WO2016202025A1 - Procédé et appareil de traitement de message trap - Google Patents

Procédé et appareil de traitement de message trap Download PDF

Info

Publication number
WO2016202025A1
WO2016202025A1 PCT/CN2016/076645 CN2016076645W WO2016202025A1 WO 2016202025 A1 WO2016202025 A1 WO 2016202025A1 CN 2016076645 W CN2016076645 W CN 2016076645W WO 2016202025 A1 WO2016202025 A1 WO 2016202025A1
Authority
WO
WIPO (PCT)
Prior art keywords
trap
discarding
packet
rule
message
Prior art date
Application number
PCT/CN2016/076645
Other languages
English (en)
Chinese (zh)
Inventor
李伟东
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2016202025A1 publication Critical patent/WO2016202025A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0604Management of faults, events, alarms or notifications using filtering, e.g. reduction of information by using priority, element types, position or time
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks

Definitions

  • the present invention relates to the field of communications, and in particular, to a trap Trap message processing method and apparatus.
  • the network management system is mainly responsible for network alarm management, security management, configuration management, etc. Among them, alarm management plays a very important role in the normal operation of network maintenance.
  • the network element In the current network communication device field, when the network element is abnormal due to environmental impact or hardware failure, it needs to be reported to the network management system by means of an alarm.
  • the alarm information of the device In view of the simplicity and maturity of the Simple Network Management System (SNMP) protocol, it is widely used by major equipment providers.
  • the alarm information of the device is sent to the NMS through the SNMP trap trap.
  • the NMS analyzes the Trap packets as alarm data.
  • the network management system receives a large number of Trap packets from the network.
  • the Trap packets that have little or no impact on the service are received and parsed by the NMS.
  • the computing resources, and too many unnecessary Trap packets will fill the alarm service processing buffer pool, resulting in the loss of important alarms. Therefore, the discarding of unnecessary Trap packets is an indispensable part.
  • the alarm discarding processing technology in the related art mainly uses the Trap packet to be reported to the network management system after being parsed by the protocol stack, and then mapped to the service alarm information in the system, and then discarded according to the service filtering rule, and the protocol stack is notified to the SNMP Trap.
  • UDP User Datagram Protocol
  • the process of the service mapping and other processes in the subsequent process wastes system resources, and the amount of wasted is proportional to the number of useless Trap packets.
  • the alarm discarding rule configured by the user through the network management system can only be accurate to the alarm code. If the Trap packet with special attribute value is not discarded for the network management system, it is discarded. Traps with special attribute values are not discarded when they are sent to an alarm code, and others are discarded. Therefore, in the related art, there is a problem that a useful Trap packet is discarded and a Trap packet has a high discard rate.
  • the present invention provides a method and a device for processing trap traps, so as to at least solve the problem that the traps of the traps are discarded due to the use of the traps of the traps in the related art. High problem.
  • a trap Trap packet processing method including: receiving a Trap message for identifying device alarm information; and matching the Trap message with a discarding rule for discarding Trap messages.
  • the Trap message is processed according to the matching result.
  • the discarding rule includes at least one of the following: discarding the Trap message identified by the pre-configured Trap object identifier OID; discarding the pre-configured Trap object identifier OID, and the packet attribute is the first predetermined attribute. The value of the Trap packet is discarded. The Trap packet whose identifier is not the second predetermined attribute value is discarded.
  • the method before receiving the Trap message for identifying the device alarm information, the method further includes: parsing the discarding rule; and generating a discarding rule with a predetermined memory structure according to the parsed discarding rule.
  • the matching the Trap packet with the discarding rule for discarding the Trap packet includes: parsing the original protocol layer structure of the Trap packet; and parsing the parsed Trap packet with the predetermined The discard rules of the memory structure are matched.
  • the processing of the Trap packet according to the matching result includes: discarding the Trap packet when the Trap packet matches the discarding rule; and/or, when the Trap packet is If the discarding rule does not match, the Trap packet is mapped to the alarm information; and the alarm information is sent to an upper layer module for processing the alarm information.
  • a trap trap message processing apparatus including: a receiving module, configured to receive a Trap message for identifying device alarm information; and a matching module configured to set the Trap message with The discarding rule for discarding the Trap packet is matched.
  • the processing module is configured to process the Trap packet according to the matching result.
  • the discarding rule includes at least one of the following: discarding the Trap message identified by the pre-configured Trap object identifier OID; discarding the pre-configured Trap object identifier OID, and the packet attribute is the first predetermined attribute. The value of the Trap packet is discarded. The Trap packet whose identifier is not the second predetermined attribute value is discarded.
  • the apparatus further includes: a parsing module configured to parse the discarding rule; and a generating module configured to generate a discarding rule having a predetermined memory structure according to the parsed discarding rule.
  • the matching module includes: a parsing unit configured to perform original protocol layer structure parsing on the Trap packet; and a matching unit configured to parse the parsed Trap message and the discard with a predetermined memory structure The rules are matched.
  • the processing module includes: a discarding unit, configured to discard the Trap packet when the Trap packet matches the discarding rule; and/or, the mapping unit is set to be the Trap The packet is mapped to the alarm information when the packet does not match the discarding rule.
  • the sending unit is configured to send the alarm information to an upper module for processing the alarm information.
  • the Trap message is used to identify the alarm information of the device, and the Trap message is matched with the discarding rule for discarding the Trap message.
  • the Trap message is processed according to the matching result.
  • the useful Trap packets in the related art are discarded by the use of the traps.
  • the trap rate of the Trap packets is high.
  • FIG. 1 is a flowchart of a method for processing a trap trap message according to an embodiment of the present invention
  • FIG. 2 is a structural block diagram of a trap trap message processing apparatus according to an embodiment of the present invention.
  • FIG. 3 is a block diagram showing a preferred structure of a trap trap message processing apparatus according to an embodiment of the present invention
  • FIG. 4 is a structural block diagram of a matching module 24 in a trap Trap message processing apparatus according to an embodiment of the present invention
  • FIG. 5 is a structural block diagram of a processing module 26 in a trap Trap message processing apparatus according to an embodiment of the present invention
  • FIG. 6 is a structural block diagram of a Trap packet discarding process according to an embodiment of the present invention.
  • FIG. 7 is a flowchart of determining, by using a Trap OID and an attribute, to discard a specific Trap message according to an embodiment of the present invention
  • FIG. 8 is a flowchart of determining, by using a Trap OID and an attribute exception, to discard a specific Trap message according to an embodiment of the present invention.
  • FIG. 1 is a flowchart of a method for processing a trap Trap message according to an embodiment of the present invention. As shown in FIG. 1 , the process includes the following steps:
  • Step S102 Receive a Trap message for identifying device alarm information.
  • Step S104 Match the Trap message with the discarding rule for discarding the Trap message.
  • Step S106 The Trap message is processed according to the matching result.
  • the Trap packet is matched with the discarding rule when the Trap packet is discarded.
  • the alarm code corresponding to the Trap packet is matched with the discarding rule in the related art.
  • the matching is more detailed. You can determine whether to discard the traps based on the characteristics of the Trap text. Therefore, the problem that the useful Trap packets in the related art are flooded by the useless Trap packets is discarded, and the error rate of the Trap packets is high, thereby reducing the false discard rate of the Trap packets. Effect.
  • the discarding rule includes at least one of the following: discarding the Trap message identified by the pre-configured Trap object identifier OID; discarding the pre-configured Trap object identifier OID, and the packet attribute is The Trap message of the first predetermined attribute value is discarded; the Trap message whose identifier is not the second predetermined attribute value is discarded by the pre-configured Trap object identifier OID.
  • the latter two discarding rules not only consider the Trap OID of the Trap packet, but also consider the attribute value of the Trap packet, which further improves the accuracy of discarding the Trap packet.
  • the above-mentioned discarding rules are exemplified by the following rules.
  • the discarding rule has a finer granularity, which solves the problem that the discarding granularity of the Trap packet is high due to the excessive discarding granularity in the related art, and effectively reduces the Trap packet. False discard rate.
  • the method before receiving the Trap message for identifying the device alarm information, the method further includes: parsing the discarding rule; and generating a discarding rule with a predetermined memory structure according to the parsed discarding rule.
  • the discarding rule is processed into a discarding rule with a predetermined memory structure, which can be more easily matched with the Trap packet.
  • the matching of the Trap message with the discarding rule for discarding the Trap message includes: parsing the original protocol layer structure of the Trap message; and parsing the Trap message and having the predetermined memory. The structure's drop rules are matched.
  • the processing of the Trap packet according to the matching result includes: discarding the Trap packet when the Trap packet matches the discarding rule; and/or, when the Trap packet and the discarding rule If the packet is not matched, the trap message is mapped to the alarm information; the alarm information is sent to the upper layer module for processing the alarm information. That is, when the Trap OID of the Trap packet or the Trap OID of the Trap packet and the attribute value are the same as those specified in the discarding rule, the Trap packet should be discarded, and the discarding process is performed on the trap packet. Otherwise, the Trap packet has a certain meaning to the network management system and should not be discarded. The alarm information mapped from the Trap packet is sent to the upper module for processing.
  • the method according to the above embodiment can be implemented by means of software plus a necessary general hardware platform, and of course, by hardware, but in many cases, the former is A better implementation.
  • the technical solution of the present invention which is essential or contributes to the prior art, may be embodied in the form of a software product stored in a storage medium (such as ROM/RAM, disk,
  • the optical disc includes a number of instructions for causing a terminal device (which may be a cell phone, a computer, a server, or a network device, etc.) to perform the methods described in various embodiments of the present invention.
  • a trap trap message processing device is also provided, which is used to implement the foregoing embodiments and preferred embodiments, and details are not described herein.
  • the term "module” may implement a combination of software and/or hardware of a predetermined function.
  • the apparatus described in the following embodiments is preferably implemented in software, hardware, or a combination of software and hardware, is also possible and contemplated.
  • FIG. 2 is a structural block diagram of a trap trap message processing apparatus according to an embodiment of the present invention. As shown in FIG. 2, the apparatus includes a receiving module 22, a matching module 24, and a processing module 26. The apparatus will be described below.
  • the receiving module 22 is configured to receive a Trap message for identifying the device alarm information
  • the matching module 24 is connected to the receiving module 22, and is configured to match the Trap message with the discarding rule for discarding the Trap message; 26, connected to the matching module 24, configured to process the Trap message according to the matching result.
  • the discarding rule includes at least one of the following: discarding the Trap message identified by the pre-configured Trap object identifier OID; discarding the pre-configured Trap object identifier OID, and the packet attribute is the first predetermined attribute value.
  • the Trap packet is discarded.
  • the Trap packet whose identifier is not the second predetermined attribute value is discarded.
  • FIG. 3 is a block diagram of a preferred structure of a trap trap message processing apparatus according to an embodiment of the present invention. As shown in FIG. 3, the apparatus includes a parsing module 32 and a generating module 34, in addition to all the modules shown in FIG. The device will be described.
  • the parsing module 32 is configured to parse the discarding rule; the generating module 34 is connected to the parsing module 32 and the receiving module 22, and is configured to generate a discarding rule having a predetermined memory structure according to the parsed discarding rule.
  • the matching module 24 includes a parsing unit 42 and a matching unit 44, and the matching module 24 is performed below. Description.
  • the parsing unit 42 is configured to perform original protocol layer structure parsing on the Trap packet, and the matching unit 44 is connected to the parsing unit 42 and configured to match the parsed Trap message with a discarding rule having a predetermined memory structure.
  • FIG. 5 is a structural block diagram of a processing module 26 in a trap Trap message processing apparatus according to an embodiment of the present invention. As shown in FIG. 5, the processing module 26 includes a discarding unit 52, and/or a mapping unit 54, a transmitting unit 56, and The processing module 26 will be described.
  • the discarding unit 52 is configured to: when the trap packet matches the discarding rule, discard the trap packet; and/or, the mapping unit 54 is configured to map the trap packet when the trap packet does not match the discarding rule.
  • the sending unit 56 is connected to the mapping unit 54 and configured to send the alarm information to an upper module for processing the alarm information.
  • a method for discarding based on SNMP Trap packets is provided, so that the discarding behavior occurs before entering the service layer processing, and does not distinguish the device, and is effective for the entire network.
  • FIG. 6 is a block diagram of a Trap packet discarding process according to an embodiment of the present invention.
  • the discarding rule parser 62 the receiving module 22 and the parsing unit 42 described above
  • the Trap packet parsing processor 64 are included.
  • the above-described parsing module 32 and generating module 34), discarding processor 66 (same as discarding unit 52 described above), and reporting transmitter 68 (same as mapping unit 54 and transmitting unit 56 described above) will be described below.
  • the discard rule parser 62 parses the preset alarm discarding rule (same as the discarding rule described above) into a data structure in the system memory.
  • the Trap packet parsing processor 64 receives a trap packet from the Trap receiving port of the network management system, and parses the packet data structure according to the protocol format.
  • the discarding processor 66 quickly matches the features in the Trap message according to the discarding rule. Discards the packets that match the successful traps.
  • the report transmitter 68 converts the Trap packet that has not been discarded into the alarm information of the network management system by mapping and the like, and pushes it to the upper layer processing module of the network management system.
  • the Trap message parsing processor 64, the discarding rule parser 62, and the discarding processor 66 can be directly located in the SNMP. In the protocol stack, this is the most efficient.
  • a method for discarding a Trap packet including the following steps:
  • Step A parsing the preset alarm discarding rule into a data structure in the system memory
  • Step B Receive a Trap packet from the Trap receiving port of the NMS, and parse the packet data structure according to the protocol format.
  • Step C Quickly match the features in the Trap packet according to the discarding rule, and discard the successfully matched Trap packet.
  • Step D The Trap message that has not been discarded is converted into the alarm information in the network management system by the mapping process, and is sent to the upper layer processing module of the network management system.
  • the method for customizing the alarm discarding rule in the embodiment of the present invention is to configure the alarm discarding rule of the network management system based on the Trap packet structure, and the alarm is discarded according to the protocol packet field before the alarm enters the service layer processing, and the service discarding rule is not required.
  • the value of the Trap OID that discards the Trap packets is discarded.
  • the Trap OID of the Trap packet is configured, and the attribute OID of the specified location in the attribute area structure or the regular expression of the importance value is configured (the packet attribute is the first predetermined attribute value). All traps that match the Trap OID and have the attribute OID or match the regular expression value are discarded.
  • the Trap OID of the Trap packet is configured, and the Trap packet with the Trap OID is not the same as the Trap message.
  • the exception is specified by the matching configuration regular expression of the attribute OID and value of the specified location in the Trap.
  • the Trap OID of the Trap packet is the same as the Trap packet exception.
  • the Trap packet is discarded. Otherwise, the Trap packet is discarded.
  • the invention is exemplified below in conjunction with specific discarding rules.
  • Step 1 After the system is started, the discard rule parser 62 parses the predefined alarm discarding rule, and generates a memory structure in the memory that facilitates the discarding of the processor 66 for fast reading.
  • the configured discard rule adopts the above 1 method, such as:
  • the Trap packets whose Trap OID is in the range of 1.1.3.6.1.2.1.11.2 are discarded.
  • the other Trap packets are reported to the upper-layer service module.
  • Step 2 The network management system receives the trap packet on the alarm receiving port, and the trap parsing processor 64 parses the original protocol layer structure of the trap packet.
  • Step 3 The parsed Trap structure enters the drop processor 66, where the Trap OID and attribute fields and pre-configuration are completed.
  • the rule comparison discards the alarm according to the comparison structure or sends it to the reporting transmitter 68.
  • Step 4 The reporting transmitter 68 sends the alarms to the upper modules that need to receive alarms for service processing.
  • Step 1 After the system is started, the discard rule parser 62 parses the predefined alarm discarding rule, and generates a memory structure in the memory that facilitates the discarding of the processor 66 for fast reading.
  • the configured discard rule adopts the method in the above second form, such as:
  • the first alarm discarding rule is configured, indicating that the Trap OID is 1.1.3.6.1.2.1.11.2, and the key of the second attribute in the attribute area is .1.3.6.1.2.1.2.2.1.1. And the trap whose value matches the regular expression ⁇ [0-9]*$ will be discarded.
  • Step 2 After the network management system receives the trap on the alarm receiving port, the trap parsing processor 64 performs the original protocol layer structure parsing on the trap.
  • Step 3 The parsed Trap structure enters the discarding processor 66, where the TrapOID and the attribute field are compared with the pre-configured rules, and the alarm is discarded according to the comparison structure, or sent to the reporting transmitter 68.
  • FIG. 7 is a flow chart of determining the discarding of a specific Trap message by using the Trap OID and the attribute.
  • FIG. 7 includes the following steps: S1 parses the Trap OID in the packet, and determines in D1 that if the corresponding Trap OID rule is not found in the rule, the process proceeds to S4 through S4. If the Trap OID rule is configured, the attribute field in the S2 parsing message extracts the attribute OID and value, and judges in D2. If the matching rule excludes S3, it does not send to step 4, otherwise S4 sends it to step 4.
  • Step 4 The reporting transmitter 68 sends the alarm information to each upper module that needs to receive an alarm for service processing.
  • Step 1 After the system is started, the discarding rule parser parses the predefined alarm discarding rule, and generates a memory structure in the memory that facilitates discarding the processor 66 for fast reading.
  • the configured discard rule adopts the above form three, such as:
  • the first alarm discarding rule is configured in the third embodiment to indicate that the Trap OID is 1.1.3.6.1.2.1.11.2. Will be discarded, but with one exception, if the key of the second attribute in the attribute area is .1.3.6.1.2.1.2.2.1.1, and the value matches the regular expression ⁇ [0-9]*$, the Trap will not Affected by this rule, continue to report to the upper layer business module.
  • Step 2 After the network management system receives the trap on the alarm receiving port, the trap parsing processor 64 performs the original protocol layer structure parsing on the trap.
  • Step 3 The parsed Trap structure enters the discarding processor 66, where the TrapOID and the attribute field are compared with the pre-configured rules, and the alarm is discarded according to the comparison structure, or sent to the reporting transmitter 68.
  • FIG. 8 is a flowchart of determining the discarding of a specific Trap message by using the Trap OID and the attribute exception.
  • the process includes the following steps: S1 parses the TrapOID in the Trap message, and determines in D1 that if the corresponding TrapOID rule is not found in the discarding rule, the process proceeds to S4 through S4. If the TrapID rule is configured, the attribute field in the S2 parsing message extracts the attribute OID and value, and judges in D2 that if there is no matching rule exception, S3 is discarded, and step 4 is not sent, otherwise S4 is sent to step 4.
  • Step 4 The reporting transmitter 68 sends the alarm information to each upper module that needs to receive an alarm for service processing.
  • the alarm discarding or filtering method in the related art is based on a specific alarm generating source, or the trap is compared and discarded by the user after the service is parsed and mapped.
  • the solution in the embodiment of the present invention is based on the data of the Trap packet, and does not enter the discarding before the service processing layer, and does not distinguish the source of the alarm, and the alarm sent by the device on the entire network takes effect. High efficiency and low system overhead.
  • the action taken by the attribute in the Trap packet is further specified to implement fine-grained alarm discarding rule configuration.
  • the Trap-based device service automatic opening network management system is usually only concerned with a small number of Trap types.
  • the solution in the embodiment of the present invention is of great significance for such a system.
  • each of the above modules may be implemented by software or hardware.
  • the foregoing may be implemented by, but not limited to, the foregoing modules are all located in the same processor; or, the modules are located in multiple In the processor.
  • Embodiments of the present invention also provide a storage medium.
  • the foregoing storage medium may be configured to store program code for performing the following steps:
  • the Trap packet is matched with the discarding rule for discarding the Trap packet.
  • the foregoing storage medium may include, but is not limited to, a USB flash drive, a Read-Only Memory (ROM), and a Random Access Memory (RAM).
  • ROM Read-Only Memory
  • RAM Random Access Memory
  • modules or steps of the present invention described above can be implemented by a general-purpose computing device that can be centralized on a single computing device or distributed across a network of multiple computing devices. Alternatively, they may be implemented by program code executable by the computing device such that they may be stored in the storage device by the computing device and, in some cases, may be different from the order herein.
  • the steps shown or described are performed, or they are separately fabricated into individual integrated circuit modules, or a plurality of modules or steps thereof are fabricated as a single integrated circuit module.
  • the invention is not limited to any specific combination of hardware and software.
  • the method and the device for processing a trap Trap packet provided by the embodiment of the present invention have the following beneficial effects: the problem that the useful Trap packet is discarded by the useless Trap packet in the related art is solved. As a result, the problem of high discard rate of Trap packets is high, and the effect of reducing the discard rate of Trap packets is achieved.

Abstract

La présente invention concerne un procédé et un appareil de traitement de message Trap. Le procédé consiste : à recevoir un message Trap pour identifier des informations d'alarme de dispositif ; à mettre en correspondance le message Trap avec une règle de suppression pour supprimer un message Trap ; à traiter le message Trap selon le résultat de mise en correspondance. La présente invention résout le problème de taux de fausse suppression élevé d'un message Trap en raison du fait qu'un message Trap utile est noyé dans des messages Trap inutiles et supprimé dans l'état de la technique associée, permettant ainsi d'obtenir l'effet de réduction du taux de fausse suppression du message Trap.
PCT/CN2016/076645 2015-06-16 2016-03-17 Procédé et appareil de traitement de message trap WO2016202025A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510333033.2A CN106330478A (zh) 2015-06-16 2015-06-16 陷阱Trap报文处理方法及装置
CN201510333033.2 2015-06-16

Publications (1)

Publication Number Publication Date
WO2016202025A1 true WO2016202025A1 (fr) 2016-12-22

Family

ID=57544901

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/076645 WO2016202025A1 (fr) 2015-06-16 2016-03-17 Procédé et appareil de traitement de message trap

Country Status (2)

Country Link
CN (1) CN106330478A (fr)
WO (1) WO2016202025A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111885180A (zh) * 2020-07-28 2020-11-03 海尔优家智能科技(北京)有限公司 消息下发方法及装置

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112787847A (zh) * 2020-12-24 2021-05-11 凌云天博光电科技股份有限公司 基于网管系统EPON大量Trap的快速处理方法及装置

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101312405A (zh) * 2007-05-24 2008-11-26 杭州华三通信技术有限公司 一种告警处理方法及网管系统
CN101369918A (zh) * 2008-09-25 2009-02-18 浙江工业大学 网络管理浏览器
CN101388808A (zh) * 2008-10-24 2009-03-18 中兴通讯股份有限公司 一种基于简单网络管理协议的trap处理方法
CN101540700A (zh) * 2009-04-10 2009-09-23 成都市华为赛门铁克科技有限公司 配置联动方法、系统、终端和网络设备管理服务器
WO2012114343A1 (fr) * 2011-02-24 2012-08-30 Hewlett-Packard Development Company, L.P. Système et procédé permettant d'effectuer le rapport d'erreurs dans un réseau

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101056228A (zh) * 2007-06-22 2007-10-17 中兴通讯股份有限公司 数据设备告警的测试方法及系统
CN102571382A (zh) * 2010-12-16 2012-07-11 中兴通讯股份有限公司 一种基于SNMP的Trap处理的方法、网管及系统
CN103138958B (zh) * 2011-11-23 2017-11-24 上海寰创通信科技股份有限公司 一种网管标准接口的实现方法
CN103414596B (zh) * 2013-08-28 2017-07-14 上海斐讯数据通信技术有限公司 基于简单管理网络协议识别所有厂商Trap及处理的方法

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101312405A (zh) * 2007-05-24 2008-11-26 杭州华三通信技术有限公司 一种告警处理方法及网管系统
CN101369918A (zh) * 2008-09-25 2009-02-18 浙江工业大学 网络管理浏览器
CN101388808A (zh) * 2008-10-24 2009-03-18 中兴通讯股份有限公司 一种基于简单网络管理协议的trap处理方法
CN101540700A (zh) * 2009-04-10 2009-09-23 成都市华为赛门铁克科技有限公司 配置联动方法、系统、终端和网络设备管理服务器
WO2012114343A1 (fr) * 2011-02-24 2012-08-30 Hewlett-Packard Development Company, L.P. Système et procédé permettant d'effectuer le rapport d'erreurs dans un réseau

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111885180A (zh) * 2020-07-28 2020-11-03 海尔优家智能科技(北京)有限公司 消息下发方法及装置
CN111885180B (zh) * 2020-07-28 2023-06-20 海尔优家智能科技(北京)有限公司 消息下发方法及装置

Also Published As

Publication number Publication date
CN106330478A (zh) 2017-01-11

Similar Documents

Publication Publication Date Title
EP1999890B1 (fr) Localisateur et correcteur automatisés d'encombrements et de dérangements du réseau
CN103430483B (zh) 用于确定通信系统中的关联事件的技术
CN105577496B (zh) 一种家庭网关利用云平台识别接入设备类型的系统
US20150319032A1 (en) Method and system for detecting changes in a network using simple network management protocol polling
CN113300816B (zh) 节点定位方法、网络传输方法、装置及设备
WO2016187979A1 (fr) Procédé et appareil d'émission pour message de détection bidirectionnelle avec réexpédition (bfd)
EP3541088B1 (fr) Procédé, dispositif et système destinés à porter un numéro de séquence de trame dans un réseau optique passif multicanal
CN104660730B (zh) 服务端与远端单元的通讯方法及其系统
WO2016202025A1 (fr) Procédé et appareil de traitement de message trap
US20160248652A1 (en) System and method for classifying and managing applications over compressed or encrypted traffic
KR102397346B1 (ko) 데이터 트래픽을 모니터링하기 위한 방법, 장치 및 시스템
CN108460044B (zh) 数据的处理方法和装置
CN110784375B (zh) 网络数据监控方法、装置、电子设备及存储介质
WO2013078873A1 (fr) Procédé et dispositif pour identifier un message de réponse
KR20220029142A (ko) Sdn 컨트롤러 서버 및 이의 sdn 기반 네트워크 트래픽 사용량 분석 방법
WO2017070965A1 (fr) Procédé de traitement de données basé sur un réseau défini par logiciel, et dispositif associé
CN114285769B (zh) 共享上网检测方法、装置、设备及存储介质
CN106713014B (zh) 一种监控系统中的被监控主机、监控系统以及监控方法
CN115242892A (zh) 一种流标识获取方法、装置、设备及介质
WO2015176450A1 (fr) Procédé et système de fourniture de services
CA3186107A1 (fr) Procede de mise en ?uvre de verification de terminal, appareil, systeme, dispositif, et support de stockage
JP6057470B2 (ja) ネットワークのアラーム処理システム
KR20120010535A (ko) 패킷 분석 장치 및 방법
US10466934B2 (en) Methods and systems for time-based binning of network traffic
CN106301832A (zh) 一种处理系统日志报文的方法和装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16810766

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16810766

Country of ref document: EP

Kind code of ref document: A1