CN116800588B - Network optimization method and device for network communication product - Google Patents
Network optimization method and device for network communication product Download PDFInfo
- Publication number
- CN116800588B CN116800588B CN202311089689.5A CN202311089689A CN116800588B CN 116800588 B CN116800588 B CN 116800588B CN 202311089689 A CN202311089689 A CN 202311089689A CN 116800588 B CN116800588 B CN 116800588B
- Authority
- CN
- China
- Prior art keywords
- network
- optimization
- information
- generating
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000005457 optimization Methods 0.000 title claims abstract description 225
- 238000000034 method Methods 0.000 title claims abstract description 66
- 238000004891 communication Methods 0.000 title claims description 15
- 238000003745 diagnosis Methods 0.000 claims abstract description 41
- 238000001514 detection method Methods 0.000 claims abstract description 27
- 238000012544 monitoring process Methods 0.000 claims description 43
- 230000008569 process Effects 0.000 claims description 25
- 230000002159 abnormal effect Effects 0.000 claims description 13
- 238000012545 processing Methods 0.000 claims description 13
- 230000005540 biological transmission Effects 0.000 claims description 10
- 238000004590 computer program Methods 0.000 claims description 10
- 230000006399 behavior Effects 0.000 claims description 8
- 230000005856 abnormality Effects 0.000 claims description 5
- 238000011217 control strategy Methods 0.000 claims description 3
- 230000003068 static effect Effects 0.000 claims description 3
- 230000000694 effects Effects 0.000 abstract description 10
- 230000006870 function Effects 0.000 description 5
- 238000012360 testing method Methods 0.000 description 4
- 239000008186 active pharmaceutical agent Substances 0.000 description 3
- 238000004458 analytical method Methods 0.000 description 2
- 238000003491 array Methods 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 238000007405 data analysis Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 239000000463 material Substances 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 206010000117 Abnormal behaviour Diseases 0.000 description 1
- 238000012896 Statistical algorithm Methods 0.000 description 1
- 230000001133 acceleration Effects 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004422 calculation algorithm Methods 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- ZPUCINDJVBIVPJ-LJISPDSOSA-N cocaine Chemical compound O([C@H]1C[C@@H]2CC[C@@H](N2C)[C@H]1C(=O)OC)C(=O)C1=CC=CC=C1 ZPUCINDJVBIVPJ-LJISPDSOSA-N 0.000 description 1
- 239000003623 enhancer Substances 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012806 monitoring device Methods 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 238000007619 statistical method Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/0631—Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
- H04L41/0823—Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0894—Policy-based network configuration management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/06—Generation of reports
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The method generates a network data acquisition strategy according to user setting, wherein the network data acquisition strategy comprises data acquisition frequency, data object information acquisition and data type acquisition; after receiving the network data acquisition instruction, acquiring the operation data of the target network according to a network data acquisition strategy; generating a network diagnosis report according to a preset fault detection strategy based on the operation data of the target network; generating a network optimization scheme according to the network fault information, wherein the network optimization scheme comprises optimization object information, optimization means information, optimization condition information and optimization result judging information; the target network is optimized according to the network optimization scheme, so that the problems that the manual network optimization efficiency is low and the optimization effect cannot be guaranteed in the prior art are solved.
Description
Technical Field
The invention relates to the technical field of network optimization of network products, in particular to a network optimization method and device of network products.
Background
In the related technology, network optimization of the network communication products is usually completed by professionals according to experience, network conditions are changed in many ways, the optimization effect is different due to the level difference of technicians, manpower is wasted, and the optimization effect is difficult to guarantee.
Disclosure of Invention
The invention aims to solve the technical problems that the manual network optimization efficiency is low and the optimization effect cannot be ensured in the prior art, and provides a network optimization method and device for a network communication product.
In order to solve the technical problems, the embodiment of the invention at least provides a network optimization method and device for a network-through product.
In a first aspect, an embodiment of the present disclosure provides a network optimization method for a network-through product, including:
generating a network data acquisition strategy according to user setting, wherein the network data acquisition strategy comprises data acquisition frequency, data object information acquisition and data acquisition types;
after receiving a network data acquisition instruction, acquiring operation data of a target network according to the network data acquisition strategy;
generating a network diagnosis report according to a preset fault detection strategy based on the operation data of the target network;
if network fault information exists in the network diagnosis report, generating a network optimization scheme according to the network fault information, wherein the network optimization scheme comprises optimization object information, optimization means information, optimization condition information and optimization result judging information;
optimizing the target network according to the network optimization scheme;
generating a network optimization report, wherein the network optimization report comprises the optimization object information, the optimization means information, the optimization condition information and the optimization result information.
Optionally, the network data acquisition policy further comprises an acquisition data object path.
Optionally, the data object obtaining path is http+mqtt, and the obtaining the operation data of the target network according to the network data obtaining policy includes: and acquiring the operation data of the target network through HTTP+MQTT.
Optionally, generating the network diagnosis report according to the preset fault detection policy based on the operation data of the target network includes: calculating a diagnostic value of the relevant operation index based on the operation data of the target network; and acquiring network fault information related to the diagnosis value from a preset fault diagnosis table.
Optionally, the method further comprises: generating a network monitoring strategy according to the network diagnosis report, wherein the network monitoring strategy comprises monitoring object information, monitoring index information and abnormal processing mode information; monitoring a target network object in real time according to the network monitoring strategy; and when the occurrence of network abnormality is monitored, generating a network monitoring report.
Optionally, the method further comprises: using Java API or third party library to detect and analyze the data flow of the target network and judging whether the intrusion behavior exists; if the intrusion behavior exists, an intrusion account number or an IP address is acquired; the intrusion account number or the IP address is listed in a blacklist; acquiring abnormal network data related to the intrusion account number or the IP address; and generating an intrusion detection report according to the abnormal network data.
Optionally, the method further comprises: generating a network optimization log, the network optimization log recording a network optimization process, a network optimization result, the network optimization report, the network monitoring report, and the intrusion detection report.
In a second aspect, an embodiment of the present disclosure provides a network optimization device for a network-through product, including:
the network data acquisition strategy generation module is used for generating a network data acquisition strategy according to user setting, wherein the network data acquisition strategy comprises data acquisition frequency, data object information acquisition and data acquisition types;
the operation data acquisition module is used for acquiring the operation data of the target network according to the network data acquisition strategy after receiving the network data acquisition instruction;
the network diagnosis report generation module is used for generating a network diagnosis report according to a preset fault detection strategy based on the operation data of the target network;
the network optimization scheme generation module is used for generating a network optimization scheme according to the network fault information if the network fault information exists in the network diagnosis report, wherein the network optimization scheme comprises optimization object information, optimization means information, optimization condition information and optimization result judging information;
the optimization execution module is used for optimizing the target network according to the network optimization scheme by a user;
the network optimization report generation module is used for generating a network optimization report, and the network optimization report comprises the optimization object information, the optimization means information, the optimization condition information and the optimization result information.
In a third aspect, the disclosed embodiments of the invention also provide a computer device comprising: a processor, a memory and a bus, the memory storing machine-readable instructions executable by the processor, the processor and the memory in communication via the bus when the computer device is running, the machine-readable instructions when executed by the processor performing the steps of the first aspect, or any of the possible implementations of the first aspect.
In a fourth aspect, the disclosed embodiments also provide a computer readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of the first aspect, or any of the possible implementation manners of the first aspect.
The technical scheme provided by the embodiment of the invention has the following beneficial effects:
generating a network data acquisition strategy according to user setting, and acquiring operation data of a target network according to the network data acquisition strategy after receiving a network data acquisition instruction; generating a network diagnosis report according to a preset fault detection strategy based on the operation data of the target network; if the network fault information exists in the network diagnosis report, generating a network optimization scheme according to the network fault information, and optimizing the target network according to the network optimization scheme; generating a network optimization report, automatically completing the network optimization process without manual participation, greatly improving the efficiency of network optimization, saving the cost and effectively ensuring the optimization effect.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings that are needed in the description of the embodiments or the prior art will be briefly described, and it is obvious that the drawings in the description below are some embodiments of the present invention, and other drawings can be obtained according to the drawings without inventive effort for a person skilled in the art.
Fig. 1 shows a flowchart of a network optimization method of a network-through product according to an embodiment of the present disclosure;
FIG. 2 is a flow chart of another method for optimizing a network of a network-through product according to an embodiment of the present disclosure;
fig. 3 is a functional block diagram of a network optimization device for a network-through product according to an embodiment of the present disclosure;
fig. 4 shows a schematic structural diagram of a computer device according to an embodiment of the disclosure.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the invention. Rather, they are merely examples of apparatus and methods consistent with aspects of the invention as detailed in the accompanying summary.
Example 1
As shown in fig. 1, a flowchart of a network optimization method for a network-through product according to an embodiment of the present disclosure includes:
s11: according to the user setting, generating a network data acquisition strategy, wherein the network data acquisition strategy comprises data acquisition frequency, data object information acquisition and data acquisition types.
S12: and after receiving the network data acquisition instruction, acquiring the operation data of the target network according to the network data acquisition strategy.
S13: and generating a network diagnosis report according to a preset fault detection strategy based on the operation data of the target network.
S14: if the network fault information exists in the network diagnosis report, generating a network optimization scheme according to the network fault information, wherein the network optimization scheme comprises optimization object information, optimization means information, optimization condition information and optimization result judging information.
S15: and optimizing the target network according to the network optimization scheme.
S16: generating a network optimization report, wherein the network optimization report comprises optimization object information, optimization means information, optimization condition information and optimization result information.
It can be understood that, according to the technical scheme provided by the embodiment, a network data acquisition strategy is generated according to user setting, and after a network data acquisition instruction is received, the operation data of the target network is acquired according to the network data acquisition strategy; generating a network diagnosis report according to a preset fault detection strategy based on the operation data of the target network; if the network fault information exists in the network diagnosis report, generating a network optimization scheme according to the network fault information, and optimizing the target network according to the network optimization scheme; generating a network optimization report, automatically completing the network optimization process without manual participation, greatly improving the efficiency of network optimization, saving the cost and effectively ensuring the optimization effect.
Example 2
As shown in fig. 2, another flowchart of a network optimization method for a network-through product according to an embodiment of the present disclosure includes:
s201: according to the user setting, generating a network data acquisition strategy, wherein the network data acquisition strategy comprises data acquisition frequency, data object information acquisition, data type acquisition and data object acquisition approaches.
Specifically, in some alternative embodiments, the data object obtaining way is http+mqtt, and the operation data of the target network is obtained through http+mqtt.
S202: and after receiving the network data acquisition instruction, acquiring the operation data of the target network according to the network data acquisition strategy.
S203: and generating a network diagnosis report according to a preset fault detection strategy based on the operation data of the target network.
S204: if the network fault information exists in the network diagnosis report, generating a network optimization scheme according to the network fault information, wherein the network optimization scheme comprises optimization object information, optimization means information, optimization condition information and optimization result judging information.
S205: and optimizing the target network according to the network optimization scheme.
S206: generating a network optimization report, wherein the network optimization report comprises optimization object information, optimization means information, optimization condition information and optimization result information.
S207: and generating a network monitoring strategy according to the network diagnosis report, wherein the network monitoring strategy comprises monitoring object information, monitoring index information and abnormal processing mode information.
S208: and monitoring the target network object in real time according to the network monitoring strategy.
S209: and when the occurrence of network abnormality is monitored, generating a network monitoring report.
S210: and detecting and analyzing the data traffic of the target network by using Java API or a third party library, and judging whether the intrusion behavior exists.
S211: if the intrusion behavior exists, an intrusion account number or an IP address is acquired.
S212: the intrusion account number or IP address is blacklisted.
S213: abnormal network data related to the intrusion account number or the IP address is acquired.
S214: and generating an intrusion detection report according to the abnormal network data.
S215: generating a network optimization log, wherein the network optimization log records a network optimization process, a network optimization result, a network optimization report, a network monitoring report and an intrusion detection report.
In some alternative embodiments, S203 may be implemented (not shown in the figures) by, but not limited to, the following processes:
s2031: based on the operational data of the target network, a diagnostic value of the relevant operational index is calculated.
S2032: and acquiring network fault information related to the diagnosis value from a preset fault diagnosis table.
Besides the preset fault diagnosis table, the real-time network data and the network optimization scheme can be combined to realize real-time feedback and self-adaptive optimization, and the optimization strategy is dynamically adjusted according to the change of the network state and the feedback of the real-time data, so that the flexibility and the innovation of the scheme are improved.
It can be understood that, according to the technical scheme provided by the embodiment, a network data acquisition strategy is generated according to user setting, and after a network data acquisition instruction is received, the operation data of the target network is acquired according to the network data acquisition strategy; generating a network diagnosis report according to a preset fault detection strategy based on the operation data of the target network; if the network fault information exists in the network diagnosis report, generating a network optimization scheme according to the network fault information, and optimizing the target network according to the network optimization scheme; generating a network optimization report, automatically completing the network optimization process without manual participation, greatly improving the efficiency of network optimization, saving the cost and effectively ensuring the optimization effect.
Example 3
As shown in fig. 3, the embodiment of the present invention further provides a network optimization device for a network-through product, where the device includes:
the network data acquisition policy generating module 31 is configured to generate a network data acquisition policy according to a user setting, where the network data acquisition policy includes an acquisition data frequency, acquisition data object information, and an acquisition data type.
The operation data acquisition module 32 is configured to acquire operation data of the target network according to the network data acquisition policy after receiving the network data acquisition instruction.
The network diagnostic report generating module 33 is configured to generate a network diagnostic report according to a preset fault detection policy based on the operation data of the target network.
The network optimization scheme generating module 34 is configured to generate a network optimization scheme according to the network failure information if the network failure information exists in the network diagnosis report, where the network optimization scheme includes optimization object information, optimization means information, optimization condition information, and optimization result determination information.
And an optimization execution module 35, wherein the user optimizes the target network according to the network optimization scheme.
A network optimization report generation module 36 for generating a network optimization report including optimization object information, optimization means information, optimization condition information, and optimization result information.
In some alternative embodiments, the network data acquisition policy further includes an acquire data object path, the acquire data object path being http+mqtt, and the run data acquisition module 32 acquiring the run data of the target network according to the network data acquisition policy includes: the operation data acquisition module 32 acquires operation data of the target network through http+mqtt.
In some alternative embodiments, the network diagnostic report generation module 33 includes:
the diagnostic value calculation sub-module 331 is configured to calculate a diagnostic value of the relevant operation index based on the operation data of the target network.
The fault information obtaining sub-module 332 is configured to obtain network fault information related to the diagnostic value from a preset fault diagnosis table.
In some alternative embodiments, the apparatus further comprises:
the network monitoring module 37 is configured to generate a network monitoring policy according to the network diagnostic report, where the network monitoring policy includes monitoring object information, monitoring index information, and abnormal processing mode information; real-time monitoring is carried out on the target network object according to the network monitoring strategy; and when the occurrence of network abnormality is monitored, generating a network monitoring report.
In some alternative embodiments, the apparatus further comprises:
an intrusion detection module 38, configured to detect and analyze data traffic of the target network using a Java API or a third party library, and determine whether an intrusion behavior exists; if the intrusion behavior exists, an intrusion account number or an IP address is acquired; the intrusion account or the IP address is listed in a blacklist; acquiring abnormal network data related to an intrusion account or an IP address; and generating an intrusion detection report according to the abnormal network data.
In some alternative embodiments, the apparatus further comprises:
the log recording module 39 is configured to generate a network optimization log, where the network optimization log records a network optimization process, a network optimization result, a network optimization report, a network monitoring report, and an intrusion detection report.
It can be understood that, according to the technical scheme provided by the embodiment, a network data acquisition strategy is generated according to user setting, and after a network data acquisition instruction is received, the operation data of the target network is acquired according to the network data acquisition strategy; generating a network diagnosis report according to a preset fault detection strategy based on the operation data of the target network; if the network fault information exists in the network diagnosis report, generating a network optimization scheme according to the network fault information, and optimizing the target network according to the network optimization scheme; generating a network optimization report, automatically completing the network optimization process without manual participation, greatly improving the efficiency of network optimization, saving the cost and effectively ensuring the optimization effect.
Example 4
Based on the same technical concept, the embodiment of the application further provides a computer device, which comprises a memory 1 and a processor 2, as shown in fig. 4, the memory 1 stores a computer program, and the processor 2 implements the network optimization method of any one of the above network products when executing the computer program.
The memory 1 includes at least one type of readable storage medium including flash memory, a hard disk, a multimedia card, a card type memory (e.g., SD or DX memory, etc.), a magnetic memory, a magnetic disk, an optical disk, etc. The memory 1 may in some embodiments be an internal storage unit of a network optimization system of a network-wide product, such as a hard disk. The memory 1 may in other embodiments also be an external storage device of a network optimization system of a network product, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash Card (Flash Card) or the like. Further, the memory 1 may also comprise both an internal memory unit and an external memory device of the network optimization system of the network-wide product. The memory 1 may be used not only for storing application software installed in the network optimization system of the network communication product and various types of data, such as codes of the network optimization program of the network communication product, but also for temporarily storing data that has been output or is to be output.
The processor 2 may in some embodiments be a central processing unit (Central Processing Unit, CPU), controller, microcontroller, microprocessor or other data processing chip for running program code or processing data stored in the memory 1, e.g. executing a network optimization program of a network pass product, etc.
It can be understood that, according to the technical scheme provided by the embodiment, a network data acquisition strategy is generated according to user setting, and after a network data acquisition instruction is received, the operation data of the target network is acquired according to the network data acquisition strategy; generating a network diagnosis report according to a preset fault detection strategy based on the operation data of the target network; if the network fault information exists in the network diagnosis report, generating a network optimization scheme according to the network fault information, and optimizing the target network according to the network optimization scheme; generating a network optimization report, automatically completing the network optimization process without manual participation, greatly improving the efficiency of network optimization, saving the cost and effectively ensuring the optimization effect.
In order to facilitate the reader to understand the technical scheme of the embodiment of the invention, the technical details in the scheme are described in detail below through specific examples.
1. Information is collected, first, information about the netcom product needs to be collected. This includes information on network connection type, bandwidth speed, delay, etc. In addition, it should be appreciated that the user uses a scene such as a game, video, office, etc.
2. Analyzing the data, and according to the collected information, performing data analysis to find out factors possibly affecting the network performance. For example, if a user uses a Wi-Fi connection, both signal strength and interference may affect network quality. Network card drivers may also affect network speed and stability if the user uses a wired connection.
3. And optimizing configuration, namely optimizing configuration of the network communication product based on the data analysis result. E.g., turn on QoS (quality of service) functions, limit bandwidth usage for certain applications, optimize DNS server settings, etc.
4. Testing performance, and after the optimization configuration is completed, performance testing is required to ensure that the network quality is improved. An online velocimeter or specific network test software may be used to test the bandwidth, delay, packet loss rate, etc. indicators.
5. Automated optimization, to achieve one-touch optimization, the above process can be automated and a simple and easy-to-use interface is provided. The user only needs to press the optimizing button, and the system automatically collects data.
The technical scheme of one-key optimization of the network communication product refers to automatic optimization aiming at the network communication product. The scheme can rapidly and accurately diagnose the network problem, provides a one-key optimization scheme, helps users to easily solve network faults, and improves the network use efficiency.
The implementation of the technical scheme comprises the following steps:
1. network conditions are automatically detected. By comprehensively scanning the network, parameters such as network speed, bandwidth, delay, packet loss rate and the like are detected, and whether the network has a problem is determined.
Defining a timing task, checking the performances of a target host and network equipment once at regular intervals, sending a request to a web end by using HTTP+MQTT (HTTP+MQTT, a communication mode for transmitting messages, and transmitting the messages to the equipment by the web through MQTT) to acquire network performance data of the target host, analyzing and judging whether network faults exist, and specifically realizing that the network faults are matched with a defined rule table through calculated values, wherein the message queue telemetry transmission is provided with the rule table.
2. And automatically diagnosing network faults. By using advanced algorithm and model, network faults such as network congestion, too high delay, too high packet loss rate and the like are automatically analyzed and diagnosed.
And monitoring whether the target host is online or not, and acquiring network performance data of the target host. By the above step, data are analyzed, for example: less than one peak in the upload time, a network is defined to be slower. The device configuration and the cloud configuration are compared. If the detected configuration is different, a channel of the fault information monitoring device is generated, if a plurality of Wi-Fi networks use the same channel at the same time, interference can be caused, so that network performance is affected, the rssi signal strength of the device is weak, and signal increase and decrease or step-down is suggested. Cpu is high, which kills useless processes and matches the rule fault table if the conditions are not satisfied.
3. One-touch optimization of network settings. According to the diagnosis result, analyzing the cause and possible solutions of the network faults, automatically adjusting network configuration, strategy, parameters and the like according to the analysis result to optimize the network performance and stability, and automatically generating a one-key optimization scheme, thereby providing a simple and easily understood optimization mode with simple and convenient operation for users to achieve the optimal network performance.
For example:
if the rssi signal strength is present, a reminder is generated to the user.
Long-time online, resulting in excessive device temperatures, generating restarts and killing unnecessary processes.
The firmware version is too low, and the user is reminded of firmware upgrade.
According to the optimization rule table, the execution sequence is given, the unnecessary processes are killed after upgrading is performed, then after upgrading is completed, a prompt is given to firmware, and the reason that signals are low is possibly led.
Caching technology: the use of caching techniques to store static resources or frequently accessed data locally reduces requests to the server. This can increase the response speed and reduce the network load.
Load balancing: network traffic is distributed across multiple servers to balance the load of the servers. Load balancing may improve throughput and processing capacity of the network.
Delay optimization: various techniques are employed to reduce network latency, such as using a Content Delivery Network (CDN), optimizing DNS lookup, using caching, etc.
Data transmission optimization: techniques are used to improve the efficiency of data transmission, such as using transport layer protocol optimization (e.g., TCP acceleration), using reliability UDP (User Datagram Protocol), etc.
Flow control and congestion control: by implementing flow control and congestion control strategies, stability and fairness of network transmission are ensured, and network congestion is avoided.
Upgrading firmware: checking whether the firmware version of the device is too low, if so, generating a prompt for firmware upgrade to a user, and guiding the user to perform firmware upgrade operation.
Killing unnecessary processes: during a firmware upgrade, the online time of the device is detected. If the device is online for a long time, the temperature of the device is too high, and a reminder for restarting and killing unnecessary processes is generated to a user. This may help to reduce the temperature of the device and improve performance.
Reminding the user of signal strength: after the firmware upgrade is completed, a reminder of low signal strength is generated to the user according to the RSSI signal strength detection of the device, so that the user can realize the reason of low signal and take corresponding measures, such as adjusting the position of the device or adding a signal enhancer.
According to the execution sequence of the optimization rule table, firstly, firmware upgrading is carried out, then, the operation of killing unnecessary processes is carried out, and finally, after the firmware upgrading is finished, a user is reminded that the signal intensity is lower. This allows a gradual optimization of the performance and user experience of the device.
4. And monitoring the network quality in real time. After network optimization, network quality change is monitored in real time, an optimization scheme is adjusted in time, network operation stability is guaranteed, whether new configuration is effective or not is tested, feedback data are collected for statistical analysis, and algorithms and models are continuously optimized according to test results and the feedback data, so that accuracy and effect of automatic optimization are improved.
After the scheme of one-key optimization is executed, the faults of the processing problems are counted, compared with the faults before the optimization, and whether the faults are optimized or not is judged. If the processing is not finished, the rule table is recorded, the optimization cannot process the problem, and the operation and maintenance personnel can be informed of details through mail.
5. Providing network security protection. Besides optimizing network performance, the technical scheme can also provide network security protection functions, including firewall, intrusion detection and the like.
5.1 Firewall wall
5.1.1 Using the Java Socket API, the network packet is read and analyzed to determine if access to the packet should be disabled. And the record is recorded in a gateway information table, and the subsequent record can be directly used for hundreds of siblings.
5.1.2A network connection is established by using Java NIO API, and data traffic is monitored and filtered, if malicious attack data exists, the IP is directly blackened.
5.2 intrusion detection
5.2.1 The Java Socket API is used for capturing and analyzing the network data packet to determine whether abnormal behaviors exist.
5.2.2 Network data traffic is detected and analyzed using Java APIs or third party libraries, such as Snort, etc., to detect if intrusion is present.
6. The process and results of network optimization are recorded for subsequent analysis and traceability.
7. And (3) notification: after the network fails or the automatic optimization is completed, an administrator or a user is timely notified to ensure the availability and the stability of the network.
The disclosed embodiments also provide a computer readable storage medium having a computer program stored thereon, which when executed by a processor performs the steps of the network optimization method of the network-through product in the above method embodiments. Wherein the storage medium may be a volatile or nonvolatile computer readable storage medium.
The computer program product of the network optimization method of the network communication product provided by the embodiment of the invention comprises a computer readable storage medium storing program codes, and the instructions included in the program codes can be used for executing the steps of the network optimization method of the network communication product in the embodiment of the method, and the embodiment of the method can be referred to specifically, and the details are not repeated here.
The disclosed embodiments also provide a computer program which, when executed by a processor, implements any of the methods of the previous embodiments. The computer program product may be realized in particular by means of hardware, software or a combination thereof. In an alternative embodiment, the computer program product is embodied as a computer storage medium, and in another alternative embodiment, the computer program product is embodied as a software product, such as a software development kit (Software Development Kit, SDK), or the like.
It is to be understood that the same or similar parts in the above embodiments may be referred to each other, and that in some embodiments, the same or similar parts in other embodiments may be referred to.
It should be noted that in the description of the present invention, the terms "first," "second," and the like are used for descriptive purposes only and are not to be construed as indicating or implying relative importance. Furthermore, in the description of the present invention, unless otherwise indicated, the meaning of "plurality" means at least two.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, and further implementations are included within the scope of the preferred embodiment of the present invention in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present invention.
It is to be understood that portions of the present invention may be implemented in hardware, software, firmware, or a combination thereof. In the above-described embodiments, the various steps or methods may be implemented in software or firmware stored in a memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, may be implemented using any one or combination of the following techniques, as is well known in the art: discrete logic circuits having logic gates for implementing logic functions on data signals, application specific integrated circuits having suitable combinational logic gates, programmable Gate Arrays (PGAs), field Programmable Gate Arrays (FPGAs), and the like.
Those of ordinary skill in the art will appreciate that all or a portion of the steps carried out in the method of the above-described embodiments may be implemented by a program to instruct related hardware, where the program may be stored in a computer readable storage medium, and where the program, when executed, includes one or a combination of the steps of the method embodiments.
In addition, each functional unit in the embodiments of the present invention may be integrated in one processing module, or each unit may exist alone physically, or two or more units may be integrated in one module. The integrated modules may be implemented in hardware or in software functional modules. The integrated modules may also be stored in a computer readable storage medium if implemented in the form of software functional modules and sold or used as a stand-alone product.
The above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, or the like.
In the description of the present specification, a description referring to terms "one embodiment," "some embodiments," "examples," "specific examples," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the present invention. In this specification, schematic representations of the above terms do not necessarily refer to the same embodiments or examples. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
While embodiments of the present invention have been shown and described above, it will be understood that the above embodiments are illustrative and not to be construed as limiting the invention, and that variations, modifications, alternatives and variations may be made to the above embodiments by one of ordinary skill in the art within the scope of the invention.
Claims (9)
1. A network optimization method for a network-through product, comprising:
generating a network data acquisition strategy according to user setting, wherein the network data acquisition strategy comprises data acquisition frequency, data object information acquisition and data acquisition types;
after receiving a network data acquisition instruction, acquiring operation data of a target network according to the network data acquisition strategy;
generating a network diagnosis report according to a preset fault detection strategy based on the operation data of the target network;
if network fault information exists in the network diagnosis report, generating a network optimization scheme according to the network fault information, wherein the network optimization scheme comprises optimization object information, optimization means information, optimization condition information and optimization result judging information;
optimizing the target network according to the network optimization scheme;
generating a network optimization report, wherein the network optimization report comprises the optimization object information, the optimization means information, the optimization condition information and the optimization result information;
the network optimization scheme comprises the following steps: if the rssi signal strength exists, generating a reminder for the user; if the device is online for a long time, the device is too high in temperature, and unnecessary processes are generated to restart and kill; if the firmware version is too low, reminding the user of firmware upgrading; storing static resources or frequently accessed data locally using a caching technique; distributing network traffic to a plurality of servers; reducing network latency using a content distribution network, using optimized DNS lookup, or using a cache; optimizing or improving the efficiency of data transmission by using a transmission layer protocol or using a reliable UDP; implementing flow control and congestion control strategies to ensure stability and fairness of network transmission; if the firmware version is too low, generating a prompt for firmware upgrade to a user;
according to the network optimization scheme, according to the execution sequence of the optimization rule table, firmware upgrading is firstly carried out, then unnecessary process killing operation is carried out, and finally, a user is reminded of low signal intensity after the firmware upgrading is finished;
further comprises:
generating a network monitoring strategy according to the network diagnosis report, wherein the network monitoring strategy comprises monitoring object information, monitoring index information and abnormal processing mode information;
monitoring a target network object in real time according to the network monitoring strategy;
and when the occurrence of network abnormality is monitored, generating a network monitoring report.
2. The network optimization method of a network-through product of claim 1, wherein the network data acquisition policy further comprises an acquisition data object path.
3. The network optimization method of the network communication product according to claim 2, wherein the data object obtaining path is http+mqtt, and the obtaining the operation data of the target network according to the network data obtaining policy includes:
and acquiring the operation data of the target network through HTTP+MQTT.
4. The network optimization method of the network-through product according to claim 3, wherein generating a network diagnosis report according to a preset fault detection policy based on the operation data of the target network comprises:
calculating a diagnostic value of the relevant operation index based on the operation data of the target network;
and acquiring network fault information related to the diagnosis value from a preset fault diagnosis table.
5. The network optimization method of a network-through product of claim 4, further comprising:
using Java API or third party library to detect and analyze the data flow of the target network and judging whether the intrusion behavior exists;
if the intrusion behavior exists, an intrusion account number or an IP address is acquired;
the intrusion account number or the IP address is listed in a blacklist;
acquiring abnormal network data related to the intrusion account number or the IP address;
and generating an intrusion detection report according to the abnormal network data.
6. The network optimization method of a network-through product of claim 5, further comprising:
generating a network optimization log, the network optimization log recording a network optimization process, a network optimization result, the network optimization report, the network monitoring report, and the intrusion detection report.
7. A network optimization device for a network-through product, comprising:
the network data acquisition strategy generation module is used for generating a network data acquisition strategy according to user setting, wherein the network data acquisition strategy comprises data acquisition frequency, data object information acquisition and data acquisition types;
the operation data acquisition module is used for defining a timing task after receiving a network data acquisition instruction, checking the performances of the target host and the network equipment once at regular intervals, and acquiring the operation data of the target network according to the network data acquisition strategy;
the network diagnosis report generation module is used for generating a network diagnosis report according to a preset fault detection strategy based on the operation data of the target network;
a network optimization scheme generating module, configured to generate a network optimization scheme according to the network failure information if the network failure information exists in the network diagnosis report, where the network optimization scheme includes optimization object information, optimization means information, optimization condition information, and optimization result determination information, and the network optimization scheme includes: if the rssi signal strength exists, generating a reminder for the user; if the device is online for a long time, the device is too high in temperature, and unnecessary processes are generated to restart and kill; if the firmware version is too low, reminding the user of firmware upgrading; storing static resources or frequently accessed data locally using a caching technique; distributing network traffic to a plurality of servers; reducing network latency using a content distribution network, using optimized DNS lookup, or using a cache; optimizing or improving the efficiency of data transmission by using a transmission layer protocol or using a reliable UDP; implementing flow control and congestion control strategies to ensure stability and fairness of network transmission; if the firmware version is too low, generating a prompt for firmware upgrade to a user; according to the network optimization scheme, according to the execution sequence of the optimization rule table, firmware upgrading is firstly carried out, then unnecessary process killing operation is carried out, and finally, a user is reminded of low signal intensity after the firmware upgrading is finished;
the optimization execution module is used for optimizing the target network according to the network optimization scheme by a user;
a network optimization report generating module, configured to generate a network optimization report, where the network optimization report includes the optimization object information, the optimization means information, the optimization condition information, and optimization result information;
the network monitoring module is used for generating a network monitoring strategy according to the network diagnosis report, wherein the network monitoring strategy comprises monitoring object information, monitoring index information and abnormal processing mode information; real-time monitoring is carried out on the target network object according to the network monitoring strategy; and when the occurrence of network abnormality is monitored, generating a network monitoring report.
8. A computer device, comprising: a processor, a memory and a bus, the memory storing machine-readable instructions executable by the processor, the processor and the memory in communication via the bus when the computer device is running, the machine-readable instructions when executed by the processor performing the network optimization method of the netcom product of any one of claims 1 to 6.
9. A computer readable storage medium, characterized in that the computer readable storage medium has stored thereon a computer program which, when executed by a processor, performs the network optimization method of the netcom product according to any one of claims 1 to 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311089689.5A CN116800588B (en) | 2023-08-28 | 2023-08-28 | Network optimization method and device for network communication product |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311089689.5A CN116800588B (en) | 2023-08-28 | 2023-08-28 | Network optimization method and device for network communication product |
Publications (2)
Publication Number | Publication Date |
---|---|
CN116800588A CN116800588A (en) | 2023-09-22 |
CN116800588B true CN116800588B (en) | 2023-12-22 |
Family
ID=88050160
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202311089689.5A Active CN116800588B (en) | 2023-08-28 | 2023-08-28 | Network optimization method and device for network communication product |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116800588B (en) |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2010085911A1 (en) * | 2009-02-02 | 2010-08-05 | 中兴通讯股份有限公司 | Self-optimizing method and system for mobile communication network |
CN104754609A (en) * | 2013-12-25 | 2015-07-01 | 中国移动通信集团四川有限公司 | Network optimization method and system based on TD-LTE (Time Division-Long Term Evolution) and WLAN (Wireless Local Area Network) |
CN105959144A (en) * | 2016-06-02 | 2016-09-21 | 中国科学院信息工程研究所 | Safety data acquisition and anomaly detection method and system facing industrial control network |
CN109815382A (en) * | 2018-12-29 | 2019-05-28 | 中国科学院计算技术研究所 | The perception and acquisition methods and system of large scale network data |
CN111417130A (en) * | 2019-01-07 | 2020-07-14 | 中国移动通信有限公司研究院 | Data processing method and equipment |
CN115828876A (en) * | 2022-10-09 | 2023-03-21 | 广州地铁设计研究院股份有限公司 | Intelligent monitoring report generation system, method and medium |
CN115865617A (en) * | 2022-11-17 | 2023-03-28 | 广州鲁邦通智能科技有限公司 | VPN remote diagnosis and maintenance system |
CN116455725A (en) * | 2023-03-27 | 2023-07-18 | 深圳市网联天下科技有限公司 | Network fault alarm method, system, terminal and storage medium |
WO2023138337A1 (en) * | 2022-01-18 | 2023-07-27 | 华为技术有限公司 | Motor fault detection method and apparatus |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10223169B2 (en) * | 2016-12-28 | 2019-03-05 | Intel Corporation | Technologies for adaptive collaborative optimization of internet-of-things systems |
-
2023
- 2023-08-28 CN CN202311089689.5A patent/CN116800588B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2010085911A1 (en) * | 2009-02-02 | 2010-08-05 | 中兴通讯股份有限公司 | Self-optimizing method and system for mobile communication network |
CN104754609A (en) * | 2013-12-25 | 2015-07-01 | 中国移动通信集团四川有限公司 | Network optimization method and system based on TD-LTE (Time Division-Long Term Evolution) and WLAN (Wireless Local Area Network) |
CN105959144A (en) * | 2016-06-02 | 2016-09-21 | 中国科学院信息工程研究所 | Safety data acquisition and anomaly detection method and system facing industrial control network |
CN109815382A (en) * | 2018-12-29 | 2019-05-28 | 中国科学院计算技术研究所 | The perception and acquisition methods and system of large scale network data |
CN111417130A (en) * | 2019-01-07 | 2020-07-14 | 中国移动通信有限公司研究院 | Data processing method and equipment |
WO2023138337A1 (en) * | 2022-01-18 | 2023-07-27 | 华为技术有限公司 | Motor fault detection method and apparatus |
CN115828876A (en) * | 2022-10-09 | 2023-03-21 | 广州地铁设计研究院股份有限公司 | Intelligent monitoring report generation system, method and medium |
CN115865617A (en) * | 2022-11-17 | 2023-03-28 | 广州鲁邦通智能科技有限公司 | VPN remote diagnosis and maintenance system |
CN116455725A (en) * | 2023-03-27 | 2023-07-18 | 深圳市网联天下科技有限公司 | Network fault alarm method, system, terminal and storage medium |
Non-Patent Citations (2)
Title |
---|
便携式采油设备状态监测与故障诊断智能维护系统;杨国安, 王亚锋, 何新风, 翟敏军;石油矿场机械(第03期);第77-79页 * |
基于移动Agent的分布式入侵检测系统设计研究;张乐;苏秀琴;;科学技术与工程(第19期);第5150-5154页 * |
Also Published As
Publication number | Publication date |
---|---|
CN116800588A (en) | 2023-09-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20070283436A1 (en) | Method and apparatus for large-scale automated distributed denial of service attack detection | |
US20060067240A1 (en) | Apparatus and method for detecting network traffic abnormality | |
CN107623685B (en) | Method and device for rapidly detecting SYN Flood attack | |
US9860181B2 (en) | System and method for inferring traffic legitimacy through selective impairment | |
EP3682595B1 (en) | Obtaining local area network diagnostic test results | |
CN107332715B (en) | Network application system with active performance test and passive shunt control and implementation method thereof | |
JP2007533215A (en) | Method and apparatus for automating and scaling IP network performance monitoring and analysis by active probing | |
EP3222004B1 (en) | Diagnostic testing in networks | |
CN113518057B (en) | Method and device for detecting distributed denial of service attack and computer equipment thereof | |
CN109768899A (en) | Website Usability monitoring method, device, equipment and medium | |
CN112040501A (en) | Detection and early warning method, device, equipment and storage medium for mobile network quality | |
CN115499230A (en) | Network attack detection method and device, equipment and storage medium | |
CN109962827A (en) | Device link detection method, device, equipment and readable storage medium storing program for executing | |
CN111526109B (en) | Method and device for automatically detecting running state of web threat recognition defense system | |
Jia et al. | A lightweight DDoS detection scheme under SDN context | |
CN114338120A (en) | Segment scanning attack detection method, device, medium and electronic equipment | |
CN109005181B (en) | Detection method, system and related components for DNS amplification attack | |
CN116800588B (en) | Network optimization method and device for network communication product | |
CN115801305B (en) | Network attack detection and identification method and related equipment | |
CN114338189B (en) | Situation awareness defense method, device and system based on node topology relation chain | |
CN115633359A (en) | PFCP session security detection method, device, electronic equipment and storage medium | |
CN114157516A (en) | Flow detection method and device, electronic equipment and computer storage medium | |
KR101587845B1 (en) | Method for detecting distributed denial of services attack apparatus thereto | |
AT&T | ||
GB2566467A (en) | Obtaining local area network diagnostic test results |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |