CN115484629A - Service state determination method and device - Google Patents

Service state determination method and device Download PDF

Info

Publication number
CN115484629A
CN115484629A CN202110662559.0A CN202110662559A CN115484629A CN 115484629 A CN115484629 A CN 115484629A CN 202110662559 A CN202110662559 A CN 202110662559A CN 115484629 A CN115484629 A CN 115484629A
Authority
CN
China
Prior art keywords
event
service
path
resource
determining
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110662559.0A
Other languages
Chinese (zh)
Inventor
谢青
何兴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN202110662559.0A priority Critical patent/CN115484629A/en
Publication of CN115484629A publication Critical patent/CN115484629A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/04Arrangements for maintaining operational condition

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The embodiment of the invention discloses a method and a device for determining a service state, wherein the method comprises the following steps: acquiring a first activity key event related to a service, wherein the first activity key event comprises at least one of a key alarm event, a performance out-of-limit event, an equipment abnormal event or a high-risk operation event; determining a service path related to a resource object indicated by a resource identifier based on a pre-established resource relationship and the resource identifier contained in the information of the first activity key event, wherein the resource relationship comprises an association relationship among a plurality of resource objects on the service path; determining a second activity key event of each of the plurality of service paths; and determining the working state of each service path according to the second activity key event. By adopting the embodiment of the invention, the accuracy of the service state analysis can be improved, and the efficiency of the service state analysis can be improved.

Description

Service state determination method and device
Technical Field
The present invention relates to the field of network technologies, and in particular, to a method and an apparatus for determining a service status.
Background
The operator network has been developed to the fifth generation mobile communication technology (the 5 generation,5 g), the network architecture becomes more flexible, the requirements on key performance indexes such as time delay, speed, connection scale and the like of the network are continuously improved, the application industry is more and more abundant and diversified, the monitoring and the guarantee of the service and the flexibility are fundamentally changed, and the difficulty in network operation and maintenance is obviously increased. After a network has a service fault, network operation and maintenance personnel need to repair the service fault, and when the number of service faults is large, the network operation and maintenance personnel need to process the service faults according to different emergency priorities according to the service damage conditions to determine which services are damaged and the damage degree of each service. However, at present, network operation and maintenance personnel can analyze the service state only by a network management system based on the relationship such as time relationship, network topology, service configuration, and the like, which results in low accuracy of analyzing the service state and influences the efficiency of analyzing the service state.
Disclosure of Invention
The embodiment of the invention provides a method and a device for determining a service state, which can improve the accuracy of service state analysis and improve the efficiency of service state analysis.
In a first aspect, an embodiment of the present invention provides a method for determining a service status, including: acquiring a first activity key event related to a service, wherein the first activity key event comprises at least one of a key alarm event, a performance out-of-limit event, an equipment abnormal event or a high-risk operation event; determining a plurality of service paths related to resource objects indicated by a resource identifier based on a pre-established resource relationship and the resource identifier contained in the information of the first activity key event, wherein the resource relationship comprises an association relationship among the plurality of resource objects on the service paths; determining a second activity key event of each service path in the plurality of service paths; and determining the working state of each service path according to the second activity key event. The service path is determined through the resource relation and the resource identifier contained in the information of the activity key event, so that the efficiency of searching the service path can be improved, and the efficiency of analyzing the working state of the service path is improved. And the working state of each service path is analyzed through the activity key event of each service path, so that the quantitative calculation and the qualitative calculation of the affected degree of the service are realized, and the accuracy of analyzing the service state is improved.
In one possible design, the first activity critical event is a critical alarm event, and acquiring the first activity critical event related to the service includes: acquiring alarm data generated by equipment; determining that a key alarm event corresponding to the alarm data is contained in a key event white list according to a preset key event white list, wherein the key alarm event corresponding to the alarm data is a first activity key event; or the first activity key event is a performance out-of-limit event, and the acquiring the first activity key event related to the service comprises: acquiring performance data generated by equipment; determining that a performance out-of-limit event corresponding to the performance data is contained in a key event white list according to a preset key event white list, wherein the performance out-of-limit event corresponding to the performance data is a first activity key event; or the first activity key event is an equipment abnormal event, and the acquiring the first activity key event related to the service comprises the following steps: acquiring a device log generated by a device; determining that the equipment abnormal event corresponding to the equipment log is contained in a key event white list according to a preset key event white list, wherein the equipment abnormal event corresponding to the equipment log is a first activity key event; or the first activity key event is a high-risk operation event, and the acquiring the first activity key event related to the service comprises the following steps: acquiring a user operation log of a network management system; and determining that the high-risk operation event corresponding to the user operation log is contained in the key event white list according to a preset key event white list, wherein the high-risk operation event corresponding to the user operation log is a first activity key event. And the active key events are screened through the key event white list, so that the information quantity of the processed active key events is reduced, and the efficiency of searching the service path is improved.
In another possible design, the association relationship between the multiple resource objects includes a relationship between a port and a link and a relationship between a link and a link path, and the resource object indicated by the resource identifier is a physical port; determining a link corresponding to the physical port according to the relationship between the port and the link; and determining a service path corresponding to the link according to the relationship between the link and the link path. The efficiency of searching the service path can be improved by searching the service path through the resource relation.
In another possible design, the association relationship between the plurality of resource objects includes a relationship between an interface and a cross, and a relationship between a cross and a link path; the resource object indicated by the resource identifier is an interface; determining the intersection corresponding to the interface according to the relationship between the interface and the intersection; and determining a service path corresponding to the intersection according to the relationship between the intersection and the link path. The efficiency of searching the service path can be improved by searching the service path through the resource relation.
In another possible design, the associative relationship between the plurality of resource objects includes a relationship of a cross and a link path; the resource object indicated by the resource identifier is a crossed interface; and determining a service path corresponding to the crossed interface according to the relation between the crossed interface and the link path. The efficiency of searching the service path can be improved by searching the service path through the resource relation.
In another possible design, a resource object included in a first service path in the plurality of service paths is determined based on the resource relationship; and acquiring an activity key event containing the resource identifier of the resource object contained in the first service path as a second activity key event of the first service path. And acquiring the activity key event through the resource identifier of the resource object contained in the service path, thereby accurately determining the damaged state of the service path through the activity key event and improving the accuracy of analyzing the service state.
In another possible design, if a second activity critical event exists in at least one route on the first traffic path, the operating state of the first traffic path is determined to be a damaged state.
In another possible design, a first number of all routes on the first traffic path and a second number of routes for which there are second activity critical events are determined; and taking the ratio of the second number to the first number as the damage quantitative proportion of the first service path. By calculating the damaged quantitative proportion of the service path, the quantitative calculation of the affected degree of the service is realized, and the accuracy of analyzing the service state is improved.
In another possible design, a qualitative result of traffic impairment of the first traffic path is determined according to a type of the first traffic path and an impairment quantitative ratio, wherein the type of the traffic path is a working path or a protection path. And by calculating the service damage qualitative result of the service path, the qualitative calculation of the service affected degree is realized, so that the accuracy of analyzing the service state is improved.
In a second aspect, the present application provides a service status determining device, where the device may be a network management device, may also be a device in a network management device, or may be a device capable of being used in match with a network management device. The service state determination device may also be a chip system. The traffic state determination apparatus may perform the method of the first aspect. The function of the service state determining device can be realized by hardware, and can also be realized by hardware executing corresponding software. The hardware or software includes one or more modules corresponding to the functions described above. The module may be software and/or hardware. The operations and advantageous effects executed by the service status determining apparatus may refer to the method and advantageous effects described in the first aspect, and repeated details are not repeated.
In a third aspect, the present application provides a traffic state determination apparatus comprising a processor, wherein the method according to any of the first aspect is performed when the processor calls a computer program in a memory.
In a fourth aspect, the present application provides a traffic state determination apparatus comprising a processor and a memory, the memory for storing a computer program; the processor is configured to execute a computer program stored in the memory to cause the traffic state determination apparatus to perform the method according to any of the first aspects.
In a fifth aspect, the present application provides a traffic state determination apparatus, which includes a processor, a memory, and a transceiver, where the transceiver is configured to receive a channel or a signal or transmit a channel or a signal; the memory for storing a computer program; the processor is configured to invoke the computer program from the memory to perform the method according to any of the first aspects.
In a sixth aspect, the present application provides a traffic state determination apparatus, which includes a processor and an interface circuit, where the interface circuit is configured to receive a computer program and transmit the computer program to the processor; the processor runs the computer program to perform the method according to any of the first aspects.
In a seventh aspect, the present application provides a computer readable storage medium for storing a computer program which, when executed, causes the method of any one of the first aspect to be implemented.
In an eighth aspect, the present application provides a computer program product comprising a computer program that, when executed, causes the method of any one of the first aspects to be carried out.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments or the background art of the present invention, the drawings required to be used in the embodiments or the background art of the present invention will be described below.
Fig. 1A is a schematic diagram of an architecture of a network management system;
FIG. 1B is a schematic diagram of a business impact analysis method;
fig. 2 is a schematic architecture diagram of a service analysis system according to an embodiment of the present application;
fig. 3 is a schematic flowchart of a service status determining method according to an embodiment of the present application;
FIG. 4 is a schematic diagram of a resource relationship in a device according to an embodiment of the present application;
FIG. 5 is a schematic diagram of a cross-device resource relationship provided by an embodiment of the present application;
fig. 6 is a schematic diagram for determining a traffic path according to an embodiment of the present application;
fig. 7 is a schematic diagram of another method for determining a traffic path according to an embodiment of the present application;
fig. 8 is a schematic diagram of another method for determining a traffic path according to an embodiment of the present application;
fig. 9 is a schematic diagram for determining a resource object included in a traffic path according to an embodiment of the present application;
fig. 10 is a schematic diagram of a traffic path without protection according to an embodiment of the present application;
fig. 11 is a schematic diagram of a service path with protection according to an embodiment of the present application;
fig. 12 is a schematic structural diagram of a service status determining apparatus according to an embodiment of the present application;
fig. 13 is a schematic structural diagram of a network management device according to an embodiment of the present application.
Detailed Description
The embodiments of the present invention will be described below with reference to the drawings.
As shown in fig. 1A, fig. 1A is a schematic diagram of an architecture of a network management system. The network management system may include a network management device and a plurality of devices. Wherein the plurality of devices may include device 1, device 2, … …, and device N. The plurality of devices may be a plurality of network devices, such as routing devices, IP network devices, and the like. The user can operate the network management device, and network management is carried out on a plurality of devices through the network management device. The network management equipment collects data from a plurality of devices, and the plurality of devices can report the data to the network management equipment. And the network management equipment analyzes the service state according to the acquired data to ensure normal transmission of the service.
Service provisioning first needs to monitor for service failures, which are typically caused by network failures (e.g., equipment failures and link failures). After a service fault occurs, the network management system can collect a series of data reflecting the fault phenomenon, but cannot directly give out whether each service is currently damaged or not and the damage degree. The collected data may include alarm data, performance data, device logs, and/or user operation logs of the gateway system, which are reported by the physical ports of the optical fiber source and destination and the logical ports of the service path. The key alarm event corresponding to the alarm data, the performance out-of-limit event corresponding to the performance data, the equipment abnormal event corresponding to the equipment log and/or the high-risk operation event corresponding to the user operation log can be used as the activity key event. After a service fault occurs, network operation and maintenance personnel need to repair the fault, and when the service fault is more, the network operation and maintenance personnel need to process according to different emergency priorities according to the service damage conditions to determine which services are damaged and the damage degree of each service.
Analyzing the traffic state by: a connection (bidirectional dependency) and bearer (unidirectional dependency) relationship is established in advance, and a resource object, a service and a Service Level Agreement (SLA) are associated. When SLA is not satisfied or service is damaged, the corresponding resource object is searched through the association relation, and then the root event and the influenced service can be analyzed through checking the alarm and Key Performance Indicator (KPI) of the resource object. Since a plurality of devices in the network management system generate a large amount of activity critical events at all times, the performance may be degraded due to the analysis completely based on the activity critical events.
For example, as shown in fig. 1B, fig. 1B is a schematic diagram of a business impact analysis method. And a resource association relation library and a business influence model library are established in advance, and then the collected activity key events are input to an event correlation analysis module through a resource collection module to analyze the root events. And finally, analyzing the influence degree of the service based on the root event. The root event is an event close to the root cause fault in all events, network operation and maintenance personnel can process the fault according to the root event, namely the fault problem can be solved, and other derived events can be automatically repaired along with the repair of the root event.
However, since the above method does not support analyzing the specific influence degree of the service, such as a quantitative percentage value (e.g., 10% or 90%), a qualitative value (e.g., full interrupt, partial interrupt), or an absolute value (influence or no influence), the network operation and maintenance staff cannot accurately determine the processing priority. For example, in a scenario where a protected service fails, a dual-transmission selective-reception mode may be adopted to transmit the service. That is, in order to ensure high-reliability transmission of services, the sending end transmits the same services through two paths (a working path and a protection path), and the receiving end can select any one path to receive the services. When a certain path is detected to have a fault, the other path can be automatically switched to receive the service, and the service transmission is not influenced. However, if the other path is also in the interrupted state, the entire service is interrupted. Generally speaking, when one of the paths fails, although the service transmission is not affected, the overall reliability is affected, and the service is in an unprotected state. As another example, in the case of traffic having multiple routes, when multiple routes are bound by a combined traffic or Link Aggregation Group (LAG), a failure of one of the routes may cause the bound traffic to be damaged. However, since other routes are normal, the bound traffic can also communicate normally, but will be affected to some extent. In this case, the traffic status may be considered degraded, and the urgency is lower compared to the interruption of the traffic although the traffic is impaired.
In order to solve the above technical problem, embodiments of the present application provide the following solutions.
As shown in fig. 2, fig. 2 is a schematic structural diagram of a service analysis system according to an embodiment of the present application. The business analysis system may include a business impact analysis module 201, a business management module 202, a critical event management module 203, and a resource management module 204. The key event management module 203 may be configured to collect alarm data, performance data, device logs, and user operation logs of the network management system generated by the network management device, perform screening through a key event white list to obtain an active key event, and store the active key event in an event database. The resource management module 204 may be configured to collect the resources and the resource relationships of the device through the resource interface, and store the resources and the resource relationships in the resource database. The service management module 202 may be configured to determine one or more service paths related to the resource object according to the resource identifier included in the information of the activity critical event. The business impact analysis module 201 is configured to determine an affected degree of each business path according to the activity critical event on each business path. The network management device may include an internet protocol radio access network (IP RAN) device, an optical metropolitan area (optical metro) device, an IP metropolitan area device, an IP core network, a cloud network management device, and the like. The embodiment of the application can be applied to 4G, 5G or next generation communication networks, such as a transmission network, an IP network and a cross-domain combined network. The service analysis system can be configured in network management equipment.
As shown in fig. 3, fig. 3 is a schematic flowchart of a service status determining method provided in an embodiment of the present application. The method can be realized by network management equipment. The steps in the embodiments of the present application include at least:
s301, acquiring a first activity key event related to a service, wherein the first activity key event comprises at least one of a key alarm event, a performance out-of-limit event, an equipment abnormal event or a high-risk operation event.
The service may be a tunnel service, a Virtual Private Network (VPN) service, an Ethernet Virtual Private Network (EVPN) service, and the like. The first activity critical event related to the service may be an activity critical event generated when the service is transmitted. The first activity critical event may be a critical alarm event, a performance out-of-limit event, a device exception event, or a high risk operational event that is currently in an active state.
Specifically, under the condition that the first activity key event is a key alarm event, alarm data generated by equipment can be acquired; determining that a key alarm event corresponding to the alarm data is contained in a key event white list according to a preset key event white list, wherein the key alarm event corresponding to the alarm data is the first activity key event; or, in the case that the first activity critical event is a performance out-of-limit event, performance data generated by the device may be acquired; determining that a performance out-of-limit event corresponding to the performance data is contained in a key event white list according to a preset key event white list, wherein the performance out-of-limit event corresponding to the performance data is a first activity key event; or, in the case that the first activity key event is an equipment abnormal event, an equipment log generated by equipment may be acquired; determining that the device abnormal event corresponding to the device log is contained in a preset key event white list according to the preset key event white list, and determining that the device abnormal event corresponding to the device log is a first activity key event; or, in the case that the first activity key event is a high-risk operation event, a user operation log of the network management system may be acquired; and determining that the high-risk operation event corresponding to the user operation log is contained in the key event white list according to a preset key event white list, wherein the high-risk operation event corresponding to the user operation log is a first activity key event.
Wherein the information of the first activity key event may comprise at least one of an event name or a resource identification. The key event white list may include event names for a plurality of active key events. For example, the events generated by the device include event a, event B, event C and event D, and it is determined through data statistics that event a and event B cause service damage, and event C and event D do not affect service. The key event whitelist may thus include event a, event B.
Wherein the alarm data, device log, performance data or user operation log is generated when transmitting traffic (e.g. tunnel traffic, VPN traffic or EVPN traffic). Alarm data is data generated by a device or a network management system for network monitoring operation and maintenance, and may include alarm levels (critical, urgent, important, and secondary), alarm types (hardware, communication, security, etc.), occurrence time, and the like. The device log may include a service configuration modification log, and a trace log (trace log) generated by the device operation. For example, if a preset keyword exists in a certain trace log, it is determined that an event corresponding to the trace log is an equipment abnormal event. The performance data may be a performance indicator of the device during operation, for example, the optical power fluctuates within a range during normal operation of the device, and if the optical power at a certain point in time exceeds the normal range, the event is determined to be an out-of-performance event. For another example, when the device normally operates, the occupation amount of a Central Processing Unit (CPU) is within a range, and if the occupation amount of the CPU at a certain time point exceeds a preset threshold, the event is determined to be a performance out-of-limit event. The user operation log is a log generated by a user operating on the network management system, and the high-risk operation event corresponding to the user operation log is an operation affecting the service, such as service delivery modification, IP address modification, port configuration attribute modification and the like.
S302, based on the pre-established resource relationship and the resource identifier contained in the information of the first activity key event, determining a plurality of service paths related to the resource object indicated by the resource identifier. The resource relationship includes an association relationship between a plurality of resource objects on the traffic path.
For a user, a service path may be a complete independently manageable path, which may also be referred to as a link path, and includes one or more paths (also referred to as routes) from a source device to a sink device, where each path may be understood as a transmission path, and one service path corresponds to multiple transmission paths. The multiple service paths related to the resource object may represent service paths corresponding to the resource object, service paths where the resource object is located, or service paths through which the resource object passes.
And the resource object is a resource related to a service transmission path. Physical ports, interfaces, and interleaved interfaces may be included. Physical ports refer to ports that actually exist on a device, such as fiber source-sink ports, link source-sink ports, and so forth. An interface refers to a logical port, a child object that is virtualized from a physical port. The crossed interface refers to two physical ports or two interfaces in a signal connection state on the same device, and the cross between the two interfaces can indicate a connection state. The service enters from the source interface and outputs from the destination interface, and the service can be directly transmitted and forwarded in the crossing, or can be converted and then forwarded. Optionally, the intersection between the two interfaces has directionality.
As shown in fig. 4, fig. 4 is a schematic diagram of resource relationship modeling in a device according to an embodiment of the present application. One device is represented as a device, a board and a physical port, the physical port is further virtualized into a plurality of interfaces, and an intersection in the device exists between the two interfaces. As shown in fig. 5, fig. 5 is a schematic diagram of cross-device resource relationship modeling provided by an embodiment of the present application. A traffic link path (tunneltail) spans four devices and is borne on three links, a source port and a destination port corresponding to each link are located on physical ports in different devices, and every two links are connected through a cross interface in the device. The physical port and the interface have a virtual relationship, that is, the interface is virtualized by the physical port. There is a bearer relationship between the link and the link path, and the bearer relationship may represent a relationship between the client traffic and the service traffic (route), that is, the client traffic is transmitted through the service traffic, for example, the tunnel traffic is carried on the IP link. There is a combinatorial relationship between the cross and link paths. Since a link path spans multiple devices, each involving one or more intersections, these intersections are collectively attributed to the link path, and this attribution relationship can be understood as a combinatorial relationship.
It should be noted that the present document only lists the modeling of several resource relationships, and the modeling of other resource relationships is also within the scope of the present application.
In the embodiment of the present application, determining a service path related to a resource object indicated by the resource identifier includes the following several optional manners:
in a first alternative, the association relationship between the resource objects includes a relationship between a port and a link, and a relationship between a link and a link path. The relationship between the port and the link may be an association relationship between the port and the link, and the relationship between the link and the link path may be a bearer relationship between the link and the link path. When the resource object indicated by the resource identifier is a physical port, determining a link corresponding to the physical port according to a relationship between the port and the link; and determining a service path corresponding to the link according to the relationship between the link and the link path.
For example, as shown in fig. 6, fig. 6 is a schematic diagram for determining a traffic path according to an embodiment of the present application. The information of the first activity critical event includes a physical port 1 in the device 2, and since the physical port 1 is associated with a link 2 (a link between the device 2 and the device 3), that is, the link 2 is connected to the physical port 1, the link 2 can be found through the physical port 1. Since the link 2 is carried on the link path 3 (link path between the device 1 and the device 4), the link path 3 can be found through the link 2, and the link path 3 is taken as a traffic path.
In a second alternative, the association relationship between the resource objects includes a relationship between an interface and a cross, and a relationship between a cross and a link path. The relationship between the interface and the intersection may be an association relationship between the interface and the intersection, and the relationship between the intersection and the link path may be a combination relationship between the intersection and the link path. Under the condition that the resource object indicated by the resource identifier is an interface; determining the intersection corresponding to the interface according to the relationship between the interface and the intersection; and determining a service path corresponding to the intersection according to the relationship between the intersection and the link path.
For example, as shown in fig. 7, fig. 7 is a schematic diagram for determining a traffic path according to an embodiment of the present application. The information of the first activity critical event includes an interface 1 in the device 2, and since the interface 1 and the interface 2 have a connection relationship, the intersection between the interface 1 and the interface 2 (the connection state between the interface 1 and the interface 2) can be found through the interface 1. Since the intersection between the interface 1 and the interface 2 has a combination relationship with the link path 3 (the link path between the device 1 and the device 4), the link path 3 can be found through the intersection between the interface 1 and the interface 2, and the link path 3 is used as a service path.
In a third alternative, the association relationship between the resource objects includes a relationship between intersections and link paths. Wherein the relationship of the intersection and the link path may be a combined relationship of the intersection and the link path. And determining a service path corresponding to the crossed interface according to the relationship between the cross and the link path under the condition that the resource object indicated by the resource identifier is the crossed interface.
For example, as shown in fig. 8, fig. 8 is a schematic diagram for determining a traffic path according to an embodiment of the present application. The information of the first active critical event includes a cross 1 in the device 3 (a connection state between two interfaces in the device 3), and since the cross 1 and the link path 2 (a link path between the device 1 and the device 4) have a combination relationship, the link path 2 can be found through the cross 1, and the link path 2 is used as a service path.
It should be noted that since a large number of ports in the network do not actually carry traffic, even for a network with hundreds of millions of ports, the number of traffic paths may be millions, while the number of traffic paths associated with activity critical events may be tens of thousands, and searching for a traffic path based on resource relationships and activity critical events can significantly reduce the amount of computation.
S303, determining a second activity key event of each service path in the plurality of service paths.
Optionally, the resource object included in the first service path in the plurality of service paths may be determined based on the resource relationship. And then acquiring an activity key event containing a resource identifier of a resource object contained in the first service path as the second activity key event of the first service path.
Further, all interfaces, physical ports, and cross interfaces included in the service path may be obtained from the service path according to the bearer, combination, and virtual relationship between the resource objects. For example, as shown in fig. 9, fig. 9 is a schematic diagram for determining a resource object included in a traffic path according to an embodiment of the present application. Starting from the link path 1, the resource objects in the device 1, the device 2, the device 3 and the device 4 passed by the link path 1 are respectively searched. For the device 2, since the link path 1 and the cross 2 in the device 2 have a combination relationship, the cross 2 is found through the link path 1, since the cross 2 and the interface 3 have an association relationship, the interface 3 is found through the cross 2, and since the interface 3 and the physical port 4 have a virtual relationship, the physical port 4 is found through the interface 3. For the device 1, since the link path 1 has an association relationship with the interface 5 in the device 1, the interface 5 is found through the link path 1, since the interface 5 has a virtual relationship with the physical port 6 in the device 1, the physical port 6 is found through the interface 5, and since the link path 1 has a bearing relationship with the link 7, the link 7 can be found through the link path 1. Other resource objects can be searched according to the above method, and details are not described here.
Optionally, all the key events within a preset time period may be obtained, and the key event currently still in the active state is obtained from all the key events, and if the information of a certain key event includes the resource identifier of the resource object included in the first service path, the key event is determined to be the second active key event.
S304, determining the working state of each service path according to the second activity key event.
Optionally, if there is no second activity critical event in all routes on the first service path, determining that the working state of the first service path is a normal state. And if the second activity critical event exists in at least one route on the first service path, determining that the working state of the first service path is a damaged state. Wherein the damaged state may include partially damaged and fully damaged.
Optionally, determining a first number of all routes on the first traffic path and a second number of routes where the second activity critical event exists; and taking the ratio of the second number to the first number as the damage quantitative proportion of the first traffic path.
It should be noted that the service path is a path through which the service starts from the source device and reaches the destination device through the intermediate device, and the service path may include one or more routes, for example, the service path may be understood as a road, and the route may be understood as a lane on the road. The source device, the intermediate device and the destination device all have a plurality of physical ports or interfaces. When transmitting the service, the first interface, i.e. the first path, from the first interface of the source device to the first interface of the destination device via the first interface of the intermediate device may be selected. Alternatively, the second interface of the source device may be started from the second interface of the source device and the second interface of the intermediate device may be reached to the second interface of the destination device, that is, the second route. When transmitting the traffic, any one physical port or interface of the source device, the intermediate device or the destination device may be selected, and the traffic is transmitted through different physical ports or interfaces to form a plurality of routes.
For example, if there are M routes on a traffic path, there are activity critical events on N routes. M, N are integers greater than or equal to 1, and if N is less than M, it is determined that the traffic path is partially damaged, and the damaged quantitative proportion of the traffic path is N/M. If all the routes on the service path have the critical event, determining that the damage quantitative proportion of the service path is 100%. Specifically, if there is only one route on the traffic path and there is an activity critical event on that route, then the traffic path is determined to be totally impaired with a quantitative proportion of impairment of 100%.
Optionally, a qualitative result of the service impairment of the first service path may be determined according to the type of the first service path and the quantitative proportion of the impairment, where the type of the service path is a working path or a protection path. The working path may be a path with unprotected traffic. The protection path may be a path where traffic is protected, and the protection path may include a working route and a protection route.
TABLE 1
Figure BDA0003115682340000081
As shown in table 1, under the condition that the service is protected, if the working route is in the normal state, the damaged quantitative proportion is 0%, the protection route is in the damaged state, and the damaged quantitative proportion is 100%, the protection route is interrupted, and the signal is not turned on. If the working route is in a normal state, the damaged quantitative proportion is 0%, the protection route is in a damaged state, and the damaged quantitative proportion is 0% < and <100%, the protection route is degraded, and the signal is still conducted. If the working route is in a damaged state, the service path is switched to the protection route, and after the working route is switched to the protection route, no active key event exists on the new working route, the damaged quantitative proportion of the working route after switching is 0%, the protection route after switching is used as the working route, no secondary protection capability exists, and the damaged quantitative proportion of the protection route is 100%. The protection route fails or the traffic path degrades.
In the case of traffic non-protection, if the working path is in a damaged state, the damage quantitative ratio is 0% < and <100%, the working path is degraded. If the working path is in a damaged state, the damaged quantitative proportion is 100%, the working path is interrupted. Wherein degradation may also be referred to as partial interruption, partial failure, or error failure. An interrupt may also be referred to as a failure, an out-of-service, or an exception.
As shown in fig. 10, fig. 10 is a schematic diagram of a traffic path without protection according to an embodiment of the present application. There is only one traffic path from a 1 _XPE1device to a 1 _SPE2device, named 1_XPE1_1_ _SPE2 _zh1, the traffic path passes through a 1 _xpe1device, a 1 _npe1device, a 1 _npe2device, and a 1 _spe2device, respectively, in sequence. As shown in fig. 11, fig. 11 is a schematic diagram of a protected service path according to an embodiment of the present application. The traffic path from a 1 _SPE1device to a 1_NEP2_ device includes a working route and a protection route, named 1_SPE1_1_NEP2_ encident. Wherein the work route passes through 1 _SPE1device, 1 _XPE1device, 1 _NPE1device, and 1 _NEP2device, in that order. The protection route passes through, in order, the 1_SPE1 device, the 1 _USPE2 device, the 1 _UXPE2 device, and the 1 _UNEP2 device. The traffic path 1_XPE1_1_SPE2_zhb1 and the traffic path 1_SPE1_1_NEP2 _incidentshare a link from the 1 _XPE1device to the 1 _NPE1device.
At some point, if the fiber from the 1 _XPE1device to the 1 _NPE1device is broken, the physical port of the 1 _XPE1device or 1 _NPE1device on the unprotected traffic path 1_XPE1_1 _2 _zhb1 reports a LOSs of signal (LOS) alarm event. The protected service path 1_SPE1_1_NEP2 _insindentis switched from the working route to the protection route, and the working route before switching reports a loss of connectivity verification (LOCV) alarm event. LOS alarm events and LOCV alarm events may be filtered out through a key event white list.
Wherein the information for the LOS alarm event includes a physical port of the 1\ u XPE1 device. The link can be found according to the relationship between the port and the link, and then the service path can be found according to the relationship between the link and the link path. Alternatively, the information of the LOCV alarm event includes an interface of the NPE1 device. The intersection can be found according to the relationship between the interface and the intersection, and then the service path can be found according to the relationship between the intersection and the link path. Multiple traffic paths may be found through LOS alarm events and LOCV alarm events. If repeated paths exist in the plurality of service paths, the found service paths can be deduplicated. Finally, the service path 1_XPE1_1_SPE2 _zhband the service path 1_SPE1_1_NEP2 _incidentare obtained.
Then, based on the resource relationship, it is determined that the service path 1_xpe1_1_spe2 _zhbincludes 4 resource objects (cross interface, interface and physical port), and the key event which is still active at present is searched according to the 4 resource objects, so as to obtain two LOS alarm events. The traffic path 1_SPE1_1_NEP2 _incidentcomprises 8 resource objects (intersecting interfaces, interfaces and physical ports). And searching the key event which is still active at present according to the 8 resource objects to obtain a plurality of LOCV alarm events.
As shown in table 2, for the working route and the protection route included in the traffic path 1_spe1_1_nep2 _insindent, quantitative proportions of damage after rerouting are determined according to a plurality of LOCV alarm events, respectively. After the working route is switched to the protection route, the new working route still works normally and is not damaged without any active key event, and the quantitative damage proportion of the new working route is determined to be 0%. The protection route after switching is currently used as a working route and has no secondary protection capability, so that the quantitative proportion of damage of the protection route is determined to be 100%. For the traffic path 1_xpe1_1_spe2_zhb1, the quantitative proportion of damage is determined to be 100% due to the LOS alarm event on the unique route. Finally, the qualitative result of the service impairment of the service path 1_xpe1_1_spe2 _zhb1is service interruption, the qualitative result of a traffic impairment for traffic path 1_SPE1_1_NEP2 _incidentis a traffic degradation.
TABLE 2
Figure BDA0003115682340000091
In the embodiment of the application, the service path is determined based on the pre-established resource relationship and the resource identifier contained in the information of the activity key event, so that the efficiency of searching the service path can be improved, and the efficiency of analyzing the working state of the service path is improved. And the working state of each service path is analyzed through the activity key event of each service path, so that the quantitative calculation and the qualitative calculation of the influenced degree of the service are realized, and the accuracy of analyzing the service state is improved.
It is understood that, in the above embodiments of the method, the method and the operation implemented by the network management device may also be implemented by a component (e.g., a chip or a circuit) that can be used in the network management device.
The above description mainly introduces the scheme provided by the embodiments of the present application from various interaction perspectives. It is understood that in order to implement the above functions, it includes corresponding hardware structures and/or software modules for performing the respective functions. Those of skill in the art would appreciate that the various illustrative components and algorithm steps described in connection with the embodiments disclosed herein may be implemented as hardware or combinations of hardware and computer software. Whether a function is performed as hardware or computer software drives hardware depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiment of the present application, the network management device may be divided into the functional modules according to the above method example, for example, each functional module may be divided corresponding to each function, or two or more functions may be integrated into one processing module. The integrated module can be realized in a form of hardware or a form of a software functional module. It should be noted that, in the embodiment of the present application, the division of the module is schematic, and is only one logic function division, and there may be another division manner in actual implementation. The following description will be given by taking an example in which each functional module is divided by using a corresponding function.
The method provided by the embodiment of the present application is described in detail above with reference to fig. 3. Hereinafter, a service status determination apparatus according to an embodiment of the present application is described in detail with reference to fig. 12. It should be understood that the description of the apparatus embodiment corresponds to the description of the method embodiment, and therefore, for the sake of brevity, details which are not described in detail above may be referred to the method embodiment.
Referring to fig. 12, fig. 12 is a schematic structural diagram of a service status determining apparatus according to an embodiment of the present application. The apparatus may include an acquisition module 1201 and a processing module 1202. The obtaining module 1201 can communicate with the outside, for example, receive an activity critical event reported by another device, and the processing module 1202 is configured to execute an action executed by the network management device in the foregoing method embodiment. For example, analyzing the operational status of the traffic path.
The service state determining apparatus may implement steps or processes executed by the network management device corresponding to the above method embodiment, for example, the service state determining apparatus may be a network management device, or a chip or a circuit configured in the network management device.
An obtaining module 1201, configured to obtain a first activity key event related to a service, where the first activity key event includes at least one of a key alarm event, a performance out-of-limit event, an equipment abnormal event, or a high-risk operation event;
a processing module 1202, configured to determine, based on a pre-established resource relationship and a resource identifier included in the information of the first activity key event, multiple service paths related to resource objects indicated by the resource identifier, where the resource relationship includes an association relationship between multiple resource objects on the service paths; determining a second activity key event of each service path in the plurality of service paths; and determining the working state of each service path according to the second activity key event.
Optionally, the first activity key event is a key alarm event, and the obtaining module 1201 is further configured to obtain alarm data generated by the device; determining that a key alarm event corresponding to the alarm data is contained in a key event white list according to a preset key event white list, and determining that the key alarm event corresponding to the alarm data is the first activity key event; or the first activity key event is a performance out-of-limit event, the obtaining module 1201 is further configured to obtain performance data generated by the device; determining that a performance out-of-limit event corresponding to the performance data is contained in a key event white list according to a preset key event white list, wherein the performance out-of-limit event corresponding to the performance data is a first activity key event; or the first activity key event is an equipment abnormal event, the obtaining module 1201 is further configured to obtain an equipment log generated by the equipment; determining that the device abnormal event corresponding to the device log is contained in a key event white list according to a preset key event white list, and determining that the device abnormal event corresponding to the device log is a first activity key event; or the first activity key event is a high-risk operation event, the obtaining module 1201 is further configured to obtain a user operation log of the network management system; and determining that the high-risk operation event corresponding to the user operation log is contained in the key event white list according to a preset key event white list, wherein the high-risk operation event corresponding to the user operation log is a first activity key event.
Optionally, the association relationship between the resource objects includes a relationship between a port and a link, and a relationship between a link and a link path, where the resource object indicated by the resource identifier is a physical port;
the processing module 1202 is further configured to determine a link corresponding to the physical port according to the relationship between the port and the link; and determining a service path corresponding to the link according to the relationship between the link and the link path.
Optionally, the association relationships between the multiple resource objects include a relationship between an interface and a cross, and a relationship between a cross and a link path; the resource object indicated by the resource identifier is an interface;
the processing module 1202 is further configured to determine an intersection corresponding to the interface according to a relationship between the interface and the intersection; and determining a service path corresponding to the intersection according to the relationship between the intersection and the link path.
Optionally, the association relationship between the plurality of resource objects includes a relationship between a cross and a link path; the resource object indicated by the resource identifier is a crossed interface;
the processing module 1202 is further configured to determine a service path corresponding to the crossed interface according to the relationship between the cross and the link path.
Optionally, the processing module 1202 is further configured to determine, based on the resource relationship, a resource object included in a first service path in the multiple service paths; the obtaining module 1201 is further configured to obtain an activity key event including a resource identifier of a resource object included in the first service path, as the second activity key event of the first service path.
Optionally, the processing module 1202 is further configured to determine that the working state of the first service path is a damaged state if the second activity critical event exists in at least one route on the first service path.
Optionally, the processing module 1202 is further configured to determine a first number of all routes on the first service path and a second number of routes where the second activity critical event exists; and taking the ratio of the second number to the first number as the damage quantitative proportion of the first service path.
Optionally, the processing module 1202 is further configured to determine a qualitative result of the service impairment of the first service path according to the type of the first service path and the quantitative proportion of the impairment, where the type of the service path is a working path or a protection path.
It should be noted that, the implementation of each module may also correspond to the corresponding description in the method embodiment shown in fig. 3, and execute the method and function executed by the network management device in the foregoing embodiment.
Fig. 13 is a schematic structural diagram of a network management device according to an embodiment of the present application. The network management device may be applied to a system shown in fig. 2, and execute the functions of the network management device in the foregoing method embodiment, or implement the steps or flows executed by the network management device in the foregoing method embodiment.
As shown in fig. 13, the network management apparatus includes a processor 1301 and a transceiver 1302. Optionally, the network management device further includes a memory 1303. The processor 1301, the transceiver 1302 and the memory 1303 may communicate with each other via an internal connection path to transmit control and/or data signals, the memory 1303 is used for storing a computer program, and the processor 1301 is used for calling and running the computer program from the memory 1303 to control the transceiver 1302 to transmit and receive signals. Optionally, the network management device may further include an antenna, configured to send out the uplink data or the uplink control signaling output by the transceiver 1302 through a wireless signal.
The processor 1301 and the memory 1303 may be combined into a processing device, the processor 1301 may correspond to the processing module in fig. 12, and the processor 1301 is configured to execute the program code stored in the memory 1303 to implement the above functions. In particular implementations, the memory 1303 may also be integrated into the processor 1301 or separate from the processor 1301.
The transceiver 1302 may correspond to the acquiring module in fig. 12, and may also be referred to as a transceiver unit or a transceiver module. The transceiver 1302 may include a receiver (or receiver, receiving circuit) and a transmitter (or transmitter, transmitting circuit). The receiver is used for receiving signals, and the transmitter is used for transmitting signals.
It should be understood that the network management device shown in fig. 13 can implement various processes related to the network management device in the method embodiment shown in fig. 3. The operation and/or function of each module in the network management device are respectively for realizing the corresponding flow in the above method embodiment. Reference may be made specifically to the description of the method embodiments above, and in order to avoid repetition, detailed description is omitted here where appropriate.
The processor 1301 may be configured to execute actions implemented inside the network management device described in the foregoing method embodiment, and the transceiver 1302 may be configured to execute the action of acquiring the activity critical event reported by each device described in the foregoing method embodiment. Please refer to the description of the previous embodiment of the method, which is not repeated herein.
The processor 1301 may be a central processing unit, a general purpose processor, a digital signal processor, an application specific integrated circuit, a field programmable gate array or other programmable logic device, a transistor logic device, a hardware component, or any combination thereof. Which may implement or perform the various illustrative logical blocks, modules, and circuits described in connection with the disclosure. Processor 1301 may also be a combination that performs a computing function, including, for example, one or more microprocessors, a digital signal processor, and a combination of microprocessors, among others. The communication bus 1304 may be a peripheral component interconnect standard PCI bus or an extended industry standard architecture EISA bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown in FIG. 13, but this is not intended to represent only one bus or type of bus. A communication bus 1304 is used to enable connective communication between these components. The transceiver 1302 in this embodiment is used for performing signaling or data communication with other node devices. The memory 1303 may include a volatile memory, such as a nonvolatile dynamic random access memory (NVRAM), a phase change random access memory (PRAM), a Magnetoresistive Random Access Memory (MRAM), and the like, and may further include a nonvolatile memory, such as at least one magnetic disk memory device, an electrically erasable programmable read-only memory (EEPROM), a flash memory device, such as a NOR flash memory (NOR flash memory) or a NAND flash memory (EEPROM), a semiconductor device, such as a Solid State Disk (SSD), and the like. The memory 1303 may optionally be at least one memory device located remotely from the processor 1301. The memory 1303 may optionally also store a set of computer program codes or configuration information. Alternatively, the processor 1301 may also execute a program stored in the memory 1303. The processor may cooperate with the memory and the transceiver to perform any one of the methods and functions of the network management device in the embodiments of the above application.
An embodiment of the present application further provides a chip system, where the chip system includes a processor, and is configured to support a network management device to implement the functions related to any of the foregoing embodiments, for example, to generate or process a service path related to the foregoing method. In one possible design, the system-on-chip may further include a memory for computer programs and data necessary for the network management device. The chip system may be constituted by a chip, or may include a chip and other discrete devices. The input and output of the chip system respectively correspond to the receiving and sending operations of the network management equipment in the method embodiment.
The embodiment of the application also provides a service state determining device, which comprises a processor and an interface. The processor may be adapted to perform the method of the above-described method embodiments.
It should be understood that the service status determination means may be a chip. For example, the service status determining apparatus may be a Field Programmable Gate Array (FPGA), an Application Specific Integrated Circuit (ASIC), a system on chip (SoC), a Central Processor Unit (CPU), a Network Processor (NP), a Digital Signal Processor (DSP), a Microcontroller (MCU), a programmable logic controller (PLD) or other integrated chips.
In implementation, the steps of the above method may be performed by integrated logic circuits of hardware in a processor or instructions in the form of software. The steps of a method disclosed in connection with the embodiments of the present application may be directly implemented by a hardware processor, or may be implemented by a combination of hardware and software modules in a processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in a memory, and a processor reads information in the memory and completes the steps of the method in combination with hardware of the processor. To avoid repetition, it is not described in detail here.
It should be noted that the processor in the embodiments of the present application may be an integrated circuit chip having signal processing capability. In implementation, the steps of the above method embodiments may be performed by integrated logic circuits of hardware in a processor or by instructions in the form of software. The processor described above may be a general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components. The various methods, steps, and logic blocks disclosed in the embodiments of the present application may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present application may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software modules may be located in ram, flash, rom, prom, or eprom, registers, etc. as is well known in the art. The storage medium is located in a memory, and a processor reads information in the memory and combines hardware thereof to complete the steps of the method.
According to the method provided by the embodiment of the present application, the present application further provides a computer program product, which includes: computer program, which, when run on a computer, causes the computer to perform the method of any one of the embodiments shown in fig. 3.
According to the method provided by the embodiment of the present application, the present application further provides a computer-readable medium, which stores a computer program, and when the computer program runs on a computer, the computer is caused to execute the method of any one of the embodiments shown in fig. 3.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, cause the processes or functions described in accordance with the embodiments of the application to occur, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center via wire (e.g., coaxial cable, fiber optic, digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that incorporates one or more of the available media. The usable medium may be a magnetic medium (e.g., a floppy disk, a hard disk, a magnetic tape), an optical medium (e.g., a Digital Video Disk (DVD)), or a semiconductor medium (e.g., a Solid State Disk (SSD)), among others.
Those of ordinary skill in the art will appreciate that the various illustrative logical blocks and steps (step) described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network management device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a read-only memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (22)

1. A method for determining a service status, comprising:
acquiring a first activity key event related to a service, wherein the first activity key event comprises at least one of a key alarm event, a performance out-of-limit event, an equipment abnormal event or a high-risk operation event;
determining a plurality of service paths related to resource objects indicated by the resource identifiers based on a pre-established resource relationship and the resource identifiers contained in the information of the first activity key event, wherein the resource relationship comprises an incidence relationship among the plurality of resource objects on the service paths;
determining a second activity critical event of each of the plurality of traffic paths;
and determining the working state of each service path according to the second activity key event.
2. The method of claim 1,
the first activity key event is a key alarm event, and the acquiring the first activity key event related to the service comprises: acquiring alarm data generated by equipment; determining that a key alarm event corresponding to the alarm data is contained in a key event white list according to a preset key event white list, wherein the key alarm event corresponding to the alarm data is the first activity key event; or
The first activity key event is a performance out-of-limit event, and the acquiring the first activity key event related to the service comprises: acquiring performance data generated by equipment; determining that a performance out-of-limit event corresponding to the performance data is contained in a key event white list according to a preset key event white list, wherein the performance out-of-limit event corresponding to the performance data is a first activity key event; or
The first activity key event is an equipment abnormal event, and the acquiring the first activity key event related to the service comprises the following steps: acquiring a device log generated by a device; determining that the device abnormal event corresponding to the device log is contained in a preset key event white list according to the preset key event white list, and determining that the device abnormal event corresponding to the device log is a first activity key event; or
The first activity key event is a high-risk operation event, and the acquiring the first activity key event related to the service comprises the following steps: acquiring a user operation log of a network management system; and determining that the high-risk operation event corresponding to the user operation log is contained in the key event white list according to a preset key event white list, wherein the high-risk operation event corresponding to the user operation log is a first activity key event.
3. The method according to claim 1 or 2, wherein the association relationship between the plurality of resource objects comprises a relationship between a port and a link and a relationship between a link and a link path, and the resource object indicated by the resource identifier is a physical port;
the determining, based on the pre-established resource relationship and the resource identifier included in the first activity key event, a service path related to the resource object indicated by the resource identifier includes:
determining a link corresponding to the physical port according to the relationship between the port and the link;
and determining a service path corresponding to the link according to the relationship between the link and the link path.
4. The method of claim 1 or 2, wherein the associative relationships between the plurality of resource objects include an interface to cross relationship and a cross to link path relationship; the resource object indicated by the resource identifier is an interface;
the determining, based on the pre-established resource relationship and the resource identifier included in the first activity key event, a service path related to the resource object indicated by the resource identifier includes:
determining the intersection corresponding to the interface according to the relationship between the interface and the intersection;
and determining a service path corresponding to the intersection according to the relationship between the intersection and the link path.
5. The method of claim 1 or 2, wherein the associative relationship between the plurality of resource objects comprises a cross-over and link path relationship; the resource object indicated by the resource identifier is a crossed interface;
the determining, based on the pre-established resource relationship and the resource identifier included in the first activity key event, a service path related to the resource object indicated by the resource identifier includes:
and determining a service path corresponding to the crossed interface according to the relation between the crossed interface and the link path.
6. The method of any of claims 1-5, wherein the determining the second activity critical event for each of the plurality of traffic paths comprises:
determining a resource object contained in a first business path in a plurality of business paths based on the resource relation;
and acquiring an activity key event containing a resource identifier of a resource object contained in the first service path as the second activity key event of the first service path.
7. The method of claim 6, wherein said determining the operational status of the traffic paths based on the second activity critical event comprises:
and if the second activity critical event exists in at least one route on the first service path, determining that the working state of the first service path is a damaged state.
8. The method of claim 7, wherein the method further comprises:
determining a first number of all routes on the first traffic path and a second number of routes for which the second activity critical event exists;
and taking the ratio of the second number to the first number as the damage quantitative proportion of the first service path.
9. The method of claim 8, wherein the method further comprises:
and determining a service damage qualitative result of the first service path according to the type of the first service path and the damage quantitative proportion, wherein the type of the service path is a working path or a protection path.
10. A traffic state determination apparatus, comprising:
the system comprises an acquisition module, a processing module and a processing module, wherein the acquisition module is used for acquiring a first activity key event related to a service, and the first activity key event comprises at least one of a key alarm event, a performance out-of-limit event, an equipment abnormal event or a high-risk operation event;
the processing module is used for determining a plurality of service paths related to the resource objects indicated by the resource identifiers based on the pre-established resource relationships and the resource identifiers contained in the information of the first activity key events, wherein the resource relationships comprise incidence relationships among the plurality of resource objects on the service paths; determining a second activity critical event of each of the plurality of traffic paths; and determining the working state of each service path according to the second activity key event.
11. The apparatus of claim 10,
the first activity key event is a key alarm event, and the acquisition module is further used for acquiring alarm data generated by equipment; determining that a key alarm event corresponding to the alarm data is contained in a key event white list according to a preset key event white list, wherein the key alarm event corresponding to the alarm data is the first activity key event; or
The first activity key event is a performance out-of-limit event, and the acquisition module is further used for acquiring performance data generated by equipment; determining that a performance out-of-limit event corresponding to the performance data is contained in a key event white list according to a preset key event white list, wherein the performance out-of-limit event corresponding to the performance data is a first activity key event; or
The first activity key event is an equipment abnormal event, and the acquisition module is further used for acquiring an equipment log generated by equipment; determining that the device abnormal event corresponding to the device log is contained in a preset key event white list according to the preset key event white list, and determining that the device abnormal event corresponding to the device log is a first activity key event; or
The first activity key event is a high-risk operation event, and the acquisition module is further used for acquiring a user operation log of the network management system; and determining that the high-risk operation event corresponding to the user operation log is contained in the key event white list according to a preset key event white list, wherein the high-risk operation event corresponding to the user operation log is a first activity key event.
12. The apparatus according to claim 10 or 11, wherein the association relationship between the plurality of resource objects includes a relationship between a port and a link, and a relationship between a link and a link path, and the resource object indicated by the resource identifier is a physical port;
the processing module is further configured to determine a link corresponding to the physical port according to the relationship between the port and the link; and determining a service path corresponding to the link according to the relationship between the link and the link path.
13. The apparatus of claim 10 or 11, wherein the associative relationships between the plurality of resource objects include an interface to cross relationship, and a cross to link path relationship; the resource object indicated by the resource identifier is an interface;
the processing module is further configured to determine an intersection corresponding to the interface according to a relationship between the interface and the intersection; and determining a service path corresponding to the intersection according to the relationship between the intersection and the link path.
14. The apparatus of claim 10 or 11, wherein the associative relationship between the plurality of resource objects comprises a cross-over and link path relationship; the resource object indicated by the resource identifier is a crossed interface;
and the processing module is further used for determining a service path corresponding to the crossed interface according to the relation between the cross and the link path.
15. The apparatus of any one of claims 10-14,
the processing module is further configured to determine, based on the resource relationship, a resource object included in a first service path of the plurality of service paths;
the obtaining module is further configured to obtain an activity key event that includes a resource identifier of a resource object included in the first service path, as the second activity key event of the first service path.
16. The apparatus of claim 15,
the processing module is further configured to determine that the working state of the first service path is a damaged state if the second activity critical event exists in at least one route on the first service path.
17. The apparatus of claim 16,
the processing module is further configured to determine a first number of all routes on the first traffic path and a second number of routes where the second activity critical event exists; and taking the ratio of the second number to the first number as the damage quantitative proportion of the first traffic path.
18. The apparatus of claim 17,
the processing module is further configured to determine a qualitative result of the service damage of the first service path according to the type of the first service path and the quantitative proportion of the damage, where the type of the service path is a working path or a protection path.
19. A traffic state determination apparatus comprising a processor and a memory, the memory being configured to store a computer program, the processor being configured to execute the computer program to cause the apparatus to perform the method of any of claims 1 to 9.
20. A chip, characterized in that the chip is a chip within a traffic status determination device, the chip comprising a processor and an input interface and an output interface connected to the processor, the chip further comprising a memory, wherein the method of any of claims 1 to 9 is performed when a computer program is executed in the memory.
21. A computer-readable storage medium for storing a computer program which, when run on a computer, causes the computer to perform the method of any one of claims 1 to 9.
22. A computer program product, characterized in that it comprises a computer program which, when run on a computer, causes the computer to carry out the method of any one of claims 1 to 9.
CN202110662559.0A 2021-06-15 2021-06-15 Service state determination method and device Pending CN115484629A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110662559.0A CN115484629A (en) 2021-06-15 2021-06-15 Service state determination method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110662559.0A CN115484629A (en) 2021-06-15 2021-06-15 Service state determination method and device

Publications (1)

Publication Number Publication Date
CN115484629A true CN115484629A (en) 2022-12-16

Family

ID=84419637

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110662559.0A Pending CN115484629A (en) 2021-06-15 2021-06-15 Service state determination method and device

Country Status (1)

Country Link
CN (1) CN115484629A (en)

Similar Documents

Publication Publication Date Title
CN110493042B (en) Fault diagnosis method and device and server
US20200106662A1 (en) Systems and methods for managing network health
CN109495322B (en) Network fault positioning method, related equipment and computer storage medium
US9503228B2 (en) Systems and methods to detect, diagnose, and mitigate issues in multi-layer networks
CN109964450B (en) Method and device for determining shared risk link group
CN103370904A (en) Method for determining a severity of a network incident
US20110141914A1 (en) Systems and Methods for Providing Ethernet Service Circuit Management
CN111600759B (en) Method and device for positioning deadlock fault in topological structure
US20100287403A1 (en) Method and Apparatus for Determining Availability in a Network
CN111565133B (en) Private line switching method and device, electronic equipment and computer readable storage medium
CN114338367A (en) Fault positioning method and device and computer storage medium
CN110071843B (en) Fault positioning method and device based on flow path analysis
CN115038088A (en) Intelligent network security detection early warning system and method
CN109962801B (en) Communication quality abnormity positioning method, device, equipment and medium
US8897167B2 (en) Diversity monitoring for communication network circuits
CN116760655B (en) POP point method for providing CPE optimal access in SD-WAN application
CN115484629A (en) Service state determination method and device
CN110609761A (en) Method and device for determining fault source, storage medium and electronic equipment
JP2017199250A (en) Computer system, analysis method of data, and computer
CN113660677B (en) Maximum error independent path calculation method of weighted time-varying network under consumption limit
US10432451B2 (en) Systems and methods for managing network health
CN114448774A (en) Alarm processing method, device and storage medium
CN108141406A (en) A kind of method, apparatus and equipment of traffic failure processing
CN107104837A (en) The method and control device of path detection
CN115733726A (en) Network group fault determination method and device, storage medium and electronic device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination