then is degraded with the software version generated in the DM2 registration process, the system is abnormal in running.
Therefore, the inter-equipment upgrading in the DECT roaming system needs to be subjected to degradation limitation, otherwise, if the DM1 roaming system and the DM2 roaming system are used, the Base is logged out from the DM1 roaming system and is registered to the DM2 roaming system, and when the software versions are inconsistent, the software corresponding to the Base is degraded from the new version to the old version, so that the system is abnormal.
Meanwhile, there are also hardware upgrade cases in roaming systems, such as: DM1 and Base are new hardware devices, DM2 is old hardware device, base may be logged out from DM1 roaming system, then registered to DM2 roaming system, if Base directly clones and upgrades DM2 roaming system software, base clone upgrade may be finished, but normal use cannot be achieved due to inconsistency with DM2 device hardware version.
Therefore, there is a need for software and hardware degradation prevention in roaming system clone upgrades, which may lead to risks such as overall system or device anomalies if inter-device clone upgrades are not limiting.
Aiming at roaming system software and hardware degradation prevention in the prior art, the method is mainly realized through personnel management, a roaming system administrator is required to perform registration and cancellation management of a base station, the registration of new hardware equipment of the base station to a DECT host of old hardware equipment is forbidden, and the registration of new software base station to DECT host software forbidden to degrade is forbidden. The management and control efficiency of the base station registration and cancellation by an administrator is extremely low, errors are easy to occur, and the roaming system is inconvenient to deploy and use.
Disclosure of Invention
1. Technical problem to be solved
Aiming at the problems of low anti-degradation management efficiency and inconvenient operation of the DECT roaming system software and hardware in the prior art, the invention provides a clone upgrading method, a clone upgrading system and an application, wherein clone upgrading is realized among devices in the DECT roaming system, meanwhile, the anti-degradation limitation of the hardware and the software is overcome, the system is prevented from faults or device abnormality, and the roaming system management efficiency is improved.
2. Technical proposal
The aim of the invention is achieved by the following technical scheme.
A clone upgrade method, the hardware upgrade number, the software upgrade number and the software version number of the base station are compared with the hardware upgrade number, the software upgrade number and the software version number corresponding to the DECT host in turn, and the base station which accords with the upgrade condition is clone upgraded to the same firmware as the DECT host. When the base station is added into the roaming system of the DECT host, the base station needs to be registered into the corresponding DECT host, and when the hardware or software version numbers of the base station and the DECT host are inconsistent, the base station is easy to cause operation errors, so that when the base station is registered on the DECT host, the version of the base station needs to be upgraded to be the same as that of the DECT host, and the operation stability is ensured. The firmware information includes a software program used, etc., and the system firmware configures a hardware upgrade number and a software upgrade number.
The hardware upgrade number is burnt and stored in a Flash memory when the equipment leaves the factory, the hardware upgrade number cannot be changed even if the subsequent software is upgraded, and the hardware upgrade number of the equipment is compared when the anti-degradation clone is upgraded. The software upgrade number is stored in the Flash of the device when the firmware is upgraded, the software upgrade number in the firmware upgrade device follows the software update, and the software upgrade number in the firmware is synchronized. When the DECT host version is lower than the base station, the automatic upgrading of the base station actually causes degradation operation, and operation errors or system anomalies are easy to generate. The invention compares the hardware version numbers and the software version numbers of the base station and the DECT host before the base station automatically clones and upgrades, and clones and upgrades only when the comparison result meets the upgrade condition, thereby ensuring the stability of the system.
Furthermore, the base station hardware upgrade number is smaller than or equal to the DECT host hardware upgrade number, and/or the base station software upgrade number is smaller than or equal to the DECT host software upgrade number, and the DECT host supports the base station upgrade firmware. When the base station hardware upgrade number is larger than the DECT host hardware upgrade number, in order to avoid system abnormality, the base station software is not allowed to be degraded, and the limitation of degradation is prompted on a DECT host webpage. When the hardware upgrade number of the base station is larger than that of the DECT host, the system clone upgrade at the moment actually brings a degradation result, the base station does not allow upgrade operation, the upgrade system exits the upgrade flow, and meanwhile, the base station is generally forbidden to be used in a roaming system of the DECT host for system stability.
And when the base station software upgrading number is larger than the DECT host software upgrading number, the system operation stability is ensured, and the degradation operation is prompted to be limited. When the base station software upgrading number is larger than the DECT host software upgrading number, the system cloning upgrading at the moment actually brings a degradation result, the base station does not allow upgrading, the upgrading system exits the upgrading flow, and meanwhile, the base station is generally forbidden to be used in a roaming system of the DECT host for system stability. Limiting the hints of degradation facilitates the user in diagnosing problems at the time of use.
Further, the base station limits firmware degradation after cloning and upgrading firmware. In order to prevent the actual degradation effect generated by automatic clone promotion of a base station when roaming in different DECT host roaming systems, when the degradation is limited by equipment software, the state of the base station is displayed as firmware degradation prevention on a DECT host webpage, so that a manager can conveniently identify faults and solve problems.
Furthermore, the base station and the DECT host limit the firmware degradation of the base station by comparing the same field in the software version number. In addition to comparing the software upgrade number with the hardware upgrade number, the invention can also prevent the system from being abnormal due to actual degradation operation caused by automatic upgrade by comparing the ID numbers in the software version number.
Furthermore, the base station stores a plurality of system data, the firmware information of clone copy is stored in the backup system, and the backup system is started to operate to realize clone upgrade. The invention realizes clone upgrade, the cloned system is stored in the backup system of the system, and the clone ends restarting operation from the backup system to finish the upgrade of the firmware. When the next firmware needs to be updated, the firmware information is stored in the backup system under the current running condition, and the operation is repeated.
Further, the firmware information is DECT host root file system module data. Generally, the upgrade modification of the application software is included in the root file system module, so that the software upgrade is only to upgrade the root file system module data, and the clone upgrade of the corresponding software can be completed only by cloning and copying the root file system module data during the clone upgrade.
The clone upgrading system comprises a comparison module and a clone module, wherein the comparison module is used for judging whether the clone upgrading conditions are met or not, and triggering the clone module to carry out clone upgrading after the clone upgrading conditions are met. When the clone upgrading system operates, whether the upgrading conditions are met or not is judged through the comparison module, the clone module is started by triggering the upgrading conditions, and the clone module clones the copy data to upgrade. And directly exiting the upgrading program without conforming to the upgrading conditions, and not operating.
Further, the upgrading module comprises a synchronous server module and a synchronous client module, and the synchronous server module is triggered and started by the comparison module and is used for transmitting data to the synchronous client module; and the synchronous client module receives the data transmitted by the synchronous server, and realizes clone upgrading.
Further, the data transmitted by the synchronization server module and the synchronization client module is root file system data. The synchronous client module clones and copies the root file system data in the synchronous server module to realize upgrading.
A DECT roaming system comprises a plurality of DECT hosts and a plurality of base stations, wherein the base stations are registered on the DECT hosts and added into the corresponding roaming system of the DECT hosts. And the base station clones the synchronous server module data of the DECT host computer in the backup system through the synchronous client module to realize cloning and upgrading.
The clone upgrading system is applied to the DECT roaming system, when the base station is added into the roaming system and is inconsistent with the software version of the DECT host in the roaming system, the comparison module is used for comparing the hardware upgrading number, the software upgrading number and the software version number of the base station and the DECT host, if the upgrading conditions are met, the clone upgrading is carried out on the base station, and after the clone upgrading, the firmware limits the degradation operation, so that the stability of the system is ensured, the labor cost of upgrading management of the roaming system is reduced, the management efficiency is improved, and the deployment of the DECT roaming system is facilitated.
3. Advantageous effects
Compared with the prior art, the invention has the advantages that:
when the base station is registered in the roaming system of the DECT host, the updating of the base station software version is realized through clone updating, the updating mode is simple, the operation is convenient, and the storage space is saved. When the base station is registered to the DECT host, the DECT host automatically acquires the related information of the base station, and compares the information automatically acquired by the DECT host with the information of the DECT host, so that the management of the equipment software version is realized, the roaming system is ensured to be always in a stable running state, the storage space is not additionally occupied, the storage space is saved, the space utilization efficiency is improved, the upgrading speed is faster, and the running efficiency is high.
The invention can effectively avoid the problems that the new hardware equipment cannot be used or is abnormal and the like caused by clone upgrade of the new software version base station registered to the old software version DECT host machine or clone upgrade of the new hardware base station equipment registered to the old hard DECT host machine equipment. The system and the method have the advantages that the function of degrading and limiting the base station in the roaming system is realized by using the hardware upgrading number and the software upgrading number, management personnel do not need to pay attention to the problem of software version matching, manpower management resources are greatly reduced, system or equipment faults caused by management negligence are avoided, management efficiency is improved when the system is stable, and the system and the method are suitable for deployment and use of the roaming system.
Drawings
FIG. 1 is a flow chart of a roaming system Base clone upgrade of the present invention.
Detailed Description
The invention will now be described in detail with reference to the drawings and the accompanying specific examples.
Example 1
The DECT roaming system comprises DM, which is a host for service clusters for all Base in the local area network, also called DECT host in this application, and Base, which is a DECT device with VOIP service, a Base station like a handset, also called Base station in this application.
The DECT roaming system needs to update the system by corresponding base stations when new functions are added or problems are repaired. Generally, upgrade and modification of application software are all contained in an RFS module, so that software upgrade is only to upgrade RFS module data, in order to upgrade a base station better, reduce manpower resource management, save storage space, and use a clone upgrade method between base stations.
The invention realizes the function of limiting degradation to the base station in the roaming system through the hardware upgrading number and the software upgrading number. When roaming system firmware is packaged, the system firmware configures a hardware upgrade number and a software upgrade number. The hardware upgrade number is burnt and stored in Flash when the equipment leaves the factory, and the hardware upgrade number is not changed when the software is upgraded. The software upgrade number is stored in the Flash of the device when the firmware is upgraded, the software upgrade number in the firmware upgrade device follows the software update, and the software upgrade number in the firmware is synchronized.
Before cloning and upgrading between devices in a roaming system, judging whether software and hardware upgrading numbers of a DECT host and a base station meet upgrading conditions or not, if not, prohibiting the base station from cloning and upgrading, and prohibiting the base station from being used in the DECT host roaming system, so that the whole roaming system function is prevented from being influenced by inconsistent versions, and meanwhile, the state of the base station is displayed on a webpage of the DECT host to be firmware degradation prevention, thereby being convenient for managers to identify faults and solve problems.
During clone upgrading, the system reads out RFS data of the root file system from the DECT host, then transmits the RFS data to the base station through a network, the base station writes the RFS data into a corresponding memory Flash position, then the base station is set to start from the file system, and the base station is restarted to realize clone upgrading of base station software.
The flow of the anti-degradation clone upgrading of the base station in this embodiment is shown in fig. 1, and specifically includes the following steps:
step S1: the base station is registered on the DECT host, namely, the base station is added into a roaming system of the DECT host to perform initialization operation on the base station.
There are two main registration modes for a base station to register on a DECT host:
firstly, multicast registration is carried out, a base station and a DECT host are in the same multicast network, the DECT host searches unregistered base stations and displays the unregistered base stations in an unregistered list, and the corresponding base stations are clicked on the unregistered list to realize the registration of the base stations. After the base station is registered, the base station is deleted from the unregistered list and is switched to the registered list, and the registered base station only performs network communication with the DECT host.
The second difference between the static registration mode and the multicast registration mode is that the static registration mode is to fill in the IP address of the DECT host on the base station, at this time, only the appointed DECT host can discover the base station to be registered, other DECT hosts cannot discover the base station to be registered, namely, in the static registration mode, the base station to be registered can only be found in the unregistered list of the appointed DECT host, the unregistered list of other DECT hosts cannot find the base station, the base station can only execute registration operation on the appointed DECT host, and the flow of the static registration is consistent with the multicast registration.
The initialization operation comprises checking whether the base station needs to be upgraded or not, namely checking whether the software version numbers of the base station and the DECT host are consistent or not, and judging that the base station needs to be upgraded if the software version numbers of the base station and the DECT host are inconsistent. The base station initializing operation also comprises synchronizing the base station with the configuration data of the DECT host, wherein the synchronized configuration data is the configuration information required by the normal operation of the base station.
Step S2: the base station initialises and judges whether the DECT host has the capability of upgrading the base station.
The base station judges according to the data difference of the Flash data, and in general, the DECT host does not support the upgrade only in the mode of developing internal debugging, and in normal cases, the DECT host supports the upgrade of the base station. After confirming that the DECT host has the capability of upgrading the base station, the DECT host obtains the software version number, the hardware upgrading number and the software upgrading number information of the base station.
Step S3: the DECT host obtains the software version number, the hardware upgrade number and the software upgrade number information of the host. In order to prevent degradation of the base station during clone upgrades, the base station needs to be compared with the corresponding software and hardware version information of the DECT host.
Step S4: and comparing the hardware upgrade number of the DECT host with the hardware upgrade number of the base station.
The hardware upgrade number is burnt and stored in a Flash memory when the equipment leaves the factory, the hardware upgrade number cannot be changed even if the subsequent software is upgraded, and the hardware upgrade number of the equipment is compared when the anti-degradation clone is upgraded.
Assuming that the hardware upgrade number of the DECT host is X, the upgrade number of the base station hardware is X, comparing the sizes of X and X, and when the upgrade number of the base station hardware is less than or equal to the upgrade number of the DECT host, the DECT host supports the upgrade of the base station; when the hardware upgrade number X of the base station is larger than the hardware upgrade number X of the DECT host, the base station does not allow the upgrade, meanwhile, the upgrade system prompts to limit the degradation on the webpage of the DECT host, the upgrade system exits the upgrade process, and meanwhile, the base station is forbidden to be used in the roaming system of the DECT host.
Step S5: and comparing the DECT host software upgrading number with the base station software upgrading number.
Assuming that the DECT host software upgrading number is Y, the base station software upgrading number is Y, comparing the sizes of Y and Y, and when the base station software upgrading number Y is smaller than or equal to the DECT host software upgrading number Y, the DECT host only supports the base station upgrading; when the base station software upgrading number Y is larger than the DECT host software upgrading number Y, the base station does not allow upgrading, meanwhile, the upgrading system prompts to limit degradation on a DECT host webpage, the upgrading system exits from the upgrading process, and meanwhile, the base station is forbidden to be used in a roaming system of the DECT host.
Step S6: and comparing the DECT host software version number with the base station software version number, and starting the synchronous server service by the DECT host.
When the DECT host software version number is inconsistent with the base station software version number, the base station starts the upgrading process to enter an upgrading state. And the base station realizes clone upgrading by cloning RFS module data of a root file system of the DECT host during upgrading. And when in upgrading, the DECT host starts the service of the synchronous server and waits for the base station to start the service of the synchronous client and then connect.
Step S7: the base station initiates a synchronization client service.
The DECT host sends information to inform the base station that software upgrading is needed, the base station provides the IP address and the port number of the DECT host, the base station call interface triggers the starting of the synchronous client service, and the base station carries the IP address of the server when calling. And after the synchronous client is started, the synchronous client is connected with the synchronous server, and the synchronous client performs data transmission with the synchronous server through TCP data encryption transmission.
Step S8: the synchronization client starts cloning the data of the DECT host from the synchronization server.
The synchronous client copies and downloads the root file system module data of the DECT host from the synchronous server, the base station writes the root file system data cloned from the DECT host into a backup system memory, the system memory stores double systems, the storage positions of the two systems on the memory are inconsistent, the starting addresses of the two systems are inconsistent, only one system is operated when the system is started, and the other system is backup.
Step S9: the base station completes cloning of DECT host data, restarts the base station and completes cloning and upgrading of the base station.
After the updated firmware information is written into the backup system of the DECT host, the current roaming system is restarted after the next starting from the backup system after the firmware information is written successfully, the base station is restarted and operates from the backup system, the operating system is the system cloned from the DECT host, and the software version numbers of the base station and the DECT host are consistent. When the system needs to be upgraded again, the firmware information to be upgraded is written into the backup system in the current running state, then the backup system is set to be started, and then the operation is repeated in the follow-up mode, so that the clone upgrading of the base station firmware is completed.
The invention adopts the base station to infinitely nest and clone and upgrade the DECT host, realizes unified batch upgrade of the base station, is convenient to operate, compares the hardware upgrade number, the software upgrade number and the software version number of the equipment before upgrade operation, avoids the problems of abnormal or unusable system and the like caused by actual degradation operation generated by clone and upgrade when the hardware or software versions are inconsistent, is convenient to manage, has higher efficiency, and is suitable for deployment of roaming systems.
Example 2
The present embodiment is basically the same as embodiment 1, except that the present embodiment realizes the limitation of software degradation prevention by comparing the ID number of a certain field in the software version number.
I.e. in steps S5 to S6 in example 1, the DECT host and software version numbers are directly compared. For example, the software version number rules for a device are: and the AA, BB, CC and DD sequentially compare the values of the corresponding fields according to the sequence of the AA, BB, CC and DD, so that software degradation prevention is realized.
Suppose there is a DECT host software version number of: 96.0.0.1, the base station software version number is: 96.1.0.1, directly comparing DECT host and software version numbers. The AA fields in the DECT host and the base station software version numbers are the same as 96, then the values of BB fields are compared to determine whether degradation is limited, and if the value of BB field is smaller than 1, namely the DECT software version is lower than the base station software version, and when the base station is registered on the DECT host, the base station is limited to degrade, or the use of a roaming system of the base station registered on the DECT host is directly forbidden, so that the occurrence of abnormality is avoided.
The foregoing has been described schematically the invention and embodiments thereof, which are not limiting, but are capable of other specific forms of implementing the invention without departing from its spirit or essential characteristics. The drawings are also intended to depict only one embodiment of the invention, and therefore the actual construction is not intended to limit the claims, any reference number in the claims not being intended to limit the claims. Therefore, if one of ordinary skill in the art is informed by this disclosure, a structural manner and an embodiment similar to the technical scheme are not creatively designed without departing from the gist of the present invention, and all the structural manners and the embodiment are considered to be within the protection scope of the present patent. In addition, the word "comprising" does not exclude other elements or steps, and the word "a" or "an" preceding an element does not exclude the inclusion of a plurality of such elements. The various elements recited in the product claims may also be embodied in software or hardware. The terms first, second, etc. are used to denote a name, but not any particular order.

Claims (7)

1. A clone upgrade method is characterized in that the hardware upgrade number, the software upgrade number and the software version number of a base station are sequentially compared with the hardware upgrade number, the software upgrade number and the software version number corresponding to a DECT host, and the base station which accords with upgrade conditions is clone-upgraded to the same firmware as the DECT host; the base station hardware upgrade number is smaller than or equal to the DECT host hardware upgrade number, and the base station software upgrade number is smaller than or equal to the DECT host software upgrade number, and the DECT host supports the base station upgrade firmware; after cloning and upgrading firmware, the base station limits firmware degradation; the base station and the DECT host limit the firmware degradation of the base station by comparing the same fields in the software version numbers;
the hardware upgrade number is burnt and stored in a Flash memory when the equipment leaves a factory, the hardware upgrade number cannot be changed in subsequent software upgrade, when clone upgrade is carried out, the hardware upgrade number of the equipment is compared, the software upgrade number is stored in the equipment Flash when firmware upgrade is carried out, the software upgrade number in the firmware upgrade equipment follows the software upgrade, and the software upgrade number in the firmware is synchronized.
2. The clone upgrade method according to claim 1, wherein the base station stores a plurality of system data, the clone copied firmware information is stored in the backup system, and the backup system is started to be operated to realize clone upgrade.
3. A method of clone upgrade according to claim 2, wherein the firmware information is DECT host root file system module data.
4. A system for a clone upgrade method according to any one of claims 1-3, comprising a comparison module and a clone module, wherein the comparison module is used for judging whether the clone upgrade condition is met, and triggering the clone module to perform the clone upgrade after the upgrade condition is met.
5. The system of claim 4, wherein the cloning module comprises a synchronization server module and a synchronization client module, the synchronization server module being triggered and started by the comparison module for transmitting data to the synchronization client module; and the synchronous client module receives the data transmitted by the synchronous server, and realizes clone upgrading.
6. The system of claim 4 or 5, wherein the data transmitted by the synchronization server module and the synchronization client module is root file system data.
7. A DECT roaming system comprising a plurality of DECT hosts and a plurality of base stations, the base stations being registered on the DECT hosts and joining the DECT hosts to the roaming system, characterized in that the system comprises a clone upgrade method according to any one of claims 4-6, the DECT hosts being connected to a synchronization server module, the base stations being connected to a synchronization client module.
CN202010380107.9A 2020-05-08 2020-05-08 Clone upgrading method, system and application Active CN111769966B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202010380107.9A CN111769966B (en) 2020-05-08 2020-05-08 Clone upgrading method, system and application
PCT/CN2021/084258 WO2021223549A1 (en) 2020-05-08 2021-03-31 Clone upgrading method and system, and application

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010380107.9A CN111769966B (en) 2020-05-08 2020-05-08 Clone upgrading method, system and application

Publications (2)

Publication Number Publication Date
CN111769966A CN111769966A (en) 2020-10-13
CN111769966B true CN111769966B (en) 2023-06-23

Family

ID=72720341

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010380107.9A Active CN111769966B (en) 2020-05-08 2020-05-08 Clone upgrading method, system and application

Country Status (2)

Country Link
CN (1) CN111769966B (en)
WO (1) WO2021223549A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111769966B (en) * 2020-05-08 2023-06-23 厦门亿联网络技术股份有限公司 Clone upgrading method, system and application
CN117667522A (en) * 2023-12-29 2024-03-08 深圳市安信达存储技术有限公司 Firmware information cloning method based on MCU

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102098303A (en) * 2011-01-21 2011-06-15 汉柏科技有限公司 Hardware firewall for realizing automatic upgrade and upgrading method thereof
CN103490927A (en) * 2013-09-10 2014-01-01 中兴通讯股份有限公司 Firmware upgrading method, equipment and communication system
CN103581710A (en) * 2013-10-28 2014-02-12 青岛海信宽带多媒体技术有限公司 Upgrade server, set top box and software upgrading method for upgrade server and set top box
CN109343877A (en) * 2018-08-31 2019-02-15 中国电力科学研究院有限公司 A kind of method and system for the upgrading of acquisition terminal remote software upgrade package
CN110134420A (en) * 2019-05-22 2019-08-16 上海诺雅克电气有限公司 Firmware upgrade method and system based on cloud platform

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100780362B1 (en) * 2006-10-27 2007-11-30 삼성전자주식회사 Apparatus and method for downloading sofrware in portable terminal
US9256728B2 (en) * 2008-11-26 2016-02-09 Nokia Technologies Oy Method, apparatus, and computer program product for managing software versions
US8745612B1 (en) * 2011-01-14 2014-06-03 Google Inc. Secure versioning of software packages
CN102164363B (en) * 2011-04-14 2014-05-07 新邮通信设备有限公司 Base station version updating realization method and base station
US8893116B2 (en) * 2012-01-15 2014-11-18 Microsoft Corporation Installation engine and package format for parallelizable, reliable installations
CN109508534A (en) * 2017-09-14 2019-03-22 厦门雅迅网络股份有限公司 Prevent method, the embedded system attacked that degrade by software
CN109526017B (en) * 2018-12-31 2022-06-03 超讯通信股份有限公司 Distributed small base station upgrading method and system
CN111443927A (en) * 2020-02-25 2020-07-24 厦门亿联网络技术股份有限公司 Method and system for clone upgrading between DECT roaming system devices
CN111769966B (en) * 2020-05-08 2023-06-23 厦门亿联网络技术股份有限公司 Clone upgrading method, system and application

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102098303A (en) * 2011-01-21 2011-06-15 汉柏科技有限公司 Hardware firewall for realizing automatic upgrade and upgrading method thereof
CN103490927A (en) * 2013-09-10 2014-01-01 中兴通讯股份有限公司 Firmware upgrading method, equipment and communication system
CN103581710A (en) * 2013-10-28 2014-02-12 青岛海信宽带多媒体技术有限公司 Upgrade server, set top box and software upgrading method for upgrade server and set top box
CN109343877A (en) * 2018-08-31 2019-02-15 中国电力科学研究院有限公司 A kind of method and system for the upgrading of acquisition terminal remote software upgrade package
CN110134420A (en) * 2019-05-22 2019-08-16 上海诺雅克电气有限公司 Firmware upgrade method and system based on cloud platform

Also Published As

Publication number Publication date
CN111769966A (en) 2020-10-13
WO2021223549A1 (en) 2021-11-11

Similar Documents

Publication Publication Date Title
CN100525206C (en) Realizing method and system for automatic restoring equipment fault
CN105681060B (en) virtualized network function management upgrading method, device and server
CN100518082C (en) Long-distance on-line updating method with self-recovery function
CN111625249B (en) Automatic upgrading and rollback method and device for Internet of things equipment
CN101222363B (en) IP access gate batch upgrading system and method
CN111769966B (en) Clone upgrading method, system and application
EP1780940A1 (en) High availability network systems
US11868787B2 (en) Managing persistent enrollment of a user device
CN112470119B (en) Service upgrading method and device in distributed system and distributed system
CN101742061A (en) Method and system for updating software of liquid crystal display television (LCD TV)
CN103200271A (en) Advanced Risc machine (ARM) server and method of automatic installation system thereof
US20220277071A1 (en) Enforcing policies for unmanaged applications
WO2021169749A1 (en) Method and system for cloning and upgrading between devices of dect roaming system
WO2006057861A1 (en) System and method for over-the-air update of wireless communication devices
CN111273924A (en) Software updating method and device
CN103019752B (en) The upgrade method of application program and device
CN108536541B (en) Process engine object processing method and device
CN112099902A (en) Network adapter configuration method and device of virtual machine, electronic device and storage medium
CN109799997B (en) Management method for presetting third party application, intelligent terminal and storage medium
CN101179804A (en) Reset method and system of mobile terminal
WO2010099744A1 (en) Method, device and system for dynamic upgrade of a service
CN113242323B (en) Method, storage medium, and system for automatically installing system for physical server
CN114513414B (en) Method for managing AP, AC and AP
CN112653585B (en) Automatic staged processing method and device for service mobility
CN117234544B (en) Method and device for recovering system of server equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant