CN115442269A - Block chain-based network connectivity monitoring method and device - Google Patents

Block chain-based network connectivity monitoring method and device Download PDF

Info

Publication number
CN115442269A
CN115442269A CN202211065118.3A CN202211065118A CN115442269A CN 115442269 A CN115442269 A CN 115442269A CN 202211065118 A CN202211065118 A CN 202211065118A CN 115442269 A CN115442269 A CN 115442269A
Authority
CN
China
Prior art keywords
network connectivity
network
verifying
verification result
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211065118.3A
Other languages
Chinese (zh)
Inventor
郝佳
任方园
姚一泽
傅亚敏
李昂
陈颖
杨彬
郭雯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202211065118.3A priority Critical patent/CN115442269A/en
Publication of CN115442269A publication Critical patent/CN115442269A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0805Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
    • H04L43/0811Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking connectivity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Environmental & Geological Engineering (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention provides a network connectivity monitoring method and device based on a block chain, relates to the technical field of the block chain, and can be used in the financial field or other technical fields. The method comprises the following steps: acquiring network connectivity monitoring information; verifying the network connectivity according to the network connectivity monitoring information, and storing a verification result into a local specified file; if the verification result is determined to be abnormal in network connectivity, generating a prompt message aiming at a network administrator; and storing the verification result, the network administrator information and the system identifier for verifying the network connectivity in the local specified file into a block chain. The device performs the above method. The method and the device for monitoring the network connectivity based on the block chain can monitor the network connectivity in time, improve the working efficiency of the monitoring network, and ensure the safety of information data by storing the information in the block chain.

Description

Block chain-based network connectivity monitoring method and device
Technical Field
The invention relates to the technical field of block chains, in particular to a network connectivity monitoring method and device based on a block chain.
Background
Time consumed by abnormal network troubleshooting, manpower consumed by troubleshooting and limitation of service enjoying of a client bring loss to a company, how to improve the work efficiency of the abnormal network troubleshooting and ensure the safety of information data are technical problems which need to be solved urgently.
Disclosure of Invention
To solve the problems in the prior art, embodiments of the present invention provide a method and an apparatus for monitoring network connectivity based on a block chain, which can at least partially solve the problems in the prior art.
On one hand, the invention provides a network connectivity monitoring method based on a block chain, which comprises the following steps:
acquiring network connectivity monitoring information; verifying the network connectivity according to the network connectivity monitoring information, and storing a verification result into a local specified file;
if the verification result is determined to be abnormal in network connectivity, generating a prompt message aiming at a network administrator;
and storing the verification result, the network administrator information and the system identification for verifying the network connectivity in the local specified file into a block chain.
Wherein, the acquiring network connectivity monitoring information includes:
and acquiring a network access outlet IP, a network access inlet IP and a network access inlet port.
Wherein, the verifying the network connectivity according to the network connectivity monitoring information comprises:
and verifying the network connectivity according to the network connectivity monitoring information by executing a telnet ip port verification instruction.
The block chain-based network connectivity monitoring method further comprises the following steps:
periodically executing the verification of the network connectivity according to the network connectivity monitoring information, and the subsequent steps;
and if the verification result is determined to be changed, generating a prompt message aiming at the network administrator.
In one aspect, the present invention provides a device for monitoring network connectivity based on a block chain, including:
the verification unit is used for acquiring network connectivity monitoring information; verifying the network connectivity according to the network connectivity monitoring information, and storing a verification result into a local specified file;
the generating unit is used for generating a prompt message aiming at a network administrator if the verification result is determined to be abnormal in network connectivity;
and the storage unit is used for storing the verification result, the network administrator information and the system identifier for verifying the network connectivity in the local specified file into a block chain.
Wherein the verification unit is specifically configured to:
and acquiring a network access outlet IP, a network access inlet IP and a network access inlet port.
Wherein the verification unit is specifically configured to:
and verifying the network connectivity according to the network connectivity monitoring information by executing a telnet ip port verification instruction.
Wherein the block chain-based network connectivity monitoring apparatus is further configured to:
periodically executing the verifying network connectivity according to the network connectivity monitoring information, and the subsequent steps;
and if the verification result is determined to be changed, generating a prompt message aiming at the network administrator.
In another aspect, an embodiment of the present invention provides a computer device, including a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor implements the following method when executing the computer program:
acquiring network connectivity monitoring information; verifying the network connectivity according to the network connectivity monitoring information, and storing a verification result into a local specified file;
if the verification result is determined to be abnormal in network connectivity, generating a prompt message aiming at a network administrator;
and storing the verification result, the network administrator information and the system identification for verifying the network connectivity in the local specified file into a block chain.
An embodiment of the present invention provides a computer-readable storage medium, including:
the computer-readable storage medium stores a computer program which, when executed by a processor, implements a method comprising:
acquiring network connectivity monitoring information; verifying the network connectivity according to the network connectivity monitoring information, and storing a verification result into a local specified file;
if the verification result is determined to be abnormal in network connectivity, generating a prompt message aiming at a network administrator;
and storing the verification result, the network administrator information and the system identification for verifying the network connectivity in the local specified file into a block chain.
An embodiment of the present invention further provides a computer program product, where the computer program product includes a computer program, and when executed by a processor, the computer program implements the following method:
acquiring network connectivity monitoring information; verifying the network connectivity according to the network connectivity monitoring information, and storing a verification result into a local specified file;
if the verification result is determined to be abnormal in network connectivity, generating a prompt message aiming at a network administrator;
and storing the verification result, the network administrator information and the system identification for verifying the network connectivity in the local specified file into a block chain.
The method and the device for monitoring the network connectivity based on the block chain acquire network connectivity monitoring information; verifying the network connectivity according to the network connectivity monitoring information, and storing a verification result into a local specified file; if the verification result is determined to be abnormal in network connectivity, generating a prompt message aiming at a network administrator; and storing the verification result, the network administrator information and the system identifier for verifying the network connectivity in the local appointed file into the block chain, so that the network connectivity can be monitored in time, the working efficiency of monitoring the network is improved, and the information is stored in the block chain, so that the information data safety is ensured.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts. In the drawings:
fig. 1 is a flowchart illustrating a method for monitoring network connectivity based on a block chain according to an embodiment of the present invention.
Fig. 2 is a schematic structural diagram of modularization of the block chain-based network connectivity monitoring method according to the embodiment of the present invention.
Fig. 3 is a flowchart illustrating a method for monitoring network connectivity based on a block chain according to another embodiment of the present invention.
Fig. 4 is a schematic structural diagram of a block chain-based network connectivity monitoring apparatus according to an embodiment of the present invention.
Fig. 5 is a schematic structural diagram of a computer device according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the embodiments of the present invention are further described in detail below with reference to the accompanying drawings. The exemplary embodiments and descriptions of the present invention are provided to explain the present invention, but not to limit the present invention. It should be noted that the embodiments and features of the embodiments in the present application may be arbitrarily combined with each other without conflict.
The terms related to the present invention are described as follows:
1. block chains: a technology for storing, verifying, transmitting and exchanging network data through self distributed nodes without depending on a third party.
2. Network connectivity: network connectivity refers to the ability of a computer to communicate with a network via network devices and lines and to perform data transfers, and in short, refers to whether a computer is connected to the network. When the network connectivity is in a problem, the user cannot use any network application, such as browsing a webpage, sending and receiving mails, logging in QQ chat and various services related to user information on the mobile phone APP.
System-to-system B network connectivity: if the connectivity is normal, the network connection condition between the system a and the system B indicates that the system a can successfully send data to the system B. For example, the A system represents an XX financial institution, the B system represents an XX mobile company, and only if the network connectivity between the A system and the B system is normal, the customer can successfully send a telephone charge recharging order to the B system through the A system to complete the recharging of the telephone charge of the customer, so that the customer can enjoy the services of mobile phones and data traffic.
Fig. 1 is a schematic flowchart of a method for monitoring network connectivity based on a block chain according to an embodiment of the present invention, and as shown in fig. 1, the method for monitoring network connectivity based on a block chain according to an embodiment of the present invention includes:
step S1: acquiring network connectivity monitoring information; and verifying the network connectivity according to the network connectivity monitoring information, and storing a verification result into a local specified file.
Step S2: and if the verification result is determined to be abnormal network connectivity, generating a prompt message aiming at a network administrator.
And step S3: and storing the verification result, the network administrator information and the system identifier for verifying the network connectivity in the local specified file into a block chain.
In the step S1, the device acquires network connectivity monitoring information; and verifying the network connectivity according to the network connectivity monitoring information, and storing a verification result into a local specified file. The apparatus may be a computer device or the like, e.g. a server, performing the method. According to the technical scheme, the data acquisition, storage, use, processing and the like meet the relevant regulations of national laws and regulations. The acquiring network connectivity monitoring information includes:
and acquiring a network access outlet IP, a network access inlet IP and a network access inlet port.
The verifying the network connectivity according to the network connectivity monitoring information includes:
and verifying the network connectivity according to the network connectivity monitoring information by executing a telnet ip port verification instruction.
The verification operation and the verification result are refreshed in real time in units of seconds. Firstly, a system needing to monitor network connectivity is combed out, for example, a service of a system B used by the system A, an outlet ip of the system A (namely, accessing the system B from a computer with the ip address), an inlet ip and a port of the system B (namely, the service provided by the system B is on a computer corresponding to the ip) need to be recorded, verification is performed by using a Linux instruction for testing network connectivity, and when a successful identifier appears: connected to xx.xx.xx.xx.xx.xx (ip address) indicates that the network connection is successful, otherwise, the connection fails. And recording the verified result in the text.
In the step S2, if the device determines that the verification result is that the network connectivity is abnormal, a prompt message for a network administrator is generated. The prompting message can be sent to the network administrator in the form of short message and mail.
In the step S3, the device stores the verification result, the network administrator information, and the system identifier for verifying the network connectivity in the local designated file into the blockchain. The verification result may also include that the network connectivity is normal, or it may be saved to the blockchain.
The network administrator information may include network administrator personal information and information related to responding to network connectivity abnormality, wherein the network administrator personal information may include name, job number, job title, and the like.
The information related to the response network connectivity abnormality may include a start time and an end time for starting to process the network connectivity abnormality, an abnormality cause and a processing manner recorded in the processing process, and the like.
The system identification may be a system IP.
The block chain has the characteristics of traceability, incapability of tampering and the like, so that the information data safety can be ensured.
The block chain-based network connectivity monitoring method further comprises the following steps:
periodically executing the verifying network connectivity according to the network connectivity monitoring information, and the subsequent steps;
and if the verification result is determined to be changed, generating a prompt message aiming at the network administrator.
And executing the verification instruction at regular time intervals of seconds, updating the verification result, triggering an information notification function when the result is changed, and feeding back the updated result to a network administrator by short messages and mails.
In the process, the system IP, the success or exception identification of the verification result, the verification result and the network administrator processing the network are used as nodes and stored in the chain, and once the IP is changed, the network administrator of the operation is recorded.
The method for monitoring the network connectivity based on the block chain obtains network connectivity monitoring information; verifying the network connectivity according to the network connectivity monitoring information, and storing a verification result into a local specified file; if the verification result is determined to be abnormal in network connectivity, generating a prompt message aiming at a network administrator; and storing the verification result, the network administrator information and the system identification for verifying the network connectivity in the local appointed file into the block chain, so that the network connectivity can be monitored in time, the working efficiency of the monitoring network is improved, and the information data safety is ensured by storing the information in the block chain.
Wherein, the acquiring network connectivity monitoring information includes:
and acquiring a network access outlet IP, a network access inlet IP and a network access inlet port. Reference is made to the above description and no further description is made.
Wherein, the verifying the network connectivity according to the network connectivity monitoring information comprises:
and verifying the network connectivity according to the network connectivity monitoring information by executing a telnet ip port verification instruction. Reference is made to the above description and no further description is made.
The method for monitoring the network connectivity based on the block chain further comprises the following steps:
periodically executing the verifying network connectivity according to the network connectivity monitoring information, and the subsequent steps; reference is made to the above description and no further description is made.
And if the verification result is determined to be changed, generating a prompt message aiming at the network administrator. Reference is made to the above description and no further description is made.
As shown in fig. 2, the method of the embodiment of the present invention may be implemented based on modularization, and specifically includes:
network connectivity verification module 1: a verification Linux instruction (telnet ip port) is executed.
The network connectivity result storage module 2: and saving the verification result to a specified file of a specified directory.
The timing execution module 3: and executing the contents at regular time and updating the network verification result.
The result sending module 4: and sending the stored result file to a corresponding network processor, such as a network administrator, through short messages and mails.
Block chain implementation module 5: and (4) the system ip, the success or exception identification of the verification result and the verification result are processed, and a network administrator of the network is taken as a node and stored in the chain.
As shown in fig. 3, the method of the embodiment of the present invention is briefly described as follows:
1. combing network information needing real-time monitoring, such as accessing service of B by A, combing an outlet ip of A and an inlet ip and a port of B.
2. Execution of a validation Linux instruction (telnet ip port): and executing an inlet ip + port of telnet + B on a computer corresponding to the ip of the A.
3. Analyzing the execution result, if Connected to xx.xx.xx.xx.xx (ip address) appears, it indicates that the network connection is successful, otherwise, it is a connection failure.
4. And storing the result in a specified file, and sending the result to a network administrator in the form of short messages and mails.
5. And (4) repeatedly executing the step 2-3 at regular time, and if the result is changed, executing the step 4 again.
6. And using the block chain technology to identify the success or abnormity of the system IP and the verification result, and processing the network administrator of the network as a node according to the verification result, and storing the node on the chain.
The embodiment of the invention has the following advantages:
1. the network connectivity is automatically verified through a program, and if an abnormality is found, a network administrator can be informed to process the abnormality at the first time.
2. If the service is abnormal, whether the network problem is caused can be known at first time, if so, which network is abnormal can be immediately known, the problem solving capability and the problem solving efficiency are improved, and the related service is recovered under the condition that the user experience is not sensible.
3. The manpower is saved, and the loss of the company caused by network problems is reduced.
4. In the network verification process, when the ip is changed (for example, the optimization of the system needs to be changed, and the ip belongs to normal change), the changed people and the changed time can be recorded, and if subsequent problems exist, the ip can be traced and prevented from being maliciously tampered.
It should be noted that the block chain-based network connectivity monitoring method provided in the embodiment of the present invention may be used in the financial field, and may also be used in any technical field other than the financial field.
Fig. 4 is a schematic structural diagram of a device for monitoring network connectivity based on a block chain according to an embodiment of the present invention, and as shown in fig. 4, the device for monitoring network connectivity based on a block chain according to an embodiment of the present invention includes a verification unit 401, a generation unit 402, and a storage unit 403, where:
the verification unit 401 is configured to obtain network connectivity monitoring information; verifying the network connectivity according to the network connectivity monitoring information, and storing a verification result into a local specified file; the generating unit 402 is configured to generate a prompt message for a network administrator if it is determined that the verification result is that network connectivity is abnormal; the saving unit 403 is configured to save the verification result, the network administrator information, and the system identifier for verifying network connectivity in the local designated file into a blockchain.
Specifically, the verification unit 401 in the apparatus is configured to obtain network connectivity monitoring information; verifying the network connectivity according to the network connectivity monitoring information, and storing a verification result into a local specified file; the generating unit 402 is configured to generate a prompt message for a network administrator if it is determined that the verification result is that network connectivity is abnormal; the saving unit 403 is configured to save the verification result, the network administrator information, and the system identifier for verifying network connectivity in the local designated file into a blockchain.
The network connectivity monitoring device based on the block chain acquires network connectivity monitoring information; verifying the network connectivity according to the network connectivity monitoring information, and storing a verification result into a local specified file; if the verification result is determined to be abnormal network connectivity, generating a prompt message aiming at a network administrator; and storing the verification result, the network administrator information and the system identification for verifying the network connectivity in the local appointed file into the block chain, so that the network connectivity can be monitored in time, the working efficiency of the monitoring network is improved, and the information data safety is ensured by storing the information in the block chain.
Wherein the verification unit 401 is specifically configured to:
and acquiring a network access outlet IP, a network access inlet IP and a network access inlet port.
Wherein the verification unit is specifically configured to:
and verifying the network connectivity according to the network connectivity monitoring information by executing a telnet ip port verification instruction.
Wherein the block chain-based network connectivity monitoring apparatus is further configured to:
periodically executing the verifying network connectivity according to the network connectivity monitoring information, and the subsequent steps;
and if the verification result is determined to be changed, generating a prompt message aiming at the network administrator.
The embodiment of the device for monitoring network connectivity based on a block chain according to the embodiment of the present invention may be specifically configured to execute the processing flows of the above method embodiments, and the functions of the device are not described herein again, and reference may be made to the detailed description of the method embodiments.
Fig. 5 is a schematic structural diagram of a computer device according to an embodiment of the present invention, where as shown in fig. 5, the computer device includes: a memory 501, a processor 502 and a computer program stored on the memory 501 and executable on the processor 502, the processor 502 implementing the following method when executing the computer program:
acquiring network connectivity monitoring information; verifying the network connectivity according to the network connectivity monitoring information, and storing a verification result into a local specified file;
if the verification result is determined to be abnormal network connectivity, generating a prompt message aiming at a network administrator;
and storing the verification result, the network administrator information and the system identification for verifying the network connectivity in the local specified file into a block chain.
The present embodiments disclose a computer program product comprising a computer program which, when executed by a processor, implements a method of:
acquiring network connectivity monitoring information; verifying the network connectivity according to the network connectivity monitoring information, and storing a verification result into a local specified file;
if the verification result is determined to be abnormal in network connectivity, generating a prompt message aiming at a network administrator;
and storing the verification result, the network administrator information and the system identifier for verifying the network connectivity in the local specified file into a block chain.
The present embodiments provide a computer-readable storage medium storing a computer program which, when executed by a processor, implements a method of:
acquiring network connectivity monitoring information; verifying the network connectivity according to the network connectivity monitoring information, and storing a verification result into a local specified file;
if the verification result is determined to be abnormal in network connectivity, generating a prompt message aiming at a network administrator;
and storing the verification result, the network administrator information and the system identification for verifying the network connectivity in the local specified file into a block chain.
Compared with the technical scheme in the prior art, the embodiment of the invention obtains the network connectivity monitoring information; verifying the network connectivity according to the network connectivity monitoring information, and storing a verification result into a local specified file; if the verification result is determined to be abnormal network connectivity, generating a prompt message aiming at a network administrator; and storing the verification result, the network administrator information and the system identification for verifying the network connectivity in the local appointed file into the block chain, so that the network connectivity can be monitored in time, the working efficiency of the monitoring network is improved, and the information data safety is ensured by storing the information in the block chain.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention has been described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In the description herein, reference to the description of the terms "one embodiment," "a particular embodiment," "some embodiments," "for example," "an example," "a particular example," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
The above-mentioned embodiments are intended to illustrate the objects, technical solutions and advantages of the present invention in further detail, and it should be understood that the above-mentioned embodiments are only exemplary embodiments of the present invention, and are not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (11)

1. A network connectivity monitoring method based on a block chain is characterized by comprising the following steps:
acquiring network connectivity monitoring information; verifying the network connectivity according to the network connectivity monitoring information, and storing a verification result into a local specified file;
if the verification result is determined to be abnormal in network connectivity, generating a prompt message aiming at a network administrator;
and storing the verification result, the network administrator information and the system identification for verifying the network connectivity in the local specified file into a block chain.
2. The method according to claim 1, wherein the obtaining network connectivity monitoring information comprises:
and acquiring a network access outlet IP, a network access inlet IP and a network access inlet port.
3. The method according to claim 1, wherein the verifying network connectivity according to the network connectivity monitoring information comprises:
and verifying the network connectivity according to the network connectivity monitoring information by executing a telnet ip port verification instruction.
4. The method according to claim 1, wherein the method for monitoring block chain-based network connectivity further comprises:
periodically executing the verifying network connectivity according to the network connectivity monitoring information, and the subsequent steps;
and if the verification result is determined to be changed, generating a prompt message aiming at the network administrator.
5. A block chain based network connectivity monitoring apparatus, comprising:
the verification unit is used for acquiring network connectivity monitoring information; verifying the network connectivity according to the network connectivity monitoring information, and storing a verification result into a local specified file;
the generating unit is used for generating a prompt message aiming at a network administrator if the verification result is determined to be abnormal in network connectivity;
and the storage unit is used for storing the verification result, the network administrator information and the system identifier for verifying the network connectivity in the local specified file into a block chain.
6. The device according to claim 5, wherein the verification unit is specifically configured to:
and acquiring a network access outlet IP, a network access inlet IP and a network access inlet port.
7. The device according to claim 5, wherein the verification unit is specifically configured to:
and verifying the network connectivity according to the network connectivity monitoring information by executing a telnet ip port verification instruction.
8. The blockchain-based network connectivity monitoring device of claim 5, wherein the blockchain-based network connectivity monitoring device is further configured to:
periodically executing the verifying network connectivity according to the network connectivity monitoring information, and the subsequent steps;
and if the verification result is determined to be changed, generating a prompt message aiming at the network administrator.
9. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the method of any one of claims 1 to 4 when executing the computer program.
10. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program which, when executed by a processor, implements the method of any of claims 1 to 4.
11. A computer program product, characterized in that the computer program product comprises a computer program which, when being executed by a processor, carries out the method of any one of claims 1 to 4.
CN202211065118.3A 2022-09-01 2022-09-01 Block chain-based network connectivity monitoring method and device Pending CN115442269A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211065118.3A CN115442269A (en) 2022-09-01 2022-09-01 Block chain-based network connectivity monitoring method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211065118.3A CN115442269A (en) 2022-09-01 2022-09-01 Block chain-based network connectivity monitoring method and device

Publications (1)

Publication Number Publication Date
CN115442269A true CN115442269A (en) 2022-12-06

Family

ID=84244467

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211065118.3A Pending CN115442269A (en) 2022-09-01 2022-09-01 Block chain-based network connectivity monitoring method and device

Country Status (1)

Country Link
CN (1) CN115442269A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104268061A (en) * 2014-09-12 2015-01-07 国云科技股份有限公司 Storage state monitoring mechanism for virtual machine
CN107707377A (en) * 2017-06-12 2018-02-16 贵州白山云科技有限公司 A kind of method and system for analyzing network node availability
CN112383441A (en) * 2019-11-18 2021-02-19 杭州趣链科技有限公司 Data processing method based on block chain, database uplink system and node equipment
CN114978964A (en) * 2022-05-10 2022-08-30 未鲲(上海)科技服务有限公司 Communication announcement configuration method, device, equipment and medium based on network self-checking

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104268061A (en) * 2014-09-12 2015-01-07 国云科技股份有限公司 Storage state monitoring mechanism for virtual machine
CN107707377A (en) * 2017-06-12 2018-02-16 贵州白山云科技有限公司 A kind of method and system for analyzing network node availability
CN112383441A (en) * 2019-11-18 2021-02-19 杭州趣链科技有限公司 Data processing method based on block chain, database uplink system and node equipment
CN114978964A (en) * 2022-05-10 2022-08-30 未鲲(上海)科技服务有限公司 Communication announcement configuration method, device, equipment and medium based on network self-checking

Similar Documents

Publication Publication Date Title
CN112988501B (en) Alarm information generation method and device, electronic equipment and storage medium
US7979532B2 (en) Systems and methods for using an access point for testing multiple devices and using several consoles
CN107294808A (en) The methods, devices and systems of interface testing
CN107704360B (en) Monitoring data processing method, equipment, server and storage medium
CN112202635B (en) Link monitoring method and device, storage medium and electronic device
CN112615753B (en) Link abnormity tracking method, first node, second node and link
CN110908812B (en) Service data processing method, device, readable storage medium and computer equipment
CN111176941A (en) Data processing method, device and storage medium
CN107729213B (en) Background task monitoring method and device
CN113468025A (en) Data warning method, system, device and storage medium
CN111813627A (en) Application auditing method, device, terminal, system and readable storage medium
CN112713996B (en) Block chain-based fault verification method, server and terminal
CN111628903B (en) Monitoring method and monitoring system for transaction system running state
WO2016037489A1 (en) Method, device and system for monitoring rcs spam messages
CN111262731B (en) Alarm method, alarm device, server equipment and storage medium
CN110620695B (en) Data processing method and related equipment
CN112130889A (en) Resource management method and device, storage medium and electronic device
CN115442269A (en) Block chain-based network connectivity monitoring method and device
CN115951923A (en) Subscription event management method and related product
US10554673B2 (en) Methods and apparatuses for obtaining and delivering mobile terminal security information based on a cloud service
CN113014587B (en) API detection method and device, electronic equipment and storage medium
CN112069027A (en) Interface data processing method and device, electronic equipment and storage medium
CN110365831B (en) Incoming call response method, device, system, storage medium and electronic device
CN113590715A (en) Block chain-based information push method, apparatus, device, medium, and program product
CN106485378A (en) The transmission method of business datum, system server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination