WO2010097019A1 - 一种监控锁定机制的方法及装置 - Google Patents

一种监控锁定机制的方法及装置 Download PDF

Info

Publication number
WO2010097019A1
WO2010097019A1 PCT/CN2010/070410 CN2010070410W WO2010097019A1 WO 2010097019 A1 WO2010097019 A1 WO 2010097019A1 CN 2010070410 W CN2010070410 W CN 2010070410W WO 2010097019 A1 WO2010097019 A1 WO 2010097019A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
data
lock
network management
management protocol
Prior art date
Application number
PCT/CN2010/070410
Other languages
English (en)
French (fr)
Inventor
孟健
Original Assignee
成都市华为赛门铁克科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 成都市华为赛门铁克科技有限公司 filed Critical 成都市华为赛门铁克科技有限公司
Publication of WO2010097019A1 publication Critical patent/WO2010097019A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks

Definitions

  • the present invention relates to the field of network management technologies, and in particular, to a method and apparatus for monitoring a locking mechanism. Background technique
  • the Network Configuration Protocol (NETCONF) is a protocol that provides network device configuration management and provides a mechanism for installing, operating, and deleting network device configurations.
  • the Common Open Policy Service Protocol Usage for Policy Provisioning (COPS-PR) is used to implement policy configuration of network devices.
  • COPS-PR Common Open Policy Service Protocol Usage for Policy Provisioning
  • both NETCONF and COPS-PR are used to configure network devices, and the objects of operation are the configuration data of network devices.
  • NETCONF and COPS-PR have a locking mechanism.
  • NETCONF or COPS-PR When NETCONF or COPS-PR operates on data, it will lock the data being manipulated. At this time, other processes in NETCONF or COPS-PR, or other protocols, will not be able to perform configuration operations on the locked data.
  • embodiments of the present invention provide a method and apparatus for monitoring a locking mechanism to improve the timeliness and accuracy of network management.
  • a method for monitoring a locking mechanism is applied to configuration management of a network device, the method comprising: obtaining data locking information of a network management protocol performing a locking operation, and recording data locking information of the network management protocol;
  • the data lock information of the network management protocol is saved.
  • a device for monitoring a locking mechanism is applied to configuration management of a network device, where the device includes: a recording unit, configured to obtain data locking information of a network management protocol that performs a locking operation, and record data locking information of the network management protocol;
  • the lock management information base MIB unit is configured to save data lock information of the network management protocol. It can be seen that embodiments of the present invention can provide detailed data lock information. The network administrator can decide on further operations, avoiding the blind search for the failure of the configuration operation, improving the accuracy of the problem and the efficiency of the work.
  • FIG. 1 is a flowchart of a method for monitoring a locking mechanism according to Embodiment 1 of the present invention
  • FIG. 2 is a flowchart of a method for a network administrator to apply a monitoring and locking mechanism according to an embodiment of the present invention
  • FIG. 3 is a schematic structural diagram of a locking MIB unit according to an embodiment of the present invention
  • FIG. 4 is a block diagram showing the structure of a device according to Embodiment 2 of the present invention.
  • Figure 5 is a block diagram showing the structure of a device according to a third embodiment of the present invention.
  • FIG. 6 is a structural block diagram of a device according to Embodiment 4 of the present invention.
  • Step 101 Obtain data lock information of a network management protocol that performs a lock operation, and record data lock information of the network management protocol.
  • Step 102 Save data lock information of the network management protocol.
  • embodiments of the present invention can provide detailed data lock information.
  • the network administrator can decide on further operations, avoiding the blind search for the failure of the configuration operation, improving the accuracy of the problem and the efficiency of the work.
  • the step shown in FIG. 1 may further include: reporting the network device data lock information.
  • the execution timing of reporting the data lock information of the network management protocol includes:
  • MIB Management Information Base
  • Obtaining and recording the data lock information of the network management protocol can be implemented in the following two ways:
  • the protocol for performing the locking operation increases the function of recording the data lock information to the lock MIB unit, so that the protocol performing the locking operation can record the data lock information to the lock MIB unit when the data of the network device is locked.
  • the lock MIB unit saves data lock information of the network management protocol;
  • the second way is: adding a proxy software, when a protocol performs a locking operation on the data of the network device, the proxy software can automatically recognize the protocol for performing the locking operation, and record the data locking information of the protocol performing the locking operation to Locking the MIB unit, the lock MIB unit saves data lock information of the network management protocol.
  • the operation performed by the agent software may be implemented by: the agent software listening to data of the network device where the network device is located, and tracking and obtaining the network management protocol for performing the locking operation when the data of the network device is locked.
  • the data lock information records the acquired data lock information to the lock MIB unit as a new record in the lock MIB unit, and the status of the new record is valid.
  • the agent software will lock the data when the data of the network device is unlocked
  • the status of the corresponding record in the MIB unit is set to invalid.
  • Steps 101 to 102 can be applied to the following two scenarios: First scenario: In order to know whether the specific data of the network device is locked by the network management protocol with data locking function, the network administrator may The search is performed in the lock MIB unit at any time, and it is judged whether the data of the network device has been locked according to the data lock information recorded by the lock MIB unit.
  • the second scenario when a network administrator fails to perform configuration operations on data of a network device through a specific protocol (such as a network management protocol), the specific protocol searches for a lock MIB unit to determine whether the reason for the configuration operation failure is a network device. Data is locked by a network management protocol with data locking capabilities.
  • a specific protocol such as a network management protocol
  • the above network management protocol with data locking function may include, but is not limited to: NETCONF or COPS-PR.
  • NETCONF or COPS-PR.
  • FIG. 2 a flowchart of a method provided by an embodiment of the present invention is applied to a network administrator, which may include the following steps:
  • Step 201 Before performing a configuration operation on the data of the network device, the network administrator may first find, in the lock MIB unit, whether the data of the network device is locked.
  • step 201 the network administrator can make an initial determination based on whether the data of the network device is locked.
  • the reason for the preliminary judgment is: When the network administrator searches in the lock MIB unit, the data of the network device has not been locked, and if the network administrator wants to perform further configuration operations on the data of the network device, When the configuration operation is performed on the data of the network device, the data of the network device may be locked again. Therefore, there is a certain time difference between performing the configuration operation and the network administrator searching in the lock MIB unit.
  • the network administrator After the network administrator has made a preliminary judgment, it can decide on further operations. For example: If the data of the network device has been locked by looking up the lock MIB unit, it may choose to wait for its unlocking or negotiate with the protocol that locks the data of the network device. If the data of the network device is not locked after searching for the lock MIB unit, the data operation of the network device may continue to be configured.
  • Step 202 The network administrator performs a configuration operation on the data of the network device by using a specific protocol, and the configuration operation fails.
  • Step 203 The specific protocol queries the lock MIB unit, and by querying the lock MIB unit, determining that the configuration operation fails is because the data is locked.
  • Step 204 The specific protocol reads data lock information of a protocol in the lock MIB unit that locks data of the network device, and generates error information according to the data lock information.
  • Step 205 The specific protocol reports the error information generated by the specific protocol.
  • the network administrator can take further measures according to the data lock information described in the error message. For example, you can choose to wait for the data of the network device to unlock and then perform a configuration operation on it.
  • Steps 202 to 205 are described below in conjunction with two application scenarios.
  • Application scenario 1 The case where different processes of the same protocol perform configuration operations on the same data. Assume that the first process of NETCONF performs a configuration operation on a network device, and NETCONF sets the network. Part of the data is locked. At this point, the second process of NETCONF also performs configuration operations on the locked data. Then the configuration operation of the second process of NETCONF will be invalid. The second process of NETCONF queries the lock MIB unit to determine that the operation failed because the data is locked. Then, the data lock information of the first process of the NETCONF is read from the lock MIB unit, the error information is generated, and the generated error information is reported to the network administrator.
  • Application Scenario 2 When different protocols perform configuration operations on the same data, only the Simple Network Management Protocol (SNMP) and NETCONF are used as an example. Assume that NETCONF has locked some of the data of the network device. At this time, SNMP performs configuration operations on the data locked by NETCONF, and the SNMP configuration operation fails. Because it is not the same protocol, SNMP is completely unaware of the reason why the configuration operation failed. Then the SNMP query locks the MIB unit to determine if the reason for the failure is that the data is locked.
  • SNMP Simple Network Management Protocol
  • NETCONF has locked some of the data of the network device.
  • SNMP performs configuration operations on the data locked by NETCONF, and the SNMP configuration operation fails. Because it is not the same protocol, SNMP is completely unaware of the reason why the configuration operation failed. Then the SNMP query locks the MIB unit to determine if the reason for the failure is that the data is locked.
  • the NETCONF data lock information is obtained from the lock MIB unit, detailed error information is generated, and the error information is returned to the network administrator.
  • the network administrator can choose to send a notification message to NETCONF to inform them to complete the operation as soon as possible. If the SNMP query locks the MIB unit and finds that the cause of the failure is not that the data is locked, the general error message is generated and returned to the network management shell.
  • the network administrator can query the lock MIB unit to know the usage of the data at any time.
  • the protocol can query whether the operation failure is caused by the data lock by querying the lock MIB unit. , if yes, get the relevant data lock information, and generate an error message to notify the administrator.
  • the network administrator can determine further operations based on the data lock information, avoiding the blind search for the failure of the configuration operation, improving the accuracy and efficiency of solving the problem, and facilitating unified management of multiple network management protocols.
  • FIG. 3 is a schematic structural diagram of a lock MIB unit according to an embodiment of the present invention.
  • the structure of the lock MIB unit can be divided into a main table and a plurality of sub-tables.
  • the master table is used to record general information about the locking mechanism of each protocol, and may include a protocol for performing a locking operation, a user name of a user who uses the protocol, a type of locking operation, a time to start locking, a time to end locking, and the like.
  • the secondary table is used to record specific information about the locking mechanism of each protocol.
  • the general information recorded by the primary table and the specific information recorded by the secondary table may provide detailed information that the data is locked, and the detailed information may include, but is not limited to, a network management protocol that locks the data, and the locking occurs. Time and so on. In this way, the network administrator can find out whether the data of the network device is locked by looking up the lock MIB unit, and the protocol for performing the configuration operation can determine whether the cause of the operation failure is the data being locked by the lookup lock MIB unit.
  • the records in the secondary table are associated with the primary table by index. For example: If the lock of the first row (index 1) in the primary table is NETCONF, the first row in the NETCONF secondary table also has a corresponding record, the same lock is recorded, and the index is 1. If the lock of the second row (index 2) in the primary table is COPS-PR, the first row of the COPS-PR secondary table also has a corresponding specific information record, and the index is 2.
  • the main table of the specific example includes seven domains, namely: index, user name, network management interface protocol, lock type, start time, end time, and lock status.
  • the index is the unique index value of each entry in the primary table
  • the username is the owner of an entry, which can be an application name, a hostname, or a combination of an application name and a hostname. If the owner of the entry is unknown, the entry is The value is empty;
  • the network management interface protocol indicates which protocol is set by an entry. If the lock represented by an entry is set by NETCONF, the value is "lockNetcon. If it is set by COPS-PR, the value is " lockCopsPr";
  • the lock type represents the type of lock and can be divided into a global lock or a partial lock
  • the start time is the system time when the entry is set, that is, the start time when the data is locked;
  • the end time is the system time when the entry is released, that is, the time when the data is locked.
  • the lock status indicates the current state of the lock recorded by the entry in which it is located.
  • the value "Active” indicates valid
  • the value "Failed” indicates that the lock request failed
  • the value "Done” indicates that the lock has been released.
  • the secondary table in the specific example includes the NETCONF secondary table and the COPS-PR secondary table.
  • the NETCONF subtable includes eight domains, namely: Netconf index, get session ID, Netconf lock ID, database object, expression type, expression, modification flag, release session ID.
  • the Netconf index uniquely identifies a Netconf entry whose value is the same as the index of the corresponding entry in the primary table, so that the primary table is associated with the Netconf secondary table.
  • the Netconf lock identifier is the unique identifier assigned by the Netconf Server to the Netconf lock recorded by the entry.
  • the Netconf lock identifier is different from all other Netconf locks;
  • Database objects represent database objects locked by Netconf locks. There are three main types in Netconf: Running and Candidate , Startup;
  • the expression type indicates the type of expression in which the Netconf lock is protected in the locked database.
  • XPath and Subtree There are two types of expressions supported by Netconf: XPath and Subtree;
  • the expression represents the specific expression of the protection scope of the Netconf lock in the locked database; the modification flag indicates whether the data protected by the Netconf lock has been modified, the value of "true” indicates that it has been modified, and the value of "false” indicates that it has not been modified;
  • the release session ID is the session ID that releases the Netconf lock.
  • the COPS-PR sub-list includes 10 domains, namely: COPS-PR index, Policy Execution Point Identifier (PEPID), Policy Decision Point Address (PDPAddr), Customer Status, Customer Handle, Customer Type, Installation Strategy, Delete Policy, Update the policy, modify the logo.
  • PEPID Policy Execution Point Identifier
  • PDPAddr Policy Decision Point Address
  • Customer Status Customer Handle
  • Customer Type Customer Type
  • Installation Strategy Delete Policy
  • Update the policy modify the logo.
  • the COPS-PR index uniquely identifies a COPS-PR entry whose value is the same as the index of the corresponding entry in the primary table, such that the primary table is associated with the COPS-PR secondary table;
  • PEPID uniquely identifies the policy enforcement point (PEP) of the locked data
  • PDPAddr is the IP address of the Policy Decision Point (PDP) that makes policy decisions on PEP to lock PEP data
  • the customer status indicates whether the current PEP and PDP support the type of client represented by the client type object at the same time
  • the customer type unique identifier indicates the policy data area on the locked PEP
  • the client handle uniquely identifies a PEP request
  • the installation strategy represents the specific strategy to be installed on the PEP
  • the deletion policy indicates the specific strategy to be deleted on the PEP
  • the update policy indicates the specific strategy to be updated on the PEP;
  • the modification flag indicates whether the data locked by the COPS-PR has been modified. A value of "true” indicates that it has been modified, and a value of "false” indicates that it has not been modified.
  • lock MIB unit is not limited thereto.
  • an SNMP sub-table can also be added. In this way, not only can the SNMP protocol have a data lock function, but also the SNMP data lock information can be recorded in the lock MIB unit.
  • the record in the lock MIB unit and the actual lock operation are to be synchronized, that is, when the data is locked, a corresponding record must be added in the lock MIB unit, if the record in the lock MIB unit is deleted, the actual lock The operation will fail, and the lock operation will be invalidated by unlocking the locked data.
  • a network administrator having a super-right authority capable of performing a delete operation on the lock MIB unit can forcibly delete records of locks that lock data for a long time, thereby releasing resources and effectively preventing maliciousness. A denial of service attack caused by locking data.
  • FIG. 4 it is a block diagram of a device structure according to Embodiment 2 of the present invention, which may include:
  • a recording unit 401 configured to obtain data locking information of a network management protocol that performs a locking operation, and record data locking information of the network management protocol;
  • the lock MIB unit 402 is configured to save data lock information of the network management protocol.
  • FIG. 5 is a structural block diagram of a device according to a third embodiment of the present invention.
  • the lock MIB unit 402 may include:
  • the main table unit 403 is configured to save the general information of the network management protocol that performs the locking operation
  • the sub-table unit 404 is configured to save the specific information of the network management protocol that performs the locking operation.
  • the data lock information includes general information and specific information, and the general information and the specific information are associated by an index.
  • the recording unit 401 may include:
  • the capturing unit 405 is configured to monitor the network device, acquire data lock information of a network management protocol performing a locking operation when data of the network device is locked, or access the network in the network management protocol When the data of the device performs the locking operation, obtaining data lock information of the network management protocol performing the locking operation;
  • the recording sub-unit 406 is configured to record data locking information of the network management protocol that performs the locking operation acquired by the obtaining unit 405.
  • the device may further include:
  • the reporting unit 407 is configured to report data locking information of the network management protocol.
  • the lock SMIB unit can provide detailed data lock information.
  • the network administrator can determine further operations based on the data lock information, avoiding the blind search for the failure of the configuration operation, improving the accuracy of the problem solving and the work efficiency, and facilitating the unified management of multiple network management protocols.
  • FIG. 6 is a structural block diagram of a device according to Embodiment 4 of the present invention.
  • the lock MIB unit 402 may further include:
  • the associating unit 408 is configured to associate the general information in the primary table unit 403 with the specific information in the secondary table unit 404 by an index.
  • the general information saved by the primary table unit 403 may include at least the following seven domains: an index, a username, a network management interface protocol, a lock type, a start time, an end time, and a lock state.
  • the sub-table unit 404 includes at least: a network configuration protocol NETCONF sub-table unit and/or a general policy service protocol for policy configuration COPS-PR sub-table units.
  • the NETCONF sub-table unit saves specific information in at least the following eight domains: a NETCONF index, a session identifier, a NETCONF lock identifier, a database object, an expression type, an expression, a modification flag, and a release session identifier;
  • the COPS-PR sub-table unit saves specific information including at least the following 10 domains:
  • COPS-PR index policy enforcement point identifier PE PID, policy decision point address PDPAddr, client status, client handle, client type, installation policy, delete policy, update policy, and modification flag.
  • PE PID policy enforcement point identifier
  • PDPAddr policy decision point address

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Description

一种监控锁定机制的方法及装置
本申请要求于 2009 年 2 月 25 日提交中国专利局、 申请号为 200910117814.2、 发明名称为"一种监控锁定机制的方法及装置"的中国专利申 请的优先权, 其全部内容通过引用结合在本申请中。
技术领域
本发明涉及网络管理技术领域,尤其涉及一种监控锁定机制的方法及装置。 背景技术
网络配置协议(NETCONF, Network Configuration Protocol )是一种提供 网络设备配置管理的协议, 提供了安装、 操作和删除网络设备配置的机制。 通 用策略服务协议( COPS-PR, Common Open Policy Service Protocol Usage for Policy Provisioning )用于实现网络设备的策略配置。 总的来说, NETCONF与 COPS-PR都用于对网络设备进行配置, 并且操作的对象都是网络设备的配置 数据。
NETCONF以及 COPS-PR具有锁定机制。 NETCONF或者 COPS-PR在对 数据进行操作时会将被操作的数据锁定, 此时, NETCONF或者 COPS-PR中 的其它进程, 或者其它协议将无法对被锁定的数据执行配置操作。
发明人在研究过程中, 发现上述对数据锁定的机制至少会造成如下问题: 对已被锁定的数据执行配置操作时,发生操作失败, 无法得知操作失败是否由 于数据被锁定, 网络管理员可能并不知道发生错误的真正原因或者详细信息, 很可能会盲目查找发生错误的原因或者详细信息, 从而严重影响了工作效率, 降低了解决问题的准确度。
发明内容
有鉴于此, 本发明实施例提供了一种监控锁定机制的方法及装置, 以提高 网络管理的时效性以及准确性。
一种监控锁定机制的方法,应用于网络设备的配置管理中,所述方法包括: 获得执行锁定操作的网络管理协议的数据锁定信息,记录所述网络管理协 议的数据锁定信息;
保存所述网络管理协议的数据锁定信息。
一种监控锁定机制的装置,应用于网络设备的配置管理中,所述装置包括: 记录单元, 用于获得执行锁定操作的网络管理协议的数据锁定信息,记录 所述网络管理协议的数据锁定信息;
锁管理信息库 MIB单元, 用于保存所述网络管理协议的数据锁定信息。 可以看出, 本发明实施例可以提供详细的数据锁定信息。 网络管理员可以 决定进一步的操作,避免了盲目查找配置操作失败的原因,提高了解决问题的 准确度以及工作效率。
附图说明
图 1为本发明实施例一提供的监控锁定机制的方法流程图;
图 2为网络管理员应用本发明实施例提供的监控锁定机制的方法流程图; 图 3为本发明实施例锁 MIB单元的结构示意图;
图 4为本发明实施例二装置结构框图;
图 5为本发明实施例三装置结构框图;
图 6为本发明实施例四装置结构框图。
具体实施方式
为了使本发明实施例的上述特征、优点更加明显易懂, 下面结合具体实施 方式进行详细说明。
请参考图 1 , 为本发明实施例一方法流程图, 可以包括以下步骤: 步骤 101 : 获得执行锁定操作的网络管理协议的数据锁定信息, 记录所述 网络管理协议的数据锁定信息;
步骤 102: 保存所述网络管理协议的数据锁定信息。
可以看出, 本发明实施例可以提供详细的数据锁定信息。 网络管理员可以 决定进一步的操作,避免了盲目查找配置操作失败的原因,提高了解决问题的 准确度以及工作效率。
可选地, 图 1所示步骤还可以进一步包括: 上报所述网络设备数据锁定信 息。
所述上报所述网络管理协议的数据锁定信息的执行时机包括:
周期性上 ·^艮所述网络管理协议的数据锁定信息;
或者, 当对所述网络设备的配置操作失败时, 上报所述网络管理协议的数 据锁定信息; 或者, 网络管理员进行查找时。
为了下文便于描述,将用于保存所述网络管理协议的数据锁定信息的模块 记为锁管理信息库(MIB, Management Information Base )单元。
获得并记录所述网络管理协议的数据锁定信息可以通过以下两种方式实 现:
第一种方式为: 执行锁定操作的协议增加可以将数据锁定信息记录到锁 MIB 单元的功能, 从而, 执行锁定操作的协议在锁定网络设备的数据时, 可 以将数据锁定信息记录到锁 MIB单元, 所述的锁 MIB单元保存所述网络管理 协议的数据锁定信息;
第二种方式为: 增加一个代理软件,在某协议对网络设备的数据执行锁定 操作时, 该代理软件可以自动识别出执行锁定操作的协议, 并将执行锁定操作 的协议的数据锁定信息记录到锁 MIB单元, 所述的锁 MIB单元保存所述网络 管理协议的数据锁定信息。
第二种方式中,代理软件执行的操作可以通过以下方式实现: 所述代理软 件对所在网络设备的数据进行监听, 当所在网络设备的数据被锁定时, 跟踪并 获取执行锁定操作的网络管理协议的数据锁定信息,将获取的数据锁定信息记 录到所述锁 MIB单元, 作为所述锁 MIB单元中一条新的记录, 并且该新的记 录的状态为有效。 当所在网络设备的数据被解锁时, 所述代理软件将所述锁
MIB单元中相应的记录的状态设置为无效。
还需要指出的是, 步骤 101至步骤 102可以应用在以下两种场景中: 第一种场景:网络管理员为了得知网络设备的特定数据是否被具有数据锁 定功能的网路管理协议锁定, 可以在任意时刻在锁 MIB单元中进行查找, 根 据锁 MIB单元记录的所述数据锁定信息判断网络设备的数据是否已被锁定。
第二种场景: 网络管理员通过特定协议(比如网络管理协议)对网络设备 的数据执行的配置操作发生失败时, 该特定协议查找锁 MIB单元, 以判断配 置操作失败的原因是否是网络设备的数据被具有数据锁定功能的网络管理协 议锁定。
上述具有数据锁定功能的网络管理协议可以包括但不限于: NETCONF或 者 COPS-PR。 请参考图 2, 为网络管理员应用本发明实施例提供的方法流程图, 可以包 括以下步骤:
步骤 201 : 网络管理员在对网络设备的数据执行配置操作之前, 可以先在 所述锁 MIB单元中查找该网络设备的数据是否被锁定;
在步骤 201中,网络管理员可以根据该网络设备的数据是否被锁定进行初 步判断。 进行初步判断的原因是: 当网络管理员在所述锁 MIB单元中进行查 找时, 该网络设备的数据还没有被锁定, 若网络管理员想要对该网络设备的数 据进一步执行配置操作, 在对该网络设备的数据执行配置操作时, 该网络设备 的数据可能又被锁定了, 因此, 执行配置操作与网络管理员在所述锁 MIB单 元中进行查找存在一定的时间差。
网络管理员进行了初步判断后, 可以决定进一步的操作。 例如: 如果经过 查找所述锁 MIB单元, 该网络设备的数据已经被锁定, 则可以选择等待其解 锁, 或者, 与将该网络设备的数据锁定的协议进行协商。 如果经过查找所述锁 MIB 单元, 该网络设备的数据没有被锁定, 可以继续对该网络设备的数据执 行配置操作。
若网络管理员继续对该网络设备的数据执行配置操作, 进入步骤 202。 步骤 202: 网络管理员通过特定协议对该网络设备的数据执行配置操作, 配置操作失败;
步骤 203: 该特定协议查询所述锁 MIB单元,通过查询所述锁 MIB单元, 判断出配置操作失败的原因是数据被锁定;
步骤 204: 该特定协议读取所述锁 MIB单元中锁定该网络设备的数据的 协议的数据锁定信息, 并根据所述数据锁定信息生成报错信息;
步骤 205: 该特定协议上报生成的所述报错信息。
网络管理员接收到报错信息后,可以根据报错信息中所述数据锁定信息采 取进一步的措施。 例如, 可以选择等待该网络设备的数据解锁, 再对其执行配 置操作。
下面结合两个应用场景对步骤 202至步骤 205进行说明。
应用场景一: 同一协议的不同进程对相同数据执行配置操作的情况。假设 NETCONF的第一进程对一台网络设备进行配置操作, NETCONF将该网络设 备的部分数据进行锁定。 此时, NETCONF的第二进程也要对被锁定的数据执 行配置操作。 则 NETCONF的第二进程的配置操作会失效。 NETCONF的第二 进程查询锁 MIB单元, 判断出操作失败的原因是数据被锁定。 则从锁 MIB单 元中读取 NETCONF的第一进程的数据锁定信息,生成报错信息,并将生成的 报错信息上报至网络管理员。
应用场景二: 不同协议对相同数据执行配置操作的情况,仅以筒单网络管 理协议(SNMP, Simple Network Management Protocol ) 以及 NETCONF为例 进行说明。假设 NETCONF已将网络设备的部分数据锁定。 此时, SNMP对被 NETCONF锁定的数据执行了配置操作, SNMP的配置操作失败。 由于是不相 同协议, SNMP完全不知道配置操作失败的原因。 则 SNMP查询锁 MIB单元 以判断失败原因是否是数据被锁定。 若通过查询锁 MIB单元判断出失败的原 因是数据被 NETCONF锁定, 则从锁 MIB单元中获取 NETCONF数据锁定信 息, 生成详细的报错信息, 并将报错信息返回给网络管理员。 网络管理员可以 选择向 NETCONF发送通知报文,通知其尽快完成操作。若 SNMP查询锁 MIB 单元后发现失效原因不是数据被锁定, 则生成一般报错信息返回给网络管理 贝。
可以看出, 网络管理员可以随时查询所述锁 MIB单元了解数据的使用情 况, 当执行配置操作的协议操作失败时, 该协议可通过查询所述锁 MIB单元 判断操作失败的原因是否是数据锁定, 如果是, 获取相关的数据锁定信息, 并 生成报错信息以通知管理员。网络管理员可以根据数据锁定信息决定进一步的 操作,避免了盲目查找配置操作失败的原因,提高了解决问题的准确度以及工 作效率, 而且, 便于对多个网络管理协议的统一管理。
请参考图 3 , 为本发明实施例锁 MIB单元的结构示意图。
所述锁 MIB单元的结构可以分为一个主表和多个副表。 主表用于记录各 协议的锁定机制的通用信息, 可以包括执行锁定操作的协议、使用该协议的用 户的用户名、 锁定操作的类型、 开始锁定的时间、 结束锁定的时间等。 副表用 于记录每个协议的锁定机制的特定信息。
主表记录的通用信息以及副表记录的特定信息可以提供数据被锁定的详 细信息, 该详细信息可以包括但不限于锁定数据的网络管理协议,锁定发生的 时间等等。 这样, 网络管理员可以通过查找锁 MIB单元, 得知网络设备的数 据是否被锁定, 执行配置操作的协议就可以通过查找锁 MIB单元判断发生操 作失败的原因是否是数据被锁定。
副表中的记录通过索引与主表相关联。 例如: 如果主表中第 1行(索引为 1 )记录的锁是 NETCONF的, 则在 NETCONF副表中第一行也有相应记录, 记录的是同一个锁, 索引为 1。 如果主表中第二行(索引为 2 )记录的锁是 COPS-PR的,则 COPS-PR副表的第一行也有相应特定信息记录,且索引为 2。
请参考如下针对所述锁 MIB单元的一个具体实例:
具体实例的主表包括 7个域, 分别是: 索引、 用户名、 网管接口协议、 锁 类型、 开始时间、 结束时间以及锁状态。
其中,
索引是主表中各表项的唯一索引值;
用户名是标识一个表项的拥有者, 可以是一个应用程序名,也可以是一台 主机名, 或者是应用程序名与主机名的组合, 如果该表项的拥有者未知, 则该 项的值为空;
网管接口协议表示一个表项所记录的锁由哪个协议设置的 ,如果一个表项 所表示的锁是由 NETCONF设置的,则值为 "lockNetcon ,如果是由 COPS-PR 设置的, 则值为 "lockCopsPr";
锁类型代表锁的类型, 可以分为全局锁或者部分锁;
开始时间是该表项被设置时的系统时间,也就是说, 是数据被锁定的开始 时间;
结束时间是该表项被释放时的系统时间,也就说是, 是数据被结束锁定的 时间;
锁状态表示其所在表项所记录的锁的当前状态, 值为" Active"表示有效, 值为" Failed"表示锁请求失败, 值为" Done"表示锁已被释放。
具体实例中的副表包括 NETCONF副表以及 COPS-PR副表。
NETCONF副表包括 8个域,分别为: Netconf索引,获取会话标识, Netconf 锁标识, 数据库对象, 表达式类型, 表达式, 修改标志, 释放会话标识。
其中, Netconf 索引唯一标识一个 Netconf 表项, 其值与主表中对应表项的索引 值相同, 这样主表和 Netconf副表相关联;
获取会话标识表示获取并占有该表项所记录的数据锁定信息的会话标识;
Netconf锁标识是由 Netconf Server分配给该表项所记录的 Netconf锁的唯 一标识, 该 Netconf锁标识区别于所有其他 Netconf锁;
数据库对象表示 Netconf锁锁定的数据库对象, 在 Netconf 中, 主要有三 种: Running和 Candidate , Startup;
表达式类型表示 Netconf锁在所锁定的数据库中保护范围的表达式类型, 目前 Netconf支持的表达式类型有两种: XPath和 Subtree;
表达式表示 Netconf锁在所锁定数据库中的保护范围的具体表达式; 修改标志表示 Netconf 锁所保护的数据是否已被修改, 值为" true"表示已 修改, 值为" false"表示未修改;
释放会话标识是释放 Netconf锁的会话标识。
COPS-PR副表包括 10个域, 分别为: COPS-PR索引, 策略执行点标识 符(PEPID ), 策略决定点地址(PDPAddr ), 客户状态, 客户句柄, 客户类型, 安装策略, 删除策略, 更新策略, 修改标志。
其中,
COPS-PR索引唯一标识一个 COPS-PR表项,其值与主表中对应表项的索 引值相同, 这样主表和 COPS-PR副表相关联;
PEPID唯一标识被锁定数据的策略执行点 ( PEP );
PDPAddr是对 PEP作出策略决定,使 PEP数据被锁定的策略决定点( PDP ) 的 IP地址;
客户状态表示当前 PEP和 PDP是否同时支持客户类型对象所表示的客户 类型;
客户类型唯一标识表示所锁定的 PEP上的策略数据区域;
客户句柄唯一标识一个 PEP请求;
安装策略表示要在 PEP上安装的具体策略;
删除策略表示要在 PEP上删除的具体策略;
更新策略表示要在 PEP上更新的具体策略; 修改标志表示 COPS-PR锁定的数据是否已被修改, 值为" true"表示已修 改, 值为" false"表示未修改。
需要指出的是, 所述锁 MIB单元的定义形式不局限于此。 例如: 在上述 具体实例的基础上, 还可以添加 SNMP副表, 这样, 不仅可以使 SNMP协议 也具有数据锁定功能, 还可以在所述锁 MIB单元中记录 SNMP的数据锁定信 息。
所述锁 MIB单元中的记录和实际的锁定操作要保持同步, 即在锁定数据 时, 所述锁 MIB单元中必须添加相应的记录, 如果所述锁 MIB单元中的记录 被删除, 实际的锁定操作将失效, 锁定操作失效相当于将锁定的数据解锁。
因此, 如果所述锁 MIB单元中一条有效记录被删除, 与该条记录相关的 实际操作将会中止。 利用所述锁 MIB单元的上述特性, 具有超级权限的能够 对所述锁 MIB单元执行删除操作的网络管理员可以强制删除一些长时间锁定 数据的锁的记录, 进而可以释放资源,有效防止了恶意锁定数据导致的拒绝服 务攻击。
请参考图 4, 为本发明实施例二装置结构框图, 可以包括:
记录单元 401 , 用于获得执行锁定操作的网络管理协议的数据锁定信息, 记录所述网络管理协议的数据锁定信息;
锁 MIB单元 402, 用于保存所述网络管理协议的数据锁定信息。
请参考图 5 , 为本发明实施例三装置结构框图。
在图 4的基础上, 优选地, 所述锁 MIB单元 402可以包括:
主表单元 403 , 用于保存所述执行锁定操作的网络管理协议的通用信息; 副表单元 404, 用于保存所述执行锁定操作的网络管理协议的特定信息。 其中, 所述数据锁定信息包括通用信息以及特定信息, 所述通用信息和特 定信息通过索引相关联。
优选地, 所述记录单元 401可以包括:
菝取单元 405 , 用于对所述网络设备进行监听, 当所述网络设备的数据被 锁定时, 获取执行锁定操作的网络管理协议的数据锁定信息; 或者在所述网络 管理协议对所述网络设备的数据执行锁定操作时,获得执行锁定操作的网络管 理协议的数据锁定信息; 记录子单元 406, 用于记录所述获取单元 405获取的所述执行锁定操作的 网络管理协议的数据锁定信息。
可选地, 该装置还可以包括:
上报单元 407 , 用于上报网络管理协议的数据锁定信息。
可以看出, 锁 SMIB单元可以提供详细的数据锁定信息。 网络管理员可以 根据数据锁定信息决定进一步的操作, 避免了盲目查找配置操作失败的原因, 提高了解决问题的准确度以及工作效率, 便于对多个网络管理协议的统一管 理。
请参考图 6, 为本发明实施例四装置结构框图。
优选地, 在图 5的基础上, 所述锁 MIB单元 402还可以包括:
关联单元 408 , 用于将所述主表单元 403中的通用信息与副表单元 404中 特定信息通过索引相关联。
其中, 所述主表单元 403保存的通用信息, 至少可以包括以下 7个域: 索 引、 用户名、 网管接口协议、 锁类型、 开始时间、 结束时间以及锁状态。
所述副表单元 404至少包括: 网络配置协议 NETCONF副表单元和 /或通 用策略服务协议用于策略配置 COPS-PR副表单元。
所述 NETCONF 副表单元将特定信息保存在至少包括以下 8 个域: NETCONF索引, 获取会话标识, NETCONF锁标识, 数据库对象, 表达式类 型, 表达式, 修改标志以及释放会话标识;
所述 COPS-PR 副表单元将特定信息保存的至少包括以下 10 个域:
COPS-PR索引, 策略执行点标识符 PE PID, 策略决定点地址 PDPAddr, 客户 状态, 客户句柄, 客户类型, 安装策略, 删除策略, 更新策略以及修改标志。
最后, 还需要说明的是, 在本文中, 诸如第一和第二等之类的关系术语仅 仅用来将一个实体或者操作与另一个实体或操作区分开来,而不一定要求或者 暗示这些实体或操作之间存在任何这种实际的关系或者顺序。 而且, 术语"包 括"、 "包含"或者其任何其他变体意在涵盖非排他性的包含, 从而使得包括一 系列要素的过程、 方法、 物品或者设备不仅包括那些要素, 而且还包括没有明 确列出的其他要素, 或者是还包括为这种过程、 方法、 物品或者设备所固有的 要素。 在没有更多限制的情况下, 由语句 "包括一个 ...... "限定的要素, 并不排 除在包括所述要素的过程、 方法、 物品或者设备中还存在另外的相同要素。 通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到本发明 可借助软件加必需的硬件平台的方式来实现, 当然也可以全部通过硬件来 实施, 但很多情况下前者是更佳的实施方式。 基于这样的理解, 本发明的 技术方案对背景技术做出贡献的全部或者部分可以以软件产品的形式体现 出来, 该计算机软件产品可以存储在存储介质中, 如 ROM/RAM、 磁碟、 光盘等, 包括若干指令用以使得一台计算机设备 (可以是个人计算机, 服 务器, 或者网络设备等)执行本发明各个实施例或者实施例的某些部分所 述的方法。
以上对本发明实施例进行了详细介绍, 本文中应用了具体个例对本发 明的原理及实施方式进行了阐述, 以上实施例的说明只是用于帮助理解本 发明的方法及其核心思想; 同时, 对于本领域的一般技术人员, 依据本发 明的思想, 在具体实施方式及应用范围上均会有改变之处, 综上所述, 本 说明书内容不应理解为对本发明的限制。

Claims

权 利 要 求
1、 一种监控锁定机制的方法, 应用于网络设备的配置管理中, 其特征在 于, 所述方法包括:
获得执行锁定操作的网络管理协议的数据锁定信息,记录所述网络管理协 议的数据锁定信息;
保存所述网络管理协议的数据锁定信息。
2、 根据权利要求 1所述的监控锁定机制的方法, 其特征在于: 所述数据 锁定信息包括:
通用信息以及特定信息, 所述通用信息和特定信息通过索引相关联。
3、 根据权利要求 2所述的监控锁定机制的方法, 其特征在于, 所述通用 信息保存于预置的主表中, 所述特定信息保存于预置的副表中, 所述主表和副 表通过索引相关联。
4、根据权利要求 1至 3任一项所述的监控锁定机制的方法, 其特征在于, 所述获得执行锁定操作的网络管理协议的数据锁定信息包括:
对所述网络设备进行监听;
当所述网络设备的数据被锁定时,获取执行锁定操作的网络管理协议的数 据锁定信息。
5、根据权利要求 1至 3任一项所述的监控锁定机制的方法, 其特征在于, 所述获得执行锁定操作的网络管理协议的数据锁定信息包括:
当所述网络管理协议对所述网络设备的数据执行锁定操作时,获得执行锁 定操作的网络管理协议的数据锁定信息。
6、根据权利要求 1至 3任一项所述的监控锁定机制的方法, 其特征在于, 该方法还包括:
上报所述网络管理协议的数据锁定信息。
7、 根据权利要求 6所述的监控锁定机制的方法, 其特征在于, 所述上报 所述网络管理协议的数据锁定信息的执行时机包括:
周期性上 ·^艮所述网络管理协议的数据锁定信息;
或者, 当对所述网络设备的配置操作失败时, 上报所述网络管理协议的数 据锁定信息。
8、 根据权利要求 3所述的监控锁定机制的方法, 其特征在于: 所述主表至少包括以下 7个域: 索引、 用户名、 网管接口协议、 锁类型、 开始时间、 结束时间以及锁状态。
9、 根据权利要求 3所述的监控锁定机制的方法, 其特征在于, 所述副表 包括: 网络配置协议 NETCONF 副表和 /或通用策略服务协议用于策略配置
COPS-PR副表。
10、 根据权利要求 9所述的监控锁定机制的方法, 其特征在于, 所述 NETCONF副表至少包括以下 8个域: NETCONF索引, 获取会话标 识, NETCONF锁标识, 数据库对象, 表达式类型, 表达式, 修改标志以及释 放会话标识;
所述 COPS-PR副表至少包括以下 10个域: COPS-PR索引, 策略执行点 标识符 PEPID, 策略决定点地址 PDPAddr, 客户状态, 客户句柄, 客户类型, 安装策略, 删除策略, 更新策略以及修改标志。
11、 一种监控锁定机制的装置, 应用于网络设备的配置管理中, 其特征在 于, 所述装置包括:
记录单元, 用于获得执行锁定操作的网络管理协议的数据锁定信息,记录 所述网络管理协议的数据锁定信息;
锁管理信息库 MIB单元, 用于保存所述网络管理协议的数据锁定信息。
12、 根据权利要求 11所述的监控锁定机制的装置, 其特征在于: 所述数据锁定信息包括所述执行锁定操作的网络管理协议的通用信息以 及特定信息, 其中, 所述通用信息和特定信息通过索引相关联;
所述锁 MIB单元包括:
主表单元, 用于保存所述执行锁定操作的网络管理协议的通用信息; 副表单元, 用于保存所述执行锁定操作的网络管理协议的特定信息。
13、 根据权利要求 12所述的监控锁定机制的装置, 其特征在于: 所述锁
MIB单元还包括:
关联单元,用于将所述主表单元中的通用信息与副表单元中特定信息通过 索引相关联。
14、根据权利要求 11至 13任一项所述的监控锁定机制的装置, 其特征在 于, 所述记录单元包括:
获取单元, 用于对所述网络设备进行监听, 当所述网络设备的数据被锁定 时, 获取执行锁定操作的网络管理协议的数据锁定信息; 或者在所述网络管理 协议对所述网络设备的数据执行锁定操作时,获得执行锁定操作的网络管理协 议的数据锁定信息;
记录子单元,用于记录所述获取单元获取的所述执行锁定操作的网络管理 协议的数据锁定信息。
15、根据权利要求 11至 13任一项所述的监控锁定机制的装置, 其特征在 于: 该装置还包括:
上报单元, 用于上报网络管理协议的数据锁定信息。
PCT/CN2010/070410 2009-02-25 2010-01-29 一种监控锁定机制的方法及装置 WO2010097019A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN2009101178142A CN101505248B (zh) 2009-02-25 2009-02-25 一种监控锁定机制的方法及装置
CN200910117814.2 2009-02-25

Publications (1)

Publication Number Publication Date
WO2010097019A1 true WO2010097019A1 (zh) 2010-09-02

Family

ID=40977328

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2010/070410 WO2010097019A1 (zh) 2009-02-25 2010-01-29 一种监控锁定机制的方法及装置

Country Status (2)

Country Link
CN (1) CN101505248B (zh)
WO (1) WO2010097019A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3823213A4 (en) * 2018-07-27 2021-09-08 Huawei Technologies Co., Ltd. NETWORK MANAGEMENT METHOD AND APPARATUS
CN113656490A (zh) * 2020-05-12 2021-11-16 华为技术有限公司 一种数据同步的方法、装置、终端以及存储介质

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101505248B (zh) * 2009-02-25 2012-04-04 成都市华为赛门铁克科技有限公司 一种监控锁定机制的方法及装置
CN105511967A (zh) * 2015-12-28 2016-04-20 曙光云计算技术有限公司 用于云平台的资源对象的管理方法和装置
US12069104B2 (en) * 2022-02-25 2024-08-20 Red Hat, Inc. Dynamic management of role-based access control systems

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6119156A (en) * 1998-04-27 2000-09-12 Xerox Corporation Locking mechanism for network-managed agents in a digital printing system
US20030061192A1 (en) * 2001-09-24 2003-03-27 Mcgunn Edward J. Method and system for communicating lock information
CN1834957A (zh) * 2005-03-17 2006-09-20 华为技术有限公司 一种数据库多表信息初始化方法
CN1984354A (zh) * 2006-04-13 2007-06-20 华为技术有限公司 对用户帐户资源进行管理的方法和装置
CN101026483A (zh) * 2006-02-20 2007-08-29 华为技术有限公司 一种WiMAX系统中的基站空闲资源获取方法
CN101505248A (zh) * 2009-02-25 2009-08-12 成都市华为赛门铁克科技有限公司 一种监控锁定机制的方法及装置

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2308776B (en) * 1995-12-28 1998-06-24 Nokia Telecommunications Oy Telecommunications network management method and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6119156A (en) * 1998-04-27 2000-09-12 Xerox Corporation Locking mechanism for network-managed agents in a digital printing system
US20030061192A1 (en) * 2001-09-24 2003-03-27 Mcgunn Edward J. Method and system for communicating lock information
CN1834957A (zh) * 2005-03-17 2006-09-20 华为技术有限公司 一种数据库多表信息初始化方法
CN101026483A (zh) * 2006-02-20 2007-08-29 华为技术有限公司 一种WiMAX系统中的基站空闲资源获取方法
CN1984354A (zh) * 2006-04-13 2007-06-20 华为技术有限公司 对用户帐户资源进行管理的方法和装置
CN101505248A (zh) * 2009-02-25 2009-08-12 成都市华为赛门铁克科技有限公司 一种监控锁定机制的方法及装置

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3823213A4 (en) * 2018-07-27 2021-09-08 Huawei Technologies Co., Ltd. NETWORK MANAGEMENT METHOD AND APPARATUS
CN113656490A (zh) * 2020-05-12 2021-11-16 华为技术有限公司 一种数据同步的方法、装置、终端以及存储介质
CN113656490B (zh) * 2020-05-12 2024-01-30 华为技术有限公司 一种数据同步的方法、装置、终端以及存储介质

Also Published As

Publication number Publication date
CN101505248B (zh) 2012-04-04
CN101505248A (zh) 2009-08-12

Similar Documents

Publication Publication Date Title
US9906527B2 (en) Device blocking tool
US9912546B2 (en) Component detection and management using relationships
US8479048B2 (en) Root cause analysis method, apparatus, and program for IT apparatuses from which event information is not obtained
US8406140B2 (en) Network device inventory system
US8001228B2 (en) System and method to dynamically extend a management information base using SNMP in an application server environment
WO2009100632A1 (zh) 设备管理的方法和终端、装置、系统
US20070195781A1 (en) Equipment managing device, equipment searching program, and recording medium
WO2010097019A1 (zh) 一种监控锁定机制的方法及装置
US9553891B1 (en) Device blocking tool
US20190056975A1 (en) Virtualized network function manager determining method and network functions virtualization orchestrator
US20090319661A1 (en) Cluster node control apparatus of file server
US10374870B2 (en) Efficient access control for trigger events in SDN
WO2010043175A1 (zh) 基于权限控制的终端管理方法及装置
CN101232509A (zh) 支持隔离模式的网络接入控制方法、系统及设备
EP2811691B1 (en) Method and device for synchronizing network data flow detection status
US7917636B2 (en) System and method for detecting unused accounts in a distributed directory service
KR100532339B1 (ko) 클러스터형 컴퓨터 시스템에서 그룹을 액세스하는 방법 및 장치와 컴퓨터 판독 가능한 기록 매체
WO2010031343A1 (zh) 一种授权控制的方法、装置和系统
WO2008089616A1 (fr) Serveur, système réseau p2p et procédé d'acheminement et de transfert de l'affectation de la clé de ressource de ce dernier.......
WO2007059667A1 (fr) Procede d'obtention de donnees d'alarme des elements de reseau
WO2005088905A1 (fr) Procede pour gerer une base d'informations de gestion dans un systeme de gestion de reseau
EP2613264B1 (en) Management device, management program and management method for managing overlay networks
US9628480B2 (en) Device blocking tool
WO2012167660A1 (zh) 一种获取cim资源的方法和装置
US8676972B2 (en) Method and system for a network management console

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 10745803

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 10745803

Country of ref document: EP

Kind code of ref document: A1