TW201014262A - Remote monitoring system and the monitoring method using the same - Google Patents

Remote monitoring system and the monitoring method using the same Download PDF

Info

Publication number
TW201014262A
TW201014262A TW97136449A TW97136449A TW201014262A TW 201014262 A TW201014262 A TW 201014262A TW 97136449 A TW97136449 A TW 97136449A TW 97136449 A TW97136449 A TW 97136449A TW 201014262 A TW201014262 A TW 201014262A
Authority
TW
Taiwan
Prior art keywords
storage device
remote monitoring
controlled
terminal
program
Prior art date
Application number
TW97136449A
Other languages
Chinese (zh)
Inventor
Shyh-Chyu Wang
Wei-Te Cheng
Original Assignee
Apacer Technology Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Apacer Technology Inc filed Critical Apacer Technology Inc
Priority to TW97136449A priority Critical patent/TW201014262A/en
Publication of TW201014262A publication Critical patent/TW201014262A/en

Links

Landscapes

  • Telephonic Communication Services (AREA)

Abstract

A remotely monitoring system is disclosed. The remote monitoring system comprises a master control server having a managing program, and a controlled unit having a storage device, wherein the storage device installs a monitoring program. The master control sever are coupled with the controlled unit through the internet, and the managing program of the master control server asks for transmitting a data related to the storage device produced by the monitoring program of the controlled unit, and then outputting a report to list the status of the storage device of the controlled unit.

Description

201014262 九、發明說明: 【發明所屬之技術領域】 本案係有關一種遠端監控系統及其監控方法,尤指一 種可監控受控端電子裝置内之儲存裝置建康情形之遠端 監控系統及其監控方法。 【先前技術】 隨著科技的發展與電子工業的進步,電子裝置内硬碟 的容量亦隨之日益增大,然而,伴隨著大容量硬碟的產 生,使用者當然相對地會將更多資料儲存於大容量硬碟 内,但當硬碟產生損毀之情形或是出現壞執問題無法進行 存取時,將對使用者產生極大的損失與困擾。 尤其對於企業來說,員工所使用之電子裝置想當然爾 會存放許多工作上重要的資料,一但電子裝置内部的硬碟 發生問題而導致資料無法存取,則必須耗費相當多的時間 以及成本將資料救回,將會對個人及企業產生極大的損失 與困擾。另外,對工廠運作的機台來說更是如此,在自動 化生產的時代一個作業員可能必須面對許多機台,此時若 是其中一台機台的硬碟發生問題,將會造成產線的中斷與 時程延誤等問題,而導致工廠的損失。 但對於一般使用者來說,平常並不會特別留意硬碟之 使用情形或是經常去監控硬碟的健康狀態,因而很容易忽 略某些警示情形而不知道應該進行資料備份或是應該進 行更換硬碟等作業,為因應此情形,市面上有一些免費的 201014262 自動監控程式,例如:自動監測分析報告技術(Self-Monitor Analysis and Reporting Technology,S.M.A.R.T.),可用以 對硬碟的運行情況與歷史記錄與預設的安全值進行分 析、比較,當出現安全值範圍之外的情形,則會對使用者 提出警告,進而可對硬碟潛在故障進行有效預測,並提高 使用者資料的安全性。 舉例來說,目前在企業中監測多台電子裝置内部硬碟 運作情形之方式係如第一圖所示,監控系統1主要由一台 _ 伺服器10與複數台電腦11所組成,伺服器10内係具有 處理器101與網路介面102,而每一台電腦11則分別具有 儲存裝置12、處理器13以及網路介面14,並且,在電腦 11的内部係安裝有一自動監控程式(未圖示),用以監控電 腦11内之儲存裝置12的健康情形,並定期或不定期將自 動監控程式所產生之數據資料透過網路傳送至伺服器10 中,然而此方式需由每一電腦11主動將資料傳送至伺服 器10中,故伺服器10無法主動詢問電腦11之儲存裝置 12之健康情形,因而無法有效的針對複數個電腦11進行 一致性的系統化管理。 另外,倘若伺服器10更換網路位置,例如:網際網 路通訊協定(Internet Protocol,IP)或是e-mail網址,則將 改變整個監控系統之架構,因而必須一台台重新設定電腦 Η内部預定之伺服端10之網路位置,大幅增加作業上的 困擾且需耗費極多的時間成本。 有鑑於此,如何發展一種可改善上述習知缺點,不僅 7 201014262 操作簡便,且能對受控端電子裝置中之儲存裝置進行有 效、一致性的管理之遠端監控系統及其監控方法,實為目 前迫切需要解決之課題。 【發明内容】 ❹ 參 本案之主要目的在於提供一種遠端監控系統,俾解決 習知遠端監測系統當網路架構變更時需重新設定主控端 之伺服器之網址,不僅設定過程麻煩且浪費時間以及無法 由伺服器主動獲得被控端資訊,因而無法有效的管理受控 端等缺失。 為達上述目的,本案之一較廣義實施樣態為提供一種 遠端監控系統,其係包含:主控端,其係具有管理程式; 以及受控端,其係具有儲存裝置,且裝設監控程式;其申, 主控端係透過網際網路與受控端連接,管理程式係要求傳 送受控端之監控程式所產生關於儲存裝置之資訊,並產生 報表,以列出受控端之儲存裝置之狀態。 根據本案之構想,其中主控端係為伺服器。 根據本案之構想 根據本案之構想 根據本案之構想 根據本案之構想 根據本案之構想 告技術。 其中受控端係為電子裝置。 其中受控端係為可攜式電子裝置。 其中網際網路係為儲存區域網路。 其中管理程式係為一代理程式。 其中監控程式係為自動監測分析報 根據本案之構想 其中資訊係為儲存裝置之網際網路 8 201014262 通訊協定、儲存裝置之 及關於儲存裝置之健岸ί儲存裝置之物理磁碟機號以 盤、電機、電路等不同' =之相關參數,例如:磁頭、磁 為達上述目的,2置之運行情況與歷史記錄。 種遠端監控方法,其佐f之另一較廣義實施樣態為提供一 係裝設管理程式;(b)2含下列步驟:⑷提供主控端,其 置,且裝設監控程式/,、至少一受控端’其係具有儲存裝 至受控端;(d)受控蠕之=主控端係透過網際網路傳遞訊息 ⑩控端之管理程式;(e) t控程式因應訊息將參數傳遞至主 報表。 、,數與標準值做比對’並彙整輸出 根據本案之構想, 告技術。 、a控程式係為自動監測分析報 根據本案之構想,装 受控端判斷訊息是否杵、驟⑷之後更包含步驟:(cl) 根據本案之構想,t要^提供儲存裝置之基本資訊。 參 端係收集錯存裝置之其:令右步驟(Cl)判斷為是,則受控 式。 基本資訊,並回報給主控端之管理程 根據本案之構想,其 4 一 路通訊協定住址、儲存裝置土 =讯係為受控端之網際網 碟機號。 之數里以及儲存裴置之物理磁 根據本案之構想’其中於 ㈣受控端崎訊息是 ⑶之後更包含步驟: 根據本案之構想,其尹要/表供儲存裝置之參數。 端之監控程式係收集儲存:夕驟(C2)判斷為是’則受控 "置之翏數,並回報給主控端之 9 201014262 管理程式。 根據本案之構想,其中參數係為關於該儲存裝置之健 康情形之相關參數,例如:磁頭、磁盤、電機、電路等不 同裝置之運行情況與歷史記錄。 根據本案之構想,其中於步驟(d)之後更包含步驟:(dl) 主控端判斷是否需監測另一受控端。 根據本案之構想,其中若步驟(dl)判斷為是,則主控 端係重複執行步驟(c)之步驟,即透過網際網路傳遞另一訊 息至另一受控端。 根據本案之構想,其中於步驟(e)中,將參數與標準值 做比對後,係將儲存裝置標示為正常、警示以及壞死等狀 態。 根據本案之構想,其中於步驟(e)之後更包含步驟:⑴ 依據報表通知標示為警示及壞死之受控端。 【實施方式】 體現本案特徵與優點的一些典型實施例將在後段的 說明中詳細敘述。應理解的是本案能夠在不同的態樣上具 有各種的變化,其皆不脫離本案的範圍,且其中的說明及 圖示在本質上係當作說明之用,而非用以限制本案。 請參閱第二圖,其係為本案較佳實施例之遠端監控系 統之系統示意圖,於本實施例中,監控系統2主要由一主 控端20與複數個受控端21、22、23所組成,於另一些實 施例中,亦可僅包含一受控端21,且受控端21之數量係 201014262 可依實際施作情形而任施變化,並不以此為限。如圖所 示’主控端20係係為一電子裝置,例如:伺服器,但不 以此為限’且其係具有一處理器201以及一網路介面202, 以及’在主控端20内係安裝有一管理程式(未圖示),用以 接收來自受控端21、22、23之訊息並予以回應,其中, 呑亥管理程式可為但不限為一代理程式(Agent pr〇grain),並 且’網路介面202係為一儲存區域網路(Storage Area Network,SAN),但不以此為限。 請再參閱第二圖,如圖所示,受控端21、22、23可 為但不限為電子裝置或可攜式電子裝置,例如:桌上型電 腦或筆記型電腦等,且其係分別具有處理器211、221、 231、儲存裝置210、220、230以及網路介面212、222、 232,其中’儲存裝置210、220、230之數量係可依實際 施作情形而任施變化,並且,儲存裝置210、220、230可 為軟碟、固態硬碟(SSD)、硬式硬碟(HDD)、可攜式硬碟或 隨身碟等裝置,且不以此為限,以及,網路介面212、222、 232同樣係為儲存區域網路(storage Area Network,SAN), 但不以此為限。另外,在每一受控端21、22、23的内部 係分別安裝有一自動監控程式(未圖示),該自動監控程式 可為免費下載使用或為市售或為自行研發之自動監控程 式(Monitoring program) ’並不以此為限,以本實施例為 例,自動監控程式係應用目前市面上現有之自動監測分析 報告技術(Self-Monitor Analysis and Reporting Technology’ S.M.A.R.T.)’其係可分別監控受控端21、22、 11 201014262 23内之儲存裝置210、220、230之不同參數,例如:磁頭、 磁盤、電機、電路等不同裝置之運行情況與歷史記錄,並 將這些輸出的參數值與一預設的安全值進行分析、比較, 以研判儲存裝置210、220、230目前的健康情形。 請參閱第三圖,其係為本案較佳實施例之遠端監控方 法之流程圖,如圖所示,本案之遠端監控方法首先係為提 供一主控端20,且該主控端20係裝設有一管理程式(如步 驟S30所示),且該管理程式係可為但不限為一代理程式, ® 以及提供至少一受控端21,該受控端21係具有儲存裝置 210,且在受控端21内部係裝設有一監控程式(如步驟S31 所示),接著,由主控端20透過網際網路傳遞出一訊息至 受控端21(如步驟S32所示),當受控端21接收到主控端 20所傳遞之訊息後,則會判斷該訊息的内容是否要求受控 端21提供關於儲存裝置210的一般基本資訊,例如:網 際網路通訊協定住址(IP Address)、儲存裝置210的數量以 及儲存裝置210的物理磁碟機號(ID)等(如步驟S33所 示),當判斷結果為是時,則受控端21的監控程式將開始 收集其内部儲存裝置210的基本資訊,並將這些資訊回報 給主控端20内的管理程式(如步驟S34所示),且在回報資 訊之後重複步驟S32,主控端20繼續傳遞訊息給受控端 21,並判斷該訊息内容是否代表要求受控端21提供儲存 裝置210的基本資訊(如步驟S33所示);若判斷結果為否, 則受控端21之監控程式繼續判斷該訊息的内容是否要求 受控端21提供關於儲存裝置210之健康情形(如步驟S35 12 201014262 所示),若判斷結果為是,則受控端21的監控程式會收集 其内部儲存裝置210健康情形的相關參數,例如:磁頭、 磁盤、電機、電路等不同裝置之運行情況與歷史記錄,並 將這些參數值回報給主控端20内的管理程式(如步驟S36 所示),若判斷結果為否,則繼續下一步驟S37,即主控端 20會判斷是否需繼續監測另一受控端22,若判斷結果為 是,則會對另一受控端22重複進行步驟S32及其後續步 驟,若判斷為否,則會將所有的參數值與一預設之標準值 ❹ 做比對,並依據比對之結果將受控端21、22、23分別歸 納為正常、警示或是壞死狀態,且於彙整後輸出一報表(如 步驟S38所示),最後,再依據報表所列之警示訊息,通知 標示為警示或是壞死之受控端21、22、23,提醒使用者應 進行資料備份以及更換所對應之儲存裝置等動作(如步驟 S39所示)。 如此一來,管理者可於主控端20上主動決定監控受201014262 IX. Description of the invention: [Technical field of invention] The present invention relates to a remote monitoring system and a monitoring method thereof, and more particularly to a remote monitoring system capable of monitoring a storage device in a controlled-end electronic device and Monitoring method. [Prior Art] With the development of technology and the advancement of the electronics industry, the capacity of hard disks in electronic devices has also increased. However, with the generation of large-capacity hard disks, users will certainly have more information. It is stored in a large-capacity hard disk, but it will cause great loss and trouble to the user when the hard disk is damaged or if the bad problem cannot be accessed. Especially for enterprises, the electronic devices used by employees will of course store a lot of important information at work. Once the hard disk inside the electronic device has problems and the data cannot be accessed, it will take a considerable amount of time and cost. Recovering data will cause great losses and problems for individuals and businesses. In addition, this is especially true for machines operating in factories. In the era of automated production, an operator may have to face many machines. If there is a problem with the hard disk of one of the machines, it will cause the production line. Problems such as interruptions and time delays lead to loss of the factory. However, for the average user, it is not usual to pay attention to the use of the hard disk or to monitor the health of the hard disk. It is easy to ignore certain warning situations without knowing whether the data should be backed up or should be replaced. In order to cope with this situation, there are some free 201014262 automatic monitoring programs on the market, such as Self-Monitor Analysis and Reporting Technology (SMART), which can be used for the operation and history of hard disks. The record is analyzed and compared with the preset safety value. When the safety value range is exceeded, the user is warned, which can effectively predict the potential failure of the hard disk and improve the security of the user data. For example, the way to monitor the internal hard disk operation of multiple electronic devices in the enterprise is as shown in the first figure. The monitoring system 1 is mainly composed of a server _ server 10 and a plurality of computers 11 , and the server 10 The internal system has a processor 101 and a network interface 102, and each computer 11 has a storage device 12, a processor 13 and a network interface 14, respectively, and an automatic monitoring program is installed inside the computer 11 (not shown). For monitoring the health condition of the storage device 12 in the computer 11, and periodically or irregularly transmitting the data generated by the automatic monitoring program to the server 10 through the network, however, this method is required by each computer 11 Since the data is actively transmitted to the server 10, the server 10 cannot actively inquire about the health of the storage device 12 of the computer 11, and thus cannot perform systematic and consistent management for a plurality of computers 11 effectively. In addition, if the server 10 replaces the network location, such as the Internet Protocol (IP) or e-mail address, it will change the architecture of the entire monitoring system, so it is necessary to reset the computer inside. The predetermined network location of the server 10 greatly increases the operational cumber and requires a significant amount of time. In view of this, how to develop a remote monitoring system and its monitoring method that can improve the above-mentioned shortcomings, not only 7 201014262 is easy to operate, and can effectively and consistently manage the storage device in the controlled-end electronic device. It is an urgent problem to be solved. SUMMARY OF THE INVENTION The main purpose of the present invention is to provide a remote monitoring system, which solves the problem that the remote monitoring system needs to reset the web address of the server of the main control terminal when the network architecture is changed, which not only sets the process trouble but also wastes time and It is impossible for the server to actively obtain the information of the controlled terminal, and thus it is impossible to effectively manage the missing of the controlled terminal. In order to achieve the above purpose, one of the broader aspects of the present invention provides a remote monitoring system, which includes: a control terminal having a management program; and a controlled terminal having a storage device and monitoring The program, the host is connected to the controlled terminal through the Internet, and the management program requests to transmit information about the storage device generated by the monitoring program of the controlled terminal, and generate a report to list the storage of the controlled terminal. The state of the device. According to the concept of the present case, the main control terminal is a server. According to the concept of the case According to the concept of the case According to the concept of the case According to the concept of the case According to the concept of the case, the technology is reported. The controlled end is an electronic device. The controlled end is a portable electronic device. The Internet is the storage area network. The management program is an agent. The monitoring program is an automatic monitoring and analysis report. According to the concept of the present case, the information is the storage device's Internet 8 201014262 communication protocol, the storage device and the physical disk number of the storage device. Different parameters of the motor, circuit, etc., such as: head, magnetic for the above purposes, 2 set of operating conditions and history. Another remote monitoring method is to provide a series of installation management programs; (b) 2 includes the following steps: (4) providing a host, setting, and installing a monitoring program/, At least one controlled end' has its storage to the controlled end; (d) controlled creep = the main control end transmits the message through the Internet 10 terminal management program; (e) t control program response message Pass the parameters to the main report. , the number is compared with the standard value' and the output is based on the concept of the case, the technology. The control program is an automatic monitoring and analysis report. According to the concept of the case, the controlled terminal judges whether the message is 杵, and after the step (4), the steps are further included: (cl) According to the concept of the present case, the basic information of the storage device is provided. The reference system collects the faulty device: the right step (Cl) is judged as YES, then the control is performed. Basic information, and return to the management of the main control terminal According to the concept of the case, the four-way communication agreement address, storage device soil = the communication system is the controlled end of the Internet network machine number. The physical magnetics of the storage device and the storage device are based on the concept of the present case. In (4) the controlled terminal information is (3) and the steps are further included: According to the concept of the present case, the parameters of the storage device are provided. The monitoring program of the terminal collects and stores: the sequel (C2) judges that it is 'and then controlled', and returns the number to the main controller 9 201014262 management program. According to the concept of the present case, the parameters are related parameters regarding the health of the storage device, such as the operation and history of different devices such as a magnetic head, a magnetic disk, a motor, and a circuit. According to the concept of the present case, the step further includes the step after the step (d): (dl) the master terminal determines whether another controlled terminal needs to be monitored. According to the concept of the present case, if the step (dl) is judged as YES, the master repeatedly performs the step (c) of transmitting another message to the other controlled end via the Internet. According to the concept of the present case, in step (e), after comparing the parameters with the standard values, the storage device is marked as normal, warning, and necrotic. According to the concept of the present case, after step (e), the steps are further included: (1) the controlled end marked as warning and necrosis according to the report notification. [Embodiment] Some exemplary embodiments embodying the features and advantages of the present invention will be described in detail in the following description. It is to be understood that the present invention is capable of various modifications in the various aspects of the present invention, and the description and illustration are in the nature of Please refer to the second figure, which is a schematic diagram of the system of the remote monitoring system of the preferred embodiment of the present invention. In this embodiment, the monitoring system 2 is mainly composed of a main control terminal 20 and a plurality of controlled terminals 21, 22, and 23 In other embodiments, only one controlled end 21 may be included, and the number of controlled ends 21 may be changed according to the actual implementation situation, and is not limited thereto. As shown in the figure, the main control terminal 20 is an electronic device, such as a server, but not limited thereto, and has a processor 201 and a network interface 202, and 'at the host terminal 20 The internal system is installed with a management program (not shown) for receiving and responding to messages from the controlled terminals 21, 22, and 23, wherein the management program can be, but is not limited to, an agent (Agent pr〇grain) ), and the 'network interface 202 is a storage area network (SAN), but not limited to this. Referring to the second figure, as shown, the controlled terminals 21, 22, 23 can be, but are not limited to, an electronic device or a portable electronic device, such as a desktop computer or a notebook computer, and the like. Each of the processors 211, 221, 231, the storage devices 210, 220, 230 and the network interfaces 212, 222, 232, wherein the number of the storage devices 210, 220, 230 can be changed according to the actual implementation situation, Moreover, the storage devices 210, 220, and 230 may be floppy disks, solid state drives (SSDs), hard disk drives (HDDs), portable hard disks, or flash drives, and are not limited thereto, and the network The interfaces 212, 222, and 232 are also a storage area network (SAN), but are not limited thereto. In addition, an automatic monitoring program (not shown) is installed in each of the controlled terminals 21, 22, and 23, and the automatic monitoring program can be used for free download or is a commercially available or self-developed automatic monitoring program ( Monitoring program) 'It is not limited to this. For example, the automatic monitoring program is applied to the existing Self-Monitor Analysis and Reporting Technology 'SMART'. Different parameters of the storage devices 210, 220, 230 in the controlled terminals 21, 22, 11 201014262 23, such as the operation and history of different devices such as magnetic heads, disks, motors, circuits, etc., and the values of these output parameters are A predetermined safety value is analyzed and compared to determine the current health situation of the storage devices 210, 220, and 230. Please refer to the third figure, which is a flowchart of the remote monitoring method of the preferred embodiment of the present invention. As shown in the figure, the remote monitoring method of the present invention first provides a master terminal 20, and the master terminal 20 The management program is provided with a management program (as shown in step S30), and the management program can be, but is not limited to, an agent, and provides at least one controlled terminal 21 having a storage device 210. And a monitoring program is installed in the controlled terminal 21 (as shown in step S31), and then the host 20 transmits a message to the controlled terminal 21 through the Internet (as shown in step S32). After receiving the message transmitted by the master terminal 20, the controlled terminal 21 determines whether the content of the message requires the controlled terminal 21 to provide general basic information about the storage device 210, for example, an Internet Protocol address (IP Address). The number of storage devices 210 and the physical disk drive number (ID) of the storage device 210, etc. (as shown in step S33), when the determination result is yes, the monitoring program of the controlled terminal 21 will start collecting internal storage. Basic information about device 210, and these The message is returned to the management program in the host 20 (as shown in step S34), and after the report is returned, the step S32 is repeated, and the host 20 continues to transmit the message to the controlled terminal 21, and determines whether the content of the message represents the request. The control terminal 21 provides basic information of the storage device 210 (as shown in step S33); if the determination result is no, the monitoring program of the controlled terminal 21 continues to determine whether the content of the message requires the controlled terminal 21 to provide information about the storage device 210. In the case of a health situation (as shown in steps S35 12 201014262), if the result of the determination is yes, the monitoring program of the controlled terminal 21 collects relevant parameters of the health condition of the internal storage device 210, such as: head, disk, motor, circuit, etc. The operation status and history of the device are reported, and the parameter values are reported to the management program in the host terminal 20 (as shown in step S36). If the determination result is no, the process proceeds to the next step S37, that is, the host terminal 20 Determining whether it is necessary to continue monitoring another controlled terminal 22, and if the determination result is yes, step S32 and subsequent steps are repeated for the other controlled terminal 22, and if the determination is no, the device will be Some parameter values are compared with a preset standard value ,, and the controlled ends 21, 22, and 23 are respectively classified into normal, warning, or necrotic states according to the comparison result, and a report is output after the integration ( In step S38, finally, according to the warning message listed in the report, the controlled end 21, 22, 23 marked as warning or necrosis is notified to remind the user that the data should be backed up and the corresponding storage device is replaced. Action (as shown in step S39). In this way, the administrator can actively decide on the monitoring terminal 20 to monitor and receive

▲ 控端21、22、23的時間、所需之資訊以及受控端21、22、 A 23内部儲存裝置210、220、230的健康情形,並且,當管 理者在接獲所產生的報表時,則可依報表上所顯示之警示 訊息,通知受控端21、22、23之使用者注意所對應之儲 存裝置的健康情形,或直接進行更換,使得主控端20不 僅具有主控權,且能即時、有效的管理眾多之受控端21、 22、23 ° 另外,於此遠端監測方法中,受控端21、22、23僅 需將内部監控程式所獲得的資訊回報給主控端20,而不需 13 201014262 設定主控端20之網路位址等相關資訊,故當主控端20與 受控端21、22、23之間的網路架構進行變更時,只需修 改主控端20内管理程式的設定,而不需要在受控端21、 22、23上·--進行變更,因而可使管理者更簡便的進行操 作,並可有效節省受控端21、22、23之使用者的時間。 舉例來說,當步驟S33中主控端2所傳遞給受控端21 之訊息封包係可包含詢問受控端21之儲存裝置210的數 量以及詢問受控端21之儲存裝置210之辨識資訊。 請參閱第四圖A,其係為第二圖所示之主控端及受控 端之間傳送儲存裝置數量之訊息傳遞過程示意圖,如圖所 示,當要取得受控端21之儲存裝置210的數量資訊時, 主控端20先將訊息封包A1透過網際網路傳送給受控端 21,訊息封包A1之内容包含主控端20之來源網際網路通 訊協定住址(Source IP Address)、受控端21之目標網際網 路通訊協定住址(TargetIPAddress)以及資訊指令,當受控 端21接收到訊息封包A1後,將回傳訊息封包A2給主控 端20,訊息封包A2中則包含受控端21之目標網際網路通 訊協定住址(Target IP Address)、儲存裝置之數量、儲存裝 置之物理磁碟機號等資訊。其中,訊息封包A1與訊息封 包A2之資料格式係如表1與表2所示。 表1、訊息封包A1 訊息標識 來源網際網路通訊協定 lbtye (例如:0x01) N btye 14 201014262 表2、訊息封包A2 訊息標識 目標網際網 路通訊協定 儲存裝置數 量 物理磁碟機號 lbtye (例 如:0x11) N btye lbtye 儲存裝置數量 *lbtye 請參閱第四圖B,其係為第二圖所示之主控端及受控 端之間傳送儲存裝置辨識資訊之訊息傳遞過程示意圖,如 圖所示,當要取得受控端21之儲存裝置210的辨識資訊 ® 時,主控端20先將訊息封包B1透過網際網路傳送給受控 端21,訊息封包B1之内容包含主控端20之來源網際網路 通訊協定住址(Source IP Address)、受控端21之目標網際 網路通訊協定住址(Target IP Address)以及物理磁碟機號, 當受控端21接收到訊息封包B1後,將回傳訊息封包B2 給主控端20,訊息封包B2中則包含受控端21之目標網際 網路通訊協定住址(Target IP Address)以及辨識資訊。其 ^ 中,訊息封包B1與訊息封包B2之資料格式係如表3與表 4所示。 表3、訊息封包B1 訊息標識 來源網際網路通訊協定 物理磁碟機號 lbtye (例 如:0x02) N btye 1 btye 表4、訊息封包B 2 15 201014262 訊息標識 目標網際網路通訊協定 辨識資訊 lbtye (例 如:0x12) N btye 512btye 另外,當步驟S34中主控端20的管理程式詢問是否 存取受控端21内儲存裝置210之健康情形,其訊息傳遞 過程係如第四圖C所示,先由主控端20將訊息封包C1透 過網際網路傳送給受控端21,訊息封包C1的内容包含主 控端20之來源網際網路通訊協定住址(Source IP Address)、受控端21之目標網際網路通訊協定住址(Target IP Address)、物理磁碟機號以及一監控指令,當受控端21 接收到訊息封包C1後,再回傳訊息封包C2給主控端20, 訊息封包C2中則包含受控端21之目標網際網路通訊協定 (IP)以及S.M.A.R.T.監測數據。其中,訊息封包C1與訊息 封包C2之資料格式係如表5與表6所示。 表5、訊息封包C1 訊息標識 來源網際網路通訊協定 物理磁碟機號 lbtye (例 如:0x03) N btye 1 btye 表6、訊息封包C2 訊息標識 目標網際網路通訊協定 S.M.A.R.T.監 測數據 lbtye (例 如:0x13) N btye 512btye 故在主控端20與受控端21之間,係不停地重覆上述 16 201014262 訊息傳遞過程,依序往返傳遞訊息封包A1、A2、B1、B 2, 藉此過程以獲得受控端21之儲存裝置210之型號、韌體 版本、序號、資源模式等資料,再透過訊息封包Cl、C2 之往返傳遞,以獲得受控端21之S.M.A.R.T.監測數據。 藉由上述方式,主控端20可遠端監控複數個受控端 21,並可將S.M.A.R.T.監測數據與一標準值做比對,將儲 存裝置210區分為正常、警示以及壞死三個狀態,並進行 表列輸出,該輸出的報表係如表7所示,其係具有訊息標 ® 識、來源網際網路通訊協定、通訊碼、磁碟數量...等資訊。 當主控端20輸出受控端21之狀態表後,係可依據表 7中所列之警示狀態而通知受控端21之使用者,可有效且 預先防止受控端21内部儲存裝置210之損壞,進而可有 效監控受控端21之儲存裝置210的健康情形,若應用於 企業或工廠上,則可有效減少企業或是工廠的損失。 另外,此報表亦可以網路傳送給受控端21或是給其 ©他管理者,並可設定使之定期產生檢測報表,使得遠距管 理更為便捷、有效。 17 201014262 硌^:t^'fi 1' 琮,/.崦 循環 多餘 檢查 1碼 2 bytes 目標 網際 網路 通訊 協定 N bytes 物理 磁碟 機號 K bytes 最後 一磁 碟S/N 狀態 Μ bytes • • • 目標 網際 網路 通訊 協定 N bytes 物理 磁碟 機號 K bytes 第一 磁碟 S/N 狀態 M bytes 磁碟 數量 M bytes 1 i 1 狀態 碼 1 btye (例 如:警 示) 來源 網際 網路 通訊 協定 N btye 訊息 標識 lbtye 201014262 綜上所述,本案之遠距監測裝置及其監測方法係由主 控端及受控端所組成,其中主控端係具有管理程式,受控 端具有儲存裝置及監控程式,且主控端係透過網際網路與 受控端連接,以傳遞並接收受控端之監控程式所傳遞之資 訊,並透過管理程式產生報表,藉以主動監控受控端之儲 存裝置之狀態,且當網路架構變動時,僅需修正主控端之 設定,即可恢復監測作業,俾可節省作業時間,且可有效、 即時地管理受控端,並提出警示,使得儲存裝置的損壞程 ® 度降低,是以,本案之遠端監控系統及其監控方法極具產 業之價值,爰依法提出申請。 縱使本發明以由上述之實施例詳細敘述而可由本案 得由熟悉本技藝之人士任施匠思而為諸般修飾,然皆不脫 如附申請專利範圍所欲保護者。 19 201014262 【圖式簡單說明】 第一圖:其係為習知遠端監測系統之系統示意圖。 第二圖:其係為本案較佳實施例之遠端監控系統之系統示 意圖。 第三圖:其係為本案較佳實施例之遠端監控方法之流程 圖。 第四圖A :其係為第二圖所示之主控端及受控端之間傳送 儲存裝置數量之訊息傳遞過程示意圖。 〇 第四圖B:其係為第二圖所示之主控端及受控端之間傳送 儲存裝置辨識資訊之訊息傳遞過程示意圖。 第四圖C:其係為第二圖所示之主控端及受控端之間傳送 儲存裝置之健康情形參數傳遞過程示意圖。▲ the time of the terminals 21, 22, 23, the required information, and the health of the internal storage devices 210, 220, 230 of the controlled terminals 21, 22, A 23, and when the manager receives the generated report According to the warning message displayed on the report, the user of the controlled terminal 21, 22, 23 can be notified of the health condition of the corresponding storage device, or directly replaced, so that the main control terminal 20 not only has the mastership, And can manage many controlled terminals 21, 22, 23 ° in an instant and effective manner. In addition, in this remote monitoring method, the controlled terminals 21, 22, 23 only need to report the information obtained by the internal monitoring program to the main control. Terminal 20, without 13 201014262 setting the network address of the host 20 and other related information, so when the network architecture between the host terminal 20 and the controlled terminal 21, 22, 23 is changed, only need to modify The setting of the management program in the main control terminal 20 does not need to be changed on the controlled terminals 21, 22, 23, so that the administrator can operate more easily, and the controlled terminals 21 and 22 can be effectively saved. , 23 user's time. For example, the message packet transmitted by the master 2 to the controlled terminal 21 in step S33 may include the number of storage devices 210 inquiring the controlled terminal 21 and the identification information of the storage device 210 inquiring the controlled terminal 21. Please refer to FIG. 4A, which is a schematic diagram of a message transfer process for transferring the number of storage devices between the master terminal and the controlled terminal shown in FIG. 2, as shown in the figure, when the storage device of the controlled terminal 21 is to be obtained. When the quantity information of 210 is used, the main control terminal 20 first transmits the message packet A1 to the controlled terminal 21 through the Internet, and the content of the message packet A1 includes the source IP address of the source 20 of the host terminal 20, The target Internet Protocol address (TargetIPAddress) of the controlled terminal 21 and the information command, when the controlled terminal 21 receives the message packet A1, it will return the message packet A2 to the host terminal 20, and the message packet A2 contains the received message. The target Internet address of the target 21, the number of storage devices, the physical disk drive number of the storage device, and the like. The data formats of the message packet A1 and the message packet A2 are as shown in Tables 1 and 2. Table 1, message packet A1 message identification source Internet Protocol lbtye (eg: 0x01) N btye 14 201014262 Table 2, message packet A2 message identifies the number of target Internet Protocol storage devices physical disk number lbtye (eg: 0x11) N btye lbtye Number of storage devices *lbtye Please refer to the fourth figure B, which is a schematic diagram of the message transmission process for transmitting storage device identification information between the master terminal and the controlled terminal shown in the second figure, as shown in the figure. When the identification information of the storage device 210 of the controlled terminal 21 is to be obtained, the host 20 first transmits the message packet B1 to the controlled terminal 21 through the Internet, and the content of the message packet B1 includes the source of the host terminal 20. The source IP address of the Internet, the target IP address of the controlled terminal 21, and the physical disk number. When the controlled terminal 21 receives the message packet B1, it will return. The message packet B2 is sent to the host terminal 20, and the message packet B2 includes the target Internet address of the controlled terminal 21 and the identification information. The data format of the message packet B1 and the message packet B2 is as shown in Tables 3 and 4. Table 3, message packet B1 message identification source Internet communication protocol physical disk drive number lbtye (eg: 0x02) N btye 1 btye Table 4, message packet B 2 15 201014262 message identification target Internet Protocol identification information lbtye ( For example, 0x12) N btye 512btye In addition, when the management program of the host 20 in step S34 asks whether to access the health condition of the storage device 210 in the controlled terminal 21, the message transmission process is as shown in FIG. 4C. The message packet C1 is transmitted by the host terminal 20 to the controlled terminal 21 through the Internet. The content of the message packet C1 includes the source IP address of the host terminal 20 and the target of the controlled terminal 21 The Internet IP address, the physical disk number, and a monitoring command. When the controlled terminal 21 receives the message packet C1, it returns the message packet C2 to the host terminal 20, and the message packet C2. It includes the target Internet Protocol (IP) and SMART monitoring data of the controlled terminal 21. The data format of the message packet C1 and the message packet C2 are shown in Table 5 and Table 6. Table 5, message packet C1 message identification source Internet communication protocol physical disk drive number lbtye (eg: 0x03) N btye 1 btye Table 6, message packet C2 message identification target Internet Protocol SMART monitoring data lbtye (eg: 0x13) N btye 512btye, so that between the main control terminal 20 and the controlled terminal 21, the above 16 201014262 message transmission process is continuously repeated, and the message packets A1, A2, B1, and B 2 are sequentially transferred back and forth. The data of the storage device 210 of the controlled terminal 21, the firmware version, the serial number, the resource mode, and the like are obtained, and then transmitted back and forth through the message packets Cl and C2 to obtain the SMART monitoring data of the controlled terminal 21. In the above manner, the main control terminal 20 can remotely monitor the plurality of controlled terminals 21, and can compare the SMART monitoring data with a standard value, and divide the storage device 210 into three states of normal, warning, and necrosis, and For the table column output, the output report is shown in Table 7, which has the information of the message standard, the source Internet protocol, the communication code, the number of disks, and so on. When the master terminal 20 outputs the status table of the controlled terminal 21, the user of the controlled terminal 21 can be notified according to the alert status listed in Table 7, and the internal storage device 210 of the controlled terminal 21 can be effectively and prevented in advance. The damage can be effectively monitored for the health of the storage device 210 of the controlled terminal 21, and if it is applied to a company or a factory, the loss of the enterprise or the factory can be effectively reduced. In addition, this report can also be transmitted to the controlled terminal 21 or its administrator, and can be set to generate test reports on a regular basis, making remote management more convenient and effective. 17 201014262 硌^:t^'fi 1' 琮,/.崦Repeat check 1 yard 2 bytes Target Internet Protocol N bytes Physical drive number K bytes Last disk S/N status Μ bytes • • • Target Internet Protocol N bytes Physical drive number K bytes First disk S/N Status M bytes Number of disks M bytes 1 i 1 Status code 1 btye (eg alert) Source Internet Protocol N Btye message identification lbtye 201014262 In summary, the remote monitoring device and its monitoring method of the present case are composed of a master terminal and a controlled terminal, wherein the master terminal has a management program, and the controlled terminal has a storage device and a monitoring program. And the main control terminal is connected to the controlled end through the Internet to transmit and receive the information transmitted by the monitoring program of the controlled end, and generate a report through the management program, thereby actively monitoring the state of the storage device at the controlled end. And when the network architecture changes, the monitoring operation can be resumed only by modifying the settings of the main control terminal, so that the operation time can be saved, and the control can be effectively and instantly managed. At the end, warnings were issued to reduce the damage degree of the storage device. Therefore, the remote monitoring system and its monitoring method in this case are of great industrial value, and the application is made according to law. The present invention has been modified by the above-described embodiments in detail, and may be modified by those skilled in the art without departing from the scope of the appended claims. 19 201014262 [Simple description of the diagram] The first picture: it is a schematic diagram of the system of the known remote monitoring system. Second Figure: This is a system schematic of the remote monitoring system of the preferred embodiment of the present invention. Third: It is a flow chart of the remote monitoring method of the preferred embodiment of the present invention. Figure 4A is a schematic diagram of the message transfer process for transferring the number of storage devices between the master and the controlled end as shown in the second figure. 〇 The fourth picture B is a schematic diagram of the message transmission process for transmitting the identification information of the storage device between the master terminal and the controlled terminal shown in the second figure. The fourth figure C is a schematic diagram of the health condition parameter transfer process of the transfer storage device between the master terminal and the controlled terminal shown in the second figure.

20 201014262 【主要元件符號說明】 1、2 :監控系統 10:伺服器 101、 13、201、211、221、231 :處理器 102、 14、202、212、222、232 :網路介面 11 :電腦 12、210、220、230 :儲存裝置 20 :主控端 〇 21、22、23 :受控端 S30~S38 :遠端監控方法步驟20 201014262 [Description of main component symbols] 1, 2: Monitoring system 10: Servers 101, 13, 201, 211, 221, 231: Processors 102, 14, 202, 212, 222, 232: Network interface 11: Computer 12, 210, 220, 230: storage device 20: main control port 21, 22, 23: controlled terminal S30 ~ S38: remote monitoring method steps

21twenty one

Claims (1)

201014262 十、申請專利範圍: L 一種遠端監控系統,其係包含: 主控,其係具有一管理程式;以及 一焚控端,其係具有一儲存裝置,且裝設一監控程式; &其中,该主控端係透過一網際網路與該受控端連接, 該/理程式係要求傳送該受控端之該監控程式所產生關 m201014262 X. Patent application scope: L A remote monitoring system, comprising: a main control, which has a management program; and a combustion control terminal, which has a storage device and is equipped with a monitoring program; & Wherein, the main control terminal is connected to the controlled end through an internet, and the program is required to transmit the monitoring program generated by the controlled end. 亥儲存裝置之—資訊,並產生—報表,以列出該受控端 之該儲存裝置之狀態。 如申π專利圍第1項所述之遠端監控系統,其中該主 控端係為一伺服器。 如申明專利feu第i項所述之遠端監控系統其中該受 控端係為一電子裝置。 ^申明專利㈣第1項所述之遠端監控系統其中該受 控端係為一可攜式電子裝置》 =申吻專利錢第W所述之遠端監控系統,其中該網 *網路係為一儲存區域網路。 :專利範圍第1項所述之遠端監控系統,其中該管 理程式係為一代理程式。 7· t申請專利朗第1項所叙遠端監控线,其中該監 工程式係為-自動監測分析報告技術。 二述之遠端監控系統,其中該資 4存裴置之、,周際網路通訊協定、該儲存裝置之 亥儲存震置之物理磁碟機號以及關於該儲存裝置 健康情形之相關參數,例如:磁頭、磁盤、電機、電 22 201014262 路等不同裝置之運行情況與歷史記錄。 9. 一種遠端監控方法,其係包含下列步驟: 提供一主控端,其係裝設一管理程式; 提供至少一受控端,其係具有一儲存裝置,且裝設一 監控程式; 該主控端透過一網際網路傳遞一訊息至該受控端; 該受控端之該監控程式因應該訊息將一參數傳遞至 該主控端之該管理程式; 將該參數與一標準值做比對,並彙整輸出一報表。 10. 如申請專利範圍第9項所述之遠端監控方法,其中該監 控程式係為一自動監測分析報告技術。 11. 如申請專利範圍第9項所述之遠端監控方法,其中於步 驟(c)之後更包含步驟: (cl)該受控端判斷該訊息是否代表要求提供該儲存 裝置之一基本資訊。 12. 如申請專利範圍第11項所述之遠端監控方法,若步驟 (cl)判斷為是,則該受控端係收集該儲存裝置之該資 訊,並回報給該主控端之該管理程式。 13. 如申請專利範圍第12項所述之遠端監控方法,其中該 基本資訊係為該受控端之網際網路通訊協定住址、該儲 存裝置之數量以及該儲存裝置之物理磁碟機號。 14. 如申請專利範圍第11項所述之遠端監控方法,其中於 步驟(cl)之後更包含步驟: (c2)該受控端判斷該訊息是否代表要求提供該儲存 23 201014262 裝置之該參數。 15. 如申請專利範圍第14項所述之遠端監控方法,若步驟 (c2)判斷為是,則該受控端之該監控程式係收集該儲存 裝置之該參數,並回報給該主控端之該管理程式。 16. 如申請專利範圍第15項所述之遠端監控系統,其中該 參數係為關於該儲存裝置之健康情形之相關參數,例 如:磁頭、磁盤、電機、電路等不同裝置之運行情況與 歷史記錄。 17. 如申請專利範圍第9項所述之遠端監控方法,其中於步 驟(d)之後更包含步驟: (dl)該主控端判斷是否需監測另一受控端。 18. 如申請專利範圍第17項所述之遠端監控方法,若步驟 (dl)判斷為是,則該主控端係重複執行步驟(c)之步驟, 即透過該網際網路傳遞另一訊息至另一該受控端。 19. 如申請專利範圍第9項所述之遠端監控方法,其中於步 驟(e)中,將該參數與該標準值做比對後,係將該儲存裝 置標示為正常、警示以及壞死等狀態。 20. 如申請專利範圍第19項所述之遠端監控方法,其中於 步驟⑻之後更包含步驟: ⑴依據該報表通知標示為警示及壞死之受控端。 24The information of the storage device and the report are generated to list the status of the storage device at the controlled end. The remote monitoring system of claim 1, wherein the main control terminal is a server. The remote monitoring system of claim 9, wherein the controlled end is an electronic device. ^Announcement Patent (4) The remote monitoring system described in item 1 wherein the controlled end is a portable electronic device, the remote monitoring system described in the patent claim, wherein the network is It is a storage area network. The remote monitoring system of claim 1, wherein the management program is an agent. 7· t apply for the remote monitoring line described in the first paragraph of the patent, which is the automatic monitoring and analysis report technology. The remote monitoring system of the second embodiment, wherein the resource 4, the physical network protocol of the storage device, the physical disk number of the storage device, and related parameters regarding the health of the storage device, For example: heads, disks, motors, electricity 22 201014262 roads and other operating conditions and history. A remote monitoring method comprising the steps of: providing a host with a management program; providing at least one controlled terminal having a storage device and installing a monitoring program; The master transmits a message to the controlled terminal through an internetwork; the monitoring program of the controlled terminal transmits a parameter to the management program of the master terminal according to the message; the parameter is made with a standard value Compare and summarize the output of a report. 10. The remote monitoring method of claim 9, wherein the monitoring program is an automatic monitoring and analysis reporting technique. 11. The remote monitoring method of claim 9, wherein the step (c) further comprises the step of: (cl) the controlled terminal determining whether the message represents a request for providing basic information of the storage device. 12. The remote monitoring method of claim 11, wherein if the step (cl) is YES, the controlled end collects the information of the storage device and reports the management to the host. Program. 13. The remote monitoring method of claim 12, wherein the basic information is an internet protocol address of the controlled terminal, the number of the storage device, and a physical disk number of the storage device. . 14. The remote monitoring method of claim 11, wherein the step (cl) further comprises the step of: (c2) the controlled terminal determining whether the message represents the parameter required to provide the storage 23 201014262 device . 15. The remote monitoring method of claim 14, wherein if the determination in step (c2) is YES, the monitoring program of the controlled terminal collects the parameter of the storage device and returns the control to the main control The management program at the end. 16. The remote monitoring system of claim 15, wherein the parameter is related to a health condition of the storage device, such as operation status and history of different devices such as a magnetic head, a magnetic disk, a motor, and a circuit. recording. 17. The remote monitoring method of claim 9, wherein the step (d) further comprises the step of: (dl) the master determining whether another controlled terminal needs to be monitored. 18. The remote monitoring method according to claim 17, wherein if the step (dl) is YES, the master repeats the step (c), that is, transmitting another through the internet. The message goes to another controlled end. 19. The remote monitoring method according to claim 9, wherein in step (e), the parameter is compared with the standard value, and the storage device is marked as normal, warning, necrotic, etc. status. 20. The remote monitoring method of claim 19, wherein the step (8) further comprises the step of: (1) notifying the controlled end marked as warning and necrosis according to the report. twenty four
TW97136449A 2008-09-23 2008-09-23 Remote monitoring system and the monitoring method using the same TW201014262A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW97136449A TW201014262A (en) 2008-09-23 2008-09-23 Remote monitoring system and the monitoring method using the same

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW97136449A TW201014262A (en) 2008-09-23 2008-09-23 Remote monitoring system and the monitoring method using the same

Publications (1)

Publication Number Publication Date
TW201014262A true TW201014262A (en) 2010-04-01

Family

ID=44829582

Family Applications (1)

Application Number Title Priority Date Filing Date
TW97136449A TW201014262A (en) 2008-09-23 2008-09-23 Remote monitoring system and the monitoring method using the same

Country Status (1)

Country Link
TW (1) TW201014262A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI554882B (en) * 2014-05-09 2016-10-21 萊芙麥斯公司 Method, computer-readable medium, and electronic device for computation of storage network robustness
TWI608358B (en) * 2016-08-04 2017-12-11 先智雲端數據股份有限公司 Method for data protection in cloud-based service system
TWI764734B (en) * 2021-05-26 2022-05-11 飛捷科技股份有限公司 Monitoring method

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI554882B (en) * 2014-05-09 2016-10-21 萊芙麥斯公司 Method, computer-readable medium, and electronic device for computation of storage network robustness
US9531610B2 (en) 2014-05-09 2016-12-27 Lyve Minds, Inc. Computation of storage network robustness
TWI608358B (en) * 2016-08-04 2017-12-11 先智雲端數據股份有限公司 Method for data protection in cloud-based service system
TWI764734B (en) * 2021-05-26 2022-05-11 飛捷科技股份有限公司 Monitoring method

Similar Documents

Publication Publication Date Title
CN108600029B (en) A configuration file updating method, device, terminal device and storage medium
CN103117879B (en) A kind of computer hardware operational factor network monitoring system
CN107612748B (en) Multi-node server power consumption management system
CN102859495B (en) Management system and computer system management method
WO2020029407A1 (en) Alarm data management method and apparatus, and computer device and storage medium
WO2022134352A1 (en) Server hardware state monitoring method and apparatus, electronic device, and medium
CN102662821A (en) Method, device and system for auxiliary diagnosis of virtual machine failure
CN103248725A (en) Safe and reliable domain name resolution repairing method and system
JP2010108063A5 (en)
CN104219327A (en) Distributed cache system
CN101005505B (en) Systems and methods for communicating with database client users
EP3852363B1 (en) Device state monitoring method and apparatus
CN103607314A (en) System for monitoring and managing server by using SNMP (Simple Network Management Protocol)
CN101771565A (en) Analogy method for realizing multitudinous or different baseboard management controllers by single server
CN105553731A (en) Automatic inspection method and device
CN111831628A (en) System operation and maintenance monitoring method, device, electronic device and storage medium
TW201014262A (en) Remote monitoring system and the monitoring method using the same
CN113765717A (en) Operation and maintenance management system based on secret-related special computing platform
KR101414994B1 (en) Server of monitoring for server resources and web service and method thereof
CN111581002A (en) Automatic failure reporting method, device and equipment for server failure
CN101677278A (en) Method and system for monitoring availability of network information system
TW201510995A (en) Method for maintaining file system of computer system
CN115080132A (en) Information processing method, device, server and storage medium
US8819481B2 (en) Managing storage providers in a clustered appliance environment
CN102457394B (en) Management method of server device and management device thereof