CN113055213B - Alarm information management method, alarm information management system and server - Google Patents

Alarm information management method, alarm information management system and server Download PDF

Info

Publication number
CN113055213B
CN113055213B CN201911381049.5A CN201911381049A CN113055213B CN 113055213 B CN113055213 B CN 113055213B CN 201911381049 A CN201911381049 A CN 201911381049A CN 113055213 B CN113055213 B CN 113055213B
Authority
CN
China
Prior art keywords
information
path
identifier
alarm information
node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911381049.5A
Other languages
Chinese (zh)
Other versions
CN113055213A (en
Inventor
唐鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201911381049.5A priority Critical patent/CN113055213B/en
Publication of CN113055213A publication Critical patent/CN113055213A/en
Application granted granted Critical
Publication of CN113055213B publication Critical patent/CN113055213B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0604Management of faults, events, alarms or notifications using filtering, e.g. reduction of information by using priority, element types, position or time
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/069Management of faults, events, alarms or notifications using logs of notifications; Post-processing of notifications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The present disclosure provides an alarm information management method for managing alarm information of a plurality of network devices, where the plurality of network devices perform multi-layer grouping in a tree structure, each leaf node in the tree structure corresponds to one network device, each non-leaf node in the tree structure corresponds to one grouping, and the grouping corresponding to the non-leaf node includes network devices corresponding to all leaf nodes under the non-leaf node, and the method includes: responding to the query request, acquiring corresponding first resource authority information according to a first user identifier in the query request, wherein the first resource authority information comprises: the grouped target group information may be accessed; and determining the alarm information of the accessible network equipment from a preset alarm information database according to the target group information, wherein the alarm information database stores the belonging groups of different network equipment and the corresponding alarm information thereof. The disclosure also provides an alarm information management system, a server and a computer readable medium.

Description

Alarm information management method, alarm information management system and server
Technical Field
The embodiment of the disclosure relates to the technical field of computers, and relates to an alarm information management method, an alarm information management system, a server and a computer readable medium.
Background
With the advent of the 5G network era, the access capability of network devices will be greatly improved, and with this, the massive growth of alarm information generated by network devices will be accompanied, and the scale of alarm information will break through from ten thousand levels to hundred million levels in the transition process from 4G to 5G. The existing alarm information management method is difficult to deal with massive and growing alarm information, so that the alarm information processing speed is low, and the operation and maintenance cost of operators is high.
Disclosure of Invention
The embodiment of the disclosure provides an alarm information management method, an alarm information management system, a server and a computer readable medium.
In a first aspect, an embodiment of the present disclosure provides an alarm information management method, configured to manage alarm information of a plurality of network devices, where the plurality of network devices are grouped in multiple layers in a tree structure, each leaf node in the tree structure corresponds to one network device, each non-leaf node in the tree structure corresponds to one packet, and the packet corresponding to the non-leaf node includes network devices corresponding to all leaf nodes under the non-leaf node, and the method includes:
responding to a query request, and acquiring corresponding first resource permission information according to a first user identifier in the query request, wherein the first resource permission information comprises: the grouped target group information may be accessed;
And determining the alarm information of the accessible network equipment from a preset alarm information database according to the target group information, wherein the alarm information database stores grouping path information of different network equipment and corresponding alarm information thereof.
In some embodiments, the step of determining the alarm information of the accessible network device from the preset alarm information database according to the target group information specifically includes:
Matching grouping path information of network equipment corresponding to each piece of alarm information in the alarm information base with the target group information respectively;
And taking the alarm information of the network equipment corresponding to the packet path information successfully matched with the target group information as the alarm information of the accessible network equipment.
In some embodiments, the first resource permission information further includes: attaching exclusion information;
the step of determining the alarm information of the accessible network equipment from a preset alarm information database according to the target group information specifically comprises the following steps:
The grouping path information of the network equipment corresponding to each piece of alarm information in the alarm information library is respectively matched with the target group information, and the network equipment corresponding to the grouping path information successfully matched with the target group information is used as an alternative network equipment;
Matching the packet path information of each candidate network device with the additional exclusion information respectively;
and taking the alarm information of the alternative network equipment corresponding to the packet path information which fails to be matched with the additional exclusion information as the alarm information of the accessible network equipment.
In some embodiments, each node in the tree structure is configured with a corresponding node identifier and a path identifier, where the path identifier of a node is an identifier obtained by sequentially arranging node identifiers of all nodes on a path from a root node to the node;
The target group information includes: the path identifier of the node corresponding to the at least one accessible packet, and the packet path information of the network device includes: path identification of the node corresponding to the network equipment;
The step of matching the packet path information of the network device corresponding to each piece of alarm information in the alarm information base with the target group information specifically includes:
Comparing the path identifier of each network device with the path identifier of each accessible packet respectively aiming at the path identifier of each network device in the alarm information base;
If the first several bits of the path identifier of the network device are the same as the path identifier of an accessible packet, determining that the packet path information of the network device is successfully matched with the target group information;
And if the first several bits of the path identifier of the network equipment are detected to be different from the path identifiers of all the accessible packets, determining that the matching of the packet path information of the network equipment and the target group information fails.
In some embodiments, each node in the tree structure is configured with a corresponding node identifier and a path identifier, where the path identifier of a node is an identifier obtained by sequentially arranging node identifiers of all nodes on a path from a root node to the node;
The target group information includes: the path identifier of the node corresponding to the at least one accessible packet, and the packet path information of the network device includes: the path identifier of the node corresponding to the network device, and the additional exclusion information includes: path identification of inaccessible nodes;
The step of matching the packet path information of each of the candidate network devices with the additional exclusion information specifically includes;
Comparing the path identifier of each alternative network device with the path identifiers of the inaccessible nodes respectively;
If the first several bits of the path identifier of the alternative network device are the same as the path identifier of an inaccessible node, determining that the packet path information of the alternative network device is successfully matched with the additional exclusion information;
And if the first several bits of the path identifier of the alternative network device are detected to be different from the path identifiers of all the inaccessible nodes, determining that the matching of the packet path information of the network device and the additional exclusion information fails.
In some embodiments, before the step of responding to the query request and acquiring the corresponding first resource permission information according to the first user identifier in the query request, the method further includes:
Collecting first alarm information of first network equipment;
Determining first packet path information of the first network device;
And storing the first alarm information and the first packet path information in the alarm information database, and associating the first alarm information and the first packet path information.
In some embodiments, the step of determining the first packet path information of the packet to which the first network device belongs specifically includes:
Inquiring whether packet path information matched with a first equipment identifier of the first network equipment is stored in a cache database or not;
And when the packet path information matched with the first equipment identifier of the first network equipment is inquired out, the inquired packet path information is used as the first packet path information.
In some embodiments, when it is queried that the cache database does not store packet path information matched with the first device identifier of the first network device, the packet path information matched with the first device identifier of the first network device is obtained from a preset resource library to be used as the first packet path information;
And establishing a corresponding relation between the first alarm information and the first packet path information, and storing the corresponding relation in the cache database.
In some embodiments, the method further comprises:
Receiving a device packet change message, the device packet change message comprising: a second device identification of a second network device and altered second packet path information;
and according to the equipment grouping change message, correspondingly modifying second grouping path information corresponding to the second equipment identifier in the cache database.
In some embodiments, the step of obtaining, in response to the query request, corresponding first resource permission information according to a first user identifier in the query request specifically includes:
acquiring first resource authority information corresponding to the first user identifier from a memory database; and different user identifications and corresponding resource authority information are stored in the memory database.
In some embodiments, before the step of obtaining the first resource permission information corresponding to the first user identification from the in-memory database, the method further includes:
judging whether first resource authority information corresponding to the first user identifier is stored in the memory database or not;
When the first resource authority information corresponding to the first user identifier is stored in the memory database, executing the step of acquiring the first resource authority information corresponding to the first user identifier from the memory database;
When the first resource authority information corresponding to the first user identifier is not stored in the memory database, the first resource authority information corresponding to the first user identifier is obtained from a preset resource library, and the first user identifier and the first resource authority information corresponding to the first user identifier are stored in the memory database.
In some embodiments, the method further comprises:
receiving a permission change message, wherein the permission change message comprises: the second user identification and the changed second resource authority information;
And according to the permission change message, correspondingly modifying second resource permission information corresponding to the second user identifier in the memory database.
In a second aspect, an embodiment of the present disclosure further provides an alarm information management system, including:
The acquisition module is used for responding to the query request and acquiring corresponding resource permission information according to a first user identifier in the query request, wherein the resource permission information comprises: the grouped target group information may be accessed;
And the query module is used for querying the alarm information of each network device under the accessible packet from a preset alarm information database according to the target group information, wherein the alarm information database stores packet path information of different network devices and corresponding alarm information thereof.
In a third aspect, an embodiment of the present disclosure further provides a server, including:
one or more processors;
And a storage device, on which one or more programs are stored, which when executed by the one or more processors, cause the one or more processors to implement the alarm information management method provided by the embodiments of the present disclosure.
In a fourth aspect, the disclosure further provides a computer readable medium having a computer program stored thereon, wherein the program when executed by a processor implements the alert information management method provided by the embodiments of the disclosure.
In the alarm information management method, the alarm information management system, the server and the computer readable medium, when the alarm information is queried, the alarm information is screened based on the group information of the group to which the network equipment with the authority belongs, compared with the prior art, the alarm information database does not need to be subjected to multiple traversal screening aiming at each target network equipment, so that the query times of the alarm information database are reduced, the query rate is improved, the response requirement of an operator is met, and the method is better suitable for processing massive alarm information in the 5G network era.
Drawings
The accompanying drawings are included to provide a further understanding of embodiments of the disclosure, and are incorporated in and constitute a part of this specification, illustrate embodiments of the disclosure and together with the description serve to explain the disclosure, without limitation to the disclosure. The above and other features and advantages will become more readily apparent to those skilled in the art by describing in detail exemplary embodiments with reference to the attached drawings, in which:
FIG. 1 is a flowchart of an alarm information management method according to an embodiment of the present disclosure;
FIG. 2 is an interface diagram of a tree grouping relationship of a network device shown in the present disclosure;
FIG. 3 is a schematic diagram of an information storage manner of an alarm information database according to an embodiment of the disclosure;
FIG. 4a is a flowchart of one particular alternative implementation of step S102 in an embodiment of the present disclosure;
Fig. 4b is a schematic diagram when matching a path identifier of a network device with target group information in an embodiment of the disclosure;
FIG. 4c is a flowchart of another specific alternative implementation of step S102 in an embodiment of the present disclosure;
FIG. 5 is a flowchart of another method for managing alert information provided by embodiments of the present disclosure;
FIG. 6 is a flow chart of one embodiment of step S100 in an embodiment of the present disclosure;
FIG. 7 is a flowchart of another method for managing alert information provided by embodiments of the present disclosure;
FIG. 8 is a flowchart of another method for managing alert information according to an embodiment of the present disclosure;
FIG. 9 is a flowchart of a further method for managing alert information provided by embodiments of the present disclosure;
Fig. 10 is a schematic structural diagram of an alarm information management system according to an embodiment of the disclosure.
Detailed Description
In order to better understand the technical solutions of the present invention, the following describes in detail the alarm information management method, the alarm information management system, the server and the computer readable medium provided by the present invention with reference to the accompanying drawings.
Example embodiments will be described more fully hereinafter with reference to the accompanying drawings, but may be embodied in various forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. As used herein, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It will be understood that, although the terms first, second, etc. may be used herein to describe various elements/instructions/requests, these elements/instructions/requests should not be limited by these terms. These terms are only used to distinguish one element/instruction/request from another element/instruction/request.
Unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the relevant art and the present disclosure, and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
The alarm information management method provided by the disclosure is based on a massive alarm information management method based on authority control, is realized based on an alarm information management system, is used for managing alarm information sent by a plurality of network devices accessed to the system, and is particularly suitable for managing massive alarm information in the 5G network era.
With the advent of the 5G network era, the access number of mobile network devices will be greatly increased, the number of network management devices is greatly increased, 5G is intensified, the network management system of each mainstream operator is upgraded from the local city network management to the provincial network management, the number of network management users is from hundreds to thousands, and after entering the 5G era, the network management users will be the times of no object and no connection, at this time, a large number of devices will be accessed to the network, and the devices belong to different industrial fields, have different characteristics and requirements, and then the network slicing technology is inoculated.
The 5G slicing is to cut a physical network into a plurality of virtual end-to-end networks, wherein each virtual network comprises equipment, access, transmission and core networks in the network, is logically independent, any virtual network failure does not affect other virtual networks, and each virtual network has different functional characteristics like pliers and saws on a Swiss saber, and faces different demands and services.
The 5G slice has the characteristic of large number of hierarchical multi-network devices. The number of network devices is improved by orders of magnitude compared with 4G, in a 4G scene, the scale of the network devices is tens of thousands, the number of alarms is 10 tens of thousands, and the scale of the network devices is billions and the alarm scale is billions in the 5G slice age. With such scale data, it would be a challenge for the system to do the entitlement control processing for the alert data.
In practical application, an operation and maintenance user is usually granted with the authority of tens of thousands of network devices, the authority allocation can be set by a super administrator, each network device can generate alarm information at an irregular period, and the operation and maintenance user can monitor the alarm information of the network device with the authority by logging in the alarm information management system for inquiry.
In the prior art, when an alarm information management system responds to a query request of a user to provide alarm information for the user, the alarm information management system queries based on a Cartesian product query method, namely, firstly, the identifications of all target network devices with the authority of the user are obtained, and then, based on each of the identifications of all target network devices, the alarm information corresponding to the identifications of all target network devices is queried from an alarm information database by the Cartesian product query method. According to the method, each target network device needs to perform one-time traversal query on the alarm information database, and when massive alarm information is processed, the query speed is low, so that the response requirement of an operator cannot be met (query results cannot be returned within a few seconds). In view of this problem, the present disclosure proposes a new alarm information management method.
Fig. 1 is a flow chart of a method for managing alarm information provided by an embodiment of the present disclosure, and fig. 2 is an interface schematic diagram of a tree grouping relationship of a network device shown in the present disclosure, as shown in fig. 1 and fig. 2, in the embodiment of the present disclosure, a plurality of network devices are grouped in multiple layers in a tree structure, each leaf node in the tree structure corresponds to one network device, each non-leaf node in the tree structure corresponds to one group, and the group corresponding to the non-leaf node includes network devices corresponding to all leaf nodes under the non-leaf node.
With continued reference to fig. 1, the alarm information management method provided by the embodiment of the disclosure includes:
Step S101, responding to a query request, and acquiring corresponding first resource authority information according to a first user identifier in the query request.
When an operation and maintenance user needs to inquire the alarm information of the network equipment with the authority, sending an inquiry request to an alarm information management system, wherein the inquiry request comprises a first user identifier, the alarm information management system responds to the inquiry request and acquires first resource authority information corresponding to the first user identifier according to the first user identifier, and the first resource authority information is used for describing the authority of the accessible network equipment of the user corresponding to the first user identifier, and particularly, in the disclosure, the first resource authority information comprises: the target group information of the packet may be accessed, the target group information describing the packet status of the network device for which the user has rights in the tree structure. In the following description of the method for representing the target group information, with continued reference to fig. 2, as shown in fig. 2, fig. 2 shows that the network devices having the authority of the user are all network devices (B11-B13 and B21 and B22) in the B group, where the target group information may be "/B", and if the network devices having the authority of the user are only all network devices included in the B11 group in the B group, the target group information is "/B11".
In the disclosure, the authority of a user to the network device can be set by logging in the system by a super administrator, and after the setting is completed, the system generates resource authority information according to the setting operation of the super administrator and correspondingly stores the resource authority information and the user identifier.
Step S102, according to the target group information, the alarm information of the accessible network equipment is determined from a preset alarm information database.
The accessible network device refers to a network device with authority for a user to access alarm information.
Fig. 3 is a schematic information storage manner of an alarm information database provided by an embodiment of the present disclosure, as shown in fig. 3, in the embodiment of the present disclosure, packet path information of different network devices and corresponding alarm information thereof are stored in the alarm information database, that is, a plurality of pieces of alarm information are stored in the alarm information database, each piece of alarm information belongs to one network device, and the alarm information specifically may include: equipment number (MEID), alarm ID, alarm code, alarm level, etc.; meanwhile, the alarm information database also stores the path identifier of each network device.
Of course, in some embodiments, the alarm information of the network device may also be stored separately from the packet path information in a table, but with a mapping relationship.
In some embodiments, each node in the tree structure is configured with a corresponding node identification (e.g., A, B, C, B, B2, B11, B12, B13, etc. in fig. 2 and 3) and a path identification of the node, the path identification of the node being the identification of all nodes on the path from the root node to the node that are arranged in order (e.g., a/A1/a11,/A1/a 12 …/B2/B23, etc. in fig. 3). In some embodiments, the Root node in the tree structure may be represented by a node identification "Root". All the non-root nodes correspond to the same root node, and based on the same, the node identification of the root node can be unnecessary to carry when the path identification of the non-root node is designed.
After the alarm information management system acquires the target group information, the alarm information of the network equipment (i.e. the accessible network equipment) which can access the group and belongs to the target group information is screened from the alarm information database based on the target group information and provided for the user.
According to the alarm information management method provided by the embodiment of the disclosure, when the alarm information is queried, the alarm information is screened based on the group information of the group to which the network equipment with the authority belongs, compared with the prior art, the alarm information database does not need to be subjected to multiple traversal screening aiming at each target network equipment, so that the query times of the alarm information database are reduced, the query speed is further improved, the response requirement of an operator is met, and the method is further better suitable for massive alarm information processing in the 5G network era.
In some embodiments, the specific process of step S102 is: and matching the packet path information of the network equipment corresponding to each piece of alarm information in the alarm information library with the target group information, and confirming the successfully matched alarm information as the alarm information of each network equipment under the accessible packet. Wherein, "matching" refers to determining whether the corresponding network device belongs to an accessible packet according to the packet path information.
Fig. 4a is a flowchart of a specific alternative implementation of step S102 in the embodiment of the disclosure, as shown in fig. 4a, step S102 includes:
Step S1021a, packet path information of the network device corresponding to each piece of alarm information in the alarm information base is matched with the target group information respectively.
In some embodiments, step S1021a specifically includes: and comparing the path identifier of each network device with the path identifier of each accessible packet respectively aiming at the path identifier of each network device in the alarm information base. If the first several bits of the path identifier of the network device are the same as the path identifier of an accessible packet, determining that the packet path information of the network device is successfully matched with the target group information; if the first several bits of the path identifier of the network device are different from the path identifiers of all the accessible packets, determining that the matching of the packet path information of the network device and the target group information fails. That is, a "prefix match" manner may be employed to detect whether the packet path information of the network device matches the target group information.
Fig. 4B is a schematic diagram of matching the path identifier of the network device with the target group information in the embodiment of the present disclosure, as shown in fig. 4B, if the target group information is "/B", it may be determined that the path identifier is "/B1/B11,/B1/B12,/B1/B13,/B2/B22,/B2/B23 and"/B "from the alert information base through step S1021 a.
Step S1022a, the alarm information of the network device corresponding to the packet path information successfully matched with the target group information is used as the alarm information of the accessible network device.
It should be noted that, because the technical solution of the embodiments of the present disclosure determines the accessible network device based on the "prefix matching" manner, even if a new, deleted or modified network device in the accessible packet used under the rights occurs, the accessible network device of the user can be automatically changed without changing the user rights. For example, the accessible grouping right of the user is "/B", and when a network device is newly added below the grouping "/B/B11/B13/", the user can automatically have the alarm right of the newly added network device.
Fig. 4c is a flowchart of another specific alternative implementation of step S102 in the embodiment of the present disclosure, as shown in fig. 4c, in some embodiments, the network device with the rights of the user has dispersibility, where the first resource rights information of the user includes not only the target group information of the accessible packet, but also: additional exclusion information. For example, with continued reference to fig. 2, if the network devices to which the user has authority are B11 and B12 under the B1 group, and B13 is not included, the target group information may be "/B11" and the additional exclusion information may be "B13".
In some embodiments, the additional exclusion information includes: path identification of inaccessible nodes (including nodes corresponding to packets in the tree structure and nodes corresponding to network devices).
The step S102 specifically includes:
Step S1021b, packet path information of the network device corresponding to each piece of alarm information in the alarm information base is respectively matched with the target group information, and the network device corresponding to the packet path information successfully matched with the target group information is used as an alternative network device.
In some embodiments, step S1021b specifically includes: comparing the path identifier of each network device with the path identifier of each accessible packet respectively aiming at the path identifier of each network device in the alarm information base; if the first several bits of the path identifier of the network device are the same as the path identifier of an accessible packet, determining that the packet path information of the network device is successfully matched with the target group information; if the first several bits of the path identifier of the network device are different from the path identifiers of all the accessible packets, determining that the matching of the packet path information of the network device and the target group information fails.
Step S1022b, matching the packet path information of each candidate network device with the additional exclusion information.
In some embodiments, step S1022b specifically includes: comparing the path identifier of each alternative network device with the path identifiers of the inaccessible nodes respectively; if the first several bits of the path identifier of the alternative network device are the same as the path identifier of an inaccessible node, determining that the packet path information of the alternative network device is successfully matched with the additional exclusion information; if the first several bits of the path identifier of the alternative network device are detected to be different from the path identifiers of all the inaccessible nodes, determining that the matching of the packet path information of the network device and the additional exclusion information fails. That is, a "prefix match" manner may be employed to detect whether the packet path information of the alternative network device matches the additional exclusion information.
Step S1023b, the alarm information of the alternative network device corresponding to the packet path information failed to be matched with the additional exclusion information is used as the alarm information of the accessible network device.
In the embodiment shown in fig. 4c, not only network devices matching the target group information are selected, but also network devices matching the additional exclusion information (i.e., network devices for which it is determined that the packet path information successfully matches the target group information and fails to match the additional exclusion information) are removed. By adding the additional exclusion information in the resource authority information, the network equipment with the authority of the user can be further ensured to be accurately defined, so that the user can conveniently inquire.
Fig. 5 is another method for managing alarm information according to an embodiment of the present disclosure, as shown in fig. 5, in some embodiments, before step S101, further includes:
step S100a, collecting first alarm information of a first network device.
Step S100b, determining first packet path information of the first network device.
Step S100c, the first alarm information and the first grouping path information are stored in an alarm information database, and the first alarm information and the first grouping path information are associated.
In the embodiment of the disclosure, the alarm information management system further perfects the alarm information in the alarm information database periodically or irregularly, specifically, the alarm information management system periodically or irregularly collects the first alarm information of the first network device reported by the south gateway, determines the first packet path information of the first network device, and further associates and stores the first alarm information and the first packet path information in the alarm information database, so that when the alarm information is queried based on the query request of the user, the alarm information matched with the target group information can be queried from the alarm information database based on the target group information.
It should be noted that, the "first" in the embodiments of the present disclosure is not specifically limited, but merely exists as a distinguishing identifier, and the number of the first network devices may be one or multiple.
In some embodiments, as shown in fig. 6, step S100b may specifically include:
Step S100b1, inquiring whether packet path information matching the first device identifier of the first network device is stored in the cache database.
When it is found that the cache database stores packet path information matching the first device identifier of the first network device, step S100b2 is performed.
Step S100b2, using the packet path information queried from the cache database as the first packet path information.
In the embodiment of the disclosure, when the packet path information matched with the first device identifier of the first network device is acquired, the query may be performed from a cache database, where the cache database is preset and is used for caching the device identifiers of the network devices and the packet path information corresponding to the device identifiers, and in practical application, the cache database may cache the device identifiers of part of the network devices and the packet path information corresponding to the device identifiers of the network devices, or may cache the device identifiers of all the network devices and the packet path information corresponding to the device identifiers of the network devices, and the cache database may be set in a memory of the system. By first querying from the cache database, unnecessary interface calls (e.g., calling a repository interface to obtain relevant data from the repository, as will be described later) can be avoided, so that the query efficiency can be further improved.
With continued reference to fig. 6, in some embodiments, in step S100b1, when it is queried that the cache database does not store packet path information matching the first device identification of the first network device, steps S100b3 and S100b4 are performed.
Step S100b3, obtaining packet path information matched with the first device identifier of the first network device from a preset resource library, as the first packet path information.
Step S100b4, establishing a corresponding relation between the first alarm information and the first packet path information, and storing the corresponding relation in a cache database.
In the disclosure, the resource library is a database preset by the system and used for storing related information of all network devices accessing the alarm information management system, specifically, device identifiers of the network devices and corresponding packet path information are stored in the database, when the device identifiers of all network devices and the corresponding packet path information thereof are not stored in the cache database, the packet path information matched with the first device identifier of the first network device is possibly queried in the cache database in step S100b1, at this time, an interface of the resource library is invoked to query the packet path information of the first network device from the resource library, and after the query is finished, the device identifiers of the network devices queried from the resource library and the corresponding packet path information thereof are stored in the cache database, so that the cache database is perfected, and the cache database is convenient to use in a subsequent query process.
FIG. 7 is a flowchart of another method for managing alert information according to an embodiment of the present disclosure, as shown in FIG. 7, and in some embodiments, the method further includes:
step S100d, receiving a device packet change message, where the device packet change message includes: the second device identification of the second network device and the altered second packet path information.
Step S100e, according to the device group change message, the second grouping path information corresponding to the second device identifier in the cache database is modified accordingly.
In the embodiment of the disclosure, when the device identifier of the network device and the corresponding packet path information are cached in the cache database, the system also monitors whether the packet path information of the network device stored in the cache database changes, and when the network device in the cache database is monitored to change, the packet path information of the corresponding network device stored in the cache database is correspondingly modified, so that the data in the cache database is consistent with the data in the resource database, thereby facilitating subsequent query and use.
It should be noted that, in the embodiment of the present disclosure, the "second" is not specifically defined, but exists as only one distinguishing identifier, and the "second network device" and the "first network device" may be the same network device or may be different network devices.
Fig. 8 is a flowchart of still another method for managing alarm information according to an embodiment of the disclosure, as shown in fig. 8, in some embodiments, step S101 may specifically include:
step S1011, obtaining first resource authority information corresponding to the first user identification from the memory database.
In the method, different user identifications and corresponding resource authority information are stored in the memory database, and the first resource authority information corresponding to the first user identification is acquired from the memory database, so that unnecessary interface calling can be further avoided, and the query efficiency is improved.
With continued reference to fig. 8, in some embodiments, when the first resource permission information is available from the in-memory database, the method may further include, before step S1011:
Step S1010, judging whether first resource authority information corresponding to the first user identification is stored in the memory database.
When it is determined that the first resource permission information corresponding to the first user identifier is stored in the memory database, executing step S1011; when it is determined that the first resource permission information corresponding to the first user identifier is not stored in the memory database, step S1012 is performed.
Step S1012, first resource authority information corresponding to the first user identification is obtained from a preset resource library, and the first user identification and the first resource authority information corresponding to the first user identification are stored in a memory database.
In the embodiment of the disclosure, when the user identifications of all users and the corresponding resource authority information thereof are not stored in the memory database, the system judges whether the first user identifications to be acquired and the corresponding first resource authority information thereof exist in the memory database in advance, when the first user identifications to be acquired and the corresponding first resource authority information thereof are stored in the memory database, the first resource authority information corresponding to the first user identifications is directly acquired from the memory database, and when the first user identifications to be acquired and the corresponding first resource authority information thereof are not stored in the memory database, the interface of the resource database is called to acquire the first resource authority information corresponding to the first user identifications from the resource database, and the first user identifications and the corresponding first resource authority information thereof are further stored in the memory database, so that the memory database is perfected, and the memory database provides services for subsequent inquiry.
It should be noted that, in the present disclosure, in addition to the related information of the network device accessing the system, the user identifier and the corresponding resource authority information are stored in the resource library, and after the super administrator completes the user authority configuration, the user identifier and the corresponding resource authority information are stored in the resource library automatically or manually by the system.
In some embodiments, as shown in fig. 9, when the first resource permission information is available from the in-memory database, the method further includes:
step S103, receiving a permission change message, wherein the permission change message comprises: and the second user identification and the changed second resource authority information.
Step S104, according to the permission change message, the second resource permission information corresponding to the second user identification in the memory database is modified correspondingly.
In the embodiment of the disclosure, when the user identifier and the corresponding resource permission information thereof are stored in the memory database, the alarm information management system also monitors the resource permission information corresponding to the user identifier stored in the memory database. In practical application, when the resource authority information of the user changes, an authority change message is generated, and the authority change message includes: the second user identifier and the changed second resource authority information need to be explained, wherein the second is not specific, but only exists as a distinguishing identifier, and the second user identifier and the first user identifier can be the same user identifier or different user identifiers; when the alarm information management system receives the permission change message, inquiring whether the second user identification and the corresponding resource permission information are already stored in the memory database according to the second user identification contained in the permission change message, and updating the second resource permission information contained in the permission change message to the resource permission information corresponding to the second user identification in the memory database when the second user identification is already stored in the memory database, so as to complete the updating of the data of the memory database, thereby being convenient for the use of the memory database in the subsequent inquiry process.
The method for managing alarm information provided by the present disclosure is described below in a specific application scenario.
Scene 1, a certain telecom operator needs an alarm monitoring function, and allocates alarm data monitoring authority of network equipment below a certain network equipment group for a certain operation and maintenance personnel. The specific process is as follows:
network device data preparation phase:
Step 101, engineering personnel prepare the existing network equipment resource data of operators in advance.
Step 102, the engineering personnel logs in to the network management system and enters a data maintenance page of the network equipment.
Step 103, the prepared data is input to the network management system.
Rights assignment phase:
step 201, an administrator logs in to a network management system and enters a permission management page.
Step 202, selecting a user, clicking 'rights management', and entering a rights allocation page.
Step 203, selecting the group with the authority according to the service requirement of the monitoring personnel.
Viewing rights phase:
Step 301, a user logs in to a network management system and enters an alarm monitoring page.
Step 302, the user can only inquire the alarm with the authority in the alarm monitoring page.
In addition, the alarm information management method provided by the present disclosure may be implemented based on a new alarm information management system, but may also be completed by upgrading on the original old alarm information management system as follows.
Scene 2, a certain operator has a set of alarm information management system, but as the 5G age comes, the geometric level of network equipment, alarm data volume and user number all increase, and a complete scheme flow is needed to solve the alarm system processing capacity under large data volume, and based on the alarm information management method provided by the disclosure, the following upgrading process can be performed:
the first step: and upgrading the data in the old alarm system, namely enriching the grouping information into alarm data.
And a second step of: a new alarm system is deployed.
And a third step of: and upgrading the operation and maintenance user authority data, and updating the grouping information into the user authority data.
Fourth step: the operation and maintenance user logs in the alarm system to monitor the current alarm.
It should be noted that, the method for managing alarm information provided by the present disclosure is not specifically limited to the application field, and any application scenario in which massive alarm information needs to be processed is suitable for the method for managing alarm information provided by the present disclosure, for example, the method for managing alarm information provided by the present disclosure may be suitable for fields such as telecommunication industry, electric power industry, and the like.
The embodiment of the disclosure also provides an alarm information management system, as shown in fig. 10, which includes: an acquisition module 11 and a query module 12.
The obtaining module 11 is configured to obtain, in response to the query request, corresponding resource permission information according to a first user identifier in the query request, where the resource permission information includes: the grouped target group information may be accessed; the query module 12 is configured to query, according to the target group information, the alarm information of each network device under the accessible packet from a preset alarm information database, where packet path information of different network devices and corresponding alarm information thereof are stored in the alarm information database.
The embodiment of the disclosure also provides a server, including:
one or more processors;
And a storage device having one or more programs stored thereon, which when executed by the one or more processors, cause the one or more processors to implement the alert information management method provided by the embodiments of the present disclosure.
The present disclosure also provides a computer-readable medium having a computer program stored thereon, wherein the program, when executed by a processor, implements the alert information management method provided by the embodiments of the present disclosure.
Those of ordinary skill in the art will appreciate that all or some of the steps, systems, functional modules/units in the apparatus, and methods disclosed above may be implemented as software, firmware, hardware, and suitable combinations thereof. In a hardware implementation, the division between the functional modules/units mentioned in the above description does not necessarily correspond to the division of physical components; for example, one physical component may have multiple functions, or one function or step may be performed cooperatively by several physical components. Some or all of the physical components may be implemented as software executed by a processor, such as a central processing unit, digital signal processor, or microprocessor, or as hardware, or as an integrated circuit, such as an application specific integrated circuit. Such software may be distributed on computer readable media, which may include computer storage media (or non-transitory media) and communication media (or transitory media). The term computer storage media includes both volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data, as known to those skilled in the art. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital Versatile Disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by a computer. Furthermore, as is well known to those of ordinary skill in the art, communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media.
Example embodiments have been disclosed herein, and although specific terms are employed, they are used and should be interpreted in a generic and descriptive sense only and not for purpose of limitation. In some instances, it will be apparent to one skilled in the art that features, characteristics, and/or elements described in connection with a particular embodiment may be used alone or in combination with other embodiments unless explicitly stated otherwise. It will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the scope of the disclosure as set forth in the appended claims.

Claims (15)

1. A management method of alarm information is used for managing the alarm information of a plurality of network devices, wherein a plurality of network devices are grouped in layers in a tree structure, each leaf node in the tree structure corresponds to one network device, each non-leaf node in the tree structure corresponds to one group, and the group corresponding to the non-leaf node comprises network devices corresponding to all leaf nodes under the non-leaf node; each node in the tree structure is configured with a corresponding node identifier and a path identifier, wherein the path identifier of the node is an identifier obtained by sequentially arranging node identifiers of all nodes on a path from a root node to the node; the method comprises the following steps:
responding to a query request, and acquiring corresponding first resource permission information according to a first user identifier in the query request, wherein the first resource permission information comprises: the grouped target group information may be accessed; wherein the target group information includes: the path identifier of the node corresponding to the at least one accessible packet;
determining the alarm information of the accessible network equipment from a preset alarm information database according to the target group information, wherein the alarm information database stores grouping path information of different network equipment and corresponding alarm information thereof; wherein the packet path information of the network device includes: the path identifier of the node corresponding to the network device.
2. The method according to claim 1, wherein the step of determining the alarm information of the accessible network device from a preset alarm information database according to the target group information specifically comprises:
Matching grouping path information of network equipment corresponding to each piece of alarm information in the alarm information base with the target group information respectively;
And taking the alarm information of the network equipment corresponding to the packet path information successfully matched with the target group information as the alarm information of the accessible network equipment.
3. The method of claim 1, wherein the first resource permission information further comprises: attaching exclusion information;
the step of determining the alarm information of the accessible network equipment from a preset alarm information database according to the target group information specifically comprises the following steps:
The grouping path information of the network equipment corresponding to each piece of alarm information in the alarm information library is respectively matched with the target group information, and the network equipment corresponding to the grouping path information successfully matched with the target group information is used as an alternative network equipment;
Matching the packet path information of each candidate network device with the additional exclusion information respectively;
and taking the alarm information of the alternative network equipment corresponding to the packet path information which fails to be matched with the additional exclusion information as the alarm information of the accessible network equipment.
4. The method according to claim 2 or 3,
The step of matching the packet path information of the network device corresponding to each piece of alarm information in the alarm information base with the target group information specifically includes:
Comparing the path identifier of each network device with the path identifier of each accessible packet respectively aiming at the path identifier of each network device in the alarm information base;
If the first several bits of the path identifier of the network device are the same as the path identifier of an accessible packet, determining that the packet path information of the network device is successfully matched with the target group information;
And if the first several bits of the path identifier of the network equipment are detected to be different from the path identifiers of all the accessible packets, determining that the matching of the packet path information of the network equipment and the target group information fails.
5. A method according to claim 3, wherein each node in the tree structure is configured with a corresponding node identifier and a path identifier, the path identifier of a node being an identifier obtained by arranging node identifiers of all nodes on a path from a root node to the node in turn;
The target group information includes: the path identifier of the node corresponding to the at least one accessible packet, and the packet path information of the network device includes: the path identifier of the node corresponding to the network device, and the additional exclusion information includes: path identification of inaccessible nodes;
The step of matching the packet path information of each of the candidate network devices with the additional exclusion information specifically includes;
Comparing the path identifier of each alternative network device with the path identifiers of the inaccessible nodes respectively;
If the first several bits of the path identifier of the alternative network device are the same as the path identifier of an inaccessible node, determining that the packet path information of the alternative network device is successfully matched with the additional exclusion information;
And if the first several bits of the path identifier of the alternative network device are detected to be different from the path identifiers of all the inaccessible nodes, determining that the matching of the packet path information of the network device and the additional exclusion information fails.
6. The method of claim 1, wherein, before the step of obtaining the corresponding first resource permission information according to the first user identification in the query request in response to the query request, further comprises:
Collecting first alarm information of first network equipment;
Determining first packet path information of the first network device;
And storing the first alarm information and the first packet path information in the alarm information database, and associating the first alarm information and the first packet path information.
7. The method according to claim 6, wherein the step of determining the first packet path information of the first network device specifically comprises:
Inquiring whether packet path information matched with a first equipment identifier of the first network equipment is stored in a cache database or not;
And when the packet path information matched with the first equipment identifier of the first network equipment is inquired out, the inquired packet path information is used as the first packet path information.
8. The method of claim 7, wherein when the cache database is queried that the packet path information matched with the first equipment identifier of the first network equipment is not stored, acquiring the packet path information matched with the first equipment identifier of the first network equipment from a preset resource library as the first packet path information;
And establishing a corresponding relation between the first alarm information and the first packet path information, and storing the corresponding relation in the cache database.
9. The method of claim 7, wherein the method further comprises:
Receiving a device packet change message, the device packet change message comprising: a second device identification of a second network device and altered second packet path information;
and according to the equipment grouping change message, correspondingly modifying second grouping path information corresponding to the second equipment identifier in the cache database.
10. The method according to claim 1, wherein, in the step of responding to the query request, obtaining the corresponding first resource permission information according to the first user identifier in the query request specifically includes:
acquiring first resource authority information corresponding to the first user identifier from a memory database; and different user identifications and corresponding resource authority information are stored in the memory database.
11. The method of claim 10, wherein prior to the step of retrieving the first resource permission information corresponding to the first user identification from an in-memory database, further comprising:
judging whether first resource authority information corresponding to the first user identifier is stored in the memory database or not;
When the first resource authority information corresponding to the first user identifier is stored in the memory database, executing the step of acquiring the first resource authority information corresponding to the first user identifier from the memory database;
When the first resource authority information corresponding to the first user identifier is not stored in the memory database, the first resource authority information corresponding to the first user identifier is obtained from a preset resource library, and the first user identifier and the first resource authority information corresponding to the first user identifier are stored in the memory database.
12. The method of claim 10, wherein the method further comprises:
receiving a permission change message, wherein the permission change message comprises: the second user identification and the changed second resource authority information;
And according to the permission change message, correspondingly modifying second resource permission information corresponding to the second user identifier in the memory database.
13. An alarm information management system is used for managing alarm information of a plurality of network devices, wherein the network devices are grouped in multiple layers in a tree structure, each leaf node in the tree structure corresponds to one network device, each non-leaf node in the tree structure corresponds to one group, and the group corresponding to the non-leaf node comprises network devices corresponding to all leaf nodes under the non-leaf node; each node in the tree structure is configured with a corresponding node identifier and a path identifier, wherein the path identifier of the node is an identifier obtained by sequentially arranging node identifiers of all nodes on a path from a root node to the node; the system comprises:
the acquisition module is used for responding to the query request and acquiring corresponding resource permission information according to a first user identifier in the query request, wherein the resource permission information comprises: the grouped target group information may be accessed; wherein the target group information includes: the path identifier of the node corresponding to the at least one accessible packet;
The query module is used for querying the alarm information of each network device under the accessible group from a preset alarm information database according to the target group information, wherein the alarm information database stores the grouping path information of different network devices and the corresponding alarm information thereof; wherein the packet path information of the network device includes: the path identifier of the node corresponding to the network device.
14. A server, comprising:
one or more processors;
Storage means having stored thereon one or more programs which, when executed by the one or more processors, cause the one or more processors to implement the method of any of claims 1-12.
15. A computer readable medium having stored thereon a computer program, wherein the program when executed by a processor implements the method of any of claims 1-12.
CN201911381049.5A 2019-12-27 2019-12-27 Alarm information management method, alarm information management system and server Active CN113055213B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911381049.5A CN113055213B (en) 2019-12-27 2019-12-27 Alarm information management method, alarm information management system and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911381049.5A CN113055213B (en) 2019-12-27 2019-12-27 Alarm information management method, alarm information management system and server

Publications (2)

Publication Number Publication Date
CN113055213A CN113055213A (en) 2021-06-29
CN113055213B true CN113055213B (en) 2024-05-28

Family

ID=76506912

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911381049.5A Active CN113055213B (en) 2019-12-27 2019-12-27 Alarm information management method, alarm information management system and server

Country Status (1)

Country Link
CN (1) CN113055213B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114826877B (en) * 2022-02-24 2023-07-14 苏州浪潮智能科技有限公司 Asset alarm processing method, device, computer equipment and storage medium
CN116225859A (en) * 2023-05-04 2023-06-06 北京全路通信信号研究设计院集团有限公司 Operation and maintenance platform server data maintenance method and device

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1983962A (en) * 2006-06-08 2007-06-20 华为技术有限公司 Extended network managing system and method
CN101163032A (en) * 2006-10-11 2008-04-16 中兴通讯股份有限公司 Method of managing alarm inquiry
CN101917282A (en) * 2010-07-20 2010-12-15 中兴通讯股份有限公司 Method, device and system for processing alarm shielding rules
CN102308522A (en) * 2011-07-21 2012-01-04 华为技术有限公司 Method, device and system for locating network fault
CN102546274A (en) * 2010-12-20 2012-07-04 中国移动通信集团广西有限公司 Alarm monitoring method and alarm monitoring equipment in communication service
CN102664760A (en) * 2012-04-28 2012-09-12 华为技术有限公司 Alarming method for communication system, equipment and communication system
CN103001803A (en) * 2012-12-10 2013-03-27 上海斐讯数据通信技术有限公司 Method and system for achieving right management in network management
WO2013067831A1 (en) * 2011-11-09 2013-05-16 华为技术有限公司 Network alarm processing method, device and system thereof
CN104219088A (en) * 2014-08-21 2014-12-17 南京邮电大学 Hive-based network alarm information OLAP method
CN105763522A (en) * 2014-12-18 2016-07-13 中兴通讯股份有限公司 Authorization processing method and device
WO2016119436A1 (en) * 2015-01-27 2016-08-04 中兴通讯股份有限公司 Alarm processing method and device, and controller
CN107800559A (en) * 2016-09-07 2018-03-13 中兴通讯股份有限公司 A kind of software defined network SDN alert processing method and device
CN108199860A (en) * 2016-12-08 2018-06-22 中国移动通信有限公司研究院 A kind of alert processing method and the network equipment
CN108769051A (en) * 2018-06-11 2018-11-06 中国人民解放军战略支援部队信息工程大学 A kind of network intrusions situation intention appraisal procedure based on alert correlation
CN110149227A (en) * 2019-05-16 2019-08-20 平安科技(深圳)有限公司 The method and device of network alarm

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009070861A1 (en) * 2007-12-06 2009-06-11 Suhayya Abu-Hakima Processing of network content and services for mobile or fixed devices
US7974219B2 (en) * 2008-09-26 2011-07-05 Hewlett-Packard Development Company, L.P. Network troubleshooting using path topology
US20170141949A1 (en) * 2015-11-13 2017-05-18 Le Holdings (Beijing) Co., Ltd. Method and apparatus for processing alarm information in cloud computing

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1983962A (en) * 2006-06-08 2007-06-20 华为技术有限公司 Extended network managing system and method
CN101163032A (en) * 2006-10-11 2008-04-16 中兴通讯股份有限公司 Method of managing alarm inquiry
CN101917282A (en) * 2010-07-20 2010-12-15 中兴通讯股份有限公司 Method, device and system for processing alarm shielding rules
CN102546274A (en) * 2010-12-20 2012-07-04 中国移动通信集团广西有限公司 Alarm monitoring method and alarm monitoring equipment in communication service
CN102308522A (en) * 2011-07-21 2012-01-04 华为技术有限公司 Method, device and system for locating network fault
WO2013067831A1 (en) * 2011-11-09 2013-05-16 华为技术有限公司 Network alarm processing method, device and system thereof
CN102664760A (en) * 2012-04-28 2012-09-12 华为技术有限公司 Alarming method for communication system, equipment and communication system
CN103001803A (en) * 2012-12-10 2013-03-27 上海斐讯数据通信技术有限公司 Method and system for achieving right management in network management
CN104219088A (en) * 2014-08-21 2014-12-17 南京邮电大学 Hive-based network alarm information OLAP method
CN105763522A (en) * 2014-12-18 2016-07-13 中兴通讯股份有限公司 Authorization processing method and device
WO2016119436A1 (en) * 2015-01-27 2016-08-04 中兴通讯股份有限公司 Alarm processing method and device, and controller
CN107800559A (en) * 2016-09-07 2018-03-13 中兴通讯股份有限公司 A kind of software defined network SDN alert processing method and device
CN108199860A (en) * 2016-12-08 2018-06-22 中国移动通信有限公司研究院 A kind of alert processing method and the network equipment
CN108769051A (en) * 2018-06-11 2018-11-06 中国人民解放军战略支援部队信息工程大学 A kind of network intrusions situation intention appraisal procedure based on alert correlation
CN110149227A (en) * 2019-05-16 2019-08-20 平安科技(深圳)有限公司 The method and device of network alarm

Non-Patent Citations (6)

* Cited by examiner, † Cited by third party
Title
Energy alert BS selection in tree based IoT with cooperative green computing sensor network;N. Prophess Raj Kumar等;《2017 International Conference on Signal Processing and Communication (ICSPC)》;全文 *
城市轨道交通通信集中告警系统研究;吕兆辉;;铁路计算机应用(02);全文 *
数字电视网络前端设备实时告警系统的设计;杨会龙;;信息化建设;20160315(03);全文 *
电信综合集中告警系统;龚树峰;;电信快报;20051225(11);全文 *
电力通信告警综合管理系统;王东蕊;刘晓丽;;电力系统通信(12);全文 *
面向海量告警数据的并行处理系统设计与实现;张海阔;陆忠华;刘芳;李井泉;孙辰军;王珏;;计算机工程与设计(02);全文 *

Also Published As

Publication number Publication date
CN113055213A (en) 2021-06-29

Similar Documents

Publication Publication Date Title
US8504733B1 (en) Subtree for an aggregation system
EP3701680B1 (en) Network slice configuration
US20110107389A1 (en) System for and method of set-top box memory monitoring
CN113055213B (en) Alarm information management method, alarm information management system and server
EP2869495A1 (en) Node de-duplication in a network monitoring system
CN113127199B (en) Load balancing configuration method, device, equipment and storage medium
CN103490937A (en) Method and device for filtering monitoring data
CN111740868B (en) Alarm data processing method and device and storage medium
CN112506670B (en) Multi-node automatic operation and maintenance task processing method, system and storage medium
CN104468207A (en) Terminal management method, device and system
CN105471626A (en) Method and system for distributing storage data of internal memory
US7203690B2 (en) Systems and methods for tracking assets
CN110198227B (en) Log file processing method and device, storage medium and electronic device
CN106326280B (en) Data processing method, device and system
CN103812688A (en) Alarm determining method and device
US20220345925A1 (en) Distribution of Consolidated Analytics Reports in a Wireless Core Network
JP4911061B2 (en) Management system, history information storage method, and data structure of history information database
CN106254122B (en) Simple network management protocol agent implementation method based on EOC equipment
US8195781B2 (en) Network management with scalable trap definitions
JP5353682B2 (en) Configuration information management apparatus, distributed information management system, distributed information management method, and distributed information management program
CN109947451B (en) Cluster application file updating method, system, medium and equipment
CN114584454A (en) Server information processing method and device, electronic equipment and storage medium
CN110875831B (en) Method and device for monitoring network quality
CN107124293B (en) Protocol management method and system of distributed network system
CN110935168A (en) Distributed ID generation method, device and equipment for global uniform architecture

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant