CN111970138B - Network resource management and control system and resource management method - Google Patents

Network resource management and control system and resource management method Download PDF

Info

Publication number
CN111970138B
CN111970138B CN202010245403.8A CN202010245403A CN111970138B CN 111970138 B CN111970138 B CN 111970138B CN 202010245403 A CN202010245403 A CN 202010245403A CN 111970138 B CN111970138 B CN 111970138B
Authority
CN
China
Prior art keywords
information
equipment
data
management
layer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010245403.8A
Other languages
Chinese (zh)
Other versions
CN111970138A (en
Inventor
周洋
张盛安
孙玉洁
付中林
陈卿
陈常霖
洪寰
田勇
方浩
王劲午
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guizhou Power Grid Co Ltd
Original Assignee
Guizhou Power Grid Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guizhou Power Grid Co Ltd filed Critical Guizhou Power Grid Co Ltd
Priority to CN202010245403.8A priority Critical patent/CN111970138B/en
Publication of CN111970138A publication Critical patent/CN111970138A/en
Application granted granted Critical
Publication of CN111970138B publication Critical patent/CN111970138B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/02Standardisation; Integration
    • H04L41/0213Standardised network management protocols, e.g. simple network management protocol [SNMP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/02Standardisation; Integration
    • H04L41/0246Exchanging or transporting network management information using the Internet; Embedding network management web servers in network elements; Web-services-based protocols
    • H04L41/0253Exchanging or transporting network management information using the Internet; Embedding network management web servers in network elements; Web-services-based protocols using browsers or web-pages for accessing management information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/04Network management architectures or arrangements
    • H04L41/044Network management architectures or arrangements comprising hierarchical management structures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0893Assignment of logical groups to network elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0896Bandwidth or capacity management, i.e. automatically increasing or decreasing capacities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/22Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/28Restricting access to network management systems or functions, e.g. using authorisation function to access network configuration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]

Abstract

The invention discloses a network resource management and control system and a resource management method, wherein the management and control system adopts a layered structure and comprises a hardware layer, a data storage layer, an application supporting layer, an application layer and a view display layer, and data transmission and interconnection are carried out among the layers through interfaces. The invention has the beneficial effects that: the whole system adopts a layered design, clear layers and low coupling can be guaranteed, and data transmission and interconnection are carried out on all layers through interfaces, so that all layers of data are verified, the operation safety of the data is guaranteed, and the management and control integrated management information system is realized.

Description

Network resource management and control system and resource management method
Technical Field
The present invention relates to the field of network resource management and control technologies, and in particular, to a network resource management and control system and a resource management method based on the network resource management and control system.
Background
Network resources are the sum of various information resources that can be utilized by means of a network environment, and are also referred to as network information resources. Network information resources refer to a collection of information content recorded in digitized form, expressed in multimedia form, stored on network computer magnetic media, optical media, and various types of communication media, and communicated via computer network communication. Network information resources refer to collections of various forms of education-related knowledge, materials, intelligence, messages, etc., that are hidden on the network. The network information resource is an information resource that stores information in various forms such as text, image, sound, and moving image in the form of electronic data on a non-printed carrier such as an optical disk and reproduces the information in the form of network communication, computer, or terminal. The network information resource refers to a set of information which is developed, produced and transmitted together by means of computers and other devices and can be acquired by human beings through a network in order to meet the requirements of human beings.
The network resource planning and configuration is used as an important component of network management, is a basis for providing on-demand guarantee for users and services, needs to consider network requirements and master network situation from the global perspective so as to ensure that the communication network can fully exert the efficiency of the communication network, and has important research value. The intelligent planning and configuration of network resources is a technological development trend. Therefore, whether the network resource planning and configuration method is intelligent and dynamically adapts to the surrounding environment is the key factor in the design or model selection of network resource planning and configuration.
Disclosure of Invention
This section is for the purpose of summarizing some aspects of embodiments of the invention and to briefly introduce some preferred embodiments. In this section, as well as in the abstract and the title of the invention of this application, simplifications or omissions may be made to avoid obscuring the purpose of the section, the abstract and the title, and such simplifications or omissions are not intended to limit the scope of the invention.
The present invention has been made in view of the above-mentioned conventional problems.
Therefore, the technical problem solved by the invention is as follows: a network resource management and control system is provided for the secure management of network resources.
In order to solve the technical problems, the invention provides the following technical scheme: a network resource management and control system adopts a layered structure and comprises a hardware layer, a data storage layer, an application support layer, an application layer and a view display layer, wherein data transmission and interconnection are performed among the layers through interfaces; the hardware layer comprises hardware equipment needing to be monitored, and static information of equipment resources and dynamic information generated in operation can be read by accessing a management information base of the hardware equipment; the data storage layer is capable of storing device information; the application supporting layer provides strong support for the application layer through an application server and supports the integration of external resources to content management basic data and application data of the content management to the external data resources; the application layer completes the function requirement by performing program logic control on the control system; the view display layer displays the network diagram, the performance index and the data analysis chart through an interactive interface, and a user can visually and specifically see the resource change condition.
As a preferred embodiment of the network resource management and control system of the present invention, wherein: the management and control system also comprises an operation monitoring module and a network security module; the operation monitoring module monitors parameters of the whole network resource in real time to ensure the operation state of the control system; the network security module adopts foreground and background double verification, parameter coding transmission, password security strategy, password hash encryption storage, fine authority verification, data verification and SQL coding filtering according to the Web system security specification.
As a preferred embodiment of the network resource management and control system of the present invention, wherein: the hardware layer comprises network equipment, a computer, a server and mobile equipment, and accesses a management information base of the hardware equipment through an SNMP protocol.
As a preferred embodiment of the network resource management and control system of the present invention, wherein: the data storage layer stores equipment information by adopting a MySql database, manages and records service configuration information and parameter setting according to existing data resources and service requirements of users, issues visual result content to the outside after relevant service processing for users to use, and is communicated with the data application layer through an access interface.
As a preferable scheme of the network resource management and control system of the present invention, wherein: the Framework of the control system adopts a jeesite rapid development platform of Spring boot + MyBatis + Shiro, and takes Spring Framework as a core container, spring MVC as a model view controller, myBatis as a data access layer, apache Shiro as an authority authorization layer and Activit as a workflow engine.
As a preferable scheme of the network resource management and control system of the present invention, wherein: the functional architecture of the Mybatis is divided into an API (application program interface) layer, a data processing layer and a basic supporting layer; the API interface layer provides interface APIs for external use, the database is manipulated through the local APIs, and the API interface layer calls the data processing layer to complete specific data processing as soon as receiving a call request; the data processing layer is responsible for specific SQL searching, SQL analysis, SQL execution and execution result mapping processing, and completes database operation once according to a calling request; the basic support layer is responsible for basic function support, including connection management, transaction management, configuration loading and cache processing, and provides basic support for the data processing layer.
As a preferred embodiment of the network resource management and control system of the present invention, wherein: the application server is based on the display service system construction of Spring MVC, HTTP information of the URL address request can be directly mapped into a JAVA program through a Spring MVC structure, and processing steps are distributed to different equipment components for processing.
The invention aims to provide a management method of network resources.
In order to solve the technical problems, the invention provides the following technical scheme: a resource management method, the application layer in the network resource management and control system analyzes according to the demand, including data analysis module, resource management module, resource positioning module, alarm management module and authority management module;
the resource management module adopts the following resource management method: adding static information of equipment, constructing a database of a new system according to the existing equipment classification information, and supporting the import and export of the information of the newly added equipment; collecting performance information of equipment resources, applications and services; displaying the information in a plurality of dimensionalities of time, resources and performance types through a data display module, performing semantic mapping, and displaying monitored parameters in a high readability manner; classifying the resource equipment according to different categories and different grades; different resources are managed and controlled by different means, and resources with higher monitoring level are subjected to positioning alarm prompt monitoring; when the device generates the change information, the device information is modified online.
As a preferable scheme of the resource management method of the present invention, wherein: the resource management module comprises an information display module, an information management module and an auxiliary function module; the information display module comprises an equipment information list and equipment information detailed inquiry; the information management module comprises application service management, equipment change control and semantic mapping; the auxiliary function module comprises data verification and export import change information.
As a preferable scheme of the resource management method of the present invention, wherein: the equipment information list comprises the following steps that a user enters an equipment management interface and selects, clicks and inquires screening conditions; multi-condition compound query and fuzzy query can be carried out according to the input search condition; screening out the equipment records meeting the conditions in a form of a table, and displaying the information of the equipment below the page; the method comprises the following steps that a user enters an equipment management interface and clicks corresponding equipment to check detailed information; according to the selection of the user, taking out the information of the corresponding equipment from the database; returning an interface of detailed equipment information; the application service management comprises the following steps that a user clicks corresponding server equipment to check the interface condition of the equipment and publishes information by borrowing; dynamically acquiring the interface condition of the server according to the selection of a user; returning to a server state interface, and displaying the data release condition of the port; the equipment change control comprises the following steps that a user clicks the existing equipment to change the equipment information, or selects the newly added equipment and inputs the information of the equipment; if the equipment exists, updating the equipment information of the background of the database, and if the equipment is newly added, adding the equipment information into the database; returning to an equipment information list interface after the successful addition, and popping up a prompt box if the addition fails; the semantic mapping comprises the following steps of inputting information of mac addresses and port numbers; converting the information through a defined semantic mapping function; the message is popular and easy to understand after conversion; the data verification comprises the following steps of adding or updating equipment information; performing simple data verification in a foreground, and performing data integrity verification and data uniqueness verification when information is saved in a database; returning to an equipment interface after the updating or adding is successful, if the updating or adding is failed, popping up a prompt box and indicating the error reason; the change information export and import comprises the step that a user selects information export in an equipment resource list; the background database inquires the selected information content; the entries are stored in a database and the information of the device is exported in Excel format according to the template.
The invention has the beneficial effects that: the whole system adopts a layered design, clear layers and low coupling can be guaranteed, and data transmission and interconnection are carried out on all layers through interfaces, so that all layers of data are checked, the operation safety of the data is guaranteed, and a management and control integrated management information system is realized.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the description below are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without inventive labor. Wherein:
fig. 1 is a schematic diagram illustrating an overall architecture of a network resource management and control system according to a first embodiment of the present invention;
fig. 2 is a schematic diagram of Spring technical architecture according to a first embodiment of the present invention;
FIG. 3 is a schematic diagram of Mybatis technology architecture according to a first embodiment of the present invention;
FIG. 4 is a schematic diagram of the architecture of the Shiro technique according to the first embodiment of the present invention;
FIG. 5 is a diagram illustrating a technical structure of a development system using JAVA language according to a first embodiment of the present invention;
fig. 6 is a schematic diagram of a Spring MVC architecture according to a first embodiment of the present invention;
fig. 7 is a schematic diagram of a logic structure and a workflow of the SNMP in accordance with the first embodiment of the present invention;
FIG. 8 is a flowchart illustrating a resource management method according to a second embodiment of the present invention;
FIG. 9 is a diagram illustrating an actual prototype interface for resource management according to a second embodiment of the present invention;
fig. 10 is a flowchart illustrating a resource positioning method for a network resource management and control system according to a third embodiment of the present invention;
FIG. 11 is a schematic diagram of a process for implementing a triangulation algorithm according to a third embodiment of the present invention;
FIG. 12 is a schematic diagram of a framework of a principle of RFID technology used in a third embodiment of the present invention;
fig. 13 is a schematic diagram of a third embodiment of the RFID system according to the present invention.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, specific embodiments accompanied with figures are described in detail below, and it is apparent that the described embodiments are a part of the embodiments of the present invention, not all of the embodiments. All other embodiments, which can be obtained by a person skilled in the art without making any creative effort based on the embodiments in the present invention, shall fall within the protection scope of the present invention.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention, but the present invention may be practiced in other ways than those specifically described and will be readily apparent to those of ordinary skill in the art without departing from the spirit of the present invention, and therefore the present invention is not limited to the specific embodiments disclosed below.
Furthermore, reference herein to "one embodiment" or "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one implementation of the invention. The appearances of the phrase "in one embodiment" in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments.
The present invention will be described in detail with reference to the drawings, wherein the cross-sectional views illustrating the structure of the device are not enlarged partially in general scale for convenience of illustration, and the drawings are only exemplary and should not be construed as limiting the scope of the present invention. In addition, the three-dimensional dimensions of length, width and depth should be included in the actual fabrication.
Meanwhile, in the description of the present invention, it should be noted that the terms "upper, lower, inner and outer" and the like indicate orientations or positional relationships based on the orientations or positional relationships shown in the drawings, and are only for convenience of describing the present invention and simplifying the description, but do not indicate or imply that the referred device or element must have a specific orientation, be constructed in a specific orientation and operate, and thus, cannot be construed as limiting the present invention. Furthermore, the terms first, second, or third are used for descriptive purposes only and are not to be construed as indicating or implying relative importance.
The terms "mounted, connected and connected" in the present invention are to be understood broadly, unless otherwise explicitly specified or limited, for example: can be fixedly connected, detachably connected or integrally connected; they may be mechanically, electrically, or directly connected, or indirectly connected through intervening media, or may be interconnected between two elements. The specific meanings of the above terms in the present invention can be understood in specific cases to those skilled in the art.
Example 1
At present, power supply systems have numerous devices, and therefore careful resource management work needs to be performed, and for the problems that management and control integration cannot be realized in the existing network resource management, and meanwhile, management operability is not strong, and users cannot timely, accurately and effectively manage and control, the embodiment provides a network resource management and control system, and refers to the schematic diagram of fig. 1, which is a general architecture diagram of the network resource management and control system.
Specifically, the management and control system adopts a layered structure and comprises a hardware layer, a data storage layer, an application support layer, an application layer and a view display layer, and data transmission and interconnection are carried out among the layers through interfaces.
The hardware layer comprises hardware equipment needing to be monitored, static information of equipment resources and dynamic information generated in operation can be read by accessing a management information base of the hardware equipment, the management information base of the hardware equipment is accessed by an SNMP protocol, the static information of the equipment resources and the dynamic information such as utilization rate and the like generated in operation are read, and the reading work of the equipment information is completed; the hardware layer comprises network equipment, a computer, a server and mobile equipment, and accesses a management information base of the hardware equipment through an SNMP protocol.
The data storage layer can store equipment information, and the MySql database is used for storing the equipment information. MySql is a relational database and has the advantages of high speed, high reliability and strong adaptability. The data storage layer stores equipment information by adopting a MySql database, manages and records service configuration information and parameter setting according to existing data resources and service requirements of users, issues visual result content to the outside after relevant service processing for users to use, and is communicated with the data application layer through an access interface.
The application support layer provides strong support for the application layer through an application server and supports the integration of external resources to the content management basic data and the application data of the content management to the external data resources; the application layer performs program logic control on the pipe control system to meet the functional requirements; including, for example, electronic forms, workflows, metadata management, security audits, and the like. And supporting the integration of external resources on the basic data of content management and the application data of the content management on the external data resources through the WebService interface service. The application server is based on the display service system construction of Spring MVC, HTTP information of the URL address request can be directly mapped into a JAVA program through a Spring MVC structure, and processing steps are distributed to different equipment components for processing.
The view display layer displays the network graph, the performance index and the data analysis chart through an interactive interface, and a user can visually and specifically see the resource change condition.
Further, the management and control system in this embodiment further includes an operation monitoring module and a network security module; the operation monitoring module monitors parameters of the whole network resources in real time to ensure the operation state of the control system; the network security module adopts foreground and background double verification, parameter coding transmission, password security strategy, password hash encryption storage, fine authority verification, data verification and SQL coding filtering in compliance with the Web system security specification.
The software of the whole management and control system is integrally developed by adopting a jeesite rapid development platform of SpringBoot + MyBatis + Shiro, and SpringFramework is taken as a core container, spring MVC is taken as a model view controller, myBatis is taken as a data access layer, apache Shiro is taken as an authority authorization layer, and Activit is taken as a workflow engine. In addition to employing hierarchical development, the system will take into account the following aspects to complete the overall development:
the system safety requirement is as follows:
the management and control system strictly follows the Web system security specification and adopts foreground and background double verification, parameter coding transmission, password security strategy, password hash encryption storage, fine authority verification, data verification and SQL coding filtering, thereby fundamentally avoiding SQL injection and preventing common Web attack means such as XSS attack, CSRF attack and the like.
And (3) permission control requirements:
the control system is developed by means of the authority management module, the authority of the user, the equipment resource viewing authority and the like are accurately defined, unauthorized persons are strictly controlled to access and modify data resources, authority level division is completed, system safety is protected, and the purpose that authorized persons can only see authorized information is achieved.
Semantic mapping requirements:
the target user personnel of the management and control system also comprise non-professional personnel besides the professional personnel, and the system can provide a semantic mapping function by considering the convenience of the non-professional personnel for using the system, so that complex professional knowledge is converted into an understandable language, and the operability of the system is improved.
It should be noted that, referring to the Spring technical architecture illustrated in fig. 2. Spring is an open source framework that is created to address the complexities of enterprise application development. One of the main advantages of the framework is its hierarchical architecture, which allows the user to choose which component to use, while providing an integrated framework for J2EE application development. Spring uses the basic JavaBean to do what was previously only possible by EJBs. The core of Spring is controlled inversion (IoC) and cut-to-face (AOP).
Spring has the following advantages:
the design is low in intrusion, and the code pollution is extremely low. Independent of various application servers, the application based on the Spring framework can really realize the commitment of WriteOnce and RunAnywhere. The DI mechanism of Spring reduces the complexity of service object replacement and improves the decoupling between components. Spring's AOP support allows centralized management of some common tasks such as security, transactions, logging, etc., providing better reuse. Spring's ORM and DAO provide good integration with third party persistence frameworks and simplify underlying database access. Spring does not force the application to be completely dependent on Spring, and a developer can freely select part or all of the Spring framework.
Referring to the schematic diagram of fig. 3, a schematic diagram of Mybatis technology architecture is shown.
MyBatis is a persistent layer framework that supports customized SQL, stored procedures, and advanced mapping. MyBatis avoids almost all JDBC code and manual setting of parameters and acquisition of result sets. MyBatis can use simple XML or annotations to configure and map native information and map interfaces and Java pojs (plain oridinary Java object) to records in the database. The functional architecture of Mybatis is divided into three layers:
an API interface layer: the externally used interface APIs are provided through which developers manipulate the database. The interface layer, upon receiving the call request, calls the data processing layer to complete the specific data processing.
A data processing layer: and the system is responsible for specific SQL searching, SQL analysis, SQL execution, execution result mapping processing and the like. The main purpose is to complete a database operation according to the called request.
A basic supporting layer: and the system is responsible for the most basic function support, including connection management, transaction management, configuration loading and cache processing which are common things and are extracted as the most basic components. Providing the most basic support for the data processing layer of the upper layer.
Mybatis has the following advantages:
the amount of code is reduced by more than 50% compared to JDBC. MyBatis is the simplest persistence framework, small and simple to learn. MyBatis is quite flexible, cannot impose any influence on the existing design of an application program or a database, SQL is written in XML, is thoroughly separated from program codes, reduces the coupling degree, is convenient for unified management and optimization, and can be reused. And providing XML labels and supporting writing of dynamic SQL statements. And providing a mapping label to support the mapping of the object and the ORM field relation of the database.
Referring to the schematic diagram of fig. 4, a Shiro technology architecture of the present embodiment is illustrated.
Apache shiro is a powerful and easy-to-use Java security framework that performs authentication, authorization, password, and session management. Any application, from the smallest mobile applications to the largest network and enterprise applications, can be quickly and easily obtained using the easy-to-understand API of Shiro.
Shiro mainly comprises three core components: subject, securityManager and Realms.
Subject: i.e. "currently operating user". However, in Shiro, the concept of Subject does not refer to a person only, but may be a third party process, a background account (daemon), or the like. It simply means "what is currently interacting with the software". But you can consider it as a "user" concept of Shiro in view of most purposes and uses.
SecurityManager: it is the core of the Shiro framework, typically the fa ade model, through which Shiro manages internal component instances and provides various services for security management.
And (3) Realm: the real acts as a "bridge" or "connector" between the Shiro and the application security data. That is, when authentication (login) and authorization (access control) verification are performed on a user, shiro looks up the user and its entitlement information from the real of the application configuration. Realm is essentially a security-related DAO: it encapsulates the connection details of the data source and provides the relevant data to the Shiro when needed. When configuring Shiro, at least one real must be specified for authentication and/or authorization. Shiro has built in realms that can connect a large number of secure data sources (also known as directories), such as LDAP, relational databases (JDBC), INI-like text configuration resources, and property files. If the default Realm cannot meet the requirements, an own Realm implementation representing a custom data source can be inserted.
The Shiro advantages are as follows:
javasecuityapi, which is easy to understand. Simple identity authentication (login), support for multiple data sources (LDAP, JDBC, kerberos, activeDirectory, etc.). Simple authorization (access control) to roles supports fine-grained authorization. And a first-level cache is supported to improve the performance of the application program. The built-in POJO-based enterprise session management is suitable for Web and non-Web environments. Heterogeneous client session access. A very simple cryptographic API. The device can be independently operated without binding with any frame or container.
In addition to the development of the technical architecture, it should be noted that the present embodiment is innovative in specific technical ideas. More specifically, the management and control system in this embodiment is developed by using JAVA language. The JAVA language has excellent versatility, high efficiency, platform portability and security.
Referring to the schematic diagram of fig. 5, the system technical structure of the present embodiment is schematically illustrated, and the development is performed by using JAVA language. The method is realized based on a Spring MVC + Hibernate system. More specifically: the overall design content is perfected by consideration of the following aspects.
Firstly, the whole system adopts a layered design, and the whole construction content is divided into a database layer, a data access layer, a business logic layer and a display layer. By the construction, clear layers and low coupling can be guaranteed, and data transmission and interconnection of all layers are realized through the interfaces, so that all layers of data are verified, and the operation safety of the data is guaranteed; and secondly, for safety consideration in the data submission process, a double-layer verification method is adopted to carry out double-layer verification on the form data submitted by the user. And verifying the data information twice based on the client and the server respectively. For example, the text content can not be written, the hidden variable is tampered, the illegal file is uploaded, and other operations, and the operation of skipping the client can be verified and protected, so that the data security is improved; thirdly, a safety coding design is introduced, all data submitted by the user form are subjected to safety coding at a server side, and the condition that the user submits an illegal script or steals the data through SQL injection operation is prevented; fourthly, for login verification operation, carrying out irreversible encryption on a user name and a password to ensure the safety of a ciphertext, and preventing accidents or safety problems caused by leakage; and the user authority control and the user authority verification service are used for preventing the illegal access operation of the user and improving the safety content of the system.
The present embodiment includes the schematic diagram referring to fig. 6, which is a Spring MVC architecture. The embodiment is based on the display service system construction of Spring MVC, and the Spring MVC is a light-weight structure which can keep good operation capability under the high concurrency condition and has less code intrusion. Has better development efficiency and low parameter/file configuration requirements.
Through the Spring MVC structure, HTTP information requested by a URL address can be directly mapped into a JAVA program, which is the core function of the structure. This makes the overall design more clear and intuitive. Meanwhile, the whole business process can be more standardized based on Spring MVC, and processing steps are distributed to different components for processing.
Optionally, the data construction proposed in this embodiment includes construction of a key database, and construction of an entire database of a base database, an alarm database, and an index database according to actual working needs, starting from a business practice. Wherein, the purpose of each category database is respectively as follows:
basic library: storing basic data of all equipment, including basic information related to all equipment entities such as the type, position, affiliation, manager, model and the like of the equipment;
an alarm library: the method comprises the steps that all network equipment and PC equipment which requires management are monitored uniformly through a network, alarm problems (such as incapability of access, overlarge equipment load and the like) in the equipment re-monitoring process are recorded, and meanwhile, safety alarm problems (trojans, data loss and the like) which can be collected in the network are also stored and managed together, and are subjected to subsequent sorting and analysis;
an index library: and performing item division, classification, arrangement and totalization on all the acquired data information. The method is used for management according to different data forms and corresponding modes, and supports dynamic change of multiple indexes, so that the method is convenient for workers to analyze and manage the index data in the subsequent use process;
based on the three databases, the bottom layer of the integrated data service platform provides services and support for subsequent work and daily management.
Therefore, the setting management of the service configuration information and the parameters is carried out according to the existing data resources and the service requirements of the users, and after relevant business processing (such as index data forming evaluation results, long-term data summarizing and analyzing forming trend analysis results and the like), visual result contents are externally issued for the users to use. The key contents of construction include:
the index library allows a user to perform accounting through various set standard index data, supports calculation and calculation of large data volume, and can visually display all calculation results. And the user is supported to modify the standard value or the required reference value in the index system by himself.
The data of all the index databases and the data of the alarm database are respectively controlled and managed, so that a user can redefine and adjust the display sequence of the index data or the alarm data as required, and can adjust the display content of the data in time, thereby achieving the aim of actual work.
All data results can be subjected to history storage, calling display, data downloading and result downloading. Support a variety of data storage formats such as Excel, word, CSV, PDF, etc.
And various comprehensive service functions such as service inquiry, information release, report management and the like are provided.
Optionally, the SNMP protocol is composed of a management information Structure (SMI), a Management Information Base (MIB), and a management protocol (SNMP). SMI defines the composition, structure and representation of information used by SNMP framework, and lays the foundation for describing MIB object and protocol exchange information. Referring to fig. 7, a logical structure and a simple workflow of the SNMP are shown.
Example 2
Referring to the schematic diagram of fig. 8, the schematic diagram provides a flowchart of a resource management method of a network resource management and control system according to the foregoing embodiment, where the resource management method is used as an application layer in the network resource management and control system to analyze according to requirements, and includes a data analysis module, a resource management module, a resource location module, an alarm management module, and a right management module. The resource management module of the embodiment adopts the following resource management method, which specifically comprises the following steps:
adding static information of equipment, constructing a database of a new system according to the existing equipment classification information, and supporting the import and export of the information of the newly added equipment;
collecting performance information of equipment resources, applications and services;
displaying the information in a plurality of dimensionalities of time, resources and performance types through a data display module, performing semantic mapping, and displaying monitored parameters in a high readability manner;
classifying the resource equipment according to different categories and different grades;
different resources are managed and controlled by different means, and resources with higher monitoring level are subjected to positioning alarm prompt monitoring;
when the device generates the change information, the device information is modified online.
The present embodiment divides the resource management module into three main functions: information display, information management and auxiliary functions. The information display is displayed in different regions and classes, the information management function is the core function of the module, and all equipment can be checked, managed and operated in the system. In addition, the auxiliary function is an extension of the above function, and the extension can be customized according to specific equipment and use scenes. The functions are as in table 1 below, and the items related to data entities are as in table 2 below.
Table 1: and a resource management module function table.
Figure BDA0002433855760000121
Table 2: a list of data entity items.
Figure BDA0002433855760000122
Figure BDA0002433855760000131
Optionally, the resource management module includes an information display module, an information management module, and an auxiliary function module; the information display module comprises an equipment information list and equipment information detailed inquiry; the information management module comprises application service management, equipment change control and semantic mapping; the auxiliary function module comprises data verification and export import change information.
It should be noted that the device information list includes the following steps,
a user enters an equipment management interface, and selects, clicks and inquires the screening conditions;
multi-condition compound query and fuzzy query can be carried out according to the input search condition;
screening out the equipment records meeting the conditions in a form, and displaying the information of the equipment below the page;
the device detailed information query includes the following steps,
a user enters an equipment management interface and clicks corresponding equipment to check detailed information;
according to the selection of the user, the information of the corresponding equipment is taken out from the database;
returning an interface of detailed equipment information;
the application service management comprises the following steps,
a user clicks corresponding server equipment to check the interface condition of the equipment and publishes information by borrowing;
dynamically acquiring the interface condition of a server according to the selection of a user;
returning to a server state interface, and displaying the data release condition of the port;
the device change control includes the steps of,
the user clicks the existing equipment to change the equipment information, or selects the newly added equipment and inputs the equipment information;
if the equipment exists, updating the equipment information of the background of the database, and if the equipment is newly added, adding the equipment information into the database;
returning to an equipment information list interface after the successful addition, and popping up a prompt box if the addition fails;
the semantic mapping includes the following steps,
inputting information of mac addresses and port numbers;
converting the information through a defined semantic mapping function;
a message which is popular and easy to understand after conversion;
the data validation includes the following steps that,
device information that needs to be added or updated;
performing simple data verification on a foreground, and performing data integrity verification and data uniqueness verification when information is stored in a database;
returning to the equipment interface after the updating or adding is successful, and popping up a prompt box and indicating the error reason if the updating or adding is failed;
the change information export import includes,
the user selects information export from the equipment resource list;
the background database inquires the selected information content;
the entries are stored in a database and the device information is exported in Excel format according to the template.
For the resource management module provided in this embodiment, it can be known from the known information that the power supply bureau has a large number of network devices, and before the system, the resource management system has been owned, but as the operation and maintenance work proceeds, the dynamic data of the network resources is very important. Therefore, the resource management module focuses on unified display and management of various physical devices.
Optionally, the present embodiment includes the following error handling manners:
foreground exception: the foreseeable exceptions of the foreground are all displayed on the page in the form of interface interaction. And (5) uniformly positioning error pages and displaying stack information of background abnormal exceptions when the foreground is unpredictable.
Background exception: and (4) the background can foresee the abnormity and record the abnormity by using a system error log mode. And (3) displaying the unforeseen running abnormity of the background in the form of error pages at the platform function end, and requiring the system to capture all the abnormity in the interface implementation section and record in the form of error logs. The platform predefines the following log reports of abnormal types, packages the log reports into related log recording services, and records corresponding system error logs when meeting corresponding conditions during programming, so that a user can conveniently check the log reports.
Bottom layer log: and the bottom layer of the system also records system-level logs by using log4j, so that developers can conveniently track the root cause of problems.
Referring to the illustration of FIG. 9, there is illustrated a realistic prototype interface presentation of the resource management described above.
Optionally, for an interaction interface of a resource management module in the management and control system, an interface with the device positioning module is provided, and the device position information is displayed in a resource page in a map manner. An interface is provided to the data presentation module to transmit real-time information about the device to the device presentation module (see the schematic of fig. 9).
The table structure of the management and control system is mainly expanded around users and equipment, the users mainly relate to the setting and management of authority, the equipment mainly comprises a plurality of inherent attribute fields of the equipment, the placement position of the equipment and dynamic data during operation, the users comprise administrators and common users, the common users are divided into users and responsible persons, and each responsible person can be responsible for the maintenance of a plurality of pieces of equipment, so that the user table and the equipment table are in one-to-many relationship. The division of the device part association table is explained below.
Device resource management related ideas:
the device table mainly stores inherent attribute values of the device, such as a device brand, and the like, and splits other related information of the device into other tables, the location where the device is placed is stored in the location table, and the related data of the device performance indexes are respectively split into corresponding tables, where several indexes, such as disk load, outbound traffic, and CPU load, are temporarily listed, and the addition and modification of specific indexes are modified by further knowing the requirements of a specific system. And when the equipment generates abnormity during operation and gives an alarm, the related information of the alarm is stored in an alarm record table. The tables and the device tables are all in one-to-one correspondence, and are in one-to-one relationship. The equipment table is as follows in table 3.
Table 3: a device attribute table.
Figure BDA0002433855760000151
Figure BDA0002433855760000161
It should be further noted that, for the interface description of the resource management module: finding detailed information of the specified device.
The request mode comprises the following steps: POST/user/device/find.
Request parameters: html or forms (as in table 4).
Table 4: a parameter form is requested.
Figure BDA0002433855760000162
Returning data: json html. The method is realized by adopting the following codes:
Figure BDA0002433855760000163
the return values to the final device are shown in table 4 below.
Table 4: a list of values is returned.
Figure BDA0002433855760000171
Optionally, the power grid system requires real-time monitoring of the operation state of the equipment, connects data of each subordinate substation equipment, and after analysis and processing, the data are uniformly displayed in a hall and a corresponding solution is given to alarm information. The special events can be found in time and distributed and processed in time. And displaying the CPU load, the disk speed and the network uplink and downlink bandwidth in a form of a dashboard. And finally, integrating the index states of all the monitoring devices, and calculating an overall evaluation value, so that the network health state of the whole system is accurately reflected.
Example 3
Referring to the schematic diagram of fig. 10, which is a flowchart of a resource location method also provided in this embodiment, an application layer in a network resource management and control system analyzes according to a requirement, and includes a data analysis module, a resource management module, a resource location module, an alarm management module, and an authority management module, where the resource location module includes the following steps:
initializing a reader-writer and a label;
the reader-writer sends a radio frequency signal;
activating the label to send ID information of the label;
calculating the position of the label according to the ID information by utilizing a triangulation algorithm;
judging whether the equipment is classified as secret-related equipment;
if the judgment result is not the secret-related equipment, directly outputting the position of the equipment;
if the judgment result is the secret-related equipment, continuously judging whether the electronic fence is crossed, if not, outputting the position of the equipment, and if so, alarming the current equipment state.
Optionally, referring to the illustration of fig. 11, it is illustrated that the flowchart is implemented by using a triangulation algorithm in this embodiment, and specifically includes the following steps:
arranging a site, and calibrating a plurality of fixed reference point (reader) coordinates;
the signal sent by the mobile node is received by the reader of the reference point, and the signal strength value is substituted into the calculation;
and obtaining the radius and the center of each unknown circle, wherein the intersection point is the coordinate of the point to be measured.
Optionally, the resource positioning module includes a positioning display module and a background control module;
the positioning display module comprises a positioning equipment position display; the presentation of the positioning presentation module is expected to be presented in a number of ways, with the position information obtained as the topology extends downwards being more detailed as viewed in the topology, and with the user being able to see textual descriptions of the device position information and the floor plan of the location in the data presentation page. Positioning the display module here comprises the following steps,
a user enters an equipment positioning interface, selects a screening condition and clicks for query;
marking the position of the corresponding equipment in a map mode according to the input search condition;
and returning the equipment required by the user query condition and returning the position of the queried equipment.
The background control module comprises authority control, key resource range positioning, equipment change control and semantic mapping. Wherein the authority control carries out authority authentication when all users search the positions, and the users can only check the equipment positions under the own authority, the method comprises the following control steps,
the authority type owned by the user and the requested data authority requirement;
comparing the authority data requested by the user with the authority data owned by the user, and judging whether the user has the authority to access;
if the authority judgment is successful, the requested interface data is returned, otherwise, a prompt box is popped up to prompt that the authority of the user is insufficient.
Alternatively, the location of the focus resource range for the important device, when the device leaves the range for any reason, the alarm system will generate an alarm prompt, which specifically includes the following steps,
key resource equipment numbers and positions for setting limits;
positioning the resource position in real time, comparing the resource position with the position limiting requirement, and generating alarm information by combining an alarm module once the resource position exceeds the position range;
and combining an alarm module, newly adding alarm log content and simultaneously prompting an equipment administrator to alarm.
Optionally, when the device change control is planned to move the device, the device to be moved is modified in position to display correct position information of the device in real time, and the method specifically comprises the following steps,
the user changes the position information of the equipment on the equipment management interface, and sets the range after joining the equipment;
updating the position information of the equipment by the background database;
and returning to an equipment management information interface after the updating is successful, and popping up a prompt box to prompt an operator if the updating is failed.
Optionally, the semantic mapping optimizes semantic information and translates the position coordinates into readable information by mapping, which specifically comprises the following steps,
a coordinate position at which the device is located;
performing meaning translation on the information of the coordinate position through the coordinate position;
and outputting accurate information of the number of the floor room, and simultaneously prompting the corresponding position of the corresponding room on the map by using a flashing icon.
It should be noted that, in the present embodiment, the data entity items involved in the resource location method are shown in table 1 below.
Table 1: an item of a data entity.
Figure BDA0002433855760000191
This embodiment also provides an interface to an alarm module, i.e. to alarm when the critical device is positioned out of range. And an interface with an equipment management module is provided, so that the accurate positioning information of the equipment can be seen when the equipment manages the page. And providing an interface with the RFID hardware equipment, and acquiring equipment information and positioning information by using an RFID mode.
It should be further noted that, for the implementation of resource positioning of the network resource management and control system, currently, popular indoor positioning technologies include an infrared indoor positioning technology, a bluetooth technology, an ultrasonic indoor positioning technology, a WiFi technology, and an ultra wideband technology (UWB).
Referring to the illustration of fig. 12, which is a schematic diagram of the principle framework of the RFID technology adopted in this embodiment, the working principle of the RFID system mainly depends on its working frequency, which determines the working property, and the communication distance between the RFID system in the LF and HF frequency bands is short; the RFID system in UHF and MW frequency band has longer communication distance, the former adopts the inductive coupling principle, the latter adopts the electromagnetic coupling scattering basic principle, and the specific working characteristics of each frequency band are shown in the following table. The ultrahigh frequency band RFID system has the characteristics of high identification rate, long communication distance and the like. The relationship between the frequency and the distance is shown in the following table 2.
Table 2: frequency distance relationship.
Figure BDA0002433855760000201
The communication distance between the label of the active RFID system and the reader-writer is long, the label is powered by a power supply, and main information is actively modulated onto a radio-frequency signal without extra energy, so that the radio-frequency signal has strong energy and the communication distance is relatively long. See the schematic below in table 3.
Table 3: and comparing RFID ranging methods.
Figure BDA0002433855760000202
Figure BDA0002433855760000211
Referring to the schematic diagram of fig. 13, which shows the components of the RFID system of this embodiment, the resource location module is located by using an RFID system, and the RFID system includes a hardware module and a software module; the hardware module comprises a reader, a radio frequency tag, an antenna and network infrastructure; the software modules include middleware and applications.
Optionally, the RFID system comprises the steps of,
a user sends a reading command to the reader;
after receiving the command, the reader encodes and modulates the command and sends the command out through an antenna of the reader;
the reader antenna sends the query signal to the RFID label by using a wireless channel and receives the query signal by the miniature antenna in the RFID label;
when the received wireless signal of the RFID tag is higher than a certain threshold value, the RFID tag is activated and modulates and decodes the reader signal, the RFID tag generates a return signal with a special mark, and the return signal is returned to the reader antenna after code modulation;
the reader end continuously scans the identification area by using the reader antenna to obtain the identification code returned by the tag, modulates and decodes the tag signal, and transmits the decoded information to the control terminal.
It should be noted that centralized management of network resources is realized based on a radio frequency technology and an automated data interface technology. Based on centralized management, fuzzy positioning and accurate positioning of various network resources are realized. The method provides a resource allocation library for the network resources, provides data of the resource allocation library for centralized management decision support, can perform multi-dimensional rapid analysis and trend prediction on the existing network resources, provides a technical means for scientific decision of the network resources, improves the overall management level of the network resources, and reduces the management cost. The specific targets are as follows: and the network asset data configuration item is optimized, a large number of entry items are changed into automatic matching of the system, and errors that the assets are changed and data in the system are not changed are avoided. The quick positioning of the network resource object is realized:
1. establishing connection between various objects in network resources based on active/passive technology;
2. based on active/passive technology, quickly positioning various objects in network resources;
3. the association between the network resource object and the office place is presented in an imaging mode;
and presenting the use and distribution conditions of the network resources in multiple dimensions based on various types of data in the network resources. In the construction of the embodiment, firstly, a network agile positioning and decision-making system is designed and established, centralized management of resources can be supported, the resources are accurately positioned, and decision support of the network resources is realized. Meanwhile, the system architecture is hierarchically organized, the system function is modularized, the system is integrated and loosely coupled, modification, reuse and deployment of service application are facilitated, and the requirement of future elastic expansion of the system is met.
Therefore, the system adopts a B/S structure (Browser/Server, browser/Server mode). The mode unifies the client, centralizes the core part of the system function realization to the server, and simplifies the development, maintenance and use of the system. Meanwhile, the service expansion is simple and convenient, the functions of the server can be increased by adding the webpage, and the requirements of mainstream platform and cross-platform rapid application development can be met. Java is selected as a system programming language, is a widely applied network programming language, and has the advantages of strong universality, high safety, excellent performance and the like.
The embodiment provides a resource positioning method for a network resource management and control system, where the resource positioning module adopts a scheme of 45g +125k, and specifically includes the following steps:
(1) The main equipment is composed of.
Labeling: can be packaged into various forms, such as personnel hang tag, article label, wrist strap, etc.
125KHz exciter: the excitation distance is approximately 5 meters.
433MHz reads ware and supporting antenna, a ware can connect a plurality of antennas, and is used for split type more, and the antenna is connected to the ware that reads through the feeder promptly.
433MHz hairpin machine: the radio frequency module can be read and written, is used for reading in a large-range space and mainly uses the reading function, so that a reader is made; when a card needs to be made for a single label, a miniaturized card sender (card making device) is made, the module and the antenna are miniaturized, the reading and writing distance of the card sender is limited, and the card sender can be made into desktop type integration, namely the reading and writing module and a matched antenna are integrated into a single device and are placed on a working desk for use.
A workbench and a server.
(2) Working principle steps.
Attaching an active tag to each asset to be managed, and internally setting data of unique identification of the active tag;
an exciter is arranged at the entrance and exit of each room, and an exciting antenna is respectively arranged at the inner side and the outer side of the entrance and the exit. When personnel and objects carrying the electronic tags are in an excitation area of a 125KHz excitation antenna, the electronic tags are awakened and send 433MHz wireless radio frequency signals to the outside;
the reader receives an electronic tag signal (signal data comprises an electronic tag ID, an excitation antenna ID, excitation signal strength, battery low-power indication and the like) and transmits the information to an upper application system;
the upper application system analyzes the acquired data, and can position the label near the exciter according to the position of the exciter during fuzzy positioning, and if more accurate positioning is needed, a three-point positioning algorithm can be adopted. The former precision is about 10M, and the latter precision is about 3.5M.
Optionally, a scheme of 45G +125K is provided, which is different from the scheme of 45G +125K described above, in that although both are active tags, a dual-frequency card (a 125KHz frequency band tag is integrated more) is made, firstly, in order to save the battery consumption of the tag, and secondly, the positioning mode is changed to be positioned to the position accessory of the exciter. If a single frequency band is used, firstly, the tag can always send out signals, and secondly, the tag can be positioned through the position of the reader.
The existing 2.4G equipment has short signal transmission distance, large attenuation in the transmission process, weak signal penetration and diffraction capacity and easy signal shielding by objects. 433M signal intensity, long transmission distance, strong penetration and diffraction ability, and small attenuation in transmission process. Compared with 433M, 2.4G data transmission rate is higher (250 kbps), one radio frequency card generally sends data for 1-5 seconds, and only a few bytes need to be sent each time. The time required to transmit data each time is about 1 ms. And the radio frequency card is in a dormant state at other times so as to reduce the battery consumption. Therefore, the radio frequency card only uses one thousand of the whole bandwidth for transmitting data, and the high transmission rate is completely wasted. That is, 433MHz and 2.4GHz transmission speeds are sufficient for indoor positioning applications.
Since the 2.4GHz band is an open band without license both internationally and domestically, many applications have been developed in this band, which is already crowded. The applications developed at present in the 2.4GHz band are mainly: wireless local area network, bluetooth, zigBee wireless sensor network, partial cordless telephone and other short-distance wireless communication equipment.
Under ideal conditions, the maximum reading distance in an open area can reach about 200 meters. Both of them will be in the room because of factors such as sheltering from, interference, etc., reading distance reduces.
It should be recognized that embodiments of the present invention can be realized and implemented by computer hardware, a combination of hardware and software, or by computer instructions stored in a non-transitory computer readable memory. The methods may be implemented in a computer program using standard programming techniques, including a non-transitory computer-readable storage medium configured with the computer program, where the storage medium so configured causes a computer to operate in a specific and predefined manner according to the methods and figures described in the detailed description. Each program may be implemented in a high level procedural or object oriented programming language to communicate with a computer system. However, the program(s) can be implemented in assembly or machine language, if desired. In any case, the language may be a compiled or interpreted language. Furthermore, the program can be run on a programmed application specific integrated circuit for this purpose.
Further, the operations of processes described herein can be performed in any suitable order unless otherwise indicated herein or otherwise clearly contradicted by context. The processes described herein (or variations and/or combinations thereof) may be performed under the control of one or more computer systems configured with executable instructions, and may be implemented as code (e.g., executable instructions, one or more computer programs, or one or more applications) collectively executed on one or more processors, by hardware, or combinations thereof. The computer program includes a plurality of instructions executable by one or more processors.
Further, the method may be implemented in any type of computing platform operatively connected to a suitable interface, including but not limited to a personal computer, mini computer, mainframe, workstation, networked or distributed computing environment, separate or integrated computer platform, or in communication with a charged particle tool or other imaging device, and the like. Aspects of the invention may be embodied in machine-readable code stored on a non-transitory storage medium or device, whether removable or integrated into a computing platform, such as a hard disk, optically read and/or write storage medium, RAM, ROM, or the like, such that it may be read by a programmable computer, which when read by the storage medium or device, is operative to configure and operate the computer to perform the procedures described herein. Further, the machine-readable code, or portions thereof, may be transmitted over a wired or wireless network. The invention described herein includes these and other different types of non-transitory computer-readable storage media when such media include instructions or programs that implement the steps described above in conjunction with a microprocessor or other data processor. The invention also includes the computer itself when programmed according to the methods and techniques described herein. A computer program can be applied to input data to perform the functions described herein to transform the input data to generate output data that is stored to non-volatile memory. The output information may also be applied to one or more output devices, such as a display. In a preferred embodiment of the invention, the transformed data represents physical and tangible objects, including particular visual depictions of physical and tangible objects produced on a display.
As used in this application, the terms "component," "module," "system," and the like are intended to refer to a computer-related entity, either hardware, firmware, a combination of hardware and software, or software in execution. For example, a component may be, but is not limited to being: a process running on a processor, an object, an executable, a thread of execution, a program, and/or a computer. By way of illustration, both an application running on a computing device and the computing device can be a component. One or more components can reside within a process and/or thread of execution and a component can be localized on one computer and/or distributed between two or more computers. In addition, these components can execute from various computer readable media having various data structures stored thereon. The components may communicate by way of local and/or remote processes such as in accordance with a signal having one or more data packets (e.g., data from one component interacting with another component in a local system, distributed system, and/or across a network such as the internet with other systems by way of the signal).
It should be noted that the above-mentioned embodiments are only for illustrating the technical solutions of the present invention and not for limiting, and although the present invention is described in detail with reference to the preferred embodiments, it should be understood by those skilled in the art that modifications or equivalent substitutions can be made to the technical solutions of the present invention without departing from the spirit and scope of the technical solutions of the present invention, which should be covered by the claims of the present invention.

Claims (6)

1. A network resource management and control system is characterized in that: the management and control system adopts a layered structure and comprises a hardware layer, a data storage layer, an application support layer, an application layer and a view display layer, wherein data transmission and interconnection are carried out among the layers through interfaces;
the management and control system also comprises an operation monitoring module and a network security module;
the operation monitoring module monitors parameters of the whole network resource in real time to ensure the operation state of the control system;
the network security module adopts foreground and background double verification, parameter coding transmission, password security strategy, password hash encryption storage, fine authority verification, data verification and SQL coding filtering according to the Web system security specification;
the hardware layer comprises hardware equipment needing to be monitored, and static information of equipment resources and dynamic information generated in operation can be read by accessing a management information base of the hardware equipment;
the data storage layer is capable of storing device information;
the data storage layer stores equipment information by adopting a MySql database, sets and manages records of service configuration information and parameters according to existing data resources and service requirements of users, issues visual result content to the outside after relevant service processing for the users to use, and is communicated with the data application layer through an access interface;
the application supporting layer provides strong support for the application layer through an application server and supports the integration of external resources to content management basic data and application data of the content management to the external data resources;
the application layer performs program logic control on the control system to complete function requirements;
the function architecture of the data access layer Mybatis is divided into an API interface layer, a data processing layer and a basic supporting layer;
the API interface layer provides interface APIs for external use, the database is manipulated through the local APIs, and the data processing layer is called to complete specific data processing as soon as the API interface layer receives a calling request;
the data processing layer is responsible for specific SQL searching, SQL analysis, SQL execution and execution result mapping processing, and completes one database operation according to a calling request;
the basic supporting layer is responsible for basic function support, including connection management, transaction management, configuration loading and cache processing, and provides basic support for the data processing layer;
the view display layer displays the network diagram, the performance index and the data analysis chart through an interactive interface, and a user can visually and specifically see the resource change condition.
2. The network resource management and control system of claim 1, wherein: the hardware layer comprises network equipment, a computer, a server and mobile equipment, and accesses a management information base of the hardware equipment through an SNMP protocol.
3. The network resource management and control system of claim 1, wherein: the Framework of the control system adopts a jeesite rapid development platform of Spring boot + MyBatis + Shiro, and takes Spring Framework as a core container, spring MVC as a model view controller, myBatis as a data access layer, apache Shiro as an authority authorization layer and Activit as a workflow engine.
4. The network resource management and control system of claim 1, wherein: the application server is built based on a Spring MVC display service system, HTTP information of a URL address request can be directly mapped into a JAVA program through a Spring MVC structure, and processing steps are distributed to different equipment components for processing.
5. A method of resource management, characterized by: an application layer in the network resource management and control system analyzes according to requirements and comprises a data analysis module, a resource management module, a resource positioning module and an alarm management module authority management module;
the resource management module adopts the following resource management method:
adding static information of equipment, constructing a database of a new system according to the existing equipment classification information, and supporting the import and export of information of newly added equipment;
collecting performance information of equipment resources, applications and services;
displaying the information in a multi-dimensional mode of time, resources and performance types through a data display module, performing semantic mapping, and displaying monitored parameters in a highly readable mode;
classifying the resource equipment according to different classes and different grades;
different resources are managed and controlled by different means, and resources with higher monitoring levels are subjected to positioning alarm prompting monitoring;
when the equipment generates change information, the equipment information is modified on line;
the device information list includes the following steps,
a user enters an equipment management interface, and selects, clicks and inquires the screening conditions;
multi-condition compound query and fuzzy query can be carried out according to the input search condition;
screening out the equipment records meeting the conditions in a form, and displaying the information of the equipment below the page;
the device detail information inquiry includes the following steps,
a user enters an equipment management interface and clicks corresponding equipment to check detailed information;
according to the selection of the user, the information of the corresponding equipment is taken out from the database;
returning an interface of detailed equipment information;
the application service management comprises the following steps,
a user clicks corresponding server equipment to check the interface condition of the equipment and the interface lending information;
dynamically acquiring the interface condition of the server according to the selection of a user;
returning to a server state interface, and displaying the data release condition of the port;
the device change control includes the steps of,
the user clicks the existing equipment to change the equipment information, or selects the newly added equipment and inputs the equipment information;
if the equipment exists, updating the equipment information of the background of the database, and if the equipment is newly added, adding the equipment information into the database;
returning to an equipment information list interface after the addition is successful, and popping up a prompt box if the addition is failed;
the semantic mapping includes the following steps,
inputting information of mac addresses and port numbers;
converting the information through a defined semantic mapping function;
the message is popular and easy to understand after conversion;
the data validation includes the following steps that,
device information that needs to be added or updated;
performing simple data verification on a foreground, and performing data integrity verification and data uniqueness verification when information is stored in a database;
returning to the equipment interface after the updating or adding is successful, and popping up a prompt box and indicating the error reason if the updating or adding is failed;
the change information export import includes the change information export,
the user selects information export from the equipment resource list;
the background database inquires the selected information content;
the entries are stored in a database and the information of the device is exported in Excel format according to the template.
6. The resource management method of claim 5, wherein: the resource management module comprises an information display module, an information management module and an auxiliary function module;
the information display module comprises an equipment information list and equipment information detailed inquiry;
the information management module comprises application service management, equipment change control and semantic mapping;
the auxiliary function module comprises data verification and export import change information.
CN202010245403.8A 2020-03-31 2020-03-31 Network resource management and control system and resource management method Active CN111970138B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010245403.8A CN111970138B (en) 2020-03-31 2020-03-31 Network resource management and control system and resource management method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010245403.8A CN111970138B (en) 2020-03-31 2020-03-31 Network resource management and control system and resource management method

Publications (2)

Publication Number Publication Date
CN111970138A CN111970138A (en) 2020-11-20
CN111970138B true CN111970138B (en) 2022-12-09

Family

ID=73357905

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010245403.8A Active CN111970138B (en) 2020-03-31 2020-03-31 Network resource management and control system and resource management method

Country Status (1)

Country Link
CN (1) CN111970138B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112488895A (en) * 2020-12-07 2021-03-12 浪潮云信息技术股份公司 Informatization asset data anomaly analysis method
CN112783869A (en) * 2021-02-27 2021-05-11 中电万维信息技术有限责任公司 Big data visualization modeling and result display based method
CN113220273A (en) * 2021-05-20 2021-08-06 南方电网数字电网研究院有限公司 Micro front-end application resource processing method, device, equipment and medium
CN113590913B (en) * 2021-06-17 2023-06-16 青岛海尔科技有限公司 Data resource display method and device, storage medium and electronic device
CN113434585B (en) * 2021-06-29 2024-03-26 中国联合网络通信集团有限公司 Resource preservation method and equipment
CN113536068A (en) * 2021-08-02 2021-10-22 贵州泰若数字科技有限公司 Asset management method and asset management system
CN113627935A (en) * 2021-08-12 2021-11-09 北京联合货币兑换股份有限公司 Intelligent foreign currency transaction system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105282772A (en) * 2015-09-10 2016-01-27 北京爱可生通信技术有限公司 Wireless network data communication equipment monitoring system and equipment monitoring method
US9461877B1 (en) * 2013-09-26 2016-10-04 Juniper Networks, Inc. Aggregating network resource allocation information and network resource configuration information
CN106452927A (en) * 2016-12-13 2017-02-22 浪潮电子信息产业股份有限公司 Business topology information display method and system of cloud monitoring system

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9154383B2 (en) * 2012-12-31 2015-10-06 Johnson Manuel-Devadoss System and method to extend the capabilities of a web browser of a web application issue root cause determination techniques
CN109088785A (en) * 2018-06-14 2018-12-25 苏州新研联信息科技有限公司 A kind of IDC data center apparatus management system
CN110472388B (en) * 2019-07-22 2023-07-04 吉林大学 Equipment management and control system and user permission control method thereof

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9461877B1 (en) * 2013-09-26 2016-10-04 Juniper Networks, Inc. Aggregating network resource allocation information and network resource configuration information
CN105282772A (en) * 2015-09-10 2016-01-27 北京爱可生通信技术有限公司 Wireless network data communication equipment monitoring system and equipment monitoring method
CN106452927A (en) * 2016-12-13 2017-02-22 浪潮电子信息产业股份有限公司 Business topology information display method and system of cloud monitoring system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
CPT燃气集团主数据管理系统的设计与实现;毛雨华;《中国优秀硕士学位论文数据库》;20190516;全文 *
Resource management in large scale experimental facilities;Konrad Campowsky;《NOMS 2010》;20100617;全文 *

Also Published As

Publication number Publication date
CN111970138A (en) 2020-11-20

Similar Documents

Publication Publication Date Title
CN111970138B (en) Network resource management and control system and resource management method
US10972582B2 (en) System and method for scoped attributes
US9923905B2 (en) System and method for zone access control
CN109997114B (en) Service layer resource management for universal interworking and extensibility
US20170223057A1 (en) System and method for access control services
Lan et al. An IoT unified access platform for heterogeneity sensing devices based on edge computing
CN106559438A (en) A kind of program method for uploading and device based on objective network platform
CN203232458U (en) Merchandise anti-counterfeiting system based on mobile terminal and RFID electronic label
CN102165447A (en) Techniques to manage access to organizational information of an entity
CA2586333A1 (en) System and method for rfid system integration
EP2174434A1 (en) Unwired enterprise platform
US20160231372A1 (en) Wire Diagram Tagging System
CN103106368A (en) Vulnerability scanning method for grade protection
CN110300083A (en) A kind of method, terminal and authentication server obtaining identity information
CN102999850A (en) Intelligent service shop application method
Toahchoodee et al. On the formalization and analysis of a spatio-temporal role-based access control model
CN111383130A (en) Full life cycle management and control platform, mobile operation and maintenance client and terminal
CN103905231A (en) Method and device for unified management of device types
Muralidharan et al. An exhaustive review on Internet of things from Korea’s perspective
CN111461268A (en) Resource positioning method for network resource management and control system
US11907321B2 (en) Operator settings for natural language search and filtering on a web service platform for distributed server systems and clients
EP2881896B1 (en) Near field communication tag based data transfer
Ziegler et al. RFID as universal entry point to linked data clouds
Rouchdi et al. Complex event processing and role-based access control implementation in ESN middleware
Mangla et al. A comprehensive review: Internet of things (IoT)

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant